networks Crossword Puzzles
Find Your Dream Job: Chapter 9 2015-10-30
Across
- These people can act as extra eyes and ears
- These personal and professional people can help you with finding your job
- A formal meeting in which one or more people question, consult, or evaluate another person
- A job that you love
- What you should write in to document your responsibilities
Down
- The gestures interviewers notice most
- The minimum number of organizations to research to begin your campaign to get hired
- This person can conduct an interview and choose to hire you
- What you should do in order to find the perfect job for you
- The type of note you should send to the employer after an interview
10 Clues: A job that you love • The gestures interviewers notice most • These people can act as extra eyes and ears • What you should write in to document your responsibilities • This person can conduct an interview and choose to hire you • What you should do in order to find the perfect job for you • The type of note you should send to the employer after an interview • ...
browser by jc 2017-04-20
Across
- term commonly used in computing and electronics
- for electronic mail
- can help you or give u info
- the central processing unit, the “brain” of the computer
- a criminal offense that involves using the Internet or other technology to stalk or harass an individual
Down
- a worldwide collection of computer networks that use the standard Internet Protocol Suite to serve billions of users interconnected by a broad array of electronic
- global network of interdependent information technology infrastructures
- bullying that takes place using electronic technology
- virus a software program that is designed to replicate itself
- Address a unique identifier in the form of a numerical label assigned to each device
10 Clues: for electronic mail • can help you or give u info • term commonly used in computing and electronics • bullying that takes place using electronic technology • the central processing unit, the “brain” of the computer • virus a software program that is designed to replicate itself • global network of interdependent information technology infrastructures • ...
social network 2018-10-09
Across
- share images on a social network
- phone an object which allows speak per message and calls our contact
- an website which alows sends the messages with facebook
Down
- an app which lets you watch movies not sure that youtube and who needs of pay 13 £ per month
- : an application which allows of likes and published of the pictures
- it's something that is shared on social networks and seen by subscribers like youtube
- : an application or we can make flames with your friends
- an application which listens to music on your mobile phone
- an people who take pictures from them
- an application which allows of play on your mobile phone
10 Clues: share images on a social network • an people who take pictures from them • an website which alows sends the messages with facebook • an application which allows of play on your mobile phone • an application which listens to music on your mobile phone • : an application or we can make flames with your friends • ...
TECH CROSSWORD 2015-06-16
Across
- Is a rate of oscillation in the range of around 3 kHz to 300 GHz, which corresponds to the frequency of radio waves
- This code is used to transmit messages privately
- Network device that simply has the mission to make an interconnection between different networks
- is an electrical component that limits or regulates the flow of electrical current in an electronic circuit
- is measure in united called watts
- Al light emitting is a two lead semiconductor light source
Down
- Is an electrically operated siwtch
- this signal is represented by waves
- is a flow of electric charge
- this is a signal represented by 1-0-1-0
10 Clues: is a flow of electric charge • is measure in united called watts • Is an electrically operated siwtch • this signal is represented by waves • this is a signal represented by 1-0-1-0 • This code is used to transmit messages privately • Al light emitting is a two lead semiconductor light source • ...
Vocab words #2 2022-02-14
Across
- adverse or disapproving comments or judgments
- drives,integrated circuits,display screens,cables, modems, speakers, and printers.
- involving the interconnection of information and communications technologies, computer networks, and media content.
- the shaping of a text's meaning by Another text
- building of something, typically a large structure.
Down
- activity concerned with the Processing of raw materials and manufacture of goods in
- how you feel without you having to saying it directly.
- marketing initiatives that focus on Reaching audiences through different types of media Outlets
- draw attention to something or to show what it means
- Markup Language
10 Clues: Markup Language • adverse or disapproving comments or judgments • the shaping of a text's meaning by Another text • building of something, typically a large structure. • draw attention to something or to show what it means • how you feel without you having to saying it directly. • drives,integrated circuits,display screens,cables, modems, speakers, and printers. • ...
Vocab words #2 2022-02-14
Across
- adverse or disapproving comments or judgments
- drives,integrated circuits,display screens,cables, modems, speakers, and printers.
- involving the interconnection of information and communications technologies, computer networks, and media content.
- the shaping of a text's meaning by Another text
- building of something, typically a large structure.
Down
- activity concerned with the Processing of raw materials and manufacture of goods in
- how you feel without you having to saying it directly.
- marketing initiatives that focus on Reaching audiences through different types of media Outlets
- draw attention to something or to show what it means
- Markup Language
10 Clues: Markup Language • adverse or disapproving comments or judgments • the shaping of a text's meaning by Another text • building of something, typically a large structure. • draw attention to something or to show what it means • how you feel without you having to saying it directly. • drives,integrated circuits,display screens,cables, modems, speakers, and printers. • ...
Islam 2022-11-02
Across
- were free to worship Ahura Mazdā without punishment.
- great expansion of Islam both as a political structure and as a religious and intellectual community.
- the art and science of conducting international relations
Down
- who may inherit the wealth of the deceased person
- networks routes that extended throughout much of Europe, Northern Africa, and Asia
- the whole community of Muslims bound together by ties of religion.
- tax A tax paid by non-Muslim populations to their Muslim rulers
- brings people together, creating love, harmony and generosity between them
- the ruler of the Muslim community.
- society tribal and patriarchal, typically composed of extended families that are patrilineal, endogamous, and polygynous
10 Clues: the ruler of the Muslim community. • who may inherit the wealth of the deceased person • were free to worship Ahura Mazdā without punishment. • the art and science of conducting international relations • tax A tax paid by non-Muslim populations to their Muslim rulers • the whole community of Muslims bound together by ties of religion. • ...
School 2022-11-16
Across
- place where some people eat and most cook in it.
- round object that is used for various sports.
- things where people use them almost every day for everything, we can see social networks.
- people who do tricks and hallucinate you, for example, that a bird comes out of a paper
- very famous soccer player who played for barcelona
Down
- thing where people sit to rest, eat...
- which people live inside it, some with their family or pet
- thing where people drive it in the water
- container from which people drink and can be made of plastic
- large four-legged animal that people educate and you can drive
10 Clues: thing where people sit to rest, eat... • thing where people drive it in the water • round object that is used for various sports. • place where some people eat and most cook in it. • very famous soccer player who played for barcelona • which people live inside it, some with their family or pet • container from which people drink and can be made of plastic • ...
Sui Oliver’s crossword week 4 2023-10-25
Across
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- or improve it, or prevent it from getting worse: The superpowers began to intervene in local struggles in Africa
- coming between two things in time, place, character, etc
- stop the continuous progress of (an activity or process)
- act in such a way as to have an effect on each other
Down
- intervene in a situation without invitation or necessity
- an intervening period of time; an interval
- existing or travelling between cities
- existing, occurring, or carried on between nations
- relating to, moving, or situated between two or more galaxies
10 Clues: existing or travelling between cities • an intervening period of time; an interval • existing, occurring, or carried on between nations • act in such a way as to have an effect on each other • intervene in a situation without invitation or necessity • coming between two things in time, place, character, etc • stop the continuous progress of (an activity or process) • ...
FULL STACK SOFTWARE DEVELOPMENT 2023-11-01
Across
- Flask is released under the ___________ Clause.
- function takes up the floating-point number as an argument?
- Python supports the creation of anonymous functions at runtime, using a construct called
- is a built-in function in python
- How can you close a wxpython frame?
Down
- Ops Manager maintains one _____ database for each backed-up replica set.
- WiredTiger can compress collection data using either snappy or zlib compression library.
- stores are used to store information about networks, such as social connections.
- Sharding” a database across many server instances can be achieved with _______________
- describes the guarantee that MongoDB provides when reporting on the success of a write operation
10 Clues: is a built-in function in python • How can you close a wxpython frame? • Flask is released under the ___________ Clause. • function takes up the floating-point number as an argument? • Ops Manager maintains one _____ database for each backed-up replica set. • stores are used to store information about networks, such as social connections. • ...
8 2024-01-31
Across
- Posting excessive, low-quality content across the web solely for SEO gain.
- Engaging in tactics to rapidly acquire links from unrelated or low-quality sites.
- Exploiting cookies to fraudulently generate affiliate commissions or clicks.
Down
- Using software to produce low-quality content for SEO purposes.
- Illegally acquiring control over a domain name to exploit its authority.
- Buying likes, shares, or followers to artificially boost social proof.
- Participating in networks where websites agree to exchange links to manipulate rankings.
- Redirecting users to different web pages without their consent or knowledge.
- Overusing targeted keywords in anchor text to manipulate search rankings.
- Creating complex structures of interlinked websites to manipulate search results.
10 Clues: Using software to produce low-quality content for SEO purposes. • Buying likes, shares, or followers to artificially boost social proof. • Illegally acquiring control over a domain name to exploit its authority. • Overusing targeted keywords in anchor text to manipulate search rankings. • ...
Inventions 2024-01-25
Across
- the global system of interconnected computer networks
- device for speaking to someone in another place
- the glass part of an electric lamp, which gives out light when electricity passes through it.
- an apparatus for receiving radio programmes.
Down
- container which is kept cool inside,so that the food and drink in it stays fresh.
- is a equipment used for printing documents and images
- small, movable device that lets you control a range of things on a computer.
- a device for recording visual images
- oven which cooks food very quickly by electromagnetic radiation rather than by heat.
- is a telecommunication medium for transmitting moving images and sound
10 Clues: a device for recording visual images • an apparatus for receiving radio programmes. • device for speaking to someone in another place • is a equipment used for printing documents and images • the global system of interconnected computer networks • is a telecommunication medium for transmitting moving images and sound • ...
Next_Hop 2019-05-01
Across
- Disadvantages of next hop is ________ reaction and distance vector approach
- iBGP is run in _______ autonomous system(AS)
- ________uses split horizon to prevent routing information loops
- __________ autonomous system(AS) used in eBGP
- For iBGP peers dont need to be ________ connected
- As-path used in ________ to detect loops
Down
- In iBGP, next hop remains _______ when route is advertised to it
- Advantages of next hop is the ________ is added to allow routing access to certain networks only
- __________ routing process happen when deliver the packet to destination but not found the match address
- Next hop is ________ to local router when it is advertised to eBGP peer by default
10 Clues: As-path used in ________ to detect loops • iBGP is run in _______ autonomous system(AS) • __________ autonomous system(AS) used in eBGP • For iBGP peers dont need to be ________ connected • ________uses split horizon to prevent routing information loops • In iBGP, next hop remains _______ when route is advertised to it • ...
Next_Hop 2019-05-01
Across
- Disadvantages of next hop is ________ reaction and distance vector approach
- __________ autonomous system(AS) used in eBGP
- For iBGP peers dont need to be ________ connected
- Advantages of next hop is the ________ is added to allow routing access to certain networks only
- In iBGP, next hop remains _______ when route is advertised to it
- As-path used in ________ to detect loops
Down
- iBGP is run in _______ autonomous system(AS)
- __________ routing process happen when deliver the packet to destination but not found the match address
- ________uses split horizon to prevent routing information loops
- Next hop is ________ to local router when it is advertised to eBGP peer by default
10 Clues: As-path used in ________ to detect loops • iBGP is run in _______ autonomous system(AS) • __________ autonomous system(AS) used in eBGP • For iBGP peers dont need to be ________ connected • ________uses split horizon to prevent routing information loops • In iBGP, next hop remains _______ when route is advertised to it • ...
Network Theory 2019-11-26
Across
- Symmetric and asymmetric are considered what?
- It is an optimization which refers to a topic that consist of finding an optimal object from a finite set of objevts.
- This illustration a=b refers to a ___ relation.
- A theory refers to ___ of things in different fields.
- It is where edges are connected to.
Down
- It is also referred to as networks.
- It involves finding an optimal object from a finite set of objects.
- This illustration a>b refers to an ___ relation.
- A theory which refers to the study of graphs as a representation or relations between objects.
- It refers to a limited or infinite set of objects.
10 Clues: It is also referred to as networks. • It is where edges are connected to. • Symmetric and asymmetric are considered what? • This illustration a=b refers to a ___ relation. • This illustration a>b refers to an ___ relation. • It refers to a limited or infinite set of objects. • A theory refers to ___ of things in different fields. • ...
Technology 2024-06-06
Across
- websites and applications that enable users to create and share content or to participate in social networking
- seeks to improve existing products
- the application of scientific knowledge for practical purposes, especially in industry
- circular object that revolves on an axle
- a global navigation satellite system that provides location, velocity and time synchronization
Down
- type of technology that significantly alters the way that consumers, industries, or businesses operate
- bulb this piece of technology made it possible to work and live outside of natural daylight hours
- intelligence exhibited by machines
- technology based on biology
- an electronic communications network that connects computer networks and organizational computer facilities around the world
10 Clues: technology based on biology • intelligence exhibited by machines • seeks to improve existing products • circular object that revolves on an axle • the application of scientific knowledge for practical purposes, especially in industry • a global navigation satellite system that provides location, velocity and time synchronization • ...
Test CW 2025-05-25
Across
- The process of forecasting outcomes based on AI models.
- A model inspired by the human brain, used for deep learning tasks.
- A type of machine learning using layered neural networks.
- A set of rules or steps used by machines to solve problems or make decisions.
- AI field that enables machines to interpret visual information.
Down
- AI technique where systems learn from data to improve over time.
- The AI field focused on understanding and generating human language.
- Feeding data to an AI model so it learns patterns and behaviors.
- A program that simulates conversation using AI.
- Using AI to perform tasks without human intervention.
10 Clues: A program that simulates conversation using AI. • Using AI to perform tasks without human intervention. • The process of forecasting outcomes based on AI models. • A type of machine learning using layered neural networks. • AI field that enables machines to interpret visual information. • AI technique where systems learn from data to improve over time. • ...
Industry4.0Tech 2025-02-02
Across
- An interactive experience that enhances the real world with computer-generated information
- An ecosystem of devices, sensors,applications, and networks that collect, monitor,and analyze industrial data.
