networks Crossword Puzzles
Technology 2020-10-27
Across
- an application program
- the ability to do different things
- (V) get better
- (adj) electronic, not physical
- a device that produces electricity
- the network that interconnects other networks, where data archives are located
- how good something is
- the branch of knowledge that deals with applying science and engineering to practical uses.
- a computer user who illegally gains access to restricted computer systems.
Down
- a machine used for printing
- they write code which removes the manufactures restriction on everyday devices. They don't commit criminal acts like hacking into government computer systems
- a system of accessing the internet from remote machines such as laptop computers that have wireless connections
- machine or pice of equipment that does a particular thing
- (adj) useful
- device used to point at and select items on a computer screen and to control the movement of the cursor
15 Clues: (adj) useful • (V) get better • how good something is • an application program • a machine used for printing • (adj) electronic, not physical • the ability to do different things • a device that produces electricity • machine or pice of equipment that does a particular thing • a computer user who illegally gains access to restricted computer systems. • ...
Advanced Networking Crossword 2021-04-08
Across
- A series of four decimal numbers separated by dots that can identify a computer in a network.
- Directs the traffic of data packets between networks.
- The language used to create web pages.
- An example of malicious software.
- Another name for the data being transmitted in a data packet.
- The application used to access web pages.
- Contains special information to detect any missing packets at the destination.
- The unique address designated to a web page.
- Used to prevent outsiders accessing private data in a network.
Down
- A smaller segment of a larger message.
- One of the requirements that a company network security should fulfil.
- Consists of the sequence number, return address and destination address of a data packet.
- The largest WAN (Wide Area Network) in the world.
- A unique name used to recognize a particular computer in a network.
- A method of sending messages from one computer to another.
15 Clues: An example of malicious software. • A smaller segment of a larger message. • The language used to create web pages. • The application used to access web pages. • The unique address designated to a web page. • The largest WAN (Wide Area Network) in the world. • Directs the traffic of data packets between networks. • ...
Computer Puzzle 2021-04-08
Across
- A series of four decimal numbers separated by dots.
- A series of numbers, letters and symbols used to protect documents on a computer from being hacked.
- a language used to create all web pages.
- used to identify and monitor people's movements.
- A unique address asigned to web pages.
- computers that are used to host webs.
- a method of sending messages from one computer to another computer via communication links.
- Prevents outsides from accessing private data from the networks.
- Vast digital landscape that consists of millions of web pages.
- refers to World Wide Web.
Down
- Method and group of technologies for delivery of voice communications over internet.
- A web browser is a software designed to help users access the web pages.
- the largest WAN in the world, made up of billions of computers.
- files used to take over someone's computer. It's very dangerous
- Computer based system that allows users to exchanges voice messages.
15 Clues: refers to World Wide Web. • computers that are used to host webs. • A unique address asigned to web pages. • a language used to create all web pages. • used to identify and monitor people's movements. • A series of four decimal numbers separated by dots. • Vast digital landscape that consists of millions of web pages. • ...
ICT 2023-06-26
Across
- A destructive software program designed to spread through computer networks
- Output device used to print documents and images
- input device used to input sound
- Handheld input device used to input drawings and sketches into a computer
- Input device used to enter text and commands into a computer
- Output device that converts digital signals from a computer into analog signals for output
- Input device that scans documents and converts them into digital format
Down
- Pointing device commonly used to move the cursor on the screen
- Output device that displays information on a computer screen
- This is a place where computer is used to process data
- The representation of data in a printed format
- Used to capture images and record videos.
- Output device that allows users to listen to audio from a computer
- A security system that protects hardware and software or both
- These devices are used to store and retrieve data from a computer
15 Clues: input device used to input sound • Used to capture images and record videos. • The representation of data in a printed format • Output device used to print documents and images • This is a place where computer is used to process data • Output device that displays information on a computer screen • Input device used to enter text and commands into a computer • ...
Northwood Crossword 2013-11-04
Across
- the ratio of crimes in an area to the population of that area
- payment received for goods or services
- the municipal ward home to Northwood Park Plaza, and Chapples Park
- a social group of any size, whose members reside in a specific locality
- include income and social status; social support networks; education; employment/working conditions; social environments; physical environments; personal health practices and coping skills; healthy child development; gender; and culture
- the immediate environment; a district where people live
- the lower income area of Northwood, composed of townhouses
- the city in which Northwood is located
Down
- services/a public service providing medical care
- the aggregate of surrounding things, conditions, or influences; surroundings
- participating in something
- the general well-being of individuals and societies
- an occupation by which a person earns a living; work; business
- the act of acquiring general knowledge or skills
- the act of buying merchandise
15 Clues: participating in something • the act of buying merchandise • payment received for goods or services • the city in which Northwood is located • services/a public service providing medical care • the act of acquiring general knowledge or skills • the general well-being of individuals and societies • the immediate environment; a district where people live • ...
Northwood Crossword 2013-11-05
Across
- the city in which Northwood is located
- the ratio of crimes in an area to the population of that area
- participating in something
- services/a public service providing medical care
- the general well-being of individuals and societies
- the lower income area of Northwood, composed of townhouses
- the act of buying merchandise
Down
- an occupation by which a person earns a living; work; business
- include income and social status; social support networks; education; employment/working conditions; social environments; physical environments; personal health practices and coping skills; healthy child development; gender; and culture
- payment received for goods or services
- the aggregate of surrounding things, conditions, or influences; surroundings
- a social group of any size, whose members reside in a specific locality
- the immediate environment; a district where people live
- the municipal ward home to Northwood Park Plaza, and Chapples Park
- the act of acquiring general knowledge or skills
15 Clues: participating in something • the act of buying merchandise • payment received for goods or services • the city in which Northwood is located • the act of acquiring general knowledge or skills • services/a public service providing medical care • the general well-being of individuals and societies • the immediate environment; a district where people live • ...
Technology crossword 2017-12-08
Across
- An organization that provides access to the Internet
- The most widely used hardware interface for attaching peripherals to a computer.
- The primary method for keeping a computer secure from intruders
- The computing part of the computer
- website that contains text entries in reverse chronological order
- An inhouse website that serves employees only
- a large network made up of smaller networks.
- a computer is both hardware and software and one is useless without the other
- To store data locally in order to speed up subsequent retrievals
Down
- it is a scam to steal valuable information
- The address that defines the route to a file on an Internet server
- transmission capacity of an electronic pathway such as a communications line
- provide a way for the website to recognize you
- A series of instructions that performs a particular
- The fundamental display element of an electronic screen or bitmapped image
15 Clues: The computing part of the computer • it is a scam to steal valuable information • a large network made up of smaller networks. • An inhouse website that serves employees only • provide a way for the website to recognize you • A series of instructions that performs a particular • An organization that provides access to the Internet • ...
computer viruses-Megan Jubinville 2017-11-29
Across
- a virus that is sent through an email that says I LOVE YOU with a link attached.
- a type of virus named after a greek myth.
- a virus that targeted 5 different iranian companies.
- software that is intended to damage or disable computers and computer systems.
- a virus that floods a network.
- is a type of trojan horse virus.
Down
- a virus that spreads across vulnerable networks and uses hacking to get your password
- a virus that replicates itself.
- the programs and other operating information used by a computer
- any unwanted software installed on your computer.
- type of virus that spreads through mail programs.
- red virus a virus that attacked computers running microsoft IIS web server
- worm virus a virus that was distributed by a spam email.
- a virus that has the potential of causing a domino effort of cascading email messages.
- ivy virus a virus that downloads files from a website.
15 Clues: a virus that floods a network. • a virus that replicates itself. • is a type of trojan horse virus. • a type of virus named after a greek myth. • any unwanted software installed on your computer. • type of virus that spreads through mail programs. • a virus that targeted 5 different iranian companies. • ivy virus a virus that downloads files from a website. • ...
Deanna Herbert 2018-11-16
Across
- If you ______ your files can be saved from hackers locking them
- Can damage networks.
- Type of attack that floods a system with traffic (Denial of Service)
- Is used to get information from a person's computer
- A software used to protect your computer from a type of malware
- Can be let into your computer by a form of communication
- Made up of code, can be downloaded onto your computer.
Down
- Unwanted Software that is type of malware
- A person who may try to get into your computer
- A ransomware that was used in an attack in Atlanta.
- You should not ________ anything suspicious onto your computer
- Is used to scare or cause anxiety to the user
- Fraud Email that can be sent to you
- Software that is meant to harm your computer.
- A virus that acts like another virus as a disguise.
15 Clues: Can damage networks. • Fraud Email that can be sent to you • Unwanted Software that is type of malware • Is used to scare or cause anxiety to the user • Software that is meant to harm your computer. • A person who may try to get into your computer • A ransomware that was used in an attack in Atlanta. • Is used to get information from a person's computer • ...
1950s TV 2023-12-04
Across
- Groundbreaking sitcom from 1951 to 1957 (3words)
- Host of The Twilight Zone
- filming style of The Twilight Zone (2words)
- Production company headed by Lucille Ball
- Repeated airing of a previously broadcast television episode
- the characteristics of a population that have been categorized by distinct criteria—such as age, gender and income
- Popular game show rigged in 1956 (two words)
Down
- integration of products organically into the storyline of a tv show (2 Words)
- Type of show the Twilight Zone was
- Research method used to comprehend viewers' preferences
- Lucille Ball's role beyond acting on I Love Lucy
- Lighting setup use don I Love Lucy (2words)
- I love lucy was shot on this instead of broadcasting live
- The Commission that required networks to disclose the rules and guidelines of each show to the contestants
- Genre of TV show of the $64,000 Question (2 words)
15 Clues: Host of The Twilight Zone • Type of show the Twilight Zone was • Production company headed by Lucille Ball • Lighting setup use don I Love Lucy (2words) • filming style of The Twilight Zone (2words) • Popular game show rigged in 1956 (two words) • Groundbreaking sitcom from 1951 to 1957 (3words) • Lucille Ball's role beyond acting on I Love Lucy • ...
NNFS Crossword 2024-09-25
Across
- Adaptive Neuro-Fuzzy Inference System (5 letters).
- FIS model compared with Mamdani (6 letters).
- A type of basis function used in network models (6 letters).
- A fixed-weight competitive net in unsupervised learning (6 letters).
- A popular Fuzzy Inference System (7 letters).
- Defined using Cartesian products in fuzzy theory (9 letters).
- A fuzzy relation indicating similarity or compatibility (9 letters).
Down
- A type of set used in soft computing (5 letters).
- A type of memory network used in pattern recognition (11 letters).
- A hybrid system combining fuzzy logic and neural networks (10 letters).
- The process of converting a fuzzy value to a crisp one (15 letters).
- Functions that define how elements belong to a fuzzy set (10 letters).
- A network model used in unsupervised learning and feature maps (7 letters).
- Fuzzy ______ system used for decision-making (9 letters).
- A bidirectional network used in associative memory (3 letters).
15 Clues: FIS model compared with Mamdani (6 letters). • A popular Fuzzy Inference System (7 letters). • A type of set used in soft computing (5 letters). • Adaptive Neuro-Fuzzy Inference System (5 letters). • Fuzzy ______ system used for decision-making (9 letters). • A type of basis function used in network models (6 letters). • ...
