networks Crossword Puzzles
REV Cybersecurity Awareness Crossword Puzzle #2 2019-10-16
Across
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- a standalone malware computer program that replicates itself in order to spread to other computers.
- any software program in which advertising banners are displayed while the program is running.
- door a method, often secret, of bypassing normal authentication in a product.
- threat refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- someone who seeks and exploits weaknesses in a computer system or computer network.
- global system of interconnected computer networks that use the Internet protocol suite.
- designed to detect and destroy computer viruses.
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- an attempt by hackers to damage or destroy a computer network or system.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
compute 2021-05-13
5 Clues: sussy? • what has 1,024 bytes? • what device routs traffic between networks? • what is the smallest part of a graphic image? • what is the inter face part of a device where another device is connected?
Computer 2023-11-12
5 Clues: Cancel the current task • Messages delivered across computer networks • A device that prints images from the computer • Control: A key that you press with other keys • central processing unit; the brain of the computer
Information Technology Crossword Puzzle 2 2021-04-26
Across
- Bring Your Own Device
- Intelligence that is demonstrated in a machine.
- GUI is a common IT terminology that stands for what?
Down
- CommScope’s new plan for reducing costs
- Refers to an array of software and tools that businesses can use to analyze raw data.
- Allows businesses and other users to access computing resources that are delivered to them over the Internet or other networks.
- Stands for Robotic Process Automation and CommScope celebrates 100 Bots
- Acronym for Information Technology Infrastructure Library
8 Clues: Bring Your Own Device • CommScope’s new plan for reducing costs • Intelligence that is demonstrated in a machine. • GUI is a common IT terminology that stands for what? • Acronym for Information Technology Infrastructure Library • Stands for Robotic Process Automation and CommScope celebrates 100 Bots • ...
Transport in Great Britain 2023-01-17
Across
- Two wheeled mode of transport
- Motorised two wheeled mode of transport. Famous British makers include Royal Enfield and BSA.
- Tracks spread across the country to offer quick national transport.
Down
- British car manufacturer famous for the 'Minor'.
- Famous for transporting the royal family cars and their luxury.
- Large public vehicles that started in London in 1829 (tricky!).
- Networks of waterways primarily used for transport.
- Still used in Birmingham and Edinburgh today. Work on tracks. First introduced in 1829.
8 Clues: Two wheeled mode of transport • British car manufacturer famous for the 'Minor'. • Networks of waterways primarily used for transport. • Famous for transporting the royal family cars and their luxury. • Large public vehicles that started in London in 1829 (tricky!). • Tracks spread across the country to offer quick national transport. • ...
Synthetic Biology Crossword Puzzle 2023-06-02
Across
- a disease that affects your lungs
- a field of science that involves redesigning organisms for useful purposes by engineering them to have new abilities
- How much money has Ginkgo Bioworks raised?
- engineered networks of genes linked through transcriptional and post-transcriptional regulation
- drugs that can target specific neural circuits in the brain
Down
- a nutrient that's usually associated with carrots that prevents Vitamin A deficiency
- brain waves
- a progressive disease that destroys memory and other important mental functions
8 Clues: brain waves • a disease that affects your lungs • How much money has Ginkgo Bioworks raised? • drugs that can target specific neural circuits in the brain • a progressive disease that destroys memory and other important mental functions • a nutrient that's usually associated with carrots that prevents Vitamin A deficiency • ...
Module 4 Terms and Commands Crossword 2021-12-17
Across
- the physical opening where a data cable can be plugged in
- the application-level throughput of a communication
- the amount of material or items passing through a system or process
- a multiplier of 10¹²
Down
- a unit of computer memory or data equal to 1,024 (210) bits
- a point at which lines or pathways intersect or branch
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- a networking device that forwards data packets between computer networks
8 Clues: a multiplier of 10¹² • the application-level throughput of a communication • a point at which lines or pathways intersect or branch • the physical opening where a data cable can be plugged in • a unit of computer memory or data equal to 1,024 (210) bits • the amount of material or items passing through a system or process • ...
s16 2024-08-04
Across
- A type of malware that spreads by infecting other programs
- A secret word or phrase used to gain access to a system
- Malicious software disguised as a legitimate application
Down
- Software that gathers user information without consent
- Redirecting users to a fake website without their knowledge
- Gaining unauthorized access to systems or networks
6 Clues: Gaining unauthorized access to systems or networks • Software that gathers user information without consent • A secret word or phrase used to gain access to a system • Malicious software disguised as a legitimate application • A type of malware that spreads by infecting other programs • Redirecting users to a fake website without their knowledge
Network Pro Ch2 2024-01-19
Across
- a network in a small geographic area, like an office
- each host can provide network resources to other hosts
- Connecting two networks under different management
Down
- hosts have specific roles.
- created using Bluetooth wireless technologies.
- group of LANs that are geographically isolated and connected to form a large internetwork.
6 Clues: hosts have specific roles. • created using Bluetooth wireless technologies. • Connecting two networks under different management • a network in a small geographic area, like an office • each host can provide network resources to other hosts • group of LANs that are geographically isolated and connected to form a large internetwork.
Choice board #5 2025-04-01
Across
- Equal rights, prepared to solve challenging problems.
- Student's extended familial and community networks. Students gather information on families.
- Hopes and dreams students have
- Students use these contacts to navigate life. Encouraging peer groups.
Down
- Different language and communication skills students bring.
- abilities to navigate institutions. How to work through hostile environments.
6 Clues: Hopes and dreams students have • Equal rights, prepared to solve challenging problems. • Different language and communication skills students bring. • Students use these contacts to navigate life. Encouraging peer groups. • abilities to navigate institutions. How to work through hostile environments. • ...
Choice board #5 2025-04-01
Across
- Equal rights, prepared to solve challenging problems.
- Student's extended familial and community networks. Students gather information on families.
- Hopes and dreams students have
- Students use these contacts to navigate life. Encouraging peer groups.
Down
- Different language and communication skills students bring.
- abilities to navigate institutions. How to work through hostile environments.
6 Clues: Hopes and dreams students have • Equal rights, prepared to solve challenging problems. • Different language and communication skills students bring. • Students use these contacts to navigate life. Encouraging peer groups. • abilities to navigate institutions. How to work through hostile environments. • ...
Learning Unit 1 Revision 2024-02-26
Across
- plays a crucial role in the growth and long-term performance of information technology within an organization. It provides a strategic framework and methodology for aligning business goals with IT initiatives, ensuring that technology investments support the overall objectives of the enterprise.
- encompass the use of technology, people, processes, and data to perform various functions within an organization.
- powered by IT, is revolutionizing industries by replacing manual and repetitive tasks with robotic processes. This not only improves efficiency but also reduces errors and operational costs.
- comprises the foundational hardware, software, networks, and facilities that support the existence, operation, and management of an enterprise IT environment.
- involves delivering computing services, including storage, processing power, and software, over the internet.
- connects devices and enables them to communicate, creating a network of interconnected systems. This has applications in supply chain management, logistics, healthcare, and smart cities, leading to increased efficiency and innovation.
- Streamlining and automating internal processes to improve efficiency and reduce manual intervention.
- is the process of using digital technologies to create or modify business processes, culture, and customer experiences to meet changing business and market requirements.
Down
- Companies are undergoing ____________ by integrating IT into their core operations. This involves the adoption of digital technologies such as cloud computing, data analytics, and artificial intelligence (AI) to enhance efficiency and decision-making.
- Moving operations to the cloud allows for greater scalability, flexibility, and cost efficiency in managing data and applications
- involves creating virtual versions of computing resources (servers, storage, networks) to abstract and optimize physical infrastructure.
- plays a crucial role in business process improvement and competition, impacting various aspects of organizational functioning.
- are physical facilities housing computer systems, servers, networking equipment, and storage for the purpose of processing, storing, managing, and disseminating large amounts of data.
13 Clues: Streamlining and automating internal processes to improve efficiency and reduce manual intervention. • involves delivering computing services, including storage, processing power, and software, over the internet. • encompass the use of technology, people, processes, and data to perform various functions within an organization. • ...
EEST Module 6 Residential and Commercial Building Networks 2023-03-24
Across
- Which of the following is essential in order to integrate stand-alone components
- In which layer in the OSI Model is routing information added
- The standard for gathering statistical data about network\
- A basic parity bit is considered a(n)
- What layer in the OSI Model defines specifications for the connections to a device
- The maximum length of RS-232 cable that should be used is
- A virtual network is created by configuring
- What type of device is a network hub
- Which layer in the OSI Model provides reliable data transfer services to the upper layers
Down
- What type of feedback is most desirable when using a user interface
- The protocol used to transfer files between devices is called
- Remote troubleshooting of an integrated system using a PC can be done using a(n)
- A network switch that cannot be configured or monitored is called a(n)
- A special message sent over a network to advise a technician that there is a problem with a piece of equipment is called a(n)
- The most common voltage level used with RS-232 signals is
- A home/intrusion alarm system that alerts a public safety agency when an emergency occurs must be equipped with a(n)
- A smart home system's computer and software interface with
- An address on a network that is permanently assigned to a port or device is called a
- What type of topology is used in most integrated systems
- Which of the following uses a 6C6P connector
- The predominant protocol for networking and the Internet is
21 Clues: What type of device is a network hub • A basic parity bit is considered a(n) • A virtual network is created by configuring • Which of the following uses a 6C6P connector • What type of topology is used in most integrated systems • The most common voltage level used with RS-232 signals is • The maximum length of RS-232 cable that should be used is • ...
DISASTERS 2025-04-12
Across
- A sudden shaking of the ground that can cause damage.
- A huge wave caused by an undersea earthquake or volcanic eruption.
- A violent spinning column of air.
Down
- A person trained to put out fires and rescue people.
- A digital threat to computer systems and networks.
- Water covering land that is usually dry.
6 Clues: A violent spinning column of air. • Water covering land that is usually dry. • A digital threat to computer systems and networks. • A person trained to put out fires and rescue people. • A sudden shaking of the ground that can cause damage. • A huge wave caused by an undersea earthquake or volcanic eruption.
