networks Crossword Puzzles
ETHAN PUZZLE 2021-08-05
Across
- what is a device that routes traffic between networks
- an output device that shows you what your doing
- is fortnite the goat game ever :)
- how many keys are on a QWERT keyboard
Down
- a type of file that organises data in a particular structure
- what does cd stand for
- what do you do if you re boot a device with either warm or cold
- what is pages per minute shortened (think about
- what is plain old telephone service shortened into 4 letters tip: think of the starting letters
9 Clues: what does cd stand for • is fortnite the goat game ever :) • how many keys are on a QWERT keyboard • what is pages per minute shortened (think about • an output device that shows you what your doing • what is a device that routes traffic between networks • a type of file that organises data in a particular structure • ...
Marketing 2023-02-11
Across
- The process of making something as good or effective as possible
- The largest search engine company
- A popular web browser developed by Google
- A collection of web pages and related content that is identified by a common domain name and published on at least one web server
- The process of promoting and selling products or services
Down
- The practice of promoting a product or service through various media
- A global system of interconnected computer networks
- The process of changing something into a different form or type
- A popular social networking platform
9 Clues: The largest search engine company • A popular social networking platform • A popular web browser developed by Google • A global system of interconnected computer networks • The process of promoting and selling products or services • The process of changing something into a different form or type • The process of making something as good or effective as possible • ...
Digital Divide 2023-06-06
Across
- A big network that helps us communicate and find information.
- The gap between people who can use technology and those who can't.
- Giving people the tools and resources to take control of their lives.
Down
- Internet Quick internet that lets us send and receive information easily.
- Opportunities When some people have fewer chances than others.
- Being able to connect to the internet or other digital networks.
- When some people have more or better things than others.
- Skills Knowing how to use computers and other technology.
- Knowledge Understanding how to use computers and gadgets.
- The ability to use computers and the internet.
10 Clues: The ability to use computers and the internet. • When some people have more or better things than others. • Skills Knowing how to use computers and other technology. • Knowledge Understanding how to use computers and gadgets. • A big network that helps us communicate and find information. • Opportunities When some people have fewer chances than others. • ...
Crossword 2024-10-10
Across
- A secret pathway that allows unauthorized access to a system or software.
- The process of converting a coded data back into its original format.
- Malicious computer software.
- A barrier between a trusted internal network and untrusted external networks.
Down
- The process of converting data into a coded format to prevent unauthorized access.
- A person who tries to gain unauthorized access.
- A method for forcing a password.
- Intercepting communication between two parties without their knowledge.
- Tricking someone into giving informations over the internet.
9 Clues: Malicious computer software. • A method for forcing a password. • A person who tries to gain unauthorized access. • Tricking someone into giving informations over the internet. • The process of converting a coded data back into its original format. • Intercepting communication between two parties without their knowledge. • ...
technology 2025-05-05
Across
- A wireless networking technology allowing devices to connect to the internet.
- Advances Breakthroughs that improve tools, systems, and processes.
- A global network connecting millions of private, public, academic, and business networks.
Down
- A mobile phone with advanced features, including internet connectivity and apps.
- The introduction of new ideas, methods, or products that revolutionize industries.
- An electronic device for processing, storing, and displaying information.
- Media Online platforms for sharing content and connecting with people globally.
- Digital recording, playback, or streaming of moving visual media.
- Gadgets Cutting-edge devices designed to simplify and enhance daily tasks.
9 Clues: Digital recording, playback, or streaming of moving visual media. • Advances Breakthroughs that improve tools, systems, and processes. • An electronic device for processing, storing, and displaying information. • Gadgets Cutting-edge devices designed to simplify and enhance daily tasks. • ...
Palaces for the People Crossword 2024-03-07
Across
- an action of ____ constitutes that an offense has taken place
- Guy named Oscar Newman wrote this book/paper about Pruitt Igoe
- An amazing advancement in that we use everyday. We stare at it in our hand.
- Events that devastate the physical landscape
- The splitting of society
Down
- Comprised of the facilities, spaces, services and networks that support he quality of life
- Andrew Fairweather came up with this idea for his local library
- A social unit that share socially significant characteristics
- Place where people can get public access to materials to better themselves
9 Clues: The splitting of society • Events that devastate the physical landscape • an action of ____ constitutes that an offense has taken place • A social unit that share socially significant characteristics • Guy named Oscar Newman wrote this book/paper about Pruitt Igoe • Andrew Fairweather came up with this idea for his local library • ...
Artificial Intelligence 2022-03-09
Across
- Is a method that works like the human brain
- learns from the training dataset and groups the objects on the basis of similar features
- Is part of Machine Learning. Normally uses Artificial Neural Networks
Down
- It's a method that can be splitted into regression methods and classification methods
- Tests the machines ability to pass for a human
- Improve an algorithm without the help of a human being
- A program designed to communicate with people through text or voice
- Large and complex datasets
- A set of rules that a machine uses to do a task
9 Clues: Large and complex datasets • Is a method that works like the human brain • Tests the machines ability to pass for a human • A set of rules that a machine uses to do a task • Improve an algorithm without the help of a human being • A program designed to communicate with people through text or voice • ...
Set 1 2022-10-14
Across
- A machine learning system that interacts with its environment and responds to errors and rewards
- Faceboook’s object detection research platform Markov When the past and future are independent given the present
- A Method to train deep neural networks
Down
- Distance between two points in a grid
- A Common activation function
- A Function to convert a vector of raw scores into probability
- A Term that is a measure of disorder or purity or unpredictability or uncertainty.
- An unsupervised learning algorithm for obtaining vector representations for words
- A deep learning framework developed by Berkeley AI Research
9 Clues: A Common activation function • Distance between two points in a grid • A Method to train deep neural networks • A deep learning framework developed by Berkeley AI Research • A Function to convert a vector of raw scores into probability • An unsupervised learning algorithm for obtaining vector representations for words • ...
Lesson 10 Vocab 2013-09-30
Across
- A type of hub that uses a table to keep track of destinations so that data can be sent directly to its destination, rather than to every computer on the network before the destination machine receives it.
- A card that enables one computer to send and receive data to and from another computer.
- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.
- A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
- Two or more devices connected together.
- A LAN topology wherein two star networks are linked using a bus.
- The small unit into which information is broken down before being sent across a network.
- Data transmission that uses radio frequencies instead of cabling.
- A central point on a network where computers can connect. The central point is often a switch rather than a hub.
- Any receiving point in a computer network.
- A network architecture where all computers have equal responsibilities and all computers can share files with each other.
- A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
- The study of how items are related to one another in space; a configuration.
Down
- The most commonly used kind of networking cable today.
- A piece of hardware or software on a network designed to limit access to certain machines to authorized users only.
- What an organization’s intranet becomes when the organization allows outsiders to access its intranet.
- A set of programs used to manage and secure a network.
- The design of a computer network, which specifies how devices communicate with one another. The most common network architecture types are client/server and peer-to-peer.
- The primary networking technology currently in use. Ethernet defines standards for addressing packets and data and a method for avoiding data conflicts on the network.
- The central core of a network, this connection can link many smaller networks to a larger network.
- Often called a network switch, this connects many parts of a network and directs traffic as needed.
- (WAN) A type of network where the computers are far apart—in different buildings, different cities, or even different countries.
- A private network that looks and functions a lot like the Internet but is typically available only to the employees of an organization.
- (LAN) A type of network where computers are close together, typically in the same building or office.
- A computer dedicated to providing one service (such as web hosting, disk storage, and so on) and that is shared by many users across a network.
- A computer intended to be used by one person at a time.
- A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization’s needs.
- A type of electrical cable often used to transmit cable TV.
- A network layout in which each individual node is connected to two others, with the first and last coming back to connect to each other, thus completing the ring shape.
- network A network architecture in which each computer is either a client or a server. Servers are powerful computers dedicated to managing the clients. Clients are PCs on which users run applications. Clients rely on servers for resources..
- The rules of initiating, interrupting, and continuing communication on a computer network.
- A device that links two computer networks or links a local area network to the Internet. A router reads packet addresses and routes packets.
32 Clues: Two or more devices connected together. • Any receiving point in a computer network. • The most commonly used kind of networking cable today. • A set of programs used to manage and secure a network. • A computer intended to be used by one person at a time. • A type of electrical cable often used to transmit cable TV. • ...
Lesson 10 Vocab by: Garrett Hudson 2013-09-30
Across
- A private network that looks and functions a lot like the Internet but is typically available only to the employees of an organization.
- What an organization’s intranet becomes when the organization allows outsiders to access its intranet.
- computer intended to be used by one person at a time.
- A card that enables one computer to send and receive data to and from another computer.
- Data transmission that uses radio frequencies instead of cabling.
- A type of hub that uses a table to keep track of destinations so that data can be sent directly to its destination, rather than to every computer on the network before the destination machine receives it.
- Any receiving point in a computer network.
- Two or more devices connected together.
- Often called a network switch, this connects many parts of a network and directs traffic as needed.
- The rules of initiating, interrupting, and continuing communication on a computer network.
- A central point on a network where computers can connect. The central point is often a switch rather than a hub.
- A LAN topology wherein two star networks are linked using a bus.
- The study of how items are related to one another in space; a configuration.
- The primary networking technology currently in use. Ethernet defines standards for addressing packets and data and a method for avoiding data conflicts on the network.
Down
- A device that links two computer networks or links a local area network to the Internet. A router reads packet addresses and routes packets.
- The most commonly used kind of networking cable today.
- A network architecture where all computers have equal responsibilities and all computers can share files with each other.
- A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
- A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization’s needs.
- A piece of hardware or software on a network designed to limit access to certain machines to authorized users only.
- A set of programs used to manage and secure a network.
- A network layout in which each individual node is connected to two others, with the first and last coming back to connect to each other, thus completing the ring shape.
- A type of network where the computers are far apart—in different buildings, different cities, or even different countries.
- A type of network where computers are close together, typically in the same building or office.
- network architecture in which each computer is either a client or a server. Servers are powerful computers dedicated to managing the clients. Clients are PCs on which users run applications. Clients rely on servers for resources..
- The design of a computer network, which specifies how devices communicate with one another. The most common network architecture types are client/server and peer-to-peer.
- A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.
- The small unit into which information is broken down before being sent across a network.
- A type of electrical cable often used to transmit cable TV.