CS Principles Review Puzzle 2024-04-29
Across
- Lossy compression involves _______ losses
- A ______ can make copies of itself
- formula or set of steps for solving a particular problem
- The process of scrambling data to prevent unauthorized access
- A rogue access point a wireless access point that gives _____ access to secure networks
- bytes stored in electronic memory can be called _____
- When some countries has less access to tech, this is called digital _____
- programs that are made available and may be redistributed
- iteration involves any sort of ________
- ______ from the end of an array
- adds to the end of an array
Down
- The opposite of encryption
- usually measured in bits per second
- is a binary digit represented either by 0's or 1's
- Giving others rights to your work (2 Words)
- mining a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior (2 words)
16 Clues: The opposite of encryption • adds to the end of an array • ______ from the end of an array • A ______ can make copies of itself • usually measured in bits per second • iteration involves any sort of ________ • Lossy compression involves _______ losses • Giving others rights to your work (2 Words) • is a binary digit represented either by 0's or 1's • ...
Chapter 2 2024-12-05
Across
- A leading manufacturer of network hardware like routers and switches.
- A giant server for massive enterprise networks and corporate websites.
- A high-speed network connecting multiple storage devices.
- Software that integrates business processes and eliminates duplication of data.
- A technology for data storage redundancy and performance improvement.
- Technology enabling multiple virtual systems on a single physical machine.
- Software that acts as a bridge between an operating system and applications or between different applications.
Down
- Technology used to save data persistently.
- A computer that provides data and services to other devices in a network.
- Software for managing customer interactions using data analysis.
- A German multinational known for enterprise software solutions.
- The process of connecting devices to share data and resources.
- A processor design with multiple processing units for improved performance.
- A computer or device that accesses services from a server.
- A computing model that delivers services over the internet.
15 Clues: Technology used to save data persistently. • A high-speed network connecting multiple storage devices. • A computer or device that accesses services from a server. • A computing model that delivers services over the internet. • The process of connecting devices to share data and resources. • A German multinational known for enterprise software solutions. • ...
AI Tools and Technology 2025-04-25
Across
- - Conversational - AI model for generating human-like text.
- - Writing - AI tool for content creation and copywriting automation.
- - Framework - High-level neural networks API, running on top of TensorFlow.
- - DeepLearning - End-to-end open-source platform for machine learning.
- - Transcription - Converts spoken language into text (Google Speech-to-Text).
- - Metrics - AI-driven analysis of user behavior (Google Analytics AI).
- - Language - Natural Language Processing for understanding human languages.
- - Cloud - Amazon's suite of AI services like Rekognition, Lex, Polly.
Down
- - Visualization - Python library for creating static, animated, and interactive plots.
- - Vision - Open-source computer vision and machine learning library.
- - Research - Deep learning framework favored for flexibility and speed.
- - Trends - Emerging trends and future directions in AI technologies.
- - Multimodal - Google’s AI that handles text, images, audio together.
- - Detection - Real-time object detection system ("You Only Look Once").
- - Statistical - Python library based on Matplotlib for attractive statistical graphics.
15 Clues: - Conversational - AI model for generating human-like text. • - Vision - Open-source computer vision and machine learning library. • - Writing - AI tool for content creation and copywriting automation. • - Trends - Emerging trends and future directions in AI technologies. • - Multimodal - Google’s AI that handles text, images, audio together. • ...
GMetrix Word Search 2025-04-28
Across
- Wireless technology that connects devices to the internet.
- The physical parts of a computer you can touch.
- Device A device used to send information to a computer (ex: keyboard).
- A machine that follows instructions to complete tasks.
- Computing Storing and accessing data over the internet instead of a hard drive.
- Programs and other operating information used by a computer.
- Device Equipment used to store data (ex: USB drive).
- A global system of connected computer networks.
Down
- System The software that manages a computer’s hardware and software (ex: Windows).
- A system that blocks unauthorized access to a network.
- Device A device that receives information from a computer (ex: printer).
- A group of computers connected to share information.
- Software used to access and view websites (ex: Chrome).
- The "brain" of the computer that carries out instructions.
- A harmful program designed to damage a computer.
15 Clues: The physical parts of a computer you can touch. • A global system of connected computer networks. • A harmful program designed to damage a computer. • A group of computers connected to share information. • Device Equipment used to store data (ex: USB drive). • A system that blocks unauthorized access to a network. • ...
BGP 2025-03-25
Across
- A BGP attribute known as Multi-Exit Discriminator
- A collection of IP networks under a single technical administration
- External Border Gateway Protocol used between different autonomous systems
- A logical interface often used as the source for BGP connections
- A router that redistributes routes to avoid a full mesh
- A BGP message that advertises or withdraws routes
- A device or router configured to form a BGP session
- A BGP attribute that determines outbound route priority
Down
- The IP address a packet uses to reach its final destination
- A message used to ensure a BGP session remains active
- The list of autonomous systems a route has traversed
- Another term for a BGP neighbor
- Internal Border Gateway Protocol used within a single autonomous system
- A technique that splits a large AS into multiple smaller AS subdomains
- A BGP message indicating an error condition
15 Clues: Another term for a BGP neighbor • A BGP message indicating an error condition • A BGP attribute known as Multi-Exit Discriminator • A BGP message that advertises or withdraws routes • A device or router configured to form a BGP session • The list of autonomous systems a route has traversed • A message used to ensure a BGP session remains active • ...
Cyber Security Awareness Month 2024-10-28
Across
- An attempt to gain unauthorized access to data or systems.
- A device used to intercept and record network traffic.
- Secret combination used to secure your online accounts.
- A secret key generated from cryptographic processes for authentication.
- Software that protects a computer from unauthorized access via the internet.
- An attack that overloads a system to prevent legitimate access.
- A cyber-attack where a user is tricked into giving sensitive information.
- The process of verifying your identity before accessing an account.
- This security practice hides data so only authorized parties can read it.
Down
- The process of making a network secure from unauthorized access.
- Type of malware that demands payment to release control of your device.
- The act of guessing someone’s password by trying common words.
- Unwanted or junk email often containing phishing links.
- Network of infected computers controlled by an attacker.
- An individual who uses their skills to protect networks.
15 Clues: A device used to intercept and record network traffic. • Secret combination used to secure your online accounts. • Unwanted or junk email often containing phishing links. • Network of infected computers controlled by an attacker. • An individual who uses their skills to protect networks. • An attempt to gain unauthorized access to data or systems. • ...
Digital Media Technology 2022-09-14
Across
- process of transferring content from the site of creation to a site for publishing or viewing
- program which manages the hardware and software on a computer
- physical equipment used in digital media
- devices
- process of bringing content from the device used to create or capture it onto an electronic device to be edited or stored
- designates where and how a file will be stored
Down
- location where files are safe and protected
- content which can be created, viewed, distributed, modified and stored within
- process of making corrections or improvements to digital media
- programs used within computers which provide operating information
- design a user can see when interacting with a device
- connection between two or more devices allowing for sharing and collaborating
- process of preparing to create a project
13 Clues: devices • physical equipment used in digital media • process of preparing to create a project • location where files are safe and protected • designates where and how a file will be stored • design a user can see when interacting with a device • program which manages the hardware and software on a computer • ...
Angel's Crossword Puzzle 2016-08-30
Across
- is a general-purpose computer programming language that is concurrent, class-based, object- oriented, and specifically designed.
- connect as or operate with a network.
- the introductory page of a website
- is a device that forwards data packets along networks.
- Technically a kilobyte is 1,024 bytes.
Down
- a device that scans documents and converts them into digital data.
- refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware.
- a person who uses computers to gain unauthorized access to data
- is a computer network that spans a small area.
- a format for compressing image files.
- a system of words, letters, figures, or other symbols substituted for other words.
- is one type of Uniform Resource Identifier
12 Clues: the introductory page of a website • connect as or operate with a network. • a format for compressing image files. • Technically a kilobyte is 1,024 bytes. • is one type of Uniform Resource Identifier • is a computer network that spans a small area. • is a device that forwards data packets along networks. • ...
COMPUTER SCIENCE 2017-02-26
Across
- It is a software from Microsoft company. The most used word processor.
- It is used to search and watch videos online.
- When we send messages using e-mail. The information is…
- It is used to send and receive private messages.
- The meaning of the letter E of E-MAIL.
Down
- It help us to search pictures, videos, news by using the internet.
- Someone unknown tries to contact you.
- One of the most famous social networks.
- We use it to represent information by using columns, bars, pie in Excel
- When we share information in the social network... the information is...
- It is a software to create charts and calculate.
- It help you to protect any electronic device from getting infected.
12 Clues: Someone unknown tries to contact you. • The meaning of the letter E of E-MAIL. • One of the most famous social networks. • It is used to search and watch videos online. • It is a software to create charts and calculate. • It is used to send and receive private messages. • When we send messages using e-mail. The information is… • ...
AI Lexicon Challenge 2024-08-16
Across
- The field of AI focused on understanding and generating human language
- The broad field encompassing machine learning, NLP, and more
- AI that creates new content like text, images, or music
- A subset of AI where computers learn from data
- The application of a trained model to new data
- The basic units of data processed by a model
- A type of AI model trained on vast amounts of text data
- A type of machine learning using neural networks with many layers
Down
- Internal settings of a model adjusted during training
- A type of neural network architecture foundational to modern AI models
- The process of teaching an AI model using data
- The building blocks of deep learning, inspired by the brain
12 Clues: The basic units of data processed by a model • A subset of AI where computers learn from data • The application of a trained model to new data • The process of teaching an AI model using data • Internal settings of a model adjusted during training • AI that creates new content like text, images, or music • A type of AI model trained on vast amounts of text data • ...
Advanced Software 2015-03-11
Across
- this shows all possible inputs and outputs for a logic gate
- whole number, either positive or negative
- one of the three math properties associated with the ALU
- rules and principles which help structure an individual language
- the design and layout of icons, images and text on any device
- this gate takes the high or 1 input
- this logical expression is represented by a triangle
Down
- hardware that passes data between networks which contain firewall components
- applies security mechanisms to specific applications
- computer screen which accepts commands to complete a task. For example <dir>
- processes fractions and decimal numbers
- one of the three math properties associated with the ALU
- one of the three math properties associated with the ALU
- looks at each piece of information going through the network and rejects or accepts it based on user-defined rules
- this gate takes the low or 0 input
- the NOT "gate" is associated with this term
16 Clues: this gate takes the low or 0 input • this gate takes the high or 1 input • processes fractions and decimal numbers • whole number, either positive or negative • the NOT "gate" is associated with this term • applies security mechanisms to specific applications • this logical expression is represented by a triangle • ...
Technology CrossWord Puzzle 2019-05-20
Across
- An organization that provides access to the Internet
- An organization that provides access to the Internet
- The primary method for keeping a computer secure from intruders.
- a scam to steal valuable information such as credit card and social security numbers
- A website that contains text entries in reverse chronological order
- To store data locally in order to speed up subsequent retrievals
- a large network made up of smaller networks.
Down
- (Central Processing Unit) The computing part of the computer
- Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.)