IT Crossword 2025-06-13
Across
- The process of converting information into code
- What System protects a computer by not allowing unauthorized people?
Down
- A Device that connects two different types of network.
- Software used to prevent viruses
- A device that lets you connect your computer to other networks
- A String of characters used to identity a user
6 Clues: Software used to prevent viruses • A String of characters used to identity a user • The process of converting information into code • A Device that connects two different types of network. • A device that lets you connect your computer to other networks • What System protects a computer by not allowing unauthorized people?
Lesson 10 2013-09-30
Across
- The central core of a network, this connection can link many smaller networks to a larger network.
- A network architecture where all computers have equal responsibilities and all computers can share files with each other.
- Any receiving point in a computer network.
- network A type of network where computers are close together, typically in the same building or office.
- ring topology A network layout in which each individual node is connected to two others, with the first and last coming back to connect to each other, thus completing the ring shape.
- The rules of initiating, interrupting, and continuing communication on a computer network.
- A set of programs used to manage and secure a network.
- area network (WAN) A type of network where the computers are far apart—in different buildings, different cities, or even different countries.
- A central point on a network where computers can connect. The central point is often a switch rather than a hub.
- topology A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
- cable The most commonly used kind of networking cable today.
- A piece of hardware or software on a network designed to limit access to certain machines to authorized users only.
- The study of how items are related to one another in space; a configuration.
- A type of electrical cable often used to transmit cable TV.
- A network architecture in which each computer is either a client or a server. Servers are powerful computers dedicated to managing the clients. Clients are PCs on which users run applications. Clients rely on servers for resources..
Down
- A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization’s needs.
- A computer dedicated to providing one service (such as web hosting, disk storage, and so on) and that is shared by many users across a network.
- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.
- The primary networking technology currently in use. Ethernet defines standards for addressing packets and data and a method for avoiding data conflicts on the network.
- The small unit into which information is broken down before being sent across a network.
- A computer intended to be used by one person at a time.
- Often called a network switch, this connects many parts of a network and directs traffic as needed.
- The design of a computer network, which specifies how devices communicate with one another. The most common network architecture types are client/server and peer-to-peer.
- A card that enables one computer to send and receive data to and from another computer.
- communication Data transmission that uses radio frequencies instead of cabling.
- A device that links two computer networks or links a local area network to the Internet. A router reads packet addresses and routes packets.
- Two or more devices connected together.
- A LAN topology wherein two star networks are linked using a bus.
- What an organization’s intranet becomes when the organization allows outsiders to access its intranet.
- A private network that looks and functions a lot like the Internet but is typically available only to the employees of an organization.
- A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
- A type of hub that uses a table to keep track of destinations so that data can be sent directly to its destination, rather than to every computer on the network before the destination machine receives it.
32 Clues: Two or more devices connected together. • Any receiving point in a computer network. • A set of programs used to manage and secure a network. • A computer intended to be used by one person at a time. • A type of electrical cable often used to transmit cable TV. • cable The most commonly used kind of networking cable today. • ...
CISMP Glossary Words 2023-08-10
Across
- A set of rules that define how two entities communicate effectively.
- The process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it but authorised parties can.
- The maximum level of risk that an organisation is prepared to accept.
- A common network grouping, under which a collection of network devices or addresses are organised.
- A hardware device or software program capable of logging information on a network.
- A method of splitting a computer network into sub-networks, each being a network segment, in order to boost performance and improve security by helping to contain malware and other threats (see also partitioning).
- The act of making a judgement about the amount, number, or value of Something.
- Enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security, and management policies of the private network.
- Provide advice, direction, and best practice. Not mandatory / Discretionary.
- A means to ensure access to assets is restricted based upon business requirements.
- The intentional paralysing of a computer network by flooding it with data.
- Used to breach cryptographic security systems and gain access to the contents of encrypted messages.
- A mathematical scheme for demonstrating the authenticity of a digital message or document
- A database that records relevant information about risks and can be used both for reporting purposes and to track risk treatment.
- The ability to prove that a person, entity or process cannot deny having carried out an action.
- A policy used to identify what personal use of company resources is acceptable.
- The process of analysing the consequences a business disruption might have upon the organisation's assets.
Down
- The amount of the risk a business can absorb.
- The action or manner of controlling a process.
- The ability of an organisation to continue to function in order to deliver its products or services at an acceptable level following a business disruption.
- A technological barrier designed to prevent unauthorised or unwanted communications between computer networks or hosts.
- A method of evaluating the security of a computer system or network by simulating an attack from malicious outsiders and insiders
- Software designed to negate or destroy a computer virus.
- The detailed examination of the elements or structure of an entity.
- The property of ensuring that information can only be altered by authorised persons, entities or processes
- A development and deployment environment in the cloud, with resources enabling the delivery of cloud-based applications
- A principle or rule to guide decisions and achieve rational outcomes. Mandatory.
- The activity of recovering telecommunications, IT or systems after a business disruption.
- The risks that remain after all risk mitigation actions have been implemented.
- Software designed to gather information in a covert manner Strategic risk treatment: Four control options of treat, terminate, tolerate or transfer (or the equivalent) a risk.
- The act of attempting to acquire information such as usernames. passwords and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
- The process of securing a system by reducing its surface of vulnerability.
- A non-self-replicating type of malware that appears to perform a desirable function but instead facilitates unauthorised access to the user's computer system.
- Acting in accordance with a set of rules or a policy.
- An unwanted or unauthorised access to an information system.
- A standalone malware computer program that replicates itself in order to spread to other computers.
36 Clues: The amount of the risk a business can absorb. • The action or manner of controlling a process. • Acting in accordance with a set of rules or a policy. • Software designed to negate or destroy a computer virus. • An unwanted or unauthorised access to an information system. • The detailed examination of the elements or structure of an entity. • ...
CS Principles 2022 2022-04-22
Across
- splits a program into multiple tasks(2 words)
- prevents unauthorized access to data
- error that takes place while executing a program (3 words)
- specify the behavior of a system
- gives unauthorized access to secure networks
- determines how to address nodes on the network
- or code
- measured in max bits per second
- a good but not optimal solution to a problem
- a program receives a number, value or variable outside the scope of its ability to handle. (2 words)
Down
- repetition of steps in an algorithm or program until chosen to stop
- error of a coding or programming language, entered by a programmer (2 words)
- sequencing, selection, and iteration
- uncovers hidden data
- so logically difficult,the answer is sequencing step by step exacution of a
- Boolean condition to determine which of two paths are taken in an algorithm or program
- error in a program’s source code that has unanticipated and erroneous behavior (2 words)
17 Clues: or code • uncovers hidden data • measured in max bits per second • specify the behavior of a system • sequencing, selection, and iteration • prevents unauthorized access to data • gives unauthorized access to secure networks • a good but not optimal solution to a problem • splits a program into multiple tasks(2 words) • determines how to address nodes on the network • ...
Ancient Sumer 2022-09-14
Across
- a symbol that stands for an object
- a society marked by developed arts, sciences, government, and social structure
- a tool used for tilling, or turning, soil to prepare it for planting
- which is an inverted (upside-down) U- or V-shaped structure built above a doorway.
- depicted scenes of was and peace in ancient Sumer
- a characteristic of civilization that includes the beliefs and behaviors of a society or group of people
- a person who makes money by selling goods
- writing that uses wedge-shaped characters
- an ancient Mesopotamian temple tower with outside staircases and a shrine at the top
Down
- the way a civilization is organized
- the use of tools and other inventions for practical purposes
- networks of canals, dams, and reservoirs
- a wooden instrument made of a sound box and strings
- a craftsperson
- the most important technological advancement
- a person who writes
16 Clues: a craftsperson • a person who writes • a symbol that stands for an object • the way a civilization is organized • networks of canals, dams, and reservoirs • a person who makes money by selling goods • writing that uses wedge-shaped characters • the most important technological advancement • depicted scenes of was and peace in ancient Sumer • ...
Digital Technologies 2023-09-10
Across
- Can store two values
- a part of a computer that allows you to plug in a cable
- a .mp4 file
- a file extension suitable for sending images over a network
- the HTML tag that displays a picture
- one of three colours used to create the colour of a pixel
- the html tag that displays the name of the webpage in the browser tab
- the main part of a computer that connects everything together
Down
- Number of bits in a byte
- system used to convert letters from the English alphabet to numbers
- a file extension for a photographic image
- system used to convert letters from any language to numbers
- smallest part of a picture
- a network device that connects small networks together to create a larger network
- the network device needed to access the internet
- a file extension for an image that can be animated
16 Clues: a .mp4 file • Can store two values • Number of bits in a byte • smallest part of a picture • the HTML tag that displays a picture • a file extension for a photographic image • the network device needed to access the internet • a file extension for an image that can be animated • a part of a computer that allows you to plug in a cable • ...
The Internet 2019-03-09
Across
- to connect two or more computers
- uses Radio Waves.
- popular websites need this to be powerful to serve many clients
- a numerical label assigned to each device
- allows two or more computers to share a printer.
- caused by packet errors
- is a collection of data that can be used by computers which need to communicate with each other
- a system used to convert a computer's host name into an IP address
Down
- the higher this is the less reliable the connection or data transfer will be
- is 15.5 terabits per second
- a company that provides individuals and other companies access to the Internet
- a way of connecting computers together in a LAN.
- used to measure electric communication
- a networking device that forwards data packets between computer networks.
- is used to send and receive webpages
- the amount of time it takes a packet to travel from source to destination
16 Clues: uses Radio Waves. • caused by packet errors • is 15.5 terabits per second • to connect two or more computers • is used to send and receive webpages • used to measure electric communication • a numerical label assigned to each device • a way of connecting computers together in a LAN. • allows two or more computers to share a printer. • ...
