networks Crossword Puzzles

20th and 21st century 2023-05-02

20th and 21st century crossword puzzle
Across
  1. First Mexican American women to be chosen for a high position in politics.
  2. Largest refinery in America
  3. Became one of MALDEF's first two women of the organizations board of directors
  4. exporting from other countries.
  5. the high school Greg Abbot graduated from
  6. The science of travel through air
  7. promised to focus on building roads,securing the border between Texas and Mexico.
Down
  1. Texans have been drilling holes in search of this.
  2. Clearing trees,knowing which crops grow best in the climate and soil.
  3. a way of getting from one place to another
  4. Manufacturing companies that people moved to the border of Mexico at the end of the 20th century
  5. cycle of economic positives and negatives
  6. worldwide system of computer networks
  7. USA base for telecommunications.

14 Clues: Largest refinery in Americaexporting from other countries.USA base for telecommunications.The science of travel through airworldwide system of computer networkscycle of economic positives and negativesthe high school Greg Abbot graduated froma way of getting from one place to anotherTexans have been drilling holes in search of this....

tech foundry crossword 2025-09-30

tech foundry crossword crossword puzzle
Across
  1. spreadsheets
  2. information intended to be kept secret or only shared with those that need to know.
  3. understands customer emotions
  4. offer more flexibility and allow out-of-network care
  5. a quantity of medication or drug taken or recommended to be taken at a particular time.
  6. feeling for the customer
Down
  1. cloud storage
  2. Treat others how you would like them to treat you
  3. insurance/Payer Verification site
  4. Contracted Payer List ID
  5. what is a leading pharmaceutical solutions organization centered on improving the lives of people and animals everywhere.
  6. Annual Enrollment Period
  7. provider networks and lower cost
  8. This is a term used to refer to Salesforce. Fusion used to be the name of Salesforce previously, but it’s since been bought out and now goes back Salesforce.

14 Clues: spreadsheetscloud storageContracted Payer List IDAnnual Enrollment Periodfeeling for the customerunderstands customer emotionsprovider networks and lower costinsurance/Payer Verification siteTreat others how you would like them to treat youoffer more flexibility and allow out-of-network care...

Garvins Rivers 4th periode 2016-10-27

Garvins Rivers 4th periode crossword puzzle
Across
  1. what allows you to see the stuff on the computer screen
  2. what modems use to communicate over the internet
  3. the differences in WiFi standers
  4. what does modem stand for
  5. the last step in the information processing cycle
  6. WiFi is
  7. a communication device that you can put in your pocket
  8. peripheral device that lets you hear through the computer directly
  9. the C drive is also known as
Down
  1. What is a series of instructions that tells the computer what to do called
  2. peripheral device that lets you type
  3. the A drive is also known as
  4. whats the first step in the information processing cycle
  5. what do computer networks connect
  6. what allows you to click on things on your monitor
  7. whats the third step in the information processing cycle
  8. user interface What does GUI stand for
  9. something computers use to communicate with each other
  10. whats the second step in the information processing cycle

19 Clues: WiFi iswhat does modem stand forthe A drive is also known asthe C drive is also known asthe differences in WiFi standerswhat do computer networks connectperipheral device that lets you typeuser interface What does GUI stand forwhat modems use to communicate over the internetthe last step in the information processing cycle...

Geography Knowledge Crossword 2018-04-04

Geography Knowledge Crossword crossword puzzle
Across
  1. The world that is used for country areas like farms
  2. One of Mexico City's biggest challenges is dealing with this
  3. Measures how many children each woman has (F____)
  4. A kind of pollution that is common around airports
  5. The length of expected life
  6. The acronym for Gross Domestic Product
  7. Cities develop along ________ lines and networks
  8. The country with the highest mobile phone ownership.
  9. One of Tokyo's biggest challenges is finding s____ for people
Down
  1. The word used for built-up areas like cities
  2. This ability to read and write is a major driver of well-being
  3. A kind of pollution that is produced by cities at night
  4. The condition of not being able to meet basic needs
  5. A city with more than 10,000,000 people
  6. Cities absorb heat to create H_____ I______.
  7. If countries produce less children, they need this to grow
  8. Index that measures wellbeing and environmental impact
  9. Around the world birth rates are increasing\declining?
  10. Term for "per head" or "per person"

19 Clues: The length of expected lifeTerm for "per head" or "per person"The acronym for Gross Domestic ProductA city with more than 10,000,000 peopleThe word used for built-up areas like citiesCities absorb heat to create H_____ I______.Cities develop along ________ lines and networksMeasures how many children each woman has (F____)...

Bison Hunting Unit 2 Lesson 2 Topic 3 2021-12-01

Bison Hunting Unit 2 Lesson 2 Topic 3 crossword puzzle
Across
  1. Father G.A. Belcourt went on bison hunt
  2. __________became well known throughout the North American continent because of their crops.
  3. Women dried the meat, stored the fat, and made _______
  4. hunters hunted for ___________
  5. wolf chief was born into a _________ family around 1850
  6. Hunters gathered at ___________
  7. a place in North Dakota is ______________
  8. the __________
  9. _________ were often proceeded by religious ceremonies such as the Sun Dance
Down
  1. _________hunted bison, deer, elk, and antelope
  2. trade networks carried corn north and west into the Missouri Valley and ____________
  3. ________ meant White Bison were rare or sacred
  4. a Hidatsa women named ____________
  5. _________ Lived in the woodlands east of the Great plains
  6. __________ Controlled the camp and had the ability to punish anyone who broke the rules
  7. __________ was a game that involved speed and accuracy
  8. ________ was eaten fresh or used in soups
  9. ____________ Was a very bad sickness
  10. __________ in hides was traded to other tribes or to Anglo Americans for other things they needed

19 Clues: the __________hunters hunted for ___________Hunters gathered at ___________a Hidatsa women named ________________________ Was a very bad sicknessFather G.A. Belcourt went on bison hunt________ was eaten fresh or used in soupsa place in North Dakota is _______________________hunted bison, deer, elk, and antelope...

Risky Clues 2025-06-25

Risky Clues crossword puzzle
Across
  1. A voice-based scam technique
  2. Use a ______ password to protect your accounts
  3. Latest wireless security protocol for networks
  4. Avoid using this kind of free network in public places
  5. An internal framework that shapes the administration of an organisation
  6. Leakage Unauthorised exposure of sensitive information
  7. Risk Umbrella term for various threats for an organisation
  8. Risk Risk due to obligations or failures in external agreements
  9. Media Avoid these websites on official devices
Down
  1. A calculated step to soften the blow of what might go wrong
  2. Regulation that governs how personal information is stored.
  3. Always lock your system when you leave it
  4. If you find yourself in cyber threat, call me
  5. System or process failing to work as intended
  6. A type of cyberattack using fake emails
  7. Intentional deception for personal or financial gain
  8. Security Protect this sensitive information of clients
  9. Known exposure despite controls
  10. Register Structured risk documentation tool
  11. Controls Tools used to prevent confidential info from leaving the system

20 Clues: A voice-based scam techniqueKnown exposure despite controlsA type of cyberattack using fake emailsAlways lock your system when you leave itRegister Structured risk documentation toolIf you find yourself in cyber threat, call meSystem or process failing to work as intendedUse a ______ password to protect your accounts...

Networking 2017-01-04

Networking crossword puzzle
Across
  1. Join together two or more computers on a network
  2. Data travelling across the internet is broken up into….
  3. Connects a network to the Internet
  4. A wide area network
  5. A point on a network - could be a computer, printer or other connected device
  6. A type of cable used to connect computers to a LAN
Down
  1. The largest WAN – A network of networks spanning the world
  2. A super-fast cable used to transfer data across the planet
  3. Local area network
  4. A computer in charge of the network
  5. Every computer must have one of these to connect to a network - could be wireless or wired

11 Clues: Local area networkA wide area networkConnects a network to the InternetA computer in charge of the networkJoin together two or more computers on a networkA type of cable used to connect computers to a LANData travelling across the internet is broken up into….The largest WAN – A network of networks spanning the world...

internet safety by Bam 2013-09-08

internet safety by Bam crossword puzzle
Across
  1. A person who uses computers and know how to go and destroy your website.
  2. place that you can connect to other people around the world
  3. a place that you can research stuff
  4. the transmission of messages over communications networks.
  5. is a famous social networking
Down
  1. about yourself
  2. computer connected to the internet that maintains a series of web.
  3. place that where you can talk to your friend
  4. somebody say mean thing to you on the internet
  5. is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes
  6. is a social networking that you can see the other person

11 Clues: about yourselfis a famous social networkinga place that you can research stuffplace that where you can talk to your friendsomebody say mean thing to you on the internetis a social networking that you can see the other personthe transmission of messages over communications networks.place that you can connect to other people around the world...

Tech Cross-word 2014-03-14

Tech Cross-word crossword puzzle
Across
  1. The smallest unit of measure for computer data.
  2. Minute area of illumination on a display screen, one of many from which and image is composed.
  3. One unit of binary data cpable of being routed.
  4. Eight BITs
  5. Central processing unit, also referred to as a CPU.
  6. A measurement of the smallest detail that can be distinguished by a sensor system under specific conditions.
Down
  1. 1024 gigabytes
  2. A unique string of numbers separated by periods that identifies each computer.
  3. Is the conversion of data into a form called ciphertext.
  4. High-capacity, self-contained storage device containing a read –write mechanism.
  5. Device that forwards data packets between computer networks.

11 Clues: Eight BITs1024 gigabytesThe smallest unit of measure for computer data.One unit of binary data cpable of being routed.Central processing unit, also referred to as a CPU.Is the conversion of data into a form called ciphertext.Device that forwards data packets between computer networks....

Networking Concepts 2025-06-17

Networking Concepts crossword puzzle
Across
  1. The entire network goes down if the hub fails.
  2. Net working layout to communicate with all components
  3. A network connects two or more computers located at distant places
  4. A device that connects two different types of network
  5. Two or more computers and peripheral device connect
  6. Connect computer to the internet
Down
  1. Provide the facility to transfer soft copies from one computer to another
  2. A computer network mainly created for individual person
  3. The networking allow the networks to be without cabling
  4. A device to connect all computer in a network
  5. In which topology, all the nodes in the network are connected in a circular manner?

11 Clues: Connect computer to the internetA device to connect all computer in a networkThe entire network goes down if the hub fails.Two or more computers and peripheral device connectNet working layout to communicate with all componentsA device that connects two different types of networkA computer network mainly created for individual person...

Transfer of Data in ICT Systems 1 - Networks 2014-10-12

Transfer of Data in ICT Systems 1 - Networks crossword puzzle
Across
  1. A school site or small office usually uses this type of network (3)
  2. Acronym for a network that is spread over a wide geographical area (3)
  3. In this type of network, resources are shared among interconnected users (4,2,4)
  4. _______ Transfer Protocol, used for transmitting and displaying information in the form of web pages on browsers (9)
  5. In this type of network, users access and share resources from a central location (6,5)
  6. Communications network having two or more paths to any nodes (4)
  7. Device which converts analogue signals to digital signals and vice versa (5)
  8. See 4 Across
  9. Node on a network dedicated to printing (5,6)
  10. The acronym for ‘wireless fidelity’ (4)
  11. Network in which the nodes are all connected to one central communications line (3)
  12. Device for connecting a number of nodes in a star configuration (3)
Down
  1. 4 & 2 Down Printed circuit board that is in a station that converts the data in the station so that it can be transmitted along a network (7,9,4)
  2. Device that connects two different LAN’s (6)
  3. Device that sits between a user and the Internet, responsible for caching and filtering (5,6)
  4. ________ Area Networks cover an area such as a city or town (12)
  5. Device which determines the path a packet should take on a network (6)
  6. Network structure in which the network resources are distributed throughout the geographical area being served, due to the network operating system (11)
  7. Device that allows LANs to connect to WANs (7)
  8. Small hardware device that joins multiple computers together within one local area network (LAN) and assists with the performance of the network (6)

20 Clues: See 4 AcrossThe acronym for ‘wireless fidelity’ (4)Device that connects two different LAN’s (6)Node on a network dedicated to printing (5,6)Device that allows LANs to connect to WANs (7)Communications network having two or more paths to any nodes (4)________ Area Networks cover an area such as a city or town (12)...