- The central core of a network, this connection can link many smaller networks to a larger network.
- A computer dedicated to providing one service (such as web hosting, disk storage, and so on) and that is shared by many users across a network.
32 Clues: Two or more devices connected together. • Any receiving point in a computer network. • computer intended to be used by one person at a time. • The most commonly used kind of networking cable today. • A set of programs used to manage and secure a network. • A type of electrical cable often used to transmit cable TV. • ...
Computer Words 2024-06-17
Across
- the smallest unit of data that a computer can process and store.
- Security- the practice of protecting systems, networks, and programs from digital attacks
- the ability of software and hardware from different sources to work together without having to be altered to do so
- allows devices to communicate with each other without cables or wires.
- a software program used to locate and display information on the Internet or an intranet.
- any unsolicited communication sent in bulk.
- small files of information that a web server generates and sends to a web browser
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a data measurement unit applied to digital computer or media storage
- System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- a unit of data that is eight binary digits long
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- A zip is a file format that can contain multiple files combined and compressed into one file.
Down
- the capacity at which a network can transmit data.
- the use or operation of computers.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- to reload the operating system of a computer:
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
- the transmission of high-quality data of wide bandwidth.
- the number of pixels that are displayed per inch for an image
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- a set of rules for formatting and processing data.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a computer on a network that provides the interface between two applications or networks that use different protocols
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- files embedded within online communication channels such as emails, instant messages, or social networks
- Any stored data.
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- Crime- any criminal activity that involves a computer, network or networked device.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • the capacity at which a network can transmit data. • a set of rules for formatting and processing data. • the transmission of high-quality data of wide bandwidth. • ...
crossword 2025-08-28
5 Clues: a place where Indian laws are made • profession that involves study of drugs • Green music festival celebrated in Portugual • symptoms of shortness of breath,fatigue,headaches • profession that involves protecting computers and networks from hackers
Entrepreneur 2019-01-28
Across
- many thousands of small companies does Microsoft work with.
- refer to something new or to a change made to an existing product, idea, or field
- who offers an innovative solution to a (frequently unrecognized) problem
- does a majority of start ups get their funding (there are three)
Down
- does a majority of start ups get their funding (there are three)
- trade to be effective
- age of an entrepreneur
- is a way entrepreneurs can improve upon besides an improved product?
- force for economic growth
- is a main component to being a successful entrepreneur
- does a majority of start ups get their funding (there are three)
11 Clues: trade to be effective • age of an entrepreneur • force for economic growth • is a main component to being a successful entrepreneur • many thousands of small companies does Microsoft work with. • does a majority of start ups get their funding (there are three) • does a majority of start ups get their funding (there are three) • ...
Humour 2019-01-08
Across
- He's starred in two TV __________________on two networks.
- The crowd found it ___________________when the comedian tripped over his microphone cord.
- I love hearing the audience ______________ with laughter.
- They say ________________ is the best medicine.
Down
- She looked so ridiculous it was hard to keep a __________________________ face.
- He tells the joke so poorly that he has to explain the ________________ twice.
- Despite his illness, he is still able to look at life with a sense of _______________ and enthusiasm.
- __________________ Bill Cosby wrote all his own material for his comedy monologues.
- I prefer _____________________to tragedy.
9 Clues: I prefer _____________________to tragedy. • They say ________________ is the best medicine. • He's starred in two TV __________________on two networks. • I love hearing the audience ______________ with laughter. • He tells the joke so poorly that he has to explain the ________________ twice. • ...
Internet Terminology 2020-01-13
Across
- (noun) a highlighted Internet address that connects to another website; (verb) to connect one website to another
- (noun) a place to discuss things online in real time
- (noun) main computer that provides special services
- (verb) to look at different websites without a specific purpose
- (noun) typed message sent by cell phone; (verb) to type a message on a cell phone
- (noun) a visit to a website
Down
- (noun) a vast computer network linking smaller computer networks worldwide
- (noun) a place to post a message
- (noun) message; (verb) to put a message online
9 Clues: (noun) a visit to a website • (noun) a place to post a message • (noun) message; (verb) to put a message online • (noun) main computer that provides special services • (noun) a place to discuss things online in real time • (verb) to look at different websites without a specific purpose • (noun) a vast computer network linking smaller computer networks worldwide • ...
Cybersecurity Puzzle! 2024-12-03
Across
- Unauthorized access to or manipulation of computer systems.
- A program that protects your computer from viruses
- A network security device that monitors and controls incoming and outgoing traffic.
- A process used to confirm the identity of a user.
Down
- A method of stealing personal information by pretending to be a trustworthy source.
- A type of software designed to harm or exploit systems
- A weak point in a system that can be exploited.
- A secret code used to secure data.
- A person who attempts to gain unauthorized access to networks.
9 Clues: A secret code used to secure data. • A weak point in a system that can be exploited. • A process used to confirm the identity of a user. • A program that protects your computer from viruses • A type of software designed to harm or exploit systems • Unauthorized access to or manipulation of computer systems. • ...
WEEK 6 DIG-Revision 2025-08-21
Across
- Known as the “brain” of the computer, processes instructions.
- Input device used for typing text and commands.
- The screen that displays images, videos, and text.
- Device that directs data between networks or connects to Wi-Fi.
Down
- Networking device that connects multiple computers or devices within a network.
- Handheld device used to move a pointer on the screen.
- The language of computers, made of 1s and 0s.
- Connects a computer or network to the internet through a phone or cable line.
- Produces a paper copy of digital documents.
9 Clues: Produces a paper copy of digital documents. • The language of computers, made of 1s and 0s. • Input device used for typing text and commands. • The screen that displays images, videos, and text. • Handheld device used to move a pointer on the screen. • Known as the “brain” of the computer, processes instructions. • ...
Bus & Star Topologies 2025-05-14
Across
- bus networks cost less to build (1 word)
- stops signals bouncing back on a bus network
- more data crashing in a bus network (2 words)
- The name for the structure of a network.
- all devices share one long cable (2 words)
Down
- smart box in a star network that sends data to the right device
- If one computer breaks in a star or bus topology it will still k____ w_______.
- the main cable that carries all the data in a bus network
- all devices connect to a central point (2 words)
9 Clues: bus networks cost less to build (1 word) • The name for the structure of a network. • all devices share one long cable (2 words) • stops signals bouncing back on a bus network • more data crashing in a bus network (2 words) • all devices connect to a central point (2 words) • the main cable that carries all the data in a bus network • ...
RECOGNITION TASK 2018-08-23
Across
- is a network that connects other networks and devices to share information
- You do this be diligent and comply with the delivery of tasks
- There, you can work with several people
- Faculty of the human being to understand through reason
Down
- This is a period in which an action is performed
- You do this evaluate of knowledge, attitude and performance of a person
- This is activities that the student must do
- This is a process to learn something
8 Clues: This is a process to learn something • There, you can work with several people • This is activities that the student must do • This is a period in which an action is performed • Faculty of the human being to understand through reason • You do this be diligent and comply with the delivery of tasks • ...
EEE AND ECE TECHNICAL WORDSJ 2018-10-05
Across
- Parallel resonance is also called _____(13).
- Which variable is a variable that stores the address of another variable(7).
- Which phenomenon takes place in enhancement type mosfet (9).
- The commutator segments in DC motor is equal to the number of ______(9).
Down
- Super conductors exhibit which properties (regarding magnetism)(12).
- Passive networks are always_______(10).
- Which statement is used to restart iteration from beginning if loop(8).
- What is the dynamic impedance offered by the ideal tank circuit(8).
8 Clues: Passive networks are always_______(10). • Parallel resonance is also called _____(13). • Which phenomenon takes place in enhancement type mosfet (9). • What is the dynamic impedance offered by the ideal tank circuit(8). • Super conductors exhibit which properties (regarding magnetism)(12). • Which statement is used to restart iteration from beginning if loop(8). • ...
Internet Vocabulary 2014-04-29
Across
- engine softwere that searches and gathers information
- when people copy and sell or use there there movie and vido and sell it as there own
- when someone writes down or copys all your hard work and you pretend its your work
Down
- a global network
- someone who bullys over the internet or any social midia
- contains dated text entries
- and unarthourized person who gains acces to computer files
- networks online communities that meet or socialize with each other
8 Clues: a global network • contains dated text entries • engine softwere that searches and gathers information • someone who bullys over the internet or any social midia • and unarthourized person who gains acces to computer files • networks online communities that meet or socialize with each other • ...
Network Components 2021-11-09
Across
- adapter set of communication standards that uses digital transmission to make phone calls, video calls, transmit data and other network services
- transmitter and a receiver of signals
- to allow or permit certain types of network traffic in
- converts a digital data frame from the communications technology
Down
- two or more hosts or network segments together
- part of two networks
- wireless infrastructure network mode to provide a connection point
- enables connected devices to share information and talk to each other.
8 Clues: part of two networks • transmitter and a receiver of signals • two or more hosts or network segments together • to allow or permit certain types of network traffic in • converts a digital data frame from the communications technology • wireless infrastructure network mode to provide a connection point • ...
Network Devices 2021-04-21
Across
- allows digital data transmission over standard phone line
- both transmitter and receiver
- network security device that allows or blocks traffic on a defined set of security rules
- device to connect local area network to a wide area network
Down
- computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- allows data to flow from one network to another
- wireless access point
- enables connected devices to share information with each other
8 Clues: wireless access point • both transmitter and receiver • allows data to flow from one network to another • allows digital data transmission over standard phone line • device to connect local area network to a wide area network • enables connected devices to share information with each other • ...
The Internet 2020-11-17
Across
- Websites are stored on web servers connected to this
- Every networked computer or computing device has a unique on of these
- Responsible for deciding where a data packet should go
- The _____ name is a text reference to a site that can be translated into the numerical address of the site
Down
- A worldwide collection of inter-connected networks
- Used for accessing the World Wide Web
- Allow the user to navigate around and between websites
- Short for modulator/ demodulator
- A text based system system for defining web pages
9 Clues: Short for modulator/ demodulator • Used for accessing the World Wide Web • A text based system system for defining web pages • A worldwide collection of inter-connected networks • Websites are stored on web servers connected to this • Allow the user to navigate around and between websites • Responsible for deciding where a data packet should go • ...
Transport in Great Britain 2023-01-17
Across
- British car manufacturer famous for the 'Minor'.
- Tracks spread across the country to offer quick national transport.
