networks Crossword Puzzles

COSBOA Acronym Challenge 2021-07-01

COSBOA Acronym Challenge crossword puzzle
Across
  1. One half of the duopoly plans to acquire this food distributor.
  2. Industry association for petrol stations. COSBOA member.
  3. This amazing conference will take place in Sydney on the 9th and 10th of September.
  4. Position currently held by Bruce Bilson, previously held by Kate Carnell.
  5. Government agency providing advice on hackers and scams among other things.
  6. Regulator of competition.
  7. When this is implemented, debit card payments go through the cheapest route.
  8. This government agency collects your money!
  9. Industry association for reflexologists, acupuncturists,naturopaths, homeopaths, and more.
Down
  1. One of Australia's domestic payment networks, usually the cheapest option for merchants.
  2. Mental health coaching service by Beyond Blue that recently expanded its program for small business owners.
  3. Australia's peak body exclusively representing the interests of small business.
  4. COSBOA member representing independent supermarkets.
  5. Industry association for bookkeepers. COSBOA member.
  6. Independent body for workplace relations.
  7. Position currently held by Maree Adshead.
  8. Industry association for the banking sector (a COSBOA member also has this acronym).
  9. Regulator of the banks.
  10. Businesses must register their name with this regulator.

19 Clues: Regulator of the banks.Regulator of competition.Independent body for workplace relations.Position currently held by Maree Adshead.This government agency collects your money!COSBOA member representing independent supermarkets.Industry association for bookkeepers. COSBOA member.Industry association for petrol stations. COSBOA member....

Body Systems 2020-11-16

Body Systems crossword puzzle
Across
  1. The ________________ is a short loop from the heart to the lungs and back again
  2. The nerves that go through the whole body make up the __________________
  3. the brain and the spinal cord are the _________________
  4. The ______ is also called the voice box
  5. The human brain weighs ______ pounds
  6. _______ is where most of the body's blood cells are made
  7. Cancellous bone resembles _____
  8. ________ is found in the heart
  9. ____________ are networks of tiny blood vessels
Down
  1. _________ is the solid, hard outside part of the bone
  2. Bones are made up of a framework of a protein called ________
  3. The lungs and ____________ allow us to breathe
  4. smooth muscle is also referred to as_________
  5. The _____ is a big artery that leaves the heart carrying this oxygenated blood
  6. Muscles move body parts by contracting and then ________
  7. ________is attached by cord-like tendons
  8. air enters the respiratory system through the ____ or the mouth.
  9. The _________ is the largest and most complex part of the brain
  10. The __________________ carries blood from the heart to all the other parts of the body and back again

19 Clues: ________ is found in the heartCancellous bone resembles _____The human brain weighs ______ poundsThe ______ is also called the voice box________is attached by cord-like tendonssmooth muscle is also referred to as_________The lungs and ____________ allow us to breathe____________ are networks of tiny blood vessels...

Civil War Dylan Dela Cruz 2017-02-14

Civil War Dylan Dela Cruz crossword puzzle
Across
  1. commander of the confederate Army of Northern Virginia in the American Civil War from 1862 until his surrender in 1865.
  2. south.
  3. seperated from a state so they would not secceed from the union.
  4. Emancipation Proclamation enabled to change the status of slaves in what part of the U.S.?
  5. which side does Ulysses S. Grant command?
  6. known as one the major achievements of the war; sabotage enemy infrastructure,disrupts confederate economy and transportation networks.
  7. president of the U.S. and processed the Emancipation Proclamation.
  8. The ________ court house is the site of the confederate surrender.
  9. northern's main money maker.
Down
  1. withdrawal from a union
  2. civil war starts here.
  3. first and only president of the Confederate States of America.
  4. key point that is an advantage of the war.
  5. three-part strategy to win the civil war.
  6. drafting of civilians to serve in the Army.
  7. court order that says that a person who is jailed to appear before the court to determine he or she is being jailed.
  8. union victory in mississippi
  9. turning point of the civil war; most decisive battle of the war.
  10. union victory.

19 Clues: south.union victory.civil war starts here.withdrawal from a unionunion victory in mississippinorthern's main money maker.three-part strategy to win the civil war.which side does Ulysses S. Grant command?key point that is an advantage of the war.drafting of civilians to serve in the Army.first and only president of the Confederate States of America....

Westward Expansion 2024-11-08

Westward Expansion crossword puzzle
Across
  1. State that the majority of Exodusters headed for
  2. railroad that linked eastern and western rail networks
  3. Hobbit that found the Ring of Power in a cave under the Misty Mountains
  4. Act that forced Native Americans to assimilate
  5. Site of the battle between the Sioux and American Cavalry
  6. Lieutenant that led his men against the Sioux and were all killed
  7. Ceremony that the Lakota Sioux believed would restart the world
  8. Site of a massacre of Native Americans by the army
  9. silver mine that produced $300 million in silver
  10. What would be left behind after a mine went "bust"
  11. Leader of the Exodusters
Down
  1. process by which a person or group adopts another dominate culture
  2. Animals that Plains Indians relied on for food and resources
  3. President that signed the Homestead Act
  4. Leader of the Lakota Sioux
  5. Homesteads that were made of sod instead of wood
  6. Settlers got 160 for free through the Homestead Act
  7. Act that encouraged Americans to settle West by giving free land
  8. created after the transcontinental railroad was formed

19 Clues: Leader of the ExodustersLeader of the Lakota SiouxPresident that signed the Homestead ActAct that forced Native Americans to assimilateState that the majority of Exodusters headed forHomesteads that were made of sod instead of woodsilver mine that produced $300 million in silverSite of a massacre of Native Americans by the army...

Ethylene 2024-01-15

Ethylene crossword puzzle
Across
  1. Networks of transduction pathways regulate cellular responses to change the_____.
  2. ETR1, ERS1, ETR2, EIN4, and ERS2 are examples of _______.
Down
  1. Which of the receptors works as a positive regulator in ethylene signaling?
  2. Where are the ethylene receptors found? (short Form)
  3. One physiological change in the plant cells is _______ uptake by roots.
  4. This "fruit ripening hormone" is also known as ________.

6 Clues: Where are the ethylene receptors found? (short Form)This "fruit ripening hormone" is also known as ________.ETR1, ERS1, ETR2, EIN4, and ERS2 are examples of _______.One physiological change in the plant cells is _______ uptake by roots.Which of the receptors works as a positive regulator in ethylene signaling?...

Text 1 2025-02-03

Text 1 crossword puzzle
Across
  1. Harmful software that damages or exploits computers and networks. (N)
  2. An attempt to steal, damage, or destroy data or systems without permission. (N)
  3. Unhappy or annoyed, often due to unfair treatment. (Adj.)
  4. To do or carry out, often something wrong or illegal. (V)
Down
  1. Punishment or revenge for a past action. (N)
  2. Forcing someone to pay or do something through threats. (N)

6 Clues: Punishment or revenge for a past action. (N)Unhappy or annoyed, often due to unfair treatment. (Adj.)To do or carry out, often something wrong or illegal. (V)Forcing someone to pay or do something through threats. (N)Harmful software that damages or exploits computers and networks. (N)...