- A computer-controlled process that creates three-dimensional objects by depositing materials in layers
- Computer-based models used for decisionmaking and training
- A gene-editing tool
Down
- Smart systems that integrate physical and computational components
- Delivery of different computing services through the internet
- The use of advanced computing technologies on huge data sets to find correlations
- A computer-generated environment with realistic scenes and objects
- the integration of intelligent digital technologies into manufacturing and industrial processes
10 Clues: A gene-editing tool • Computer-based models used for decisionmaking and training • Smart systems that integrate physical and computational components • Delivery of different computing services through the internet • A computer-generated environment with realistic scenes and objects • ...
Assessing a Country as a Market 2025-02-17
Across
- - A country where businesses sell their goods and services.
- - A type of stability that affects investment and market security.
- - The transport and communication networks in a country.
- - A measure of how simple it is for businesses to operate in a country.
- - A tax on imported goods that can make market entry harder.
- - The type of income left after paying for necessities.
Down
- - The rate at which one currency can be converted into another.
- - When businesses commit money to expand in a foreign country.
- - A key factor ensuring a country's government and policies are predictable.
- - The exchange of goods and services between different countries.
10 Clues: - The type of income left after paying for necessities. • - The transport and communication networks in a country. • - A country where businesses sell their goods and services. • - A tax on imported goods that can make market entry harder. • - When businesses commit money to expand in a foreign country. • ...
IT 2025-02-25
Across
- A network device that directs data between different networks.
- A large-scale network that spans cities, countries, or even continents.
- A type of cable that transmits high-definition video and audio signals.
- A type of data transmission that uses cables.
- A network that covers a small area, like a home or office.
- A wireless technology that allows devices to connect over short distances.
- A universal connector used for connecting peripherals like keyboards, mice, and printers.
Down
- A wired connection that transmits high-speed internet using twisted pair cables.
- A standard used for wireless internet connections.
- A connection that does not require physical cables, using radio waves.
10 Clues: A type of data transmission that uses cables. • A standard used for wireless internet connections. • A network that covers a small area, like a home or office. • A network device that directs data between different networks. • A connection that does not require physical cables, using radio waves. • ...
Vocabulary Quiz 2024-11-06
Across
- A temporary alliance of different political groups formed to achieve a common goal.
- The basic physical systems of a country or region, such as transportation and communication networks, utilities, and public institutions.
- A shortfall, especially in finances, where expenses exceed income.
- A refutation or contradiction of an argument.
- An official inspection of an individual's or organization's accounts.
- Not biased or affiliated with a specific political party.
Down
- A law enacted by a local governing body, such as a city council.
- The act of supervising or monitoring something.
- Relating to government revenue, especially taxes and public spending.
- The tendency of a convicted criminal to reoffend.
10 Clues: A refutation or contradiction of an argument. • The act of supervising or monitoring something. • The tendency of a convicted criminal to reoffend. • Not biased or affiliated with a specific political party. • A law enacted by a local governing body, such as a city council. • A shortfall, especially in finances, where expenses exceed income. • ...
Dewey's Network Review Crossword 2024-10-22
Across
- A network that provides connectivity to wireless devices within a limited geographic area
- operating by means of transmitted electromagnetic waves
- a network of multiple devices in a limited geographical area
- Small Office and Home Office Networks that are typically Local Area setups
- a group of computers communication devices that share a common communications line
- a set of rules for how data is transmitted between devices in the same network
Down
- a large network of information that is not tied to a single location.
- an open wireless technology standard for transmitting data over short distances
- a group or system of interconnected devices
- a global computer network
10 Clues: a global computer network • a group or system of interconnected devices • operating by means of transmitted electromagnetic waves • a network of multiple devices in a limited geographical area • a large network of information that is not tied to a single location. • Small Office and Home Office Networks that are typically Local Area setups • ...
GRID-GENIUS 3 2024-11-26
Across
- An error that occurs when a calculation exceeds the storage capacity.
- A condition where excessive paging reduces system performance.
- A step-by-step procedure for solving a problem or performing a task.
- The practice of protecting systems, networks, and programs from digital attacks.
- A linear data structure that follows the First-In-First-Out (FIFO) principle.
- A device or software that distributes network traffic across multiple servers.
Down
- The study of meaning in programming languages.
- A network security device that monitors and controls incoming and outgoing traffic.
- Non-volatile memory used to store firmware.
- A sequence of characters used as a unit in parsing.
10 Clues: Non-volatile memory used to store firmware. • The study of meaning in programming languages. • A sequence of characters used as a unit in parsing. • A condition where excessive paging reduces system performance. • A step-by-step procedure for solving a problem or performing a task. • An error that occurs when a calculation exceeds the storage capacity. • ...
cyb 2024-12-05
Across
- A network that encrypts your internet connection
- This type of Wi-Fi should be used cautiously
- An extra layer of security requiring two or more verification methods
- The practice of protecting systems, networks, and programs from digital attacks
- A program that detects and removes malicious software
Down
- A malicious software designed to harm or exploit any programmable device
- The process of converting information or data into a code to prevent unauthorized access
- Software updates often include these to fix security vulnerabilities
- A mix of letters, numbers, and special characters makes a strong one
- A type of cyber attack that tricks individuals into providing sensitive information
10 Clues: This type of Wi-Fi should be used cautiously • A network that encrypts your internet connection • A program that detects and removes malicious software • Software updates often include these to fix security vulnerabilities • A mix of letters, numbers, and special characters makes a strong one • An extra layer of security requiring two or more verification methods • ...
ICT terminology 2013-09-03
Across
- junk e-mail or irrelevant postings to a newsgroup or bulletin board.
- World Wide Web
- index millions of sites on the Web, so that Web surfers like you and me can easily find Web sites with the information we want
- the ebodiment of a person or a idea
- a key to make sure you are a human
- spreads across the globe and consists of countless networks and computers, allowing millions of people to share information
- a marker for a Web site
- Information Communication Technology
- to store a program or data on a storage device such as a disk
- Uniform Resource Locator
Down
- a mobile phone that includes advanced functionality beyond making phone calls and sending text messages.
- Wireless Fidelity
- Uniform Resource Locator
- to store a program or data on a storage device such as a disk
- collection of Internet-based communities that allow users to interact with each other online.
- the primary user interface of a computer
- short for web log
- the program people use to access the World Wide Web
- a computer screen or display
19 Clues: World Wide Web • Wireless Fidelity • short for web log • a marker for a Web site • Uniform Resource Locator • Uniform Resource Locator • a computer screen or display • a key to make sure you are a human • the ebodiment of a person or a idea • Information Communication Technology • the primary user interface of a computer • the program people use to access the World Wide Web • ...
Fungi 2017-04-22
Across
- Organisms that live between and within plant cells
- Mutualistic partnership usually between a species of ascomycete and either a cyanobacterium or an alga
- The kind of relationship that benefits both species
- Fungi along with roots
- Occurs when the nuclei fuse to form a diploid zyote
- The kind of relationship fungi and land plants have
- Most fungi reproduce sexually as well as
Down
- A relationship were only one species benefits at the expense of the other
- Fungi that live in close association with plant roots
- The enzyme fungi use to break down cellulose
- A key trait linking animals to fungi
- Are fungi that make their living by digesting dead plant material
- The lack of septa entirely
- Eukaryotes that grow as single cells or as large, branching networks of multicellular filaments
- When one species benefits while the other is unaffected
- Number of spores a basidia produces
- Long, narrow, frequently branching filaments, making up a mycelium
17 Clues: Fungi along with roots • The lack of septa entirely • Number of spores a basidia produces • A key trait linking animals to fungi • Most fungi reproduce sexually as well as • The enzyme fungi use to break down cellulose • Organisms that live between and within plant cells • The kind of relationship that benefits both species • ...
INTERNET 2020-10-19
Across
- way of accesing information over the medium of the Internet
- data traffic carried over transcontinental high-speed infrastructure
- sponsored links, for which advertisers have paid in order to be liste
- fist stage of the evolution of IT
- tool that allows someone to log on to one computer system while doing work on another
- provides firms with secure and encrypted communications at an afordable cost
- dictate how the computers should communicate with each other
- Switching sending messages into parcels
- sell temporary connections to retail subscribers
Down
- server process and deliver web pages to the users
- most popular search engine
- creates dynamic links to other Web pages, pictures and documents
- large system of interconnected computer networks that link all types of devices from all over the world
- process that improves the quality and volume of Web traffic to a Web site
- Helps computers send and receive data
- facilities for managing the delivery of voice information using the Internet Protocol
- request-respons protocol between client and server
17 Clues: most popular search engine • fist stage of the evolution of IT • Helps computers send and receive data • Switching sending messages into parcels • sell temporary connections to retail subscribers • server process and deliver web pages to the users • request-respons protocol between client and server • way of accesing information over the medium of the Internet • ...
Cyber Safety 2024-01-25
Across
- make a fake profile to pretend to be someone else
- texts that go back and forth between people that are angry, insulting, or hurtful
- where I ___ is personal information that I should NOT share
- for your use and no one else's
- a person or people that are looking for someone to hurt or use
- an example of personal information that I should NOT share is __
- you know that person will be honest
Down
- information that describes you
- being protected from danger
- one way for me to access the internet is my ___ system
- a plan to trick people so they can steal from or hurt others
- an example of personal information that I can share is my favorite ___
- a feeling that someone is being dishonest or doing something wrong
- sharing private information is not ___
- bothering or pressuring a person over and over
- relating to computers or computer networks; internet
- using the phone to send sexual pictures or messages
17 Clues: being protected from danger • information that describes you • for your use and no one else's • you know that person will be honest • sharing private information is not ___ • bothering or pressuring a person over and over • make a fake profile to pretend to be someone else • using the phone to send sexual pictures or messages • ...
IG18 2024-11-18
Across
- what project only uses the XS010G for all packages?
- What is the return charge on an Eero Pro6E?
- what was the first gen routers?
- what is it called when many people are using the same line of internet connection?
- what is Fibrus flagship package?
- what type of wifi technolgy does the eero PRO 6E use?
- what makes a person eligible for full fibre essential?
- what happens if there is no payment made within the first 10 days?
Down
- what do you use for billing?
- What is the return charge on an Eero6+?
- What is the name of our VOIP service?
- what is it called when you need legal permission to work on private land?
- What is the name given to our old equipment?
- A system of interconnected computers on networks is considered to be what?
- how many days to allow equipment collection?
- what will customers not receive their invoice on?
- time delay or how long it takes data to travel is called?
17 Clues: what do you use for billing? • what was the first gen routers? • what is Fibrus flagship package? • What is the name of our VOIP service? • What is the return charge on an Eero6+? • What is the return charge on an Eero Pro6E? • What is the name given to our old equipment? • how many days to allow equipment collection? • what will customers not receive their invoice on? • ...
hardware words 2022-10-03
Across
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.
- a device for making and breaking the connection in an electric circuit.
- A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
- In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A web service is either: a service offered by an electronic device to another electronic device, communicating with each other via the Internet
- We define WAN, or wide-area network as a computer network that connects smaller networks.
Down
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
- A mesh network is a network in which devices or nodes are linked together, branching off other devices or nodes.
- A wireless access point (WAP) is a hardware device or configured node on a local area network (LAN) that allows wireless capable devices and wired networks to connect through a wireless standard, including Wi-Fi or Bluetooth. WAPs feature radio transmitters and antennae, which facilitate connectivity between devices and the Internet or a network.
- A local area network (LAN) consists of a series of computers linked together to form a network in a circumscribed location ( commonly in esports).
- A star network is a local area network (LAN) topology in which all nodes -- personal computers (PCs), workstations or other devices -- are directly connected to a common central computer that is often referred to as a hub.
11 Clues: a device for making and breaking the connection in an electric circuit. • We define WAN, or wide-area network as a computer network that connects smaller networks. • a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc. • ...
AI in 2024 2024-02-08
Across
- it involves using statistical algorithms and machine learning techniques to analyze current and historical facts to make predictions about future events.
- they are vehicles equipped with AI and sensors to navigate and operate without human intervention. They use machine learning for tasks like object detection and decision-making.
- they are a type of neural network designed to work with graph-structured data. They are used in applications where relationships between data points are crucial.
- it is a branch of AI that focuses on the interaction between computers and humans through natural language. It enables machines to understand, interpret, and generate human-like language.
- it is a type of deep neural network designed for visual processing, particularly for tasks like image recognition. It uses convolutional layers to detect patterns and features.
Down
- it is an AI application that uses algorithms to identify and verify individuals based on their facial features. It is widely used for security and access control.
- it is a subset of AI that involves the use of algorithms to enable machines to learn from data and make predictions or decisions without explicit programming.
- it is a type of Machine Learning that involves neural networks with multiple layers (deep neural networks) to learn and make sense of complex patterns in data.
- it involves the design, construction, operation, and use of robots, often powered by AI. AI in robotics enables robots to perform tasks autonomously or with minimal human guidance.
- it refers to machine-displayed intelligence that simulates human behavior or thinking and can be trained to solve specific problems. It combines Machine Learning techniques and Deep Learning.
10 Clues: it involves using statistical algorithms and machine learning techniques to analyze current and historical facts to make predictions about future events. • it is a subset of AI that involves the use of algorithms to enable machines to learn from data and make predictions or decisions without explicit programming. • ...
Wellness-Body Basics 2021-12-22
Across
- stress that lasts for a longer period of time (2 words)
- final stage in the grief process
- something causing stress to an organism
- Complex set of characteristics that makes you unique
- The capacity to understand or feel what another person is experiencing from within their frame of reference
- A state of well-being (2 words)
- The study of how your behaviors and environment can cause changes that affect the way your genes work
- Complex network that coordinates all the activities in your body (2 words)
- short-term stress that goes away quickly (2 words)
Down
- Mental processes that protect individuals from strong or stressful emotions/situations (2 words)
- hormone associated with "fight or flight"
- second stage in the grief process
- Signals that tell your mind and body how to react
- there are ____ stages in the grief process
- "good stress"
- The ability of neural networks in the brain to change through growth and reorganization
- a feeling of emotional or physical tension
17 Clues: "good stress" • A state of well-being (2 words) • final stage in the grief process • second stage in the grief process • something causing stress to an organism • hormone associated with "fight or flight" • there are ____ stages in the grief process • a feeling of emotional or physical tension • Signals that tell your mind and body how to react • ...