- Famous for transporting the royal family cars and their luxury.
- Networks of waterways primarily used for transport.
Down
- Motorised two wheeled mode of transport. Famous British makers include Royal Enfield and BSA.
- Large public vehicles that started in London in 1829 (tricky!).
- Two wheeled mode of transport
- Still used in Birmingham and Edinburgh today. Work on tracks. First introduced in 1829.
8 Clues: Two wheeled mode of transport • British car manufacturer famous for the 'Minor'. • Networks of waterways primarily used for transport. • Large public vehicles that started in London in 1829 (tricky!). • Famous for transporting the royal family cars and their luxury. • Tracks spread across the country to offer quick national transport. • ...
Department of Homeland Security 2023-11-19
Across
- Protects our computer systems and networks from these
- Responds to these and disasters in our nation
- Focuses on at home or "_________" security
- Manages this to prevent criminals and illegal goods from entering the US from another nation
Down
- This cabinet position was created in 2001 after these attacks
- Gathers this and then investigates suspicious activities
- Provides resources and training to help people and businesses be ___________ in an emergency or disaster
- The leader of this department is called a ______.
8 Clues: Focuses on at home or "_________" security • Responds to these and disasters in our nation • The leader of this department is called a ______. • Protects our computer systems and networks from these • Gathers this and then investigates suspicious activities • This cabinet position was created in 2001 after these attacks • ...
A Digital Future for the Infrastructure Industry 2021-04-14
Across
- - ... control-process of controling something through connections of nerves
- - crucial for excistance
- - a criteria of successful work, by the end of which the goal will be achieved
- - a rigid external covering for the body
- - the process by which an object is suspended by physical force against gravity, in a stable position without firm physical contact
Down
- - an uncrewed aircraft
- - objects and places that are located nearby the main object
- - Networks of sensors will allow objects to order their own ...
- - Digital natives will instinctively combine digital skills with ... and new ideas
9 Clues: - an uncrewed aircraft • - crucial for excistance • - a rigid external covering for the body • - objects and places that are located nearby the main object • - Networks of sensors will allow objects to order their own ... • - ... control-process of controling something through connections of nerves • ...
Stay Connected Not Dependent 2023-12-12
Across
- It is affected by making us losing our temper, good manners, patience
- Do not publish on social networks
- When we are connected
- We do not have them when we are all day connected
- Connect with our peers from different countries
Down
- We do not go there in odrer to play with our friends because we preffer to be online
- Clues that describing ourselves
- We lose it when we are a lot time online
- We use it in order to communicate, play video games, find info,watch the news etc
9 Clues: When we are connected • Clues that describing ourselves • Do not publish on social networks • We lose it when we are a lot time online • Connect with our peers from different countries • We do not have them when we are all day connected • It is affected by making us losing our temper, good manners, patience • ...
Work 2024-01-08
Across
- a large building where materials or goods may be stored
- promoting and selling products or services
- a type of product manufactured by a company under a particular name
- a person who greets and deals with clients and visitors
- a person who works at a company for wages
- a person or organization using the services of a person or a company
Down
- a person who buys goods or services from a shop or business
- by means of the internet
- a technical expert for the management and support of systems and networks
9 Clues: by means of the internet • a person who works at a company for wages • promoting and selling products or services • a large building where materials or goods may be stored • a person who greets and deals with clients and visitors • a person who buys goods or services from a shop or business • a type of product manufactured by a company under a particular name • ...
Power 2025-08-15
Across
- The ability to influence others and control resources
- Something you are high if you are the gatekeeper of information flow in social networks.
- Something depends on the availability of alternatives.
- Type of power that the less powerful person has to keep the powerful person in the relationship and use power judiciously.
- Requiring others to do specific things due to one’s role or position.
- The ability to provide compensation.
Down
- The ability to apply punishment.
- Something that answer of question 5 generates power through.
- Social structures of individuals or social units that are connected through relationships.
9 Clues: The ability to apply punishment. • The ability to provide compensation. • The ability to influence others and control resources • Something depends on the availability of alternatives. • Something that answer of question 5 generates power through. • Requiring others to do specific things due to one’s role or position. • ...
Emerging Technology Puzzle 2025-09-19
Across
- Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny
- Security vulnerabilitiees in faster networks, increased dependency on connected devices and data interception
- Fraud in immersive platforms and privacy issues
- Data breaches, third party vendor risks, regulatory compliance challenges and service outages
- Automation errors, lack of human oversight, cyber vulnerabilities
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Potential to break current cryptographic systems which may lead to data breaches and fraud
- Increased attack surface, device vulnerabilities, data security and privacy concerns
9 Clues: Fraud in immersive platforms and privacy issues • Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities • ...
Business Key Terms 2021-04-06
Across
- A family of personal computers designed, manufactured, and sold by Apple Inc.
- A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- The application of psychological and physiological principles to the engineering and design of products, processes, and systems.
- The unauthorized use or reproduction of another's work.
- A small, portable personal computer with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Also called a central processor, main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
- A type of non-volatile memory used in computers and other electronic devices. Data cannot be electronically modified after the manufacture of the memory device.
Down
- A collection of instructions and data that tell the computer how to work.
- Includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
- A computer connected to a network of other workstations called “clients”. Client computers request information from the server over the network. Tends to have more storage, memory and processing power than a normal workstation.
- A networking device that forwards data packets between computer networks. Performs the traffic directing functions on the Internet.
- A person who organizes and operates a business or businesses, taking on greater than normal financial risks in order to do so.
- A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated.
- The highest-ranking person in a company or other institution, ultimately responsible for making managerial decisions.
16 Clues: The unauthorized use or reproduction of another's work. • A collection of instructions and data that tell the computer how to work. • A family of personal computers designed, manufactured, and sold by Apple Inc. • A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated. • ...
BTS and K - pop 2023-09-03
Across
- A famous or well – known person.
- Media Websites and apps (applications) that let people create and share things online, or to join social networks.
- to begin or make something to exist.
Down
- The first public appearance of a new product or show
- To do an action or piece of work
- To sing, dance, act, read a poem, etc. in front of people.
- To sell new album or new collection.
7 Clues: To do an action or piece of work • A famous or well – known person. • To sell new album or new collection. • to begin or make something to exist. • The first public appearance of a new product or show • To sing, dance, act, read a poem, etc. in front of people. • ...
Data Communication 2022-02-03
Across
- determines the volume of data that can be transmitted in given time
- transmission line that permits data to flow in only one direction
- acts as an interface between networks
- The most popular means of communicating data wirelessly
Down
- a protocol for sending email messages over the internet
- or any direct action from a use
- Allows any sort of electronic equipment to automatically make their own connections without
7 Clues: or any direct action from a use • acts as an interface between networks • a protocol for sending email messages over the internet • The most popular means of communicating data wirelessly • transmission line that permits data to flow in only one direction • determines the volume of data that can be transmitted in given time • ...
Ethics To Technology (ch.3) 2024-02-13
Across
- Refers to confidentiality, integrity, and availability.
- A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.
- The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
- A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.
Down
- Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
- A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.
6 Clues: Refers to confidentiality, integrity, and availability. • The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats. • ...
exo1 2025-01-12
Social Media Crossword Puzzle 2021-01-07
Across
- A social media app which main function is video sharing
- Face of any brand
- A platform founded by Mark Zuckerberg
- The web address used for identifying a website or page
- A picture or an icon representing a particular person in an online forums
- A platform to sell online products
- A platform to take online session
- Acronym for small- scale animations and film clips in social media
- Keyword for social media
Down
- A free url shortening service
- A pictorial representation of a facial expression which is used in writing
- A person who is earning a commission by promoting or advertising other people's products
- Anything shared across social networks that get passed on rapidly
- Use this to improve your organic search results
- Currently popular or widely discussed online
- An electronic version of a book
- An image, video or a text typically humorous in nature, that is copied and spread rapidly by internet users, often with slight variations
- A msg sent on twitter
18 Clues: Face of any brand • A msg sent on twitter • Keyword for social media • A free url shortening service • An electronic version of a book • A platform to take online session • A platform to sell online products • A platform founded by Mark Zuckerberg • Currently popular or widely discussed online • Use this to improve your organic search results • ...
Chapter 9 The Tree House Mystery 2024-01-23
Across
- float or hang suspended over
- group of people who have the right to enforce laws or make important decisions
- respect or congratulations!(- between the different words)
- have the ability to see
- piece of cloth on which an artist paints
- line segment where two faces of a solid figure meet
- daydream
Down
- risky or daring undertaking; to expose to danger; to dare
- invisible line that marks the extent of a state's territory
- involves deep inspiration and prolonged expiration through your lips
- program that accesses and displays files and other data available on the Internet and other networks.
- to suspend from a support (2 verb forms only)
- next to someone or something
- collection of data by having people answer a series of questions
- picture made with paint
- bend the top part of your body forward in order to show respect
- events when something notable is seen
- quickly
18 Clues: quickly • daydream • picture made with paint • have the ability to see • float or hang suspended over • next to someone or something • events when something notable is seen • piece of cloth on which an artist paints • to suspend from a support (2 verb forms only) • line segment where two faces of a solid figure meet • risky or daring undertaking; to expose to danger; to dare • ...
IAM Directory Services 2025-11-24
Across
- Server that stores the AD database and handles authentication.
- Allows a user to authenticate once and access multiple systems.
- Open-source implementation of the LDAP protocol.
- Rules that specify user or system access rights.
- Security best practice to give users only the access they need.
- Logical container for grouping users, groups, and computers.
- Microsoft’s directory service for Windows networks.
- The main OpenLDAP server daemon.
- Protects data in transit between directory clients and servers.
Down
- Centralized systems that manage network resources and user identities in a structured hierarchy.
- Links between domains that enable resource sharing.
- Preparing restoration procedures for directory failures.
- Process of synchronizing directory data across servers.
- Ability of directory services to grow with organizational needs.
- Define allowed attributes and object classes in a directory.
- Distributed data repository that stores directory information for fast searches.
- Lightweight Directory Access Protocol used to query directory services.
- Plain text format for representing directory entries.
18 Clues: The main OpenLDAP server daemon. • Open-source implementation of the LDAP protocol. • Rules that specify user or system access rights. • Links between domains that enable resource sharing. • Microsoft’s directory service for Windows networks. • Plain text format for representing directory entries. • Process of synchronizing directory data across servers. • ...
