networks Crossword Puzzles

supplier buyer relationships 2013-02-18

supplier buyer relationships crossword puzzle
Across
  1. / moving beyond local & national levels of trade
  2. / raw materials and products arrive in time for manufacturing or services
  3. / a company which supplies parts or services to another company
  4. / a role of logistics
  5. / process after choosing supplier
  6. / procurement strategy in which businesses look to find most cost efficient location
  7. / any person who who contracts to acquire an asset
Down
  1. / firm with little or no presence or infrastructure reliant on telecoms and networks
  2. / managing the flow of goods, information and finances from the source to the buyer
  3. / delighting the customer by fully meeting their needs and expectations

10 Clues: / a role of logistics/ process after choosing supplier/ moving beyond local & national levels of trade/ any person who who contracts to acquire an asset/ a company which supplies parts or services to another company/ delighting the customer by fully meeting their needs and expectations...

INTEGRITY CHALLENGE 2023-03-14

INTEGRITY CHALLENGE crossword puzzle
Across
  1. Principles or standards of behavior.
  2. Take responsibility.
  3. Giving up or losing something as a penalty for wrongdoing.
  4. Being upright.
  5. Stop corruption from happening or arising.
  6. Interruption of corruption networks, activity, or processes.
Down
  1. Take advantage or gain in a dishonest manner in the performance of public duties/ Payment for services performed in an official matter where no compensation is due for personal gain.
  2. Concealing the origins of (money obtained illegally), typically by transfers involving foreign banks or legitimate businesses.
  3. Guiding or directing a group of people or an organization.
  4. Compelling observance of or compliance with the law.

10 Clues: Being upright.Take responsibility.Principles or standards of behavior.Stop corruption from happening or arising.Compelling observance of or compliance with the law.Guiding or directing a group of people or an organization.Giving up or losing something as a penalty for wrongdoing.Interruption of corruption networks, activity, or processes....

Whaine V. ~ 7/8 Internet Safety CrossWord! 2021-01-29

Whaine V. ~ 7/8 Internet Safety CrossWord! crossword puzzle
Across
  1. Sharing someone’s secrets or embarrassing information online
  2. A hostile and insulting interaction between internet users.
  3. An image that is captured of what is shown on a phone, tablet, or computer screen
  4. A technology that allows us to access our files through the internet from anywhere in the world.
  5. An Internet service that helps you search for information on the web
  6. Someone who posts rude or off-topic messages in an online community
Down
  1. Online communities, also known as social networks
  2. Setting up a fake online profile
  3. malware,cyber-destroyer, break your technology
  4. Rules or manners for interacting courteously with others online

10 Clues: Setting up a fake online profilemalware,cyber-destroyer, break your technologyOnline communities, also known as social networksA hostile and insulting interaction between internet users.Sharing someone’s secrets or embarrassing information onlineRules or manners for interacting courteously with others online...

TECHNOLOGY 2021-10-07

TECHNOLOGY crossword puzzle
Across
  1. ​introducing or using new ideas, ways of doing something, etc.
  2. no longer used because something new has been invented
  3. too important to be without
  4. having a good knowledge and understanding of modern technology, especially computers
  5. a person who fears, dislikes or avoids new technology
Down
  1. the utilization of imagination or original ideas to generate something
  2. develop (something) to a higher standard, especially (equipment or machinery) by adding or replacing components
  3. of only average quality, not very good
  4. a small tool or device that does something useful
  5. relating to, or involving computers or computer networks (as the Internet)

10 Clues: too important to be withoutof only average quality, not very gooda small tool or device that does something usefula person who fears, dislikes or avoids new technologyno longer used because something new has been invented​introducing or using new ideas, ways of doing something, etc....

Directions: Use the clues below to fill in the crossword puzzle with the correct words. 2022-05-07

Directions:  Use the clues below to fill in the crossword puzzle with the correct words. crossword puzzle
Across
  1. To sing, dance, act, read a poem, etc. in front of people.
  2. The first public appearance of a new product or show
  3. To organized people or things into a group or body.
  4. Very, very strong feeling
  5. How you are liked, admired, supported by many people.
Down
  1. Being one part of something.
  2. More than two but not many.
  3. To do something you really wanted to do.
  4. Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
  5. media Websites and apps (applications) that that let people create and share things online, or to join social networks.

10 Clues: Very, very strong feelingMore than two but not many.Being one part of something.To do something you really wanted to do.To organized people or things into a group or body.The first public appearance of a new product or showHow you are liked, admired, supported by many people.To sing, dance, act, read a poem, etc. in front of people....

Cyber bullying 2023-10-26

Cyber bullying crossword puzzle
Across
  1. , sending messages from a mobile phone
  2. , form of cyber bullying
  3. , worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  4. , a social media app that lets you take and upload photos for people to like, comment on and share
  5. , social media website beginning with F
Down
  1. , intentional emotional harm through devices like computers and phones
  2. , a wireless handheld device used for calls and messaging
  3. , making a statement of intention to cause harm to someone
  4. , an image showing what is on a phone or computer screen
  5. , words or actions intended to annoy, or abuse others

10 Clues: , form of cyber bullying, sending messages from a mobile phone, social media website beginning with F, words or actions intended to annoy, or abuse others, an image showing what is on a phone or computer screen, a wireless handheld device used for calls and messaging...

Basic IT 2024-05-09

Basic IT crossword puzzle
Across
  1. Device that connects two or more networks together
  2. ______ technology uses computers to control physical processes
  3. A network within a small area
  4. The "A" in CIA Triad
  5. Used for remote monitoring and control of field devices
  6. Monitors and controls processes both locally and remotely by collecting, recording, and analyzing data in real time
Down
  1. ______ Logic Controller is a ruggedized computer used for industrial automation that automate a specific process or machine function
  2. A computer that runs centralized applications and databases
  3. Collection of instructions that enable machines to perform specific tasks
  4. connects devices in a network to each other, enabling them to communicate

10 Clues: The "A" in CIA TriadA network within a small areaDevice that connects two or more networks togetherUsed for remote monitoring and control of field devicesA computer that runs centralized applications and databases______ technology uses computers to control physical processesCollection of instructions that enable machines to perform specific tasks...

1 2024-01-31

1 crossword puzzle
Across
  1. Placing text on a webpage that is invisible to users but readable by search engines.
  2. Redirecting users to irrelevant or unrelated webpages for SEO gain.
  3. Creating low-quality pages optimized for specific keywords to funnel traffic.
  4. Unethical techniques used to manipulate search engine rankings.
  5. Showing different content to search engines than what users see.
Down
  1. Excessively using keywords to manipulate search engine algorithms.
  2. Copying content from other websites without permission for SEO purposes.
  3. Deliberately harming competitors' search engine rankings through malicious tactics.
  4. Overloading websites with irrelevant links to artificially boost rankings.
  5. Creating networks of blogs solely for the purpose of link manipulation.

10 Clues: Unethical techniques used to manipulate search engine rankings.Showing different content to search engines than what users see.Excessively using keywords to manipulate search engine algorithms.Redirecting users to irrelevant or unrelated webpages for SEO gain.Creating networks of blogs solely for the purpose of link manipulation....

Theme: Computers 2024-07-24

Theme: Computers crossword puzzle
Across
  1. A small handheld device used to control a cursor on a computer screen
  2. A screen used to display information from a computer
  3. Software designed to detect and destroy computer viruses
  4. The part of a computer that performs calculations
Down
  1. A set of keys used to input data into a computer
  2. Programs and other operating information used by a computer
  3. A device that forwards data packets between computer networks
  4. A device that produces printed copies of documents
  5. A device used to store data on a computer
  6. A common interface used to connect devices to a computer

10 Clues: A device used to store data on a computerA set of keys used to input data into a computerThe part of a computer that performs calculationsA device that produces printed copies of documentsA screen used to display information from a computerSoftware designed to detect and destroy computer viruses...

LOGIC LATTICE 2024-02-16

LOGIC LATTICE crossword puzzle
Across
  1. Measures taken to protect computer systems and networks from unauthorized access or attacks.
  2. Software used to access and view websites on the internet.
  3. The manipulation of matter on an atomic or molecular scale.
Down
  1. Digital or virtual currency that uses cryptography for security.
  2. A structured set of data stored electronically.
  3. Software that is embedded into hardware devices.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. Programs and applications that run on computers and other devices.
  6. The process of converting data into a code to prevent unauthorized access.
  7. A step-by-step procedure for solving a problem.

10 Clues: A structured set of data stored electronically.A step-by-step procedure for solving a problem.Software that is embedded into hardware devices.Software used to access and view websites on the internet.The manipulation of matter on an atomic or molecular scale.Digital or virtual currency that uses cryptography for security....

!WARNING! VERY DIDFICULT - Kalim, Andrija 2024-10-15

!WARNING! VERY DIDFICULT - Kalim, Andrija crossword puzzle
Across
  1. a law that says that people cant go outside after a particular time of night
  2. it can wash and dry clothes
  3. space for plqying and enjoying games
  4. place where poeple can gather,relax and sozialize
  5. a small machine used for drying your hair
Down
  1. sheets and pillowcase for a bed
  2. a secure storage where people can temporarily store their items
  3. an internacionalni computer network connecting other networks and computers that allowy people to share information
  4. a service that allows people to rent towels for temporary use
  5. a building in which collections of books,newspapers and films can be borrowed

10 Clues: it can wash and dry clothessheets and pillowcase for a bedspace for plqying and enjoying gamesa small machine used for drying your hairplace where poeple can gather,relax and sozializea service that allows people to rent towels for temporary usea secure storage where people can temporarily store their items...

iSec CrossWord 2024-11-27

iSec CrossWord crossword puzzle
Across
  1. software tool designed to detect and remove malicious software
  2. Formal review to ensure that security measures are effective and policies are followed
  3. A strategy for protecting sensitive data while it’s being transmitted across networks
  4. framework for managing organizational risks
Down
  1. The process of verifying the identity of a user or system
  2. Information that directly or indirectly links to a person is considered
  3. A system used to monitor and control network traffic
  4. legal requirement for companies processing EU citizens’ data.
  5. An international standard for information security management systems.
  6. cyberattack that floods a network to make it unavailable.

10 Clues: framework for managing organizational risksA system used to monitor and control network trafficThe process of verifying the identity of a user or systemcyberattack that floods a network to make it unavailable.legal requirement for companies processing EU citizens’ data.software tool designed to detect and remove malicious software...

5G pillars 2024-11-20

5G pillars crossword puzzle
Across
  1. The maximum data transfer rate of a network.
  2. The range of frequencies used for wireless communication.
  3. Enhanced mobile broadband for faster and higher-capacity internet.
  4. Slicing Technology that allows the creation of multiple virtual networks.
  5. The delay in transmitting and receiving data in a 5G network.
Down
  1. IoT A 5G pillar enabling connectivity for billions of devices.
  2. Computing Processing data near the source rather than in a centralized location.
  3. Technology using multiple antennas to improve communication in 5G.
  4. Ultra-reliable low-latency communication in 5G systems.
  5. The intermediate connection between the core network and the local network.

10 Clues: The maximum data transfer rate of a network.Ultra-reliable low-latency communication in 5G systems.The range of frequencies used for wireless communication.The delay in transmitting and receiving data in a 5G network.IoT A 5G pillar enabling connectivity for billions of devices.Technology using multiple antennas to improve communication in 5G....

Lesson 3 2025-03-04

Lesson 3 crossword puzzle
Across
  1. A protocol required to access the Internet
  2. A device that connects private LANs to public WANs
  3. A device that forwards data packets between networks
  4. A type of network that covers a small geographic area, like a university
  5. The process of copying a file from a server to your device
Down
  1. The process of continuously receiving a file in a steady flow
  2. The technology used to connect computers using cables
  3. A local network that supports wireless connections
  4. A wide area network that covers large geographical regions
  5. A unique identifier for a device connected to a network

10 Clues: A protocol required to access the InternetA device that connects private LANs to public WANsA local network that supports wireless connectionsA device that forwards data packets between networksThe technology used to connect computers using cablesA unique identifier for a device connected to a network...

Tech Crosswords 2025-09-19

Tech Crosswords crossword puzzle
Across
  1. A system of remote servers for storing data online.
  2. A device that forwards data packets between computer networks.
  3. A single point in a graphic image.
  4. A set of instructions for a computer.
  5. A hardware or software component that stores data so that future requests for that data can be served faster.
Down
  1. A step-by-step procedure for solving a problem.
  2. A popular programming language named after a comedy troupe.
  3. A computer or system that provides resources or services to other computers.
  4. The address of a resource on the Internet.
  5. An organized collection of structured data.