Wellness-Mental Health 2021-12-22
Across
- stress that lasts for a longer period of time (2 words)
- final stage in the grief process
- something causing stress to an organism
- Complex set of characteristics that makes you unique
- The capacity to understand or feel what another person is experiencing from within their frame of reference
- A state of well-being (2 words)
- The study of how your behaviors and environment can cause changes that affect the way your genes work
- Complex network that coordinates all the activities in your body (2 words)
- short-term stress that goes away quickly (2 words)
Down
- Mental processes that protect individuals from strong or stressful emotions/situations (2 words)
- hormone associated with "fight or flight"
- second stage in the grief process
- Signals that tell your mind and body how to react
- there are ____ stages in the grief process
- "good stress"
- The ability of neural networks in the brain to change through growth and reorganization
- a feeling of emotional or physical tension
17 Clues: "good stress" • A state of well-being (2 words) • final stage in the grief process • second stage in the grief process • something causing stress to an organism • hormone associated with "fight or flight" • there are ____ stages in the grief process • a feeling of emotional or physical tension • Signals that tell your mind and body how to react • ...
COSC 100-Lessons 1-9 2016-02-22
Across
- A group of information on a computer that can be software programs or data
- How many steps were there for the WebTools assignment?
- In section 2, we looked up the latitude and this to locate our IP address
- Who shall share computing resources in an ethical & fair manner
- Links should be color coordinated, identifiable and
- No more than this many images from one artist or photographer
- Files that can be embedded in web pages & displayed by a browser
- Another name for promotional writing
- Where are the Scripps Network headquarters?
- Web pages are built from instructions of this
Down
- Main technology for local area networks
- Each computer connected to the Internet is given a unique address called this
- How many data analysts are on the Scripps team?
- Where are the choices for WebTools posted?
- Use this to create an HTML page
- This may result in termination of access according to UT policy
- No more than this many seconds of the music/lyrics from an individual musical work
17 Clues: Use this to create an HTML page • Another name for promotional writing • Main technology for local area networks • Where are the choices for WebTools posted? • Where are the Scripps Network headquarters? • Web pages are built from instructions of this • How many data analysts are on the Scripps team? • Links should be color coordinated, identifiable and • ...
Networking 2016-10-14
Across
- Smart repeater that only sends network data to its destination host.
- Main protocol that currently dominates the networking world.
- Type of cable most commonly used for Ethernet networks (UTP).
- Data passing through a network is split into chunks called ________.
- Device used so computers can talk to other computers outside their local network.
- 48-bit long binary number that unique defines a network card
- Command we use to obtain network information on our computer.
- Network cable that consists of a central core surrounded by insulation.
Down
- Any computer that shares a resource (e.g. printer, files)
- Set of rules to ensure source and destination understand the data transmitted.
- Numbering system used when we refer to MAC addresses.
- Any computing device connected to a network.
- Device that repeats all data transmitted within a network
- Anything that can be shared.
- Network topology where all hosts connect to a central box.
- Uses light instead of electricity to transmit signals across a network.
- We refer to our own computer as a __________ host.
17 Clues: Anything that can be shared. • Any computing device connected to a network. • We refer to our own computer as a __________ host. • Numbering system used when we refer to MAC addresses. • Any computer that shares a resource (e.g. printer, files) • Device that repeats all data transmitted within a network • Network topology where all hosts connect to a central box. • ...
Networking 2016-10-14
Across
- Smart repeater that only sends network data to its destination host.
- Numbering system used when we refer to MAC addresses.
- Device used so computers can talk to other computers outside their local network.
- Anything that can be shared.
- Any computer that shares a resource (e.g. printer, files)
- Command we use to obtain network information on our computer.
- 48-bit long binary number that uniquely refers to a network card
- We refer to our own computer as a __________ host.
- Network topology where all hosts connect to a central box.
Down
- Any computing device connected to a network.
- Type of cable most commonly used for Ethernet networks (UTP).
- Uses light instead of electricity to transmit signals across a network.
- Data passing through a network is split into chunks called ________.
- Device that repeats all data transmitted within a network
- Main protocol that currently dominates the networking world.
- Network cable that consists of a central core surrounded by insulation.
- Set of rules to ensure source and destination understand the data transmitted.
17 Clues: Anything that can be shared. • Any computing device connected to a network. • We refer to our own computer as a __________ host. • Numbering system used when we refer to MAC addresses. • Device that repeats all data transmitted within a network • Any computer that shares a resource (e.g. printer, files) • Network topology where all hosts connect to a central box. • ...
Networking 2016-10-14
Across
- Any computer that shares a resource (e.g. printer, files)
- Device that repeats all data transmitted within a network
- Data passing through a network is split into chunks called ________.
- Network cable that consists of a central core surrounded by insulation.
- Command we use to obtain network information on our computer.
- We refer to our own computer as a __________ host.
- Numbering system used when we refer to MAC addresses.
- Any computing device connected to a network.
- Main protocol that currently dominates the networking world.
Down
- Set of rules to ensure source and destination understand the data transmitted.
- Type of cable most commonly used for Ethernet networks (UTP).
- Anything that can be shared.
- Smart repeater that only sends network data to its destination host.
- Network topology where all hosts connect to a central box.
- Uses light instead of electricity to transmit signals across a network.
- 48-bit long binary number that uniquely refers to a network card
- Device used so computers can talk to other computers outside their local network.
17 Clues: Anything that can be shared. • Any computing device connected to a network. • We refer to our own computer as a __________ host. • Numbering system used when we refer to MAC addresses. • Any computer that shares a resource (e.g. printer, files) • Device that repeats all data transmitted within a network • Network topology where all hosts connect to a central box. • ...
Technology Terms 2012-03-27
Across
- This is a hardware device that is used to network multiple computers together.
- Many wide area networks span long distances via telephone lines, fiber-optic cables, or satellite links. Stands for "Wide Area Network."
- used to network multiple computers together.
- one instance of a BitTorrent client running on a computer on the Internet to which other clients connect and transfer data.
- Based on the electric-field transmission medium, is an IBM technology that allows individuals to exchange data with a simple touch or grasp, such as a handshake.
- refers to the main network lines that connect several local area networks (LANs) together
- This is a hardware device that routes data (hence the name) from a local area network (LAN) to another network connection.
- In the computer world, servers have _______.
- a type of connector commonly used for Ethernet networking.
- limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
- a public/private access point for access to the internet.
- the distance that the wifi signal can transmit data
Down
- Each _____ inside a computer consists of set of wires that allow data to be passed back and forth. They have a certain speed, measured in megahertz, which determines how fast the data can travel.
- this is the card that physically makes the connection between the computer and the network cable; Stands for "Network Interface Card
- networking technology that allows computers and other devices to communicate over a wireless signal.
- the layout scheme that describes the way in which the network computers are wired/connected together
- the most common type of connection computers use in a local area network (LAN).
- Any system or device connected to a network
- how much data you can send through a network or modem connection
- an industry standard of transmission of data which transmits 1000 megabits a second; several products are made to use to transmit using CAT5; referred to most commonly when talking about cables though
- A network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network
- a computer that provides data to other computers.
- is a computer network limited to a small area such as an office building, university, or even a residential home. Stands for "Local Area Network
23 Clues: Any system or device connected to a network • used to network multiple computers together. • In the computer world, servers have _______. • a computer that provides data to other computers. • the distance that the wifi signal can transmit data • a public/private access point for access to the internet. • a type of connector commonly used for Ethernet networking. • ...
Networking 2015-01-25
Across
- A set of tools and procedures provided by the programmer of an application so that other programmers can control, exchange data with, or extend the functionality of an application.
- n a network packet or frame, a section of data that describes the data that immediately follows.
- A reliable Transport Layer Protocol for managing IP that supports re-transmission, sequencing and fragmentation.
- Sequence of messages exchanged between two or more network devices to ensure transmission synchronization.
- American National Standards Institute.
- A set of rules and decision structures for actions in a specifically defined set of circumstances.
- A non-encrypted process to access a remote computer system, often a Unix system, over the network.
- The basic unit of data representation in digital computers.
- A loss in the amplitude or strength of a signal due to an interaction with the signal's media. Generally expressed in decibels.
- IEEE 802.3 interface between an MAU and a NIC (network interface card). Also called transceiver.
- An unusual instance or circumstance.
- An abrupt termination or computing activity caused by an error. Inmany instances, the computer becomes completely unusable and must be restarted before activity can resume.
- UC Berkeley's distribution of the Unix operating system.
Down
- A TCP/IP router that routes packetsbetween different network numbers.
- A group of 8 bits
- The protocol for mapping IP addresses to physical addresses such as Ethernet or Token Ring.
- Seven layer of the OSI reference model. This layer provides services to application processes (such as electronic mail, file transfer, and terminal emulation) that are outside of the OSI model.
- An information transmission that is intended to be interpreted by all entities capable of receiving it.
- Router or access server, or several routers or access servers, designated as a buffer between any connected public networks and a private network. It uses access lists and other methods to ensure the security of the private network.
- Available bit rate. QOS class defined by the ATM Forum for ATM networks. Also used in OSPF to define a certain type of border router.
- The standard TCP/IP naming service that links network names with IP addresses.
- Classless interdomain routing. Technique supported by BGP4 and based on route aggregation.
- A group of memory locations set aside for temporary storage ofdata, especially frequently-used data or data needing high speedretrieval
- In Ethernet, the result of two nodes transmitting simultaneously. The frames from each device impact and are damaged when they meet on the physical media.
- IBM's implementation of Unix.
25 Clues: A group of 8 bits • IBM's implementation of Unix. • An unusual instance or circumstance. • American National Standards Institute. • UC Berkeley's distribution of the Unix operating system. • The basic unit of data representation in digital computers. • A TCP/IP router that routes packetsbetween different network numbers. • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- Avoid sending personal information via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- A string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _ _ _ _ your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media Websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Avoid sending personal information via • Always _ _ _ _ your computer when you leave your desk • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Communications Lesson 1 - 4 Key Terms 2022-03-23
Across
- used to divide page text into small sections using headings, subheadings, lists, short sentences and short paragraphs
- is any information that can be used to identify you in real life or give any access to your money or family
- consists of servers
- is a very large network of networks, it is essentially hardware machines and data.
- is a system of tools and services that enable us to access the information on the Internet.
- connect data resources together, enabling users to browse from page to page
- each domain name the letters on the far right indicate the domain category for the Web site
- store information accessed by various clients.
- some of the tools that can e used to create an advanced search which will narrow your results, examples words like and, or, and not.
- are easy to remember word-based names, called domain names
- the protocol that allows your device to communicate with other devices on the internet
- keeps the Web page from looking too busy and makes them easier to read and scan for information
- a global collection of electronic documents
- upside-down structure for journalism which places the most important information first
Down
- is a set of rules you must follow in order to use a Web site or Internet service.
- helps search engines find and rank your Web pages in users’ search results
- is a software application that enables your computer to retrieve an display Web pages.
- a network uses radio signals to provide Internet connection to wireless computers and devices. Wireless Fidelity
- end user’s computer
- the unique addresses for resources on the Web.
- internet protocol address consists of a series of numbers much like a phone number
- servers accessed by people from any location that has an internet connection
- includes images as well as text
- is a computer program that indexes millions of sites on the Web so that users can easily find Web sites with the information they want
- is a useful technique for creating and arranging online information
- a device used to connect other devices such as telephone to networks
- performs the translation of the IP address to domain names
- the smaller pieces of data that is reassembled on the receiving side
- servers used to access web addresses you want to visit
29 Clues: end user’s computer • consists of servers • includes images as well as text • a global collection of electronic documents • the unique addresses for resources on the Web. • store information accessed by various clients. • servers used to access web addresses you want to visit • performs the translation of the IP address to domain names • ...
Week One 2016-04-21
5 Clues: exploitation • software that has a nefarious purpose • attacks by an individual or even a small group of attackers • individuals who do not have the technical expertise to develop scripts • act of deliberately accessing computer systems and networks without authorization
034.04 - Types of Computer Networks 2024-10-10
5 Clues: a system of interconnected computers or devices • the physical and logical arrangement of a network • a global system of interconnected computer networks • the process of encoding information to prevent unauthorized access • a wireless technology standard for exchanging data over short distances
Empathy Constrained 2018-04-17
Across
- 120s of this while participants were looking at a white screen
- the amount of seconds each action was performed by three different actors
- the group in which one does not identify with
- the city in Canada where the participants were from
- the ingroup condition within the experiment
- prejudice in favor of or against one thing, person, or group
- predicted that participants will show less of this in response to outgroup members
- the mechanism through which people understand other's actions, intentions, and emotions
- the ability to understand and share the feelings of another
- type of recordings used to compare brain activity
Down
- this was a material used to measure modern racism
- amount of total conditions in the study
- researchers predicted the least perception action coupling when observing this particular group
- final sample size used
- the group in which one identifies with
- the system of neurons building the shared networks
- unfavorable opinion or feeling formed beforehand or without knowledge, thought, or reason
17 Clues: final sample size used • the group in which one identifies with • amount of total conditions in the study • the ingroup condition within the experiment • the group in which one does not identify with • this was a material used to measure modern racism • type of recordings used to compare brain activity • the system of neurons building the shared networks • ...
Holland and Barrett Training- Module 4 Biology 2014-09-11
Across
- It excretes CO2 and water
- Cells involved in touch reception.
- A system which rids the body of waste, controls fluids and maintains the PH of blood.
- It's a reservoir for urine.
- Two outer layers of skin
- Found in the epidermis and produce keratin, which gives skin its elasticity, strength, and makes it waterproof.
- Cells that produce antigens and help the immune system.
- Therapeutic patches deliver their drugs through networks of these in the skin.
Down
- It carries urine from the kidneys to the bladder.
- Found in the epidermis and produce melanin which gives skin its colour.
- It helps carry urine from the bladder to the outside, and is much shorter on women than men.
- Two inner layers of skin
- An organ which filters blood, removes waste and excretes urine.
- Water is lost through sweat and this.
- Contains adipose, blood vessels, lymph vessels, and the base of your hair follicles and sweat glands.
- Excretes waste through sweat and makes up 12-15% of bodyweight.
- Excretes bile pigment.