- The transmission capacity of an electronic pathway
- An inhouse website that serves employees only
- The fundamental display element of an electronic screen or bitmapped image
- Instructions for the computer
- A small text file (up to 4KB)
- (Uniform Resource Locator) The address that defines the route to a file on an Internet server
15 Clues: Instructions for the computer • A small text file (up to 4KB) • a large network made up of smaller networks. • An inhouse website that serves employees only • The transmission capacity of an electronic pathway • An organization that provides access to the Internet • An organization that provides access to the Internet • ...
12 Days of Christmas ITHD Puzzle 2024-12-09
Across
- a link to something in a website.
- Collection of professional creative software made by Adobe.
- a secret word or phrase that must be used to gain admission to something.
- Prevents unauthorized access to a disk's contents, even if the disk is offline.
- Specialized computer or software designed to provide services, data or resources to other computers, over a network.
Down
- The practice of protecting devices, networks and programs from digital attacks.
- Creates a private connection between your computer and a remote server.
- The programs and other operating information used by a computer.
- Person who breaches computer security
- Group of devices connected within a limited area, such as a home, office or building.
- A network security device that monitors and filters incoming and outgoing network traffic based on an org's security policies.
- Programming error
- Unsolicited email
- Temporary data storage
14 Clues: Programming error • Unsolicited email • Temporary data storage • a link to something in a website. • Person who breaches computer security • Collection of professional creative software made by Adobe. • The programs and other operating information used by a computer. • Creates a private connection between your computer and a remote server. • ...
BITS of CISCO Fun 2025-03-20
Across
- Spanish for Sun
- Where is Cisco's headquaters located?
- Cisco's largest office in India is located in which city?
- A Latin dance style and also a flavorful dip
- A service that stores and processes your data on remote servers, accessible via the internet
Down
- A leading global company in networking and IT solutions, known for connecting the world.
- The use of technology to perform tasks without human intervention.
- Spanish for festival
- A refreshing drink made from lemon juice, water, and sugar.
- Cisco's platform for online meetings, webinars, and video conferencing
- A device that directs data traffic between different networks, ensuring packets reach their destinations
- Tropical trees with large, fan-shaped leaves
- A network device that connects devices within a single network, forwarding data to the correct destination.
- A traditional Mexican dish often enjoyed at fiestas.
14 Clues: Spanish for Sun • Spanish for festival • Where is Cisco's headquaters located? • Tropical trees with large, fan-shaped leaves • A Latin dance style and also a flavorful dip • A traditional Mexican dish often enjoyed at fiestas. • Cisco's largest office in India is located in which city? • A refreshing drink made from lemon juice, water, and sugar. • ...
AI 2022-03-05
Across
- what humans will be when (eventually) machines overtake the world
- area that studies problems and implications of AI (e.g., ethics, free will)
- a logic where the truth varies between 0 and 1 (from completely true to completely false)
- a logic where 1 represents the truth, and 0 the opposite
- tests the ability of computer to think like a human
- father of AI
- machine resembling a human being
- network of devices connected to the internet
- set of algorithms used in machine learning that model an AI
Down
- enables processing of data and creates predictions, using Neural Networks
- user entered inputs, transformed in inputs by a compiler (ex. Python, C++, Java)
- AI ability to solve problems
- what enables machines to learn from experience
- creator of the Turing Test
14 Clues: father of AI • creator of the Turing Test • AI ability to solve problems • machine resembling a human being • network of devices connected to the internet • what enables machines to learn from experience • tests the ability of computer to think like a human • a logic where 1 represents the truth, and 0 the opposite • ...
African History 2025-09-08
Across
- Exchange of goods like gold, salt, and ivory that connected Africa to the world.
- Religion that spread through African trade networks and empires.
- East African empire, first in Africa to adopt Christianity.
- – Largest West African empire in history.
- Valuable mineral often traded across the Sahara; essential for survival.
- Southern African kingdom famous for stone walls and gold trade.
- City in Mali known for learning, libraries, and trade.
- Storyteller and oral historian of West Africa.
Down
- Famous king of Mali; richest man in history, known for his pilgrimage to Mecca.
- Precious resource that made West African empires wealthy.
- – Empire led by Mansa Musa; home to Timbuktu.
- Coastal city-states with a blended African and Arab culture.
- – West African empire that grew rich by taxing gold and salt trade.
- Kingdom known for its bronze and ivory art; traded with Portuguese.
14 Clues: – Largest West African empire in history. • – Empire led by Mansa Musa; home to Timbuktu. • Storyteller and oral historian of West Africa. • City in Mali known for learning, libraries, and trade. • Precious resource that made West African empires wealthy. • East African empire, first in Africa to adopt Christianity. • ...
US and Canada Today 2014-01-09
Across
- transforming run-down areas into tourist attractions and public spaces
- this type of economy places less emphasis on heavy industry and traditional manufacturing
- taking out whole forests when harvesting timber
- allows people the freedom to own, operate, and profit from their own businesses
- precipitation that carries abnormally high amounts of acidic material
- long networks of underground or aboveground pipes
Down
- a type of air pollution from sulfur and nitrogen oxides
- earning more from exports than it spends for imports
- the process by which a lake or other body of water becomes rish in dissolved nutrients
- freshwater that lies beneath the earth’s surface
- produced for sale (also known as goods)
- difference in value between a country’s imports and its exports
- the total control of a type of industry by one person or one company
- taxes on imports
14 Clues: taxes on imports • produced for sale (also known as goods) • taking out whole forests when harvesting timber • freshwater that lies beneath the earth’s surface • long networks of underground or aboveground pipes • earning more from exports than it spends for imports • a type of air pollution from sulfur and nitrogen oxides • ...
DARQ Crossword 2019-06-12
Across
- Founder of Bitcoin
- The European data protection regulation that came into effect in May 2018
- The AI layer within Salesforce platform is named after this famous physicist
- Machine Learning technique that is based on artificial neural networks. Hint: Don't think shallow
- Creator of the Ethereum Blockchain
- Microsoft's Mixed reality headset
- Open source blockchain platform hosted by Linux foundation and supported by IBM
- AI platform from IBM
Down
- This technology creates an interactive experience by enhancing real-world objects with computer-generated information
- The most popular form of distributed ledger technology
- This augmented reality game from Niantic became a global craze in 2016
- These are special types of contracts that are self-executed using Blockchain technology
- The ability for AI to parse/ interpret human communication is expressed by this acronym of 3 letters
- Unit of information in Quantum Computing
14 Clues: Founder of Bitcoin • AI platform from IBM • Microsoft's Mixed reality headset • Creator of the Ethereum Blockchain • Unit of information in Quantum Computing • The most popular form of distributed ledger technology • This augmented reality game from Niantic became a global craze in 2016 • The European data protection regulation that came into effect in May 2018 • ...
Science and Discoveries of the 1990s 2023-06-29
Across
- A technique for amplifying DNA(the Nobel Prize in 1993).
- Manipulation and control of matter at the nanoscale.
- Remote-controlled vehicle used for exploring other planets.
- Powerful explosion at the end of a star's life, releasing huge amounts of energy.
- Space shuttle that deployed the Hubble Space Telescope.
- Space telescope that captured stunning images of distant galaxies.
- Reproduction of genetically identical organisms from a single cell.
- Global computer network revolutionizing communication and information sharing.
Down
- Materials with properties manipulated at the nanoscale.
- Digital environment created by computer systems and networks.
- First mammal cloned from an adult somatic cell.
- Promising material for solar cells due to its efficiency and low cost.
- Branch of physics dealing with subatomic particles and their behavior.
- Former ninth planet of the solar system, reclassified as a dwarf planet.
14 Clues: First mammal cloned from an adult somatic cell. • Manipulation and control of matter at the nanoscale. • Materials with properties manipulated at the nanoscale. • Space shuttle that deployed the Hubble Space Telescope. • A technique for amplifying DNA(the Nobel Prize in 1993). • Remote-controlled vehicle used for exploring other planets. • ...
Computer Crossward 2024-07-04
Across
- - Network node equipped for interfacing with another network.
- - Set of rules governing the exchange of data between devices.
- - Common technology for wired LANs.
- - Network security system that monitors and controls incoming and outgoing network traffic.
- - System that translates domain names to IP addresses.
- - Device that connects devices together within a single network.
Down
- - Device that enables a computer to transmit data over telephone or cable lines.
- - Unit of data transmitted over a network.
- - Virtual Private Network, a secure network connection over a public network.
- - Device that forwards data packets between computer networks.
- - Local area network that connects devices over a limited area.
- - Maximum data transfer rate of a network or internet connection.
- Address - Numerical label assigned to each device connected to a computer network.
- - Service Set Identifier, a unique name that identifies a wireless network.
14 Clues: - Common technology for wired LANs. • - Unit of data transmitted over a network. • - System that translates domain names to IP addresses. • - Network node equipped for interfacing with another network. • - Device that forwards data packets between computer networks. • - Set of rules governing the exchange of data between devices. • ...
All About Plant Phyla Crossword Puzzle 2025-01-13
Across
- The broadest taxonomic rank is ______.
- Hornworts and liverworts are examples of ___.
- The kingdom name under which all of these phyla fall under.
- A fern is an example of a ________.
- Bryophytes need to live in _____ environments because they don't have vascular systems to maintain moisture.
- Bryophytes reproduce by releasing ______,though it's still considered sexual reproduction.
- Male gymnosperms produce pollen while female gymnosperms produce _____.
- Most of the ______ and vegetables you eat come from angiosperms.
Down
- Gymnosperms are known for having fungal networks that exist under the soil. This network is nicknamed what?
- The pretty flowering plant phylum is called ________.
- After phylum comes _____ in taxonomic rank.
- The kingdom plantae actually contains about 14 phyla, but we only studied ___ in this class.
- In Tahoe, you're most likely to find what phylum of plant?
- The most specific category of taxonomic rank is ______.
14 Clues: A fern is an example of a ________. • The broadest taxonomic rank is ______. • After phylum comes _____ in taxonomic rank. • Hornworts and liverworts are examples of ___. • The pretty flowering plant phylum is called ________. • The most specific category of taxonomic rank is ______. • In Tahoe, you're most likely to find what phylum of plant? • ...
BITS of CISCO Fun 2025-03-20
Across
- A network device that connects devices within a single network, forwarding data to the correct destination.
- Cisco's largest office in India is located in which city?
- A traditional Mexican dish often enjoyed at fiestas.
- The use of technology to perform tasks without human intervention.
- Spanish for festival
- Spanish for Sun
- Tropical trees with large, fan-shaped leaves
Down
- Cisco's platform for online meetings, webinars, and video conferencing
- A device that directs data traffic between different networks, ensuring packets reach their destinations
- A leading global company in networking and IT solutions, known for connecting the world.
- A refreshing drink made from lemon juice, water, and sugar.
- Where is Cisco's headquaters located?
- A Latin dance style and also a flavorful dip
- A service that stores and processes your data on remote servers, accessible via the internet
14 Clues: Spanish for Sun • Spanish for festival • Where is Cisco's headquaters located? • A Latin dance style and also a flavorful dip • Tropical trees with large, fan-shaped leaves • A traditional Mexican dish often enjoyed at fiestas. • Cisco's largest office in India is located in which city? • A refreshing drink made from lemon juice, water, and sugar. • ...