CS486 - Introduction to Neural Networks and Deep Learning 2025-10-13

CS486 - Introduction to Neural Networks and Deep Learning crossword puzzle
Across
  1. ___________ in the biological neuron is referred to as output in computational neuron.
  2. Weights in the Rosenblatt's perceptron model are __________________ numbers
  3. A NN model with 1 - Input layer, 4 hidden layer and 1 Output layer is referred to be ______ layer network
  4. __________ layer can be used to avoid overfitting
  5. No of Convolution layers used in VGG16 is
  6. a Layer that reduces the dimensionality of the convoluted image
  7. a popular algorithm used to minimize the loss function
  8. To make the convoluted image the same size as the input image, then the padding value should be ‘________’ in Python.
  9. Use the _______________ of pre-trained models when the dataset is huge and similarity is less.
  10. a constant used to update the net activation value
  11. A number 26 is an example of a _____________
  12. ____________ learning mechanism is used when the dataset is small and similarity of images is less with Imagenet while using pre-trained models
  13. An input layer has 'm' units and hidden layer has 'n' units then the number of weights between these two layers is ___________
  14. ___________ is an example of linearly inseperable problem
  15. A grayscale image is an example of _______________
  16. In the McCulloch Pitts' model, the inputs are
Down
  1. an activation function used to predict the output in logistic regression
  2. one ____________ refers to show the dataset completely to the NN model.
  3. ________________ Loss function is used to update the weights during multiclass classification.
  4. pre-trained models are used as ___________ when the dataset is huge and similarity is also high.
  5. a layer that produces probabilities of a neuron in a classification
  6. an alternate name for threshold activation function
  7. One _____________ refers to show the one instance of the dataset to the NN model.
  8. a hyperparameter used to determine how fast the model can learn from data
  9. If a CNN model provides Test error = 0.22 and Train error = 0.01, then the model is an _______________ model
  10. a popular loss function used in adjusting the weights of a neural network
  11. __________ activation function is used in regression process.
  12. Gradient descent refer to moving towards the ______________ slope of the gradient
  13. a non-linear activation function that squashes the output in -1 to +1
  14. Activation function used to predict the binary output in the final dense layer is _________

30 Clues: No of Convolution layers used in VGG16 isA number 26 is an example of a _____________In the McCulloch Pitts' model, the inputs are__________ layer can be used to avoid overfittinga constant used to update the net activation valueA grayscale image is an example of _______________an alternate name for threshold activation function...

Hardware 2020-03-10

Hardware crossword puzzle
Across
  1. a standard for connecting computers and their peripherals
  2. converts mains AC to low-voltage regulated DC power
  3. a form of computer memory that can be read and changed in any order
  4. a place in a computer where an expansion card can be inserted
  5. abbreviation
  6. card A USB-based device that transmits and receives wireless signals.
  7. a unit of information equal to one billion
  8. known as NIC
  9. storage device containing a read-write mechanism plus one
Down
  1. a printed circuit board controlling output to a display screen
  2. substance for absorbing excessive or unwanted heat
  3. a computer networking technologies commonly used in local area networks
  4. Operations are controlled
  5. unit of information equal to one million bytes
  6. a circuit board containing the main components of a computer
  7. a device which can be slotted into a computer to allow the use of audio components
  8. you use it to get connection at home or and public place
  9. small device able to be connected to and used with a computer
  10. abbreviation
  11. measurement

20 Clues: measurementabbreviationabbreviationknown as NICOperations are controlleda unit of information equal to one billionunit of information equal to one million bytessubstance for absorbing excessive or unwanted heatconverts mains AC to low-voltage regulated DC poweryou use it to get connection at home or and public place...

Chapter 9 Security Plus 2024-03-21

Chapter 9 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Chapter 7 Security Plus 2024-03-11

Chapter 7 Security Plus crossword puzzle
Across
  1. Granting access that is limited
  2. Standard preconfigured passwords
  3. Single sign-on for networks owned by different organizations
  4. An access control scheme that is the most restrictive
  5. evidence or proof of something
  6. features and characteristics of the individual
  7. Removing user accounts
  8. Granting or denying approval to use specific resources
  9. The ability of systems to exchange information
Down
  1. Requiring the user to provide proof that they are the unique user.
  2. The point in time when a password is no longer valid
  3. allows secure web domains to exchange user authentication and authorization data
  4. enables users to access a network resource through a directory service
  5. An access control scheme that is the least restrictive
  6. Using more than one type of authentication credential
  7. Adding a random string to a hash algorithm for enhanced security
  8. A key pair “burned” into a security key
  9. small number of passwords used when trying several different user accounts
  10. provide control over user validation and the resources that may be accessed
  11. An open-source federation framework

20 Clues: Removing user accountsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworkA key pair “burned” into a security keyfeatures and characteristics of the individualThe ability of systems to exchange informationThe point in time when a password is no longer valid...

CYBER ETHICS 2025-07-29

CYBER ETHICS crossword puzzle
Across
  1. Unwanted and often harmful bulk emails. |
  2. Online etiquette or good manners on the internet. |
  3. Legal right granted to an inventor for a new invention. |
  4. Installing one licensed software copy on multiple devices illegally. |
  5. Theft Stealing someone's personal information for fraudulent use. |
  6. Illegally breaking into systems to steal sensitive information. |
  7. Illegal intrusion into a computer system or network. |
  8. Footprint Online data left behind from a user's digital activity. |
Down
  1. Using technology to harass or harm someone on purpose. |
  2. Piracy Copying and distributing software illegally. |
  3. Not morally correct or acceptable, especially in the digital world. |
  4. Tricking users into clicking something they didn't intend to. |
  5. Presenting someone else's work or ideas as your own. |
  6. Legal protection for original creative work. |
  7. Using phone calls or VoIP to steal personal information. |
  8. Attempting to trick someone into revealing personal info via fake emails. |
  9. A program that disrupts a computer's normal functioning. |
  10. Criminal activity involving computers, networks, or the internet. |
  11. Bombing Sending repeated spam to overflow someone’s inbox. |
  12. Law Rules and restrictions imposed on online users. |

20 Clues: Using technology to harass or harm someone on purpose. |Unwanted and often harmful bulk emails. |Online etiquette or good manners on the internet. |Not morally correct or acceptable, especially in the digital world. |...

chapter3 2012-09-05

chapter3 crossword puzzle
Across
  1. any unsolicited or unwanted message.
  2. policy a document that tells how personal data will be used.
  3. using material created by another person and claiming it as your own.
  4. moral standards or values
  5. the selling and buying of products on the internet
  6. messaging allows users who ae online to key txt messages.
  7. one of the most exciting resources on the web
Down
  1. virus a destructive program.
  2. names urls contain these
  3. term often used to discribe rules for proper online behavior.
  4. allows users to post meesages for others to read
  5. is a web of computer networks that spans the earth.
  6. a scheme used to take money under false pretenses.
  7. a feature that allows you to create a list of links for sites.
  8. browser a program that lets you find and view web pages.

15 Clues: names urls contain thesemoral standards or valuesvirus a destructive program.any unsolicited or unwanted message.one of the most exciting resources on the weballows users to post meesages for others to reada scheme used to take money under false pretenses.the selling and buying of products on the internet...

Globalisation 2013-02-20

Globalisation crossword puzzle
Across
  1. act or instance of integrating a racial, religious, or ethnic group
  2. natural body that revolves around a planet
  3. right or license granted by a company to an individual or group to market its products
  4. beyond national boundaries or interests
  5. investing of money or capital
  6. process or act of migrating
  7. management; frugality in the expenditure or consumption of money, materials
  8. particular form or stage of civilization
Down
  1. basic, underlying framework or features of a system or organization
  2. quality or state of being sovereign
  3. convey (cargo) in standard-sized containers
  4. act of globalizing, or extending to other or all parts of the world
  5. computer network linking smaller computer networks worldwide
  6. person or thing that consumes
  7. act or process of buying, selling, or exchanging commodities

15 Clues: process or act of migratinginvesting of money or capitalperson or thing that consumesquality or state of being sovereignbeyond national boundaries or interestsparticular form or stage of civilizationnatural body that revolves around a planetconvey (cargo) in standard-sized containerscomputer network linking smaller computer networks worldwide...

IT CROSSWORD 2024-06-10

IT CROSSWORD crossword puzzle
Across
  1. _______ connects all the components of a computer.
  2. _______ is used for connecting peripheral devices to a computer.
  3. _______ established the most successful computer software company.
  4. ________ is a popular social networking app that allows users to share photos and videos with their friends and followers.
  5. What does GPT stand for in Chat GPT.
  6. Fidelity What does Wi-Fi stand for ?
  7. _______ to manage computer hardware and software resources and provide common services for computer programs.
  8. What is the purpose of an SSD in a computer?
Down
  1. What is the full form of URL.
  2. Who developed the first computer mouse ?
  3. What does GUI stand for ?
  4. Network What does VPN stand for ?
  5. Who is credited with inventing the World Wide Web?
  6. What does LAN stand for ?
  7. _______ is networking device that forwards data packets between computer networks.

15 Clues: What does GUI stand for ?What does LAN stand for ?What is the full form of URL.What does GPT stand for in Chat GPT.Who developed the first computer mouse ?Network What does VPN stand for ?What is the purpose of an SSD in a computer?_______ connects all the components of a computer.Who is credited with inventing the World Wide Web?...

Technická angličtina 2023-02-12

Technická angličtina crossword puzzle
Across
  1. Special HW that you need to videoconference.
  2. It protects a company intranet from outside attacks.
  3. User have to enter it to gain access to a network.
  4. As soon as possible.
  5. The line that describes the content of an emai.
  6. A person who uses technology for criminal aims.
Down
  1. Small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.
  2. It is a person who uses their PC skill to enter computers and networks illegally.
  3. It is program designed to infiltrate or damage your computer.
  4. Technology that enables people to make phone calls over the internet.
  5. In my honest opinion.
  6. Characters used when interacting with people online.
  7. The name given to junk email.
  8. A protocol which provides secure trasactions.
  9. Bye for now.

15 Clues: Bye for now.As soon as possible.In my honest opinion.The name given to junk email.Special HW that you need to videoconference.A protocol which provides secure trasactions.The line that describes the content of an emai.A person who uses technology for criminal aims.User have to enter it to gain access to a network....

AP Comp Sci Test 2023-05-02

AP Comp Sci Test crossword puzzle
Across
  1. security network system that monitors incoming and outgoing network traffic based on security rules
  2. there are 8 bits in one ____
  3. variable in a function definition, placeholder for values
  4. networking device that forwards data packets between computer networks
  5. common method for referencing elements in a list or string using numbers
  6. standard markup language for documents designed to be displayed in a web browser
  7. an ordered collection of elements in a program
  8. legal right given to an originator
  9. smallest unit of data
  10. 0s and 1s
Down
  1. group of functions that may be used in creating new programs
  2. a finite set of instructions that accomplish a task
  3. program that records keystrokes by a user
  4. rules and regulations we all agree to use
  5. a facility that allows computing devices to connect to the internet and send data via radio waves

15 Clues: 0s and 1ssmallest unit of datathere are 8 bits in one ____legal right given to an originatorprogram that records keystrokes by a userrules and regulations we all agree to usean ordered collection of elements in a programa finite set of instructions that accomplish a taskvariable in a function definition, placeholder for values...

crossword puzzle 2021-09-28

crossword puzzle crossword puzzle
Across
  1. to be conscious of the truth while telling carefully constructed lies
  2. using false or misleading information to promote a certain political figure or party
  3. fail to resist pressure or temptation
  4. characteristic of middle class
  5. to be willing to allow the existence of other opinions or thoughts
  6. intense and eager enjoyment or interest
  7. the practice of refraining from sexual intercourse
Down
  1. a secret plan or plot to do something unlawful
  2. lacking significance and liveliness
  3. to be softened by age or experience
  4. special words or expressions used by a certain group of people that isn't understood by outsiders
  5. systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
  6. political and economic system that destroys human spirit
  7. to be forced to undergo something
  8. discover or identify the presence of something

15 Clues: characteristic of middle classto be forced to undergo somethinglacking significance and livelinessto be softened by age or experiencefail to resist pressure or temptationintense and eager enjoyment or interesta secret plan or plot to do something unlawfuldiscover or identify the presence of something...