Criss-Cross Craze 2025-06-10
Across
- a controlled network that allows access to outsiders like partners or venders
- a local area network that connects computer within a limited area like a home or office
- protection of data and system from digital attacks
- a wireless networking technology
- the physical or logical arrangement of devices in a computer network
- the actual rate of successful data transfer in a network
- the process of establishing a connection between two devices before communication
- a command used to test the reachability of a device on a network
Down
- the use of digital technologies to harass, threaten, or humiliate someone online
- the method used to send data across a network
- virtual private network
- file transfer protocol, a standard method for transferring files over the internet
- internet service provider
- global system of interconnected computer networks
- unwanted digital attacks
- service set identifier
16 Clues: service set identifier • virtual private network • unwanted digital attacks • internet service provider • a wireless networking technology • the method used to send data across a network • global system of interconnected computer networks • protection of data and system from digital attacks • the actual rate of successful data transfer in a network • ...
CSP REVIEW INITIALS 2025-05-02
Across
- A type of malware that copies itself
- Data about Data
- Type of error caused by not following the rules of the language
- Time to do a task sequentially divided by the time to do it in parallel
- A "rule of thumb" to follow in an algorithm to simplify a hard problem
- Type of computing using multiple computers
- Scientific research, done by individuals, contributing relevant data using their own computing devices
- The study of encryption techniques
- data changing smoothly over time with specific values
Down
- Compression without losing any data at all
- The process of repeating steps in an algorithm
- ____ time solution that grows exponentially
- A wireless access point that gives unauthorized access to secure networks
- Takes small program with little variables and expands to larger with huge variables
- Type of problem that cannot be solved with an algorithm of any type
- Scrambling Data to avoid unauthorized access
16 Clues: Data about Data • The study of encryption techniques • A type of malware that copies itself • Compression without losing any data at all • Type of computing using multiple computers • ____ time solution that grows exponentially • Scrambling Data to avoid unauthorized access • The process of repeating steps in an algorithm • ...
Cybersecurity 2023-04-21
Across
- information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc.
- A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
- A botnet (short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
- is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
- A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
- is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- facts provided or learned about something or someone.
- Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
- A computer virus is a type of malware that attaches itself to other programs, self-replicates, and spreads from one computer to another.
- something has been done which was: not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits.
- Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.
- Hacking or Black Hat hacking is performed by cybercriminals with the false intention of stealing sensitive data, money, and access the restricted networks and systems.
Down
- A blagging attack is a version of a phishing attack, again with its background in social engineering.
- the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user
- As software designed to interfere with a computer's normal functioning, malware is a blanket term for viruses, trojans, and other destructive computer programs threat actors use to infect systems and networks in order to gain access to sensitive information.
- Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- A name generator attack is an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
- In a Distributed Denial of Service attack, the attacker enlists the help of (many) thousands of Internet users to each generate a small number of requests which, added together, overload the target.
- Statistics that can be used to analise or observe.
- The authorization given to users that enables them to access specific resources on the network, such as data files, applications, printers and scanners.
- A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.
24 Clues: Statistics that can be used to analise or observe. • facts provided or learned about something or someone. • A blagging attack is a version of a phishing attack, again with its background in social engineering. • Automatic software updates are the process in which your software applies critical updates without seeking confirmation from a user • ...
Computer Definitions 2024-06-24
Across
- files embedded within online communication channels such as emails, instant messages, or social networks
- the transmission of high-quality data of wide bandwidth.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
- allows devices to communicate with each other without cables or wires.
- the practice of protecting systems, networks, and programs from digital attacks
- a data measurement unit applied to digital computer or media storage
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a file format that can contain multiple files combined and compressed into one file.
- the use or operation of computers.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- the capacity at which a network can transmit data.
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- the logic circuitry that responds to and processes the basic instructions that drive a computer
Down
- the ability of software and hardware from different sources to work together without having to be altered to do so
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a software program used to locate and display information on the Internet or an intranet.
- a unit of data that is eight binary digits long
- Any stored data.
- a set of rules for formatting and processing data.
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the number of pixels that are displayed per inch for an image
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- any unsolicited communication sent in bulk.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- small files of information that a web server generates and sends to a web browser
- to reload the operating system of a computer:
- the smallest unit of data that a computer can process and store.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- any criminal activity that involves a computer, network or networked device.
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a computer on a network that provides the interface between two applications or networks that use different protocols
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • a set of rules for formatting and processing data. • the capacity at which a network can transmit data. • the transmission of high-quality data of wide bandwidth. • ...
MNC's 🥰 2021-03-11
6 Clues: what does mnc create • what does mnc stand for • A type of foreign owned MNC • A type of locally owned MNC's • What does the growth of MNC's provide • what is the process called through which ideas and activities of people in different parts of the the world become interconnected
IS QUIZ 2 2013-09-24
Across
- Buying, selling, marketing and servicing of products and services over computer networks
- System type that behaviour is affected by random inputs
- Type of Modeling a System
Down
- Storage of data resources in information system activities
- ... system, an organized combination of people, hardware, software
- ... System, has hard boundaries through which little information is exchanged
6 Clues: Type of Modeling a System • System type that behaviour is affected by random inputs • Storage of data resources in information system activities • ... system, an organized combination of people, hardware, software • ... System, has hard boundaries through which little information is exchanged • ...
Κεφ. 15 Crossword 2024-04-17
Across
- Οι χρήστες εγγράφονται και αλληλεπιδρούν ως μια εικονική κοινότητα. (Αγγλικά)
- Παράνομη πράξη που αφορά την ταυτότητα του ατόμου στο Internet. (Αγγλικά)
Down
- Αφού δηλώσεις τα ενδιαφέροντα σου σε στρέφει σε ανάλογες ιστοσελίδες. (Αγγλικά)
- Το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης σήμερα. (Αγγλικά)
- Γνωστότερη υπηρεσία κατηγορίας Microblogs. (Αγγλικά)
- Γνωστή υπηρεσία κοινωνικών αγαπημένων. (Αγγλικά)
6 Clues: Γνωστή υπηρεσία κοινωνικών αγαπημένων. (Αγγλικά) • Γνωστότερη υπηρεσία κατηγορίας Microblogs. (Αγγλικά) • Το πιο διαδεδομένο μέσο κοινωνικής δικτύωσης σήμερα. (Αγγλικά) • Παράνομη πράξη που αφορά την ταυτότητα του ατόμου στο Internet. (Αγγλικά) • Οι χρήστες εγγράφονται και αλληλεπιδρούν ως μια εικονική κοινότητα. (Αγγλικά) • ...
Multimedia 2017-11-24
5 Clues: Interworking Unit • Cell Swithching Networks • short sequence of moving images • set of rules to all the communication parties for exchange of information. • digitization of telephone quality analog speech signal produces a constant bit rate binary stream
WWW, Wi-Fi and networks 2025-10-10
5 Clues: a cable that uses light • the network of networks • fake Wi-Fi systems that steal your data • a fake email that tries to steal your info • a website that lets you search facts and web browsers
Entrepreneur 2019-01-28
Across
- is a way entrepreneurs can improve upon besides an improved product?
- age of an entrepreneur
- trade to be effective
- does a majority of start ups get their funding (there are three)
Down
- is a main component to being a successful entrepreneur
- who offers an innovative solution to a (frequently unrecognized) problem
- force for economic growth
- many thousands of small companies does Microsoft work with.
- does a majority of start ups get their funding (there are three)
- does a majority of start ups get their funding (there are three)
- refer to something new or to a change made to an existing product, idea, or field
11 Clues: trade to be effective • age of an entrepreneur • force for economic growth • is a main component to being a successful entrepreneur • many thousands of small companies does Microsoft work with. • does a majority of start ups get their funding (there are three) • does a majority of start ups get their funding (there are three) • ...
Revision for Term 1 2022-03-24
Across
- It is occurring in ELDCs, due to the burning of fuelwood
- A physical area on the earth
- A death rate is bigger than a birth rate
- Comparing the number of people from EU and ASEAN to Singapore
Down
- One of the resources and it is needed to build infrastructure
- Where, due to the Industrial Revolution, a lot of rural-urban migration has occurred.
- Where consists all living and natural things such as plants and animals
- Where there is a dense transportation networks
- Where there is your neighbourhood or your primary school
9 Clues: A physical area on the earth • A death rate is bigger than a birth rate • Where there is a dense transportation networks • It is occurring in ELDCs, due to the burning of fuelwood • Where there is your neighbourhood or your primary school • One of the resources and it is needed to build infrastructure • Comparing the number of people from EU and ASEAN to Singapore • ...
Cyber Crossword 2025-07-14
Across
- Unwanted or unsolicited email often used to distribute malware.
- A scam where attackers impersonate senior executives.
- Type of malware that locks files and demands payment to unlock them.
- Keeping your software and operating system ________ is a key part of security.
Down
- Software that secretly gathers information from a computer.
- A common method used by cybercriminals to trick users into revealing sensitive information.
- A software program designed to protect against viruses and malware.
- A criminal who uses computers and networks to commit crimes.
- A secret word or phrase used to access a system.
9 Clues: A secret word or phrase used to access a system. • A scam where attackers impersonate senior executives. • Software that secretly gathers information from a computer. • A criminal who uses computers and networks to commit crimes. • Unwanted or unsolicited email often used to distribute malware. • A software program designed to protect against viruses and malware. • ...
Bengaluru_Fintech_GenAI_Crossword 2026-03-05
Across
- Type of artificial intelligence designed to create text, images, or code
- Carefully designed input that determines the quality of an AI response
- Fee component that sparks debates between regulators, banks, and networks
- Indian digital payments platform that reshaped expectations of speed and cost
Down
- Stage where card transactions are finalized and funds move between banks
- Global system operated by Visa that transmits authorization messages
- Visa security method that replaces actual card numbers with safe substitutes
- Failure mode where a generative AI system invents facts confidently
- Process where generative AI pulls relevant company data before responding
9 Clues: Failure mode where a generative AI system invents facts confidently • Global system operated by Visa that transmits authorization messages • Carefully designed input that determines the quality of an AI response • Stage where card transactions are finalized and funds move between banks • Type of artificial intelligence designed to create text, images, or code • ...
Computer System Crossword 2024-07-02
Across
- The CPU is also called as
- ________ are medium sized computers used to host programs and data for small networks.
- this type of computer performs only specific task
- Collecting the data and converting it into information is called
Down
- a part in the computer which does arithmetic and logical operations
- _____ is most powerful type of computer.