10 Clues: A single point in a graphic image.A set of instructions for a computer.The address of a resource on the Internet.An organized collection of structured data.A step-by-step procedure for solving a problem.A system of remote servers for storing data online.A popular programming language named after a comedy troupe....

CAT Concepts Crossword 2025-09-24

CAT Concepts Crossword crossword puzzle
Across
  1. A type of memory that is temporary and loses data when power is off.
  2. The process of copying data to a storage device for future use.
  3. The physical parts of a computer are known as ___.
  4. Data sent over the internet is broken into small units called ___.
  5. A set of rules used for communication between devices.
  6. The main circuit board of a computer.
  7. A popular spreadsheet application used in CAT.
Down
  1. Software that is designed to harm or disrupt a system.
  2. The global system of interconnected computer networks.
  3. This person writes and tests code to create software applications.

10 Clues: The main circuit board of a computer.A popular spreadsheet application used in CAT.The physical parts of a computer are known as ___.Software that is designed to harm or disrupt a system.The global system of interconnected computer networks.A set of rules used for communication between devices....

CAT Concepts Crossword 2025-09-24

CAT Concepts Crossword crossword puzzle
Across
  1. A type of memory that is temporary and loses data when power is off.
  2. The process of copying data to a storage device for future use.
  3. The physical parts of a computer are known as ___.
  4. Data sent over the internet is broken into small units called ___.
  5. A set of rules used for communication between devices.
  6. The main circuit board of a computer.
  7. A popular spreadsheet application used in CAT.
Down
  1. Software that is designed to harm or disrupt a system.
  2. The global system of interconnected computer networks.
  3. This person writes and tests code to create software applications.

10 Clues: The main circuit board of a computer.A popular spreadsheet application used in CAT.The physical parts of a computer are known as ___.Software that is designed to harm or disrupt a system.The global system of interconnected computer networks.A set of rules used for communication between devices....

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Security Protecting data and systems hosted on remote servers.
  3. Following rules, regulations, and standards in cybersecurity.
  4. A formal review of systems and processes to ensure security and compliance.
  5. Manipulating people into giving up confidential information.
Down
  1. The practice of protecting systems, networks, and data from digital threats.
  2. Ensuring data is accurate and has not been tampered with.
  3. Surfing A sneaky way to steal information by watching someone type their password.
  4. An unexpected event that compromises the integrity or availability of data.
  5. Software designed to detect and remove malicious programs.

10 Clues: Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

InfoSec Puzzle Quest 2025-09-04

InfoSec Puzzle Quest crossword puzzle
Across
  1. A type of malicious software that can replicate and spread.
  2. Software designed to detect and remove malicious programs.
  3. A formal review of systems and processes to ensure security and compliance.
  4. Manipulating people into giving up confidential information.
Down
  1. A sneaky way to steal information by watching someone type their password.
  2. The practice of protecting systems, networks, and data from digital threats.
  3. Protecting data and systems hosted on remote servers.
  4. Following rules, regulations, and standards in cybersecurity.
  5. An unexpected event that compromises the integrity or availability of data.
  6. Ensuring data is accurate and has not been tampered with.

10 Clues: Protecting data and systems hosted on remote servers.Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

Lock & Key: An Information Security Challenge 3 2025-12-01

Lock & Key: An Information Security Challenge 3 crossword puzzle
Across
  1. Software designed to detect and remove malicious programs.
  2. Following rules, regulations, and standards in cybersecurity.
  3. Manipulating people into giving up confidential information.
  4. The practice of protecting systems, networks, and data from digital threats.
  5. Protecting data and systems hosted on remote servers.
Down
  1. A sneaky way to steal information by watching someone type their password.
  2. Ensuring data is accurate and has not been tampered with.
  3. An unexpected event that compromises the integrity or availability of data.
  4. A type of malicious software that can replicate and spread.
  5. A formal review of systems and processes to ensure security and compliance.

10 Clues: Protecting data and systems hosted on remote servers.Ensuring data is accurate and has not been tampered with.Software designed to detect and remove malicious programs.A type of malicious software that can replicate and spread.Manipulating people into giving up confidential information.Following rules, regulations, and standards in cybersecurity....

henry morris ict 2026-01-22

henry morris ict crossword puzzle
Across
  1. process of converting data into an unreadable format to protect it from unauthorized access
  2. process of sharing a mobile device's internet connection with other devices, such as laptops or tablets
  3. testing
  4. horse
  5. hat hacker
  6. with malicious intentions who gain unauthorized access to computer networks and systems
Down
  1. where malicious actors send deceptive messages—typically via email, social media, or text
  2. of malware that disguises itself as a legitimate program to trick users into installing it, allowing unauthorized access to their systems.
  3. factor authentication
  4. a cyberattack that redirects users from legitimate websites to fake ones, often without their knowledge
  5. security by requiring two distinct forms of identity verification before granting access to an account or service
  6. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system

12 Clues: horsetestinghat hackerfactor authenticationwith malicious intentions who gain unauthorized access to computer networks and systemswhere malicious actors send deceptive messages—typically via email, social media, or textprocess of converting data into an unreadable format to protect it from unauthorized access...

Aliyah Caballero 2013-03-27

Aliyah Caballero crossword puzzle
Across
  1. A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
  2. (HOST)Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
  3. Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
  4. the unauthorized use, reproduction, distribution, or transmission of copyrighted material. (like pirates – its stealing)
  5. An unauthorized person who secretly gains access to computer files.
  6. USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
  7. Originally known as Web Log. Blogs are websites that contains dated text entries, generally listed in reverse chronological order (most recent first) about a particular topic.
Down
  1. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
  2. To renew or revitalize; To reload a webpage on the internet
  3. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  4. TABS the name for a way to display information on websites. Website tabs resemble manilla folder tabs – that part of the folder that sticks out so it can be labeled and seen. Clicking the tab shows you different views/websites in the same browser.
  5. NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)

12 Clues: To renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)...

Review: Internet Threats 2016-07-14

Review: Internet Threats crossword puzzle
Across
  1. / used to record the keystrokes done by user
  2. / a crime committed through the use of internet
  3. / tricks the user into posing that it is a security software
  4. / a malicious software
  5. / runs in the background and monitors what you are doing
  6. / sends an official looking email and is designed to steal sensitive personal information
  7. / designed to send advertisements
  8. / also called the information superhighway
  9. / malicious program that transfer from one computer to the other by any means
Down
  1. / a browsing feature that is synonymous to private browsing
  2. / replicates and can transfer from one computer to the other through the internet and local networks or data storage
  3. / the use of electronic communication to bully a person
  4. / expoits the DNS system
  5. / unwanted email mostly from bots or advertisers
  6. / disguised as useful program but is not

15 Clues: / a malicious software/ expoits the DNS system/ designed to send advertisements/ disguised as useful program but is not/ also called the information superhighway/ used to record the keystrokes done by user/ a crime committed through the use of internet/ unwanted email mostly from bots or advertisers...

Virus- Alexis Goodney 2018-11-15

Virus- Alexis Goodney crossword puzzle
Across
  1. an unwanted piece of software that does something to your computer
  2. a person who uses computers to gain unauthorized info
  3. messages distributed to recipients via a network
  4. collection of data instructions that tells a computer what to do
  5. good hacker who hacks to find out how a companies system is faulty
  6. protection of computer systems
Down
  1. blocking servers, clogging up networks so they can't get to real costumers
  2. a strategy that pretends to be something it isn't
  3. violates security for personal gain
  4. something that enters your network's system then duplicates itself and spreads via the network
  5. programming instructions
  6. the attempt to obtain personal information by disguising yourself as a reliable company
  7. a reason why someone might send you a virus
  8. software intended to disable computers
  9. a type of computer virus

15 Clues: programming instructionsa type of computer virusprotection of computer systemsviolates security for personal gainsoftware intended to disable computersa reason why someone might send you a virusmessages distributed to recipients via a networka strategy that pretends to be something it isn'ta person who uses computers to gain unauthorized info...

Globalisation 2013-02-20

Globalisation crossword puzzle
Across
  1. basic, underlying framework or features of a system or organization
  2. process or act of migrating
  3. act of globalizing, or extending to other or all parts of the world
  4. investing of money or capital
  5. computer network linking smaller computer networks worldwide
Down
  1. person or thing that consumes
  2. beyond national boundaries or interests
  3. particular form or stage of civilization
  4. act or instance of integrating a racial, religious, or ethnic group
  5. convey (cargo) in standard-sized containers
  6. management; frugality in the expenditure or consumption of money, materials
  7. act or process of buying, selling, or exchanging commodities
  8. right or license granted by a company to an individual or group to market its products
  9. quality or state of being sovereign
  10. natural body that revolves around a planet

15 Clues: process or act of migratingperson or thing that consumesinvesting of money or capitalquality or state of being sovereignbeyond national boundaries or interestsparticular form or stage of civilizationnatural body that revolves around a planetconvey (cargo) in standard-sized containersact or process of buying, selling, or exchanging commodities...

Andalucia 2014-01-06

Andalucia crossword puzzle
Across
  1. Andalucia is located __________ of the Iberian Peninsula
  2. Andalucia is located _________ of the Atlantic Ocean and Portugal
  3. A continuing tradition along the coasts of Andalucia
  4. Andalucia's capital
  5. Andalucia experiences a _______________ climate
  6. What are old mosques used for in Andalucia?
  7. Andalucia is located in __________
  8. A town located in Andalucia that has a lot of history to see
Down
  1. Andalucia came under ________ control in the 8th Century when Arab raiders from the East captured the region from the German Visigoths.
  2. Andalucia consists of _____ provinces
  3. Andalucia has a population of about 8.45 ________
  4. Andalucia is one of the ________ independent communities of Spain
  5. Civil War The country's losses in the Napoleonic and the Spanish-American Wars caused which war to begin?
  6. Banus A luxury marina and shopping complex located in Andalucia
  7. Networks A type of transportation within Andalucia

15 Clues: Andalucia's capitalAndalucia is located in __________Andalucia consists of _____ provincesWhat are old mosques used for in Andalucia?Andalucia experiences a _______________ climateAndalucia has a population of about 8.45 ________Networks A type of transportation within AndaluciaA continuing tradition along the coasts of Andalucia...

Chapter 7 Building Vocabulary 2023-02-10

Chapter 7 Building Vocabulary crossword puzzle
Across
  1. Fifth principle of vocabulary building that relates to exposure
  2. For maximum benefit, it is important that experiences be
  3. form the foundation of vocabulary
  4. A word family is a core word plus it's endings
  5. Part of developing a depth of understanding of words is clarifying
  6. attributes of learning a word are meaning, pronunciation, spelling, morphology, and syntax
Down
  1. Teachers have to help students forge among new words
  2. Words are learned gradually and in
  3. Something between a known concept and a new label for that context
  4. Words are learned faster when introduced at the level
  5. teaching readers new strategies to derive meanings of words helps them become better independent word learners
  6. Most frequent method of teaching new words
  7. Number of encounters before a word is learned
  8. Generating __ in new words is important
  9. Concepts are organized into

15 Clues: Concepts are organized intoform the foundation of vocabularyWords are learned gradually and inGenerating __ in new words is importantMost frequent method of teaching new wordsNumber of encounters before a word is learnedA word family is a core word plus it's endingsTeachers have to help students forge among new words...

Job vocabulary 2024-04-30

Job vocabulary crossword puzzle
Across
  1. Combining different software systems to work together.
  2. Efficiency and effectiveness of a system, application, or process.
  3. Releasing or installing software updates for end-user use.
  4. Flexible approach to project management, adapting to changing needs.
  5. List of tasks awaiting completion, prioritized by importance.
  6. Computers providing resources or services to other devices on a network.
  7. Ability to handle increased workload or resources without loss of performance.
  8. Important stages or achievements in a project's progress.
Down
  1. Short, focused periods of intense work on specific tasks.
  2. Structured collections of electronic data for efficient management.
  3. Items or work that need to be completed and handed over.
  4. Framework for agile project management, emphasizing teamwork and iterative progress.
  5. Set times by which tasks must be completed.
  6. Measures to protect computers, networks, and data from threats.
  7. Rules allowing software applications to communicate.

15 Clues: Set times by which tasks must be completed.Rules allowing software applications to communicate.Combining different software systems to work together.Items or work that need to be completed and handed over.Short, focused periods of intense work on specific tasks.Important stages or achievements in a project's progress....