Pre-Activity 2022-11-10
5 Clues: Another name for the Internet • Most common search engine used. • The best tool for finding Web sites. • A worldwide system of connected networks. • It is an acronym for Unlimited Resources for Learning
At least FIVE tissues or organs from the cardiovascular system 2024-11-13
5 Clues: - pumps blood through the system. • - vessels that deliver blood to tissues. • - vessels that return blood to the heart. • - networks of small vessels that perfuse tissues. • - a connective tissue that carries oxygen, nutrients, hormones and waste products
VPN 2023-08-22
Across
- a suite of protocols that can be used to secure communications at the IP layer
- a secure communication channel in VPN
- widely regarded as one of the most secure and versatile VPN protocols
Down
- a newer and lightweight VPN protocol
- Known for its fast speeds and strong security features
- provide secure remote access to internal networks for employees working from outside the office
- one of the oldest VPN protocols
7 Clues: one of the oldest VPN protocols • a newer and lightweight VPN protocol • a secure communication channel in VPN • Known for its fast speeds and strong security features • widely regarded as one of the most secure and versatile VPN protocols • a suite of protocols that can be used to secure communications at the IP layer • ...
Technology crossword puzzle 2017-04-20
Across
- The process of copying files to another device
- Short for electronic mail, the transmission of digital messages over communications networks
- An online page that includes text and graphics
- Modern form of communication using the Internet through services
- A personal online journal or forum
Down
- A camera usually built into the computer
- Any type of game played through the Internet, over a computer network, or on a video game console
7 Clues: A personal online journal or forum • A camera usually built into the computer • The process of copying files to another device • An online page that includes text and graphics • Modern form of communication using the Internet through services • Short for electronic mail, the transmission of digital messages over communications networks • ...
Preston t4 w4 crossword puzzle 😁 2023-10-25
Across
- act in such a way as to have an effect on each other.
- travelling between cities
- travelling between cities.
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- coming between two things in time, place, character, etc.
- stop the continuous progress of (an activity or process).
- relating to, moving, or situated between two or more galaxies.
- act in such a way as to have an effect on each other.
8 Clues: travelling between cities • travelling between cities. • act in such a way as to have an effect on each other. • act in such a way as to have an effect on each other. • coming between two things in time, place, character, etc. • stop the continuous progress of (an activity or process). • relating to, moving, or situated between two or more galaxies. • ...
Networking Vocabulary 2023-02-27
Across
- A _ passes information between networks.
- The _ connects devices in a network to each other.
- A _ is a computer that provides information to other computers in a network.
Down
- A unique set of numbers assigned to each Internet or network device
- A _ is a group of connections.
- Data sent over a network that is broken into smaller pieces
- A _ allows other Wi-Fi devices to connect to a wired network.
7 Clues: A _ is a group of connections. • A _ passes information between networks. • The _ connects devices in a network to each other. • Data sent over a network that is broken into smaller pieces • A _ allows other Wi-Fi devices to connect to a wired network. • A unique set of numbers assigned to each Internet or network device • ...
Network quiz 2023-02-02
Across
- a worldwide network full of computer networks.
- address a series of numbers that identifies any devise from a network.
- a devise that sends data packets to an appropriate computer network.
Down
- network a network that doesn't need wires which connects automatically.
- a rule for devices to communicate on a network
- a message that is sent from one computer user to another via network.
- an activity region or network.
7 Clues: an activity region or network. • a rule for devices to communicate on a network • a worldwide network full of computer networks. • a devise that sends data packets to an appropriate computer network. • a message that is sent from one computer user to another via network. • address a series of numbers that identifies any devise from a network. • ...
Art of the Americas Escape Room 2025-02-06
Across
- Art produced in the Spanish viceroyalties paralleled ____ art practices.
- Both Protestants and ____ colonized the Americas.
- Art produced in the Spanish viceroyalties showed a ____ of European and indiengous ideas, forms, and materials
Down
- The Age of ____ resulted in global commercial and cultural networks.
- Persecution, genocide, and ____ have shaped current identity and artistic expression.
- Spanish chronicles by invades, ____, and colonists provide information.
- The majority of artworks were not ____ extracted.
7 Clues: Both Protestants and ____ colonized the Americas. • The majority of artworks were not ____ extracted. • The Age of ____ resulted in global commercial and cultural networks. • Spanish chronicles by invades, ____, and colonists provide information. • Art produced in the Spanish viceroyalties paralleled ____ art practices. • ...
Chapter 1 Lesson 3 Vocabulary 2025-12-04
Across
- a system for making rules and decisions
- system in which a group makes, shares, and uses goods
- networks systems or trade routes that connect different areas
Down
- a group who's members share the same goals
- a single decision-making body that could be made up of a single leader or a group of leaders
- trade good or raw material
- a group who's members share the same goal
7 Clues: trade good or raw material • a system for making rules and decisions • a group who's members share the same goal • a group who's members share the same goals • system in which a group makes, shares, and uses goods • networks systems or trade routes that connect different areas • ...
Communication Technologies 2023-11-03
Across
- A type of infrastructure commonly used in rural locations
- A computer that is not connected to another device
- An area which has not mobile transmitter and no signal
- The hardware and network services needed to connect to a network
- An area of land that has very few houses, buildings and people living there
Down
- Allows you to connect devices from a smartphone
- This is the word used for "connecting to a hotspot"
- Temporary networks with two or more computing devices connected together
- Two or more digital devices connected to each other
9 Clues: Allows you to connect devices from a smartphone • A computer that is not connected to another device • This is the word used for "connecting to a hotspot" • Two or more digital devices connected to each other • An area which has not mobile transmitter and no signal • A type of infrastructure commonly used in rural locations • ...
OBLIGATIONS 2020-11-01
Across
- To make the kitchen free from dirt.
- To make something look more attractive by putting things on it.
- Have a conversation with journalists
- To do physical activity to stay healthy or become stronger.
- To place video on social networks such as Facebook, Youtube, Instagram, etc
Down
- To visit hospitals, or coach young children.
- To tell the public about a product or service in order to encourage people to buy or to use it.
- Eat fruit,vegetables,meat,legumes,diary products, etc.
- To examine food to see if it is in good conditions.
9 Clues: To make the kitchen free from dirt. • Have a conversation with journalists • To visit hospitals, or coach young children. • To examine food to see if it is in good conditions. • Eat fruit,vegetables,meat,legumes,diary products, etc. • To do physical activity to stay healthy or become stronger. • To make something look more attractive by putting things on it. • ...
The Internet 2025-02-24
Across
- A hypertext document on the world wide web
- Two or more computers linked together
- A wireless technology used to connect electronic devices
- A networking device that forwards data packets between computer networks
Down
- a software program that helps people find the information they are looking for online using keywords or phrases.
- A vast network that connects computers over the world
- The standard way to connect computers on a network over a wired connection
- A series of numbers that identifies any device on a network
- Application software for accessing the world wide web
9 Clues: Two or more computers linked together • A hypertext document on the world wide web • A vast network that connects computers over the world • Application software for accessing the world wide web • A wireless technology used to connect electronic devices • A series of numbers that identifies any device on a network • ...
Technology 2024-10-14
Across
- - A method of sending digital messages over the internet.
- - A wireless technology for exchanging data over short distances.
- - A mobile phone that performs many functions of a computer.
- - To transfer data from the internet to a local device.
- - Programs and applications that run on a computer.
Down
- - A device used for typing on a computer or mobile device.
- - A portable touchscreen device, larger than a smartphone.
- - A device that forwards data packets between computer networks.
- - A wireless network technology that allows devices to communicate without direct cable connections.
9 Clues: - Programs and applications that run on a computer. • - To transfer data from the internet to a local device. • - A method of sending digital messages over the internet. • - A device used for typing on a computer or mobile device. • - A portable touchscreen device, larger than a smartphone. • - A mobile phone that performs many functions of a computer. • ...
Networking Basics 2024-11-04
Across
- An internet service that translates domain names into IP addresses. Because domain names are alphabetical, they are easier to remember. The internet, however, is really based on IP addresses. Every time you use a domain name, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate into 198.105.232.4.
- One group of the 3-digit characters in an IP address. In the example above, 172 is the first octet, and 10 is the fourth octet.
- A network that connects LANs. The biggest ___ in existence is the internet.
- A _______ is a group or system of interconnected devices that can communicate with each other
- The most widely used LAN architecture & technology that supports data transfers using layer 1 & 2 of the OSI networking Model using a packet and frame transmission model. _______ allows for data transfers that are always under development for faster speeds. Currently, 1 Gigabit or 1 billion bits per second and 10 GbE (10 Gigabit Ethernet) are the maximum transmission speeds.
- A basic network device that connects multiple network nodes such as computers & printers together. A network ___ has no intelligence and has been replaced by network switches.
- A system designed to prevent unauthorized access to or from a private network. _______ can be implemented in both hardware and software, or a combination of both.
- A protocol for assigning dynamic IP addresses on a network. Example: When you plug into the network, the host assigns you an available IP address.
Down
- A network that is constructed by using public wires (the internet) to connect nodes. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
- A computer network that spans a small area, usually a building or company. Most LANs connect PCs and printers. Each node (PC) has its own CPU which executes programs but is able to access data & devices anywhere on the LAN. Most types of LANs are Ethernet.
- A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs, or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect. The IP address of the router is referred to as the “Default Gateway”. The Router is the endpoint of the VPN that connects the dealership to the Dealertrack DMS Servers.
- A device that joins segments of a LAN that uses packet switching to receive, process and forward data to the destination device. There are two versions, unmanaged and managed. Managed provides the ability to have more control over directing the packets of data. Unmanaged only connects LAN devices.
- A piece of a message transmitted over a ______-switching network. It contains the destination address, in addition to the data.
- Directs traffic from the local network to the cable or DSL modem, which sends it to the internet service provider (ISP).
- creates a secure connection between two devices or applications on a network. It establishes trust and authenticates the other party before sharing data or credentials.
- A company that provides access to the internet for a monthly fee.
16 Clues: A company that provides access to the internet for a monthly fee. • A network that connects LANs. The biggest ___ in existence is the internet. • A _______ is a group or system of interconnected devices that can communicate with each other • ...