- This part sends signals to other parts of computer to tell what to do
- Wrist watches ,Microwave Oven,Washing machine are examples of _______ computers
- Set of instructions given to computers are called as ______
9 Clues: The CPU is also called as • _____ is most powerful type of computer. • this type of computer performs only specific task • Set of instructions given to computers are called as ______ • Collecting the data and converting it into information is called • a part in the computer which does arithmetic and logical operations • ...
Crossword_eng 2024-10-17
Across
- A barrier between a trusted internal network and untrusted external networks.
- The process of converting a coded data back into its original format.
- The process of converting data into a coded format to prevent unauthorized access.
- Intercepting communication between two parties without their t their knowledge.
Down
- Malicious computer software.
- A secret pathway that allows unauthorized access to a system or software.
- A person who tries to gain unauthorized access.
- A method for forcing a password.
- Tricking someone into giving informations over the internet.
9 Clues: Malicious computer software. • A method for forcing a password. • A person who tries to gain unauthorized access. • Tricking someone into giving informations over the internet. • The process of converting a coded data back into its original format. • A secret pathway that allows unauthorized access to a system or software. • ...
REV Cybersecurity Awareness Trivia Crossword Puzzle 2019-10-16
Across
- security body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
- an attempt by hackers to damage or destroy a computer network or system.
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- designed to detect and destroy computer viruses.
- global system of interconnected computer networks that use the Internet protocol suite.
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet.
- code used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.
- are small files that Web sites put on your computer hard disk drive when you first visit.
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network.
- any software program in which advertising banners are displayed while the program is running.
- horse any malicious computer program which is used to hack into a computer by misleading users of its true intent.
- the activity of defrauding an online account holder of financial information by posing as a legitimate company.
- made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information.
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.
- door a method, often secret, of bypassing normal authentication in a product.
- a standalone malware computer program that replicates itself in order to spread to other computers.
19 Clues: designed to detect and destroy computer viruses. • an attempt by hackers to damage or destroy a computer network or system. • door a method, often secret, of bypassing normal authentication in a product. • someone who seeks and exploits weaknesses in a computer system or computer network. • ...
google by elijah 2017-04-27
5 Clues: you can find games on this • a criminal defense uses by technology • a world wide collections of computer networks • term commonly used in computing and electronics • a personal computer for mobile use that integrates
Health Plan Terminology 2013-12-02
Across
- Traditional fee-for-service plan with no true networks
- Plan with low monthly premiums, high deductible, high max oop (acronym)
- Plan has both in-network and out-of-network benefits, but pt will pay more if going out-of-network (acronym)
- No out-of-network benefits (acronym)
Down
- HIX plans only available to individuals under 30
- Patient does not have to have a PCP but has only in-network benefits (acronym)
- Medical IRA (acronym)
- Plans vary tremendously by company (acronym)
8 Clues: Medical IRA (acronym) • No out-of-network benefits (acronym) • Plans vary tremendously by company (acronym) • HIX plans only available to individuals under 30 • Traditional fee-for-service plan with no true networks • Plan with low monthly premiums, high deductible, high max oop (acronym) • ...
Marketing Maze 2024-07-23
Across
- Distribution channels fall under this "P" of the 4Ps
- Basic Human Requirements without which humans cannot survive
- Wants backed by consumer purchasing power
- An area in the BCG Matrix characterized by High market share and growth prospects
- Type of Pricing where products are grouped together rather than given individually
Down
- Forms the "S" in STP
- Sales using follows this type of Strategy
- One of the "A" in the 4As framework that deals with strengthening of distribution networks
8 Clues: Forms the "S" in STP • Sales using follows this type of Strategy • Wants backed by consumer purchasing power • Distribution channels fall under this "P" of the 4Ps • Basic Human Requirements without which humans cannot survive • An area in the BCG Matrix characterized by High market share and growth prospects • ...
Inglese bullismo e cyberbullismo Kiara 2021-11-20
Across
- when you are a victim you have a lot ...
- bullying is also transmitted on social networks
- anything bad about people's skin color
Down
- he is not confident in front of others, and is unable to react
- news indicates articles with invented information
- he is a boy or a girl, he is arrogant, and thinks he is superior to the victim
- one of the many words bullies say to a victim: L...
- calling names used to make fun of a victim
8 Clues: anything bad about people's skin color • when you are a victim you have a lot ... • calling names used to make fun of a victim • bullying is also transmitted on social networks • news indicates articles with invented information • one of the many words bullies say to a victim: L... • he is not confident in front of others, and is unable to react • ...
computing revision 2024 January 2024-01-10
Across
- -a set of commands that must be followed for a computer to perform calculations
- - how we communicate with computers and tell them what to do.
- -on the internet, places where you find info
- - using a keyboard
Down
- viruses, spyware and worms
- -the unofficial code of policies that encourage good behavior on the internet
- -to place a dot or square somewhere on the screen of the computer
- -a communication method that uses electronic devices to deliver messages across computer networks. "
8 Clues: - using a keyboard • viruses, spyware and worms • -on the internet, places where you find info • - how we communicate with computers and tell them what to do. • -to place a dot or square somewhere on the screen of the computer • -the unofficial code of policies that encourage good behavior on the internet • ...
Vocabulary Assignment 2022-03-25
Across
- Computing device that connects a network to multiple networks
- Device used to connect an ISDN line to a computer or a LAN
- Device that communicates with one network to another
- Device that emits signals for wireless devices to connect to the internet
- Hardware that connects to a network and forwards and receives data
Down
- Security device that monitors and filters network traffic
- Device that transmits and receives radio waves for communication
- Device that converts LAN into WAN
8 Clues: Device that converts LAN into WAN • Device that communicates with one network to another • Security device that monitors and filters network traffic • Device used to connect an ISDN line to a computer or a LAN • Computing device that connects a network to multiple networks • Device that transmits and receives radio waves for communication • ...
Technology Crossword 2023-01-20
Across
- Acquire (something) by paying for it.
- control element that provides the user a simple way to trigger an event.
- a worldwide system of computer networks.
Down
- sending or receiving information, such as phone lines or computers.
- a machine resembling a human being and able to replicate certain human movements and functions automatically.
- an autonomous program that interacts with a system or a user.
- the simulation of human intelligence processes by a machine or a system.
- Handsets are also known as...
8 Clues: Handsets are also known as... • Acquire (something) by paying for it. • a worldwide system of computer networks. • an autonomous program that interacts with a system or a user. • sending or receiving information, such as phone lines or computers. • control element that provides the user a simple way to trigger an event. • ...
Media Vocab 2022-11-29
Across
- short piece of text placed under a picture explaining what's happening in it
- presenting stories in a shocking way designed
- (2 words) traditional and well-known media outlets such as TV networks or
Down
- someone who reports on the news
- the readers of a newspaper, magazine, or book regarded collectively
- the average number of copies produced by a publication
- prejudice for or against a person or group, often seen as unfair
- grab people's attention or provoke strong emotional responses
8 Clues: someone who reports on the news • presenting stories in a shocking way designed • the average number of copies produced by a publication • grab people's attention or provoke strong emotional responses • prejudice for or against a person or group, often seen as unfair • the readers of a newspaper, magazine, or book regarded collectively • ...
Crossword Corner 2025-10-09
Across
- Security protocol framework increasingly used in healthcare APIs (5)
- Foundation model type driving GenAI clinical applications (3)
- Emerging architecture enabling federated data exchange across trusted health networks (4)
- Movement emphasizing explainability in clinical AI models (3)
Down
- Cyber threat that exploits legitimate channels to bypass defenses (6)
- International terminology standard used in decision support and clinical analytics (6)
- Secure environment for controlled API testing and FHIR app pilots (7)
- Dominant interoperability framework enabling patient-directed APIs (5)
8 Clues: Foundation model type driving GenAI clinical applications (3) • Movement emphasizing explainability in clinical AI models (3) • Security protocol framework increasingly used in healthcare APIs (5) • Cyber threat that exploits legitimate channels to bypass defenses (6) • Secure environment for controlled API testing and FHIR app pilots (7) • ...
Module 4 Terms and Commands Crossword 2021-12-17
Across
- the physical opening where a data cable can be plugged in
- the application-level throughput of a communication
- the amount of material or items passing through a system or process
- a multiplier of 10¹²
Down
- a unit of computer memory or data equal to 1,024 (210) bits
- a point at which lines or pathways intersect or branch
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- a networking device that forwards data packets between computer networks
8 Clues: a multiplier of 10¹² • the application-level throughput of a communication • a point at which lines or pathways intersect or branch • the physical opening where a data cable can be plugged in • a unit of computer memory or data equal to 1,024 (210) bits • the amount of material or items passing through a system or process • ...
Soaring Satellites 2021-08-10
Across
- named after Jean-Domenique Cassini
- reflected incoming signals and was the world’s first rudimentary communications satellite.
- First American Space Station
- the first modular space station
Down
- pioneered US cable TV broadcasts with high-profile networks and spurned the age of satellite TV.
- the first orbiting telescopes to focus light in the high energy X-ray (3 - 79 keV) region of the electromagnetic spectrum.
- discovered the belts of radiation around Earth.
- the first man-made object in orbit around the Earth
8 Clues: First American Space Station • the first modular space station • named after Jean-Domenique Cassini • discovered the belts of radiation around Earth. • the first man-made object in orbit around the Earth • reflected incoming signals and was the world’s first rudimentary communications satellite. • ...
Internet security 2022-11-03
Across
- Designed to obtain personal information without the user's permission
- Company uses .... techniques to decode (or decipher) secret data
- Malware that is used to pose as different software
Down
- Encoding data so that unauthorized users can't read it is known as ...
- Protects a company intranet from outside attacks.
- Can infect your files and corrupt your hard drive
- Users have to enter a ... to gain access to a network.
- Person who uses their computer skills to enter computers and/or networks illegally
8 Clues: Protects a company intranet from outside attacks. • Can infect your files and corrupt your hard drive • Malware that is used to pose as different software • Users have to enter a ... to gain access to a network. • Company uses .... techniques to decode (or decipher) secret data • Designed to obtain personal information without the user's permission • ...