Cyber Fraud 2024-12-09

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

Cyber security - 1 2025-07-09

Cyber security - 1 crossword puzzle
Across
  1. Mechanisms that restrict access to systems and data.
  2. surface, The sum of all the points in a system that are exposed to an attacker.
  3. A security measure where a device is physically isolated from unsecured networks.
  4. A prolonged and targeted cyberattack.
  5. Becoming desensitized to frequent security alerts.
  6. Verifying the identity of a user, device, or system.
  7. Granting access to resources based on identity and permissions.
  8. Blocking known harmful software or processes.
  9. Ensuring that authorized users have access to information and systems when needed.
Down
  1. Trying many combinations to guess a password or encryption key.
  2. A program where organizations reward individuals for finding vulnerabilities.
  3. A network of infected computers controlled remotely.
  4. Software that detects and removes malicious software.
  5. Encryption using a pair of keys – one public and one private.
  6. An entity that issues digital certificates.

15 Clues: A prolonged and targeted cyberattack.An entity that issues digital certificates.Blocking known harmful software or processes.Becoming desensitized to frequent security alerts.Mechanisms that restrict access to systems and data.A network of infected computers controlled remotely.Verifying the identity of a user, device, or system....

Networking concept 2025-06-11

Networking concept crossword puzzle
Across
  1. – A program that detects and removes malicious software.
  2. – Someone who illegally gains access to computer systems.
  3. – Shared elements in a network, like printers, files, or servers.
  4. – A security system that monitors and controls network traffic.
  5. Address – A unique number that identifies a device on a network.
  6. System – Software that manages computer hardware and software resources.
  7. – A digital message sent over the internet between users.
  8. – A device that directs data between networks.
  9. – A cyber attack that tricks users into revealing sensitive information.
Down
  1. – Using digital platforms to harass or intimidate others.
  2. – Online promotion or marketing meant to attract attention or sales.
  3. – Unwanted or junk messages sent in bulk, usually via email.
  4. – The global network that connects computers and devices worldwide.
  5. – The physical or logical arrangement of a network.
  6. – Harmful software like viruses, worms, or trojans.

15 Clues: – A device that directs data between networks.– The physical or logical arrangement of a network.– Harmful software like viruses, worms, or trojans.– A program that detects and removes malicious software.– Using digital platforms to harass or intimidate others.– Someone who illegally gains access to computer systems....

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS 2020-12-22

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS crossword puzzle
Across
  1. also called Memory Pen or Pendrive
  2. It is a set of applications that allow a programmer to develop their own computer programs using their logical knowledge and programming languages
  3. It is the software that allows us to have an interaction with our hardware, that is, the one that controls the CPU and peripherals; It is also called an operating system
  4. An application that has multiple programs
  5. it is the storage medium par excellence.
Down
  1. Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function
  2. These are the programs that allow us to perform specific tasks in our system
  3. Random Access Memory
  4. also known as mainboard

9 Clues: Random Access Memoryalso known as mainboardalso called Memory Pen or Pendriveit is the storage medium par excellence.An application that has multiple programsThese are the programs that allow us to perform specific tasks in our systemBased on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function...

Vocab 8 2012-10-29

Vocab 8 crossword puzzle
Across
  1. user-written programs that enable the user to perform various tasks automatically. For instance, in Word, a macro is composed of a series of Word commands thus saving keystrokes and time
  2. devices device that transfers data to or from a computer.( hard disks, keyboards, and mouses) and others provide both input and output of data (hard disks, diskettes, writable CD-ROMs).
  3. private network that is contained within an enterprise
  4. software refers to multiple software applications or services that appear to run as one software package for ease-of-use.
  5. frame complete video frames (or images) that are inserted at consistent intervals in a video clip
  6. one of the image file formats supported on the World Wide Web, usually with the file suffix of “.jpg”
  7. tool a tool that can be used to separate obvious lines for selection, whether it be to copy the selection or delete it.
  8. printer popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology.
  9. worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer
Down
  1. tool Allows you to insert any picture file into a document
  2. Liquid-crystal display: a display of information using a liquid crystalline film used on a computer screen or a camera screen.
  3. messaging (IM) actually predating the Internet. IM has only recently started to garner credibility in the corporate world as a valuable productivity tool. Presence is a key driver of instant messaging. Presence technology allows users to see if the person they're trying to reach is available or not, making the value of real-time communications more potent.
  4. ability of a system or a product to work with other systems or products without special effort on the part of the customer
  5. something that will bring you to a specific web site

14 Clues: something that will bring you to a specific web siteprivate network that is contained within an enterprisetool Allows you to insert any picture file into a documentframe complete video frames (or images) that are inserted at consistent intervals in a video clip...

Computing Systems Review 2021-12-08

Computing Systems Review crossword puzzle
Across
  1. software embedded in hardware devices
  2. this type of software helps users complete specific tasks or activities
  3. Windows and iOS are examples of this type of software
  4. often referred to as the brains of the computer
  5. device that transfers data between networks
  6. computer hardware that sends info to a computer
  7. physical computer components that can been seen and touched
Down
  1. any invention including tools, machines, techniques and power sources
  2. when hackers listen in on WiFi signals
  3. a group of computers connected in order to share resources
  4. security software to protect your computer from hackers
  5. storage used to temporarily store files being used by the computer
  6. a set of instructions to tell a computer what to do
  7. converting data into unreadable code to make it more secure before sending
  8. .jpg is an example of this type of file

15 Clues: software embedded in hardware deviceswhen hackers listen in on WiFi signals.jpg is an example of this type of filedevice that transfers data between networksoften referred to as the brains of the computercomputer hardware that sends info to a computera set of instructions to tell a computer what to do...

Needs of all learners 2013-07-01

Needs of all learners crossword puzzle
Across
  1. assessing students' knowledge and skills before beginning a unit of study and allowing learners to begin at their level
  2. collection of work used for reflection on growth over time
  3. the result when a student applies what they have learned
  4. how a student learns best
  5. activity where students study same concept with different levels
  6. adult basic education
  7. refers to a student's knowledge, understanding, and skill
  8. ways in which content is taught
Down
  1. students working together on one project
  2. breaking assignments into smaller parts
  3. strategic teaching to meet needs of all students
  4. type of learning where students are given real life problems to solve as if in the professional world
  5. students working on their own on topics of interest to them
  6. support networks for teachers
  7. topics that evoke curiosity and passion

15 Clues: adult basic educationhow a student learns bestsupport networks for teachersways in which content is taughtbreaking assignments into smaller partstopics that evoke curiosity and passionstudents working together on one projectstrategic teaching to meet needs of all studentsthe result when a student applies what they have learned...

Technology Vocabulary 2021-07-28

Technology Vocabulary crossword puzzle
Across
  1. a worldwide network of computer networks
  2. any smal compartmen
  3. transfer a file or program to a smaller computer
  4. a unit of measurement of information
  5. a listing of the computer files stored in memory
  6. a short line of text that a web site puts on your computer's hard drive when you access the web site
  7. having an output that is proportional to the input
  8. locate and correct errors in a computer program code
Down
  1. a set of related records kept together
  2. a link from a hypertext file to another location or file
  3. a data transmission rate for modems
  4. the exclusive right to sell a work
  5. restore something reduced in volume to its full volume
  6. a compact disk that is used with a computer
  7. transfer out of a database or document

15 Clues: any smal compartmenthe exclusive right to sell a worka data transmission rate for modemsa unit of measurement of informationa set of related records kept togethertransfer out of a database or documenta worldwide network of computer networksa compact disk that is used with a computertransfer a file or program to a smaller computer...

Emergency communication and warning systems (text A) 2016-12-18

Emergency communication and warning systems (text A) crossword puzzle
Across
  1. Name the primary communication network which carries Federal CD operational information.
  2. The National Communication System connects national and regional civil defence ...
  3. how many levels does the US warning system consist of?
  4. The emergency operators are well-trained and ...
  5. Which network provides emergency alert?
  6. Which system plays a great role in emergency response?
  7. Name the most widespread sounding public warning device
  8. These authorities are responsible for sunding public warning devices
Down
  1. What is often used for governmental communication?
  2. How many networks does the emergency communication system inslude?
  3. The emergecy response greatly depends on this quality of the emergency communication system
  4. There are more than 700 of this in the USA.
  5. The National Warning System is an extension of the military ... and warning systems.
  6. What authorities do warning points send warning information to?
  7. What is the simplest communication system?

15 Clues: Which network provides emergency alert?What is the simplest communication system?There are more than 700 of this in the USA.The emergency operators are well-trained and ...What is often used for governmental communication?how many levels does the US warning system consist of?Which system plays a great role in emergency response?...

Unit 4 and 5 - English for IT 2023-10-02

Unit 4 and 5 - English for IT crossword puzzle
Across
  1. the area of a website where you pay for the items
  2. (adj) far away
  3. Someone who gets into other people's computer systems without permission
  4. The department in a company that makes thing
  5. "Human ______" is the department dealing with employment, training and
  6. A system that protects a computer network
  7. (Verb)to protect information by putting it into a special code
Down
  1. the business of selling a product or service to the public
  2. a large amount of information stored in a computer system
  3. A business deal or action such as buying or selling things
  4. The main computer of a network, which controls all the others
  5. data _______ means double-checking the data for faults or
  6. data ______ means entering the data into the system
  7. data _________ means gathering the raw data
  8. A way of connecting two computer networks

15 Clues: (adj) far awayA way of connecting two computer networksA system that protects a computer networkdata _________ means gathering the raw dataThe department in a company that makes thingthe area of a website where you pay for the itemsdata ______ means entering the data into the systema large amount of information stored in a computer system...

Crossword puzzle based on cyber ethics 2025-06-11

Crossword puzzle based on cyber ethics crossword puzzle
Across
  1. A group of interconnected computers or devices.
  2. Using manipulation to trick someone into revealing information.
  3. Software designed to harm or disrupt computer systems.
  4. Software designed to damage or disrupt a computer system.
  5. A scam that uses email to trick people into revealing sensitive information.
  6. Rights associated with creations of the mind, such as inventions and artistic works.
Down
  1. The process of converting data into a secret code.
  2. Harassment or intimidation conducted using electronic devices.
  3. A secret word or phrase used for authentication.
  4. A system that blocks unauthorized access to a network.
  5. The right to be free from unwarranted intrusion or observation.
  6. Protection against threats or risks.
  7. Criminal activity carried out using computers or networks.
  8. The exclusive legal right to copy, distribute, and adapt a work.
  9. Unauthorized access to a computer or network.

15 Clues: Protection against threats or risks.Unauthorized access to a computer or network.A group of interconnected computers or devices.A secret word or phrase used for authentication.The process of converting data into a secret code.A system that blocks unauthorized access to a network.Software designed to harm or disrupt computer systems....

Computer languages and browsing safely 2025-06-05

Computer languages and browsing safely crossword puzzle
Across
  1. act of stealing and misusing someone's personal information
  2. It can do addition, subtraction, multiplication, division, etc.
  3. an illegal entry into a computer system or network
  4. use of illegal methods to get money or other things that belong to a bank
  5. process of 'befriending' children on social media
  6. it is vital information resources
  7. It has based 2
  8. Act to believe the email has been sent from a trusted person or organisation
  9. the number system consists of 16 digits
  10. it means hoaxing or misleading
Down
  1. the number system consists of 10 digits
  2. it consists of 8 digits
  3. Collection of technologies, processes, and practices design to protect networks, computers, programs, and data
  4. Any criminal activity intended to harm anyone using a computer and an internet connection
  5. Extract confident information from users and use this information to execute fraudulent tasks online

15 Clues: It has based 2it consists of 8 digitsit means hoaxing or misleadingit is vital information resourcesthe number system consists of 10 digitsthe number system consists of 16 digitsprocess of 'befriending' children on social mediaan illegal entry into a computer system or networkact of stealing and misusing someone's personal information...

inglish 2025-09-19

inglish crossword puzzle
Across
  1. a type of squared code you can scan
  2. The “NFC” professor
  3. You have to use it when your phone has low battery
  4. you use it to move a cursor on your pc
  5. it’s used to change your location to a different country
  6. Technique used to divide a network into multiple networks
  7. it’s used to type
  8. they are used to control the temperature
Down
  1. it’s used to copy and transform digital images into images on paper sheets
  2. a tiny block of memory needed for common instructions
  3. Language that uses markups that we used in TPSI
  4. name of the software we use to write java programs
  5. technology that can enable voice or data communication between multiple devices using radio signals at short distance
  6. you can use one to play music or sounds from your PC
  7. Temporary kind of memory

15 Clues: it’s used to typeThe “NFC” professorTemporary kind of memorya type of squared code you can scanyou use it to move a cursor on your pcthey are used to control the temperatureLanguage that uses markups that we used in TPSIYou have to use it when your phone has low batteryname of the software we use to write java programs...