Inter Root 2014-04-30
Across
- A game or contest between teams representing different countries in a sport
- Global system of interconnected computer networks
- Insert words between the lines of a document or other text
- An act of a defensive football player catching a forward pass
Down
- a piece of music played between other pieces or between the verses
- Connect with each other
- Coming between two things in time, place, order, character, etc
7 Clues: Connect with each other • Global system of interconnected computer networks • Insert words between the lines of a document or other text • An act of a defensive football player catching a forward pass • Coming between two things in time, place, order, character, etc • a piece of music played between other pieces or between the verses • ...
Tech Talk: Artificial Intelligence Puzzle 2025-05-13
Across
- A type of robot that performs repetitive tasks automatically
- LEARNING_Learning that uses neural networks to mimic the human brain
- A type of neural network used to process visual data
- A common real-world AI assistant that responds to voice commands
- Understanding and generating human language
Down
- One type of Machine Learning where data has labels
- A popular AI tool that generates text, stories, or answers questions
7 Clues: Understanding and generating human language • One type of Machine Learning where data has labels • A type of neural network used to process visual data • A type of robot that performs repetitive tasks automatically • A common real-world AI assistant that responds to voice commands • LEARNING_Learning that uses neural networks to mimic the human brain • ...
IAthon 2025-01-24
Across
- A process of finding the best parameters for a model
- A mathematical function used in training neural networks to adjust weights
- A type of neural network that learns from labeled data
Down
- The process of splitting data into training and testing sets
- A technique for evaluating model performance
- A form of supervised learning where output labels are continuous
- This algorithm is often used for classification tasks
7 Clues: A technique for evaluating model performance • A process of finding the best parameters for a model • This algorithm is often used for classification tasks • A type of neural network that learns from labeled data • The process of splitting data into training and testing sets • A form of supervised learning where output labels are continuous • ...
NAB Cyber Month 2025 Wrap 2025-10-27
Across
- This tactic aims to rush you into making decisions without proper thinking time?
- Action you take when receiving a suspicious message
- How soon should you report anything suspicious
Down
- Social engineering technique to obtain confidential information
- Security trust concept built on the stance - never trust/always verify
- Wall that would hurt to run through but protects networks from outside attacks
- Security feature requires multiple forms of authentication
7 Clues: How soon should you report anything suspicious • Action you take when receiving a suspicious message • Security feature requires multiple forms of authentication • Social engineering technique to obtain confidential information • Security trust concept built on the stance - never trust/always verify • ...
Nervous System 2023-03-27
Across
- posturing that affects the brain stem
- commonly called a stroke
- disorder where nerves cannot conduct impulses to and from the brain
- hematoma that is commonly shaped like a lemon when observing the brain on a CT scan
- posturing that affects the midbrain
- newer acronym used to assess stroke patients
- old acronym used to assess stroke patients
- autoimmune disorder in which antibodies destroy neuromuscular connections
- hematoma that occurs between the skull and dura mater
Down
- hematoma that is commonly shaped like a banana when observing the brain on a CT scan
- caused by excessive electrical activity within networks of neurons in the brain
- blood vessel ruptures and causes brain bleeding
- slight brain injury
- blood clot in brain that cuts off oxygen supply
- progressive degeneration of nerve cells in spinal cord and brain
- loss of cognitive functioning such as thinking, remembering, and reasoning
- disease that is a form of dementia
- nervous tissue destruction occurs and does not regenerate
- swelling from the inflammatory response
- hematoma that occurs between the brain and dura mater
20 Clues: slight brain injury • commonly called a stroke • disease that is a form of dementia • posturing that affects the midbrain • posturing that affects the brain stem • swelling from the inflammatory response • old acronym used to assess stroke patients • newer acronym used to assess stroke patients • blood vessel ruptures and causes brain bleeding • ...
crosswords 3FL 2022-02-21
Across
- Es ist ein Gerät. mit dem man Dreck aufsaugen kann.
- Darin kann man backen.
- Darin kühlt man Lebensmittel.
- Who invaded Britain in 55 and 54 BC?
- In cosa consisteva il fatto che Socrate aiutava gli intelletti a partorire il loro punto di vista
- Qual è la capacità di mantenere una posizione eretta, in equilibrio con quella dei compagni?
- Darin kann man Teller waschen
- Come venivano chiamate le figure collettive nell’acrosport?
Down
- Es ist ein Gerät, mit dem man Wäsche waschen kann.
- It’s a social network whose logo is blue and white.
- Per parmenide l’essere oltre ad essere vero è?
- In che modo l’asse longitudinale attraversa il corpo?
- Smiley faces used on social networks.
- Verso quale regno erano dirette le crociate?
- What did the Celts practise?
- Per quanti secondi bisogna tenere la posa a fine coreografia? (in lettere)
- It’s the capital of the United Kingdom.
- Qual è la capacità di mantenere o recuperare una posizione al suolo o direttamente sul corpo del compagno?
18 Clues: Darin kann man backen. • What did the Celts practise? • Darin kühlt man Lebensmittel. • Darin kann man Teller waschen • Who invaded Britain in 55 and 54 BC? • Smiley faces used on social networks. • It’s the capital of the United Kingdom. • Verso quale regno erano dirette le crociate? • Per parmenide l’essere oltre ad essere vero è? • ...
Vocabulary revision 1 2024-10-30
Across
- a small device or tool that has a specific use
- money given to a student to help pay for their education
- the act of leaving to start a journey
- having strong feelings or enthusiasm for something you love
- information that is stored in computers
- the protection of computers and networks from being attacked
Down
- the money you pay for education at a college or university
- to revise one day before an exam
- the flight that takes place within your country
- free time used for relaxation
- the place you are travelling to
- to complete studies at a school, college, or university
- a person who does something for fun; not a professional
- a talk given by a professor to a group of students about a subject
- a place where people go for vacations and fun, for example, for skiing
- to love something or someone very much
- a person who uses computers to find or change information, without permission
- strong and lasting a long time without breaking
18 Clues: free time used for relaxation • the place you are travelling to • to revise one day before an exam • the act of leaving to start a journey • to love something or someone very much • information that is stored in computers • a small device or tool that has a specific use • the flight that takes place within your country • strong and lasting a long time without breaking • ...
NETWORKING CONCEPTS AND CYBER ETHICS . 2025-05-28
Across
- ________ spam filtering / blocking software .
- ___________ refers to criminal activities .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A computer ___________ can be as a group of computers .
- _____________ refers to an illegal intrusion into a computer system or network .
- A network maintained without using wires is called a ___________ network .
- A digital footprint is also known as .
- What is the short form of Local Area Network ?
Down
- _________ topology is connected in circular path .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- What is the short form of Information and communication technology ?
- _____ is a network created for an individual person .
- A ________ is a device that connects two different types of networks with each other .
- A __________ similar to a hub .
- To _________ plagiarism , one can rephrase the material .
- Each computer in a network is called a .
- ______ refers to unwanted bulk email .
18 Clues: A __________ similar to a hub . • A digital footprint is also known as . • ______ refers to unwanted bulk email . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
Happy 25th birthday, Larissa! 2025-07-26
Across
- a mysterious illness circulating in munger that masquerades as covid
- the number of years we have known each other (crazy!)
- a satellite company, a type of soap, and a path with only one correct direction
- all _____s look the same to me
- the percentage of times that saketh has beaten larissa at apple watch fitness competitions
- a scientific genius and a film unsuitable for children like saketh
- a connoisseur of short stories
- a world famous hairdresser who had a high-profile fall from grace after a delayed but stinging rebuke from a former client
- donald trump's former wife and a sociologist who networks with lawyers
Down
- iconic crossword answer that sounds funny
- you have to hinge saketh, HINGE
- iconic crossword answer
- larissa's biggest character flaw
- a thicket of greenery and an obsession with punctuation
- larissa's murder weapon
- our only mutual friend from illinois
- taking a seat for serious business and a suboptimal way to begin a race
- larissa's former alter ego
18 Clues: iconic crossword answer • larissa's murder weapon • larissa's former alter ego • all _____s look the same to me • a connoisseur of short stories • you have to hinge saketh, HINGE • larissa's biggest character flaw • our only mutual friend from illinois • iconic crossword answer that sounds funny • the number of years we have known each other (crazy!) • ...
Name the Scientists 2021-04-25
5 Clues: developed the ALOHAnet • wrote the “Man-Computer Symbiosis” paper • wrote CPYNET to transfer files through the ARPANET • published the first book on computer networks in 1964 • was responsible for the design and development of the NSFnet Program
Cisco 2014-01-29
5 Clues: Composure, Calmness • Model of excellence or perfection • Transmission capacity of a communication channel. • Routers operate in which layer of OSI reference model. • What is a service that connects two or more networks within a city called ____________ area network
qweqwe 2022-02-21
5 Clues: What did the Celts practise? • Smiley faces used on social networks. • It’s the capital of the United Kingdom. • Caesar Who invaded Britain in 55 and 54 BC? • It’s a social network whose logo is blue and white.
Technology CW 2023-06-07
Across
- a proprietary audio/video interface for transmitting uncompressed video data
- the protection of computer systems and networks
- a method of transmitting and receiving messages using electronic devices.
- a file format developed by Adobe in 1992 to present documents
- a hardware or software component that stores data
- data using a two-symbol system.
- a file format developed by Adobe in 1992 to present documents
- a coding format for digital audio
- a mapping from some domain (for example, a range of integers)
- a humanoid robot or synthetic organism designed to imitate a human
Down
- blocks of data created by a web server
- a file format developed by Adobe in 1992 to present documents
- a bitmap image format that was developed by a team at the online services provider
- a collection of discrete values that convey information
- the most important processor in a given computer.
- a commonly used method of lossy compression for digital images
- an American multinational technology company
- a digital multimedia container format most commonly used to store video and audio
- a method of representing data
- any software intentionally designed to cause disruption to a computer
20 Clues: a method of representing data • data using a two-symbol system. • a coding format for digital audio • blocks of data created by a web server • an American multinational technology company • the protection of computer systems and networks • the most important processor in a given computer. • a hardware or software component that stores data • ...
cross 2023-09-07
Across
- central processing unit
- theft - user manipulate online platforms to gain access or personal information to intimate a character
- - an area in which a computer system and networks are used
- a copy of the file/software
- a text encryption
- - software used as an intent to destroy, disrupt or gander unauthorized access to a computer.
- - a malware used to deny organization access to a file system.
- the application that provides service for the user and client
- - a group of private computers used to infect malicious software.