The Very Secret Society Of Irregular Witches 2023-11-21
Across
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- An illness affecting your nose and throat
Down
- A group of related people
- A person who is in charge of a worker, group or organization
- Accepting that something is true, especially without proof
- Something kept hidden or unexplained
- Woman that has magical powers, harms or helps people
- Having lived for a long time, no longer young
8 Clues: A group of related people • Something kept hidden or unexplained • An illness affecting your nose and throat • Having lived for a long time, no longer young • Woman that has magical powers, harms or helps people • Accepting that something is true, especially without proof • A person who is in charge of a worker, group or organization • ...
CYBER SECURITY 2025-10-15
Across
- Pretending to be someone else to gain access or information
- A unique numerical label assigned to each device on a network
- The amount of time spent using digital devices
Down
- Authentication using physical characteristics like fingerprints or face
- A unique identifier used to log into a system
- A copy of data kept in case the original is lost or compromised
- An improvement or fix applied to software or systems
- A device that forwards data between computer networks
8 Clues: A unique identifier used to log into a system • The amount of time spent using digital devices • An improvement or fix applied to software or systems • A device that forwards data between computer networks • Pretending to be someone else to gain access or information • A unique numerical label assigned to each device on a network • ...
Crossword dwaboidwb 2023-12-24
Across
- The data transfer capacity of a network in bits per second.
- A network of interconnected devices within a limited area.
- Connects devices in close proximity, often used for peripherals.
Down
- Improved security protocol compared to WEP.
- Used to locate and connect to wireless networks.
- vast network that connects computers all over the world.
6 Clues: Improved security protocol compared to WEP. • Used to locate and connect to wireless networks. • vast network that connects computers all over the world. • A network of interconnected devices within a limited area. • The data transfer capacity of a network in bits per second. • Connects devices in close proximity, often used for peripherals.
Spelling homework crossword puzzle 2023-04-23
Across
- An intervening period of time.
- Take part in an activity without invitation.
- Act in such a way as to have an effect on another.
Down
- A global system of interconnected computer networks that uses the Internet protocol suite.
- Stop the progress of of a process or activity.
- Existing or traveling between cities.
6 Clues: An intervening period of time. • Existing or traveling between cities. • Take part in an activity without invitation. • Stop the progress of of a process or activity. • Act in such a way as to have an effect on another. • A global system of interconnected computer networks that uses the Internet protocol suite.
Software components in a mobile. 2018-02-15
Across
- it's a shortcut for an application.
- who is Facebook and Twitter? don't is a social networks.
- you can take a selfie or capture a moment special with you family.
Down
- you can find this in the menu.
- whith this you can find a friend and call after.
- here the photos from the camera are saved.
- this is a way of writing when you can't write on paper.
7 Clues: you can find this in the menu. • it's a shortcut for an application. • here the photos from the camera are saved. • whith this you can find a friend and call after. • this is a way of writing when you can't write on paper. • who is Facebook and Twitter? don't is a social networks. • you can take a selfie or capture a moment special with you family.
Lesson 10 Vocab 2013-09-30
Across
- A type of hub that uses a table to keep track of destinations so that data can be sent directly to its destination, rather than to every computer on the network before the destination machine receives it.
- A card that enables one computer to send and receive data to and from another computer.
- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.
- A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
- Two or more devices connected together.
- A LAN topology wherein two star networks are linked using a bus.
- The small unit into which information is broken down before being sent across a network.
- Data transmission that uses radio frequencies instead of cabling.
- A central point on a network where computers can connect. The central point is often a switch rather than a hub.
- Any receiving point in a computer network.
- A network architecture where all computers have equal responsibilities and all computers can share files with each other.
- A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
- The study of how items are related to one another in space; a configuration.
Down
- The most commonly used kind of networking cable today.
- A piece of hardware or software on a network designed to limit access to certain machines to authorized users only.
- What an organization’s intranet becomes when the organization allows outsiders to access its intranet.
- A set of programs used to manage and secure a network.
- The design of a computer network, which specifies how devices communicate with one another. The most common network architecture types are client/server and peer-to-peer.
- The primary networking technology currently in use. Ethernet defines standards for addressing packets and data and a method for avoiding data conflicts on the network.
- The central core of a network, this connection can link many smaller networks to a larger network.
- Often called a network switch, this connects many parts of a network and directs traffic as needed.
- (WAN) A type of network where the computers are far apart—in different buildings, different cities, or even different countries.
- A private network that looks and functions a lot like the Internet but is typically available only to the employees of an organization.
- (LAN) A type of network where computers are close together, typically in the same building or office.
- A computer dedicated to providing one service (such as web hosting, disk storage, and so on) and that is shared by many users across a network.
- A computer intended to be used by one person at a time.
- A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization’s needs.
- A type of electrical cable often used to transmit cable TV.
- A network layout in which each individual node is connected to two others, with the first and last coming back to connect to each other, thus completing the ring shape.
- network A network architecture in which each computer is either a client or a server. Servers are powerful computers dedicated to managing the clients. Clients are PCs on which users run applications. Clients rely on servers for resources..
- The rules of initiating, interrupting, and continuing communication on a computer network.
- A device that links two computer networks or links a local area network to the Internet. A router reads packet addresses and routes packets.
32 Clues: Two or more devices connected together. • Any receiving point in a computer network. • The most commonly used kind of networking cable today. • A set of programs used to manage and secure a network. • A computer intended to be used by one person at a time. • A type of electrical cable often used to transmit cable TV. • ...
Lesson 10 Vocab by: Garrett Hudson 2013-09-30
Across
- A private network that looks and functions a lot like the Internet but is typically available only to the employees of an organization.
- What an organization’s intranet becomes when the organization allows outsiders to access its intranet.
- computer intended to be used by one person at a time.
- A card that enables one computer to send and receive data to and from another computer.
- Data transmission that uses radio frequencies instead of cabling.
- A type of hub that uses a table to keep track of destinations so that data can be sent directly to its destination, rather than to every computer on the network before the destination machine receives it.
- Any receiving point in a computer network.
- Two or more devices connected together.
- Often called a network switch, this connects many parts of a network and directs traffic as needed.
- The rules of initiating, interrupting, and continuing communication on a computer network.
- A central point on a network where computers can connect. The central point is often a switch rather than a hub.
- A LAN topology wherein two star networks are linked using a bus.
- The study of how items are related to one another in space; a configuration.
- The primary networking technology currently in use. Ethernet defines standards for addressing packets and data and a method for avoiding data conflicts on the network.
Down
- A device that links two computer networks or links a local area network to the Internet. A router reads packet addresses and routes packets.
- The most commonly used kind of networking cable today.
- A network architecture where all computers have equal responsibilities and all computers can share files with each other.
- A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)
- A person who manages a computer network; he or she designed its topology and adjusts it as needed to suit the organization’s needs.
- A piece of hardware or software on a network designed to limit access to certain machines to authorized users only.
- A set of programs used to manage and secure a network.
- A network layout in which each individual node is connected to two others, with the first and last coming back to connect to each other, thus completing the ring shape.
- A type of network where the computers are far apart—in different buildings, different cities, or even different countries.
- A type of network where computers are close together, typically in the same building or office.
- network architecture in which each computer is either a client or a server. Servers are powerful computers dedicated to managing the clients. Clients are PCs on which users run applications. Clients rely on servers for resources..
- The design of a computer network, which specifies how devices communicate with one another. The most common network architecture types are client/server and peer-to-peer.
- A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.
- Cable that uses light guided through thin glass tubes, instead of electrical signals, to transmit data. It is very fast but also expensive.
- The small unit into which information is broken down before being sent across a network.
- A type of electrical cable often used to transmit cable TV.
- The central core of a network, this connection can link many smaller networks to a larger network.
- A computer dedicated to providing one service (such as web hosting, disk storage, and so on) and that is shared by many users across a network.
32 Clues: Two or more devices connected together. • Any receiving point in a computer network. • computer intended to be used by one person at a time. • The most commonly used kind of networking cable today. • A set of programs used to manage and secure a network. • A type of electrical cable often used to transmit cable TV. • ...
Computer Words 2024-06-17
Across
- the smallest unit of data that a computer can process and store.
- Security- the practice of protecting systems, networks, and programs from digital attacks
- the ability of software and hardware from different sources to work together without having to be altered to do so
- allows devices to communicate with each other without cables or wires.
- a software program used to locate and display information on the Internet or an intranet.
- any unsolicited communication sent in bulk.
- small files of information that a web server generates and sends to a web browser
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a data measurement unit applied to digital computer or media storage
- System- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- a unit of data that is eight binary digits long
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- A zip is a file format that can contain multiple files combined and compressed into one file.
Down
- the capacity at which a network can transmit data.
- the use or operation of computers.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- to reload the operating system of a computer:
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
- the transmission of high-quality data of wide bandwidth.
- the number of pixels that are displayed per inch for an image
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- a set of rules for formatting and processing data.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a computer on a network that provides the interface between two applications or networks that use different protocols
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- files embedded within online communication channels such as emails, instant messages, or social networks
- Any stored data.
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- Crime- any criminal activity that involves a computer, network or networked device.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- Space- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • the capacity at which a network can transmit data. • a set of rules for formatting and processing data. • the transmission of high-quality data of wide bandwidth. • ...
Vocabulary Assignment 2022-03-25
Across
- Computing device that connects a network to multiple networks
- Device used to connect an ISDN line to a computer or a LAN
- Device that communicates with one network to another
- Device that emits signals for wireless devices to connect to the internet
- Hardware that connects to a network and forwards and receives data
Down
- Security device that monitors and filters network traffic
- Device that transmits and receives radio waves for communication
- Device that converts LAN into WAN
8 Clues: Device that converts LAN into WAN • Device that communicates with one network to another • Security device that monitors and filters network traffic • Device used to connect an ISDN line to a computer or a LAN • Computing device that connects a network to multiple networks • Device that transmits and receives radio waves for communication • ...