Urban Profiles 2013-11-17
Across
- The time in which Britain became urbanised
- What does the C stand for in RIC?
- A local atmospheric zone where the climate differs from the surrounding area
- A collective name for the most populated cities in the world
- The worlds most populated city
Down
- What does the I stand for in RIC?
- What does the R stand for in RIC?
- What does CBD stand for?
- A city widely recognised as a centre of economic and political power within the capitalist world economy
- The process whereby rural areas (countryside) are becoming urban
- A condition on road networks that occurs as use increases
- A part of a city, especially a slum area, occupied by a minority group or groups
12 Clues: What does CBD stand for? • The worlds most populated city • What does the I stand for in RIC? • What does the R stand for in RIC? • What does the C stand for in RIC? • The time in which Britain became urbanised • A condition on road networks that occurs as use increases • A collective name for the most populated cities in the world • ...
Urban Profiles 2013-11-17
Across
- The revolution in which Britain became urbanised
- What does the I stand for in RIC?
- The worlds most populated city
- A collective name for the most populated cities in the world
- The commercial and often geographic heart of a city
- A condition on road networks that occurs as use increases
Down
- The process whereby rural areas (countryside) are becoming urban
- What does the C stand for in RIC?
- A local atmospheric zone where the climate differs from the surrounding area
- What does the R stand for in RIC?
- A city widely recognised as a centre of economic and political power within the capitalist world economy
- A part of a city, especially a slum area, occupied by a minority group or groups
12 Clues: The worlds most populated city • What does the C stand for in RIC? • What does the I stand for in RIC? • What does the R stand for in RIC? • The revolution in which Britain became urbanised • The commercial and often geographic heart of a city • A condition on road networks that occurs as use increases • A collective name for the most populated cities in the world • ...
Computer hardware parts. 2022-10-16
Across
- barrier that only allows trusted data through the internet.
- a hardware device that directs traffic between other networks.
- a conventional or stylized representation of a star, typically one having five or more points.
- a device that allows electronics to connect to the internet.
- a computer system that host websites.
- a component that provides network capabilities for a computer.
- A device that connects other network devices in one network.
- multiple connected devices within a specific location.
- a series of Wi-Fi routers that work together to create a single wireless network.
Down
- a computer network that spans a wide geographic area.
- a wireless that allows other wireless devices to connect to a network.
- multiple devices that connect with one another.
12 Clues: a computer system that host websites. • multiple devices that connect with one another. • a computer network that spans a wide geographic area. • multiple connected devices within a specific location. • barrier that only allows trusted data through the internet. • a device that allows electronics to connect to the internet. • ...
1.1-1.5 2022-10-24
Across
- Provides secure access from data in the organization to get out
- a device that is either the source or the destination of a message transmitted over the network
- Internet access that uses a cell phone network to connect
- One computer used as both a client and server
- Network that provides the channel over which the message travels from source to destination
- Typically offered for television service providers
Down
- All computers connected to network and participate directly in a network are classified as ____.
- devices that connect individual end devices to a network
- Network Interface Card
- refers to a private connection of LANS and WANS that belong to an organization
- Specialized ports on a networking device that connects to individual networks
- digital subscriber lines
12 Clues: Network Interface Card • digital subscriber lines • One computer used as both a client and server • Typically offered for television service providers • devices that connect individual end devices to a network • Internet access that uses a cell phone network to connect • Provides secure access from data in the organization to get out • ...
ICT CONCEPTS 2024-09-28
Across
- Organized collection of data, typically stored and accessed electronically.
- Programs and operating information used by a computer.
- Global network connecting millions of computers for sharing information.
- Physical components of a computer system.
- A device that forwards data packets between computer networks.
- Online storage system where data can be saved and accessed remotely.
- Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
- A secret word or phrase used for authentication.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- Security system that monitors and controls incoming and outgoing network traffic.
- Process of converting information into a code to prevent unauthorized access
- Wireless technology for connecting devices to the internet.
12 Clues: Physical components of a computer system. • A secret word or phrase used for authentication. • Programs and operating information used by a computer. • Wireless technology for connecting devices to the internet. • A device that forwards data packets between computer networks. • Online storage system where data can be saved and accessed remotely. • ...
BackPropagation 2025-03-10
Across
- What is the term for the rate that controls the step size in gradient descent?
- What type of learning uses labeled data?
- Which activation function outputs values between 0 and 1?
- What does backpropagation compute in a neural network?
- What happens when a model memorizes training data instead of generalizing?
- What does a neural network minimize during training?
Down
- Which activation function is commonly used to avoid the vanishing gradient problem?
- What problem occurs when gradients become too small in deep networks?
- What does gradient descent update in a neural network?
- Which mathematical rule is used in backpropagation to compute gradients?
- What is one complete pass through the entire dataset called?
- What is the term for the additional parameter that shifts the activation function?
12 Clues: What type of learning uses labeled data? • What does a neural network minimize during training? • What does gradient descent update in a neural network? • What does backpropagation compute in a neural network? • Which activation function outputs values between 0 and 1? • What is one complete pass through the entire dataset called? • ...
Phone Vocab 2026-02-12
Across
- We tried to call our friend, but the line was ___.
- This is where messages go.
- Please be silent. I have to ___ a call.
- To push the numbers on your screen before you phone someone.
- It's really rude to ___ up on someone mid-conversation.
- I find his ___ really annoying. It sounds horrible.
- I called the customer service, but they put me on ___.
Down
- He had been in a meeting when I phoned, so he had to call me ___.
- I ___ through 50 photos before I could find the one I was looking for.
- I have a monthly ___, because I hated being "pay as you go".
- Has your phone ever ___ off at a bad moment?
- Telekom or Vodafone are both phone ___.
12 Clues: This is where messages go. • Please be silent. I have to ___ a call. • Telekom or Vodafone are both phone ___. • Has your phone ever ___ off at a bad moment? • We tried to call our friend, but the line was ___. • I find his ___ really annoying. It sounds horrible. • I called the customer service, but they put me on ___. • ...
Unit 2 2026-03-18
Across
- Simplifying complex systems by hiding unnecessary details
- Having multiple paths in a network to ensure reliability
- A group of interconnected devices that can send and receive data
- A system that translates domain names into IP addresses
- The sequence of connections data travels from sender to receiver
- A chunk of data transmitted over a network
Down
- A network of interconnected networks that communicate using standard protocols
- A unique number assigned to each device on a network
- The maximum amount of data that can be transmitted in a fixed time
- A set of rules that define how data is sent and received
- A protocol that ensures reliable ordered delivery of data packets
- A protocol that sends data quickly without guaranteeing delivery or order
12 Clues: A chunk of data transmitted over a network • A unique number assigned to each device on a network • A system that translates domain names into IP addresses • Having multiple paths in a network to ensure reliability • A set of rules that define how data is sent and received • Simplifying complex systems by hiding unnecessary details • ...
Cisco 2014-01-29
5 Clues: Composure, Calmness • Model of excellence or perfection • Transmission capacity of a communication channel. • Routers operate in which layer of OSI reference model. • What is a service that connects two or more networks within a city called ____________ area network
Class 7 2024-08-08
5 Clues: Unwanted bulk email • a collection of networks • used to protect your computer to avoid Phishing • virtual diaries created by people to share their hobbies and thoughts • an online discussion site where people with similar interests can post messages
Advanced Software 2015-03-11
Across
- one of the three math properties associated with the ALU
- the design and layout of icons, images and text on any device
- hardware that passes data between networks which contain firewall components
- this logical expression is represented by a triangle
- rules and principles which help structure an individual language
- one of the three math properties associated with the ALU
- one of the three math properties associated with the ALU
- looks at each piece of information going through the network and rejects or accepts it based on user-defined rules
Down
- whole number, either positive or negative
- computer screen which accepts commands to complete a task. For example <dir>
- applies security mechanisms to specific applications
- processes fractions and decimal numbers
- this shows all possible inputs and outputs for a logic gate
- this gate takes the high or 1 input
- the NOT "gate" is associated with this term
- this gate takes the low or 0 input
16 Clues: this gate takes the low or 0 input • this gate takes the high or 1 input • processes fractions and decimal numbers • whole number, either positive or negative • the NOT "gate" is associated with this term • applies security mechanisms to specific applications • this logical expression is represented by a triangle • ...
Nicholas Gowin 2024-01-09
Across
- the collection of facts and patterns extracted from data
- a machine that can run a program
- Can be either true or false
- 8 bits
- Information put into a computer like a button.
- Error occurring after attempting to represent a number that is too large.
- examples include music, colors of a painting, or position of a sprinter during a race
- Can also be considered a protocol
Down
- a system of linked pages, programs, and files.
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- data about data
- A computer that forwards data across a network
- finding problems in code and fixing them
- A way to representing info only two options.
- a computer network consisting of interconnected networks that use standardized, open communication protocols.
15 Clues: 8 bits • data about data • Can be either true or false • a machine that can run a program • Can also be considered a protocol • finding problems in code and fixing them • A way to representing info only two options. • a system of linked pages, programs, and files. • A computer that forwards data across a network • Information put into a computer like a button. • ...
Cellular Telecommunications 2024-02-13
Across
- - generation that introduced Internet of Things (IoT) and mission-critical applications
- - Included two sub technologies called HSDPA and HSUPA
- - An enhancement to GSM
- - generation that offered improved voice quality and introduced text messaging
- - introduced us to the world of mobile communication with analog voice calls
- - An enhancement to GSM and GPRS
- - Technology that involves using multiple antennas for both transmitting and receiving data
- - represents a standardized approach to high-speed wireless communication
Down
- - allows the creation of virtual networks
- - Generation that introduced support for mobile broadband
- - the collective network of connected devices and the technology that facilitates communication between devices and the cloud
- - Introduced the use of SIM Cards
- - a new service category of 5G that defines a minimum level of data transfer rate
- - This is the generation which holds the Long-term Evolution technology
14 Clues: - An enhancement to GSM • - An enhancement to GSM and GPRS • - Introduced the use of SIM Cards • - allows the creation of virtual networks • - Included two sub technologies called HSDPA and HSUPA • - Generation that introduced support for mobile broadband • - This is the generation which holds the Long-term Evolution technology • ...
Networking Fundamentals 2025-01-09
Across
- Describes the amount of data that can be transmitted in one go.
- A network spread over a small geographical area.
- Another name for copper cables.
- Type of network connection that makes use of thin metallic wires.
- A type of network connection that needs no wires.
Down
- A network spread over a large geographical area.
- A network hardware device used to connect nodes to a network.
- A general term for a hardware device on a network.
- Describes two or more devices connected together for communication.
- Describes the time between sending and receiving data.
- A network hardware device used to connect networks together.
- Type of network connection that makes use of light photons.
- A network hardware device used to extend the range of a wireless network.
- One drawback of using a computer network.
14 Clues: Another name for copper cables. • One drawback of using a computer network. • A network spread over a large geographical area. • A network spread over a small geographical area. • A type of network connection that needs no wires. • A general term for a hardware device on a network. • Describes the time between sending and receiving data. • ...