17 Clues: Excretes bile pigment. • Two inner layers of skin • Two outer layers of skin • It excretes CO2 and water • It's a reservoir for urine. • Cells involved in touch reception. • Water is lost through sweat and this. • It carries urine from the kidneys to the bladder. • Cells that produce antigens and help the immune system. • ...
Adelaida's Crossword 2024-01-18
Across
- the level of comfort in which people live, which usually depends on how much money they have
- transport on a ship
- taking a lot or too much time
- a heavy thing that is being carried or is about to be carried
- a large system consisting on many similar parts that are connected together to allow movement of communication
- deal successfully with a problem
- vapour
- find or produce an answer, money, etc
- having the ability, power or qualities to be able to do something
Down
- a mark of line of marks left by a person, animal or vehicle in passing
- travel between places that are far apart
- continue without stopping, go on longer than is expected
- something that moves or operates very quickly
- arrive at, get as far as
- place or build something in position
- possibility of danger, failure or loss
- jump onto something or join something quickly
17 Clues: vapour • transport on a ship • arrive at, get as far as • taking a lot or too much time • deal successfully with a problem • place or build something in position • find or produce an answer, money, etc • possibility of danger, failure or loss • travel between places that are far apart • something that moves or operates very quickly • ...
Computer Basics 2019-09-16
Across
- Occurs when a user presses a button on a mouse which in turn, generates a command to the computer
- The physical parts of a computer
- A small picture usually representing program or file
- A document that is usually named and saved in a folder
- Presentation Program
- Central processing unit; the brain of the computer; controls the other elements of the computer
- Device that converts output from a computer into a printed image
- Spreadsheet program
- Uniform resource locator; the address of a site on the World Wide Web
- A program used to view the Internet, such as Google Chrome or Internet Explorer
Down
- A device used to display information visually
- Used to input data by pressing keys
- A network of computers connected through the World Wide Web
- Device used to select items and place insertion point on the screen
- A collection of computer files organized and saved together
- Transferring data from another computer to your computer
- Harmful computer program designed to destroy or corrupt networks
17 Clues: Spreadsheet program • Presentation Program • The physical parts of a computer • Used to input data by pressing keys • A device used to display information visually • A small picture usually representing program or file • A document that is usually named and saved in a folder • Transferring data from another computer to your computer • ...
CS Principles Review Puzzle 2024-04-29
Across
- A combination of sequencing, selection, and iteration
- Changing the r value of a pixel to hide a message, say
- ____ cipher. A method of encryption which scrambles the positions of characters
- Compression algorithm that permanently loses data
- A 12-digit hexadecimal number assigned to each device connected to the network
- A data type storing a list of discrete information
- Networking technology to plug a computer to a local area network
- Material created on a computer is the ____ property of its creator/organization
- Digital _____. When some countries have less access to tech
Down
- An algorithm used to reduce the size of a file
- Algorithms with polynomial complexity run in ___ time
- ___ access points are used to give unauthorized access to secure networks
- Cryptography that employs different keys for encryption and deciphering
- Computing done by multiple processors on a single computer
- Data about data
- Protocol for sending packets over the internet
- Giving others rights to use your work (2)
17 Clues: Data about data • Giving others rights to use your work (2) • An algorithm used to reduce the size of a file • Protocol for sending packets over the internet • Compression algorithm that permanently loses data • A data type storing a list of discrete information • A combination of sequencing, selection, and iteration • ...
Networking concept and Cyber ethics Crossword Puzzle 2025-06-03
Across
- connects different devices in a network physically
- It protects the computer network from any unauthorised access
- all devices connect to a single cable
- Connects different networks
- It refers to criminal activities
- Malicious software
- It refers to being aware of ethical practices
Down
- Its configuration is simple
- It is an act of using or imitating the language and style of others work as one's original work
- a combination of letters,alphabets and symbols
- converts digital signals into analog signals and vice versa
- a computer connected to the network
- a group of computers and other peripheral devices that are connected to share data and resources
- It is a right that is granted to the creator for his/her original work that is valid for 20 years
- They are highly technical people who break into computer systems to obtain financial details
- converts data into an unreadable form
- a computer network that connects devices within a small area
17 Clues: Malicious software • Its configuration is simple • Connects different networks • It refers to criminal activities • a computer connected to the network • all devices connect to a single cable • converts data into an unreadable form • It refers to being aware of ethical practices • a combination of letters,alphabets and symbols • ...
Cryptic Chamber Challenge 1 2023-05-08
Across
- A robot that performs tasks in a repetitive way.
- Automated machines used in manufacturing
- A type of machine learning that uses neural networks .
- A type of robot that resembles a human being .
- A small computer that can be embedded in devices.
- A technology used to simulate the behavior of large systems, such as economies or ecosystems.
- A type of machine learning that can learn from past experiences.
- A robot that can navigate and perform tasks autonomously .
Down
- A technology used to create realistic simulations.
- A type of robot that can move and operate on four legs .
- A type of robot that can be controlled by a human operator.
- A type of robot used in military operations
- Type of programming language used in robotics.
- A type of AI that can make decisions based on incomplete or uncertain information .
- Artificial intelligence developed by Google
- A technology used to create 3D models.
- A type of computer memory that is faster than RAM .
17 Clues: A technology used to create 3D models. • Automated machines used in manufacturing • A type of robot used in military operations • Artificial intelligence developed by Google • Type of programming language used in robotics. • A type of robot that resembles a human being . • A robot that performs tasks in a repetitive way. • ...
Communications Lesson 1 - 4 Key Terms 2022-03-21
Across
- used to divide page text into small sections using headings, subheadings, lists, short sentences and short paragraphs
- is any information that can be used to identify you in real life or give any access to your money or family
- consists of servers
- is a very large network of networks, it is essentially hardware machines and data.
- is a system of tools and services that enable us to access the information on the Internet.
- connect data resources together, enabling users to browse from page to page
- each domain name the letters on the far right indicate the domain category for the Web site
- store information accessed by various clients.
- some of the tools that can e used to create an advanced search which will narrow your results, examples words like and, or, and not.
- are easy to remember word-based names, called domain names
- the protocol that allows your device to communicate with other devices on the internet
- keeps the Web page from looking too busy and makes them easier to read and scan for information
- a global collection of electronic documents
- upside-down structure for journalism which places the most important information first
Down
- is a set of rules you must follow in order to use a Web site or Internet service.
- helps search engines find and rank your Web pages in users’ search results
- is a software application that enables your computer to retrieve an display Web pages.
- a network uses radio signals to provide Internet connection to wireless computers and devices. Wireless Fidelity
- end user’s computer
- the unique addresses for resources on the Web.
- internet protocol address consists of a series of numbers much like a phone number
- servers accessed by people from any location that has an internet connection
- includes images as well as text
- is a computer program that indexes millions of sites on the Web so that users can easily find Web sites with the information they want
- is a useful technique for creating and arranging online information
- a device used to connect other devices such as telephone to networks
- performs the translation of the IP address to domain names
- the smaller pieces of data that is reassembled on the receiving side
- servers used to access web addresses you want to visit
29 Clues: end user’s computer • consists of servers • includes images as well as text • a global collection of electronic documents • the unique addresses for resources on the Web. • store information accessed by various clients. • servers used to access web addresses you want to visit • performs the translation of the IP address to domain names • ...
Telecom 101 2019-05-24
Across
- Means of two-way communication between two or more points.
- Local access and Transport area of a telephone company.
- A practice in which customers are billed for enhanced features such as voicemail, caller ID and call waiting that they have not ordered.
- A device or setup that finds the best route between any two networks, even if there are several networks to traverse.
- Service Provider
- Service level agreement
- A signal path of specified bandwidth for conveying information.
- The master station through which all communications to, from and between micro-terminals must flow.
- Device that connects computer terminals and hosts through analog links by converting data signals to analog and back again.
- The physical location where communication carriers terminate customer lines and locate the switching equipment that interconnects those lines.
- Wide Area Network
- Local Area Network - Private transmission network interconnecting offices within a building or group of buildings and usually designed to convey voice, data, video, or fax.
- Two or more information services or destinations linked via communication media to exhange information. It can be as simple as a cable strung between two computers a few feet apart or as complex as hundreds of thousands of computers around the world, linked through fiber optic, cables, phone lines and satellites.
Down
- Any and all information, facts, numbers, letters, symbols, etc. which can be acted on or produced by the computer.
- A package that includes several products for one price.
- To replace something with a more useful version or alternative
- Determines the rate at which information can be transmitted across a medium. Usually measured in bits, kilobits, megabits, or gigabits.
- Traditional wired phone service
- Phone sweitching system, usually installed in a service provider's central office, that provides dial tone and features to end users.
- Individual channels or circuits that can be grouped.
- The documents filed by a carrier describing their services and the payments to be charged for each.
- _________ is like having your own private mailbox on a network.
- The term used to describe what occurs when a customer's long distance service is switched from one Long Distance company to another without the customer's permission.
- When a service or site runs into technical trouble and you can no longer gain access to it, it's ________.
- A program that can trace the route a message takes from your site to another.
- Plain Old Telephone Service
- A technique that allows voice to be carried in a portion of the bandwidth of an Ethernet signal that is carrying IP traffic.
27 Clues: Service Provider • Wide Area Network • Service level agreement • Plain Old Telephone Service • Traditional wired phone service • Individual channels or circuits that can be grouped. • A package that includes several products for one price. • Local access and Transport area of a telephone company. • Means of two-way communication between two or more points. • ...
Cybersecurity Awareness 2024-12-13
Across
- A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
- Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
- A type of malware that locks a user’s files or system, demanding payment to restore access.
- A fix or update to software that addresses security vulnerabilities or bugs.
- Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
- A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
- Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
- Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
- Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
- Software that secretly gathers information about you or your device without your consent.
- (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
- A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
- The process of converting data into a secret code to prevent unauthorized access.
- Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
- Software designed to detect, prevent, and remove malicious programs from your computer or network.
- Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
- Any potential danger or risk that could exploit vulnerabilities in a system or network.
- Malicious software designed to harm or exploit devices, systems, or networks.
- Breach An incident where confidential data is accessed or disclosed without authorization.
- Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
- A security vulnerability that is unknown to the software maker and has no fix or patch available.
- Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
- Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
- A copy of important data or files that can be restored in case of loss, damage, or attack.
- (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.
25 Clues: A fix or update to software that addresses security vulnerabilities or bugs. • Malicious software designed to harm or exploit devices, systems, or networks. • The process of converting data into a secret code to prevent unauthorized access. • Any potential danger or risk that could exploit vulnerabilities in a system or network. • ...
The Ultimate Guide to AI for Beginners 2025-05-16
Across
- Gaining knowledge through group efforts (12 letters)
- AI tailoring education to your pace and style.
- Amazon’s AI digital assistant for Echo devices, handling voice requests.
- AI creating text, images, or ideas from prompts.
- Continuous skill development with AI (15 letters)
- Information used to teach AI models (11 letters)
- AI automating task processes (12 letters)
- AI tools for virtual teamwork (15 letters)
- I finding the best travel paths (15 letters)
- AI gauging emotions in text or interactions.
- AI identifying objects in photos (14 letters)
- AI adjusting calendars in real-time (15 letters)
- AI programs that chat with users to assist or inform.
- AI optimizing team schedules (10 letters)
- AI managing global scheduling (13 letters)
- Gadgets with AI that automate home tasks (e.g., lights, thermostats).
- AI tracking and analyzing time usage (12 letters)
- A type of AI that creates new content (e.g., text, images) by learning from data patterns, using models like GANs or transformers.
- AI sensing movement to trigger actions, like in security systems.
- Protecting user information in AI systems (11 letters)
Down
- AI tracking blood sugar levels in real-time via wearables.
- An AI-powered program that helps with tasks via voice or text commands. (18 letters)
- AI’s ability to comprehend human speech (19 letters)
- Stripping personal details from data for privacy.
- AI sorting and prioritizing emails (12 letters)
- Scrambling data so only authorized people can read it.
- AI tweaking resumes to match job keywords.
- A model where two networks—a generator creating content and a discriminator judging its quality—compete to improve the output.
- AI monitoring pulse via sensors for health insights.
- Unfair tendencies in AI decisions (4 letters)
- AI systems mimicking the brain’s structure (12 letters)
- AI’s ability to spot trends or shapes in data, like images or sounds.
- The broad field of creating smart machines (19 letters)
- Team-based learning with AI (15 letters)
- Mobile devices with AI features like assistants and apps.
- Two networks often used for generating realistic images or audio.
- Ongoing education with AI platforms (13 letters)
- Moral principles guiding AI use (6 letters)
- Apple’s built-in digital assistant uses AI to assist iPhone/iPad users.
- Platforms for writing and testing code
- AI forecasting trends for planning (16 letters)
- Data used to teach AI systems (10 letters)
- Group of learners using AI (9 letters)
43 Clues: Platforms for writing and testing code • Group of learners using AI (9 letters) • Team-based learning with AI (15 letters) • AI automating task processes (12 letters) • AI optimizing team schedules (10 letters) • AI tweaking resumes to match job keywords. • AI tools for virtual teamwork (15 letters) • Data used to teach AI systems (10 letters) • ...
Cyber Security 2020-09-09
Across
- Set your computer to _ _ _ _ _ _ _ _ _ _ _ _ _ check for new software updates
- Chief Information Security Officer
- To protect personal information, avoid sending it via
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
- Hardware and/or software mechanisms to prevent unauthorized users from accessing a computer network
- A malicious program designed to record which keys are pressed on a computer keyboard
- _ _ _ _ _ _ engineering refers to the methods attackers use to manipulate people into sharing sensitive information
- Never post private and confidential _ _ _ _ _ _ _ _ _ _ _ such as your username or password
- Unwanted advertising that comes to your email address
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- An unauthorized person seeking to maliciously disrupt or damage a computer
- a string of words that must be used to gain access to a computer system or service
- The assurance that the confidentiality of, and access to, certain information about an entity is protected
- An Internet scam that targets unsuspecting users through email
Down
- A technology that allows us to access our files and/or services through the internet from anywhere in the world
- Always _______your computer when you leave your desk
- Small files that Web sites put on your computer hard disk drive when you first visit
- Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use
- Domino's is known for selling
- Malicious software that is inserted into a system, usually covertly, with the intent of compromising the victim’s data
- Global system of interconnected computer networks that use the Internet protocol suite
- media websites and applications that enable users to create and share content or to participate in social networking
- An acronym that stands for distributed denial of service – a form of cyber attack
- A body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- A characteristic or specific weakness that renders an organization or asset open to exploitation.
- Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- An attempt by hackers to damage or destroy a computer network or system
- A type of malware designed to block access to a computer system or data until a sum of money is paid
- A system invented by Google that uses a test to establish if a user is a human or a robot
- A regular system update that is designed to cover security blunders that have been discovered
31 Clues: Domino's is known for selling • Chief Information Security Officer • Always _______your computer when you leave your desk • To protect personal information, avoid sending it via • Unwanted advertising that comes to your email address • Lock your _ _ _ _ _ _ _ _ and mobile phone when not in use • Information security is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • ...
Learning Unit 6 - Telecommunications 2019-10-09
Across
- A network entity/ device/ computer/ software that converts data between incompatible systems.
- A type of switching in which messages are divided into smaller units called packets containing all source and destination addresses needed to traverse the network.
- It is a place of convergence where data arrives from one or more directions and is forwarded out in one or more directions.
- An adapter that interfaces a computer/ device to a network.
- Electronic transmission of signals for communications.
- A device or software that determines the next network point to which data should be forwarded.
- Communications processors that allow a single communication channel to carry data transmissions from many terminals simultaneously (at the same time).
- Signals that consist of short pulses.
- A topology in which each computer (node) on the network connects to the other, creating a point-to-point between every network device.
- A communication mode in which the receiver gets the message later than when it was originally sent.
- ______ are connected to a network and is used typically by a single person or individual.
- Using computer networks to link people and resources.
- An internet work processor that connects two or more networks that use the same communications protocol.
Down
- A device that connects all segments of a network together.
- A communication mode in which the receiver gets the message instantaneously.
- Two or more computers that are connected in order to share data/ information, peripherals, etc.
- The capacity of a channel.
- A type of switching in which the source and destination computers create a single and dedicated path between the devices for the period of the connection.
- Process by which information is made available to others..
- ______ have no processing or memory capabilities.
- A transmission mode in which transmission is possible in both directions over a channel simultaneously.
- Signals that are continuous and can travel long distances.
- Communication processor, which converts the digital signals from a computer to analogue frequencies (signals), which can be transmitted over ordinary telephone lines.
- A transmission mode in which transmission is done in both directions over a channel but only in one direction at a time.
- A transmission mode which allows sending of message in one way only.
- ASCII and EBCDIC
- computer platforms dedicated to special functions such as database management, printing, communications, and program execution.
- A topology in which each device has its own channel to a central point on the network.
28 Clues: ASCII and EBCDIC • The capacity of a channel. • Signals that consist of short pulses. • ______ have no processing or memory capabilities. • Using computer networks to link people and resources. • Electronic transmission of signals for communications. • A device that connects all segments of a network together. • ...
Know Your Acceptable Use Policy 2013-08-17
Across
- The use of anonymous ____or any site that allows the user to get around content filtering is strictly prohibited
- Do not, under any circumstances, agree to _______ someone you have met over the Internet.
- All users must abide by rules of Network etiquette commonly called
- No user is permitted to knowingly or inadvertently load or create a computer ___
- All students and faculty must adhere to the ______ laws of the United States (P.L. 94-553
- do not disclose or share your ______with others
- In using the network and Internet, users should not reveal personal information such as home
- A user who violates this agreement shall, at a minimum, have his or her access to the network and Internet terminated and is subject to ______ action by the school administrator
- No identifiable ___________ will be allowed to be published on the Internet without appropriate written consent
- For the purpose of this policy a minor is defined as an individual who has not attained the age of _______ years.
- A student may not attempt to access any Internet resource without the prior _____ of the teacher
- District reserves the right to monitor, inspect, copy, review and store at any time and without prior notice any and all usage of the computer network and Internet access and any and all information transmitted or received in connection with such usage
- Access to the school network is a _____, not a right
Down
- Parents must _____and return the attached consent form by September 1, 2013.
- Uses that cause harm to others or damage to their property are ________
- Avoid language and/or graphic representations which may be ______to other users
- Threatening, profane, harassing, or abusive shall be forbidden.
- Franklin Parish School Board is pleased to offer our employees and students access to the World Wide Web and other Electronic _____.
- The District is providing access to its school computer systems, computer networks, and the Internet for ________ purposes only.
- The network is provided for students to conduct______, complete assignments, and communicate with others
- Illegal activities include _____of computer files.
- Use _________ language and graphics
- Teachers may NOT allow individual students to use _____.
- The District will utilize _______software or other technologies to prevent all users from accessing visual depictions that are (1) obscene, (2) pornographic, or (3) harmful to minors.
- No ________ of minors will be permitted to be given out on the Internet or for any type of student account.
- Students using Web 2.0 tools agree to not share their user name or password with anyone besides their ______ and
26 Clues: Use _________ language and graphics • do not disclose or share your ______with others • Illegal activities include _____of computer files. • Access to the school network is a _____, not a right • Teachers may NOT allow individual students to use _____. • Threatening, profane, harassing, or abusive shall be forbidden. • ...
Web ethics and safety 2023-08-22
Across
- A device which monitors network activities for attacks and produces reports to a management station
- the process of rearranging the data on a storage medium, such as a hard disk drive (HDD), for efficient storage and access.
- Someone who is an expert at fixing and preparing computers, but they can also illegally gain access to other people's computers for their own profits.
- A network controller which connects devices and allows effective communication between these devices.
- An internet user, who uses sites, chat rooms, or other cyberspace to hurt people for sexual or abusive purposes.
- used by software developers and proprietary software companies to prevent the unauthorized copying of their software.
- malware, that spreads between computers and causes damage to data and software.
- collection of computers controlled by users other than their own to perform automated tasks over the internet.
- Fraud which involves stealing personal information for financial gain through email.
- Creation, distribution or forwarding of a message which includes sexually explicit materials through a computer, cell phone or other electronic devices
Down
- Software designed to protect computers from viruses.
- a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
- ownership of any creative work or invention
- a security program designed to prevent, detect, search and remove types of malware from computers, networks and other devices.
- a word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
- bad hackers
- Exception to copyright infringement.
- Computer device which forwards data packets from one network to another.
- when a criminal uses someone else's personal information to assume their identity or access their accounts for the purpose of committing fraud, receiving benefits, or gaining financially in some way.
- use of computers cellphones or other electronics devices to harm another person through the internet
- good hackers
- the practice of taking someone else's work or ideas and passing them off as one's own.
- a pathway or method used by a hacker to illegally access a network or computer in an attempt to exploit system vulnerabilities.
- A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.
- Unauthorized reproduction or distribution of copyright materials.
25 Clues: bad hackers • good hackers • Exception to copyright infringement. • ownership of any creative work or invention • Software designed to protect computers from viruses. • Unauthorized reproduction or distribution of copyright materials. • Computer device which forwards data packets from one network to another. • ...
Chapter 2; Network Hardware Essentials 2025-02-24
Across
- _____ mode; A communication mode in which a device can simultaneously transmit and receive data on the same cable connection
- Broadcast _____; A network message intended to be processed by all devices on a LAN; it has the destination address FF:FF:FF:FF:FF:FF
- default ____; a routing table entry that tells a router where to send a packet with a destination network address that can’t be found in the routing table.
- A network message addressed to only one computer on the LAN.
- A network device used to interconnect multiple computers;
- Making a connection between devices such as two switches, usually for the purpose of expanding a network.
- A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.
- A network device that performs the same function as a repeater but has several ports to connect a number of devices
- The acronym for The name assigned to a wireless network that is configured on the wireless access point.
- _____ mode; A communication mode in which a device can send or receive data but can’t do both simultaneously
- A device that enables LANs to communicate with one another by forwarding packets from one LAN to another.
Down
- A signal an AP generates in response to a request-to-send signal.
- _____ bandwidth; A property of switches in which each port’s bandwidth is dedicated to the devices connected to the port.
- A table containing MAC address and port pairs that a switch uses to determine which port to forward frames it receives.
- _____ mode; An operational mode of a NIC in which all frames are read and processed rather than only broadcast and unicast frames addressed to the NIC.
- A signal used in wireless networks indicating that a computer has data ready to send on the network
- Broadcast _____; The scope of devices to which broadcast frames are forwarded. Router interfaces delimit these because they don’t forward broadcasts.
- Bandwidth ____; A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring devices to share available bandwidth.
- A designated port on a hub or switch used to connect to another hub or switch without using a crossover cable.
- Default _____; The address configured in a computer’s IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.
20 Clues: A network device used to interconnect multiple computers; • A network message addressed to only one computer on the LAN. • A signal an AP generates in response to a request-to-send signal. • A signal used in wireless networks indicating that a computer has data ready to send on the network • ...
The Four models of Corporate Entrepreneurship 2015-08-28
Across
- The producer model aims to encourage cross-unit __________
- The company establishes and supports a full-service group with a mandate for Corporate Entrepreneurship
- The ________ intelligence unit conducted the survey that shows the potency of Corporate Entrepreneurship
Down
- Strong executive ________ is needed for advocate model
- The company has no deliberate approach to Corporate Entrepreneurship. Internal and external networks drive concept selection and resource allocation
- The company provides funding and senior executive attention to prospective projects
- Culture of _________ in Google
- A __________ corporate culture is needed for the opportunist model
- The company strongly evangelizes for Corporate Entrepreneurship, but business units provide the primary funding
9 Clues: Culture of _________ in Google • Strong executive ________ is needed for advocate model • The producer model aims to encourage cross-unit __________ • A __________ corporate culture is needed for the opportunist model • The company provides funding and senior executive attention to prospective projects • ...
Welcome- Crossword for Sales Managers 2016-06-04
Across
- Where can I post questions?
- What will be increased with the help of our new community? Sales …
- Where can I find new information in this community?
- What is the one of the main purposes of this community? (2 words)
- Where can I find useful tips for my start in Bosch Connect? First …. on Bosch Connect
Down
- By communicating and collaborating in social networks like Bosch Connect we do ... (2 words)
- You can share and vote for good ideas in the … (2 words)
- What will be cut back?
- Our ST-IE Local Sales Managers Europe Community is an …. Network Community
9 Clues: What will be cut back? • Where can I post questions? • Where can I find new information in this community? • You can share and vote for good ideas in the … (2 words) • What is the one of the main purposes of this community? (2 words) • What will be increased with the help of our new community? Sales … • ...
Axel's Puzzle 2024-03-13
Across
- Software designed to damage or disrupt a computer system.
- Process of converting information or data into a code to prevent unauthorized access.
- Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
- Secret word or phrase used for authentication and access control.
- Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
- Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
- Software designed to detect and remove viruses and other malicious software.
- Network security system designed to prevent unauthorized access
- Update to fix vulnerabilities or improve functionality in software.
9 Clues: Software designed to damage or disrupt a computer system. • Network security system designed to prevent unauthorized access • Secret word or phrase used for authentication and access control. • Update to fix vulnerabilities or improve functionality in software. • Software designed to detect and remove viruses and other malicious software. • ...
Social Determinants 2024-08-26
Across
- Religion or Beliefs
- How much money someone makes
- Social relationships, community networks, and social cohesion that impact individuals’ health and well-being.
- Factors that influence an individual’s health, including economic, social, and environmental conditions.
Down
- Physical and social characteristics of where people live, including housing, transportation, green spaces, and safety.
- Ability to obtain necessary medical services, while quality pertains to the standard of care provided.
- Highschool, elementary and middle are types of what?
- Having a reliable and sufficient income to meet basic needs and manage expenses.
- Refer to the availability and standard of educational opportunities from early childhood through higher education.
9 Clues: Religion or Beliefs • How much money someone makes • Highschool, elementary and middle are types of what? • Having a reliable and sufficient income to meet basic needs and manage expenses. • Ability to obtain necessary medical services, while quality pertains to the standard of care provided. • ...
cyber security 2024-10-09
Across
- a communication method that uses electronic devices to deliver messages across computer networks
- never share your private
- always have a secure
- a symbol, word, or words legally registered or established by use as representing a company or product.
- a website or app almost always has access to your personal
- a person who uses computers to gain unauthorized access to data
Down
- never use somebody elses legal right to print, publish, perform, film, or record literary, artistic, or musical material,or you will be
- the information about a particular person that exists on the internet as a result of their online activity
- never click on sketchy
- when creating username never use your real
10 Clues: always have a secure • never click on sketchy • never share your private • when creating username never use your real • a website or app almost always has access to your personal • a person who uses computers to gain unauthorized access to data • a communication method that uses electronic devices to deliver messages across computer networks • ...
AA 2020-11-12
Across
- ___________ study is a survey technique, which uses a combination of qualitative and quantitative techniques to draw upon the opinions of experts about a particular problem or phenomena; its goal is to reach a consensus
- A new subset of machine learning methods that primarily leverage Artificial Neural Networks run through many stages to transform the representation at one level (starting with the raw input) into a representation at higher, more abstract levels. These methods are called _________ neural networks.
- The purpose of ___________ analysis is to group a set of objects such that those in the same group are more similar (based on a certain criterion) to each other than to the objects in other groups.
- A random __________ consists of multiple decision trees
- ___________ is a way of anonymizing data wherein observations are divided into groups and their data are exchanged.
- ____________ panels are electronic devices used to control access to entry doors, stairwells, elevators, parking garages, and so forth.
Down
- In all markets, costs regularly accrue to parties not directly involved in an immediate decision. When the harm done to others is not taken into account in the immediate transaction or exchange, it is called a negative _______.
- ___________ analytics mostly includes the traditional business intelligence and visualization techniques and helps researchers identify nontrivial patterns and relationships in data.
- _________ analysis is a data analysis technique used to evaluate or predict connections between entities in a network of objects
- One of the major differences between the traditional scientific and the emerging analytical research is that in analytics research, _________ may precede theory or a model
10 Clues: A random __________ consists of multiple decision trees • ___________ is a way of anonymizing data wherein observations are divided into groups and their data are exchanged. • _________ analysis is a data analysis technique used to evaluate or predict connections between entities in a network of objects • ...