AP Gov 5.8 2025-03-17

AP Gov 5.8 crossword puzzle
Across
  1. Starts after party nominations and kicks into high gear after Labor Day
  2. One already holding office
  3. Residents can vote in either partys primary
  4. The day with the most primaries
  5. Only registered party members can vote
  6. A state that can go either way during an election
  7. The person was already president and now has an advantage
Down
  1. Allows voters to cast votes for candidates in multiple parties
  2. Small states are overrepresented
  3. The period between the first well-known presidential candidates with strong political support networks
  4. Candidate who wins the plurality of the popular vote will receive all of that states electoral votes
  5. Proportion of their % = total votes won
  6. States scheduling their primaries and caucuses earlier and earlier to boost their political clout
  7. The first is held in Iowa
  8. Picking Republicans in some races and Democrats in others

15 Clues: The first is held in IowaOne already holding officeThe day with the most primariesSmall states are overrepresentedOnly registered party members can voteProportion of their % = total votes wonResidents can vote in either partys primaryA state that can go either way during an electionPicking Republicans in some races and Democrats in others...

Networking Concepts 2025-06-12

Networking Concepts crossword puzzle
Across
  1. : A common wired networking technology
  2. : A network that covers a large geographic area
  3. : A device that connects devices in a LAN and uses MAC addresses to forward data
  4. : Device that converts digital data to analog signals and vice versa
  5. : A wireless networking technology using radio waves
  6. : A network within a small area, like a home or office
  7. : A set of rules for data communication
  8. : A computer that requests data or services from a server
  9. : A computer that provides data or services to other computers
Down
  1. : Maximum data transfer rate of a network
  2. : Translates domain names into IP addresses
  3. : Security system that controls incoming and outgoing network traffic
  4. : A group of connected devices that share resources
  5. Address : Unique address assigned to each device on a network
  6. : Device that forwards data packets between networks

15 Clues: : A common wired networking technology: A set of rules for data communication: Maximum data transfer rate of a network: Translates domain names into IP addresses: A network that covers a large geographic area: A group of connected devices that share resources: A wireless networking technology using radio waves...

Ctrl + Clue 2025-05-03

Ctrl + Clue crossword puzzle
Across
  1. A copy of data kept in case the original is lost or damaged
  2. The process of gaining access to a computer system
  3. Unwanted or junk email
  4. Internet-based storage and computing services
  5. A software application for accessing websites
  6. The set of rules that define the structure of programming language commands
  7. A small piece of data stored on the user’s computer by a website
  8. Malicious software designed to damage or disable computers
  9. A security system that monitors and controls incoming and outgoing network traffic
Down
  1. An error or flaw in software
  2. A step-by-step procedure for solving a problem
  3. A method of trying to gather personal information using deceptive emails
  4. A device that forwards data packets between networks
  5. A computer that provides data to other computers
  6. Temporary storage used to speed up data access

15 Clues: Unwanted or junk emailAn error or flaw in softwareInternet-based storage and computing servicesA software application for accessing websitesA step-by-step procedure for solving a problemTemporary storage used to speed up data accessA computer that provides data to other computersThe process of gaining access to a computer system...

Technology words 2023-05-10

Technology words crossword puzzle
Across
  1. where your teachers assign you work to do for classes
  2. where a global system hooks up to networks
  3. a long communication without wires
  4. where you can watch videos for classes or for fun
  5. where you can send mail digitally to workers, teachers or student
  6. where it can be instructed by hardware
  7. when something is transmitting information by various types
Down
  1. it is designed to protect your computers and other devices from bugs ands hackers
  2. where you can look up answers or look for evidence
  3. where you can create a web browser
  4. where you can make a presentation
  5. where you create a bar graph, line graph, or a pie chart
  6. where scientists design and build machines
  7. where it widely describes wide range of technology's
  8. where you can hook up to internet and use your technology better

15 Clues: where you can make a presentationwhere you can create a web browsera long communication without wireswhere it can be instructed by hardwarewhere a global system hooks up to networkswhere scientists design and build machineswhere you can watch videos for classes or for funwhere you can look up answers or look for evidence...

Compliance Compass: AI Crossword Challenge 2025-08-21

Compliance Compass: AI Crossword Challenge crossword puzzle
Across
  1. A person or thing likely to cause damage or danger.
  2. An official, independent examination of a system or process.
  3. Adherence to a rule, such as a specification, policy, standard or law.
  4. A systematic prejudice in an AI's output.
  5. The raw information used to train AI systems.
  6. The potential for loss or harm.
  7. The state of being open and clear in communication and processes.
  8. A computational representation of a real-world process, trained on data.
Down
  1. A set of rules or instructions a computer follows to solve a problem.
  2. The process of making something less severe or serious.
  3. Moral principles governing the use of AI.
  4. An AI's fabricated or nonsensical output.
  5. An automated program that performs repetitive tasks.
  6. The protection of computer systems and networks.
  7. A framework of rules and practices to ensure accountability.

15 Clues: The potential for loss or harm.Moral principles governing the use of AI.An AI's fabricated or nonsensical output.A systematic prejudice in an AI's output.The raw information used to train AI systems.The protection of computer systems and networks.A person or thing likely to cause damage or danger.An automated program that performs repetitive tasks....

IT Crossword Puzzle 2021-05-05

IT Crossword Puzzle crossword puzzle
Across
  1. An interface on a computer or device where a device is connected
  2. A type of file that organises other files in a hierarchical structure
  3. A temporary storage space or memory that allows fast access to data
  4. A internet service that converts names to IP addresses
  5. A picture element in the smallest part of a graphic picture
  6. The people who made Minecraft
Down
  1. The uppermost most directory in a file system
  2. A device that routes traffic between networks
  3. When you turn off a computer by pressing and holding the power button
  4. A company that provides people with a connection to the internet

10 Clues: The people who made MinecraftThe uppermost most directory in a file systemA device that routes traffic between networksA internet service that converts names to IP addressesA picture element in the smallest part of a graphic pictureAn interface on a computer or device where a device is connected...

Mreža računala 2021-10-27

Mreža računala crossword puzzle
Across
  1. lokalna računalna mreža
  2. program koji sami sebe umnožavaju i šire se putem računalne mreže
  3. program koji nagleda prijenos podataka između računala i mreže
  4. računalni program koji se koristi za zaštitu od štetnih programa
  5. neželjena elektronička poruka poslana radi kao sredstvo širenja zlonamjernog programa
Down
  1. program koji svojim pokretanjem može zaraziti računala tako da bez dopuštenja kopira zam sebe u memoriju
  2. kratica od Metropolitan Area Networks, tj. mreža nekog područja
  3. Skup povezanih računala i uređaja koji mogu međusobno komunicirati i razmjenjivati podatke
  4. mreža širokog područja
  5. računalo koji je stalno povezan na internet te svojim klijentima omogućuje pristup podacima i uređajima

10 Clues: mreža širokog područjalokalna računalna mrežaprogram koji nagleda prijenos podataka između računala i mrežekratica od Metropolitan Area Networks, tj. mreža nekog područjaračunalni program koji se koristi za zaštitu od štetnih programaprogram koji sami sebe umnožavaju i šire se putem računalne mreže...

Quiz 1 Vocabulary Crossword A.I. 2019-08-27

Quiz 1 Vocabulary Crossword A.I. crossword puzzle
Across
  1. is often used with automated bank teller machines, telephone calling cards, and accessing Wireless networks.
  2. are available for most graphical user interface operating systems and offer various features, such as placing different wallpapers for each virtual desktop
  3. storage
  4. Desktop
Down
  1. program for free-form information gathering and multi-user collaboration.
  2. on highly virtualized infrastructure and is like broader cloud computing
  3. Windows screenshot utility included in Windows Vista and later.
  4. menu
  5. each window to the corner of the screen where you want it.
  6. the primary location in Windows to locate your installed programs and find any files or folders.

10 Clues: menustorageDesktopeach window to the corner of the screen where you want it.Windows screenshot utility included in Windows Vista and later.on highly virtualized infrastructure and is like broader cloud computingprogram for free-form information gathering and multi-user collaboration....

Cyber Bullying 2012-05-05

Cyber Bullying crossword puzzle
Across
  1. using technology to harass someone
  2. mobile device used to send hateful texts
  3. a worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems
  4. used to access the internet
  5. short message sent by a cell phone
Down
  1. common social networking site used by cyber bullies
  2. words or actions intended to annoy, alarm, or abuse another individual
  3. sometimes the fatal consequence of cyber bullying
  4. not giving a name or username so as to stay hidden and undetected, cyber bullies stay this way so as to not get in trouble
  5. the person being cyber bullied

10 Clues: used to access the internetthe person being cyber bulliedusing technology to harass someoneshort message sent by a cell phonemobile device used to send hateful textssometimes the fatal consequence of cyber bullyingcommon social networking site used by cyber bullieswords or actions intended to annoy, alarm, or abuse another individual...

Nina Matts 2013-09-13

Nina Matts crossword puzzle
Across
  1. a reference to a source.
  2. to renew or reload.
  3. network etiquette; online manners; following the rules of conduct for online or internet users, being a good digital citizen.
  4. stealing like pirates.
Down
  1. program made to damage files.
  2. a piece of writing that has been copiedfrom someone elseand is presented as being your own.
  3. a global network of thousands of other computer networks that offers e-mail and info retrieval services to millions of people.
  4. software used to veiw various kinds of internet resources found on the web.
  5. an unauthorized person who secretly gains access to computer files.
  6. a bully who bullies online.

10 Clues: to renew or reload.stealing like pirates.a reference to a source.a bully who bullies online.program made to damage files.an unauthorized person who secretly gains access to computer files.software used to veiw various kinds of internet resources found on the web....

IC3 Lesson 29 Vocabulary 2015-05-12

IC3 Lesson 29 Vocabulary crossword puzzle
Across
  1. Communications technology to keep the employee connected to the office/ allows you to work from home
  2. Provides online education learning to millions of learners annually
  3. Allows someone to pay by transmitting a number from one computer to another
  4. Transactions between businesses and government agencies
  5. Online transactions between businesses and consumers
  6. Pressing a button on a remote control device or enter a combination on the keypad
Down
  1. Mental process of analyzing or evaluating information
  2. E-commerce transaction between businesses
  3. Conducting business over the internet
  4. Instant communication technology that enables sending and receiving messages between mobile phones and wireless carrier networks (Text Message)

10 Clues: Conducting business over the internetE-commerce transaction between businessesOnline transactions between businesses and consumersMental process of analyzing or evaluating informationTransactions between businesses and government agenciesProvides online education learning to millions of learners annually...

The Mayans 2024-01-22

The Mayans crossword puzzle
Across
  1. This dense forest is where they find their meat, skin, feathers
  2. This place has a hot, wet climate
  3. They lived in the tropical rain forest/they used farming methods
  4. Nobles controlled large plots where corn was grown
  5. The Mayan's worshiped many gods, most of them represent forces of nature, such as rain and lightning
Down
  1. Was a strip of land connecting Asia and North America
  2. in the highlands this has produced rich soils obsidian
  3. This is where the Mayans lived
  4. Have warm temperatures year-round and rain from April to October
  5. Traveling Merchants linked Mayan cities in large TRADE networks

10 Clues: This is where the Mayans livedThis place has a hot, wet climateNobles controlled large plots where corn was grownWas a strip of land connecting Asia and North Americain the highlands this has produced rich soils obsidianThis dense forest is where they find their meat, skin, feathersTraveling Merchants linked Mayan cities in large TRADE networks...

Computer Technology 2024-02-14

Computer Technology crossword puzzle
Across
  1. (A technology that allows wireless communication between devices)
  2. (The "brain" of a computer, responsible for processing data)
  3. (A type of storage that retains data even when the power is turned off)
  4. (A high-level programming language often used for scientific and numerical computing)
  5. (A method of protecting computer networks from unauthorized access or attacks)
Down
  1. (A popular open-source operating system)
  2. (A widely used markup language for creating web pages)
  3. (The process of finding and fixing errors in computer programs)
  4. (A popular programming language used for creating web pages)
  5. (A programming language developed by Google, often used for web development)

10 Clues: (A popular open-source operating system)(A widely used markup language for creating web pages)(The "brain" of a computer, responsible for processing data)(A popular programming language used for creating web pages)(The process of finding and fixing errors in computer programs)(A technology that allows wireless communication between devices)...