Digital Media Technology 2022-09-14
Across
- process of transferring content from the site of creation to a site for publishing or viewing
- program which manages the hardware and software on a computer
- physical equipment used in digital media
- devices
- process of bringing content from the device used to create or capture it onto an electronic device to be edited or stored
- designates where and how a file will be stored
Down
- location where files are safe and protected
- content which can be created, viewed, distributed, modified and stored within
- process of making corrections or improvements to digital media
- programs used within computers which provide operating information
- design a user can see when interacting with a device
- connection between two or more devices allowing for sharing and collaborating
- process of preparing to create a project
13 Clues: devices • physical equipment used in digital media • process of preparing to create a project • location where files are safe and protected • designates where and how a file will be stored • design a user can see when interacting with a device • program which manages the hardware and software on a computer • ...
feb 7,2022 2022-02-07
Across
- and sends data on computer networks
- used to connect with computers with peripheral devices
- and demodulates electrical signals sent through phone lines
- computer file sent along with an email message
- that allows a computer user to find and view information on the internet
- drive-a small, portable device that plugs into the USB port on your computer
- one or more files
Down
- short-range wireless connection
- sphere of knowledge identified by a name
- main screen area that you see after you turn on your computer
- small movable shape that indicates where anything typed by the user will appear
- or more that are connected
- reserved segment of memory within a program that is used to hold the data being processed
13 Clues: one or more files • or more that are connected • short-range wireless connection • and sends data on computer networks • sphere of knowledge identified by a name • computer file sent along with an email message • used to connect with computers with peripheral devices • and demodulates electrical signals sent through phone lines • ...
2.1 Explain Characteristics of Routing Technologies 2025-08-11
Across
- Number of bits in a subnet mask, affects route specificity
- Value routers use to pick the most efficient path
- Translates private IP addresses to public ones for internet access
- Logical divisions of a physical interface, often used for VLANs
- Routes manually configured by an admin, no updates unless changed
- Ensures gateway redundancy by allowing multiple routers to share a virtual address
- Shared address used by multiple devices to provide failover
Down
- Number used to choose the best route when multiple exist
- Exterior gateway protocol used to connect ISPs and large networks
- Routes learned and updated automatically between routers
- Cisco proprietary routing protocol, uses both distance vector and link state features
- Link-state protocol that uses areas to optimize routing
- Maps many private IPs to one public IP using different port numbers
13 Clues: Value routers use to pick the most efficient path • Link-state protocol that uses areas to optimize routing • Number used to choose the best route when multiple exist • Routes learned and updated automatically between routers • Number of bits in a subnet mask, affects route specificity • Shared address used by multiple devices to provide failover • ...
Organizational Goals and Effectiveness-Crossword Buzzle 2025-09-20
Across
- Fundamental shared beliefs guiding organizational actions and decisions
- Systems of interconnected entities sharing information and resources
- Organizations that scan the environment and selectively adopt new practices
- Conditions or outcomes an organization seeks to attain
- A brief declaration of purpose explaining what an organization does and who it serves
Down
- Organizations that constantly search for opportunities to innovate
- Organizations that only respond when challenges arise
- The chain of goals arranged in levels, from operative to higher ones
- Influencing behavior by subtly steering choices without removing freedom
- High-level decisions that set direction to achieve organizational objectives
- Organizations that focus on refining existing procedures and conserving resources
- Describes the desired future state of an organization
- A common challenge in public organizations when goals are vague or unclear
13 Clues: Organizations that only respond when challenges arise • Describes the desired future state of an organization • Conditions or outcomes an organization seeks to attain • Organizations that constantly search for opportunities to innovate • The chain of goals arranged in levels, from operative to higher ones • ...
June crossword 2020-02-14
Across
- Home town of Scottish inventor James Watt
- Colour of the penny postage stamp that followed the Penny Black
- Type of family tree chart that shows generations in circles moving outwards
- The principle that underlines Maori culture and family networks
Down
- Home state of the National Genealogical Society USA
- A scattered population dispersed from one country or region
6 Clues: Home town of Scottish inventor James Watt • Home state of the National Genealogical Society USA • A scattered population dispersed from one country or region • Colour of the penny postage stamp that followed the Penny Black • The principle that underlines Maori culture and family networks • ...
Circulatory System 2020-06-02
Across
- the lining of the vessels inside
- waste product of organic compound with chemical formula
- capillary bed ability to open or close any time according to need
- transfer of energy through heat or electricity from one Atom to another
- The branching blood vessels forming networks between arterioles and venules
Down
- active series of enzyme catalyzed reaction occurring in cells
6 Clues: the lining of the vessels inside • waste product of organic compound with chemical formula • active series of enzyme catalyzed reaction occurring in cells • capillary bed ability to open or close any time according to need • transfer of energy through heat or electricity from one Atom to another • ...
Team 3 2023-10-24
Across
- one of deep learning framework for building neural networks
- part of complex number
- a type of machine learning algorithm used for predicting continuous numeric values based on input data
Down
- father of geometry
- field of mathematics about selection problem and arrangement
- the act of using a trained model to estimate or forecast future outcomes based on input data
6 Clues: father of geometry • part of complex number • one of deep learning framework for building neural networks • field of mathematics about selection problem and arrangement • the act of using a trained model to estimate or forecast future outcomes based on input data • ...
Vocob 2025-09-19
Across
- is a unique numerical label assigned to every device on a computer network that uses the Internet Protocol for communication.
- is fundamental system software that acts as an intermediary between a computer's hardware and the user, managing resources like memory, processor, and storage to enable the execution of application programs
- is the primary component of a computer that acts as its “control center
- is a semiconductor-based storage device, which typically uses NAND flash memory to save persistent data
- is the physical, tangible components of a computer or electronic system that you can see and touch
- is the main circuit board that connects and enables communication between all essential components of a computer, such as the CPU, RAM, and graphics card, while also providing power and data pathways for internal and external devices
- is an external hardware device, not part of the computer's central processing unit (CPU) or memory, that expands the computer's capabilities or makes it more user-friendly by providing input, output, storage, or networking functions
Down
- is an industry-standard connection that allows computers to communicate with and receive power from a wide range of peripheral devices, such as keyboards, mice, and storage drives
- is a computer, program, or device that provides a service to other devices, called clients, on a network, such as the internet
- is your computer's short-term, high-speed working memory, used to store data and programs that are actively being used by the processor
- the network of physical objects—from appliances and vehicles to sensors and even clothing—that connect to the internet using software, sensors, and other technologies to collect and exchange data
- is a data storage device used in computers to store the operating system
- is a shortened form of Interconnected Networks, referring to the global system of interconnected computer networks that use the Internet Protocol (IP) suite to link devices and facilitate data exchange worldwide
13 Clues: is the primary component of a computer that acts as its “control center • is a data storage device used in computers to store the operating system • is the physical, tangible components of a computer or electronic system that you can see and touch • is a semiconductor-based storage device, which typically uses NAND flash memory to save persistent data • ...
British India and the Mughal Empire 2022-05-13
Across
- Buildings were made from materials like iron, steel, and poured _________.
- Mughal rulers had to rely on being militant and utilize __________ policies.
- What do Muslims and Hindus not eat?
- Taxes were locally collected by _______ and had to be paid in cash.
- Internationally, Indian _______ textiles were in high demand.
Down
- Babur was awed by _______ so he constructed these to beautify the empire.
- Akbar was known as this title (hint: no spaces).
- The industrial revolution in England led to the destruction of indian handicrafts and the ________ industry.
- Development of ________ networks further commercialized agriculture and completely destroyed handicraft industries.
- Included elements such as pointed arches, open _________, vaulted roofs, domes, etc.
- Mughals were mostly _______ and Muslims.
- This style of art was very popular.
12 Clues: What do Muslims and Hindus not eat? • This style of art was very popular. • Mughals were mostly _______ and Muslims. • Akbar was known as this title (hint: no spaces). • Internationally, Indian _______ textiles were in high demand. • Taxes were locally collected by _______ and had to be paid in cash. • ...
Gage Sebring 2020-01-28
Across
- search for information about (someone or something)
- Its a trail of data that you create while you use the internet
- its where your talking to someone else
- A web browser is a software application for accessing information on the World Wide Web.
- a unit of information equal to 1000 megabytes
- a unit of information equal to 1000 gigabytes
Down
- you do this when you post something to the internet
- You can share resources
- this is how you put stuff onto your drive or on to your device.
- fact of being who or what a person or thing is
- The virtual space created by interconnected computers and computer networks on the Internet.
- displaying numbers rather than scale positions
12 Clues: You can share resources • its where your talking to someone else • a unit of information equal to 1000 megabytes • a unit of information equal to 1000 gigabytes • fact of being who or what a person or thing is • displaying numbers rather than scale positions • you do this when you post something to the internet • search for information about (someone or something) • ...
Italian Gazzetta 2024-05-15
Across
- having or representing the sun as the center
- an approach to life based on reason and our common humanity, recognizing that moral values are properly founded on human nature and experience alone.
- Italian banking family
- Italian sculptor, painter, architect, and poet
- the way you see something
Down
- standard, classic
- a period in European civilization that was marked by a revival of Classical learning and wisdom
- The printing press
- a person chosen, named, or honored as a special guardian, protector, or supporter
- not having any connection with religion
- Venetian traveler who explored Asia and served Kublai Khan
- a series of ancient trade networks that connected China and the Far East with countries in Europe and the Middle East
12 Clues: standard, classic • The printing press • Italian banking family • the way you see something • not having any connection with religion • having or representing the sun as the center • Italian sculptor, painter, architect, and poet • Venetian traveler who explored Asia and served Kublai Khan • a person chosen, named, or honored as a special guardian, protector, or supporter • ...
Class 8 2016-08-28
Across
- A digital document that is linked to the WWW and viewable by anyone in Internet.
- A computer connected to a network is known as _____.
- A device that connects dissimilar networks ________.
Down
- Clipart option is available in ______ tab.
- The message at the source computer is divided into small parts called______.
- Full name of a file or directory is called ______.
- The first level in a multilevel directory system is _____ directory.
- Placement of text going past the right margin to the next line is ______.
8 Clues: Clipart option is available in ______ tab. • Full name of a file or directory is called ______. • A computer connected to a network is known as _____. • A device that connects dissimilar networks ________. • The first level in a multilevel directory system is _____ directory. • Placement of text going past the right margin to the next line is ______. • ...
Cyber Security 2021-02-12
Across
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- A word that people use to tell them that no one else knows
- or devices.
- Gathers information about how you use your computer
Down
- Short for malicious software, that gains access to your computer or device
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your person
8 Clues: or devices. • A malicious form of self replicating • Someone that tries to gain access to your person • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • ...
Workspace 2021-09-10
Across
- a computer that is small enough to be carried around easily
- A piece of electronic equipment that connects computer networks to each other
- It can be found in library
- A flat surface, usually supported by four legs, used for putting things on
- A green plant with spines
- A seat for one person, usually with four legs
Down
- A machine that is connected to a computer and prints onto paper using ink
- A mobile phone that can be used as a small computer and that connects to the internet
8 Clues: A green plant with spines • It can be found in library • A seat for one person, usually with four legs • a computer that is small enough to be carried around easily • A machine that is connected to a computer and prints onto paper using ink • A flat surface, usually supported by four legs, used for putting things on • ...