CYBER-SECURITY 2018-07-12
Across
- a string of characters to secure any data
- someone who uses a computer to illegally access other computers or networks to show that they want a say
- a field of protection used to protect you or your data
Down
- a process that attempts to gain unauthorised access
- a type of malware that prevents you from using your computer files unless you pay a ransom
- site
- warfare
- a type of malware that is often disguised as legitimate software
8 Clues: site • warfare • a string of characters to secure any data • a process that attempts to gain unauthorised access • a field of protection used to protect you or your data • a type of malware that is often disguised as legitimate software • a type of malware that prevents you from using your computer files unless you pay a ransom • ...
AI 2024-12-27
Across
- A popular programming language used for AI and machine learning
- The concept of machines mimicking human intelligence
Down
- Famous AI-based chatbot launched in 2022
- AI field focusing on teaching computers to see and interpret images
- The training data used to teach an AI
- A commonly used structure in neural networks, inspired by the human brain
- The branch of AI concerned with teaching computers to understand human language
- Popular framework for building AI models, developed by Google
8 Clues: The training data used to teach an AI • Famous AI-based chatbot launched in 2022 • The concept of machines mimicking human intelligence • Popular framework for building AI models, developed by Google • A popular programming language used for AI and machine learning • AI field focusing on teaching computers to see and interpret images • ...
Internet Terminology 2020-01-13
Across
- (noun) a highlighted Internet address that connects to another website; (verb) to connect one website to another
- (noun) a place to discuss things online in real time
- (noun) main computer that provides special services
- (verb) to look at different websites without a specific purpose
- (noun) typed message sent by cell phone; (verb) to type a message on a cell phone
- (noun) a visit to a website
Down
- (noun) a vast computer network linking smaller computer networks worldwide
- (noun) a place to post a message
- (noun) message; (verb) to put a message online
9 Clues: (noun) a visit to a website • (noun) a place to post a message • (noun) message; (verb) to put a message online • (noun) main computer that provides special services • (noun) a place to discuss things online in real time • (verb) to look at different websites without a specific purpose • (noun) a vast computer network linking smaller computer networks worldwide • ...
ETHAN PUZZLE 2021-08-05
Across
- what is a device that routes traffic between networks
- an output device that shows you what your doing
- is fortnite the goat game ever :)
- how many keys are on a QWERT keyboard
Down
- a type of file that organises data in a particular structure
- what does cd stand for
- what do you do if you re boot a device with either warm or cold
- what is pages per minute shortened (think about
- what is plain old telephone service shortened into 4 letters tip: think of the starting letters
9 Clues: what does cd stand for • is fortnite the goat game ever :) • how many keys are on a QWERT keyboard • what is pages per minute shortened (think about • an output device that shows you what your doing • what is a device that routes traffic between networks • a type of file that organises data in a particular structure • ...
Marketing 2023-02-11
Across
- The process of making something as good or effective as possible
- The largest search engine company
- A popular web browser developed by Google
- A collection of web pages and related content that is identified by a common domain name and published on at least one web server
- The process of promoting and selling products or services
Down
- The practice of promoting a product or service through various media
- A global system of interconnected computer networks
- The process of changing something into a different form or type
- A popular social networking platform
9 Clues: The largest search engine company • A popular social networking platform • A popular web browser developed by Google • A global system of interconnected computer networks • The process of promoting and selling products or services • The process of changing something into a different form or type • The process of making something as good or effective as possible • ...
Digital Divide 2023-06-06
Across
- A big network that helps us communicate and find information.
- The gap between people who can use technology and those who can't.
- Giving people the tools and resources to take control of their lives.
Down
- Internet Quick internet that lets us send and receive information easily.
- Opportunities When some people have fewer chances than others.
- Being able to connect to the internet or other digital networks.
- When some people have more or better things than others.
- Skills Knowing how to use computers and other technology.
- Knowledge Understanding how to use computers and gadgets.
- The ability to use computers and the internet.
10 Clues: The ability to use computers and the internet. • When some people have more or better things than others. • Skills Knowing how to use computers and other technology. • Knowledge Understanding how to use computers and gadgets. • A big network that helps us communicate and find information. • Opportunities When some people have fewer chances than others. • ...
Crossword 2024-10-10
Across
- A secret pathway that allows unauthorized access to a system or software.
- The process of converting a coded data back into its original format.
- Malicious computer software.
- A barrier between a trusted internal network and untrusted external networks.
Down
- The process of converting data into a coded format to prevent unauthorized access.
- A person who tries to gain unauthorized access.
- A method for forcing a password.
- Intercepting communication between two parties without their knowledge.
- Tricking someone into giving informations over the internet.
9 Clues: Malicious computer software. • A method for forcing a password. • A person who tries to gain unauthorized access. • Tricking someone into giving informations over the internet. • The process of converting a coded data back into its original format. • Intercepting communication between two parties without their knowledge. • ...
technology 2025-05-05
Across
- A wireless networking technology allowing devices to connect to the internet.
- Advances Breakthroughs that improve tools, systems, and processes.
- A global network connecting millions of private, public, academic, and business networks.
Down
- A mobile phone with advanced features, including internet connectivity and apps.
- The introduction of new ideas, methods, or products that revolutionize industries.
- An electronic device for processing, storing, and displaying information.
- Media Online platforms for sharing content and connecting with people globally.
- Digital recording, playback, or streaming of moving visual media.
- Gadgets Cutting-edge devices designed to simplify and enhance daily tasks.
9 Clues: Digital recording, playback, or streaming of moving visual media. • Advances Breakthroughs that improve tools, systems, and processes. • An electronic device for processing, storing, and displaying information. • Gadgets Cutting-edge devices designed to simplify and enhance daily tasks. • ...
Palaces for the People Crossword 2024-03-07
Across
- an action of ____ constitutes that an offense has taken place
- Guy named Oscar Newman wrote this book/paper about Pruitt Igoe
- An amazing advancement in that we use everyday. We stare at it in our hand.
- Events that devastate the physical landscape
- The splitting of society
Down
- Comprised of the facilities, spaces, services and networks that support he quality of life
- Andrew Fairweather came up with this idea for his local library
- A social unit that share socially significant characteristics
- Place where people can get public access to materials to better themselves
9 Clues: The splitting of society • Events that devastate the physical landscape • an action of ____ constitutes that an offense has taken place • A social unit that share socially significant characteristics • Guy named Oscar Newman wrote this book/paper about Pruitt Igoe • Andrew Fairweather came up with this idea for his local library • ...
Artificial Intelligence 2022-03-09
Across
- Is a method that works like the human brain
- learns from the training dataset and groups the objects on the basis of similar features
- Is part of Machine Learning. Normally uses Artificial Neural Networks
Down
- It's a method that can be splitted into regression methods and classification methods
- Tests the machines ability to pass for a human
- Improve an algorithm without the help of a human being
- A program designed to communicate with people through text or voice
- Large and complex datasets
- A set of rules that a machine uses to do a task
9 Clues: Large and complex datasets • Is a method that works like the human brain • Tests the machines ability to pass for a human • A set of rules that a machine uses to do a task • Improve an algorithm without the help of a human being • A program designed to communicate with people through text or voice • ...
Set 1 2022-10-14
Across
- A machine learning system that interacts with its environment and responds to errors and rewards
- Faceboook’s object detection research platform Markov When the past and future are independent given the present
- A Method to train deep neural networks
Down
- Distance between two points in a grid
- A Common activation function
- A Function to convert a vector of raw scores into probability
- A Term that is a measure of disorder or purity or unpredictability or uncertainty.
- An unsupervised learning algorithm for obtaining vector representations for words
- A deep learning framework developed by Berkeley AI Research
9 Clues: A Common activation function • Distance between two points in a grid • A Method to train deep neural networks • A deep learning framework developed by Berkeley AI Research • A Function to convert a vector of raw scores into probability • An unsupervised learning algorithm for obtaining vector representations for words • ...
January Newsletter Crossword 2026-01-29
Across
- The core part of an operating system managing hardware and software.
- A grid-like data structure often used in coding and robotics.
- Writing small programs to automate repetitive tasks.
- Short for cybersecurity, the practice of protecting systems and networks.
Down
- A unit of digital storage equal to about 1000 gigabytes.
- An open-source electronics platform used in robotics and DIY projects.
- A collection of technologies used together to build applications.
- A virtual space where data and apps are stored remotely.
- A network of infected computers controlled by hackers.
9 Clues: Writing small programs to automate repetitive tasks. • A network of infected computers controlled by hackers. • A unit of digital storage equal to about 1000 gigabytes. • A virtual space where data and apps are stored remotely. • A grid-like data structure often used in coding and robotics. • A collection of technologies used together to build applications. • ...
1.1 Current Network Hardware Products-Vocabualry 2026-01-21
Across
- A device that allows wireless devices to connect to a network.
- A device that connects different networks and sends data between them.
- A card that allows a computer to connect to a network.
- Physical devices used to connect computers and devices.
Down
- A device or application that protects the network from unauthorized access.
- A device that connects devices inside a local network.
- A powerful computer that provides services to other computers.
- A basic device that sends data to all connected devices.
- A device that converts digital signal to analog and analog to digital signals.
9 Clues: A device that connects devices inside a local network. • A card that allows a computer to connect to a network. • Physical devices used to connect computers and devices. • A basic device that sends data to all connected devices. • A powerful computer that provides services to other computers. • A device that allows wireless devices to connect to a network. • ...
crossword 2025-08-28
5 Clues: a place where Indian laws are made • profession that involves study of drugs • Green music festival celebrated in Portugual • symptoms of shortness of breath,fatigue,headaches • profession that involves protecting computers and networks from hackers
Entrepreneur 2019-01-28
Across
- many thousands of small companies does Microsoft work with.
- refer to something new or to a change made to an existing product, idea, or field
- who offers an innovative solution to a (frequently unrecognized) problem
- does a majority of start ups get their funding (there are three)
Down
- does a majority of start ups get their funding (there are three)
- trade to be effective
- age of an entrepreneur
- is a way entrepreneurs can improve upon besides an improved product?