Down
- getting email or text identifying they have your password
- process of safeguarding digital information through entire life cycle
- the process or action verifying the identification
- unwanted software used to deliver targeted advertisements
- attack an attempt to gain unauthorized access to a computer
- A part of a computer system to block unauthorized data
- - bypassing an organization's existing security systems.
- engineering - manipulation used to gain access to an unauthorized computer system.
- protection from data theft
18 Clues: a text encryption • central processing unit • protection from data theft • a copy of the file/software • the process or action verifying the identification • A part of a computer system to block unauthorized data • - bypassing an organization's existing security systems. • getting email or text identifying they have your password • ...
Peter Jennings Career 2024-01-12
Across
- What member of Peter's family was in broadcasting?
- What American news organization gave Peter a shot anchor?
- Peter never completed _________ school.
- Peter traveled the world as a World ___________.
- Peter was fascinated by American ____________.
- Peter died in 2005 of _______ cancer.
- Peter began his _____________ career at age 9.
- Peter had a mixture of insecurity and _______ that kept him grounded.
Down
- Peter began as a news _______ on ABC.
- Peter is attributed with taking on Big _______ and winning.
- What year was Peter born (spell out the last digit)?
- Peter saved lives in this area of the world by exposing that American dollars were helping those committing killings.
- Peter was fascinated by ____________.
- Peter wanted to cover the stories the other networks wouldn't run.
- Peter became an ___________ after the 9/11 attacks.
- Where was Peter Jennings from?
- Peter most loved going the ________ East and covering stories there.
- Peter served as Senior __________ of World News Tonight with Peter Jennings as well as anchor.
18 Clues: Where was Peter Jennings from? • Peter began as a news _______ on ABC. • Peter was fascinated by ____________. • Peter died in 2005 of _______ cancer. • Peter never completed _________ school. • Peter was fascinated by American ____________. • Peter began his _____________ career at age 9. • Peter traveled the world as a World ___________. • ...
IT Xword 2016-12-09
It collocations 2023-07-11
Health Triangle 6th Grade 2020-08-25
Across
- Social health often involves _____ of friends and family members who support us and care for us during the hard times.
- One of the best ways to make friends is to show interest in the other person.
- Volunteering will also help you connect to new people in your _____.
- Take good _____ of your skin.
- The triangle's three sides each represent a side of your overall health:_____, mental and social.
- Initiate _____.
- How many sides does a triangle have?
- A full night's _____ can have several physical benefits.
Down
- Practice deep breathing.
- Experts recommend getting 30 _____ of moderate to intense exercise four to five times a week.
- Brush your teeth in the morning and evening for 2 minutes each time.
- Just like you would check in with a _____, a mental health checkup can really help if you're feeling mental distress.
- Make time for activities that you enjoy.
- Take good care of your _____ and mental health.
- Bathe regularly and _____ your hands.
- Stay _____.
- _____ unhealthy foods.
- Eat a _____ diet.
18 Clues: Stay _____. • Initiate _____. • Eat a _____ diet. • _____ unhealthy foods. • Practice deep breathing. • Take good _____ of your skin. • How many sides does a triangle have? • Bathe regularly and _____ your hands. • Make time for activities that you enjoy. • Take good care of your _____ and mental health. • A full night's _____ can have several physical benefits. • ...
Techie Buzzwords 2017-09-21
Across
- a way of counting using the numbers 0 and 1
- millions of computers around the world connected by a network of networks
- Tiny picture on the screen
- Extra copy of a document or program
- the parts of a computer system that you can touch
- website address
- device that connects a computer to a network via a phone line
- 8 bits
Down
- programs that run on a computer
- Get a file from another computer, across a network
- communicate with someone on another computer by typing rather than talking
- also known as a processor, most important part of a computer
- software program that you use to explore the Web
- part of the Internet 'You can find it on the ____'
- tiny dot of light on the screen
- temporary storage on chips
- a kind of memory that holds files and programs only while in use
- Tiny unit of information storage consisting of an on/off signal
18 Clues: 8 bits • website address • Tiny picture on the screen • temporary storage on chips • programs that run on a computer • tiny dot of light on the screen • Extra copy of a document or program • a way of counting using the numbers 0 and 1 • software program that you use to explore the Web • the parts of a computer system that you can touch • ...
Web Design 2023-06-08
Across
- A type of picture file that can be used in web design
- The language web sites are coded in
- Professional level software used to develop and design websites
- What the first page of a website must be named
- Something you click to take you to another page
- Computer software used to navigate websites
- Controls an element's behavior
- A type of website that acts more like a journal entry
- The top portion of a website; where links are
Down
- To search around a website or internet
- All associated files for a website must be stored in the same one
- The name of a website's address
- A global system of computer networks
- A sketch or design of a website to help lay out the look of it
- Otherwise known as Cascading Style Sheets
- The first three letters of a website address
- Type of code that is added to a line of code
- Element used to define a line of code
18 Clues: Controls an element's behavior • The name of a website's address • The language web sites are coded in • A global system of computer networks • Element used to define a line of code • To search around a website or internet • Otherwise known as Cascading Style Sheets • Computer software used to navigate websites • The first three letters of a website address • ...
Organelles Structures- Grace T. 2022-09-23
Across
- divided into basal body, hook, and filament
- membrane bound organelle that contain hrydolytic enzymes
- Long, flattened, sac-like, unbranched tubules, aligned parallel with no ribosomes attached
- multiple compacted DNA copies with the addition of RNA and few proteins
- "oblate spheroid structure" two unequal subunits
- appears as flattened tubes with a membrane outside of the nucleus
- spherical membrane bound organelle that comprises genetic information
Down
- granular fluid between nuclear and plasma membrane
- are specialized peroxisomes
- many networks of filaments and tubules that spread through the cytoplasm excluding the nucleus
- membrane bound organelle and the most capcious compartment of cells
- long, flattened, sac-like, unbranched tubules, aligned parallel, ribosomes attached
- can be spherical ovoid or discoid are typically cup shaped or spiraled
- single membrane bound vesicles
- bound by double membrane folds of the inner membrane extend to the matrix
- made up of microtubules coated by a plasmamembrane
- formed of cellulose to give rigidity
- short hair like structure on the surface of cells
18 Clues: are specialized peroxisomes • single membrane bound vesicles • formed of cellulose to give rigidity • divided into basal body, hook, and filament • "oblate spheroid structure" two unequal subunits • short hair like structure on the surface of cells • granular fluid between nuclear and plasma membrane • made up of microtubules coated by a plasmamembrane • ...
NETWORKING CONCEPT AND CYBER ETHICS 2025-05-28
Across
- _________ topology is connected in circular path .
- ______ refers to unwanted bulk email .
- A digital footprint is also known as .
- Each computer in a network is called a .
- ________ spam filtering / blocking software .
- A _____ is a network device that is used to connect all the computers in a network with each other .
- Hacking , which is done for a good ~cause , such as national security , is known as .
- A computer ___________ can be as a group of computers .
Down
- ___________ refers to criminal activities .
- _____________ refers to an illegal intrusion into a computer system or network .
- Use ____________ marks around the quoted words of another person to avoid plagiarism .
- A network maintained without using wires is called a ___________ network .
- What is the short form of Local Area Network ?
- A ________ is a device that connects two different types of networks with each other .
- To _________ plagiarism , one can rephrase the material .
- A __________ similar to a hub .
- _____ is a network created for an individual person .
- What is the short form of Information and communication technology ?
18 Clues: A __________ similar to a hub . • ______ refers to unwanted bulk email . • A digital footprint is also known as . • Each computer in a network is called a . • ___________ refers to criminal activities . • ________ spam filtering / blocking software . • What is the short form of Local Area Network ? • _________ topology is connected in circular path . • ...
How the internet works 2023-02-21
Across
- A set of rules
- A type of cable used to connect countries under the sea
- A fast, powerful computer that stores websites or data
- A hardware device that joins two networks together
- An app used to access the internet like Safari or Google Chrome
- The protocol responsible for sending data across a network
- A very fast cable used to send data as pulses of light over long distances
Down
- The protocol responsible for breaking data into packets
- Two or more computers connected together
- A small unit of data used to send pieces of data across the internet
- A worldwide network of computers
- A slow and unreliable way of sending data through the air over very short distances
- A slow but reliable cable used to send data over short distances
- Unique address for every device connected to the internet
14 Clues: A set of rules • A worldwide network of computers • Two or more computers connected together • A hardware device that joins two networks together • A fast, powerful computer that stores websites or data • The protocol responsible for breaking data into packets • A type of cable used to connect countries under the sea • ...
Internet 2023-03-07
Across
- the connection point in a computer device where data is sent out in many directions
- a type of transmission data that you can move around with
- can transmit data either with wires or wirelessly
- a type of transmission data that has faster transmission speeds
- has a number of devices connected to it
- directs traffic around within a LAN
- a server that allows clients to stream music and video
Down
- is the transmission of a file from one computer system to another
- a type of server that handles web based email
- it stores and maintains web content
- fastest part of the internet and connects powerful servers together using high speed
- a worldwide collection of computer networks
- a wireless networking technology that uses radio waves to provide high speed internet access
13 Clues: it stores and maintains web content • directs traffic around within a LAN • has a number of devices connected to it • a worldwide collection of computer networks • a type of server that handles web based email • can transmit data either with wires or wirelessly • a server that allows clients to stream music and video • ...
Cyber Grid Crossword Puzzle 2025-03-03
Across
- A system of networks that allows the transfer of data packets
- A popular cloud computing service provided by Microsoft
- A global tech company known for its search engine
- The process of improving a computer's performance by upgrading hardware
- A personal assistant software developed by Apple
- A type of online attack where the attacker floods a system with traffic
- A technology used for displaying virtual objects in real-world environments
- The central processing unit of a computer
Down
- A method for securing a network by monitoring and controlling incoming traffic
- A technology used for wireless communication between devices over short distances
- The protocol used for secure communication over the internet
- A digital currency system that operates independently of a central bank
- A way to store data in the cloud
13 Clues: A way to store data in the cloud • The central processing unit of a computer • A personal assistant software developed by Apple • A global tech company known for its search engine • A popular cloud computing service provided by Microsoft • The protocol used for secure communication over the internet • A system of networks that allows the transfer of data packets • ...
CYBERCRIME 2021-07-13
Across
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- it is one computer is used to reprogram another for illicit purposes.