The World Wide Web from its origins 2025-11-03

The World Wide Web from its origins crossword puzzle
Across
  1. Huge star systems studied in GalaxyZoo Paragraph 4
  2. To sort items into specific scientific groups Paragraph 4
  3. Something observed that needs explanation, like “winner takes all” Paragraph 6
  4. Type of analysis used to study Web behaviour Paragraph 6
  5. Motivation or reward that encourages action Paragraph 8
  6. review Evaluation of research by other experts Paragraph 7
  7. Formal written plan that introduced the Web Paragraph 1
Down
  1. Non-experts who help scientists online Paragraph 4
  2. Working together, especially among scientists Paragraph 7
  3. networks Online platforms used to study human connections Paragraph 5
  4. Website used by researchers to analyse message patterns Paragraph 5
  5. Original written file linking scientists’ data Paragraph 1
  6. Academic publications now available online Paragraph 4
  7. Giant machine used to smash particles at CERN Paragraph 2
  8. European physics lab where the Web began Paragraph 1

15 Clues: Non-experts who help scientists online Paragraph 4Huge star systems studied in GalaxyZoo Paragraph 4European physics lab where the Web began Paragraph 1Academic publications now available online Paragraph 4Motivation or reward that encourages action Paragraph 8Formal written plan that introduced the Web Paragraph 1...

ICT 2017-12-13

ICT crossword puzzle
Across
  1. An example of Application Software.
  2. Holds the programs and data being worked on.
  3. The S in RSI stands for?
  4. Smallest unit of storage
  5. Performs all the basic calculations and functions to make the computer work.
  6. An example of System Software.
  7. The A in EULA stands for?
  8. This is measured in bits per second.
  9. Type of software licence that must be paid for before you can use the program.
  10. Software that performs a specific function.
  11. A computer that has high performance, easy to move and uses wireless networks
Down
  1. The C in ICT stands for?
  2. Any device that is controlled by the CPU.
  3. An item of hardware that displays processed results.
  4. An example of a WAN.
  5. An example of an Input device.
  6. An example of an impact printer.
  7. A very expensive type of Internet connection used for people in remote areas.
  8. Program of instructions that tell the device what to do.

19 Clues: An example of a WAN.The C in ICT stands for?The S in RSI stands for?Smallest unit of storageThe A in EULA stands for?An example of an Input device.An example of System Software.An example of an impact printer.An example of Application Software.This is measured in bits per second.Any device that is controlled by the CPU....

Computer Words 2015-11-30

Computer Words crossword puzzle
Across
  1. the tv-like screen where you can see the text as it enters the system
  2. the storage space needed to represent one letter or digit
  3. random access memory
  4. a work station consisting of a keyboard and monitor
  5. a blinking light on the display screen that shows where the next keystroke
  6. machine-printed stipes that give information such as a product ID
  7. an efficient system of preparing documents by computer
  8. the physical equipment of a computer system
  9. read on memory
Down
  1. belonging to a numbering system to the base 2
  2. electronic equipment that handles input/ouput information
  3. messages between computers
  4. the computer's main thinking unit
  5. approcimately 1,000 kilobyte
  6. combining a document with a list of variable
  7. an information storage device
  8. a message and data forwarding system that links computer networks all around the world
  9. a large collection of data on a given subject that can be consulted by multiple users
  10. computer programs

19 Clues: read on memorycomputer programsrandom access memorymessages between computersapprocimately 1,000 kilobytean information storage devicethe computer's main thinking unitthe physical equipment of a computer systemcombining a document with a list of variablebelonging to a numbering system to the base 2a work station consisting of a keyboard and monitor...

Health & Human Development 2015-02-11

Health & Human Development crossword puzzle
Across
  1. general movement or pattern over time
  2. number of deaths of children under five
  3. an aspect of this would be your creativity improving
  4. the last stage of the human lifespan
  5. number of new cases
  6. estimate number of number of healthy years expected to live
  7. the sum of the years of potential life lost due to premature death and the years of productive life lost due to disability
  8. from conception to birth stage of life
  9. communication is an aspect of
  10. Yll + _____ = Daly
  11. not merely the lack of disease think physical mental social
Down
  1. number of women dying who are pregnant pr within 42 days birth
  2. growth is classified under
  3. number of deaths caused by disease, illness or environmental factor
  4. number of cases present in a population or at a given time
  5. number of years a person can expect to love of current mortality patterns don't change
  6. fine and gross motor skills are an aspect of
  7. body weight is an aspect of
  8. depression is an aspect of
  9. productive social networks is an aspect of

20 Clues: Yll + _____ = Dalynumber of new casesgrowth is classified underdepression is an aspect ofbody weight is an aspect ofcommunication is an aspect ofthe last stage of the human lifespangeneral movement or pattern over timefrom conception to birth stage of lifenumber of deaths of children under fiveproductive social networks is an aspect of...

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Network requirments 2023-08-28

Network requirments crossword puzzle
Across
  1. The minimum allowable network connection speed
  2. Time it takes a packet to arrive to its destination
  3. In charge of routing data packets between networks
  4. A gadget that joins many networks
  5. The greatest quantity of data that may be communicated in a particular period
  6. A network device's unique identification
  7. A network architecture in which devices are linked in a circle
  8. Filters network traffic to provide security
  9. The division of a network into smaller pieces
Down
  1. A network with restricted access, frequently requiring a password
  2. The quantity of data that may be sent per second is measured
  3. The data transmission unit across a network
  4. Ensures data arrives at its destination without mistakes
  5. Determines the format and encoding of data for transmission
  6. A big geographically dispersed network
  7. Required for wireless communication between devices
  8. The entity in charge of assigning IP addresses
  9. The protocol that allows for file sharing over a network
  10. The protocol that is used to convert domain names into IP addresses
  11. A mechanism that ensures dependable data transmission

20 Clues: A gadget that joins many networksA big geographically dispersed networkA network device's unique identificationThe data transmission unit across a networkFilters network traffic to provide securityThe division of a network into smaller piecesThe minimum allowable network connection speedThe entity in charge of assigning IP addresses...

ICT TERMINOLOGIES 2025-03-25

ICT TERMINOLOGIES crossword puzzle
Across
  1. An organized collection of structured information.
  2. The delay before data transfer begins.
  3. A cyberattack method used to trick users into giving sensitive information.
  4. A request for data from a database.
  5. The core component of an operating system.
  6. A step-by-step procedure for solving a problem.
  7. The process of converting data into a secret code.
  8. The rules defining how code must be written in a programming language.
Down
  1. A small storage space for frequently accessed data.
  2. A programming language used to create interactive web pages.
  3. A group of interconnected devices for communication.
  4. A security system that monitors and controls network traffic.
  5. A device that directs internet traffic between networks.
  6. The maximum data transfer rate of a network.
  7. A unit of digital storage equal to 1024 megabytes.
  8. A clickable link that directs users to another webpage.
  9. Software with publicly available source code.
  10. Malicious software designed to harm a system.
  11. A point where two systems interact or communicate.

19 Clues: A request for data from a database.The delay before data transfer begins.The core component of an operating system.The maximum data transfer rate of a network.Software with publicly available source code.Malicious software designed to harm a system.A step-by-step procedure for solving a problem.An organized collection of structured information....

assgn1 asl 2021-08-19

assgn1 asl crossword puzzle
Across
  1. Cross Site Request Forgery
  2. ______ is a popular tool used for discovering networks as well as in security auditing.
  3. Compromising confidential information comes under ________
  4. _______________ is time based SQL injection attack.
Down
  1. What is simplest form of memory protection introduce in the single authentication system
  2. Which happens first authorization or authentication?

6 Clues: Cross Site Request Forgery_______________ is time based SQL injection attack.Which happens first authorization or authentication?Compromising confidential information comes under ______________ is a popular tool used for discovering networks as well as in security auditing....

ICT EMPOWERMENT 2025-06-20

ICT EMPOWERMENT crossword puzzle
Across
  1. Posting, sharing, and liking are common actions on this ICT platform
  2. A device used to connect to the internet wirelessly
  3. Sending an electronic message
Down
  1. Real-time online meeting platform
  2. The global system of connected networks
  3. The use of computers and digital tools to access, create, and communicate information

6 Clues: Sending an electronic messageReal-time online meeting platformThe global system of connected networksA device used to connect to the internet wirelesslyPosting, sharing, and liking are common actions on this ICT platformThe use of computers and digital tools to access, create, and communicate information

karey 2013-05-01

karey crossword puzzle
Across
  1. self-replicating program that is harmful to networks.
  2. software program that displays advertising on your computer.
  3. of death – A series of repeated, larger than normal pings that crash the receiving computer
  4. is unsolicited e-mail.
  5. process of removing sensitive data from hardware and software before recycling
  6. protocol suite that is used to control all of the communications on the Internet.
  7. attcach that prevents users from acessing normal services
  8. social engineering where the attacker pretends to represent a legitimate outside organization
Down
  1. technically a worm
  2. person who is able to gain access to equipment
  3. file or program other then a virus that is potentially harmful.
  4. Gains access to resources on devices by pretending to be a trusted computer
  5. Programming language developed to interact with HTML
  6. type of grayware
  7. malicious software programs loaded into computers inadvertently.

15 Clues: type of graywaretechnically a wormis unsolicited e-mail.person who is able to gain access to equipmentProgramming language developed to interact with HTMLself-replicating program that is harmful to networks.attcach that prevents users from acessing normal servicessoftware program that displays advertising on your computer....

IMPERIALISM LESSON 1 REVIEW 2024-01-18

IMPERIALISM LESSON 1 REVIEW crossword puzzle
Across
  1. WHO SIGNED TRIETIES TO GAIN LAND AND RUBBER ALONG THE CONGO
  2. AFRICAN RELIGIONS INCLUDED TRADITIONAL BELEIFS, CHRISTIANITY AND WHAT RELIGION
  3. EUROPEAN NATIONS LOOKED FOR NEW MARKETS AND SOURCES OF WHAT?
  4. AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT?
  5. PEOPLE WHO WANTED THE AFRICANS TO CONVERT.
  6. EUROPEANS BELIEVED THAT THEY WERE BETTER THAN MANY OTHER WHAT?
  7. EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT?
Down
  1. SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATION
  2. WHAT TWO THINGS KEPT EUROPEAN OUT OF AFRICA FOR HUNDREDS OF YEARS
  3. WHO CARRIED THE STORIES OF LEOPOLD'S ABUSE OF THE PEOPLE IN THE CONGO
  4. THEY BELIEVED THEY HAD THE RIGHT TO BRING PROGRESS TO THE AREA.
  5. DISEASE AFRICANS WERE SUSCEPTIBLE TO
  6. FIRST MACHINE GUN
  7. DRUG THAT PROTECTED EUROPEANS FROM MALARIA
  8. LEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/

15 Clues: FIRST MACHINE GUNDISEASE AFRICANS WERE SUSCEPTIBLE TODRUG THAT PROTECTED EUROPEANS FROM MALARIAPEOPLE WHO WANTED THE AFRICANS TO CONVERT.EUROPEAN COUNTRIES WERE TRYING TO MAKE WHAT?AFRICANS CONTROLLED THEIR OWN NETWORKS FOR WHAT?SHIPS POWERED BY WHAT ALLOWED FOR MORE EXPLORATIONLEOPOLD SIGNED TREATIES TO GAIN LAND ALONG WHAT RIVER/...