KASOOTI DEGREE 2023-03-10

KASOOTI DEGREE crossword puzzle
Across
  1. The unauthorized access of computer systems or networks
  2. A software program that identifies and removes viruses from a computer system
  3. The process of securing IoT devices and data from unauthorized access
  4. A built-in Python function for printing output to the console
Down
  1. The act of tricking someone into revealing sensitive information
  2. The process of encrypting data to protect it from unauthorized access
  3. A device that can receive and display data from IoT devices
  4. The process of using IoT devices to automate tasks
  5. A Python module for working with regular expressions
  6. A device that can measure and transmit data about the environment

10 Clues: The process of using IoT devices to automate tasksA Python module for working with regular expressionsThe unauthorized access of computer systems or networksA device that can receive and display data from IoT devicesA built-in Python function for printing output to the consoleThe act of tricking someone into revealing sensitive information...

SOCIAL NETWORK 2024-06-30

SOCIAL NETWORK crossword puzzle
Across
  1. (verb) -Simplified: To hang out with people and be friendly.
  2. its toll (expression) - To cause harm or damage over time.
  3. (verb) - to look and make sure that something is present or correct
  4. (verb) - To make something newer or add new information.
  5. (verb) -To tell others about your thoughts, problems, or experiences.
Down
  1. (adjective) - To be very focused on something.
  2. (verb) - To take something away because of the rules.
  3. (adjective) - Meeting or talking in person.
  4. (verb) To join things together or link them.
  5. (noun) -: A setup that lets you use online services like email or social networks.

10 Clues: (adjective) - Meeting or talking in person.(verb) To join things together or link them.(adjective) - To be very focused on something.(verb) - To take something away because of the rules.(verb) - To make something newer or add new information.its toll (expression) - To cause harm or damage over time....

Business communication 2024-05-20

Business communication crossword puzzle
Across
  1. __________ communication includes letters, memos and reports.
  2. A _____________ to communication is a reason which disrupts a communication process.
  3. _______________ communication is between employees having the same status in a firm.
  4. __________ communication is more interactive and interesting.
Down
  1. It is the reply by the receiver of a message to confirm its receipt.
  2. _____________ communication includes faxes, emails, social networks and internet.
  3. _____________ communication takes place between a manager and his subordinates.
  4. ________ communication is also known as 'spoken' communication.
  5. It refers to the exchange of information between people or groups.
  6. ____________ communication refers to unofficial channels of communication between employees at work.

10 Clues: __________ communication includes letters, memos and reports.__________ communication is more interactive and interesting.________ communication is also known as 'spoken' communication.It refers to the exchange of information between people or groups.It is the reply by the receiver of a message to confirm its receipt....

Think and work like a scientst Part 1 2023-06-14

Think and work like a scientst Part 1 crossword puzzle
Across
  1. Whatever it is, when you recognize the identity of someone or something, you ___________ it
  2. information gathered when carrying out experiments
  3. I can carry out a ___________ where I change something, measure something and keep some things the same to answer this question.
  4. the act of asking questions to gain information.
  5. a huge computer network made up of smaller computer networks
Down
  1. based on the principles and methods of science
  2. a sameness or alikeness
  3. a person with some kind of knowledge or expertise in any of the sciences
  4. put into groups based on a property
  5. repeats in a predictable way

10 Clues: a sameness or alikenessrepeats in a predictable wayput into groups based on a propertybased on the principles and methods of sciencethe act of asking questions to gain information.information gathered when carrying out experimentsa huge computer network made up of smaller computer networks...

WattsupBots 2025-03-03

WattsupBots crossword puzzle
Across
  1. The first humanoid robot astronaut sent to space.
  2. The term for a robot that looks and acts like a human.
  3. The most common algorithm used in neural networks for weight adjustment.
  4. The robotic law system proposed by Isaac Asimov.
  5. The mechanical structure that mimics human hand movements in robotics.
Down
  1. The concept of AI self-improvement beyond human intelligence.
  2. The type of learning where an agent learns by receiving rewards and penalties.
  3. The term for the study of robotic movement and control.
  4. The AI model that defeated the world champion in Go.
  5. The AI architecture behind ChatGPT and modern NLP models.

10 Clues: The robotic law system proposed by Isaac Asimov.The first humanoid robot astronaut sent to space.The AI model that defeated the world champion in Go.The term for a robot that looks and acts like a human.The term for the study of robotic movement and control.The AI architecture behind ChatGPT and modern NLP models....

engineering crosswords 2024-12-03

engineering crosswords crossword puzzle
Across
  1. A step-by-step procedure for solving a problem.
  2. Relating to computers, networks, or information technology.
  3. The process of creating and writing computer software.
  4. A set of connected parts working together as a whole.
  5. The act of introducing something new or improving existing technology.
Down
  1. The application of scientific knowledge for practical purposes. Cloud: Remote servers used to store and process data via the internet.
  2. The capacity to do work or power machines.
  3. The use of technology to perform tasks without human intervention.
  4. A machine capable of carrying out a complex series of actions.
  5. written instructions for a computer to execute

10 Clues: The capacity to do work or power machines.written instructions for a computer to executeA step-by-step procedure for solving a problem.A set of connected parts working together as a whole.The process of creating and writing computer software.Relating to computers, networks, or information technology....

Indigenous History Review 2025-09-11

Indigenous History Review crossword puzzle
Across
  1. The Clackamas people built fishing ________ on the falls to better access the fish
  2. The ________ theory suggests Native Americans arrived via a land bridge
  3. Chuchounyhoof is a story of a ________ that keeps the Luckamiute Kalapuyans from the coast
  4. Chief _______ was Chinookan leader with major influence throughout the region
  5. The Kalapuya specialized in trading wapato and ___________
Down
  1. __________ refers to the beginning of human history
  2. ikanum are ________ that are only told during the winter time.
  3. ________ networks are familial ties that are created across tribes & bands
  4. The Chinook specialized in trading __________
  5. _______ refers to a theory that Native people arrived in the America's via sea-travel

10 Clues: The Chinook specialized in trading ____________________ refers to the beginning of human historyThe Kalapuya specialized in trading wapato and ___________ikanum are ________ that are only told during the winter time.The ________ theory suggests Native Americans arrived via a land bridge...

CAT Concepts Crossword 2025-09-24

CAT Concepts Crossword crossword puzzle
Across
  1. A type of memory that is temporary and loses data when power is off.
  2. The process of copying data to a storage device for future use.
  3. The physical parts of a computer are known as ___.
  4. Data sent over the internet is broken into small units called ___.
  5. A set of rules used for communication between devices.
  6. The main circuit board of a computer.
  7. A popular spreadsheet application used in CAT.
Down
  1. Software that is designed to harm or disrupt a system.
  2. The global system of interconnected computer networks.
  3. This person writes and tests code to create software applications.

10 Clues: The main circuit board of a computer.A popular spreadsheet application used in CAT.The physical parts of a computer are known as ___.Software that is designed to harm or disrupt a system.The global system of interconnected computer networks.A set of rules used for communication between devices....

3S03 Presentation 1 Group 5 2025-10-06

3S03 Presentation 1 Group 5 crossword puzzle
Across
  1. Ronald lives 60 min from his pharmacy & doesn't have a car. This is a ___ barrier to medication.
  2. Priya sometimes forgets to take her anti-anxiety medications. An example of ___ adherence
  3. This prescription boosts focus & attention
  4. When discussing medications with clients, questions should be ___
  5. Adherence rate is impacted by provider, patient, and ___ factors
Down
  1. Social worker's role as they help patients overcome challenges
  2. Jenn takes 20mg of her medication at 8am every day
  3. Conversation where Alex tells his social worker he is taking SSRIs
  4. Healthcare professional who may support clients with medications
  5. The link between patients, providers, and support networks

10 Clues: This prescription boosts focus & attentionJenn takes 20mg of her medication at 8am every dayThe link between patients, providers, and support networksSocial worker's role as they help patients overcome challengesHealthcare professional who may support clients with medicationsAdherence rate is impacted by provider, patient, and ___ factors...

Artificial intelligence 2025-11-07

Artificial intelligence crossword puzzle
Across
  1. A big advantage of AI – it works faster and more accurately.
  2. AI that can think like a human being (still not real).
  3. Who said, “AI will be the best or worst thing for humanity”?
  4. An app that helps people understand different languages.
  5. The deeper level of machine learning using neural networks.
Down
  1. A part of AI that helps computers learn from experience.
  2. AI used in hospitals to identify diseases.
  3. AI that can do only one specific task, like Siri.
  4. A smart voice helper on phones.
  5. AI needs a lot of this to learn — pictures, words, numbers.

10 Clues: A smart voice helper on phones.AI used in hospitals to identify diseases.AI that can do only one specific task, like Siri.AI that can think like a human being (still not real).A part of AI that helps computers learn from experience.An app that helps people understand different languages.AI needs a lot of this to learn — pictures, words, numbers....

jordyn 2025-09-09

jordyn crossword puzzle
Across
  1. A global system of interconnected networks that links up worldwide devices. It is a system of hardware and infrastructure, like cables and routers, that allows devices around the world to exchange data and information.
  2. a drive that helps with electro-mechanical data storage device that stores and retrieves digital data
  3. a quotation from or reference to a book, paper, or author,
  4. the practice of pretending to be someone else.
  5. is an application for accessing websites.
  6. a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  7. a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
  8. a form of social engineering and a scam where attackers on or installing malware such as viruses, worms, adware, or ransomware.
Down
  1. the ability to responsibly use technologies,and the internet to find,, use, share, and create i google
  2. software program or a system designed to help users find information stored on the internet or within a specific database. it work by indexing and cataloging content from various sources and then providing users with a list of relevant results based on their search queries.
  3. security device that is a barrier between an internal network and an untrustworthy external network the network that regulates incoming/outgoing network traffic to help protect the network from unauthorized access and intruders.
  4. is something that combines traditional mobile technology with more advanced computing abilities. something that typically allows users to access a wide range of information with its touch screen.
  5. small text files that gather together your data and store various types of information logins and user settings their purpose is to identify and remember your information.
  6. the responsible, respectful and safe, use of technology in daily life, along with online safety, and privacy,

14 Clues: is an application for accessing websites.the practice of pretending to be someone else.a quotation from or reference to a book, paper, or author,a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storagea drive that helps with electro-mechanical data storage device that stores and retrieves digital data...

Marketing 2021-05-04

Marketing crossword puzzle
Across
  1. Another word for cold calling
  2. this is used to create improvements in internet ranks
  3. A form of internet marketing utilising social media sites and networks such as Facebook
Down
  1. another word for Electronic dispensing machines
  2. Part-time institutional telephone operators who routinely call their customers
  3. A kind of marketing that is quite expensive

6 Clues: Another word for cold callingA kind of marketing that is quite expensiveanother word for Electronic dispensing machinesthis is used to create improvements in internet ranksPart-time institutional telephone operators who routinely call their customersA form of internet marketing utilising social media sites and networks such as Facebook

11 May 2025 2025-05-11

11 May 2025 crossword puzzle
Across
  1. Fully combined to function as a whole
  2. A point of entry that connects different networks or systems
  3. Relating to or occurring within one’s own country
Down
  1. Paid for in advance, often used for cards or mobile plans
  2. A careful plan or method for achieving a goal
  3. Showing a great deal of variety or difference.

6 Clues: Fully combined to function as a wholeA careful plan or method for achieving a goalShowing a great deal of variety or difference.Relating to or occurring within one’s own countryPaid for in advance, often used for cards or mobile plansA point of entry that connects different networks or systems

PCS 106: Parallel and Distributed Computing 2018-03-14

PCS 106: Parallel and Distributed Computing crossword puzzle
Across
  1. / The ratio of the number of nodes in the set V' to that in set V is called the _________ of the mapping, where V represents the number of processes and V’ represents the number of processors.
  2. / The dimension-ordered routing technique for a two-dimensional mesh is called ___________
  3. / The ability of a processor to issue multiple instructions in the same cycle is referred to as _________________________
  4. / A _______________routing mechanism always selects one of the shortest paths between the source and the destination
  5. / if the time taken to access certain memory words is longer than others, the platform is called a ___________________ multicomputer.
  6. /___________ function is needed to speciy the number of processes participating in the ensemble.
Down
  1. / In-------------------, we partition the search space into smaller parts and search each one of these parts concurrently, until the desired solutions are found.
  2. / ___________ is the time required to handle a message at the sending and receiving nodes. This includes the time to prepare the message , the time to execute the routing algorithm, and the time to establish an interface between the local node and the router. This delay is incurred only once for a single message transfer.
  3. / An interaction pattern is considered to be --------- if it has some structure that can be exploited for efficient implementation.
  4. / In the case of input data decomposition, the ____________ implies that all computations that use the input data are performed by the process.
  5. / If, during a particular cycle, if only part of the execution units are used during a cycle, it is termed ______________________
  6. /__________ is a technique used by computer processors to boost execution performance by fetching instructions or data from their original storage in slower memory to a faster local memory before it is actually needed.
  7. / The peak rate at which data can be communicated between the ends of a communication link is called ___________________.
  8. / Static networks consist of point-to-point communication links among processing nodes and are also referred to as ________ networks.