- force for economic growth
- is a main component to being a successful entrepreneur
- does a majority of start ups get their funding (there are three)
11 Clues: trade to be effective • age of an entrepreneur • force for economic growth • is a main component to being a successful entrepreneur • many thousands of small companies does Microsoft work with. • does a majority of start ups get their funding (there are three) • does a majority of start ups get their funding (there are three) • ...
Humour 2019-01-08
Across
- He's starred in two TV __________________on two networks.
- The crowd found it ___________________when the comedian tripped over his microphone cord.
- I love hearing the audience ______________ with laughter.
- They say ________________ is the best medicine.
Down
- She looked so ridiculous it was hard to keep a __________________________ face.
- He tells the joke so poorly that he has to explain the ________________ twice.
- Despite his illness, he is still able to look at life with a sense of _______________ and enthusiasm.
- __________________ Bill Cosby wrote all his own material for his comedy monologues.
- I prefer _____________________to tragedy.
9 Clues: I prefer _____________________to tragedy. • They say ________________ is the best medicine. • He's starred in two TV __________________on two networks. • I love hearing the audience ______________ with laughter. • He tells the joke so poorly that he has to explain the ________________ twice. • ...
Internet Terminology 2020-01-13
Across
- (noun) a highlighted Internet address that connects to another website; (verb) to connect one website to another
- (noun) a place to discuss things online in real time
- (noun) main computer that provides special services
- (verb) to look at different websites without a specific purpose
- (noun) typed message sent by cell phone; (verb) to type a message on a cell phone
- (noun) a visit to a website
Down
- (noun) a vast computer network linking smaller computer networks worldwide
- (noun) a place to post a message
- (noun) message; (verb) to put a message online
9 Clues: (noun) a visit to a website • (noun) a place to post a message • (noun) message; (verb) to put a message online • (noun) main computer that provides special services • (noun) a place to discuss things online in real time • (verb) to look at different websites without a specific purpose • (noun) a vast computer network linking smaller computer networks worldwide • ...
Cybersecurity Puzzle! 2024-12-03
Across
- Unauthorized access to or manipulation of computer systems.
- A program that protects your computer from viruses
- A network security device that monitors and controls incoming and outgoing traffic.
- A process used to confirm the identity of a user.
Down
- A method of stealing personal information by pretending to be a trustworthy source.
- A type of software designed to harm or exploit systems
- A weak point in a system that can be exploited.
- A secret code used to secure data.
- A person who attempts to gain unauthorized access to networks.
9 Clues: A secret code used to secure data. • A weak point in a system that can be exploited. • A process used to confirm the identity of a user. • A program that protects your computer from viruses • A type of software designed to harm or exploit systems • Unauthorized access to or manipulation of computer systems. • ...
WEEK 6 DIG-Revision 2025-08-21
Across
- Known as the “brain” of the computer, processes instructions.
- Input device used for typing text and commands.
- The screen that displays images, videos, and text.
- Device that directs data between networks or connects to Wi-Fi.
Down
- Networking device that connects multiple computers or devices within a network.
- Handheld device used to move a pointer on the screen.
- The language of computers, made of 1s and 0s.
- Connects a computer or network to the internet through a phone or cable line.
- Produces a paper copy of digital documents.
9 Clues: Produces a paper copy of digital documents. • The language of computers, made of 1s and 0s. • Input device used for typing text and commands. • The screen that displays images, videos, and text. • Handheld device used to move a pointer on the screen. • Known as the “brain” of the computer, processes instructions. • ...
Bus & Star Topologies 2025-05-14
Across
- bus networks cost less to build (1 word)
- stops signals bouncing back on a bus network
- more data crashing in a bus network (2 words)
- The name for the structure of a network.
- all devices share one long cable (2 words)
Down
- smart box in a star network that sends data to the right device
- If one computer breaks in a star or bus topology it will still k____ w_______.
- the main cable that carries all the data in a bus network
- all devices connect to a central point (2 words)
9 Clues: bus networks cost less to build (1 word) • The name for the structure of a network. • all devices share one long cable (2 words) • stops signals bouncing back on a bus network • more data crashing in a bus network (2 words) • all devices connect to a central point (2 words) • the main cable that carries all the data in a bus network • ...
Business Key Terms 2021-04-06
Across
- A family of personal computers designed, manufactured, and sold by Apple Inc.
- A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- A combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- The application of psychological and physiological principles to the engineering and design of products, processes, and systems.
- The unauthorized use or reproduction of another's work.
- A small, portable personal computer with a "clamshell" form factor, typically having a thin LCD or LED computer screen mounted on the inside of the upper lid of the clamshell.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Also called a central processor, main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program.
- A type of non-volatile memory used in computers and other electronic devices. Data cannot be electronically modified after the manufacture of the memory device.
Down
- A collection of instructions and data that tell the computer how to work.
- Includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.
- A computer connected to a network of other workstations called “clients”. Client computers request information from the server over the network. Tends to have more storage, memory and processing power than a normal workstation.
- A networking device that forwards data packets between computer networks. Performs the traffic directing functions on the Internet.
- A person who organizes and operates a business or businesses, taking on greater than normal financial risks in order to do so.
- A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated.
- The highest-ranking person in a company or other institution, ultimately responsible for making managerial decisions.
16 Clues: The unauthorized use or reproduction of another's work. • A collection of instructions and data that tell the computer how to work. • A family of personal computers designed, manufactured, and sold by Apple Inc. • A multi-purpose computer whose size, capabilities, and price make it feasible for individual use. Abbreviated. • ...
A Digital Future for the Infrastructure Industry 2021-04-14
Across
- - ... control-process of controling something through connections of nerves
- - crucial for excistance
- - a criteria of successful work, by the end of which the goal will be achieved
- - a rigid external covering for the body
- - the process by which an object is suspended by physical force against gravity, in a stable position without firm physical contact
Down
- - an uncrewed aircraft
- - objects and places that are located nearby the main object
- - Networks of sensors will allow objects to order their own ...
- - Digital natives will instinctively combine digital skills with ... and new ideas
9 Clues: - an uncrewed aircraft • - crucial for excistance • - a rigid external covering for the body • - objects and places that are located nearby the main object • - Networks of sensors will allow objects to order their own ... • - ... control-process of controling something through connections of nerves • ...
Stay Connected Not Dependent 2023-12-12
Across
- It is affected by making us losing our temper, good manners, patience
- Do not publish on social networks
- When we are connected
- We do not have them when we are all day connected
- Connect with our peers from different countries
Down
- We do not go there in odrer to play with our friends because we preffer to be online
- Clues that describing ourselves
- We lose it when we are a lot time online
- We use it in order to communicate, play video games, find info,watch the news etc
9 Clues: When we are connected • Clues that describing ourselves • Do not publish on social networks • We lose it when we are a lot time online • Connect with our peers from different countries • We do not have them when we are all day connected • It is affected by making us losing our temper, good manners, patience • ...
Work 2024-01-08
Across
- a large building where materials or goods may be stored
- promoting and selling products or services
- a type of product manufactured by a company under a particular name
- a person who greets and deals with clients and visitors
- a person who works at a company for wages
- a person or organization using the services of a person or a company
Down
- a person who buys goods or services from a shop or business
- by means of the internet
- a technical expert for the management and support of systems and networks
9 Clues: by means of the internet • a person who works at a company for wages • promoting and selling products or services • a large building where materials or goods may be stored • a person who greets and deals with clients and visitors • a person who buys goods or services from a shop or business • a type of product manufactured by a company under a particular name • ...
Power 2025-08-15
Across
- The ability to influence others and control resources
- Something you are high if you are the gatekeeper of information flow in social networks.
- Something depends on the availability of alternatives.
- Type of power that the less powerful person has to keep the powerful person in the relationship and use power judiciously.
- Requiring others to do specific things due to one’s role or position.
- The ability to provide compensation.
Down
- The ability to apply punishment.
- Something that answer of question 5 generates power through.
- Social structures of individuals or social units that are connected through relationships.
9 Clues: The ability to apply punishment. • The ability to provide compensation. • The ability to influence others and control resources • Something depends on the availability of alternatives. • Something that answer of question 5 generates power through. • Requiring others to do specific things due to one’s role or position. • ...
Emerging Technology Puzzle 2025-09-19
Across
- Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny
- Security vulnerabilitiees in faster networks, increased dependency on connected devices and data interception
- Fraud in immersive platforms and privacy issues
- Data breaches, third party vendor risks, regulatory compliance challenges and service outages
- Automation errors, lack of human oversight, cyber vulnerabilities
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Potential to break current cryptographic systems which may lead to data breaches and fraud
- Increased attack surface, device vulnerabilities, data security and privacy concerns
9 Clues: Fraud in immersive platforms and privacy issues • Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks, and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities • ...
Geodesy 2026-04-09
Across
- A unit of measurement that may be used when determining distances.
- Buildings, roads, and bridges planned using survey data.
- Landforms shown on maps as part of terrain description.
- The height of points measured during surveying.
- Technology used to determine precise coordinates on the Earth's surface.
Down
- Natural features included in topographic surveys and maps.
- The use of coordinates and maps to move and orient in an area.
- The Earth's surface where positions, distances, and elevations are measured.
- Man-made features like services and networks shown on maps of an area.
9 Clues: The height of points measured during surveying. • Landforms shown on maps as part of terrain description. • Buildings, roads, and bridges planned using survey data. • Natural features included in topographic surveys and maps. • The use of coordinates and maps to move and orient in an area. • A unit of measurement that may be used when determining distances. • ...
RECOGNITION TASK 2018-08-23
Across
- is a network that connects other networks and devices to share information
- You do this be diligent and comply with the delivery of tasks
- There, you can work with several people
- Faculty of the human being to understand through reason
Down
- This is a period in which an action is performed
- You do this evaluate of knowledge, attitude and performance of a person
- This is activities that the student must do
- This is a process to learn something
8 Clues: This is a process to learn something • There, you can work with several people • This is activities that the student must do • This is a period in which an action is performed • Faculty of the human being to understand through reason • You do this be diligent and comply with the delivery of tasks • ...
EEE AND ECE TECHNICAL WORDSJ 2018-10-05
Across
- Parallel resonance is also called _____(13).