Isaac Kaup 2024-01-09

Isaac Kaup crossword puzzle
Across
  1. data about data
  2. a named reference to a value that can be used repeatedly throughout a program.
  3. a command that executes the code within a function
  4. scientific research conducted in whole or part by distributed individuals.
  5. a collection of program statements. Programs run (or “execute”) one command at a time.
  6. an ordered sequence of characters
  7. a named group of programming instructions. Also referred to as a “procedure”.
Down
  1. A way of representing information using ten options.
  2. the maximum amount of data that can be sent in a fixed amount of time.
  3. 8 bits
  4. The unique number assigned to each device
  5. a computer network consisting of interconnected networks
  6. A way of representing information using only two options.
  7. typically represented as a 0 or 1
  8. An agreed-upon set of rules that specify the behavior of some system

15 Clues: 8 bitsdata about datatypically represented as a 0 or 1an ordered sequence of charactersThe unique number assigned to each devicea command that executes the code within a functionA way of representing information using ten options.a computer network consisting of interconnected networksA way of representing information using only two options....

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat, pressure, etc. in order to make a machine
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting Sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberlsnd are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting Sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberlsnd are______...

Vocab Review 2022-07-24

Vocab Review crossword puzzle
Across
  1. (n) a country that has a king or a queen as the leader
  2. (n) a feeling that you have a link with somebody/something or are part of a group
  3. (prefix) connected with electronic communication networks, especially the internet
  4. _____rights/issues
  5. (n) a system of government where people of a country can vote to elect their leaders
  6. (n) someone who is rich and powerful
  7. (n) racial/social/gender______
  8. (n) every adult has the right to vote
  9. (adj) that is legally or officially acceptable
  10. (n) ​a device that can react to light, heat etc. in order to make a machine do sth
Down
  1. (adj) antonym of specific
  2. (n) someone who steals your information through the internet
  3. (n) the activities involved in protecting sth
  4. (n) the environmental______of tourism
  5. (n) Kingdom of Talossa; Sealand; Liberland are______

15 Clues: _____rights/issues(adj) antonym of specific(n) racial/social/gender______(n) the environmental______of tourism(n) someone who is rich and powerful(n) every adult has the right to vote(n) the activities involved in protecting sth(adj) that is legally or officially acceptable(n) Kingdom of Talossa; Sealand; Liberland are______...

Targeted Logical Ports 2023-03-10

Targeted Logical Ports crossword puzzle
Across
  1. Transfers files between two systems (20/21)
  2. Transfers files from one system to another with lockstep method (69)
  3. Hosts the information about machines on a network (161/162)
  4. Text communication between two machines in plaintext (23)
  5. Network naming protocol for networks that automatically assign IP addresses (67/68)
  6. Naming system for IP Addresses (53)
  7. Access a machine's desktop remotely (3389)
  8. A client can retrieve emails from an email server (143)
Down
  1. Contains directory information for a network securely with SSL encryption (636)
  2. Contains directory information for a network (389)
  3. Real-time sessions that include voice, video, test messaging, etc. (5060/5061)
  4. Web traffic without encryption (80)
  5. Send and receive email messages (25)
  6. Clock synchronization between two machines (123)
  7. Microsoft created to provide access to devices on a network (445)
  8. A client can retrieve emails from an email server (110)

16 Clues: Web traffic without encryption (80)Naming system for IP Addresses (53)Send and receive email messages (25)Access a machine's desktop remotely (3389)Transfers files between two systems (20/21)Clock synchronization between two machines (123)Contains directory information for a network (389)A client can retrieve emails from an email server (110)...

Technology words 2023-05-10

Technology words crossword puzzle
Across
  1. where your teachers assign you work to do for classes
  2. where a global system hooks up to networks
  3. a long communication without wires
  4. where you can watch videos for classes or for fun
  5. where you can send mail digitally to workers, teachers or student
  6. where it can be instructed by hardware
  7. when something is transmitting information by various types
Down
  1. it is designed to protect your computers and other devices from bugs ands hackers
  2. where you can look up answers or look for evidence
  3. where you can create a web browser
  4. where you can make a presentation
  5. where you create a bar graph, line graph, or a pie chart
  6. where scientists design and build machines
  7. where it widely describes wide range of technology's
  8. where you can hook up to internet and use your technology better

15 Clues: where you can make a presentationwhere you can create a web browsera long communication without wireswhere it can be instructed by hardwarewhere a global system hooks up to networkswhere scientists design and build machineswhere you can watch videos for classes or for funwhere you can look up answers or look for evidence...

Vocabulary cross 2023-09-13

Vocabulary cross crossword puzzle
Across
  1. a living part of an ecosystem
  2. an organism that eats meat and plants
  3. a organisms that only eat plants
  4. the match of a species to a specific environmental condition
  5. a organisms that can't make their own food
Down
  1. are networks starting from producers and ending with predators
  2. a non-living part of an ecosystem
  3. are organisms that break down dead organisms
  4. the natural home or environment of an animal, plant, or other organism.
  5. a organisms that make their own food
  6. consists of all the food chains in a single ecosystem
  7. an organisms that cannot produce its own food, instead taking nutrition from other sources of organic carbon
  8. an organism that produces complex organic compounds using carbon from simple substances
  9. an organisms that only eat meat
  10. are animals that consume dead organisms that have died

15 Clues: a living part of an ecosysteman organisms that only eat meata organisms that only eat plantsa non-living part of an ecosystema organisms that make their own foodan organism that eats meat and plantsa organisms that can't make their own foodare organisms that break down dead organismsconsists of all the food chains in a single ecosystem...

Cyber Fraud 2024-11-27

Cyber Fraud crossword puzzle
Across
  1. Deceitful practices to gain illegal financial advantage.
  2. Pretending to be a trusted source to deceive someone.
  3. Illegal activities conducted using the internet or computers.
  4. Technique to secure data by converting it into unreadable format.
  5. Unauthorized access to computer systems or networks.
  6. Software that secretly monitors user activity.
  7. A unique string of characters used for account protection.
  8. Information that can be stolen or corrupted in a cyber attack.
  9. Malicious software designed to harm or exploit devices.
Down
  1. A type of malware disguised as legitimate software.
  2. A security system that monitors and controls incoming and outgoing network traffic.
  3. A fraudulent attempt to obtain sensitive information through email or messages.
  4. Theft of personal information to commit fraud.
  5. Fraudulent schemes designed to trick and steal money or information.
  6. Malware that locks your data until a payment is made.

15 Clues: Theft of personal information to commit fraud.Software that secretly monitors user activity.A type of malware disguised as legitimate software.Unauthorized access to computer systems or networks.Pretending to be a trusted source to deceive someone.Malware that locks your data until a payment is made....

China Review 2025-02-26

China Review crossword puzzle
Across
  1. chinese philosophy that focuses on finding societal harmony
  2. river that ancient Chinese civilization started around
  3. founder of Confucianism
  4. first unified emperor of China that was buried with 8,000 terracotta warriors
  5. series of trade networks that exchanged goods and ideas from Asia to Europe
  6. chinese philosophy that believes in looking for harmony with nature or the whole world
Down
  1. chinese explorer that was command in chief of the largest naval expedition
  2. group of people who travel together for the safety of each other
  3. winner of the Chinese Civil War
  4. a country that has the ability to exercise and influence anywhere in the world
  5. last ruling emperor of China
  6. fantastical and did not happen in real life
  7. a series of rulers from the same ruling family
  8. first dynasty of China
  9. first communist leader in China

15 Clues: first dynasty of Chinafounder of Confucianismlast ruling emperor of Chinawinner of the Chinese Civil Warfirst communist leader in Chinafantastical and did not happen in real lifea series of rulers from the same ruling familyriver that ancient Chinese civilization started aroundchinese philosophy that focuses on finding societal harmony...

Networking Concepts 2025-06-12

Networking Concepts crossword puzzle
Across
  1. : A common wired networking technology
  2. : A network that covers a large geographic area
  3. : A device that connects devices in a LAN and uses MAC addresses to forward data
  4. : Device that converts digital data to analog signals and vice versa
  5. : A wireless networking technology using radio waves
  6. : A network within a small area, like a home or office
  7. : A set of rules for data communication
  8. : A computer that requests data or services from a server
  9. : A computer that provides data or services to other computers
Down
  1. : Maximum data transfer rate of a network
  2. : Translates domain names into IP addresses
  3. : Security system that controls incoming and outgoing network traffic
  4. : A group of connected devices that share resources
  5. Address : Unique address assigned to each device on a network
  6. : Device that forwards data packets between networks

15 Clues: : A common wired networking technology: A set of rules for data communication: Maximum data transfer rate of a network: Translates domain names into IP addresses: A network that covers a large geographic area: A group of connected devices that share resources: A wireless networking technology using radio waves...

MIL Crosswords 2025-11-19

MIL Crosswords crossword puzzle
Across
  1. uses casual and conversational language
  2. a set of situations that makes it possible to do something
  3. an enclosed space
  4. online etiquette
  5. means of communication or communication tools like magazines and newspapers
  6. the relationship of the area occupied by one shape to that of another
  7. uses academic language and has an organized structure
  8. Exclusive right granted for an invention
Down
  1. the notional environment in which communication over computer networks occurs.
  2. defined by points moving in space
  3. usually used to protect original works like books, movies, and music
  4. online criminal work
  5. the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  6. a simple and flexible format of presenting information.
  7. Uses professional and structured language

15 Clues: online etiquettean enclosed spaceonline criminal workdefined by points moving in spaceuses casual and conversational languageExclusive right granted for an inventionUses professional and structured languageuses academic language and has an organized structurea simple and flexible format of presenting information....

Maliya Cyber Security Passwords 2026-04-07

Maliya Cyber Security Passwords crossword puzzle
Across
  1. Malicious software that secretly infects devices to
  2. collection of raw, unprocessed facts, figures, symbols
  3. Helps organizations protect sensitive info by identifying and mitigating threats from the
  4. Protects sensitive data,maintains customer trust, and prevents financial and damage from cyberattacks
  5. measure taken to protect someone or something or to prevent something
  6. They represent essential themes meant to be retained long-term
  7. data on a system
  8. attackers perspective
  9. A code that capable of corrupting the system or destroying data
Down
  1. digital devices and their connected networks from danger and threats
  2. Protects sensitive data from unauthorized access
  3. Unwanted software that secretly installs and puts pop ups on your device.
  4. It protects sensitive data, ensuring the confidentiality,integrity, and availability of information
  5. horse A download disguised as a program.
  6. Spreads across devices while replicating within a network.

15 Clues: data on a systemattackers perspectivehorse A download disguised as a program.Protects sensitive data from unauthorized accessMalicious software that secretly infects devices tocollection of raw, unprocessed facts, figures, symbolsSpreads across devices while replicating within a network.They represent essential themes meant to be retained long-term...

OneArt crossword 2022-09-05

OneArt crossword crossword puzzle
Across
  1. Code that grants you access to your crypto wallet
  2. Technology that enhances the interconnection between blockchain networks
Down
  1. One of the biggest NFT project
  2. Information stored in NFT
  3. Exchanging one crypto asset for another

5 Clues: Information stored in NFTOne of the biggest NFT projectExchanging one crypto asset for anotherCode that grants you access to your crypto walletTechnology that enhances the interconnection between blockchain networks

Networking concept 2025-05-18

Networking concept crossword puzzle
Across
  1. A computer that requests services from a server.
  2. A security device that protects a network from unauthorized access.
  3. (Local Area Network): A network within a small geographic area.
  4. & Privacy:
  5. A group of interconnected devices that can communicate with each other.
  6. (Virtual Private Network): A secure connection that encrypts data and can be used to access a network remotely.
  7. A computer that provides services to other computers on the network.
Down
  1. A common wired network connection.
  2. A device that connects different networks together.
  3. A type of connection that uses radio waves to transmit data.
  4. (Wide Area Network): A network that spans a large geographic area.
  5. A device that forwards data between devices on a network.
  6. of Connections:
  7. A set of rules that govern communication on a network.
  8. Address: A unique numerical address assigned to each device on a network.
  9. Any device connected to a network.

16 Clues: & Privacy:of Connections:A common wired network connection.Any device connected to a network.A computer that requests services from a server.A device that connects different networks together.A set of rules that govern communication on a network.A device that forwards data between devices on a network....