14 Clues: / The dimension-ordered routing technique for a two-dimensional mesh is called ___________/___________ function is needed to speciy the number of processes participating in the ensemble./ A _______________routing mechanism always selects one of the shortest paths between the source and the destination...

VOCABULARY 8 2012-10-30

VOCABULARY 8 crossword puzzle
Across
  1. refers to multiple software applications or services that appear to run as one software package for ease-of-use.
  2. worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer
  3. a tool that can be used to separate obvious lines for selection, whether it be to copy the selection or delete it.
  4. ability of a system or a product to work with other systems or products without special effort on the part of the customer
  5. private network that is contained within an enterprise
  6. device that transfers data to or from a computer.( hard disks, keyboards, and mouses) and others provide both input and output of data (hard disks, diskettes, writable CD-ROMs).
  7. user-written programs that enable the user to perform various tasks automatically. For instance, in Word, a macro is composed of a series of Word commands thus saving keystrokes and time
Down
  1. one of the image file formats supported on the World Wide Web, usually with the file suffix of “.jpg”
  2. Liquid-crystal display: a display of information using a liquid crystalline film used on a computer screen or a camera screen.
  3. popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology.
  4. actually predating the Internet. IM has only recently started to garner credibility in the corporate world as a valuable productivity tool. Presence is a key driver of instant messaging. Presence technology allows users to see if the person they're trying to reach is available or not, making the value of real-time communications more potent.
  5. Allows you to insert any picture file into a document
  6. something that will bring you to a specific web site
  7. complete video frames (or images) that are inserted at consistent intervals in a video clip

14 Clues: something that will bring you to a specific web siteAllows you to insert any picture file into a documentprivate network that is contained within an enterprisecomplete video frames (or images) that are inserted at consistent intervals in a video clip...

modern culture 2024-06-16

modern culture crossword puzzle
Across
  1. Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
  2. The practice of obtaining input, ideas, or services by soliciting contributions from a large group of people, typically via the Internet.
  3. Meeting our own needs without compromising the ability of future generations to meet their own needs, involving the balance of environmental, economic, and social aspects.
  4. Working from a remote location outside of a traditional office setting, often from home, and using digital communication tools to perform job duties.
  5. Technology Electronic devices that are worn on the body as accessories or implants, such as fitness trackers, smartwatches, and augmented reality glasses.
  6. Computing The delivery of different services through the Internet, including data storage, servers, databases, networking, and software.
  7. Unmanned aerial vehicles used for a variety of purposes, including surveillance, photography, and delivery services.
  8. Mining The process of discovering patterns and knowledge from large amounts of data, often using machine learning, statistics, and database systems.
  9. Learning A branch of artificial intelligence focused on building systems that learn from and make decisions based on data.
  10. The remote diagnosis and treatment of patients by means of telecommunications technology.
  11. Non-fungible token; a unique digital asset representing ownership of a specific item or piece of content, typically bought and sold using blockchain technology.
  12. Financial technology; an industry encompassing any kind of technology in financial services, including companies that operate with mobile banking, investment, and cryptocurrency.
Down
  1. Authentication Security process that relies on the unique biological characteristics of an individual to verify their identity, such as fingerprints, facial recognition, or iris scanning.
  2. Intelligence The simulation of human intelligence in machines that are programmed to think like humans and mimic their actions.
  3. The fifth generation technology standard for broadband cellular networks, which began deployment in 2019 and is the successor to 4G networks.
  4. Twin A virtual representation that serves as the real-time digital counterpart of a physical object or process, used for simulation, analysis, and control.
  5. The practice and study of techniques for securing communication and data in the presence of adversaries, involving methods such as encryption.
  6. Contract A self-executing contract with the terms of the agreement directly written into lines of code, often used in blockchain technology.
  7. A system in which a record of transactions made in cryptocurrency is maintained across several computers that are linked in a peer-to-peer network.
  8. The practice of protecting systems, networks, and programs from digital attacks, aimed at accessing, changing, or destroying sensitive information.
  9. Internet of Things; a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
  10. Computing A distributed computing paradigm that brings computation and data storage closer to the sources of data to improve response times and save bandwidth.
  11. Computing An area of computing focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level.
  12. Reality An interactive experience of a real-world environment where objects that reside in the real world are enhanced by computer-generated perceptual information.
  13. A collective virtual shared space, created by the convergence of virtually enhanced physical reality and physically persistent virtual space, including the sum of all virtual worlds, augmented reality, and the Internet.

25 Clues: The remote diagnosis and treatment of patients by means of telecommunications technology.Unmanned aerial vehicles used for a variety of purposes, including surveillance, photography, and delivery services.Intelligence The simulation of human intelligence in machines that are programmed to think like humans and mimic their actions....

July Newsletter 2024-07-26

July Newsletter crossword puzzle
Across
  1. A metric in classification that measures the proportion of true positives correctly identified by the model out of all actual positives.
  2. A technique for assessing how a machine learning model generalizes to an independent dataset, often using multiple splits of the data.
  3. A configuration that is external to the model and whose value cannot be estimated from the data, often set prior to the learning process to control the behavior of the training algorithm.
  4. In anomaly detection, the process of identifying data points that significantly deviate from the norm.
  5. The number of features or variables in a dataset, which can impact the complexity and performance of machine learning models.
Down
  1. A graph that shows the performance of a machine learning model over time or as a function of the amount of training data, used to diagnose learning progress and potential overfitting or underfitting.
  2. A type of artificial neuron used in machine learning, forming the building blocks of neural networks, capable of binary classification tasks.
  3. A regularization method used in neural networks where randomly selected neurons are ignored during training to prevent overfitting.
  4. The process of scaling individual features to a standard range or distribution, often to improve the performance and convergence of machine learning models.
  5. A technique in ensemble learning where multiple versions of a predictor are trained on different subsets of the data and their predictions are aggregated to improve overall performance.
  6. A Python library designed for efficient out-of-core data processing and visualization, enabling the handling of large datasets that don't fit into memory.
  7. A mathematical function that measures the difference between the predicted values and the actual values, guiding the optimization process during model training.

12 Clues: In anomaly detection, the process of identifying data points that significantly deviate from the norm.The number of features or variables in a dataset, which can impact the complexity and performance of machine learning models....

Julia's Internet Puzzle 2015-09-22

Julia's Internet Puzzle crossword puzzle
Across
  1. a standard way of indicating the location of a website
  2. consisting of high-speed cables and switching stations
  3. lead to another website/place within the same document
  4. early version of the internet
  5. mainframe computers that are capable of very fast processing
  6. structure that handles the major traffic in a network system
  7. A set of rules for how HTML documents are interpreted and displayed through a browsers
  8. text and code only visible to the web browsers
  9. where you can keep URLs that you would like to consult frequently
  10. Collection of network of computer and storage
  11. an agreed upon format for transmitting data between two or more devices
Down
  1. ex:Internet explorer, safari
  2. Standard network protocol communication across networks
  3. Total collection of hypertext documents stored in computers
  4. companies that provide users with access Internet ex: Bell and Rogers
  5. a software program allowing you to search for information on the network

16 Clues: ex:Internet explorer, safariearly version of the internetCollection of network of computer and storagetext and code only visible to the web browsersa standard way of indicating the location of a websiteconsisting of high-speed cables and switching stationslead to another website/place within the same document...

Digital Technologies 2021-03-02

Digital Technologies crossword puzzle
Across
  1. Can store two values
  2. a part of a computer that allows you to plug in a cable
  3. a .mp4 file
  4. a file extension suitable for sending images over a network
  5. the HTML tag that displays a picture
  6. one of three colours used to create the colour of a pixel
  7. the html tag that displays the name of the webpage in the browser tab
  8. the main part of a computer that connects everything together
Down
  1. Number of bits in a byte
  2. system used to convert letters from the English alphabet to numbers
  3. a file extension for a photographic image
  4. system used to convert letters from any language to numbers
  5. smallest part of a picture
  6. a network device that connects small networks together to create a larger network
  7. the network device needed to access the internet
  8. a file extension for an image that can be animated

16 Clues: a .mp4 fileCan store two valuesNumber of bits in a bytesmallest part of a picturethe HTML tag that displays a picturea file extension for a photographic imagethe network device needed to access the interneta file extension for an image that can be animateda part of a computer that allows you to plug in a cable...

Specialist in Media and Information Services 1 2017-09-13

Specialist in Media and Information Services 1 crossword puzzle
Across
  1. One of the institutions where media specialists work
  2. If you deal with customers' questions, you handle their …
  3. In I and D centers you store various files, e.g. paper, audio and …
  4. If users do not return media in time, you usually send a …
  5. You ... information for various reasons
  6. Books you can listen to are called ear books, talking books or … books
  7. … is a word for buying media
  8. If you show people around, you do a … tour
Down
  1. Media specialists at a library also process the … of media and their returns
  2. You do searches in networks and …
  3. Media specialists work in public institutions or private …
  4. People working in libraries use … information tools
  5. A …is an event where an author presents his book
  6. People visit an archive in order to …
  7. One of the specialisms is … documentation
  8. Archivists store … of various kinds

16 Clues: … is a word for buying mediaYou do searches in networks and …Archivists store … of various kindsPeople visit an archive in order to …You ... information for various reasonsOne of the specialisms is … documentationIf you show people around, you do a … tourA …is an event where an author presents his book...

CROSSWORD PUZZLE 2023-03-04

CROSSWORD PUZZLE crossword puzzle
Across
  1. institutions.
  2. It is most often associated with the study, diagnosis of mental illnesses.
  3. of collaboration a sense of belonging is achieved.
  4. It explains the connection between the individual and the community
  5. needs are satisfied.
  6. One highlight of civil society perspective wherein the members of the
  7. One of the perspectives in community wherein it understands that
  8. may involve themselves in various community activities.
  9. is composed of the ways people interact with each other, react,
Down
  1. This community perspective uses self-organization and encourages the local
  2. Model Civil society perspective is considered as __________ model since
  3. Model Institutional community is a _______ model as it is defined by its networks
  4. The ultimate of this discipline is to improve the lives of others such that
  5. together.
  6. expect each other to act and interact.
  7. This field is focused in the study of society, social orders, socialization and
  8. It is described from social science perspective as a group of people
  9. to contribute to the community by taking responsibilities and actions.

18 Clues: together.institutions.needs are satisfied.expect each other to act and interact.of collaboration a sense of belonging is achieved.may involve themselves in various community activities.is composed of the ways people interact with each other, react,One of the perspectives in community wherein it understands that...

asdf 2023-04-26

asdf crossword puzzle
Across
  1. illegal act of accessing a computer system without permission
  2. act of preventing unauthorized access to data and systems
  3. safeguard against unauthorized access to a computer network
  4. type of harmful software that can infect a computer
  5. protocol that helps protect your online communications from eavesdropping
  6. process of regularly backing up data
  7. technique of disguising a message or data to hide its content
  8. password that is difficult for others to guess
  9. use of two or more authentication methods for accessing an account
  10. type of attack that overwhelms a system with excessive traffic
Down
  1. secure way to access the internet and protect data in transit
  2. act of monitoring and protecting computer networks and systems
  3. weak point in a system that can be exploited
  4. term that refers to a person who gains unauthorized access to a computer system
  5. practice of tricking someone into providing sensitive information
  6. software program that detects and removes malicious software

16 Clues: process of regularly backing up dataweak point in a system that can be exploitedpassword that is difficult for others to guesstype of harmful software that can infect a computeract of preventing unauthorized access to data and systemssafeguard against unauthorized access to a computer network...