Internet 2024-12-04

Internet crossword puzzle
Across
  1. a small segment of a larger message
  2. a temporary storage area on a device that saves copies of frequently visited web pages, images, and other online content
  3. receives and sends data on computer networks
Down
  1. a group of connected computers that are able to send data to each other
  2. a machine that can store and process information.
  3. an application for accessing websites

6 Clues: a small segment of a larger messagean application for accessing websitesreceives and sends data on computer networksa machine that can store and process information.a group of connected computers that are able to send data to each other...

cyberspace 2021-11-08

cyberspace crossword puzzle
Across
  1. a listing of the computer files stored in memory
  2. a set sequence of steps, part of larger computer program
  3. transfer out of a database or document
  4. locate and correct errors in a computer program code
Down
  1. a facial expression represented by a sequence of characters
  2. the organization of data according to preset specifications
  3. a worldwide network of computer networks
  4. transfer a file or program to a smaller computer
  5. a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver

9 Clues: transfer out of a database or documenta worldwide network of computer networksa listing of the computer files stored in memorytransfer a file or program to a smaller computerlocate and correct errors in a computer program codea set sequence of steps, part of larger computer programa facial expression represented by a sequence of characters...

cyberspace 2021-11-08

cyberspace crossword puzzle
Across
  1. a listing of the computer files stored in memory
  2. a set sequence of steps, part of larger computer program
  3. transfer out of a database or document
  4. locate and correct errors in a computer program code
Down
  1. a facial expression represented by a sequence of characters
  2. the organization of data according to preset specifications
  3. a worldwide network of computer networks
  4. transfer a file or program to a smaller computer
  5. a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver

9 Clues: transfer out of a database or documenta worldwide network of computer networksa listing of the computer files stored in memorytransfer a file or program to a smaller computerlocate and correct errors in a computer program codea set sequence of steps, part of larger computer programa facial expression represented by a sequence of characters...

ENCRYPTION 2023-08-22

ENCRYPTION crossword puzzle
Across
  1. A type of encryption where a single key is used for both encryption and decryption.
  2. Privilege The principle that suggests granting users the minimum privileges required.
  3. This type of encryption uses a pair of keys: public and private.
  4. Administrator The role responsible for managing and maintaining databases.
  5. The process of disguising plaintext within another message or medium.
Down
  1. The process of converting encrypted data back to its original form.
  2. A protocol used for ensuring secure communication over the internet.
  3. The role that often holds elevated privileges to manage database access.
  4. An encryption standard commonly used for securing Wi-Fi networks.

9 Clues: This type of encryption uses a pair of keys: public and private.An encryption standard commonly used for securing Wi-Fi networks.The process of converting encrypted data back to its original form.A protocol used for ensuring secure communication over the internet.The process of disguising plaintext within another message or medium....

Malware and Social Engineering Crossword 2023-11-22

Malware and Social Engineering Crossword crossword puzzle
Across
  1. A
  2. A software with malicious intent
  3. A type of virus which does not carry out malicious activity but uses up the networks resources
  4. A
  5. A type of virus where your files are held at ransom and you are told to pay to get them back
Down
  1. A
  2. A type of spyware which monitors every key typed on a computer
  3. A type of Phishing
  4. A
  5. A malware which replicates itself and modifies code and other computer programmes
  6. A type of software which monitors and gathers information on a computer
  7. A type of virus which appears as something you want but also performs malicious actions

12 Clues: AAAAA type of PhishingA software with malicious intentA type of spyware which monitors every key typed on a computerA type of software which monitors and gathers information on a computerA malware which replicates itself and modifies code and other computer programmes...

Malware 2023-11-21

Malware crossword puzzle
Across
  1. A piece of software that appears to perform a useful function but unbeknownst to the user performs malicious actions
  2. Software that is designed to gain access to your computer with malicious intent
  3. It infects a computer and causes it to download or display malicious adverts
  4. A large collection of malware-infected devices
Down
  1. Encrypts files, attacker asks for money to decrypt them
  2. Automated programs that perform tasks repeatedly
  3. A malicious form of self replicating software
  4. A self replicating software that causes problems by using up a networks bandwidth
  5. Unwanted software that monitors and gathers information on a person

9 Clues: A malicious form of self replicating softwareA large collection of malware-infected devicesAutomated programs that perform tasks repeatedlyEncrypts files, attacker asks for money to decrypt themUnwanted software that monitors and gathers information on a personIt infects a computer and causes it to download or display malicious adverts...

Digital Citizenship Crossword Puzzle 2023-11-02

Digital Citizenship Crossword Puzzle crossword puzzle
Across
  1. The practice of protecting computer systems and networks from digital attacks.
  2. Etiquette Appropriate behavior and manners when interacting with others online.
  3. Media Websites and apps that allow users to create and share content with others.
  4. Attempting to obtain sensitive information, like usernames and passwords, by pretending to be a trustworthy entity.
  5. A secret combination of characters used to access your accounts.
Down
  1. The legal protection of an original creative work (e.g., music, writing) from unauthorized use.
  2. Footprint The trail of data you create while using the internet.
  3. Harassment or threats that occur on the internet.
  4. Your right to keep personal information safe online.

9 Clues: Harassment or threats that occur on the internet.Your right to keep personal information safe online.Footprint The trail of data you create while using the internet.A secret combination of characters used to access your accounts.The practice of protecting computer systems and networks from digital attacks....

Network Hardware 2024-05-10

Network Hardware crossword puzzle
Across
  1. 7-9-4,Allows a computer to connect to a network.
  2. 6, Allows devices to be connected within a network. Sends data to only the intended recipient.
  3. 5, Translates between digital signals and analogue signals for internet connection.
Down
  1. 8,Amplifies and retransmits signals to extend a network's range.
  2. 8, Acts as a security barrier, filtering incoming and outgoing traffic.
  3. 7,A device that serves as an entry point to another network.
  4. 8-6-5,Enables wireless connections to a network.
  5. 6, Connects and routes data between different networks.
  6. 3,Allows devices to be connected within a network. Broadcasts all data it receives.

9 Clues: 8-6-5,Enables wireless connections to a network.7-9-4,Allows a computer to connect to a network.6, Connects and routes data between different networks.7,A device that serves as an entry point to another network.8,Amplifies and retransmits signals to extend a network's range.8, Acts as a security barrier, filtering incoming and outgoing traffic....

Techy Wishlist 2025-05-17

Techy Wishlist crossword puzzle
Across
  1. A 3D image formed by the interference of light beams
  2. Technology that overlays digital images or data onto the real world
  3. Vehicles that use AI, sensors, and cameras to drive without human input.
  4. Online storage and computing services accessible over the internet.
Down
  1. The virtual environment of computer networks where digital communication happens.
  2. A residence that can be controlled remotely or automatically,often connected to the internet
  3. Small electronic devices that perform specific functions,often useful or entertaining.
  4. A computer-generated simulation of a 3D environment that users can interact with cyberspace
  5. The science and technology of designing, building, and using robots

9 Clues: A 3D image formed by the interference of light beamsTechnology that overlays digital images or data onto the real worldThe science and technology of designing, building, and using robotsOnline storage and computing services accessible over the internet.Vehicles that use AI, sensors, and cameras to drive without human input....

Cybersecurity Ylan 2024-11-07

Cybersecurity Ylan crossword puzzle
Across
  1. A test used to verify if a user is human and not a robot.
  2. A program that protects your computer from viruses.
  3. Network of devices connected to the internet to exchange data.
  4. A company that makes equipment and software to help connect and protect computer networks.
  5. A secret part of the internet, often used for anonymous activities.
Down
  1. A unique number that identifies a computer or device on the internet or a network.
  2. A protocol used to connect and control a remote computer.
  3. A secret word or code to log in.
  4. A person who tries to break into computers illegally.