CYBERCRIME 2021-07-10
Across
- measures promoting the safe usage of the internet, especially in order to protect against viruses, fraud, or other forms of attack.
- is a form of bullying or harassment using electronic means
- Interception made by technical means without right
- It is when an individual or entity with malice or in bad faith
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access
- is data that describes other data.
- Intentional or reckless alteration, damaging, deletion of computer data
- protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a type of social engineering where an attacker sends a fraudulent ("spoofed") message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device, steals sensitive information and internet usage data, and relays it to advertisers, data firms or external users.
- a string of characters that allows access to a computer system or service.
- a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations
- sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- of 2012 therefore and for other purposes
- act protecting individual personal information in information and communication systems in the government and the private sector, creating for this purpose a National Privacy Commission, and for other purposes.
- It is offense against the confidentiality, integrity and availability of computer data and systems.
- is pornography that exploits children for sexual stimulation.
- information of an individual in any container for trash collection.
- is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- what comes after terabyte
- It is when personal
- is a form of phishing that uses mobile phones as the attack platform to gather personal details, like SSN or credit card number.
- is a suspected, attempted, successful, or imminent threat of unauthorized access, use, disclosure, breach, modification, or destruction of information; interference with information technology operations; or significant violation of responsible use policy
- is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
Down
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet.
- Intentional alteration or reckless interference with the functioning of a computer or computer network
- when individual handling personal information knowingly or negligently disposed, discard, or abandon in an area accessible to the public or has otherwise placed the
- includes the vast network of highways, connecting bridges and tunnels, railways, utilities and buildings necessary to maintain normalcy in daily life.
- It is when an individual handling personal information or intentional knowingly and unlawfully, or violating data confidentiality breach and security
- breach It is when an individual or entity who has knowledge of a security breach and of the obligation
- It is when an individual or entity discloses to third party personal information.
- is a concept describing a widespread interconnected digital technology.
- is digital service infrastructure has to be designed, built, integrated, operated, and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
- Prevention investigation, suppression and the imposition of penalties
- is a data storage device that includes flash memory with an integrated USB interface.
- refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
- refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks.
- Act of 2012
- is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.
- Use, production, sale, procurement, importation, distribution, or otherwise making available, without right
- Acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering.
- global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- what comes after zettabyte.
- Access Access to the whole or any part of a computer system without right
- is a shortfall that comes from fragmented thinking, reactive acquisition, and unmanaged vulnerability against the known threats that violate confidentiality, integrity, availability, and privacy of information in the infrastructure, process, data, application, and agreements of service delivery.
- An act defining cybercrime, providing for the prevention,
- is an electronic data storage device used for storing digital information, typically using flash memory.
51 Clues: Act of 2012 • It is when personal • what comes after terabyte • what comes after zettabyte. • is data that describes other data. • of 2012 therefore and for other purposes • Interception made by technical means without right • An act defining cybercrime, providing for the prevention, • is a form of bullying or harassment using electronic means • ...
Intermediate 2021-09-11
5 Clues: Bug bounty hunters try to find bugs on ________. • A tool used for scanning and monitoring packets. • ______________ is the first phase of ethical hacking. • Packet filtering firewalls work effectively in _________ networks. • Network enumeration is the finding of __________ or devices on a network.
Sak's Bday Special Edition 2022-06-18
Across
- An algorithm for finding the shortest paths between nodes in a graph, which may represent, for example, road networks
- The worst mistake you made in your life
- Your weird hobby when you are bored
Down
- A fruit with the same name as its color
- The most intelligent person with the best personality
- Your most favorite person in the whole world
6 Clues: Your weird hobby when you are bored • A fruit with the same name as its color • The worst mistake you made in your life • Your most favorite person in the whole world • The most intelligent person with the best personality • An algorithm for finding the shortest paths between nodes in a graph, which may represent, for example, road networks
Network concept 2025-05-25
Across
- connects computer and devices in limited geographical area
- is a device that connects tow different types of network
- if it is breaks down in a network then all computer became isolatet
Down
- allows the networks to be deployed without cable
- type of a network can be set up by a college
- security means protecting data and resources from any unauthorised access
6 Clues: type of a network can be set up by a college • allows the networks to be deployed without cable • is a device that connects tow different types of network • connects computer and devices in limited geographical area • if it is breaks down in a network then all computer became isolatet • security means protecting data and resources from any unauthorised access
IC3 Module 3 Lesson 27 2015-04-29
Across
- 2.0 Also called the participatory Web, this term has several definitions, although the most popular one refers to Web sites where users can modify the content.
- A type of web site that uses technology to change imagery of the Earth's surface into valuable information.
- A method of publishing files (primarily audio) to the Internet that can be streamed or downloaded for playback on a computer or a personal digital audio player.
- Resource Locator (URL) The address of a Web page, FTP site, audio stream, or other Internet resource.
- The first page that appears in the browse when you visit a web site.
- service provider (ISP) An organization or company that provides connectivity to the Internet through a telecommunications line or wireless system.
- A text-based program that creates hyper linked documents.
- Simple Syndication (RSS) Also known as Rich Site Summary and RDF Summary, is a format originally developed to syndicate news articles online, and is now widely used to share the content of blogs.
- Used to upload files from on computer to another and retrieve files from a server to a computer.
- Identifies a computer or web site on the internet.
- site A collection of related HTML-formatted Web pages located on the World Wide Web.
- networking site A type of Web site where an online community provides interaction for groups of people who share a similar interest or activity.
- A programming interface developed by Microsoft for windows. This set of rules controls windows applications that are downloaded from the internet and then run in a browser.
- A small text file that web sites put on your computer to store information about you and your preferences.
Down
- A collaborative Web site that people can use to add, edit, remove, and organize Web page content.
- An electronic document similar to an ID card.
- numerical addressing system that uniquely identifies computers and networks linked to the Internet.
- The first graphical browser.
- A type of computer program that makes a service request from a server.
- Protocol (IP) address A numerical addressing system that uniquely identifies computers and networks linked to the Internet.
- A Web site that features useful content, but also contains links to other sites.
- Software application you can access with your Web browser.
- Sockets Layer (SSL) A protocol for managing the security of message transmissions on the Internet.
- The number of web sites returned by a search engine based on your keyword.
- cache A temporary storage area on your computer for collecting data.
25 Clues: The first graphical browser. • An electronic document similar to an ID card. • Identifies a computer or web site on the internet. • A text-based program that creates hyper linked documents. • Software application you can access with your Web browser. • The first page that appears in the browse when you visit a web site. • ...
class puzzle 2023-08-22
Across
- the act of taking over other electronics
- the amount of time it takes to get a action done
- the act of bullyng on the enternet
- a two word virus named was a computer worm designed to exploit major flaws in Microsoft’s Internet Information Services web server.
- the sexueal
- the most dangerious virus first spotted in March 1999, spreading to the public via internet forums and emails offering free login credentials to adult websites.
- what you need to sign in
- worm was not just a worm that could replicate itself but also a Trojan horse, or malware disguised as a harmless program.
- a facebook virus that was named after a snack made of flower egg and chocolate
- a person employed to look after technical equipment or do practical work in a laboratory.
- the "cells" of a webcite
- theact of making electronics work
Down
- another computer worm, targeted machines with Windows XP and Windows 2000 operating systems in 2004. It spread quickly through a vulnerability in the Local Security Authority Subsystem Service, which is responsible for managing user logins and credentials. The worm caused millions of PCs to blue screen and crash, which led many businesses to shut down their networks until the infection was dealt with.
- was designed to encrypt files on infected computers and demand a ransom from its victims. However, the malware was unique in that it spread rapidly throughout computer networks by exploiting vulnerabilities in outdated Windows operating systems.
- the location of informaiton
- the worst malware in history, causing more than $38 billion worth of damages in 2004. Like Sobig, it was another type of mass mailing computer worm that stole email addresses from infected computers and sent itself to those addresses.
- a virus named after the greek god of lightning
- malware appeared in October 2001. It had the capability to exploit buggy Microsoft email clients and spread itself to everyone in a user’s Outlook address book.
- computer worm discovered in 2010, spreading via corrupted USB drives and was predominantly used in cyber warfare. The malware targeted industrial control systems used to control nuclear power plants and other industrial facilities.
- good hacker it is 2 words no space
- bad hacker it is 2 words no space
- also known as the love letter or the LoveBug virus, was first discovered in May 2000.
- the way to get to a web sight
- a bad program
- most vaulable player
25 Clues: the sexueal • a bad program • most vaulable player • what you need to sign in • the "cells" of a webcite • the location of informaiton • the way to get to a web sight • bad hacker it is 2 words no space • theact of making electronics work • the act of bullyng on the enternet • good hacker it is 2 words no space • the act of taking over other electronics • ...
Impact 1 Unit 7 All Vocabulary Crossword Labs 2020-10-10
Across
- to take and use something that belongs to somebody else, and return it to them at a later time.
- to talk in a friendly, informal way to somebody.
- able to move or travel around easily.
- the set of keys for operating a computer or typewriter, or set of letters that you can touch to write on a smartphone or tablet.
- the purpose of a person or thing.
- to tell other people about your ideas, experiences, and feelings on the internet.
- an international computer network connecting other networks and computers from companies, universities, etc.
- a piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game.
- a device that is placed inside a car engine, clock, radio, etc, and that produces the electricity that makes it work.
- an activity that you do to have fun, often one that has rules and that you can win or lose.
- describing something that you can help do what you want.
- to make something go or be taken to a place, especially by post or email.
- to produce or design something that has not existed before.
Down
- describing something that is very difficult to believe or is very good.
- an attempt to find somebody or something especially by looking carefully for it or them.
- a piece of equipment for taking photographs, moving pictures or television pictures.
- a device that is used for recording sounds or for making your voice louder when you are speaking or singing to an audience.
- to look for information in a dictionary or by using a computer.
- to join a computer or a mobile device to the internet or to computer network.
- a written message that you can send using a mobile phone.
- something might exist or happen.
- a small tool or device that does something useful.
- a mobile phone that also has some of the functions of a computer.
- a small computer that is easy to carry with a large touch screen and usually without a physical keyboard.
- that flat surface at the front of a television, computer, or other electronic device, on which you can see pictures or information.
- to discover somebody or something unexpectedly or by chance.
- a system for connecting to the internet or sending data over computer networks using radio waves instead of wires.
27 Clues: something might exist or happen. • the purpose of a person or thing. • able to move or travel around easily. • to talk in a friendly, informal way to somebody. • a small tool or device that does something useful. • describing something that you can help do what you want. • a written message that you can send using a mobile phone. • ...
Cyber Society Final 2025-05-16
Across
- In short, Aristotle contends that the best friendship is one that we might call ______ friendship.
- The IT Team's critical tasks include keeping all software and systems ______.
- Assistive _______ products help maintain or improve an individual's functioning related to cognition, communication, hearing, mobility, self-care and visions, thus enabling their health, well being, inclusion, and participation.
- _____ is about protecting your digital information and systems.
- The CEO's Role in cybersecurity includes creating a _____ where everyone cares about digital safety.
- A networked society has major influence on the way we communicate. Instant messaging and video calls connect us _______.
- ____________ is a type of cyberattack where someone tries to trick you into giving away sensitive information like passwords, credit card numbers, or personal details—by pretending to be someone you trust.
- Smart and self-driving cars are a major advancement in transportation, but their reliance on complex technologies and connectivity also introduces several __________ risks.
- According to Aristotle there is only one type of friendship that is pure in its virtue and in its addition to/necessity for a good life. This is the purest form of friendship or "friendship of ______".
- Data integrity refers to the accuracy, completeness, _____, and trustworthiness of data.
- Cyber _____ aim to stop things like data breaches, identity theft, online harassment, and ransomware attacks—all of which cause real harm.
- Artificial __________: The ability for a computer or machine to complete tasks that are usually done by humans.
Down
- Technology can either _____ or undermine friendships.
- Cyberattacks are unique in their subtlety, scope, and psychological impact, often targeting the ______ of modern life rather than just its physical components.
- MFA stands for ______ Authentication: Your data shield
- AI Chatbots: a tool that can understand language and is constantly _____ from it's conversations.
- Citizen science involves public ____________ in scientific research. It connects people to science and nature. Examples include biodiversity monitoring and environmental data collection.
- Chat GPT: A tool that can understand language and is constantly learning from it's conversation. You can ask them a question, and they can provide a human-like response based on ________ data.
- Worm GPT: An AI chat bot that was created for ________ activities.
- Data transfer is ____ data from one computer to another.
- ‘Leaving no one behind’ means ensuring people with disabilities, the older population, those affected by chronic diseases and everyone who needs ____________ technology are included in society and able to live healthy and dignified lives.
- _____ networks amplify voices for social change; Online platforms mobilize support for causes.
- Aristotle's claim is that companion friendships are ______ to a good life.
- A networked society connects _____, organizations, and devices through digital networks.
24 Clues: Technology can either _____ or undermine friendships. • MFA stands for ______ Authentication: Your data shield • Data transfer is ____ data from one computer to another. • _____ is about protecting your digital information and systems. • Worm GPT: An AI chat bot that was created for ________ activities. • ...
network+ lesson1 2013-02-03
Across
- A computer or other device connected to a network, which has a unique address and is capable of sending or receiving data.
- The network service that allows printers to be shared by several users on a network.
- A way of exchanging data between computers that are not connected on a network. The term “sneakernet” was coined before the widespread use of networks, when data was copied from a computer to a removable storage device such as a floppy disk, carried (presumably by someone wearing sneakers) to another computer, then copied from the storage device onto the second computer.
- The devices, data, and data storage space provided by a computer, whether stand-alone or shared.
- The network services that manage the storage and transfer of e-mail between users on a network. In addition to sending, receiving, and storing mail, mail services can include filtering, routing, notification, scheduling, and data exchange with other mail servers.
- The process of copying critical data files to a secure storage area. Often, backups are performed according to a formulaic schedule.
- The process of mastering material pertaining to a particular hardware system, operating system, programming language, or other software program, then proving your mastery by passing a series of exams.
- Technology Industry Association See CompTIA.