GIMKIT Crossword 2022-04-01

GIMKIT Crossword crossword puzzle
Across
  1. used to connect high definition video devices
  2. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network
  3. being free from public attention
  4. graphic processing unit
  5. trace and correct faults in the system
  6. something in a code that can be changed
  7. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet
  8. interconnected networks using standardized communication protocols
Down
  1. a structured set of data held in a computer
  2. a set of files that tells a piece of hardware how to function
  3. a computer program with a graphical user interface for displaying and navigating between web pages
  4. operating information used by a computer
  5. bringing something up to date
  6. the computers short term memory
  7. the process or activity of writing computer programs
  8. words used to control tasks of the computer

16 Clues: graphic processing unitbringing something up to datethe computers short term memorybeing free from public attentiontrace and correct faults in the systemsomething in a code that can be changedoperating information used by a computera structured set of data held in a computerwords used to control tasks of the computer...

Muscle Fiber Crossword puzzel 2024-01-17

Muscle Fiber Crossword puzzel crossword puzzle
Across
  1. increase in the size of cells, tissue, or organs in your body
  2. use oxygen to produce energy
  3. chemical your body produces when your cells break down carbohydrates for energy
  4. training can trigger the formation of more extensive capillary networks around the fiber
  5. source of energy for use and storage at the cellular level
  6. create ATP through anaerobic, which produces less ATP per cycle
  7. Occurs with malnutrition, age, genetics, a lack of physical activity or certain medical conditions
  8. fibers contract relatively slowly
  9. powerhouse of the cell
  10. involuntary muscles
Down
  1. fibers that fatigue more quickly than the others
  2. does not use oxygen to produce energy
  3. loss of muscle and strength that can happen when someone gets older and does less physical activity
  4. provides quick bursts of ATP to muscles in the initial stages of contraction
  5. voluntary muscles
  6. responsible for the pumping of the heart

16 Clues: voluntary musclesinvoluntary musclespowerhouse of the celluse oxygen to produce energyfibers contract relatively slowlydoes not use oxygen to produce energyresponsible for the pumping of the heartfibers that fatigue more quickly than the otherssource of energy for use and storage at the cellular level...

Natural Language Processing 2024-11-03

Natural Language Processing crossword puzzle
Across
  1. A statistical model used for POS tagging.
  2. Practical uses of NLP technologies in real-world scenarios.
  3. Continuous sequences of n items from a given sample of text.
  4. Systems designed to answer user queries.
  5. Analysis of larger units of language beyond the sentence.
  6. When a word or phrase can have multiple meanings.
  7. The process of converting a word to its base form.
  8. The study of meaning in language.
Down
  1. A subset of machine learning using neural networks for NLP tasks.
  2. The technique of reducing words to their base or root form.
  3. Analyzing feelings or opinions in text.
  4. A large collection of written or spoken texts.
  5. A process of breaking text into individual words or phrases.
  6. The set of rules that governs the structure of sentences.
  7. The study of the structure and form of words.
  8. Assessing the performance of NLP models and techniques.

16 Clues: The study of meaning in language.Analyzing feelings or opinions in text.Systems designed to answer user queries.A statistical model used for POS tagging.The study of the structure and form of words.A large collection of written or spoken texts.When a word or phrase can have multiple meanings.The process of converting a word to its base form....

Feb 7, 2022 2022-02-07

Feb 7, 2022 crossword puzzle
Across
  1. and sends data on computer networks
  2. small, moveable shape that indicates where anything typed by the user will appear
  3. moveable device
  4. main screen area that you see after you turn on your computer
  5. program that is used to hold the data being processed
  6. that allows a computer user to find and view information on the internet
  7. one or more files
Down
  1. and demodulates electrical signals sent through phone lines
  2. drive-a small, portable device that plugs into the USB port on your computer
  3. processing unit
  4. sphere of knowledge identified by a name
  5. computer file sent along with an email message
  6. or more computers that are connected
  7. short-range wireless connection
  8. used to connect with computers with peripheral devices
  9. reserved segment of memory within

16 Clues: processing unitmoveable deviceone or more filesshort-range wireless connectionreserved segment of memory withinand sends data on computer networksor more computers that are connectedsphere of knowledge identified by a namecomputer file sent along with an email messageprogram that is used to hold the data being processed...

Electric Cars 2025-09-12

Electric Cars crossword puzzle
Across
  1. energy that comes from motion or moving parts.
  2. networks that use technology to manage electricity efficiently.
  3. a system in electric cars that captures energy while slowing down to recharge the battery.
  4. easy to reach or use.
  5. energy stored in substances that can be released in a reaction
Down
  1. able to be continued or maintained without causing harm to the environment.
  2. to reduce something to the smallest possible amount.
  3. working in a way that saves time, energy, or resources.
  4. the basic systems and structures (like roads, power stations, and charging stations) needed for a society or activity.
  5. long-term changes in the Earth’s weather patterns.
  6. a new idea, method, or invention.
  7. energy sources like coal, oil, or gas that come from ancient plants and animals.
  8. a light, soft metal used in batteries.
  9. causing damage or injury.
  10. a metal used in batteries to help store energy.
  11. to protect from harm.

16 Clues: easy to reach or use.to protect from harm.causing damage or injury.a new idea, method, or invention.a light, soft metal used in batteries.energy that comes from motion or moving parts.a metal used in batteries to help store energy.long-term changes in the Earth’s weather patterns.to reduce something to the smallest possible amount....

Internet Crossword Puzzle - Jayna Wimberley 2015-09-22

Internet Crossword Puzzle - Jayna Wimberley crossword puzzle
Across
  1. IP
  2. Mainframe computers that are capable of very fast processing
  3. Example:www.mywebaddress.com
  4. Technology that allows 2 or more devices to communicate without wires or cables
  5. This is where you put your URLs that you consult frequently
  6. Gap between those who have internet access and those who don't
  7. Structure that handles the major traffic in a networked system
  8. A location on the WWW
Down
  1. ISP
  2. Every computer on the internet can be traced by their ...
  3. This is used to lead someone to another website/place within the same document
  4. A set of text and codes only visible to the web browser that instruct the browser how to display text
  5. Collection of documents stored on the internet
  6. A type of connection device
  7. A collection of networks(computers and storage devices) linked by satellite and cables
  8. Early version of the internet created by the U.S. Departement of Defense

16 Clues: IPISPA location on the WWWA type of connection deviceExample:www.mywebaddress.comCollection of documents stored on the internetEvery computer on the internet can be traced by their ...This is where you put your URLs that you consult frequentlyMainframe computers that are capable of very fast processing...

Assignment 6 2016-02-21

Assignment 6 crossword puzzle
Across
  1. Your computer is the ____ computer in the relationship.
  2. Up to 10% but no more than 30 seconds of the music or lyrics from a song.
  3. In a GOOD website, each paragraph should have ____ idea per paragraph.
  4. A GOOD website should be ______.
  5. Type of cache that someone outside the country would most likely use.
  6. Closing HTML tag for <head>.
  7. Packet/Network analyzer.
  8. A group of information on a computer that can be software programs or data.
Down
  1. The codes or tags a browser uses to create a webpage.
  2. A component that stores data so future requests for that data can be served faster.
  3. Impersonating as another student/user.
  4. No more than 5 images from a single artist.
  5. Closing HTML tag for <body>.
  6. The main technology for local area networks.
  7. The computer with the Web page is the ____ in the relationship.
  8. Companies that sell connections to the Internet.

16 Clues: Packet/Network analyzer.Closing HTML tag for <body>.Closing HTML tag for <head>.A GOOD website should be ______.Impersonating as another student/user.No more than 5 images from a single artist.The main technology for local area networks.Companies that sell connections to the Internet.The codes or tags a browser uses to create a webpage....

Disaster Preparedness Disaster Types Crossword # 3 2023-06-14

Disaster Preparedness Disaster Types Crossword # 3 crossword puzzle
Across
  1. Severe winter storms characterized by low temperatures, strong winds, and heavy snowfall.
  2. Violently rotating columns of air that extend from a thunderstorm cloud to the ground.
  3. Coordinated efforts to infiltrate and disrupt computer systems, networks, or digital infrastructure.
  4. Large-scale protests, riots, or conflicts within a society.
  5. Mishaps or failures related to advanced technology systems.
  6. Large ocean waves triggered by underwater earthquakes, volcanic eruptions, or landslides.
  7. Intense tropical storms with strong winds and heavy rainfall.
  8. Disasters caused by human activities.
Down
  1. Catastrophic incidents involving the release of radioactive materials from nuclear power plants or other nuclear facilities.
  2. Sudden shaking or trembling of the ground.
  3. Disasters that occur in industrial settings.
  4. Disasters caused by nature.
  5. Overflowing of water onto normally dry land.
  6. Uncontrolled fires that rapidly spread across vegetation.
  7. Deliberate and violent acts carried out by individuals or groups to create fear and disrupt society.
  8. Armed conflicts between nations or groups.

16 Clues: Disasters caused by nature.Disasters caused by human activities.Sudden shaking or trembling of the ground.Armed conflicts between nations or groups.Disasters that occur in industrial settings.Overflowing of water onto normally dry land.Uncontrolled fires that rapidly spread across vegetation....

CS Principles Exam Review 2024-04-25

CS Principles Exam Review crossword puzzle
Across
  1. digital data must have a ______ set of values
  2. a loop
  3. sample data used to test code
  4. The OSI model has _____ layers
  5. A small amount of text that tracks information about a user visiting a website and it is very yummy with milk
  6. An attack where a user is tricked into revealing private information, often via a deceptive email
Down
  1. the best CS teacher in scona
  2. an algorithim that reduces the size of file
  3. Application Programming __________
  4. citizen science is scientific research conducted in whole or part by ________ individuals
  5. Rogue Access Point - a _______ access point that gives unauthorized access to secure networks
  6. a type of data that fluctuates continuously over a period of time
  7. a method of user authentication that requires multiple pieces of evidence
  8. the process of encoding data to prevent unauthorized access
  9. _____ area network
  10. _____ search repeatedly splits the list in half

16 Clues: a loop_____ area networkthe best CS teacher in sconasample data used to test codeThe OSI model has _____ layersApplication Programming __________an algorithim that reduces the size of filedigital data must have a ______ set of values_____ search repeatedly splits the list in halfthe process of encoding data to prevent unauthorized access...

Cybersecurity revision crossword 2022-01-31

Cybersecurity revision crossword crossword puzzle
Across
  1. Checks incoming and outgoing network traffic for threats
  2. Hackers with no technical hacking knowledge
  3. Mathematically converts data into a form that is unreadable without a key
  4. Updating software to remove vulnerabilities automatically
  5. Type of testing that tests a network for vulnerabilities
  6. Directly observing someone enter personal details eg Pin, password
  7. Looking at common attacks and methods to protect ourselves and our networks against attacks
Down
  1. Inventing a scenario to obtaining personal information
  2. Verifying the identity of a user or process
  3. Raw facts and figures
  4. Created from the user fingerprint, iris, retina, facial, voice
  5. gaining unauthorised access to or control of a computer system
  6. Adverts for products a user may be interested in, based on internet history
  7. Distributed Denial of Service
  8. Data that has been processed and has context
  9. Completely Automated Public Turing Test To Tell Computers and Humans Apart

16 Clues: Raw facts and figuresDistributed Denial of ServiceVerifying the identity of a user or processHackers with no technical hacking knowledgeData that has been processed and has contextInventing a scenario to obtaining personal informationChecks incoming and outgoing network traffic for threatsType of testing that tests a network for vulnerabilities...

Electric Cars 2025-09-12

Electric Cars crossword puzzle
Across
  1. networks that use technology to manage electricity efficiently.
  2. easy to reach or use.
  3. energy sources like coal, oil, or gas that come from ancient plants and animals.
  4. long-term changes in the Earth’s weather patterns.
  5. energy – energy that comes from motion or moving parts.
  6. causing damage or injury.
  7. to reduce something to the smallest possible amount.
Down
  1. the basic systems and structures (like roads, power stations, and charging stations) needed for a society or activity.
  2. to protect from harm.
  3. a metal used in batteries to help store energy.
  4. able to be continued or maintained without causing harm to the environment.
  5. a new idea, method, or invention.
  6. energy – energy stored in substances that can be released in a reaction
  7. braking – a system in electric cars that captures energy while slowing down to recharge the battery.
  8. a light, soft metal used in batteries.
  9. working in a way that saves time, energy, or resources.

16 Clues: to protect from harm.easy to reach or use.causing damage or injury.a new idea, method, or invention.a light, soft metal used in batteries.a metal used in batteries to help store energy.long-term changes in the Earth’s weather patterns.to reduce something to the smallest possible amount.energy – energy that comes from motion or moving parts....