- Which variable is a variable that stores the address of another variable(7).
- Which phenomenon takes place in enhancement type mosfet (9).
- The commutator segments in DC motor is equal to the number of ______(9).
Down
- Super conductors exhibit which properties (regarding magnetism)(12).
- Passive networks are always_______(10).
- Which statement is used to restart iteration from beginning if loop(8).
- What is the dynamic impedance offered by the ideal tank circuit(8).
8 Clues: Passive networks are always_______(10). • Parallel resonance is also called _____(13). • Which phenomenon takes place in enhancement type mosfet (9). • What is the dynamic impedance offered by the ideal tank circuit(8). • Super conductors exhibit which properties (regarding magnetism)(12). • Which statement is used to restart iteration from beginning if loop(8). • ...
Internet Vocabulary 2014-04-29
Across
- engine softwere that searches and gathers information
- when people copy and sell or use there there movie and vido and sell it as there own
- when someone writes down or copys all your hard work and you pretend its your work
Down
- a global network
- someone who bullys over the internet or any social midia
- contains dated text entries
- and unarthourized person who gains acces to computer files
- networks online communities that meet or socialize with each other
8 Clues: a global network • contains dated text entries • engine softwere that searches and gathers information • someone who bullys over the internet or any social midia • and unarthourized person who gains acces to computer files • networks online communities that meet or socialize with each other • ...
Network Components 2021-11-09
Across
- adapter set of communication standards that uses digital transmission to make phone calls, video calls, transmit data and other network services
- transmitter and a receiver of signals
- to allow or permit certain types of network traffic in
- converts a digital data frame from the communications technology
Down
- two or more hosts or network segments together
- part of two networks
- wireless infrastructure network mode to provide a connection point
- enables connected devices to share information and talk to each other.
8 Clues: part of two networks • transmitter and a receiver of signals • two or more hosts or network segments together • to allow or permit certain types of network traffic in • converts a digital data frame from the communications technology • wireless infrastructure network mode to provide a connection point • ...
Network Devices 2021-04-21
Across
- allows digital data transmission over standard phone line
- both transmitter and receiver
- network security device that allows or blocks traffic on a defined set of security rules
- device to connect local area network to a wide area network
Down
- computer networking device that creates a single, aggregate network from multiple communication networks or network segments.
- allows data to flow from one network to another
- wireless access point
- enables connected devices to share information with each other
8 Clues: wireless access point • both transmitter and receiver • allows data to flow from one network to another • allows digital data transmission over standard phone line • device to connect local area network to a wide area network • enables connected devices to share information with each other • ...
The Internet 2020-11-17
Across
- Websites are stored on web servers connected to this
- Every networked computer or computing device has a unique on of these
- Responsible for deciding where a data packet should go
- The _____ name is a text reference to a site that can be translated into the numerical address of the site
Down
- A worldwide collection of inter-connected networks
- Used for accessing the World Wide Web
- Allow the user to navigate around and between websites
- Short for modulator/ demodulator
- A text based system system for defining web pages
9 Clues: Short for modulator/ demodulator • Used for accessing the World Wide Web • A text based system system for defining web pages • A worldwide collection of inter-connected networks • Websites are stored on web servers connected to this • Allow the user to navigate around and between websites • Responsible for deciding where a data packet should go • ...
Transport in Great Britain 2023-01-17
Across
- British car manufacturer famous for the 'Minor'.
- Tracks spread across the country to offer quick national transport.
- Famous for transporting the royal family cars and their luxury.
- Networks of waterways primarily used for transport.
Down
- Motorised two wheeled mode of transport. Famous British makers include Royal Enfield and BSA.
- Large public vehicles that started in London in 1829 (tricky!).
- Two wheeled mode of transport
- Still used in Birmingham and Edinburgh today. Work on tracks. First introduced in 1829.
8 Clues: Two wheeled mode of transport • British car manufacturer famous for the 'Minor'. • Networks of waterways primarily used for transport. • Large public vehicles that started in London in 1829 (tricky!). • Famous for transporting the royal family cars and their luxury. • Tracks spread across the country to offer quick national transport. • ...
Department of Homeland Security 2023-11-19
Across
- Protects our computer systems and networks from these
- Responds to these and disasters in our nation
- Focuses on at home or "_________" security
- Manages this to prevent criminals and illegal goods from entering the US from another nation
Down
- This cabinet position was created in 2001 after these attacks
- Gathers this and then investigates suspicious activities
- Provides resources and training to help people and businesses be ___________ in an emergency or disaster
- The leader of this department is called a ______.
8 Clues: Focuses on at home or "_________" security • Responds to these and disasters in our nation • The leader of this department is called a ______. • Protects our computer systems and networks from these • Gathers this and then investigates suspicious activities • This cabinet position was created in 2001 after these attacks • ...
Network Types 2026-01-26
Across
- Covers a large geographical area (The internet is an example of this type of network)
- Something that can be shared within a network
- A topology with a backbone
- A network over a small geographical area
Down
- The biggest group of inter-connected networks
- A topology with a central hub
- Connects personal devices (This is the type of network that Bluetooth uses)
- 2 or more computers connected together to be able to communicate and exchange digital information
8 Clues: A topology with a backbone • A topology with a central hub • A network over a small geographical area • The biggest group of inter-connected networks • Something that can be shared within a network • Connects personal devices (This is the type of network that Bluetooth uses) • Covers a large geographical area (The internet is an example of this type of network) • ...
Ethics To Technology (ch.3) 2024-02-13
Across
- Refers to confidentiality, integrity, and availability.
- A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster.
- The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
- A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.
Down
- Established in 2003 to protect the nation’s Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.
- A concept in computer security that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.
6 Clues: Refers to confidentiality, integrity, and availability. • The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats. • ...
BTS and K - pop 2023-09-03
Across
- A famous or well – known person.
- Media Websites and apps (applications) that let people create and share things online, or to join social networks.
- to begin or make something to exist.
Down
- The first public appearance of a new product or show
- To do an action or piece of work
- To sing, dance, act, read a poem, etc. in front of people.
- To sell new album or new collection.
7 Clues: To do an action or piece of work • A famous or well – known person. • To sell new album or new collection. • to begin or make something to exist. • The first public appearance of a new product or show • To sing, dance, act, read a poem, etc. in front of people. • ...
Data Communication 2022-02-03
Across
- determines the volume of data that can be transmitted in given time
- transmission line that permits data to flow in only one direction
- acts as an interface between networks
- The most popular means of communicating data wirelessly
Down
- a protocol for sending email messages over the internet
- or any direct action from a use
- Allows any sort of electronic equipment to automatically make their own connections without
7 Clues: or any direct action from a use • acts as an interface between networks • a protocol for sending email messages over the internet • The most popular means of communicating data wirelessly • transmission line that permits data to flow in only one direction • determines the volume of data that can be transmitted in given time • ...
Social Media Crossword Puzzle 2021-01-07
Across
- A social media app which main function is video sharing
- Face of any brand
- A platform founded by Mark Zuckerberg
- The web address used for identifying a website or page
- A picture or an icon representing a particular person in an online forums
- A platform to sell online products
- A platform to take online session
- Acronym for small- scale animations and film clips in social media
- Keyword for social media
Down
- A free url shortening service
- A pictorial representation of a facial expression which is used in writing
- A person who is earning a commission by promoting or advertising other people's products
- Anything shared across social networks that get passed on rapidly
- Use this to improve your organic search results
- Currently popular or widely discussed online
- An electronic version of a book
- An image, video or a text typically humorous in nature, that is copied and spread rapidly by internet users, often with slight variations
- A msg sent on twitter
18 Clues: Face of any brand • A msg sent on twitter • Keyword for social media • A free url shortening service • An electronic version of a book • A platform to take online session • A platform to sell online products • A platform founded by Mark Zuckerberg • Currently popular or widely discussed online • Use this to improve your organic search results • ...
Chapter 9 The Tree House Mystery 2024-01-23
Across
- float or hang suspended over
- group of people who have the right to enforce laws or make important decisions
- respect or congratulations!(- between the different words)
- have the ability to see
- piece of cloth on which an artist paints
- line segment where two faces of a solid figure meet
- daydream
Down
- risky or daring undertaking; to expose to danger; to dare
- invisible line that marks the extent of a state's territory
- involves deep inspiration and prolonged expiration through your lips
- program that accesses and displays files and other data available on the Internet and other networks.
- to suspend from a support (2 verb forms only)
- next to someone or something
- collection of data by having people answer a series of questions
- picture made with paint
- bend the top part of your body forward in order to show respect
- events when something notable is seen
- quickly
18 Clues: quickly • daydream • picture made with paint • have the ability to see • float or hang suspended over • next to someone or something • events when something notable is seen • piece of cloth on which an artist paints • to suspend from a support (2 verb forms only) • line segment where two faces of a solid figure meet • risky or daring undertaking; to expose to danger; to dare • ...
IAM Directory Services 2025-11-24
Across
- Server that stores the AD database and handles authentication.
- Allows a user to authenticate once and access multiple systems.
- Open-source implementation of the LDAP protocol.
- Rules that specify user or system access rights.
- Security best practice to give users only the access they need.
- Logical container for grouping users, groups, and computers.
- Microsoft’s directory service for Windows networks.
- The main OpenLDAP server daemon.
- Protects data in transit between directory clients and servers.
Down
- Centralized systems that manage network resources and user identities in a structured hierarchy.
- Links between domains that enable resource sharing.
- Preparing restoration procedures for directory failures.
- Process of synchronizing directory data across servers.
- Ability of directory services to grow with organizational needs.
- Define allowed attributes and object classes in a directory.
- Distributed data repository that stores directory information for fast searches.
- Lightweight Directory Access Protocol used to query directory services.
- Plain text format for representing directory entries.
18 Clues: The main OpenLDAP server daemon. • Open-source implementation of the LDAP protocol. • Rules that specify user or system access rights. • Links between domains that enable resource sharing. • Microsoft’s directory service for Windows networks. • Plain text format for representing directory entries. • Process of synchronizing directory data across servers. • ...