9 Clues: A secret word or code to log in.A program that protects your computer from viruses.A person who tries to break into computers illegally.A protocol used to connect and control a remote computer.A test used to verify if a user is human and not a robot.Network of devices connected to the internet to exchange data....

Internet Infrastructure 2024-11-12

Internet Infrastructure crossword puzzle
Across
  1. a switch that can also send data across networks
  2. unique identifier that points to an IP address
  3. the combination of both a switch and a modem
  4. a device that serves as a bridge between a LAN and WAN
  5. Application Programming Interface
  6. the time it takes for one piece of data to go from point A to point B in a network
Down
  1. the protocol that allows for communication within a LAN
  2. according to the FCC, this must deliver a certain upload and download speed to qualify
  3. the amount of data that can be sent during a specific unit of time across a network

9 Clues: Application Programming Interfacethe combination of both a switch and a modemunique identifier that points to an IP addressa switch that can also send data across networksa device that serves as a bridge between a LAN and WANthe protocol that allows for communication within a LAN...

Risks of Emerging Technology 2025-10-03

Risks of Emerging Technology crossword puzzle
Across
  1. Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
  2. Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
  3. Automation errors, lack of human oversight, cyber vulnerabilities
  4. Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
  1. Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
  2. Security of virtual environments, fraud in immersive platforms, and privacy issues
  3. Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
  4. Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
  5. Potential to break current cryptographic systems which may lead to data breaches and fraud

9 Clues: Automation errors, lack of human oversight, cyber vulnerabilitiesPrivacy concerns, data theft, spoofing attacks and regulatory scrutinyAlgorithmic bias, model errors, data privacy and misuse in fraud/cyberattacksRegulatory uncertainty, scalability challenges, smart contract vulnerabilities....

IT Quiz 2020-04-17

IT Quiz crossword puzzle
Across
  1. Linux based operating system
  2. How users communicate with a computer
Down
  1. Allows Linux computers to connect to networks
  2. Has word processing and spreadsheet programs

4 Clues: Linux based operating systemHow users communicate with a computerHas word processing and spreadsheet programsAllows Linux computers to connect to networks

computer science 2025-10-21

computer science crossword puzzle
Across
  1. a digital letter
  2. another word for procedure
Down
  1. a big server with lots of networks
  2. The effective centre of an activity, region, or network.

4 Clues: a digital letteranother word for procedurea big server with lots of networksThe effective centre of an activity, region, or network.

Are your parents your "friends" in social networks? 2021-01-18

Are your parents your "friends" in social networks? crossword puzzle
Across
  1. more and more; zunehmend p.47
  2. inner; innewohnend/innere(r)
  3. downside; Nachteil
  4. give up and admit that sth is true
  5. very important; lebenswichtig. p.43
  6. Privatsphäre
  7. not accept sth (ablehnen)
  8. completely, fully
Down
  1. authorization; Erlaubnis
  2. come into existence
  3. keep away from sth, not do sth; vermeiden
  4. for this reason, as a consequence. p.40
  5. offense; Einbruch/Eindringen/Eingriff
  6. mainly/ most importantly
  7. a call for sth; die Bitte
  8. disappear, leave
  9. makes you feel uncomfortable; peinlich
  10. tension is gone; erleichtert (sich...fühlen)

18 Clues: Privatsphäredisappear, leavecompletely, fullydownside; Nachteilcome into existenceauthorization; Erlaubnismainly/ most importantlya call for sth; die Bittenot accept sth (ablehnen)inner; innewohnend/innere(r)more and more; zunehmend p.47give up and admit that sth is truevery important; lebenswichtig. p.43offense; Einbruch/Eindringen/Eingriff...

Introduction To Computer Networks || Lecturer :Kelly Jae Ferguson 2018-04-03

Introduction To Computer Networks || Lecturer :Kelly Jae Ferguson crossword puzzle
Across
  1. 32 bit dotted decimal IP address version
  2. Layer which provides a firm communication interface and end-user services
  3. When data flows in one direction at a time
  4. The most common type of LAN
  5. Cables cables are broadly classified into two types namely Single-mode and Multi-mode
  6. Wireless standard that secures the data with the much stronger TKIP encryption algorithm.
  7. Use IP addresses to forward traffic to other networks
  8. The world's largest WAN
  9. Server Server which translates Internet Protocol (IP) addresses to human-readable names
Down
  1. Application used to block certain IP addresses
  2. Used by sending host to add one or more protocol headers
  3. Each device is connected to two other devices in this topology
  4. Regenerates weak signals
  5. Computer hardware component that connects a computer to a computer network
  6. Ethernet cables connect two host devices
  7. Protocol Data Units at the network access layer
  8. IP address that is assigned is unique to each host within the same network or subnet
  9. The amount of time it takes data to travel from source to destination

18 Clues: The world's largest WANRegenerates weak signalsThe most common type of LAN32 bit dotted decimal IP address versionEthernet cables connect two host devicesWhen data flows in one direction at a timeApplication used to block certain IP addressesProtocol Data Units at the network access layerUse IP addresses to forward traffic to other networks...

Introduction To Computer Networks Lecturer :Kelly Jae Ferguson 2018-04-03

Introduction To Computer Networks                                     Lecturer :Kelly Jae Ferguson crossword puzzle
Across
  1. Layer which provides a firm communication interface and end-user services
  2. When data flows in one direction at a time
  3. Ethernet cables connect two host devices
  4. Used by sending host to add one or more protocol headers
  5. The world's largest WAN
  6. The amount of time it takes data to travel from source to destination
  7. Use IP addresses to forward traffic to other networks
  8. Protocol Data Units at the network access layer
  9. 32 bit dotted decimal IP address version
Down
  1. Wireless standard that secures the data with the much stronger TKIP encryption algorithm.
  2. Computer hardware component that connects a computer to a computer network
  3. Cables cables are broadly classified into two types namely Single-mode and Multi-mode
  4. Regenerates weak signals
  5. Each device is connected to two other devices in this topology
  6. Application used to block certain IP addresses
  7. The most common type of LAN
  8. IP address that is assigned is unique to each host within the same network or subnet
  9. Server Server which translates Internet Protocol (IP) addresses to human-readable names

18 Clues: The world's largest WANRegenerates weak signalsThe most common type of LANEthernet cables connect two host devices32 bit dotted decimal IP address versionWhen data flows in one direction at a timeApplication used to block certain IP addressesProtocol Data Units at the network access layerUse IP addresses to forward traffic to other networks...

Security Threats 2021-07-09

Security Threats crossword puzzle
Across
  1. Takes advantage of a vulnerability in order to access or infect a computer
  2. software that permits advertisers or hackers to gather sensitive information without your permission
  3. a form of malware that replicates across the Internet or local networks
  4. software that denies you access to your files or computer until you pay a ransom
  5. a form of trap security specialists use to detect hacking attacks or collect malware samples
  6. malicious computer programs that can spread to other files
Down
  1. A collection of infected computers that are remotely controlled by a hacker
  2. malicious software
  3. unsolicited bulk email
  4. Files placed on your computer that allow websites to remember details
  5. reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
  6. software add-ons designed to fix software bugs
  7. deceiving recipients into sharing sensitive

13 Clues: malicious softwareunsolicited bulk emaildeceiving recipients into sharing sensitivesoftware add-ons designed to fix software bugsmalicious computer programs that can spread to other filesFiles placed on your computer that allow websites to remember detailsa form of malware that replicates across the Internet or local networks...