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- terrorist activity that targets computer networks and information systems for attack.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- the act of copying digital material posted online into the storage medium on one’s computer.
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- a program is secretly attached to the company’s computer system.
- an act emending certain provisions of republic act no. 8293
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- the right to be left alone freedom from observation and interference from others.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Down
- the interactional space or environment created by linking computers together into a communication network.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- unauthorized access to the entire or any part of a computer system.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- political activism and social protest that uses hacking tools and techniques.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- these can be used to store copies of files from the computer for use in his investigation.
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- the most sensitive component as prevention from cybercrime.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- most computer programs used in business have built-in anti-theft safeguards.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- market economic activity undertaken via the internet or similar electronic communication networks.
- an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
50 Clues: the most sensitive component as prevention from cybercrime. • an act emending certain provisions of republic act no. 8293 • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
CYBERCRIME 2021-07-13
Across
- any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
- it is one computer is used to reprogram another for illicit purposes.
- pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
- the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
- group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
- the act of copying digital material posted online into the storage medium on one’s computer.
- the most sensitive component as prevention from cybercrime.
- these can be used to store copies of files from the computer for use in his investigation.
- an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
- a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
- the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
- repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
- market economic activity undertaken via the internet or similar electronic communication networks.
- any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
- it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
- it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- the right to be left alone freedom from observation and interference from others.
- it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
- the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
- it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
- criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
- an illegally obtains data from a computer system by leaking it out in small amounts.
- the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
- unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
- unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
- an act emending certain provisions of republic act no. 8293
Down
- unauthorized access to the entire or any part of a computer system.
- a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
- sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
- most computer programs used in business have built-in anti-theft safeguards.
- It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
- an investment scheme in which investors are promised abnormally high profits on their investments.
- an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
- a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
- it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
- an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
- a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- a program is secretly attached to the company’s computer system.
- the interactional space or environment created by linking computers together into a communication network.
- terrorist activity that targets computer networks and information systems for attack.
- an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
- it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
- A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
- an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
- an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
- stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
- an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
- political activism and social protest that uses hacking tools and techniques.
50 Clues: the most sensitive component as prevention from cybercrime. • an act emending certain provisions of republic act no. 8293 • a program is secretly attached to the company’s computer system. • unauthorized access to the entire or any part of a computer system. • it is one computer is used to reprogram another for illicit purposes. • ...
Computer hardware parts. 2022-10-16
Across
- a device that allows electronics to connect to the internet.
- a wireless that allows other wireless devices to connect to a network.
- multiple connected devices within a specific location.
- a computer network that spans a wide geographic area.
- a hardware device that directs traffic between other networks.
- barrier that only allows trusted data through the internet.
- multiple devices that connect with one another.
- a conventional or stylized representation of a star, typically one having five or more points.
Down
- a series of Wi-Fi routers that work together to create a single wireless network.
- A device that connects other network devices in one network.
- a component that provides network capabilities for a computer.
- a computer system that host websites.
12 Clues: a computer system that host websites. • multiple devices that connect with one another. • a computer network that spans a wide geographic area. • multiple connected devices within a specific location. • barrier that only allows trusted data through the internet. • a device that allows electronics to connect to the internet. • ...
IT VOCABULARY 2020-05-30
Across
- Kind of computer you can take everywhere you go.
- They are small pictures found on a toolbar.
- Copy and ... .
- It is a device used to display the output of a computer to the user.
- It is used to connect to the Internet.
- Information is stored in a computer's ... .
- Device used to type messages.
Down
- It is a machine for printing text or pictures onto paper, especially one linked to a computer.
- A familiar or humorous name given to a person or thing instead of or as well as the real name.
- The term given to all music, videos, and other forms of data.
- An electronic communications network that connects computer networks and organizational computer facilities around the world.
- It refers to a software defect.
12 Clues: Copy and ... . • Device used to type messages. • It refers to a software defect. • It is used to connect to the Internet. • They are small pictures found on a toolbar. • Information is stored in a computer's ... . • Kind of computer you can take everywhere you go. • The term given to all music, videos, and other forms of data. • ...
crossword 2021-08-31
Across
- a musical work that has been created
- millions of computer networks that communicate together
- a person who trains for and competes in sport
- to give someone something as reward for high achievement
- an aggregation of data on storage device, identified by name
- with out musical accompaniment
Down
- the leader of a team
- a game or event in wich people complete to win
- the basic rhythmic unit in a piece of music
- the process of transfering software/information from a server to a computer (the opposite is upload)
- a collection of datta arranged for ease speed of search and retrieval. also called data bank
- the traditionaland typically anonymous music that is an expression of the life of people in a community
12 Clues: the leader of a team • with out musical accompaniment • a musical work that has been created • the basic rhythmic unit in a piece of music • a person who trains for and competes in sport • a game or event in wich people complete to win • millions of computer networks that communicate together • to give someone something as reward for high achievement • ...
Urban Profiles 2013-11-17
Across
- The worlds most populated city
- A part of a city, especially a slum area, occupied by a minority group or groups
- The process whereby rural areas (countryside) are becoming urban
- The revolution in which Britain became urbanised
- A city widely recognised as a centre of economic and political power within the capitalist world economy
- A local atmospheric zone where the climate differs from the surrounding area
- What does the C stand for in RIC?
Down
- A condition on road networks that occurs as use increases
- A collective name for the most populated cities in the world
- What does the I stand for in RIC?
- The commercial and often geographic heart of a city
- What does the R stand for in RIC?
12 Clues: The worlds most populated city • What does the I stand for in RIC? • What does the R stand for in RIC? • What does the C stand for in RIC? • The revolution in which Britain became urbanised • The commercial and often geographic heart of a city • A condition on road networks that occurs as use increases • A collective name for the most populated cities in the world • ...
Monika 9a 2015-03-10
Across
- affairs Fact Sheet
- show programming genre, showing the undirected dramatic and funny situations
- global computer network, linking global and local area networks.
- newspaper special publication type
- rail-borne machine with four or more wheels, powered by an internal combustion engine or electric, used for cargo and passenger transpor
- according to certain rules of organized human activity
Down
- program on wildlife.
- news this is a news portal
- sound art, artistic composition of sounds and compositions of such acoustic performance.
- news whole of organized information and its changing relationships on the basis of what may act by a person or system
- opera television series format, which is characterized by perdėtumas, pomp, ideological actors portrayal of the world around
- newspaper this is a newspaper from which all people are reading
- audio and video (audiovisual_ work, which consists of themes linked images (called frames)
13 Clues: affairs Fact Sheet • program on wildlife. • news this is a news portal • newspaper special publication type • according to certain rules of organized human activity • newspaper this is a newspaper from which all people are reading • global computer network, linking global and local area networks. • ...
Computer science 2022-03-28
Across
- the amount of data that can be transferred from one point to another within a specific time
- flexible, transparent fiber made by drawing glass or plastic
- connect as or operate with
- the number of bit errors is the number of received bits of a data stream
- naming system used to identify computers
Down
- wireless technology used to connect other devices to the internet.
- an insulated wire or wires having a protective casing and used for transmitting electricity
- traditional technology for connecting devices in a wired local area network
- system of rules that allows two or more entities of a communications system to transmit information
- numerical label that is connected to a computer
- a time delay
- Data sent over computer networks
12 Clues: a time delay • connect as or operate with • Data sent over computer networks • naming system used to identify computers • numerical label that is connected to a computer • flexible, transparent fiber made by drawing glass or plastic • wireless technology used to connect other devices to the internet. • ...
Crypro Crossword#40 2024-03-11
Across
- Lido DAO provides ____ infrastructure for multiple blockchain networks.
- The upcoming Bitcoin Halving event is expected to happen in which month?
- The most popular online forum dedicated to Bitcoin, crypto, and blockchain technology
- Linking the market value of a crypto to an external reference
- _____ token is named after a well-known Japanese dish.
- BONK belongs to which ecosystem?
Down
- USDC is a type of ___.
- Users get free cryptos during _.
- A sequence of characters or encoded information that is used to identify when an event occurred is called a ____.
- Crypto ___ is the process in which tokens are removed from circulation, reducing the number of coins available.
- SHIB and DOGE are linked to which pet animal?
- ___ is the native token of The Graph indexing protocol.
12 Clues: USDC is a type of ___. • Users get free cryptos during _. • BONK belongs to which ecosystem? • SHIB and DOGE are linked to which pet animal? • _____ token is named after a well-known Japanese dish. • ___ is the native token of The Graph indexing protocol. • Linking the market value of a crypto to an external reference • ...
TPSIT Crossword for 5DI 2024-11-25
Across
- When communication is misinterpreted.
- Something that connects two or more hosts.
- A set of rules for formatting and processing data used in networks.
- The information that a host, referred to as «sender», relays to a «receiver» host.
- What two hosts do when they're connected to each other.
Down
- What happens when something doesn't go as planned.
- What is needed to make a program work.
- Standing out from the masses by being ourselves.
- Either a computer or several computers interconnected to each other.
- A set of various hosts that are connected to and share resources to each other.
- When two or more hosts stop communicating with each other.
- A link between two or more hosts that allows them to communicate with each other.
12 Clues: When communication is misinterpreted. • What is needed to make a program work. • Something that connects two or more hosts. • Standing out from the masses by being ourselves. • What happens when something doesn't go as planned. • What two hosts do when they're connected to each other. • When two or more hosts stop communicating with each other. • ...
Prefix - "inter-" 2022-01-09
Across
- to break in "between" the words of a speaker
- a system of multiple computer networks with links "between" on another
- to meddle and force oneself "between" others' concerns
- occurring in the middle
- shared experience "between" multiple cultures
- to replace one thing with another and fit it "between" other parts
- happening at intervals, with pauses sent "between" occurrences or outbreaks
- to take something from "between" a send and recipient
Down
- a scheduled pause "between" parts of a performance
- to come or occur "between" two things or time periods
- a meeting "between" two or more people who discuss matters of interest
- to twist or twine two or more strands "between" one another
- occurring "between, among" different states
- to engage in activity "between, among" others
- to cross or cut "between" a line, road, or path
- to explain or translate something "between" two or more parties
- occurring "between" two or more nations
- music performed "between" the parts of a play
18 Clues: occurring in the middle • occurring "between" two or more nations • occurring "between, among" different states • to break in "between" the words of a speaker • to engage in activity "between, among" others • shared experience "between" multiple cultures • music performed "between" the parts of a play • to cross or cut "between" a line, road, or path • ...
crosswords 3FL 2022-02-21
Across
- It’s a social network whose logo is blue and white.