- The services that enable a network to communicate with the Internet, including Web servers and browsers, file transfer capabilities, Internet addressing schemes, security filters, and a means for directly logging on to other computers.
- The main circuit board that controls a computer.
- The functions provided by a network.
- (network operating system) The software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. The most popular network operating systems are UNIX, Linux, and Microsoft Windows Server 2008 R2.
- (Microsoft Certified IT Professional) A professional certification established by Microsoft that demonstrates in-depth knowledge about Microsoft products.
- local area network See LAN.
- The physical layout of computers on a network.
- A computer on the network that manages shared resources. Servers usually have more processing power, memory, and hard disk space than clients. They run network operating software that can manage not only data, but also users, groups, security, and applications on the network.
- remote access server.
- The centralized management of multiple types of network-based communications, such as voice, video, fax, and messaging services.
- The process of centrally administering a finite number of network addresses for an entire LAN. Usually this task can be accomplished without touching the client workstations.
- The use of data networks to carry voice (or telephone), video, and other communications services in addition to data.
- The process of determining the number of copies of a single application that are currently in use on the network and whether the number in use exceeds the authorized number of licenses.
- A computer that runs a desktop operating system and connects to a network.
- The process of evaluating security measures currently in place on a network and notifying the network administrator if a security breach occurs.
- (wide area network) A network that spans a long distance and connects two or more LANs.
- (network interface card) The device that enables a workstation to connect to the network and communicate with other computers. NICs are manufactured by several different companies and come with a variety of specifications that are tailored to the workstation’s and the network’s requirements. NICs are also called network adapters.
- The property of a network that allows you to add nodes or increase its size easily.
- (Net+) The professional certification established by CompTIA that verifies broad, vendor-independent networking technology skills, such as an understanding of protocols, topologies, networking hardware, and network troubleshooting.
- The process of distributing data transfer activity evenly so that no single device is overwhelmed.
- The skills such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities, which are not easily measured, but are nevertheless important in a networking career.
Down
- The scheme for assigning a unique identifying number to every workstation and device on the network. The type of addressing used on a network depends on its protocols and network operating system.
- A computer that manages Web site services, such as supplying a Web page to multiple users on demand.
- A computer that enables resource sharing by other computers on the same network.
- (Cisco Certified Network Associate) A professional certification that attests to one’s skills in installing, configuring, maintaining, and troubleshooting medium-sized networks that use Cisco Systems’ switches and routers.
- The process of collecting and storing data on the number and types of software and hardware assets in an organization’s network. The data collection is automated by electronically examining each network client from a server.
- The process of automatically transferring a data file or installing a software application from the server to a client on the network.
- A discrete unit of information sent from one node on a network to another.
- One of several types of specialized devices that allows two or more networks or multiple parts of one network to connect and exchange data.
- The part of a network to which segments and significant shared devices (such as routers, switches, and servers) connect. A backbone is sometimes referred to as “a network of networks” because of its role in interconnecting smaller parts of a LAN or WAN.
- (Cisco Certified Internetwork Expert) An elite certification that recognizes expert-level installation, configuration, management, and troubleshooting skills on networks that use a range of Cisco Systems’ devices.
- A computer that uses applications and data only from its local disks and that is not connected to a network.
- The process of retrieving files from a backup. It is necessary to restore files if the original files are lost or deleted.
- A person who uses a computer.
- The process of determining how much data transfer activity is taking place on a network or network segment and notifying administrators when a segment becomes overloaded.
- See peer-to-peer network.
- A network in which every computer can communicate directly with every other computer. By default, no computer on a peer-to-peer network has more authority than another. However, each computer can be configured to share only some of its resources and keep other resources inaccessible to other nodes on the network.
- The network services that centrally administer and simplify complicated management tasks on the network. Examples of management services include license tracking, security auditing, asset management, address management, software distribution, traffic monitoring, load balancing, and hardware diagnosis.
- The means through which data are transmitted and received. Transmission media may be physical, such as wire or cable, or wireless, such as radio waves.
- The functions of a file server that allow users to share data files, applications, and storage areas.
- The professional certification established by CompTIA that verifies knowledge about PC operation, repair, and management.
- (metropolitan area network) A network that is larger than a LAN, typically connecting clients and servers from multiple buildings, but within a limited geographic area. For example, a MAN could connect multiple city government buildings around a city’s center.
- A computer on the network that requests resources or services from another computer on a network. In some cases, a client could also act as a server. The term client may also refer to the user of a client workstation or a client software application installed on the workstation.
- Unsolicited, unwanted e-mail.
- network A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.
- A person working on a computer on a different network or in a different geographical location from the LAN’s server.
- A standard method or format for communication between network devices. For example, some protocols ensure that data are transferred in sequence and without error from one node on the network to another. Other protocols ensure that data belonging to a Web page are formatted to appear correctly in a Web browser window. Still others encode passwords and keep data transmissions secure.
- A part of a network. Usually, a segment is composed of a group of nodes that share the same communications channel for all their traffic.
56 Clues: remote access server. • See peer-to-peer network. • local area network See LAN. • A person who uses a computer. • Unsolicited, unwanted e-mail. • The functions provided by a network. • Technology Industry Association See CompTIA. • The physical layout of computers on a network. • The main circuit board that controls a computer. • ...
Week One 2016-04-21
5 Clues: exploitation • software that has a nefarious purpose • attacks by an individual or even a small group of attackers • individuals who do not have the technical expertise to develop scripts • act of deliberately accessing computer systems and networks without authorization
PCPRO Chapter 7 2021-02-22
Across
- A profile designed for networks in which you know and trust every device.
- Employs an access point that functions like a hub on an Ethernet network.
- BLANK settings. Most SOHO routers provide basic BLANK functionality. When enabled, BLANK prioritizes certain network communications over others.
- Do not place the access point next to BLANK, such as other wireless transmitting devices (cordless phones or microwaves) or other BLANK (motors or generators).
- Most SOHO networks use a BLANK that is shared among all hosts.
- The BLANK security protocol makes it easier for WPS-enabled devices (e.g., a wireless printer) to connect to the wireless network.
- Combining channels into one to increase bandwidth.
- When you connect a BLANK to the wireless network, all devices on the network operate at the legacy speed. For example, connecting an 802.11b device to an 802.11n or 802.11g access point slows down the network to 802.11b speeds.
- A wireless security that adheres to 802.11i specifications.
- A network device that connects Wi-Fi devices to form a Wi-Fi network.
- A SOHO uses a BLANK to connect the location to the internet. This connection provides a single IP address for connecting to the internet.
- Enable and configure a BLANK host. Configuring a BLANK on a SOHO router causes all incoming port traffic to be forwarded to the specified BLANK host.
- Communication technology that uses radio waves in the 2.4 ghz range.
- An optional component of the 802.11 specifications.
- An enhancement to MIMO that allows a set of devices with individual antennas, rather than just one device with an antenna, to communicate with each other.
- Communication technology that enables communication between two devices in close proximity.
- A network security standard for wireless home networks
- Some portable devices have a software-controlled switch that disableds all wireless functionality.
- An enhancement that allows multiple antennas to use the same radio frequency.
- The internet of things.
- The authentication method where only devices with the correct shared key can connect to the wireless network.
- Add BLANK to allow only authorized devices to connect. Use encryption to protect wireless communications from eavesdropping.
- Disabling the SSID broadcast is also known as BLANK
- A smart speaker that controls your smart appliances and performs other actions through voice commands.
- Communication technology that uses invisible light waves.
- A small office/home office network.
Down
- Placing the access point in the BLANK of the building decreases the range of the signals available outside of the building.
- A wireless network access protocol that uses WEP.
- Enable the BLANK networking protocol. BLANK is a networking protocol that allows BLANK enabled devices to easily discover each other on the network and share data and media content.
- An IoT standard based protocol.
- Place access points in BLANK locations.
- Transmission speeds are affected by distance, BLANK , and interference.
- A profile designed for use on unknown networks.
- A token-based authentication standard that requires a MAC address to use.
- The network name.
- A wireless security based on 802.11i specifications.
- Can be implemented in two different ways. Prevents unauthorized devices from connecting to the access point. Considered a cumbersome and weak form of security.
- Place access point to take advantage of the fact that devices often get better reception from access points that are BLANK
- A method for remapping one IP address space into another by modifying network address information in packets' IP headers while they are in transit.
- The authentication method that requires that clients provide a MAC address in order to connect to the wireless network.
- When you configure an access point, some configuration utilities use the term BLANK to designate a network with both 802.11n and non-802.11n clients.
- Disabling BLANK on the wireless access points allows only users with a valid, static IP address in the range to connect. An attacker would have to be able to discover or detect the IP address range, subnet mask, and default gateway information to connect to the access point.
- IoT standard based protocol. Simpler and less expensive than Zigbee.
- BLANK means all devices are allowed access except for the ones on the BLANK.
- The SOHO network is classified as a BLANK. All devices on the BLANK use private IP addresses internally, but share the public IP address when accessing the internet.
- A BLANK can use one radio to transmit at one frequency, and a different radio to transmit at a different frequency.
- A profile designed to be used in a SOHO.
- BLANK means that only the devices on the list are allowed access.
- The BLANK identifies the portion of the wireless frequency used by the access point and connected devices.
- Many manufacturers use a BLANK that contains identifying information (such as device manufacturer and model number).
- Configuring the protocol used for the connection. This will often be BLANK for an always-on internet connection.
- Because transmission speeds decrease with BLANK, you can either achieve the maximum distance or the maximum speed, but not both.
- In general, place access points BLANK up to avoid interference problems caused by going through building foundations.
- A temporary peer-to-peer mode network.
54 Clues: The network name. • The internet of things. • An IoT standard based protocol. • A small office/home office network. • A temporary peer-to-peer mode network. • Place access points in BLANK locations. • A profile designed to be used in a SOHO. • A profile designed for use on unknown networks. • A wireless network access protocol that uses WEP. • ...
Stroke Awareness 2020-09-30
Across
- the most common comorbidity associated with stroke
- second most common comorditity associated with stroke
- condition following brain damage in which patients fail to be aware of items to one side of space
- the acronym used for early detection of stroke symptoms
- a condition in which muscles stiffen or tighten, preventing normal fluid movement, found in stroke patients
Down
- The medical name for a stroke
- paralysis on side of the body afterbrain or spinal cord injury
- The ability of neural networks in the brain to change through growth and reorganization
- also known as a "mini stroke" (acronym/abbreviation)
9 Clues: The medical name for a stroke • the most common comorbidity associated with stroke • also known as a "mini stroke" (acronym/abbreviation) • second most common comorditity associated with stroke • the acronym used for early detection of stroke symptoms • paralysis on side of the body afterbrain or spinal cord injury • ...
LMS 4 2023-02-28
Across
- Measures taken to prevent accidents and injuries in the workplace.
- The measure of how much work is accomplished in a specific amount of time.
- Measures taken to protect computer systems and networks from unauthorized access, theft, and damage.
Down
- The ability to accomplish a job with a minimum expenditure of time and effort.
- The process of creating software programs, applications, and scripts.
- The degree of excellence of something.
- A series of steps taken to achieve a particular end.
- The use of technology to perform tasks automatically or with minimal human intervention.
- An organized collection of data that can be accessed, managed, and updated.
9 Clues: The degree of excellence of something. • A series of steps taken to achieve a particular end. • Measures taken to prevent accidents and injuries in the workplace. • The process of creating software programs, applications, and scripts. • The measure of how much work is accomplished in a specific amount of time. • ...
BlockChain Technology 2023-03-23
Across
- A way to verify and validate transactions on a blockchain network.
- A type of consensus algorithm used in some blockchain networks.
- A way to store data on a blockchain network.
- A decentralized digital ledger system that keeps track of transactions.
- A digital signature that verifies the authenticity of a blockchain transaction.
Down
- A way to protect a blockchain network from attacks and malicious actors.
- A network of computers that work together to maintain a blockchain ledger.
- A type of consensus algorithm used in some blockchain networks.
- The process of validating and recording transactions on a blockchain network.
- A cryptocurrency that was created in 2009 and uses blockchain technology.
10 Clues: A way to store data on a blockchain network. • A type of consensus algorithm used in some blockchain networks. • A type of consensus algorithm used in some blockchain networks. • A way to verify and validate transactions on a blockchain network. • A decentralized digital ledger system that keeps track of transactions. • ...
cyberspace 2021-11-08
Across
- a listing of the computer files stored in memory
- locate and correct errors in a computer program code
- transfer out of a database or document
- transfer a file or program to a smaller computer
Down
- a worldwide network of computer networks
- a set sequence of steps, part of larger computer program
- a facial expression represented by a sequence of characters
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- the organization of data according to preset specifications
9 Clues: transfer out of a database or document • a worldwide network of computer networks • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • a set sequence of steps, part of larger computer program • a facial expression represented by a sequence of characters • ...
School 2014-12-07
Across
- An artificial body placed in orbit in order to collect or for communication
- A vast computer network linking other computer networks worldwide
Down
- The flying or operating of aircraft
- Introduce machines or devices into a process,activity or place
- The branch of technology and industry concerned with both aviation and space flight
- Commercial transactions conducted electronically on the internet
6 Clues: The flying or operating of aircraft • Introduce machines or devices into a process,activity or place • Commercial transactions conducted electronically on the internet • A vast computer network linking other computer networks worldwide • An artificial body placed in orbit in order to collect or for communication • ...
s26 2024-08-04
Across
- A technique for examining the contents of data packets
- Software that collects information about users without their knowledge
- A physical separation between networks to prevent unauthorized access
Down
- A method used to break encryption by trying all possible keys
- The part of a virus or worm that performs the malicious action
- Security Operations Center, where security analysts monitor and manage threats
6 Clues: A technique for examining the contents of data packets • A method used to break encryption by trying all possible keys • The part of a virus or worm that performs the malicious action • A physical separation between networks to prevent unauthorized access • Software that collects information about users without their knowledge • ...