Theoretical and methodological foundations of determining behavior of small business entities in network activities and network offer! 2025-12-15

Theoretical and methodological foundations of determining behavior of small business entities in network activities and network offer! crossword puzzle
Across
  1. – Joint actions of businesses to achieve mutual benefits.
  2. platform – An online system that connects businesses and customers.
  3. offer – The set of products or services provided through a business network.
  4. – A system of interconnected businesses cooperating to achieve common goals.
  5. activity – Business operations carried out through interconnected firms or digital platforms.
  6. – A set of methods and approaches used to analyze business activities.
  7. – A long-term cooperative relationship between business entities.
Down
  1. exchange – The sharing of data and knowledge among network participants.
  2. behavior – The way firms make decisions and react to market conditions.
  3. – The ability of a business to adapt to changes in a network environment.
  4. – The introduction of new ideas, products, or methods in business networks.
  5. – The process of working together to create shared value.
  6. segment – A specific group of customers targeted by businesses.
  7. business – Business entities that operate on a small scale with limited resources.
  8. – A system of ideas explaining the behavior of small business entities.

15 Clues: – Joint actions of businesses to achieve mutual benefits.– The process of working together to create shared value.segment – A specific group of customers targeted by businesses.– A long-term cooperative relationship between business entities.platform – An online system that connects businesses and customers....

Types of Engineering 2022-07-26

Types of Engineering crossword puzzle
Across
  1. designing spacecraft, aircraft, satellites, and missiles
  2. care for internal systems of ships, submarines, sailboats, and tankers
  3. work on systems and instruments that can derive the benefit of nuclear energy
  4. solve problems that affect the use or production of chemicals, food, drugs, and more
  5. improve issues such as drinking water, climate change, public and sustainability
  6. solve problems concerning the storage and processing of agricultural products
  7. designing, building, and maintaining bridges, roads, tunnel, and water systems
Down
  1. designing, building, and developing engines, tools, and machines
  2. works with computer components such as circuit boards, processors, networks, and routers
  3. specialize in working designing and building robots
  4. study the properties and structures of metals, ceramics, plastics, and more
  5. working to extract oil and gas from below Earth's surface
  6. designing, testing, and manufacturing with components with electricity
  7. ensure individuals in a workplace remain safe from potential injury and other health hazards

14 Clues: specialize in working designing and building robotsdesigning spacecraft, aircraft, satellites, and missilesworking to extract oil and gas from below Earth's surfacedesigning, building, and developing engines, tools, and machinescare for internal systems of ships, submarines, sailboats, and tankers...

Computer Science Crossword 2023-05-02

Computer Science Crossword crossword puzzle
Across
  1. An email sent by attacker that tricks users into providing information
  2. System where numbers are expressed 0 or 1
  3. Rules for communication between browsers
  4. A network that connects devices around the world
  5. Allows computer to make decisions
  6. Removing errors from computer
  7. Any group of word or symbols that is a value
Down
  1. The hierarchical addressing protocol that is human-readable
  2. Converting information into code to prevent unauthorized access
  3. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  4. Using a looping control structure, such as for, repeat
  5. File or code that typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  6. Manage the breakdown of a message into packets to be transmitted and reconstructed after arrival
  7. Device that route traffic between networks

14 Clues: Removing errors from computerAllows computer to make decisionsRules for communication between browsersSystem where numbers are expressed 0 or 1Device that route traffic between networksAny group of word or symbols that is a valueA network that connects devices around the worldUsing a looping control structure, such as for, repeat...

Service Desk Refresher 3 2023-06-30

Service Desk Refresher 3 crossword puzzle
Across
  1. If a user's disk quota is full, they can still log into ieng6 via this method
  2. Service managed by Messaging Collaboration related to email security
  3. Certain classes provide users with a specific ___ account
  4. Wired computers automatically obtain IP addresses through this protocol
  5. The standard for the PROTECTED networks; also related to the software team
  6. Alumni might need to use this Google tool, but not for ordering food
  7. The team that can schedule dry runs of a room for users
Down
  1. Emails ending with -l or -g are called an email ___
  2. A synonym for a long poem, for which we send all related issues to Health
  3. The method by which former employees can retain their email, "brought to you by" their department
  4. Type of block affecting people off-campus
  5. Questions about the campus firewall should go to this group
  6. The group that faculty can call for Canvas questions/issues
  7. Contact for revoked Business Systems

14 Clues: Contact for revoked Business SystemsType of block affecting people off-campusEmails ending with -l or -g are called an email ___The team that can schedule dry runs of a room for usersCertain classes provide users with a specific ___ accountQuestions about the campus firewall should go to this group...

Industry 4.0 Newsletter 2024-03-14

Industry 4.0 Newsletter crossword puzzle
Across
  1. A machine used to smoothen and polish paper
  2. A standardized test used to measure the drainage rate of pulp suspension
  3. A machine used to remove water from pulp to form paper
  4. measure of how much the values in a dataset vary from the mean
  5. An algorithmic approach that iteratively improves a solution
  6. ________ is an unsupervised ML algorithm for classifying data into groups
  7. ________ machine learning algorithms deal with labelled data
Down
  1. ________ length is a measure indicating the strength of a paper
  2. A method for checking the accuracy and quality of the data
  3. _______ capture is a method for mitigating greenhouse gas emissions by trapping and containing carbon dioxide
  4. The process of transforming unstructured data into structured data
  5. A type of machine learning algorithm inspired by the structure of the brain, _______ Networks
  6. A statistical technique for estimating the relationship between variables
  7. It is the nearest Paper Machine to the Admin Block in ITC BCM

14 Clues: A machine used to smoothen and polish paperA machine used to remove water from pulp to form paperA method for checking the accuracy and quality of the dataAn algorithmic approach that iteratively improves a solution________ machine learning algorithms deal with labelled dataIt is the nearest Paper Machine to the Admin Block in ITC BCM...

Computer Science Crossword 2024-03-19

Computer Science Crossword crossword puzzle
Across
  1. Protecting computers and networks from theft or damage.
  2. Wireless local area network that uses radio waves to connect devices to the internet.
  3. An icon or figure representing a person in video games, forums, etc.
  4. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. The ability to read and write.
  6. A secret word or phrase that must be used to gain admission to something.
  7. A computer program designed to simulate conversation with human users.
Down
  1. The programs and other operating information used by a computer.
  2. Facts and statistics collected for reference or analysis.
  3. A system of numerical notation that has 2 rather than 10 as a base.
  4. The action or practice of playing video games.
  5. A program or piece of software designed to fulfill a particular purpose.
  6. The physical parts of a computer system.
  7. A step-by-step procedure for calculations.

14 Clues: The ability to read and write.The physical parts of a computer system.A step-by-step procedure for calculations.The action or practice of playing video games.Protecting computers and networks from theft or damage.Facts and statistics collected for reference or analysis.The programs and other operating information used by a computer....