Electric Cars 2025-09-12

Electric Cars crossword puzzle
Across
  1. to reduce something to the smallest possible amount.
  2. causing damage or injury.
  3. energy stored in substances that can be released in a reaction
  4. a metal used in batteries to help store energy.
  5. long-term changes in the Earth’s weather patterns.
  6. the basic systems and structures (like roads, power stations, and charging stations) needed for a society or activity.
  7. easy to reach or use.
  8. a light, soft metal used in batteries.
Down
  1. a system in electric cars that captures energy while slowing down to recharge the battery.
  2. energy sources like coal, oil, or gas that come from ancient plants and animals.
  3. able to be continued or maintained without causing harm to the environment.
  4. energy that comes from motion or moving parts.
  5. working in a way that saves time, energy, or resources.
  6. networks that use technology to manage electricity efficiently.
  7. a new idea, method, or invention.
  8. to protect from harm.

16 Clues: to protect from harm.easy to reach or use.causing damage or injury.a new idea, method, or invention.a light, soft metal used in batteries.energy that comes from motion or moving parts.a metal used in batteries to help store energy.long-term changes in the Earth’s weather patterns.to reduce something to the smallest possible amount....

IoT Puzzle 2025-04-01

IoT Puzzle crossword puzzle
Across
  1. The practice of protecting internet-connected systems from cyber threats.
  2. A secret or hidden way to bypass security and gain unauthorized access to a system or network.
  3. A security system that monitors and controls incoming and outgoing network traffic.
  4. The process of converting data into a code to prevent unauthorized access.
  5. Short-range wireless technology.
  6. Devices that collect and transmit real-time data from the environment.
Down
  1. Malicious software designed to harm or exploit devices or networks.
  2. Wireless standard for IoT connectivity.
  3. Software embedded in IoT devices that controls their operations.
  4. Verifying a user’s identity before granting access to a system.
  5. Remote servers used for data storage & processing.
  6. Connects IoT devices to the internet.
  7. Wireless transmission of data.
  8. Wireless communication protocol for IoT.
  9. A type of cyber-attack where attackers trick users into providing sensitive information.
  10. A network topology where devices connect directly and relay data to each other.

16 Clues: Wireless transmission of data.Short-range wireless technology.Connects IoT devices to the internet.Wireless standard for IoT connectivity.Wireless communication protocol for IoT.Remote servers used for data storage & processing.Verifying a user’s identity before granting access to a system....

Biome Productivity 2026-02-23

Biome Productivity crossword puzzle
Across
  1. Replacing the natural biome with plants and animals from elsewhere
  2. Adding water to land to supplement natural rainfall
  3. These least productive biomes
  4. Species moving in response to climate changes
  5. Networks of feeding relationships
  6. The location and arrangement of biomes across the surface of the Earth
  7. Structures or plantings to reduce wind and protect crops
  8. Adding nutrients to soil to increase crop yields
Down
  1. Refers to places with mild to warm summers and cool to cold winters
  2. Refers to the amount of biomass or living plant material produced
  3. This biome occurs near the Arctic Circle and at high mountain ranges where it's too cold for trees
  4. The process used by plants to produce biomass using sunlight
  5. Earth’s major vegetation communities
  6. Areas of the Earth that have similar temperatures
  7. Refers to places that are between the tropics and have warm winters and hot summers
  8. Refers to places with cool summers and very cold winters

16 Clues: These least productive biomesNetworks of feeding relationshipsEarth’s major vegetation communitiesSpecies moving in response to climate changesAdding nutrients to soil to increase crop yieldsAreas of the Earth that have similar temperaturesAdding water to land to supplement natural rainfallRefers to places with cool summers and very cold winters...

MANNERS 2018-01-10

MANNERS crossword puzzle
Across
  1. the handing down of statements, beliefs, etc., esp. by word of mouth or by practice
  2. the rules of proper social or professional behavior; manners.
  3. thoughtful or sympathetic regard or respect; thoughtfulness for others:
  4. skill in managing negotiations, handling people, etc., so that there is little or no ill will; tact:
Down
  1. the etiquette of computer networks, esp. the Internet.
  2. reciprocal action, effect, or influence; communication between people
  3. impoliteness
  4. the act of showing good manners; courteousy:
  5. gratitude; thankful recognition; critical notice; evaluation; opinion, as of a situation, person, etc.
  6. a social or official position or standing, as in the armed forces

10 Clues: impolitenessthe act of showing good manners; courteousy:the etiquette of computer networks, esp. the Internet.the rules of proper social or professional behavior; manners.a social or official position or standing, as in the armed forcesreciprocal action, effect, or influence; communication between people...

GONE Novel Study 2013-10-29

GONE Novel Study crossword puzzle
Across
  1. take part in a violent struggle involving the exchange of physical violence or the use of weapons.
  2. electric or motive power generated by a nuclear reactor.
  3. no longer present; departed; disappeared.
  4. a large farm, where cattle or other animals are bred.
Down
  1. a standard or expected.
  2. a global computer network providing a variety of information and communication networks.
  3. a holiday to share your thanks for various things.
  4. relating to or affected by autism; a person with autism.
  5. a magical ability; the ability or capacity to do something or act in a particular way.
  6. a sudden intense feeling of power or emotion.

10 Clues: a standard or expected.no longer present; departed; disappeared.a sudden intense feeling of power or emotion.a holiday to share your thanks for various things.a large farm, where cattle or other animals are bred.relating to or affected by autism; a person with autism.electric or motive power generated by a nuclear reactor....

shane rivera internet crossword puzzel 2013-12-02

shane rivera internet crossword puzzel crossword puzzle
Across
  1. USE The fair use doctrine provides educators with the right to make
  2. A bully who operates online, in cyberspace; To bully online
  3. software used to view various kinds of Internet resources found on the Web
  4. that A global network of thousands of other computer networks offers
Down
  1. –the unauthorized use, reproduction
  2. unauthorized person who secretly gains access to computer files.
  3. list of citations that appear at the end of a paper, article, chapter or book.
  4. Network etiquette; Online manners; following
  5. -a piece of REFRESHrenew or revitalize; To reload a
  6. A system of connected computers that allows the

10 Clues: –the unauthorized use, reproductionNetwork etiquette; Online manners; followingA system of connected computers that allows the-a piece of REFRESHrenew or revitalize; To reload aA bully who operates online, in cyberspace; To bully onlineunauthorized person who secretly gains access to computer files....

Sample 2021-02-24

Sample crossword puzzle
Across
  1. is a small software program that uses computer networks and takes advantage of security weaknesses to replicate.
  2. A collection of relevant computer files stored and organised together.
  3. Collection of information stored together on a computer.
  4. Displays data in an organised way in a document
  5. Vertical series of cells in a table.
Down
  1. A web page is a document or a page on the
  2. The way one slide follows the other on the screen during the slide show.
  3. Arranging files on the desktop in a proper manner
  4. An intersection of a row and columns
  5. is an online journal or diary.

10 Clues: is an online journal or diary.An intersection of a row and columnsVertical series of cells in a table.A web page is a document or a page on theDisplays data in an organised way in a documentArranging files on the desktop in a proper mannerCollection of information stored together on a computer....

Digi Tech 2021-03-04

Digi Tech crossword puzzle
Across
  1. A wireless access point that allows Wi-Fi to connect to a wired network
  2. Is a computer network system, covers a small area and only authorized people can access it
  3. Is a network across a local area
  4. A cable used in networks (Hint starts with a C)
  5. A web that is covered world wide
  6. Endpoint of a network connection
Down
  1. Picture element is the smallest part of a graphic image
  2. Type of files that organizes other files
  3. Statistics and facts together for reference or analysis
  4. A sort of online inventory that consists of a series of entries

10 Clues: Is a network across a local areaA web that is covered world wideEndpoint of a network connectionType of files that organizes other filesA cable used in networks (Hint starts with a C)Picture element is the smallest part of a graphic imageStatistics and facts together for reference or analysis...

Building A House 2022-02-17

Building A House crossword puzzle
Across
  1. Heat & Air ventilation
  2. A secure grip of the foot tiles
  3. A collective of individual telecommunication networks, transmission systems, relay stations, etc..
  4. Clay used for a building material (Sun-Dried Bricks)
  5. A long, sturdy piece of square timber or metal usually to support the room
Down
  1. Network of conductors and equipment designed to carry, distribute, and convert electrical power safely
  2. The lowest load-bearing part of the entire building
  3. An automatic control system operation, process, or mechanisms are regulated
  4. A scale diagram of the arrangement of rooms in a one story building
  5. A pair of horizontal boards

10 Clues: Heat & Air ventilationA pair of horizontal boardsA secure grip of the foot tilesThe lowest load-bearing part of the entire buildingClay used for a building material (Sun-Dried Bricks)A scale diagram of the arrangement of rooms in a one story buildingA long, sturdy piece of square timber or metal usually to support the room...

Network Key Terms 2021-03-25

Network Key Terms crossword puzzle
Across
  1. - A device for connecting computers and other network capable devices together to form a network
  2. - A system of organising things in terms of a perceived importance
  3. - Allows computers to connect to a network over a telephone line
  4. - The end point of communication between networks
  5. - A device that connects computers to a network using Wi-Fi
Down
  1. - A period of time delay in a computer system
  2. - Anything you save on the computer
  3. - A server that stores files for other computers
  4. - A global network connecting millions of computers
  5. - An area of control or management, is controlled by the BBC

10 Clues: - Anything you save on the computer- A period of time delay in a computer system- A server that stores files for other computers- The end point of communication between networks- A global network connecting millions of computers- A device that connects computers to a network using Wi-Fi- An area of control or management, is controlled by the BBC...

6 2024-01-31

6 crossword puzzle
Across
  1. Hiding keyword-stuffed text by matching its color with the background.
  2. Deploying scripts to automatically generate doorway pages for SEO purposes.
  3. Showing different content to search engines and users based on IP addresses.
Down
  1. Posting fabricated positive reviews to boost reputation and rankings.
  2. Using automated tools to generate spun content for SEO purposes.
  3. Sending fake referral traffic to websites to manipulate analytics data.
  4. Redirecting users to unrelated or malicious websites without their consent.
  5. Redirecting traffic from legitimate sites to spam or phishing pages.
  6. Creating interconnected networks of websites solely for link manipulation.
  7. Hosting illegitimate content on reputable websites to gain SEO benefits.

10 Clues: Using automated tools to generate spun content for SEO purposes.Redirecting traffic from legitimate sites to spam or phishing pages.Posting fabricated positive reviews to boost reputation and rankings.Hiding keyword-stuffed text by matching its color with the background.Sending fake referral traffic to websites to manipulate analytics data....

Asian Transitions in an Age of Global Trade 2024-02-01

Asian Transitions in an Age of Global Trade crossword puzzle
Across
  1. An example of a crop produced in the Ming Dynasty.
  2. An advantage Europe had over Asia.
  3. A policy Emperor Hongwu favored as the basis of the economy.
  4. Floods and droughts led too…
  5. An item that was on high demand throughout the trading system.
  6. An innovative tool that was used to explore/guide expansion
Down
  1. Established throughout the coast of Asia/ surrounding African countries.
  2. The term that the Ming era flourished in with their goods.
  3. A motive which drove the Portuguese/Europeans to follow through with overseas expansion.
  4. The goal the Portuguese had when taking over Asian trade networks.

10 Clues: Floods and droughts led too…An advantage Europe had over Asia.An example of a crop produced in the Ming Dynasty.The term that the Ming era flourished in with their goods.An innovative tool that was used to explore/guide expansionA policy Emperor Hongwu favored as the basis of the economy....

cross word 2019-04-01

cross word crossword puzzle
Across
  1. an activity that is natural to or the purpose of a person or thing.
  2. relating to, composed of, or involving two things.
  3. an individual or collaborative enterprise that is carefully planned to achieve a particular aim.
  4. an electronic device for storing and processing data.
  5. global computer network providing a variety of information and communication facilities.
Down
  1. local area network.
  2. make or manufacture from components or raw materials.
  3. the process of providing or obtaining the food necessary for health and growth.
  4. minute area of illumination on a display screen.
  5. a networking device that forwards data packets between computer networks.

10 Clues: local area network.minute area of illumination on a display screen.relating to, composed of, or involving two things.make or manufacture from components or raw materials.an electronic device for storing and processing data.an activity that is natural to or the purpose of a person or thing....