Health and Dental Insurance Vocabulary 2022-03-15
Across
- A flat fee payed when you get care
- When you pay for a percent of care
- Cost you pay each month for insurance
Down
- Amount of money you are supposed to pay, changes based on company
- The action of repaying someone who has spent or lost their money
- A group of dentists under contract with your dental insurance carrier
6 Clues: A flat fee payed when you get care • When you pay for a percent of care • Cost you pay each month for insurance • The action of repaying someone who has spent or lost their money • Amount of money you are supposed to pay, changes based on company • A group of dentists under contract with your dental insurance carrier
GROUP 2 - Network Types & Data Transmission 2025-07-23
Across
- A worldwide system of interconnected networks that use common standards.
- The form of binary data storage that uses 8 bits.
- What type of signal travels as radio waves?
Down
- Type of security system that uses cameras to monitor areas remotely.
- Transmission is achieved by representing data through copper wire.
- A signal type that travels through the air using electromagnetic waves.
- A technology used to track items wirelessly, often using tags.
7 Clues: What type of signal travels as radio waves? • The form of binary data storage that uses 8 bits. • A technology used to track items wirelessly, often using tags. • Transmission is achieved by representing data through copper wire. • Type of security system that uses cameras to monitor areas remotely. • ...
cyberspace 2021-11-08
Across
- a worldwide network of computer networks
- transfer out of a database or document
- a set sequence of steps, part of larger computer program
- a listing of the computer files stored in memory
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
Down
- a facial expression represented by a sequence of characters
- transfer a file or program to a smaller computer
- the organization of data according to preset specifications
- locate and correct errors in a computer program code
9 Clues: transfer out of a database or document • a worldwide network of computer networks • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • a set sequence of steps, part of larger computer program • a facial expression represented by a sequence of characters • ...
Malware Types & Descriptions 2024-03-05
Across
- Grants unauthorized access and allows attackers to control your system.
- Spreads independently through networks, exploiting vulnerabilities.
- Encrypts your files and demands a ransom payment to decrypt them.
- Secretly monitors your activities and gathers information without your knowledge.
Down
- Exploits legitimate programs and system resources to run malicious code, making it harder to detect.
- Disguises itself as legitimate software to gain access to your system.
- Displays unwanted advertisements and gathers data about your browsing habits.
- Self-replicating code that attaches itself to other programs.
- Creates a hidden entry point for attackers to access your system remotely.
9 Clues: Self-replicating code that attaches itself to other programs. • Encrypts your files and demands a ransom payment to decrypt them. • Spreads independently through networks, exploiting vulnerabilities. • Disguises itself as legitimate software to gain access to your system. • Grants unauthorized access and allows attackers to control your system. • ...
Technology in the Classroom 2023-10-09
Across
- a simulation that can use visual and other sensory experiences on a computer or through special displays
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- using new methods or ideas
- a digital form of a printed book
- an optical disc using a high-capacity format containing computer data
Down
- interesting or attractive
- a device for showing films or images on a screen or other surface
- a technique (such as the combining of sound, video, and text) for expressing ideas
- not needing wires to make a connection or to communicate
9 Clues: interesting or attractive • using new methods or ideas • a digital form of a printed book • not needing wires to make a connection or to communicate • a device for showing films or images on a screen or other surface • an optical disc using a high-capacity format containing computer data • ...
Common Internet Terms 2024-10-20
Across
- A device that directs data traffic between computer networks.
- Find old friends and new ones on this yearbook-type website
- Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.
- Common three letter beginning of most web addresses
Down
- The process of transferring data from the internet to your device.
- Social networking program that makes use of tweets and retweets
- Click on a ____________ on a search results page to look at one of the pages a search has uncovered.
- An early name for the Internet was the ________ _______ _________
- Common web address ending for organizations and charities
9 Clues: Common three letter beginning of most web addresses • Common web address ending for organizations and charities • Find old friends and new ones on this yearbook-type website • A device that directs data traffic between computer networks. • Social networking program that makes use of tweets and retweets • ...
Hardware and Software - Crossword Puzzle 2025-07-11
Across
- System, An operating system (OS) is the foundational software that manages a computer's hardware and software resources. It acts as an intermediary between the user and the computer hardware, enabling users to interact with the system and run applications.
- Random Access Memory, is a computer's short-term memory. It temporarily stores data that the CPU needs to quickly access for active tasks, like running applications and processing information. RAM is volatile, meaning data is lost when the computer is turned off.
- An Arithmetic Logic Unit (ALU) is a fundamental component of a computer's Central Processing Unit (CPU) that performs arithmetic and logical operations. It's the part of the CPU that does the actual calculations and comparisons.
- devices, any hardware device that is located outside the computer.
- a motherboard is the main circuit board in a computer, acting as the central communication backbone for all other components. It connects and facilitates communication between the CPU, memory, storage, and other peripherals. Essentially, it's the foundation upon which all other parts of the computer system are built and interact.
- Information and Communication Technology, encompasses all technologies used for handling information and facilitating communication. This includes both hardware and software, such as computers, networks, and the applications that run on them. ICT is a broad term, as the technologies and concepts within it are constantly evolving.
- Network, A computer network is a system of interconnected computing devices that can communicate and share resources with each other. This connection allows devices to exchange data, access information, and utilize shared resources like printers or files. Networks can vary in size and complexity, from small home networks to vast global networks like the internet.
- System, a computer system is a combination of hardware, software, and data working together to perform tasks. It encompasses the physical components (hardware), the instructions and programs (software), and the information being processed (data).
- device, a piece of hardware device that receives information from a computer.
- a person who uses or operates a computer.
- Memory also known as primary memory or RAM (Random Access Memory), is a critical component in computer systems. It serves as the workspace for a computer's processor, storing data and instructions that are actively being used and executed.
- Software, it is designed to run a computer’s hardware and application software, and make the computer system available for use. It serves as the interface between hardware, application software, and the user.
- Device a device that functions as both an input and an output device is called a bi-directional device or input/output (I/O) device. These devices can both receive information from the user or another system (input) and also send information to the user or another system (output). Examples of I/O devices: Touch Screens, Headsets (with microphones and speakers), USB drives, Modems, Hard drives, Sound Cards, Printers/Scanners and VR headsets and Gloves.
Down
- any physical device or equipment used in or with a computer system (anything you can see and touch)
- stands for Read-Only Memory. It is a type of computer memory that stores data permanently and cannot be easily modified or written to after it has been manufactured. ROM is primarily used to store firmware and other essential data that needs to be readily available when a device is powered on.
- Software, a computer program that provides users with tools to accomplish a specific task.
- Software Utility software also known as a utility program or simply a utility, is a type of system software designed to help manage, maintain, and optimize a computer system. These programs perform specific tasks to enhance the performance, security, and functionality of a computer, often assisting with tasks like virus detection, data backup, and file management.
- Storage, also known as auxiliary or external storage, refers to non-volatile memory devices used for long-term data storage that are not actively used by the computer's processor. These devices hold data even when the computer is powered off. Examples include hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, and cloud storage.
- Driver, a software program that is designed to control a particular hardware device that is attached to a computer.
- an integrated circuit that contains all the functions of a central processing unit of a computer.
- a Central Processing Unit, is the "brain" of a computer, responsible for executing instructions and performing calculations. It processes data, controls other components, and manages the overall operation of the computer system.
- The Control Unit (CU) is a fundamental component of a computer's Central Processing Unit (CPU). It acts as the brain of the CPU, directing and coordinating the operations of all other components. The CU fetches instructions, decodes them, and then generates control signals to execute those instructions by directing data flow and managing resources.
- device, a piece of hardware device which is used to enter information to a computer for processing.
- a set of instructions or programs that tells a computer what to do or how to perform a specific task (computer software runs on hardware).
- stands for Universal Serial Bus, is a standard interface for connecting various electronic devices to a computer or other devices for data transfer and power delivery. It's a widely used protocol that allows devices like keyboards, mice, printers, storage devices, and more to communicate with a host device.
- short for information technology. the development and use of IT are certain to bring about changes in education.
26 Clues: a person who uses or operates a computer. • devices, any hardware device that is located outside the computer. • device, a piece of hardware device that receives information from a computer. • Software, a computer program that provides users with tools to accomplish a specific task. • ...
Social Class at Colby 2025-04-23
Across
- unearned advantages that one receives based on aspects of their identity that are valued by society
- unspoken norms and rules in schools that favor the middle and upper classes
- the idea that achievement is based solely on skill and hard work
- behaviors and skills that help you navigate institutions
- networks and relationships that advance your career
- money, property, financial assets
Down
- the process of dividing students into different groups based on their perceived academic abilities
- the idea that inequalities result from moral, behavioral, or intellectual deficiencies
- a group of people within a society who share a similar socioeconomic status
9 Clues: money, property, financial assets • networks and relationships that advance your career • behaviors and skills that help you navigate institutions • the idea that achievement is based solely on skill and hard work • unspoken norms and rules in schools that favor the middle and upper classes • ...
Totonn 2025-07-21
Across
- discarded, worthless, or unwanted material, often used to refer to rubbish, garbage, or litter
- It serves to browse Google, use social networks
- Cereal boxes are usually made of
- the branch of knowledge that deals with applying science and engineering to practical uses.
- an electronic device that processes data, following a set of instructions (a program), to perform various tasks
Down
- Serves to wash the dishes
- to treat or process (used or waste materials) so as to make suitable for reuse:
- a game played with a microcomputer on a video screen or television set.
- recycle newspapers, glass bottles, plastic, and metal.
9 Clues: Serves to wash the dishes • Cereal boxes are usually made of • It serves to browse Google, use social networks • recycle newspapers, glass bottles, plastic, and metal. • a game played with a microcomputer on a video screen or television set. • to treat or process (used or waste materials) so as to make suitable for reuse: • ...
2.03 Check for Understanding 2023-10-10
Across
- Book, article, person, or other resource consulted for information.
- An acronym for a set of rules given to students or employees that outline the restrictions while using their network
- Unbiased; neutral
- Proof that supports statements
- Connected with or related to the matter at hand
Down
- Examine and judge carefully
- Basic Internet and email safety and follows workplace protocols to maintain the security of information, computers, networks, and facilities is called information ______.
- The ability to figure out the type of information you need, find that information, evaluate it, and properly use it is called information _________.
- Believable; reliable
9 Clues: Unbiased; neutral • Believable; reliable • Examine and judge carefully • Proof that supports statements • Connected with or related to the matter at hand • Book, article, person, or other resource consulted for information. • An acronym for a set of rules given to students or employees that outline the restrictions while using their network • ...
UNIT 3 2022-02-04
5 Clues: A person who has university degree • to go in a circle around a central point • Starting to exist, appearing, becoming known • a connected group of people, companies, that exchange information • the quality of being faithful in your support of somebody/something
Solve the crossword puzzle 2023-01-13
My role model 2022-05-02
Across
- A machine witch Turing broke.
- A person whose example success is or can be emulated by others.
- A network of networks witch makes the World wide Web.
- The aggregate of people living together in a more or less ordered community.
Down
- A country placed east of Ireland and south of Scotland.
- A digital electronic machine that can be programmed to carry out sequences of arithmetic or logical operations.
- A branch in science based around computers.
7 Clues: A machine witch Turing broke. • A branch in science based around computers. • A network of networks witch makes the World wide Web. • A country placed east of Ireland and south of Scotland. • A person whose example success is or can be emulated by others. • The aggregate of people living together in a more or less ordered community. • ...
Meal function 2023-09-09
Across
- relaxed and informal setting for meetings, negotiations, or discussions
- special occasions (e.g. birthdays, weddings, anniversaries, graduations)
- promote communication, collaboration, and bonding among colleagues or team members
- preserve, celebrate, and share the cultural heritage and customs of a particular group or community
Down
- make donations in exchange for a meal, and proceeds go toward a charitable cause
- provide opportunity to expand professional networks, meet new contacts, and establish connections
- strategy to promote their products or services
7 Clues: strategy to promote their products or services • relaxed and informal setting for meetings, negotiations, or discussions • special occasions (e.g. birthdays, weddings, anniversaries, graduations) • make donations in exchange for a meal, and proceeds go toward a charitable cause • ...
School 2014-12-07
Across
- The branch of technology and industry concerned with both aviation and space flight
- Introduce machines or devices into a process,activity or place
Down
- A vast computer network linking other computer networks worldwide
- An artificial body placed in orbit in order to collect or for communication
- Commercial transactions conducted electronically on the internet
- The flying or operating of aircraft
6 Clues: The flying or operating of aircraft • Introduce machines or devices into a process,activity or place • Commercial transactions conducted electronically on the internet • A vast computer network linking other computer networks worldwide • An artificial body placed in orbit in order to collect or for communication • ...
Sample 2015-10-05
Across
- transferring part of all of business function to a facility
- interconnected and coordinated set of elements and processes that converts inputs to outputs
- set of connected systems that coordinates the flow of goods and materials
- multidimensional networks of suppliers and outsourcing partners
Down
- contracting out certain business functions or operations
- all elements and processes that add value as raw materials
6 Clues: contracting out certain business functions or operations • all elements and processes that add value as raw materials • transferring part of all of business function to a facility • multidimensional networks of suppliers and outsourcing partners • set of connected systems that coordinates the flow of goods and materials • ...
ASDFYH 2025-02-08
Across
- A unique address assigned to every device on a network. (2 letters)
- A connection point for devices in a network. (3 letters)
- A system that translates domain names into IP addresses. (3 letters)
- A unit of data sent over the internet. (6 letters)
Down
- A device that connects different networks together. (6 letters)
- A company that provides internet access. (3 letters)
6 Clues: A unit of data sent over the internet. (6 letters) • A company that provides internet access. (3 letters) • A connection point for devices in a network. (3 letters) • A device that connects different networks together. (6 letters) • A unique address assigned to every device on a network. (2 letters) • ...
Gender divisions in the post-war period 2025-11-25
Across
- - This was the industry many women's jobs were in
- - This movement attracted women to Unions
- - What happened to Union membership post 1970s
Down
- - What woman created across US as a result of establishing networks
- - Who went on strike at the Farrah Manufacturing Company
- - This is the acronym for the organisation affiliated with AFL-CIO but was more concerned with female unions
6 Clues: - This movement attracted women to Unions • - What happened to Union membership post 1970s • - This was the industry many women's jobs were in • - Who went on strike at the Farrah Manufacturing Company • - What woman created across US as a result of establishing networks • ...