Vocbulary - compound nouns in IT industry 2024-09-11

Vocbulary - compound nouns in IT industry crossword puzzle
Across
  1. A copy of data stored separately to protect against loss.
  2. The process of transferring data from a remote system to a local one.
  3. A security system that controls incoming and outgoing network traffic
  4. A device used to input text and commands into a computer.
  5. A unique identifier used to log into a system or account.
  6. The protection of computer systems and networks from attacks.
  7. The physical components of a computer system, like the CPU, monitor, and keyboard.
  8. A group of connected computers and devices that share resources.
Down
  1. The process of transferring data from a local system to a remote one.
  2. A secret word or phrase used to access a system or account.
  3. The main page of a website that users first see.
  4. Programs and applications that run on computers and devices.
  5. A collection of related web pages accessed via the internet.
  6. A structured collection of data stored electronically

14 Clues: The main page of a website that users first see.A structured collection of data stored electronicallyA copy of data stored separately to protect against loss.A device used to input text and commands into a computer.A unique identifier used to log into a system or account.A secret word or phrase used to access a system or account....

cybersecurity Crossword 2025-08-26

cybersecurity Crossword crossword puzzle
Across
  1. Type of hacker who violates securities for personal gain
  2. Any information that can be acccessed through a combination of information
  3. Revealing of personal details online with intention of harassment, intimidation, or threats
  4. Special piece of software that stores data and can be easily acccessed
  5. Information stored digitally
  6. Field dedicated to the protection of individuals and corporations from the misuse of technology
Down
  1. Using the internet with intentions of with intention of harassment, intimidation, or threats
  2. System that connects multiple devices to enable communication and sharing internet, files, etc.
  3. A weakness or flaw in a digital system or software
  4. Type of hacker who uses their skills to test and assess the security of networks and systems
  5. Someone who wrongly uses a software or database than intended
  6. A term meaning that a system was acccessed by someone unauthorized
  7. Person in charge of maintaining a network
  8. Type of hacker who may violates laws without ill intent

14 Clues: Information stored digitallyPerson in charge of maintaining a networkA weakness or flaw in a digital system or softwareType of hacker who may violates laws without ill intentType of hacker who violates securities for personal gainSomeone who wrongly uses a software or database than intended...

Learning about learning 2024-03-01

Learning about learning crossword puzzle
Across
  1. digital learning, networks, information flow, knowledge construction, connectivity, and technology
  2. a way of learning in which shared traditions, values, customs, language, and intergenerational knowledge transfer
Down
  1. a way of learning that improves through group interaction, cooperation, and shared goals
  2. cultural identity, traditions, ancestral knowledge, community resilience
  3. our emotional well-being
  4. learning that is rooted in nature, environment, sustainability, and indigenous knowledge

6 Clues: our emotional well-beingcultural identity, traditions, ancestral knowledge, community resiliencea way of learning that improves through group interaction, cooperation, and shared goalslearning that is rooted in nature, environment, sustainability, and indigenous knowledge...

ICT in Construction 2020-04-14

ICT in Construction crossword puzzle
Across
  1. ICT creates the big _____________ into construction industry
  2. ___________ is a device used in information and communication technology
Down
  1. people can ______________ in real-time with others in different countries using technologies
  2. ICT encompasses both the ____________-enabled sphere as well as the mobile one powered by wireless networks
  3. ___________ is known as one of the component of ICT
  4. a large number of _________ are generated and exchanged

6 Clues: ___________ is known as one of the component of ICTa large number of _________ are generated and exchangedICT creates the big _____________ into construction industry___________ is a device used in information and communication technologypeople can ______________ in real-time with others in different countries using technologies...

Exams 2023-06-15

Exams crossword puzzle
Across
  1. numbers with decimal points and lesser precision
  2. The primary source of news and entertainment for many households
  3. A way of connecting different computer networks together.
Down
  1. The tab in MS PowerPoint that allows you to add and manage animations in a presentation.
  2. tab that consists of variants and customize groups
  3. A type of data that represents true or false values

6 Clues: numbers with decimal points and lesser precisiontab that consists of variants and customize groupsA type of data that represents true or false valuesA way of connecting different computer networks together.The primary source of news and entertainment for many households...

CYBERSECURITY 2015-03-25

CYBERSECURITY crossword puzzle
Across
  1. ... device forensics roots began when mobile devices started to become popular, about 2000.
  2. Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
  3. ...are fast moving and increasing in number and severity.
Down
  1. ISACA publication Transforming ...
  2. Digital forensics scientific process: ...of custody.
  3. ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
  4. Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.

7 Clues: ISACA publication Transforming ...Digital forensics scientific process: ...of custody....are fast moving and increasing in number and severity.... device forensics roots began when mobile devices started to become popular, about 2000....reasoning uses a series of specific pieces of information to extrapolate a broad conclusion....

Network Tepology 2016-10-27

Network Tepology crossword puzzle
Across
  1. a device that connects two Ethernet networks
  2. a server which connects all computers
  3. making a code simple
  4. it is a box with the server for the internet
Down
  1. refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range. For example, an audio signal may have a baseband range from 20 to 20,000 hertz.
  2. a bus with topology
  3. making a file into a code

7 Clues: a bus with topologymaking a code simplemaking a file into a codea server which connects all computersa device that connects two Ethernet networksit is a box with the server for the internet...

Cyber Ethics 2025-06-11

Cyber Ethics crossword puzzle
Across
  1. - secretly break into computers to steal or destroy data
  2. - being aware the ethical practices and behaving responsibly while using the internet
  3. - impression or information about a person that exists on internet because of his online activities
  4. - unwanted bulk emails coming from unwanted resource
Down
  1. - criminal activities involving computer, networks and internet
  2. - defined as legal rules and restrictions imposed on online users
  3. - act of using or imitating the language and thoughts of another person as one's original work

7 Clues: - unwanted bulk emails coming from unwanted resource- secretly break into computers to steal or destroy data- criminal activities involving computer, networks and internet- defined as legal rules and restrictions imposed on online users- being aware the ethical practices and behaving responsibly while using the internet...

TecNova Set-1 2021-09-17

TecNova Set-1 crossword puzzle
Across
  1. To Measure Voltage or Potential Difference
  2. Type of Security for Computers and Networks
Down
  1. This Engineer work at places like Google&Apple Like Company.
  2. A Human Colony on the moon would be planned by these types of Engineers
  3. Converts Electrical Energy into Sound Energy

5 Clues: To Measure Voltage or Potential DifferenceType of Security for Computers and NetworksConverts Electrical Energy into Sound EnergyThis Engineer work at places like Google&Apple Like Company.A Human Colony on the moon would be planned by these types of Engineers

Lessons 1-9 Crossword 2015-09-30

Lessons 1-9 Crossword crossword puzzle
Across
  1. A related group of networked computers.
  2. Malicious code.
  3. Website used for HTML Essential Training.
  4. Number of seconds you can legally use of music or lyrics.
  5. What kind of language you should use rather than subjective, boastful, or exaggerated.
  6. Popular ones of these are Google, Yahoo!, and AOL.
  7. Where Lynda.com can be accessed from for UT students.
  8. Number of images you can legally use from one artist or photographer.
  9. Reading on a screen is _____ _____ % slower than reading from paper.
  10. The main technology for local area networks.
Down
  1. Type of operators for search engines that include "AND", "OR", and "NOT".
  2. Converts the bits a computer outputs into a form that is compatible with a carrier.
  3. Communication in which both the sender and the receiver are active at the same time.
  4. Using UT IT resources in an unauthorized manner.
  5. Hypertext Markup Language.
  6. The number of employees for ScrippNetworks.
  7. Used to view web pages containing text, images, videos, and other multimedia.
  8. Data stored to help load webpages faster.
  9. A group of information on a computer that can be software programs or data.