CSP REVIEW 2025-05-02

CSP REVIEW crossword puzzle
Across
  1. Time to do a task sequentially divided by the time to do it in parallel
  2. A type of malware that copies itself
  3. The process of repeating steps in an algorithm
  4. Scientific research, done by individuals, contributing relevant data using their own computing devices
  5. Takes small program with little variables and expands to larger with huge variables
  6. Type of error caused by not following the rules of the language
Down
  1. The study of encryption techniques
  2. A wireless access point that gives unauthorized access to secure networks
  3. A "rule of thumb" to follow in an algorithm to simplify a hard problem
  4. Compression without losing any data at all
  5. Type of problem that cannot be solved with an algorithm of any type
  6. data changing smoothly over time with specific values
  7. Type of computing using multiple computers
  8. Scrambling Data to avoid unauthorized access
  9. ____ time solution that grows exponentially
  10. Data about Data

16 Clues: Data about DataThe study of encryption techniquesA type of malware that copies itselfCompression without losing any data at allType of computing using multiple computers____ time solution that grows exponentiallyScrambling Data to avoid unauthorized accessThe process of repeating steps in an algorithm...

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS 2020-12-22

COMPUTERS, OPERATING SIYSTEMS AND NETWORKS crossword puzzle
Across
  1. also called Memory Pen or Pendrive
  2. It is a set of applications that allow a programmer to develop their own computer programs using their logical knowledge and programming languages
  3. It is the software that allows us to have an interaction with our hardware, that is, the one that controls the CPU and peripherals; It is also called an operating system
  4. An application that has multiple programs
  5. it is the storage medium par excellence. Since the first hard disk came out in 1955 until today, the hard disk or HDD has had a great development
Down
  1. Based on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function
  2. These are the programs that allow us to perform specific tasks in our system
  3. Random Access Memory
  4. also known as mainboard

9 Clues: Random Access Memoryalso known as mainboardalso called Memory Pen or PendriveAn application that has multiple programsThese are the programs that allow us to perform specific tasks in our systemBased on flash memory, but, unlike memory sticks, without drivers, so they need reading units to function...

Privacy in online social networks 2022-06-16

Privacy in online social networks crossword puzzle
Across
  1. which is the privacy settings is not peculiar to Twitter?
  2. Which is not a privacy feature on Instagram?
  3. Which social media company just announced the global launch of ‘Take a Break’, which includes India?
  4. Which of these is usually not kept private on social media?
  5. which technology field is concerned with social media privacy?
Down
  1. Which country proposed the ‘Social Media (Basic Expectations and Defamation) Bill 2021’?
  2. which social media platform launched SMBSaathi Utsav to support small businesses?
  3. How should you make your Facebook account private and secure?
  4. which privacy settings is peculiar to Whatsapp?

9 Clues: Which is not a privacy feature on Instagram?which privacy settings is peculiar to Whatsapp?which is the privacy settings is not peculiar to Twitter?Which of these is usually not kept private on social media?How should you make your Facebook account private and secure?which technology field is concerned with social media privacy?...

Network 2025-03-02

Network crossword puzzle
Across
  1. A global system of interconnected computer networks.
  2. A network that allows controlled access to external partners.
Down
  1. A collection of related web pages.
  2. A private network within an organization.
  3. A system of connected computers.

5 Clues: A system of connected computers.A collection of related web pages.A private network within an organization.A global system of interconnected computer networks.A network that allows controlled access to external partners.

Computer hardware 2022-09-30

Computer hardware crossword puzzle
Across
  1. A mesh network is a local area network topology in which the infrastructure nodes connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to efficiently route data to and from clients
  2. a computer system capable of delivering web content to end users over the internet via a web browser.
  3. networking device that allows wireless-capable devices to connect to a wired network.
  4. A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
  5. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  6. a series of interconnected nodes that can transmit, receive and exchange data, voice and video traffic
Down
  1. a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
  2. the core piece of hardware used for networking connectivity
  3. A star network is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star network is one of the most common computer network topologies.
  4. a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
  5. A wide area network is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits.
  6. a series of computers linked together to form a network in a circumscribed location.

12 Clues: the core piece of hardware used for networking connectivitya series of computers linked together to form a network in a circumscribed location.networking device that allows wireless-capable devices to connect to a wired network.a computer system capable of delivering web content to end users over the internet via a web browser....

Viruses Gaby ^^ 2013-05-01

Viruses Gaby ^^ crossword puzzle
Across
  1. Is a self-replicating program that is harmful to networks
  2. Gaining access to resources on devices by pretending to be a trusted computer.
  3. Is a form of attack that prevents users from accessing normal services.
  4. Are when the user damages data or equipment unintentionally.
Down
  1. Is technically a worm.
  2. Is a file or program other then a virus that is potentially harmful.
  3. It is distrubuted without any user intervation or knowledge
  4. A program written with malicious intent and sent out by attackers.
  5. To send harmful links or deceptive content.
  6. A software program that displays advertising on your computer.

10 Clues: Is technically a worm.To send harmful links or deceptive content.Is a self-replicating program that is harmful to networksIt is distrubuted without any user intervation or knowledgeAre when the user damages data or equipment unintentionally.A software program that displays advertising on your computer....

Wordplay123 2015-01-27

Wordplay123 crossword puzzle
Across
  1. Devices like printer, keyboard, mouse, external hard disk and thumbdrives are connected to the computer using __________
  2. The monitor is connected to the computer using a ____________.
  3. It is used to read and store data.
  4. Hard disks may be internal or __________.
  5. Microsoft Excel is _______ program that can be used to calculate numerical data, store data and make charts
Down
  1. A computer that can be carried around easily
  2. this is a famous philanthropic
  3. This software runs the computer
  4. External networks or devices are connected to the computer using _________
  5. This is used for connection to video and game consoles.

10 Clues: this is a famous philanthropicThis software runs the computerIt is used to read and store data.Hard disks may be internal or __________.A computer that can be carried around easilyThis is used for connection to video and game consoles.The monitor is connected to the computer using a ____________....

Network Basics 2021-02-22

Network Basics crossword puzzle
Across
  1. computers and devices connected together Used to transfer information or files, share resources.
  2. rules and encoding specifications for sending data
  3. electronic mail – sending text, files, images between different computer networks
  4. Strands of glass or plastic used to transmit data using light
  5. a group of computers connected within a building or a campus
Down
  1. how the computers are connected together
  2. device that connects any number of LANs
  3. form of broadcast radio used for mobile communication
  4. a modem that transmits and receives data over the cable television
  5. A set of standards for WLANs based on IEEE 802.11

10 Clues: device that connects any number of LANshow the computers are connected togetherA set of standards for WLANs based on IEEE 802.11rules and encoding specifications for sending dataform of broadcast radio used for mobile communicationa group of computers connected within a building or a campus...

Sample 2021-02-24

Sample crossword puzzle
Across
  1. Vertical series of cells in a table.
  2. A web page is a document or a page on the _____
  3. The way one slide follows the other on the screen during the slide show.
  4. A collection of relevant computer files stored and organised together.
  5. An intersection of a row and columns
Down
  1. Arranging files on the desktop in a proper manner.
  2. ___________ is a small software program that uses computer networks and takes advantage of security weaknesses to replicate.
  3. _____ is an online journal or diary.
  4. Displays data in an organised way in a document.
  5. Collection of information stored together on a computer.

10 Clues: Vertical series of cells in a table._____ is an online journal or diary.An intersection of a row and columnsA web page is a document or a page on the _____Displays data in an organised way in a document.Arranging files on the desktop in a proper manner.Collection of information stored together on a computer....

cyber security 2017-05-12

cyber security crossword puzzle
Across
  1. threat through natural disasters
  2. reviewing or reading data, information or system documentations without permission of the owner
  3. sending to much traffic to a particular computer system
Down
  1. allowing information to pass to any person or organisation without permission
  2. crimes that can only be carried out using computer networks or systems
  3. users can be denied access to services or data which they require and have the permission
  4. cause problems with companies for political reasons
  5. the technician or network manager will take the steps required to remove or reduce the vulnerability
  6. gaining access to computer systems
  7. a remote security scanning tool

10 Clues: a remote security scanning toolthreat through natural disastersgaining access to computer systemscause problems with companies for political reasonssending to much traffic to a particular computer systemcrimes that can only be carried out using computer networks or systemsallowing information to pass to any person or organisation without permission...

Information and Network Security 2023-09-08

Information and Network Security crossword puzzle
Across
  1. coded message
  2. Cause loss of message confidentiality
  3. A security principle that ensures data is accessible only to those authorized to view or modify it.
  4. A secret combination of characters used to authenticate a user's identity
  5. A type of malware that spreads by duplicating itself and infecting other programs
  6. This Ciphers these hide the message by rearranging the letter order
  7. The practice of protecting computer systems and networks from digital attacks.
Down
  1. Causes loss of message integrity
  2. Plain text message may be hidden in image or sound It is not encryption
  3. Is most difficult attack to find out

10 Clues: coded messageCauses loss of message integrityIs most difficult attack to find outCause loss of message confidentialityThis Ciphers these hide the message by rearranging the letter orderPlain text message may be hidden in image or sound It is not encryptionA secret combination of characters used to authenticate a user's identity...

Crossword#10 2023-07-11

Crossword#10 crossword puzzle
Across
  1. - Storing and accessing data and applications remotely over the internet.
  2. - technology to manage business processes and operations.
  3. - Conducting business transactions online.
  4. - Creating virtual versions of computer hardware and software to increase efficiency and reduce costs.
  5. - Working remotely using technology to communicate and collaborate.
  6. - Using technology to automate routine tasks and processes.
Down
  1. - Protecting computer systems and networks from unauthorized access or attacks.
  2. - technology to manage interactions with customers.
  3. - computer system thatcan perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.
  4. - Using data and statistical analysis to inform decision-making.

10 Clues: - Conducting business transactions online.- technology to manage interactions with customers.- technology to manage business processes and operations.- Using technology to automate routine tasks and processes.- Using data and statistical analysis to inform decision-making.- Working remotely using technology to communicate and collaborate....

Mpumalanga Crossword 2023-03-20

Mpumalanga Crossword crossword puzzle
Across
  1. A type of settlement characterised by cities / towns and heavy business / industry
  2. A type of scale you have learnt about
  3. A settlement pattern you would find in a country-side area.
  4. North, East South and West
  5. The colour of the symbols representing vegetation features
Down
  1. An angular measurement from North in a clockwise direction
  2. A grouping of people, activities, building structures and communication networks that function as a single integrated system
  3. A type of settlement characterised by farms / mines
  4. A map type which portrays a specific theme - population / rainfall / temperature
  5. A type of symbol used to portray a road / river / boundary

10 Clues: North, East South and WestA type of scale you have learnt aboutA type of settlement characterised by farms / minesAn angular measurement from North in a clockwise directionA type of symbol used to portray a road / river / boundaryThe colour of the symbols representing vegetation featuresA settlement pattern you would find in a country-side area....

Cross Word 2023-03-17

Cross Word crossword puzzle
Across
  1. A password should have a minimum this number of characters
  2. the button which hides the window in the taskbar
  3. a vertical line that appears and disappears when you are about to start typing
  4. Supplying Water and Fertilizer to plants using these
  5. When we analyze a problem, first we recognize input, .........., and output
  6. Three functions of the mouse are select, open and ...................
Down
  1. every file has two components. One is the file name and the other one is ..................
  2. A large number of interconnected computer networks
  3. Don't upgrade to new devices unnecessarily
  4. Example of a painting software (One of the 3R methods)

10 Clues: Don't upgrade to new devices unnecessarilythe button which hides the window in the taskbarA large number of interconnected computer networksSupplying Water and Fertilizer to plants using theseExample of a painting software (One of the 3R methods)A password should have a minimum this number of characters...

Internet Safety 2021-09-28

Internet Safety crossword puzzle
Across
  1. consisting of letters, capital letters, numbers, and symbols
  2. the ability for one to send private messages on a privet network
  3. the condition of being protected from or unlikely to cause danger, risk, or injury
  4. a group/system connecting everyone
Down
  1. the quality of being friendly, generous, and considerate to others
  2. threatening or being mean to someone on media websites
  3. a global network consisting of multiple networks
  4. is a secret word or phrase that must be used to gain admission to something
  5. sending fraudulent messages to reveal sensitive information
  6. the main means of mass communication on the internet from one to all

10 Clues: a group/system connecting everyonea global network consisting of multiple networksthreatening or being mean to someone on media websitessending fraudulent messages to reveal sensitive informationconsisting of letters, capital letters, numbers, and symbolsthe ability for one to send private messages on a privet network...