Directv Stream 2022-03-07
Across
- what package would a customer get the Encore Channels for the best value?
- how many streams do customers have out of home?
- where do recorded shows appear?
- what is the name of the package that includes all of the premium networks?
Down
- How much dvr storage space customers have with Directv Stream?
- what would be the most cost effective programming package that includes ESPN and Hgtv?
- most cost effective package including the customers RSNs
- what is the name of the Directv Stream recivier?
8 Clues: where do recorded shows appear? • how many streams do customers have out of home? • what is the name of the Directv Stream recivier? • most cost effective package including the customers RSNs • How much dvr storage space customers have with Directv Stream? • what package would a customer get the Encore Channels for the best value? • ...
DECRYPT THE GRID 2025-10-29
Across
- Temporary storage that helps apps or browsers load faster.
- A scam where fake emails or messages trick users into giving away personal information.
- Software intentionally designed to harm, disrupt, or gain unauthorized access to a system.
Down
- Installing the latest version of software to fix bugs or vulnerabilities.
- Finding and fixing errors in code.
- Safety copy of your important data- your best friend during a crash.
- A security barrier that filters traffic between networks.
- A person who gains unauthorized access to systems sometimes ethical, sometimes not.
8 Clues: Finding and fixing errors in code. • A security barrier that filters traffic between networks. • Temporary storage that helps apps or browsers load faster. • Safety copy of your important data- your best friend during a crash. • Installing the latest version of software to fix bugs or vulnerabilities. • ...
ADDICTION 2015-03-16
Across
- Addiction is a _________ disease
- ________ has no impact on susceptibility to addiction
- The repeated use of an addictive substance will cause the _________ brain cells in those networks to multiply
Down
- It is important to understand how abuse is encoded, triggered and _______
- The Hippocampus __________ in briefly recording what is detected by your senses
- Addiction can threaten the addicts ________
6 Clues: Addiction is a _________ disease • Addiction can threaten the addicts ________ • ________ has no impact on susceptibility to addiction • It is important to understand how abuse is encoded, triggered and _______ • The Hippocampus __________ in briefly recording what is detected by your senses • ...
Information Technology Crossword Puzzle 2 2021-04-26
Across
- Bring Your Own Device
- GUI is a common IT terminology that stands for what?
- Allows businesses and other users to access computing resources that are delivered to them over the Internet or other networks.
Down
- CommScope’s new plan for reducing costs
- Stands for Robotic Process Automation and CommScope celebrates 100 Bots
- Acronym for Information Technology Infrastructure Library
6 Clues: Bring Your Own Device • CommScope’s new plan for reducing costs • GUI is a common IT terminology that stands for what? • Acronym for Information Technology Infrastructure Library • Stands for Robotic Process Automation and CommScope celebrates 100 Bots • ...
Se 2. 2024-07-03
Across
- show the product to An audiencia
- the act of compromiso g digital devices and networks
- The simulation of human intelligence processes by machines
- os a text displayed on a computer display or other electronic devices whit referentes
Down
- a set of instructions that is designed yo accomplish a Yasmín
- a software aplicación that lest you visit web page
6 Clues: show the product to An audiencia • a software aplicación that lest you visit web page • the act of compromiso g digital devices and networks • The simulation of human intelligence processes by machines • a set of instructions that is designed yo accomplish a Yasmín • os a text displayed on a computer display or other electronic devices whit referentes
Technovation 2024-12-30
Across
- combination of hardware and software
- financial system which allows the transfer of funds and purchasing items electronically
- filters information in and out of computer
Down
- update for software that is devolved to improve software and remove bugs
- worldwide collection of inter connected networks computer
- used to remember user preferences each time they visit the website
6 Clues: combination of hardware and software • filters information in and out of computer • worldwide collection of inter connected networks computer • used to remember user preferences each time they visit the website • update for software that is devolved to improve software and remove bugs • ...
Network devices 2025-08-09
Across
- improve the performance of Web services to multiple clients
- connect two LANs
Down
- converts analogue data to digital data
- take any data received via one terminal and then send out this data to all other workstations
- It passes messages directly from one device to another
- used to connect networks (LAN to LAN or LAN to WAN)
6 Clues: connect two LANs • converts analogue data to digital data • used to connect networks (LAN to LAN or LAN to WAN) • It passes messages directly from one device to another • improve the performance of Web services to multiple clients • take any data received via one terminal and then send out this data to all other workstations
Computing 2023-09-14
Across
- a revice that forwards information between computer networks
- An extra copy made to protect against the loss or damage of the original.
- to erase or remove information.
- to get a newer, more up to date device
- an instruction to whitelist a program from the firewall or antivirus software
- An internet service that translates a domain name to an IP address so that it can be reached
- A line of Apple's personal computers
Down
- A form of internet access that is thought of as fast
- a software application that allows people to call other devices and have video or audio conferences.
- a file that brings device software to the latest
- to transfer online-hosted content to a computer.
11 Clues: to erase or remove information. • A line of Apple's personal computers • to get a newer, more up to date device • a file that brings device software to the latest • to transfer online-hosted content to a computer. • A form of internet access that is thought of as fast • a revice that forwards information between computer networks • ...
Nervous system 2024-09-25
Across
- specialized cells that detect changes in the environment and convert them into electrical impulses.
- specialized cells that transmit electrical signals throughout the nervous system.
- type of neuron that connect sensory and motor neurons within the CNS.
- The chemical substances found in synaptic vesicles.
- sheath that is the layer of fatty substances endosing many nerve fibres.
- the junctions where neurons communicate with each other.
Down
- ability of an organism to detect and respond to a stimulus
- an organism reaction to a stimulus
- body part of neuron that contain nucleus and sitoplasm
- pathways that interconnected networks of neurons that transmit information throughout the nervous system.
- organ that specialized to detect light from the environment.
11 Clues: an organism reaction to a stimulus • The chemical substances found in synaptic vesicles. • body part of neuron that contain nucleus and sitoplasm • the junctions where neurons communicate with each other. • ability of an organism to detect and respond to a stimulus • organ that specialized to detect light from the environment. • ...
Big History Project: The Roman Empire 2022-02-04
Across
- An expensive good created in China, which the Roman government feared would lead to trade imbalances.
- The sea that the peak of the Roman empire controlled.
- Trade networks: A Roman cookbook that explains many spices came from the Indian Ocean.
- Formation: The Roman kings were these types of rulers.
- The technology that connects a city to a water source.
- Religion and culture: What Romans demanded of their subjects.
Down
- Formation: Ruler of the Roman Empire who kickstarted "Roman Peace."
- Background: A river near where Rome was built.
- Administration: An expensive crop that Roman slaves farmed.
- Decline and fall: The name of the empire that followed the "fall" of Rome.
- Religion and culture: The emperor who legalized Christianity.
11 Clues: Background: A river near where Rome was built. • The sea that the peak of the Roman empire controlled. • Formation: The Roman kings were these types of rulers. • The technology that connects a city to a water source. • Administration: An expensive crop that Roman slaves farmed. • Religion and culture: The emperor who legalized Christianity. • ...
Introduction to the Internet 2025-07-18
Across
- A personal online journal that is frequently updated and intended for general public consumption.
- Internet-based distributed information system.
- A link from one web document to another is called a _________.
- A global network of computer networks.
- The unique network address that identifies the host computer on the internet.
Down
- The "address" of a web page is called a _____.
- A high-speed communications media connecting many computers.
- An application that helps users to obtain information from the Web.
- A collaborative website which can be directly edited by anyone with access to it.
- Most web pages are written in ______.
- If your computer is connected to a modem, you can reach the internet through an ________.
11 Clues: Most web pages are written in ______. • A global network of computer networks. • The "address" of a web page is called a _____. • Internet-based distributed information system. • A high-speed communications media connecting many computers. • A link from one web document to another is called a _________. • ...
Review 2025-07-22
Across
- capacity for learning, reasoning, and understandin
- a mobile telephone that is able to interact with computerized systems and access the internet
- anything worthless or thrown away rubbish
- to treat or process (used or waste materials) so as to make suitable for reuse
- freedom from danger, risk, etc
- the single worldwide computer network that interconnects other computer networks
Down
- to use again
- a container for holding liquids, having a neck and mouth and made of glass or plastic
- is an individual who responsibly and ethically uses technology and the internet to participate in society
- any combination of interconnecting pieces, strings, lines, passages, etc.
- to bring down to a smaller size, amount, price, etc.
11 Clues: to use again • freedom from danger, risk, etc • anything worthless or thrown away rubbish • capacity for learning, reasoning, and understandin • to bring down to a smaller size, amount, price, etc. • any combination of interconnecting pieces, strings, lines, passages, etc. • to treat or process (used or waste materials) so as to make suitable for reuse • ...
School 2022-11-17
Across
- thing where people drive it in the water
- round object that is used for various sports.
- container from which people drink and can be made of plastic
- object with which people paint in their notebook
- very famous soccer player who played for barcelona
- which people live inside it, some with their family or pet
- place where some people eat and most cook in it.
- large four-legged animal that people educate and you can drive
Down
- things where people use them almost every day for everything,we can see social networks.
- thing where people sit to rest, eat...
- people who do tricks and hallucinate you, for example, that a bird comes out of a paper
11 Clues: thing where people sit to rest, eat... • thing where people drive it in the water • round object that is used for various sports. • object with which people paint in their notebook • place where some people eat and most cook in it. • very famous soccer player who played for barcelona • which people live inside it, some with their family or pet • ...
The Fall of The Roman Empire 2017-02-03
Across
- What influenced battering rams and siege devices?
- Who replaced the last Roman emperor?
- What was one problem from the environment that led to the downfall of Rome?
- Who invaded Gaul and pushed the visigoths and the ostrogoths further into Rome?
- What did trade networks bring, causing the population to fall?
- What language did the Romans use and has roots in many languages today?
- What happened because the armies weren't paid as frequently?
Down
- What was the capital city of the Eastern portion later called?
- Who led the Huns?
- What was the name of the capital of the Eastern portion of Rome?
- Who divided the Roman Empire in half?
- Who wrote A Funny Thing Happened on the Way to the Forum?
- What did they make to fix the economy, but ended up ruining it?
- Which portion of the Empire thrived?
- Which portion of the Empire declined?
15 Clues: Who led the Huns? • Who replaced the last Roman emperor? • Which portion of the Empire thrived? • Who divided the Roman Empire in half? • Which portion of the Empire declined? • What influenced battering rams and siege devices? • Who wrote A Funny Thing Happened on the Way to the Forum? • What happened because the armies weren't paid as frequently? • ...
Justin McLeod 2017-11-29
Across
- This virus is also known as the "remote access trojan"
- this virus Spreads across vulnerable networks and uses hacking devices to get your password and lock you out
- This virus effects your computer as soon as you open its email attachment
- red virus This virus attacked the WHite House
- something on a computer that is unwanted and can steal your information
- Antivirus___
- Distributed denial of services
- 18th The poison Ivy Virus was discovered on this date
- This is a virus named after the Greek myth
- A way to communicate with others online
Down
- this virus was the first email virus ever spread
- malware computer program that replicates itself in order to spread to other computers
- This virus was spread through banking accounts
- worm virus This virus was one that took down a 911 emergency response system in Washington state
- This virus affected lives outside of computers
15 Clues: Antivirus___ • Distributed denial of services • A way to communicate with others online • This is a virus named after the Greek myth • red virus This virus attacked the WHite House • This virus was spread through banking accounts • This virus affected lives outside of computers • this virus was the first email virus ever spread • ...