19 Clues: Malicious code.Hypertext Markup Language.A related group of networked computers.Website used for HTML Essential Training.Data stored to help load webpages faster.The number of employees for ScrippNetworks.The main technology for local area networks.Using UT IT resources in an unauthorized manner.Popular ones of these are Google, Yahoo!, and AOL....

Insider Threat 2022-09-21

Insider Threat crossword puzzle
Across
  1. The ability and opportunity to obtain knowledge of classified sensitive information
  2. A potential risk indicator for person living above his means
  3. Devotion or loyalty to a person, group, cause, or country
  4. You are required to ------ suspicious behavior
  5. Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, Networks, or systems
  6. An adversary having the intent, capability, and opportunity to cause loss or damage
Down
  1. Reportable action (two words)
  2. Goal of an Insider Threat Program
  3. An employee who hates his job to the point of aggression
  4. -------- Assistance Program
  5. ---- -------- Monitoring (two words)
  6. Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities

12 Clues: -------- Assistance ProgramReportable action (two words)Goal of an Insider Threat Program---- -------- Monitoring (two words)You are required to ------ suspicious behaviorAn employee who hates his job to the point of aggressionDevotion or loyalty to a person, group, cause, or countryA potential risk indicator for person living above his means...

NEETS MODULE 1 CHAPTER 3 DIRECT CURRENT 2020-08-07

NEETS MODULE 1 CHAPTER 3 DIRECT CURRENT crossword puzzle
Across
  1. The basic unit of electrical current.
  2. The flow of electrons past a reference point.
  3. An individual current path in a parallel circuit.
  4. A circuit that consists of both series and parallel networks.
  5. A low resistance connection between two points of different potential in a circuit
  6. An electric current that flows in one direction only.
Down
  1. An arrangement where electrical devices are connected so that the total current must flow through all the devices
  2. a circuit which does not provide a complete path for the flow of current.
  3. Two or more electrical devices connected to the same pair of terminals so separate currents flow through each
  4. The complete path of an electric current.
  5. The unit of electrical resistance.
  6. A combination of electrical components.

12 Clues: The unit of electrical resistance.The basic unit of electrical current.A combination of electrical components.The complete path of an electric current.The flow of electrons past a reference point.An individual current path in a parallel circuit.An electric current that flows in one direction only....

Glitchsters Recruitment Test 2021-04-27

Glitchsters Recruitment Test crossword puzzle
Across
  1. The power to influence or direct people's behaviour or the outcome of events
  2. A system of government that is dictatorial and requires complete subservience to the state
  3. Use of computer networks to gain illicit access to confidential information, typically held by a government or other organisation
  4. Held in or conducted with secrecy
  5. The ability of an individual or group to seclude themselves, and thereby express themselves selectively
Down
  1. To check the progress or quality of something
  2. To comply with certain standards of society
  3. The monitoring of behaviour, activities, or information for the purpose of information gathering, and influencing
  4. Facts and statistics collected together for analysis
  5. State of being unknown to most people
  6. Freedom from restrictions on thought or behaviour
  7. Breaking into a computer system or a private network through a computer

12 Clues: Held in or conducted with secrecyState of being unknown to most peopleTo comply with certain standards of societyTo check the progress or quality of somethingFreedom from restrictions on thought or behaviourFacts and statistics collected together for analysisBreaking into a computer system or a private network through a computer...

TCOE Business Day of Job 2023-03-22

TCOE Business Day of Job crossword puzzle
Across
  1. Allows callers to be automatically transferred to an extension; a virtual receptionist
  2. IP number is the number the customer uses
  3. A customer setting; open access port for information to route through
  4. Wifi provided to a designated area
  5. Provides a backup connection keeping customers online during times of service or power interruption. Battery backup provided.
  6. IP stays the same over time (3 words)
Down
  1. The order in switch numbers roll when previous line is busy
  2. Restrictions on the modem, i.e. pass through mode- Internet only no wifi
  3. Add equipment/load statistics only
  4. The packet of information that we send to the modem to tell it what speed services to allow/
  5. Provides advanced-feature Private Wifi and Guest Wifi Networks
  6. An appointment that has to be scheduled ASAP

12 Clues: Add equipment/load statistics onlyWifi provided to a designated areaIP stays the same over time (3 words)IP number is the number the customer usesAn appointment that has to be scheduled ASAPThe order in switch numbers roll when previous line is busyProvides advanced-feature Private Wifi and Guest Wifi Networks...

Networking 2023-05-01

Networking crossword puzzle
Across
  1. The language computers within networks use to communicate
  2. The maximum range of frequencies in a band
  3. A network of devices within a small local area, such as a building
  4. How connections are arranged in a network
  5. A program or device that provides service to a client
Down
  1. Hiding the contents of data by encoding it
  2. A protective fortification around a network that requires a password to get through
  3. A network used within a business, inaccessible by outsiders
  4. A unique identification address that identifies a device on a network
  5. A person that controls a network and has access to all aspects of it, can change things in it
  6. A person that pays for and uses a network
  7. A virtual point where connection are start and finish

12 Clues: A person that pays for and uses a networkHow connections are arranged in a networkHiding the contents of data by encoding itThe maximum range of frequencies in a bandA virtual point where connection are start and finishA program or device that provides service to a clientThe language computers within networks use to communicate...

Computer Systems 2013-10-24

Computer Systems crossword puzzle
Across
  1. device – Used to transfer data out of a computer eg.Speakers
  2. - the exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material.
  3. - a group or system of interconnected people or things.
  4. - the programs and other operating information used by a computer.
  5. – Where data is stored e.g. Computer
Down
  1. - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  2. – A structured set of data held in a computer
  3. - the machines, wiring, and other physical components of a computer or other electronic system.
  4. - Brains of the computer
  5. - Internal storage areas in the computer
  6. - a panel of keys that operate a computer or typewriter.
  7. - random access memory

12 Clues: - random access memory- Brains of the computer– Where data is stored e.g. Computer- Internal storage areas in the computer– A structured set of data held in a computer- a group or system of interconnected people or things.- a panel of keys that operate a computer or typewriter.device – Used to transfer data out of a computer eg.Speakers...

We Are Still Here 2025-04-07

We Are Still Here crossword puzzle
Across
  1. Laws that help protect native children from being taken from native homes and support help support native education.
  2. Native people speaking up about their rights and the
  3. Speaking up for individual rights.
  4. How land is controlled and divided.
  5. Tribal people being encouraged and pushed off of their lands away from families and support networks.
Down
  1. Native Americans pressuring congress to change federal laws to start supporting tribal sovereignty.
  2. Challenging federal laws and policies that had previously banned tribal religious practices.
  3. Finding ways to help Native people succeed economically; including opening casinos.
  4. to adopt someone elses beliefs and practices.
  5. Laws passed to allow, encourage, teach and finance native languages being spoken.
  6. To stop honoring treaty agreements of over 100 tribes.
  7. New laws made by congress to help native people.

12 Clues: Speaking up for individual rights.How land is controlled and divided.to adopt someone elses beliefs and practices.New laws made by congress to help native people.Native people speaking up about their rights and theTo stop honoring treaty agreements of over 100 tribes.Laws passed to allow, encourage, teach and finance native languages being spoken....