Performance Managament 2021-11-19

Performance Managament crossword puzzle
Across
  1. A global system of interconnected networks
  2. A collaborative network which uses the internet to join organizations
  3. Practice of using a network of remote servers hosted on the Internet
  4. Process of thinking regarding the activities required to achieve a desired goal
  5. An internal network used to share information
Down
  1. Regarded as the cognitive process resulting in the selection of a course of action
  2. A network security system
  3. Method of representing data in a visual, machine readable form
  4. Can be used to assess the benefits of the system
  5. An organizational system designed to collect and analyze data

10 Clues: A network security systemA global system of interconnected networksAn internal network used to share informationCan be used to assess the benefits of the systemAn organizational system designed to collect and analyze dataMethod of representing data in a visual, machine readable form...

The Mayan's 2024-01-22

The Mayan's crossword puzzle
Across
  1. This dense forest is where they find their meat, skin, feathers
  2. This place has a hot, wet climate
  3. They lived in the tropical rain forest/they used farming methods
  4. Nobles controlled large plots where corn was grown
  5. The Mayan's worshiped many gods, most of them represent forces of nature, such as rain and lightning
Down
  1. Was a strip of land connecting Asia and North America
  2. in the highlands this has produced rich soils obsidian
  3. This is where the Mayans lived
  4. Have warm temperatures year-round and rain from April to October
  5. Traveling Merchants linked Mayan cities in large TRADE networks

10 Clues: This is where the Mayans livedThis place has a hot, wet climateNobles controlled large plots where corn was grownWas a strip of land connecting Asia and North Americain the highlands this has produced rich soils obsidianThis dense forest is where they find their meat, skin, feathersTraveling Merchants linked Mayan cities in large TRADE networks...

Web development crosswords 2024-11-17

Web development crosswords crossword puzzle
Across
  1. The process of converting data into a secure code to prevent unauthorized access.
  2. A dishonest scheme to steal money or information.
  3. A digital barrier designed to protect networks from unauthorized access.
  4. The trail of data left behind by a person's online activity.
Down
  1. Fraud involving the unauthorized use of someone's personal information.
  2. Revealing too much personal information, especially online.
  3. Using digital platforms to harm or intimidate others.
  4. A model or prototype used to test or showcase a design concept.
  5. Unauthorized access to a computer system or network.
  6. Unwanted or irrelevant messages, often sent in bulk.

10 Clues: A dishonest scheme to steal money or information.Unauthorized access to a computer system or network.Unwanted or irrelevant messages, often sent in bulk.Using digital platforms to harm or intimidate others.Revealing too much personal information, especially online.The trail of data left behind by a person's online activity....

Set 4 2024-11-21

Set 4 crossword puzzle
Across
  1. A cryptographic method to verify the authenticity of a transaction.
  2. A fault tolerance mechanism used to address trust issues in distributed networks.
  3. A type of blockchain managed by multiple organizations.
  4. A decentralized application built on a blockchain network.
  5. A protocol ensuring privacy by proving knowledge of a value without revealing it.
Down
  1. A data structure used to efficiently verify transactions in a blockchain.
  2. The process of locking tokens to support blockchain operations in PoS.
  3. The programming logic that governs blockchain agreements.
  4. The network architecture used in decentralized blockchains.
  5. A blockchain that combines public and private elements.

10 Clues: A blockchain that combines public and private elements.A type of blockchain managed by multiple organizations.The programming logic that governs blockchain agreements.A decentralized application built on a blockchain network.The network architecture used in decentralized blockchains....

Network & System Administration Crossword Challenge 2024-12-08

Network & System Administration Crossword Challenge crossword puzzle
Across
  1. Keeping systems functional through regular updates and repairs.
  2. Making different operating systems work together seamlessly.
  3. A service used to store and manage organizational data in a structured way.
  4. Automating repetitive tasks in system administration.
Down
  1. A principle focused on guiding systems back to their stable state.
  2. The organization of hardware, software, and networks in a system.
  3. A system management concept inspired by how the human body defends itself.
  4. A model where one main system manages the network, often simplifying administration.
  5. A set of rules or guidelines to manage systems.
  6. Adjusting settings to ensure systems work correctly.

10 Clues: A set of rules or guidelines to manage systems.Adjusting settings to ensure systems work correctly.Automating repetitive tasks in system administration.Making different operating systems work together seamlessly.Keeping systems functional through regular updates and repairs.The organization of hardware, software, and networks in a system....

Technology 2025-04-01

Technology crossword puzzle
Across
  1. car Vehicle that runs without gasoline
  2. Entertainment and news broadcasting medium
  3. Essential source of energy for the operation of many appliances.
  4. Portable device that allows you to make calls and send messages.
  5. conditioning Device that regulates the temperature of an enclosed space.
Down
  1. Exchange of information between two or more people.
  2. A system that allows people or goods to be moved from one place to another.
  3. A global network that facilitates access to information and communication.
  4. networks A place where users can share photos, videos, and follow friends or celebrities.
  5. Electronic machine used for work, study, and play.

10 Clues: car Vehicle that runs without gasolineEntertainment and news broadcasting mediumElectronic machine used for work, study, and play.Exchange of information between two or more people.Essential source of energy for the operation of many appliances.Portable device that allows you to make calls and send messages....

Techy Word Search Challenge 2024-04-16

Techy Word Search Challenge crossword puzzle
Across
  1. Information stored and processed by computers, like numbers, text, or images.
  2. Writing instructions for a computer using a programming language.
  3. Machines that can move, sense, and interact with their environment.
  4. The physical parts of a computer that you can touch and see.
  5. A global network that connects computers worldwide.
Down
  1. Protecting computers, networks, and data from cyberattacks.
  2. Instructions for a computer's next move in a game.
  3. Intelligence: Computers that can learn, reason, and make decisions like humans.
  4. Programs that make computers work, like games, word processors, or music players.
  5. Turning information into a secret code to keep it safe from hackers.

10 Clues: Instructions for a computer's next move in a game.A global network that connects computers worldwide.Protecting computers, networks, and data from cyberattacks.The physical parts of a computer that you can touch and see.Writing instructions for a computer using a programming language....

MAJOR 2023-01-23

MAJOR crossword puzzle
Across
  1. small device that use in order to point to a place on a display screen
  2. a wireless technology used to connect computers, smartphones and other devices to the internet
  3. device that connects two or more packet-switched networks or subnetworks
  4. act of identifying and then exploiting weaknesses in a computer system or network
Down
  1. The maximum amount of data transmitted over an internet connection in a given amount of time
  2. process of creating instructions using programming languages
  3. a device to input characters and number
  4. portable computer
  5. electro-mechanical data storage device
  6. part of a computer that does most of the data processing

10 Clues: portable computerelectro-mechanical data storage devicea device to input characters and numberpart of a computer that does most of the data processingprocess of creating instructions using programming languagessmall device that use in order to point to a place on a display screen...

Cables and Insulators 2023-01-04

Cables and Insulators crossword puzzle
Across
  1. -----providing an earthing shield to the current-carrying conductors
  2. ---- efficiency of a suspension insulator
  3. ------- is improved by grading of insulator
  4. is to provide a lower refractive index at the core interface in order to cause reflection in fibre optics
Down
  1. insulators used in distribution networks with low voltage
  2. -----insulator isolates a wire from physical support
  3. used for higher voltage applications and similar to pin type
  4. is more flexible in comparison to armoring
  5. ----insulators are used for V > 11 kV (High)transmission systems
  6. is the process of equalizing the stress in the dielectric of the cable

10 Clues: ---- efficiency of a suspension insulatoris more flexible in comparison to armoring------- is improved by grading of insulator-----insulator isolates a wire from physical supportinsulators used in distribution networks with low voltageused for higher voltage applications and similar to pin type...

Circuit IT Grid 2025-11-20

Circuit IT Grid crossword puzzle
Across
  1. IT devices require rare earth metals and minerals
  2. Are actions that protect the environment
  3. network infrastructure require large amounts of electricity
Down
  1. It is to ensure that the proper recycling is being implemented
  2. the surroundings or conditions in which a person, animal, or plant lives or operates
  3. One example of this is The global internet—cell towers, routers, Wi-Fi networks
  4. the action of one object coming forcibly into contact with another.
  5. It is a best way to avoid toxic pollution
  6. the proper handling, recycling, and disposal of discarded electronic devices
  7. Factories emit greenhouse gases and generate chemical waste.

10 Clues: Are actions that protect the environmentIt is a best way to avoid toxic pollutionIT devices require rare earth metals and mineralsnetwork infrastructure require large amounts of electricityFactories emit greenhouse gases and generate chemical waste.It is to ensure that the proper recycling is being implemented...

Pop Culture 2026-01-21

Pop Culture crossword puzzle
Across
  1. Products sold to promote a brand, artist, or series.
  2. A community of fans who strongly support something or someone.
  3. A popular style, idea, or activity that many people follow for a period of time.
  4. Watching or listening to content online without downloading it.
  5. A person or symbol that represents something important in culture.
  6. A category of music, movies, or books with similar characteristics.
Down
  1. A person who influences people’s opinions or buying decisions online.
  2. A famous person known by many people.
  3. Forms of communication such as TV, social networks, and the internet.
  4. A series of related movies, books, or products.

10 Clues: A famous person known by many people.A series of related movies, books, or products.Products sold to promote a brand, artist, or series.A community of fans who strongly support something or someone.Watching or listening to content online without downloading it.A person or symbol that represents something important in culture....

Communication 2025-09-19

Communication crossword puzzle
Across
  1. Real-time online conversation between two or more people
  2. The global system of interconnected computer networks
  3. Abbreviation for rules that define how data is transmitted over a network
  4. Short text-based messages sent via cell phones or instant messaging apps
  5. Software that allows users to access and navigate the World Wide Web
Down
  1. A document or message that is attached to an email
  2. A meeting conducted over the Internet using video and audio
  3. Messages sent electronically over the Internet, usually requiring an address
  4. A virtual space where people can post and interact
  5. The 'cc' in an email stands for

10 Clues: The 'cc' in an email stands forA document or message that is attached to an emailA virtual space where people can post and interactThe global system of interconnected computer networksReal-time online conversation between two or more peopleA meeting conducted over the Internet using video and audio...

Intro To AI 2026-03-20

Intro To AI crossword puzzle
Across
  1. Technology that allows machines to mimic human thinking (2 words, no space)
  2. Process of finding patterns in large amounts of data
  3. Type of AI used to analyze images and videos (2 words, no space)
Down
  1. A subset of AI where systems learn from data (2 words, no space)
  2. Subset of machine learning using neural networks (2 words, no space)
  3. Used to teach AI systems
  4. AI system inspired by the human brain structure
  5. AI system trained on data to make predictions
  6. Ability of AI to improve performance over time
  7. AI field that helps computers understand human language (abbrev.)

10 Clues: Used to teach AI systemsAI system trained on data to make predictionsAbility of AI to improve performance over timeAI system inspired by the human brain structureProcess of finding patterns in large amounts of dataA subset of AI where systems learn from data (2 words, no space)Type of AI used to analyze images and videos (2 words, no space)...

Cat terms 2023-10-19

Cat terms crossword puzzle
Across
  1. You look at this screen to see what's happening on your computer.
  2. A common pointing device used to control the cursor.
  3. A screen that responds to touch.
  4. Where your files and data are stored on a computer.
  5. Programs and apps fall into this category.
  6. Produces sound output from your computer.
  7. Used to record audio input, like voice.
  8. Physical components like the monitor, keyboard, and mouse.
Down
  1. Used for video conferencing and capturing video input
  2. Connects your computer to the internet.
  3. It provides results or information from the computer.
  4. The "brain" of your computer where processing occurs.
  5. It routes data between networks in your home.
  6. Common port for connecting peripherals to a computer.
  7. A common input device for computers and laptops
  8. This device allows you to enter data into your computer.
  9. This device converts physical documents into digital format.
  10. It produces a hard copy of documents or images.
  11. The part of a computer where information is shown.

19 Clues: A screen that responds to touch.Connects your computer to the internet.Used to record audio input, like voice.Produces sound output from your computer.Programs and apps fall into this category.It routes data between networks in your home.A common input device for computers and laptopsIt produces a hard copy of documents or images....