- Darin kühlt man Lebensmittel.
- Verso quale regno erano dirette le crociate?
- Darin kann man Teller waschen
- Who invaded Britain in 55 and 54 BC?
- In che modo l’asse longitudinale attraversa il corpo?
- Per parmenide l’essere oltre ad essere vero è?
- In cosa consisteva il fatto che Socrate aiutava gli intelletti a partorire il loro punto di vista
- Smiley faces used on social networks.
Down
- Es ist ein Gerät, mit dem man Wäsche waschen kann.
- Darin kann man backen.
- Es ist ein Gerät. mit dem man Dreck aufsaugen kann.
- Per quanti secondi bisogna tenere la posa a fine coreografia? (in lettere)
- What did the Celts practise?
- Qual è la capacità di mantenere una posizione eretta, in equilibrio con quella dei compagni?
- Qual è la capacità di mantenere o recuperare una posizione al suolo o direttamente sul corpo del compagno?
- Come venivano chiamate le figure collettive nell’acrosport?
- It’s the capital of the United Kingdom.
18 Clues: Darin kann man backen. • What did the Celts practise? • Darin kühlt man Lebensmittel. • Darin kann man Teller waschen • Who invaded Britain in 55 and 54 BC? • Smiley faces used on social networks. • It’s the capital of the United Kingdom. • Verso quale regno erano dirette le crociate? • Per parmenide l’essere oltre ad essere vero è? • ...
Crimes and Criminals 2025-04-01
Across
- A person who damages property on purpose
- A place where criminals are sent as punishment
- To break the law by taking money or valuables by force
- A serious crime that involves unlawfully killing someone
- The illegal movement of goods across borders
- The crime of taking something that does not belong to you
- The crime of stealing money or valuables using deception
- An attempt to trick someone into giving personal information online.
- Someone who gains unauthorized access to computer systems
Down
- The act of stealing from a store without paying
- A person who physically or verbally hurts others repeatedly
- A trick designed to cheat someone out of money
- A person who illegally enters a building to steal something
- The act of running away to avoid being caught
- The act of sending unwanted or fake emails, often in bulk.
- A person who commits fraud
- The act of illegally accessing computer networks
- A person who breaks the law by stealing, scamming, or hacking
18 Clues: A person who commits fraud • A person who damages property on purpose • The illegal movement of goods across borders • The act of running away to avoid being caught • A place where criminals are sent as punishment • A trick designed to cheat someone out of money • The act of stealing from a store without paying • The act of illegally accessing computer networks • ...
A+ 2025-02-11
Across
- A common method for securing Wi-Fi networks.
- A software used to detect and remove malware.
- A Windows utility that displays real-time network usage.
- A Windows command used to format a disk.
- A network protocol used to automatically assign IP addresses.
- A form of authentication that uses fingerprints or facial recognition.
- A Windows component used to view system performance and logs.
- A tool for managing group policies in Windows.
- A network security system that monitors and filters incoming/outgoing traffic.
Down
- A security method that removes unnecessary user privileges.
- A security setting requiring a user to change their password after a period.
- A Linux command used to move files.
- A security setting that locks a user account after too many failed logins.
- A bootable Windows environment used for troubleshooting.
- A process that translates domain names into IP addresses.
- A Linux command used to change file permissions.
- A Windows command used to display active network connections.
- A Linux command used to list directory contents.
18 Clues: A Linux command used to move files. • A Windows command used to format a disk. • A common method for securing Wi-Fi networks. • A software used to detect and remove malware. • A tool for managing group policies in Windows. • A Linux command used to change file permissions. • A Linux command used to list directory contents. • ...
Crossword Assignment based on Next Generation Networks 2019-03-13
Across
- One basic IPTV service in which user pays only for particular show or time period
- A IPTV service in which content is produced by the end user with the intention to share it with other users
- This is an independent, not-for-profit, standardization organization in the telecommunications industry in Europe
- It is a database that maintains user profile and location information
- The acronyms showing network management tasks defined by ISO
- Next level of HbbTV
- The bottom-most layer in NGN conceptual model
- A standard protocol used by IPTV for security
Down
- An important service offered by IMS
- This is a third-generation (3G) broadband standard based n packet-based transmission
- One gateway that operate within transport plane of NGN softswitch based architecture
- This is Responsible for establishing, monitoring, supporting and releasing multimedia sessions
- One important provider for IPTV services
- One type of cellular network technique
- One important protocol used in IMS messaging
15 Clues: Next level of HbbTV • An important service offered by IMS • One type of cellular network technique • One important provider for IPTV services • One important protocol used in IMS messaging • The bottom-most layer in NGN conceptual model • A standard protocol used by IPTV for security • The acronyms showing network management tasks defined by ISO • ...
Melissa 2013-05-01
Across
- the name of a printer
- is a self-replicating program that is harmful to networks
- Events or attacks that remove, corrupt, deny access, allow access, or steal information
- is a file or program other then a virus that is potentially harmful
- is a form of social engineering
- Employees have access to data, equipment, and the network
- a color of an inject printer
Down
- Programming language that allows applets to run within a web browser
- is technically a worm
- is a software program that displays advertising on your computer
- Users outside of an organization that do not have authorized access to the network or resources
- is unsolicited e-mail
- is a program written with malicious intent and sent out by attackers
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
14 Clues: the name of a printer • is technically a worm • is unsolicited e-mail • a color of an inject printer • is a form of social engineering • is a self-replicating program that is harmful to networks • Employees have access to data, equipment, and the network • is a software program that displays advertising on your computer • ...
BITS of CISCO Fun 2025-03-20
Across
- A network device that connects devices within a single network, forwarding data to the correct destination.
- Cisco's largest office in India is located in which city?
- A traditional Mexican dish often enjoyed at fiestas.
- The use of technology to perform tasks without human intervention.
- Spanish for festival
- Spanish for Sun
- Tropical trees with large, fan-shaped leaves
Down
- Cisco's platform for online meetings, webinars, and video conferencing
- A device that directs data traffic between different networks, ensuring packets reach their destinations
- A leading global company in networking and IT solutions, known for connecting the world.
- A refreshing drink made from lemon juice, water, and sugar.
- Where is Cisco's headquaters located?
- A Latin dance style and also a flavorful dip
- A service that stores and processes your data on remote servers, accessible via the internet
14 Clues: Spanish for Sun • Spanish for festival • Where is Cisco's headquaters located? • A Latin dance style and also a flavorful dip • Tropical trees with large, fan-shaped leaves • A traditional Mexican dish often enjoyed at fiestas. • Cisco's largest office in India is located in which city? • A refreshing drink made from lemon juice, water, and sugar. • ...
Connections 2025-06-13
Across
- The main advantage of wireless connections, allowing freedom of movement.
- Stands for Personal Area Network, often created by Bluetooth.
- A key advantage of wired connections, meaning the signal is very stable.
- Connects multiple devices to a LAN without cables.
- A wired connection for a high-speed, stable LAN connection.
- A connection that uses radio waves through the air.
- A device like a printer or mouse that connects to a computer.
Down
- Another term for lag, which is lower in wired connections.
- Stands for Local Area Network.
- When a wireless signal is weakened or blocked by objects like walls.
- A connection that uses a physical cable.
- A major concern for wireless networks as signals can be intercepted.
- Connects peripheral devices like keyboards and mice to a computer.
- Used for short-range wireless connection between two devices (PAN).
14 Clues: Stands for Local Area Network. • A connection that uses a physical cable. • Connects multiple devices to a LAN without cables. • A connection that uses radio waves through the air. • Another term for lag, which is lower in wired connections. • A wired connection for a high-speed, stable LAN connection. • Stands for Personal Area Network, often created by Bluetooth. • ...
AP Comp Sci. Principles Review Game 2023-05-02
Across
- Error that results when the number of bits is not enough to hold the number
- Picture Element
- Data type that represents a finite number of ordered values, where the same value may occur more than once
- One of the most common character encoding standards
- Finding and fixing errors or bugs in the source code of any software
- Type of cipher, is one of the simplest forms of encryption
- Networking device that forwards data packets between computer networks
- A sequence of program instructions that performs a specific task
Down
- Compressing data in a way that preserves all data
- Wireless networking technology that uses radio waves
- A standard way to perform an operation
- Delay of information sent
- Boolean operator where both have to be true in order to evaluate as such
13 Clues: Picture Element • Delay of information sent • A standard way to perform an operation • Compressing data in a way that preserves all data • One of the most common character encoding standards • Wireless networking technology that uses radio waves • Type of cipher, is one of the simplest forms of encryption • ...
feb 7,2022 2022-02-07
Across
- and sends data on computer networks
- used to connect with computers with peripheral devices
- and demodulates electrical signals sent through phone lines
- computer file sent along with an email message
- that allows a computer user to find and view information on the internet
- drive-a small, portable device that plugs into the USB port on your computer
- one or more files
Down
- short-range wireless connection
- sphere of knowledge identified by a name
- main screen area that you see after you turn on your computer
- small movable shape that indicates where anything typed by the user will appear
- or more that are connected
- reserved segment of memory within a program that is used to hold the data being processed
13 Clues: one or more files • or more that are connected • short-range wireless connection • and sends data on computer networks • sphere of knowledge identified by a name • computer file sent along with an email message • used to connect with computers with peripheral devices • and demodulates electrical signals sent through phone lines • ...
feb 7,2022 2022-02-07
Across
- and sends data on computer networks
- used to connect with computers with peripheral devices
- and demodulates electrical signals sent through phone lines
- computer file sent along with an email message
- that allows a computer user to find and view information on the internet
- drive-a small, portable device that plugs into the USB port on your computer
- one or more files
Down
- short-range wireless connection
- sphere of knowledge identified by a name
- main screen area that you see after you turn on your computer
- small movable shape that indicates where anything typed by the user will appear
- or more that are connected
- reserved segment of memory within a program that is used to hold the data being processed
13 Clues: one or more files • or more that are connected • short-range wireless connection • and sends data on computer networks • sphere of knowledge identified by a name • computer file sent along with an email message • used to connect with computers with peripheral devices • and demodulates electrical signals sent through phone lines • ...