Technology - Unit 12 2025-03-06

Technology - Unit 12 crossword puzzle
Across
  1. A digital world where users can interact in simulated environments.
  2. Programs and operating systems used by a computer.
  3. The field involving computers, networks, and data
Down
  1. A type of malicious program designed to secretly gather user information.
  2. The act of moving content up or down on a screen.
  3. A platform that allows people to connect, share, and interact online.
  4. A malicious attempt to damage or disrupt computer systems, often over the internet.
  5. Moving an item on a computer screen by clicking and holding it with a mouse.
  6. A system for communicating via physical letters instead of electronic messages.
  7. The physical parts of a computer system.
  8. Sending digital content, such as videos or music, in real-time over the internet.
  9. A sudden failure of a computer or software system.

12 Clues: The physical parts of a computer system.The act of moving content up or down on a screen.The field involving computers, networks, and dataPrograms and operating systems used by a computer.A sudden failure of a computer or software system.A digital world where users can interact in simulated environments....

Ethics in AT 2024-09-04

Ethics in AT crossword puzzle
Across
  1. Fairness in individual, interpersonal, organizational, and societal contexts
  2. The constructed norms of internal consistency regarding what is right and what is wrong
  3. Not causing harms to other directly or through avoidance of actions that risk harming others
  4. Faithful, loyal, honest, and trustworthy behavior
  5. Freedom from unnecessary constraints, interference
  6. A required part of AT service delivery
  7. All forms of action intended to benefit or promote the good of other persons
Down
  1. Opportunity to make a choice on how and when a daily function are carried out
  2. Privacy of the person and personal information
  3. A sign of social unacceptability when there is perceived shame
  4. The freedom of individuals are viewed as basic building blocks
  5. Environment Every electronic device is linked on local networks or the internet

12 Clues: A required part of AT service deliveryPrivacy of the person and personal informationFaithful, loyal, honest, and trustworthy behaviorFreedom from unnecessary constraints, interferenceA sign of social unacceptability when there is perceived shameThe freedom of individuals are viewed as basic building blocks...

Terminology Termination 2017-08-30

Terminology Termination crossword puzzle
Across
  1. a computing-infrastructure and software model for enabling ubiquitous access to shared pools of configurable resources (such as computer networks, servers, storage, applications and services)
  2. is a prototype grocery store operated by online retailer Amazon.com where customers are able to purchase products without using a cashier or checkout station
  3. the first 64-bit OS
Down
  1. first operating system by windows
  2. standardized javascript
  3. a compiled English-like computer programming language designed for business use
  4. latest android version

7 Clues: the first 64-bit OSlatest android versionstandardized javascriptfirst operating system by windowsa compiled English-like computer programming language designed for business useis a prototype grocery store operated by online retailer Amazon.com where customers are able to purchase products without using a cashier or checkout station...

Keeping safe online 2024-01-17

Keeping safe online crossword puzzle
Across
  1. These are where scammers use social networks to gain your trust and ask for money from you.
  2. These scams focus on medical-related products
  3. These websites may look like the official website but they are not.
  4. Phishing can be conducted via a text, social media, email or ...
Down
  1. Computer viruses are programs spread by a link or an ... in an email.
  2. What is another term for computer viruses?
  3. This is what scam emails can be referred to.

7 Clues: What is another term for computer viruses?This is what scam emails can be referred to.These scams focus on medical-related productsPhishing can be conducted via a text, social media, email or ...These websites may look like the official website but they are not.Computer viruses are programs spread by a link or an ... in an email....

A Special Place 2025-10-08

A Special Place crossword puzzle
Across
  1. when people explored and settled the western part of North America
  2. a long, sandy island parallel to the seashore that protects the shores from waves and wind off the ocean
  3. mounds or small hills of sand created by wind and waves
  4. a group or category of plants
Down
  1. travel from one location to another at certain times of the year
  2. almost extinct
  3. networks of plants, animals, and the environment they live in

7 Clues: almost extincta group or category of plantsmounds or small hills of sand created by wind and wavesnetworks of plants, animals, and the environment they live intravel from one location to another at certain times of the yearwhen people explored and settled the western part of North America...

The circulatory system 2024-05-01

The circulatory system crossword puzzle
Across
  1. tubular branching vessels that carry blood from the capillaries toward the heart
  2. the chambers of the heart that receives blood from the veins
  3. the smallest blood vessels arterioles with venules and forming networks throughout the body
  4. liquid that flows through the veins
  5. carry blood from the heart through the body
Down
  1. a chamber of the heart which receives blood from a corresponding atrium
  2. acts as a force pump maintaining the circulation of the blood

7 Clues: liquid that flows through the veinscarry blood from the heart through the bodythe chambers of the heart that receives blood from the veinsacts as a force pump maintaining the circulation of the blooda chamber of the heart which receives blood from a corresponding atriumtubular branching vessels that carry blood from the capillaries toward the heart...

Computer Network Puzzle 2023-02-07

Computer Network Puzzle crossword puzzle
Across
  1. of the main protocols in TPC/IP network
  2. two or more devices connected together to send information
  3. The exchange of computer-stored messages sent from one person to the other .
Down
  1. A system of rules that explain the correct conduct or procedures to be followed in formal situations .
  2. A worldwide system of computer networks
  3. a computer or computer program which manages access to a centralized resource or service in a network.
  4. Broadcasts data to every computer .

7 Clues: Broadcasts data to every computer .A worldwide system of computer networksof the main protocols in TPC/IP networktwo or more devices connected together to send informationThe exchange of computer-stored messages sent from one person to the other .A system of rules that explain the correct conduct or procedures to be followed in formal situations ....

rrr 2025-03-30

rrr crossword puzzle
Across
  1. What type of ai mimics human conversation
  2. What does G stands for when we say GPT
  3. ⁠What structures can be found in neural networks
  4. What the term for a step-by-step procedure used to solve a problem
Down
  1. What language is commonly used for AI development
  2. What is the name of the process used to improve an AI's performance through examples
  3. What the name of the process by which ai improve its performance through experience

7 Clues: What does G stands for when we say GPTWhat type of ai mimics human conversation⁠What structures can be found in neural networksWhat language is commonly used for AI developmentWhat the term for a step-by-step procedure used to solve a problemWhat the name of the process by which ai improve its performance through experience...

IT Jobs 2025-07-27

IT Jobs crossword puzzle
Across
  1. Creates new apps or websites
  2. Keeps computers, systems, and networks running
Down
  1. Studies data and gives simple reports
  2. Builds and fixes software and apps

4 Clues: Creates new apps or websitesBuilds and fixes software and appsStudies data and gives simple reportsKeeps computers, systems, and networks running

Technology 2020-08-12

Technology crossword puzzle
Across
  1. Investigating to identify where a fault is
  2. Automatically gives ipaddress to nodes on the network
  3. Device allowing more than two nodes to communicate
  4. Founder of Microsoft
  5. Process where two different operating systems are installed on one computer or laptop
  6. Permanent storage in devices such as computer
  7. Networks that are connected globally to pride resources to share
  8. Private and public model of providing access to resources remotely through paid subscription
  9. Container of a value stored in the memory during programming
  10. Cable allows switch or router to be configured using computer or laptop
  11. Language used by devices on the network to communicate
Down
  1. Digital kidnapping of data through encryption which is decrypted after money is paid
  2. Houses all the major components and circuitry in the computer
  3. Place or join together common use in programming
  4. Enables admistrative and secured management of local area network
  5. where more than two devices are connected to exchabge data
  6. Software app that allows access to the web
  7. Allowed user to input into the system
  8. Used by router to identify where to send data packets

19 Clues: Founder of MicrosoftAllowed user to input into the systemInvestigating to identify where a fault isSoftware app that allows access to the webPermanent storage in devices such as computerPlace or join together common use in programmingDevice allowing more than two nodes to communicateAutomatically gives ipaddress to nodes on the network...