YR 9 Crossword Preet Patel 2017-11-14
Across
- the application of scientific knowledge for practical purposes, especially in industry.
- a relationship between two things or situations, especially where one affects the other.
- bring (goods or services) into a country from abroad for sale.
- a particular position, point, or area in space; a location.
- the world
- The means of connecting people in different ways
- an abundance of valuable possessions or money.
Down
- jobs increase
- The exchange of goods
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
- the usages of children to do work
- human beings in general or considered collectively
- global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the prices which money rises or lowers
- an object that one need not, cannot, or does not wish to give a specific name to
15 Clues: the world • jobs increase • The exchange of goods • the usages of children to do work • the prices which money rises or lowers • an abundance of valuable possessions or money. • The means of connecting people in different ways • human beings in general or considered collectively • a particular position, point, or area in space; a location. • ...
YR 9 Crossword Preet Patel 2017-11-14
Across
- an abundance of valuable possessions or money.
- human beings in general or considered collectively
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
- jobs increase
- the prices which money rises or lowers
- global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- a relationship between two things or situations, especially where one affects the other.
Down
- the usages of children to do work
- a particular position, point, or area in space; a location.
- The means of connecting people in different ways
- bring (goods or services) into a country from abroad for sale.
- the world
- The exchange of goods
- the application of scientific knowledge for practical purposes, especially in industry.
- an object that one need not, cannot, or does not wish to give a specific name to
15 Clues: the world • jobs increase • The exchange of goods • the usages of children to do work • the prices which money rises or lowers • an abundance of valuable possessions or money. • The means of connecting people in different ways • human beings in general or considered collectively • a particular position, point, or area in space; a location. • ...
Computer Viruses Crossword- Rian Fadden 2018-11-15
Across
- something that enters your networks system then duplicates itself
- the practice of selling emails from respective companies to get personal info
- a hacker who inverts viruses into computers with good intentions
- one reason a hacker might hack into a company´s network
- a virus that gets into your software through your permission, and then hacks your software
- a hacker who inverts viruses into computers with bad intentions
- bug a virus that sends the message I LOVE YOU across your screen
Down
- Distributed Denial of Service
- an electronic device
- an infectious software that attacks the instructions of your computer
- the program used by computers to do tasks
- a system of words, letters, and symbols used inplace of words
- type of software designed to block access until a sum of money is paid
- messages distributed by electronic means
- a person who uses computers to gain unauthorized access to data
15 Clues: an electronic device • Distributed Denial of Service • messages distributed by electronic means • the program used by computers to do tasks • one reason a hacker might hack into a company´s network • a system of words, letters, and symbols used inplace of words • a person who uses computers to gain unauthorized access to data • ...
Technology Vocabulary 2021-06-26
Across
- a unit of information equal to 1000 megabytes or 10^9 bytes
- RAM memory that is set aside as a specialized buffer storage
- fix a computer program piecemeal until it works
- the activity of converting data or information into code
- an online journal where people post about their experiences
- the exclusive right to sell a work
- the process in which output of a system is returned to input
- a security system preventing access to a computer or network
- transfer a file or program to a smaller computer
Down
- a worldwide network of computer networks
- a program that gives a computer instructions
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- a sequence of data processed as a single unit of information
- any small compartment
- the mechanical components making up a computer system
15 Clues: any small compartment • the exclusive right to sell a work • a worldwide network of computer networks • a program that gives a computer instructions • fix a computer program piecemeal until it works • transfer a file or program to a smaller computer • the mechanical components making up a computer system • the activity of converting data or information into code • ...
TECHNOLOGY VOCABULARY - TASK I 2021-07-13
Across
- a fault or defect in a computer program, system, or machine
- transfer data into a database or document
- the amount of information that can be stored on a disk drive
- a facial expression represented by a sequence of characters
- the smallest discrete component of an image on a screen
- transfer a file or program to a smaller computer
- a part of RAM used for temporary storage of data
- unwanted e-mail
Down
- a digital audio file made available on the internet
- a unit of information equal to 1000 megabytes or 10^9 bytes
- a worldwide network of computer networks
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- representing the real world by a computer program
- a program used to view HTML documents
- a security system preventing access to a computer or network
15 Clues: unwanted e-mail • a program used to view HTML documents • a worldwide network of computer networks • transfer data into a database or document • transfer a file or program to a smaller computer • a part of RAM used for temporary storage of data • representing the real world by a computer program • a digital audio file made available on the internet • ...
CS Principles Review Puzzle 2024-04-29
Across
- Lossy compression involves _______ losses
- A ______ can make copies of itself
- formula or set of steps for solving a particular problem
- The process of scrambling data to prevent unauthorized access
- A rogue access point a wireless access point that gives _____ access to secure networks
- bytes stored in electronic memory can be called _____
- When some countries has less access to tech, this is called digital _____
- programs that are made available and may be redistributed
- iteration involves any sort of ________
- ______ from the end of an array
- adds to the end of an array
Down
- The opposite of encryption
- usually measured in bits per second
- is a binary digit represented either by 0's or 1's
- Giving others rights to your work (2 Words)
- mining a class of database applications that look for hidden patterns in a group of data that could be used to predict future behavior (2 words)
16 Clues: The opposite of encryption • adds to the end of an array • ______ from the end of an array • A ______ can make copies of itself • usually measured in bits per second • iteration involves any sort of ________ • Lossy compression involves _______ losses • Giving others rights to your work (2 Words) • is a binary digit represented either by 0's or 1's • ...
Artificial Intelligence 2023-09-03
Across
- Assistants AI helpers like Siri or Alexa that respond to voice commands.
- Drones Unmanned aerial vehicles that can fly and make decisions on their own.
- Recognition Technology that understands and transcribes spoken words.
- Cars Vehicles that use AI to navigate and drive themselves.
- Recognition AI that identifies objects and patterns in images.
- Mining Extracts valuable information from large sets of data.
- AI Smart opponents and characters in video games.
- Systems Suggests movies, music, and products based on your preferences.
Down
- Analysis Determines if a text has a positive or negative tone.
- Machines designed to perform tasks, often with human-like abilities.
- Systems Computer programs that provide expert advice in a specific field.
- Computer programs that chat and answer questions.
- Learning AI that learns from data to make predictions and decisions.
- Networks Systems that mimic the human brain to solve complex problems.
- Language Processing AI that understands and processes human language.
15 Clues: Computer programs that chat and answer questions. • AI Smart opponents and characters in video games. • Cars Vehicles that use AI to navigate and drive themselves. • Mining Extracts valuable information from large sets of data. • Analysis Determines if a text has a positive or negative tone. • Recognition AI that identifies objects and patterns in images. • ...
CS Principals Exam Review 2024-04-25
Across
- A heuristic solution is an approach to a problem that produces a solution that is not ______ to be optimal
- viruses are a type of computer ___ that can multiply itself
- a binary digit, either 1 or 0
- TCP is a protocol that ____ transmits packets to a destination
- using a function/____ to code real word actions
- ____ with exponential complexity runs in an unreasonable amount of time
- mario and zelda are both ___ of protagonists
- Citizen science is a form of ___
Down
- "Its either a yes or a no"
- values that change smoothly overtime through a continuous range
- "my code isn't running at all"
- a wireless access point that gives unauthorized access to secure networks
- the ____ between developing/undeveloped countries make it harder for them to be interconnected globally
- filling out forums for data base on observation is helpful
- compressing data in a way that discards some data and makes it impossible to recover the original
15 Clues: "Its either a yes or a no" • a binary digit, either 1 or 0 • "my code isn't running at all" • Citizen science is a form of ___ • mario and zelda are both ___ of protagonists • using a function/____ to code real word actions • filling out forums for data base on observation is helpful • viruses are a type of computer ___ that can multiply itself • ...
Gen AI 2024-02-16
Across
- - AI program known for generating images from textual descriptions.
- - A text input given to AI to generate a specific output.
- - Short for natural language processing, a key area of AI.
- - A type of model architecture pivotal for language processing tasks.
- - An AI research lab known for its contributions to generative AI.
- - Process of converting text into manageable pieces for processing.
- - Abbreviation for a widely known generative pre-trained transformer model.
Down
- - Technique to increase the diversity of training data.
- - A type of model used for generating high-quality images.
- - A subset of machine learning involving neural networks.
- - A conversational AI developed by OpenAI.
- - A model designed to understand the context of words in search queries.
- - Process of adjusting a pre-trained model for a specific task.
- - A term for the unintentional prejudice in AI models.
- - Considerations necessary in the development and deployment of AI.
15 Clues: - A conversational AI developed by OpenAI. • - A term for the unintentional prejudice in AI models. • - Technique to increase the diversity of training data. • - A subset of machine learning involving neural networks. • - A text input given to AI to generate a specific output. • - A type of model used for generating high-quality images. • ...
Technology 2023-06-29
Across
- Using technology to simulate a three-dimensional environment
- Protecting computers, networks, and data from unauthorized access
- A portable device with a touch screen for browsing and entertainment
- Watching or listening to media content over the internet in real-time
- Online platforms for connecting and sharing content with others
- A global network that connects computers and allows information sharing
Down
- A machine that can perform various tasks and run different programs
- Electronic mail used for sending messages and files online
- Designing, building, and programming robots for various purposes
- A collection of web pages accessible through the internet
- Electronic games played on a computer or gaming console
- Creating three-dimensional objects by layering materials
- Writing instructions for computers to create software and websites
- A portable computer that you can use for writing, doing homework, or watching movies
- A mobile device that can make calls, send messages, and run apps
15 Clues: Electronic games played on a computer or gaming console • Creating three-dimensional objects by layering materials • A collection of web pages accessible through the internet • Electronic mail used for sending messages and files online • Using technology to simulate a three-dimensional environment • Online platforms for connecting and sharing content with others • ...
IT Terminology 2023-03-07
Across
- a small electronic device
- a system of connected devices that can share information with each other
- an organized collection of information that is stored on a server or computer
- being able to operate with other programs or equipment
- to set up for use
- to make a copy of data
- physical parts of an electronic device, both inside and outside
Down
- to improve, enhance, or update something
- the maximum amount of information that can be transmitted over an internet connection
- a restricted or private computer network
- to move or send something from one place to another
- a physical or virtual point of connection to link two devices or networks
- to restart a device or operating system
- a set of programs and instructions that an operating system uses to function
- to copy data from one device or server to another, usually over the internet
15 Clues: to set up for use • to make a copy of data • a small electronic device • to restart a device or operating system • to improve, enhance, or update something • a restricted or private computer network • to move or send something from one place to another • being able to operate with other programs or equipment • ...
156 2023-07-27
Across
- Measures taken to protect against unauthorized access, theft, or damage.
- Watching videos or listening to music online without downloading.
- Harmful software that can infect and damage computer files and programs.
- Storing data and files online to access them from any device with an internet connection.
- Software that securely stores and manages passwords for various accounts.
- Security system that controls and filters network traffic to protect against threats.