Ethical Haching 2019-05-25

Ethical Haching crossword puzzle
Across
  1. intending to cause harm.
  2. is the practice of protecting computer networks and systems from cyberattacks.
  3. is a tactic of manipulating people to give up important information.
  4. a computer or other device connected to a computer network.
Down
  1. is committing a crime with the aid of computers.
  2. a service that interprets domain names into IP addresses.
  3. is the first phase of penetration testing.
  4. is a system program that controls and organises the general operations of a computer.
  5. is a method to identify vulnerabilities in a computer network or system.
  6. an attempt to cause harm to a computer network or system.

10 Clues: intending to cause harm.is the first phase of penetration testing.is committing a crime with the aid of computers.a service that interprets domain names into IP addresses.an attempt to cause harm to a computer network or system.a computer or other device connected to a computer network....

Global Economic Development from 1750 to 1900 2024-04-30

Global Economic Development from 1750 to 1900 crossword puzzle
Across
  1. Emerging areas where goods and services can be sold.
  2. Nations specializing in providing raw materials for industrialized countries.
  3. Networks of tracks and trains used for transportation of goods and people.
  4. The practice of establishing colonies to exploit resources and trade.
  5. Materials found in nature that are used for economic gain.
Down
  1. Vessels powered by steam engines for transportation across oceans.
  2. The process of using machinery for production instead of manual labor.
  3. Socioeconomic group between the working class and upper class.
  4. Workers who are paid minimum wages for their services.
  5. A period of significant industrial growth and technological advancements.

10 Clues: Emerging areas where goods and services can be sold.Workers who are paid minimum wages for their services.Materials found in nature that are used for economic gain.Socioeconomic group between the working class and upper class.Vessels powered by steam engines for transportation across oceans....

Computer Security, and Safety, Ethics, and Privacy 2024-08-14

Computer Security, and Safety, Ethics, and Privacy crossword puzzle
Across
  1. discovery, collection, and analysis of evidence found on computers and networks
  2. "Completely Automated Turing test"; a program that verifies user input is not computer generated
  3. state of being free from danger or threat
Down
  1. private combination of characters that allows access to certain resources
  2. online or internet-based illegal acts
  3. duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
  4. the last word from our topic's title
  5. a potentially damaging computer program
  6. the process of converting readable data into unreadable characters to prevent unauthorized access
  7. action or crime of stealing

10 Clues: action or crime of stealingthe last word from our topic's titleonline or internet-based illegal actsa potentially damaging computer programstate of being free from danger or threatprivate combination of characters that allows access to certain resourcesdiscovery, collection, and analysis of evidence found on computers and networks...

technology crossword 2023-06-07

technology crossword crossword puzzle
Across
  1. it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure,
  2. it is a method of representing data in a visual,
  3. it represents text, computer processor instructions
  4. it is an American multinational technology company
  5. it is the most important processor in a given computer.
Down
  1. it is a mobile operating system
  2. it is a mapping from some domain
  3. it allows developers to directly manipulate its underlying data structures:...
  4. is a method of transmitting and receiving messages using electronic devices.
  5. it is a collection of discrete values that convey information,

10 Clues: it is a mobile operating systemit is a mapping from some domainit is a method of representing data in a visual,it is an American multinational technology companyit represents text, computer processor instructionsit is the most important processor in a given computer.it is a collection of discrete values that convey information,...

Technology 2025-01-06

Technology crossword puzzle
Across
  1. Existing in a digital environment rather than the physical world
  2. A link or relationship between two or more things through technology or communication
  3. Easy to reach, use, or understand by everyone
  4. A technology that connect computers and networks to allow people to share information and communicate.
  5. A system of connected computers or people that share information or resources
Down
  1. Made by humans rather than occurring naturally
  2. Writing information by programming language to create software or application
  3. Watching or Listening to content online without downloading it
  4. Transferring data or files from internet to your device
  5. Progress or improvement in skills, technology, or knowledge

10 Clues: Easy to reach, use, or understand by everyoneMade by humans rather than occurring naturallyTransferring data or files from internet to your deviceProgress or improvement in skills, technology, or knowledgeWatching or Listening to content online without downloading itExisting in a digital environment rather than the physical world...

Krisha Kulkarni Srushti Shewale Rugved Deshwant Aayush Joshi 2025-04-22

Krisha Kulkarni   Srushti Shewale   Rugved Deshwant  Aayush Joshi crossword puzzle
Across
  1. AI-powered content generation tool, popular for writing and marketing
  2. OpenAI’s conversational AI that chats, codes, and helps with tasks
  3. Amazon’s cloud platform offering compute, storage, and AI services
  4. Data visualization library built on Matplotlib with beautiful themes
Down
  1. :Functional highlights or capabilities of a product or service
  2. Computer vision library used for face detection and real-time image processing
  3. Facebook-developed ML framework, loved for dynamic computation graphs
  4. Python library for plotting data with lines, bars, or scatter charts
  5. Google’s AI model family, a rival to GPT with multimodal abilities
  6. Google’s deep learning framework used for neural networks and ML

10 Clues: :Functional highlights or capabilities of a product or serviceGoogle’s deep learning framework used for neural networks and MLOpenAI’s conversational AI that chats, codes, and helps with tasksGoogle’s AI model family, a rival to GPT with multimodal abilitiesAmazon’s cloud platform offering compute, storage, and AI services...

Technology 2024-10-14

Technology crossword puzzle
Across
  1. - A portable touchscreen device, larger than a smartphone.
  2. - A device that forwards data packets between computer networks.
  3. - A device used for typing on a computer or mobile device.
  4. - To transfer data from the internet to a local device.
  5. – A network security system that monitors and controls incoming and outgoing network traffic.
Down
  1. - Programs and applications that run on a computer.
  2. - A mobile phone that performs many functions of a computer.
  3. - A wireless technology for exchanging data over short distances.
  4. - A method of sending digital messages over the internet.
  5. - A wireless network technology that allows devices to communicate without direct cable connections.

10 Clues: - Programs and applications that run on a computer.- To transfer data from the internet to a local device.- A method of sending digital messages over the internet.- A portable touchscreen device, larger than a smartphone.- A device used for typing on a computer or mobile device.- A mobile phone that performs many functions of a computer....

Technology 2024-10-14

Technology crossword puzzle
Across
  1. - A device that forwards data packets between computer networks.
  2. - A method of sending digital messages over the internet.
  3. - To transfer data from the internet to a local device.
  4. - A portable touchscreen device, larger than a smartphone.
  5. - Programs and applications that run on a computer.
Down
  1. - A device used for typing on a computer or mobile device.
  2. - A mobile phone that performs many functions of a computer.
  3. - A wireless technology for exchanging data over short distances.
  4. – A network security system that monitors and controls incoming and outgoing network traffic.
  5. - A wireless network technology that allows devices to communicate without direct cable connections.

10 Clues: - Programs and applications that run on a computer.- To transfer data from the internet to a local device.- A method of sending digital messages over the internet.- A device used for typing on a computer or mobile device.- A portable touchscreen device, larger than a smartphone.- A mobile phone that performs many functions of a computer....

3S03 Presentation 1 Group 5 2025-10-06

3S03 Presentation 1 Group 5 crossword puzzle
Across
  1. Ronald lives 60 min from his pharmacy & doesn't have a car. This is a __ barrier to medication.
  2. Priya sometimes forgets to take her anti-anxiety medications. An example of __ adherence
  3. This prescription boosts focus & attention
  4. When discussing medications with clients, questions should be __
  5. Adherence rate is impacted by provider, patients, and __ factors
Down
  1. Social worker's role in helping patients overcome challenges
  2. Jenn takes 20mg of her medication at 8am every day
  3. Alex tells his social worker, Sarah, he is taking SSRIs
  4. Healthcare professional who assists clients with medications
  5. The link between patients, providers, and support networks

10 Clues: This prescription boosts focus & attentionJenn takes 20mg of her medication at 8am every dayAlex tells his social worker, Sarah, he is taking SSRIsThe link between patients, providers, and support networksSocial worker's role in helping patients overcome challengesHealthcare professional who assists clients with medications...

The Smart & Social City 2026-04-02

The Smart & Social City crossword puzzle
Across
  1. Fairness in the distribution of resources and wealth among citizens.
  2. The network of physical objects connected to the internet.
  3. The ability of devices and people to communicate via networks.
  4. Devices that collect data to manage traffic or light.
  5. The ease with which all people can reach locations and services.
Down
  1. Using technology to perform tasks without human intervention.
  2. The digital information used by algorithms to optimize urban services.
  3. A city designed for everyone, including the elderly and disabled.
  4. An interconnected system for electricity distribution and management.
  5. The right of citizens to keep their personal information safe.

10 Clues: Devices that collect data to manage traffic or light.The network of physical objects connected to the internet.Using technology to perform tasks without human intervention.The ability of devices and people to communicate via networks.The right of citizens to keep their personal information safe....

CYBER SECURITY CROSSWORD 2018-01-24

CYBER SECURITY CROSSWORD crossword puzzle
Across
  1. wireless networks
  2. Surname of the VST Manager
  3. The one who can initiate a new data download
  4. a flaw or weakness in system cyber security procedures
  5. Applications which can cause loss of availability for business data
  6. space The complex environment resulting from the interaction of people,software and services on the internet
  7. The room where cyber security awareness posters are posted
Down
  1. The Engineer to provide communication and/or support if cyber incident is also related with HQ equipment
  2. Interconnection points between various systems on the IT network
  3. The process in order to identify critical threats
  4. Person in charge for checking satellite connection
  5. The technique through which an external source transmits manipulated data which the GPS receives as legitimate
  6. Combination of consequences and frequency of a risk assessment procedure
  7. another word for junk email
  8. Communication over public channels
  9. The response team which deals with cyber threats

16 Clues: wireless networksSurname of the VST Manageranother word for junk emailCommunication over public channelsThe one who can initiate a new data downloadThe response team which deals with cyber threatsThe process in order to identify critical threatsPerson in charge for checking satellite connectiona flaw or weakness in system cyber security procedures...

Week 4: I'm in Love with a Marmot 2025-07-04

Week 4: I'm in Love with a Marmot crossword puzzle
Across
  1. My new job this Saturday with the dining hall
  2. ___shaw; also, who has patiently keyed out willows with me
  3. A type of bread with a hole in the middle; second part of Butte ____
  4. Rest in Peace
  5. My adoptive lab; studies pollination networks
  6. Can be made into syrup using the genus Picea
  7. A welcoming meal, with beans (Texas style)
Down
  1. "Save a Marmot! Close the Lid! Latch the Door!" sign found in every _____
  2. Number of bees that have infiltrated Johnson Cabin
  3. The Perks of Being a [genus Erysimum]
  4. A type of knot used to pull tension when stringing transects
  5. Genus of plant used in RMBL 4th of July traditions
  6. What charged at two researchers who were trying to do science
  7. Smaller than a marmot, larger than a mouse
  8. Why I might abandon my research to get off the mountain
  9. An underrated pollinator; a.k.a. flower flies

16 Clues: Rest in PeaceThe Perks of Being a [genus Erysimum]Smaller than a marmot, larger than a mouseA welcoming meal, with beans (Texas style)Can be made into syrup using the genus PiceaMy new job this Saturday with the dining hallMy adoptive lab; studies pollination networksAn underrated pollinator; a.k.a. flower flies...

Age of Exploration Review 2025-10-09

Age of Exploration Review crossword puzzle
Across
  1. device that allowed the quick production of books
  2. "discovered" the Americas in 1492
  3. discovered that the Americas are two different continents
  4. conquistador the led the toppling of the Incan empire
  5. device that used constellations and stars to calculate longitude for sailors
  6. cultural movement that believed in a return to ancient Greek and Roman thought
  7. groups of soldiers that led expeditions in the Americas
Down
  1. series of conflicts between Muslims and Christians
  2. invented the printing press
  3. series of wars between Muslims and Spain on the Iberian peninsula
  4. led the first voyage to circumnavigate the globe
  5. conquistador that led the toppling of the Aztec empire
  6. new type of ship that sailed faster and carried more cargo
  7. traveled the Silk Road and published his book "Travels"
  8. primary motivation for European explorers to reach Asia
  9. empire that created a series of trade networks across the Mediterranean Sea

16 Clues: invented the printing press"discovered" the Americas in 1492led the first voyage to circumnavigate the globedevice that allowed the quick production of booksseries of conflicts between Muslims and Christiansconquistador the led the toppling of the Incan empireconquistador that led the toppling of the Aztec empire...