REVIEW 2020-04-13

REVIEW crossword puzzle
Across
  1. hardware of the supply chain
  2. practice of subcontracting overseas
  3. protects your idea
  4. buying many components and building something bigger
  5. transport networks service utilities
  6. final form of intellectual property rights
  7. an innovation in the use of a new product or service
  8. in terms of operations, how many flows have to operate?
  9. practice of employing another business
Down
  1. buy in large quantitiesof raw materials and turning them into smaller products
  2. managers need to do their utmost to prevent further damage
  3. refers to an organizations attemps to put in place procedures to deal with a crisis
  4. systematic steps and efforts by an organizationto limit the damage from a sudden crisis
  5. software of the supply chain
  6. form of innovation directly associated with the technical development of existing products
  7. protects written material and artis forms
  8. wide system of connected organizations
  9. cintingency planning will have to assess a range of pssible
  10. traditional method of stock control

19 Clues: protects your ideahardware of the supply chainsoftware of the supply chainpractice of subcontracting overseastraditional method of stock controltransport networks service utilitieswide system of connected organizationspractice of employing another businessprotects written material and artis formsfinal form of intellectual property rights...

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Networking concepts 2023-08-11

Networking concepts crossword puzzle
Across
  1. a method of connecting to a network like a company network across an unsecure network.
  2. uses laser technology to send one beam of light.
  3. receives data on one port and sends to all other ports.
  4. commonly uses Bluetooth to connect mice, keyboards, phones, and tablets.
  5. Very little overhead or data checking.
  6. used in cable TV systems and satellite communication systems.
  7. connects networks.
  8. extends beyond traditional LAN and groups users based on administratively defined boundaries.
  9. can support up to 100 Mbps.
Down
  1. always-on technology that uses phone lines.
  2. relies on cell towers to create a network used by cell phones and connectivity to the internet.
  3. passive or active tags used to identify items.
  4. wire strippers, wire cutters, tone generators, etc.
  5. a network that spans the city.
  6. uses different frequencies to send multiple signals over media
  7. provides access to a wireless network for a limited range.
  8. broadband technology for remote areas.
  9. device built into something else, like an appliance.
  10. translates domain names to an IP address.

19 Clues: connects networks.can support up to 100 Mbps.a network that spans the city.Very little overhead or data checking.broadband technology for remote areas.translates domain names to an IP address.always-on technology that uses phone lines.passive or active tags used to identify items.uses laser technology to send one beam of light....

Braymond-Network devices 2023-01-03

Braymond-Network devices crossword puzzle
Across
  1. regenerates weak signals.
  2. builds apon ids technology
  3. receive data on one port and then send it out to all other ports
  4. network systems that are no longer supported but still in operation
  5. monitors all the end devices in your network
  6. allows network administrators to manage network devices
  7. uses existing power writing to connect devices
Down
  1. protects data and equipment on a network from unauthorized access
  2. provides network access to wireless devices such as laptops and tablets
  3. use ip addresses to forward traffic to other networks
  4. performs the important function of addressing data.
  5. low cost, microsegments a LAN
  6. passively monitors traffic on the network
  7. all in one security appliance
  8. distributed denial of service
  9. place to collect incoming cable runs from the various networking devices
  10. denial of survice
  11. method for powering devices that don't have a battery
  12. keeps a record of all the devices on each segment

19 Clues: denial of surviceregenerates weak signals.builds apon ids technologylow cost, microsegments a LANall in one security appliancedistributed denial of servicepassively monitors traffic on the networkmonitors all the end devices in your networkuses existing power writing to connect deviceskeeps a record of all the devices on each segment...

OBretoi - Network devices 2023-01-03

OBretoi - Network devices crossword puzzle
Across
  1. Protects data and equipment from unauthorized access on a network
  2. power over _________
  3. a _____ based network system allows network administrators to manage network devices
  4. a patch panel connects _____
  5. receives data on one port and sends it out on all the other ports
  6. ethernet over power also known as ______ networking
  7. a Bridge ______ a LAN into segments
  8. provides all the functionality of a IDS and IPS as well as firewall services.
Down
  1. a repeater regenerates the strength of a weak _____
  2. a wireless access point provides connectivity to only the ______
  3. micro segments a lan
  4. The I in NIC
  5. systems that are no longer supported
  6. a IDS _____ a malicious traffic to pass before addressing
  7. copies and sends traffic to a management station
  8. uses ip addresses to connect other networks
  9. a ______ management server puts the view of all devices on a single interface
  10. a _____ microchip is normally dedicated to a specific task
  11. evaluates traffic before sending it to the destination

19 Clues: The I in NICmicro segments a lanpower over _________a patch panel connects _____a Bridge ______ a LAN into segmentssystems that are no longer supporteduses ip addresses to connect other networkscopies and sends traffic to a management stationa repeater regenerates the strength of a weak _____ethernet over power also known as ______ networking...

Chapter 9 Crossword 2024-10-24

Chapter 9 Crossword crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16

REV Cybersecurity Awareness Crossword Puzzle #2 crossword puzzle
Across
  1. a method, often secret, of bypassing normal authentication in a product.
  2. any malicious computer program which is used to hack into a computer by misleading users of its true intent.
  3. used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
  4. a local or restricted communications network, especially a private network created using World Wide Web software.
  5. body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  6. a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
  7. made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
  8. a standalone malware computer program that replicates itself in order to spread to other computers.
  9. an attempt by hackers to damage or destroy a computer network or system.
  10. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
  11. are small files that Web sites put on your computer hard disk drive when you first visit.
Down
  1. someone who seeks and exploits weaknesses in a computer system or computer network.
  2. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
  3. are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
  4. global system of interconnected computer networks that use the Internet protocol suite.
  5. designed to detect and destroy computer viruses.
  6. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  7. any software program in which advertising banners are displayed while the program is running.
  8. the activity of defrauding an online account holder of financial information by posing as a legitimate company.

19 Clues: designed to detect and destroy computer viruses.a method, often secret, of bypassing normal authentication in a product.an attempt by hackers to damage or destroy a computer network or system.someone who seeks and exploits weaknesses in a computer system or computer network....

Cybersecurity 2 Honors Vocab 2026-03-02

Cybersecurity 2 Honors Vocab crossword puzzle
Across
  1. = files that appear to be legitimate programs, but really contain malicious code.
  2. = a broader, often scheduled release of software that includes, but is not limited to, patches.
  3. = specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).Vulnerability = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  4. = the process of converting readable data (plaintext) into an unreadable, scrambled format (ciphertext) using cryptographic algorithms.
  5. = A security flaw, glitch, or weakness found in software code that could be exploited by an attacker (threat source).
  6. = refers to the extent to which individuals understand that there are potential threats to the information systems they use and the measures they should take to mitigate those threats.
  7. = a collection of internet connected devices such as computers, smartphones, or IoT devices infected with malware and controlled remotely by a single attacker
Down
  1. = proactive strategies, policies, and technologies implemented to reduce the likelihood and impact of cyber threats on an organization's digital assets
  2. = the process of securing a system by reducing its surface of vulnerability
  3. = program that blocks access to files or block use of the device until a ransom is paid
  4. = a network security system that acts as a barrier between a trusted internal network and untrusted external networks (like the Internet).
  5. = any potential malicious act, event, or person aiming to illegally access, damage, disrupt, or steal data, networks, or digital devices
  6. = a set of rules, regulations, and guidelines that dictate how an organization protects its data and IT infrastructure.
  7. Day = an attack that takes advantage of code flaws that have VERY recently been discovered.
  8. = The use of bogus emails and websites to trick you into confidential information
  9. = is a programmatic approach to educating staff on information security risks, including e-learning, newsletters, and simulations (e.g., phishing campaigns) to change behavior and reduce human error.
  10. = a set of changes (code updates) to a computer program or its supporting data designed to update, fix, or improve it.
  11. Control = a security method that regulates who or what can view or use resources in a computing environment.
  12. = any code or application designed to damage, disrupt, or steal data from computer systems

19 Clues: = the process of securing a system by reducing its surface of vulnerability= files that appear to be legitimate programs, but really contain malicious code.= The use of bogus emails and websites to trick you into confidential information= program that blocks access to files or block use of the device until a ransom is paid...

Internet saftey 2025-02-26

Internet saftey crossword puzzle
Across
  1. the information about a particular person that exists on the internet as a result of their online activity.
  2. to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
  3. Flaming is distinct from trolling, which is the act of someone causing discord online or in person.
  4. the correct or acceptable way of communicating on the internet.
  5. the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
  6. controls available on many websites and apps to limit who can access your profile and what information visitors can see.
  7. talk in a friendly and informal way.
  8. the practice of protecting systems, networks, and programs from digital attacks.
  9. the practice of preparing or training someone for a particular purpose or activity.
Down
  1. shutting down or misusing websites or computer networks; spreading hate and inciting terrorism; distributing child pornography; grooming: making sexual advances to minors.
  2. the practice whereby a group of people assault a stranger at random while filming the incident on a mobile device, so as to circulate the images or post them online.
  3. using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
  4. A blog is a space where an individual, group, or organization can publish articles (also known as posts) on a regular basis. Blogs tend to include timely, relevant and updated content.
  5. attention-seeking behavior
  6. remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.
  7. unauthorized reproduction or distribution of someone's intellectual property without their consent.
  8. Ransomware is a type of malware (malicious software) designed to deny access to a user's data, usually by encrypting the data with a key known only to the hacker who deployed the malware, until a ransom is paid. Since 2018, there has been a 264% increase in large breaches reported to OCR involving ransomware attack
  9. a person who ruthlessly exploits others.
  10. someone who uses the internet, email, or other electronic communications devices to repeatedly threaten and harass another person.

19 Clues: attention-seeking behaviortalk in a friendly and informal way.a person who ruthlessly exploits others.the correct or acceptable way of communicating on the internet.the practice of protecting systems, networks, and programs from digital attacks.the practice of preparing or training someone for a particular purpose or activity....

The Internet 2022-01-14

The Internet crossword puzzle
Across
  1. The standard way to connect computers on a network over a wired connection.
  2. Application software for accessing the world wide web.
  3. A vast network that connects computers all over the world.
  4. A hypertext document on the world wide web
  5. A series of numbers that identifies any device on a network
  6. The address of a webpage
Down
  1. A software program that helps people find the information they are looking for online using keywords or phrases.
  2. A networking device that forwards data packets between computer networks
  3. Two or more computers linked together.
  4. A wireless technology used to connect electronic devices.

10 Clues: The address of a webpageTwo or more computers linked together.A hypertext document on the world wide webApplication software for accessing the world wide web.A wireless technology used to connect electronic devices.A vast network that connects computers all over the world.A series of numbers that identifies any device on a network...

supplier buyer relationships 2013-02-18

supplier buyer relationships crossword puzzle
Across
  1. / moving beyond local & national levels of trade
  2. / raw materials and products arrive in time for manufacturing or services
  3. / a company which supplies parts or services to another company
  4. / a role of logistics
  5. / process after choosing supplier
  6. / procurement strategy in which businesses look to find most cost efficient location
  7. / any person who who contracts to acquire an asset
Down
  1. / firm with little or no presence or infrastructure reliant on telecoms and networks
  2. / managing the flow of goods, information and finances from the source to the buyer
  3. / delighting the customer by fully meeting their needs and expectations

10 Clues: / a role of logistics/ process after choosing supplier/ moving beyond local & national levels of trade/ any person who who contracts to acquire an asset/ a company which supplies parts or services to another company/ delighting the customer by fully meeting their needs and expectations...

INTEGRITY CHALLENGE 2023-03-14

INTEGRITY CHALLENGE crossword puzzle
Across
  1. Principles or standards of behavior.
  2. Take responsibility.
  3. Giving up or losing something as a penalty for wrongdoing.
  4. Being upright.
  5. Stop corruption from happening or arising.
  6. Interruption of corruption networks, activity, or processes.
Down
  1. Take advantage or gain in a dishonest manner in the performance of public duties/ Payment for services performed in an official matter where no compensation is due for personal gain.
  2. Concealing the origins of (money obtained illegally), typically by transfers involving foreign banks or legitimate businesses.
  3. Guiding or directing a group of people or an organization.
  4. Compelling observance of or compliance with the law.

10 Clues: Being upright.Take responsibility.Principles or standards of behavior.Stop corruption from happening or arising.Compelling observance of or compliance with the law.Guiding or directing a group of people or an organization.Giving up or losing something as a penalty for wrongdoing.Interruption of corruption networks, activity, or processes....