- Creating a copy of data to restore in case of loss or damage.
Down
- Biometric authentication using facial recognition.
- Unwanted and unsolicited emails, often sent in bulk.
- Biometric authentication using fingerprint recognition.
- Regular payment for access to a service or content.
- Installing the latest version of software to get new features and fixes.
- Software intended to harm or exploit devices, data, or networks.
- Improving a device or software to a better or newer version.
- Protection of personal information from being accessed or shared without consent.
15 Clues: Biometric authentication using facial recognition. • Regular payment for access to a service or content. • Unwanted and unsolicited emails, often sent in bulk. • Biometric authentication using fingerprint recognition. • Improving a device or software to a better or newer version. • Creating a copy of data to restore in case of loss or damage. • ...
Allyssa's Internet Terms 2021-10-28
Across
- A window that opens without selecting a new window.
- An attempt to steal your personal information.
- A computer that provides data to other computers.
- A type of virus that replicates itself, but doesn't alter any of the files on your computer/device.
- Smallest unit of measurement used to measure data.
- A popular type of network cable that is used for wired networks.
- This describes the programs inside of a computer.
- Going from site to site without a purpose.
Down
- The act of posting or sending offensive messages over the internet.
- This is mail in the United States postal system, and it takes long to receive than an email.
- The physical parts of a computer and related devices.
- A code of good behavior.
- A unit of measurement used to measure data.
- This consists of multiple devices that communicate with one another.
- Going from site to site with a purpose.
15 Clues: A code of good behavior. • Going from site to site with a purpose. • Going from site to site without a purpose. • A unit of measurement used to measure data. • An attempt to steal your personal information. • A computer that provides data to other computers. • This describes the programs inside of a computer. • Smallest unit of measurement used to measure data. • ...
angielski zawodowy(1) 2024-09-26
Across
- Instructions written in a programming language executed by a computer. – kod
- Official permission to use a particular software or service. – licencja
- Programs installed on a computer. – oprogramowanie
- Help with solving technical problems. – wsparcie techniczne
- Information or numbers entered and stored in a computer. – dane
- – The process of organizing, processing, and managing data. – przetwarzanie danych
Down
- Protecting data from unauthorized access. – bezpieczeństwo informacji
- A person who designs, builds, or maintains technology systems. – inżynier
- The process of checking products to ensure they work correctly. – zapewnienie jakości
- The physical parts of a computer, like the processor or RAM. – sprzęt komputerowy
- Moving an employee from one section to another. – przeniesienie
- The process of converting data into a secure format. – kodowanie
- The creation of virtual versions of computer systems, servers, or networks. – wirtualizacja
- An organization involved in commercial or industrial activities. – firma
- Chief Executive Officer, the highest-ranking person in a company. – dyrektor generalny
15 Clues: Programs installed on a computer. – oprogramowanie • Help with solving technical problems. – wsparcie techniczne • Moving an employee from one section to another. – przeniesienie • Information or numbers entered and stored in a computer. – dane • The process of converting data into a secure format. – kodowanie • ...
Cybercrime 2024-04-15
Across
- To convert data into a code to prevent unauthorized access
- To obtain something, typically money, through force or threats
- Measures implemented to protect against cyber threats
- A score assigned to an individual indicating their creditworthiness.
- Not asked for
- Individuals or entities who suffer harm or loss due to cybercrime.
Down
- Software that secretly gathers information about a user's activities without their knowledge.
- an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- A person who uses computers to gain unauthorized access to data
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- A fraudulent scheme performed by an individual or group.
- Deceitful or dishonest behavior for personal gain.
- An action that harms others or is against the law
- Money demanded for the release of captive data or system access
- An organized collection of data stored and accessed electronically
15 Clues: Not asked for • An action that harms others or is against the law • Deceitful or dishonest behavior for personal gain. • Measures implemented to protect against cyber threats • A fraudulent scheme performed by an individual or group. • To convert data into a code to prevent unauthorized access • To obtain something, typically money, through force or threats • ...
Browsing safely 2025-06-15
Across
- applications used to prevent the entry of virus into the computer system
- full form of virus
- acts done to protect one's computer system
- Collection of various networks in the form of a web
- providing malwares and viruses into one's computer through various links and emails
- illegal entry into one's computer through various links
- cyber crime in which money is demanded after attacking the victim
- a type of anti-virus
- befriending children on social media and causing harm through social media or physically
- full form of OTP
Down
- criminal activities intented to harm a person through online
- act of terrorism conducted through the use of internet
- full form of ICT
- sequence of characters or numbers used in any device or system to keep it protected
- act of harassing people through the use of internet
15 Clues: full form of ICT • full form of OTP • full form of virus • a type of anti-virus • acts done to protect one's computer system • Collection of various networks in the form of a web • act of harassing people through the use of internet • act of terrorism conducted through the use of internet • illegal entry into one's computer through various links • ...
Summer Holiday Homework 2025-06-09
Across
- A larger network than LAN
- Two or more computers and peripheral devices are connected within a small area
- Used for communication among devices
- A legal act granted by law to the creator for his original work
- Refers to being aware of the ethical practices while using the internet
- Refers to unwanted bulk emails that come from unknown sources
- Refers to an illegal intrusion into a computer system or network
- Connect all the computers in a network
Down
- The process of transforming data into an unreadable code
- Refers to the act of using or imitating the language and thoughts of another person
- Used for sharing data and hardware resources
- Connect your computer to the available internet connection
- Connects two different types of networks with each other
- Transmits the message from the source computer to the destination computer
- Connets two or more computers located at distant places
15 Clues: A larger network than LAN • Used for communication among devices • Connect all the computers in a network • Used for sharing data and hardware resources • Connets two or more computers located at distant places • The process of transforming data into an unreadable code • Connects two different types of networks with each other • ...
Network 2026-03-25
Across
- The electrical or light pulses used to transmit data
- A device that directs data between different networks
- A device that sends data to all connected devices
- A cable made of two wires twisted together to reduce interference
- A network where all devices connect to a central device
- A network where devices are connected in a circular path
Down
- A network where all devices share one main cable
- A device that connects multiple devices and forwards data efficiently
- Cable A cable that uses light to transmit data through a glass core
- The amount of data that can be transmitted over a network
- A network where devices are interconnected with multiple paths
- A cable with a single copper core and shielding to reduce interference
- The physical or logical layout of a network
- Any device connected to a network
- A connector commonly used for Ethernet cables
15 Clues: Any device connected to a network • The physical or logical layout of a network • A connector commonly used for Ethernet cables • A network where all devices share one main cable • A device that sends data to all connected devices • The electrical or light pulses used to transmit data • A device that directs data between different networks • ...
First Nations Economy 2026-03-07
Across
- The small shrub traded in central Australia that reduced hunger and tiredness.
- The type of insect eaten during gatherings in the Snowy Mountains.
- Islands where people traded turtle, dugong and dried fish.
- The spiritual time when ancestral beings created the world.
- The shiny shell that travelled the furthest in ancient trade networks.
- The wetlands where eel farming supported large populations.
- The creature believed to have shaped rivers and waterholes.
- The large river where pearl shell trade routes met.
Down
- The people who mined volcanic stone for axe heads near Melbourne.
- Large gatherings of clans where ceremonies and trade took place.
- Archaeologists discovered grinding stones used to make this food from seeds.
- Wooden sticks sent ahead to announce visits and protect travellers.
- Songs used to remember routes across the land.
- The network of pathways created by the journeys of ancestral beings.
- A mineral used for ceremonial body decoration that was traded widely.
15 Clues: Songs used to remember routes across the land. • The large river where pearl shell trade routes met. • Islands where people traded turtle, dugong and dried fish. • The spiritual time when ancestral beings created the world. • The wetlands where eel farming supported large populations. • The creature believed to have shaped rivers and waterholes. • ...
ACTIVITY #1 2022-02-17
Across
- is used to describe the organization, company or company of American nationality in charge of electronic commerce.
- about the most important technological markets in the world.
- developers have tremendous opportunities to create innovative projects.
- of records within the civil registry system.
Down
- and attributes for understanding a social network and its usefulness.
- support system (BSS) is a group of business elements used in networks.
- information system of functions for the improvement of the process
- of transmission of information in the network related to transactions.
8 Clues: of records within the civil registry system. • about the most important technological markets in the world. • information system of functions for the improvement of the process • and attributes for understanding a social network and its usefulness. • support system (BSS) is a group of business elements used in networks. • ...
IT Words 2016-11-23
Across
- An industry composed of companies that use technology to make financial services
- Extracting information from the data
- Computer technologies that use software to replicate a real environment
- A type of Internet-based computing that provides shared computer processing resources
- An online platform that is used by people to build social networks
Down
- Intelligence exhibited by machines
- Data sets that are so large or complex that traditional data processing applications are inadequate to deal with them
- Internetworking of physical devices embedded with electronics
8 Clues: Intelligence exhibited by machines • Extracting information from the data • Internetworking of physical devices embedded with electronics • An online platform that is used by people to build social networks • Computer technologies that use software to replicate a real environment • An industry composed of companies that use technology to make financial services • ...
Tourism Industry and Hospitality Sector 2023-10-09
Across
- This sector involves accommodation, and F&B outlets
- This sector allows bridging, developing networks, and advertising of the destinations
- A sector that gathers a large number of group/s in one destination such as conventions
Down
- A sector that includes museums, parks, festivals, etc
- Includes government-owned and controlled corporations
- This sector facilitates the movement of people from point A to B
- This sector is composed of workers unions, manpower-management councils, and contractors among others
- A sector that promotes and educates future industry practitioners
8 Clues: This sector involves accommodation, and F&B outlets • A sector that includes museums, parks, festivals, etc • Includes government-owned and controlled corporations • This sector facilitates the movement of people from point A to B • A sector that promotes and educates future industry practitioners • ...
Data Communication 2025-02-11
Across
- Data Communication is the ______ transmission of data from a sender to a receiver
- This type of communication channel is very convenient.
- ____________ is an example of systems that allow data transmission of up to 64Kbps
- _________ is the maximum amount of data that can travel along a communication channel at any given time.
- ______________ signals are not able to use broadcast communication.
Down
- This allows data transmission of up to 64Kbps
- ____________ cables have been used in telephone networks for over 100 yrs
- _________ allows data transmission at over 8 Mbps,
8 Clues: This allows data transmission of up to 64Kbps • This type of communication channel is very convenient. • _________ allows data transmission at over 8 Mbps, • ______________ signals are not able to use broadcast communication. • ____________ cables have been used in telephone networks for over 100 yrs • ...
Database 2025-02-25
Across
- A method of processing transactions as they occur.
- A collection of related fields that represent an entity.
- The structure of data stored in different locations and linked through networks.
- A unique identifier for each record in a database.
Down
- A group of related characters in a database.
- A structure where data is arranged in an upside-down tree-like format.
- The process of collecting data over time and processing it all at once.
- A specialized program used to store and manage large amounts of information.
8 Clues: A group of related characters in a database. • A method of processing transactions as they occur. • A unique identifier for each record in a database. • A collection of related fields that represent an entity. • A structure where data is arranged in an upside-down tree-like format. • The process of collecting data over time and processing it all at once. • ...