Social Media Crossword 2020-06-11

Social Media Crossword crossword puzzle
Across
  1. #
  2. a network for online picture sharing
  3. anything shared across social networks that get passed along rapidly e.g Youtube
  4. a self portrait taken using the reverse camera screen on a smart phone
  5. here you are allowed to share a 140 character update.
  6. a site updated frequently by an individual or group to record opinions or information.
  7. simple web pages that can be edited by other users
  8. clusters of a user's friends, colleague, family or connections on google+
Down
  1. a one-to-one communication on the internet.
  2. a system that manages content
  3. they are also known as message boards.
  4. a free URL shortening service
  5. It is an image or username that represents a person online most often within forums and social network
  6. a message sent on twitter.
  7. an action that can be made by a facebook user.
  8. a photo sharing application gained more than 300 million users.
  9. a pictorial representation of a facial expression which is used in writing.
  10. platform founded by Mark Zuckerberg
  11. a small attractive application on a website such as a hit counter.

19 Clues: #a message sent on twitter.a system that manages contenta free URL shortening serviceplatform founded by Mark Zuckerberga network for online picture sharingthey are also known as message boards.a one-to-one communication on the internet.an action that can be made by a facebook user.simple web pages that can be edited by other users...

Chapter 12- Relationships in the Workplace 2016-01-09

Chapter 12- Relationships in the Workplace crossword puzzle
Across
  1. Networking only through internet accessories.
  2. Working from home.
  3. Form of upward communication based on six principles.
  4. People holding positions of organizational status and power similar to your own.
  5. The act of bullying online.
  6. Equivalent-status peers you share high levels of emotional support with.
  7. Type of climate featuring unfriendly and rigid personnel.
  8. A form of communication to persuade your superiors for work-related needs.
  9. Type of harassment involving misconduct and unwelcome advances between two different genders.
Down
  1. Coworkers who communicate mainly through phone or computer.
  2. Relationships between coworkers of different status.
  3. Relationship involving status, intimacy, and choice.
  4. Peers that are equivalent in status to whom you share limited work-related content.
  5. Engaging in personal interests on your computer when you should be working.
  6. A dense network of coworkers sharing the same beliefs and values.
  7. A climate where the employees communicate honestly and openly.
  8. The general atmosphere of the workplace.
  9. Communicating with subordinates.
  10. Coworkers you consider to be your friend.
  11. Workers who are reputable, knowledgeable, and connected to dense organizational networks.

20 Clues: Working from home.The act of bullying online.Communicating with subordinates.The general atmosphere of the workplace.Coworkers you consider to be your friend.Networking only through internet accessories.Relationships between coworkers of different status.Relationship involving status, intimacy, and choice....

Body Systems 2020-11-16

Body Systems crossword puzzle
Across
  1. ____________ are networks of tiny blood vessels
  2. The human brain weighs ______ pounds
  3. The ______ is also called the voice box
  4. The lungs and ____________ allow us to breathe
  5. Muscles move body parts by contracting and then ________
  6. ________ is found in the heart
  7. _______ is where most of the body's blood cells are made
  8. Bones are made up of a framework of a protein called ________
  9. air enters the respiratory system through the ____ or the mouth.
Down
  1. The __________________ carries blood from the heart to all the other parts of the body and back again
  2. _________ is the solid, hard outside part of the bone
  3. smooth muscle is also referred to as_________
  4. The ________________ is a short loop from the heart to the lungs and back again
  5. ________is attached by cord-like tendons
  6. The _____ is a big artery that leaves the heart carrying this oxygenated blood centralnervoussystem the brain and the spinal cord are the _________________
  7. The nerves that go through the whole body make up the __________________
  8. The _________ is the largest and most complex part of the brain
  9. Cancellous bone resembles _____
  10. The cells in our bodies need ______ to stay alive

19 Clues: ________ is found in the heartCancellous bone resembles _____The human brain weighs ______ poundsThe ______ is also called the voice box________is attached by cord-like tendonssmooth muscle is also referred to as_________The lungs and ____________ allow us to breathe____________ are networks of tiny blood vessels...

physics - electromagnetic spectrum 2021-05-24

physics - electromagnetic spectrum crossword puzzle
Across
  1. light pulses transmitted along these (5,6)
  2. penetrating radiation which can cause damage to body tissues, useful to kill cancer etc.
  3. objects that absorb uv waves and emit the energy as visible light
  4. penetrate our body and provide a valuable way for doctors to diagnose illness or damage to our bodies
  5. electromagnetic waves are
  6. repeating the results reduces the effect of errors, this is called ________
  7. hot objects emit this, used in efficient lamps
  8. radio waves transmitted over long distances by being reflected off this (layer in the earth's upper atmosphere)
  9. used to send ____ and television signals from transmitters to homes, terrestrial as they go across ground
  10. _______ wavelength at highest energy
Down
  1. used to see
  2. used for satellite communication, satellite television, mobile phone networks through tall aerial masts, cooking, heating
  3. electromagnetic waves can travel through a
  4. ________ wavelength at lowest energy
  5. heating from electrical heaters, cooking in ovens, cameras for photographs at night, remote controls
  6. the required practical of this topic to see the emission of _________
  7. _______ frequency at lowest energy
  8. wave formed by a change in the nucleus of an atom, when this is emitted the nuclear store decreases
  9. control variables ensure ________
  10. the speed that they travel at in a vacuum
  11. _____ frequency at highest energy

21 Clues: used to seeelectromagnetic waves arecontrol variables ensure _____________ frequency at highest energy_______ frequency at lowest energy________ wavelength at lowest energy_______ wavelength at highest energythe speed that they travel at in a vacuumelectromagnetic waves can travel through alight pulses transmitted along these (5,6)...

Network 2018-02-08

Network crossword puzzle
Across
  1. (Internet Service Provider)
  2. collection of data that can be used by computers which need to communicate with each other, usually as part of a network.
  3. in which constituent parts are interrelated or arranged.
  4. or computer program which manages access to a centralized resource or service in a network.
  5. that provides services accessing and using the Internet.
  6. of rules or procedures for transmitting data between electronic devices
  7. device that forwards data packets between computer networks.
  8. allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
  9. (Domain Name Server)
  10. Has a trunk
Down
  1. computer or workstation that is capable of obtaining information and applications from a server.
  2. string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
  3. Large marsupial
  4. Man's best friend
  5. bunch of wires used to connect two things.
  6. system for converting alphabetic names into numeric IP addresses
  7. address
  8. Likes to chase mice
  9. Flying mammal

19 Clues: addressHas a trunkFlying mammalLarge marsupialMan's best friendLikes to chase mice(Domain Name Server)(Internet Service Provider)bunch of wires used to connect two things.in which constituent parts are interrelated or arranged.that provides services accessing and using the Internet.device that forwards data packets between computer networks....

A2+ 2024-10-17

A2+ crossword puzzle
Across
  1. My teacher is my __ because she helps me learn every day.
  2. She is ___ about joining the art club this year.
  3. The ___ told the story to the police.
  4. The ____ man enjoys reading books in the park every afternoon.
  5. A helmet can help ___ your head when you ride a bike.
  6. I use my phone as a ___ to connect to the internet.
  7. The firefighter was ___ when he saved the child from the fire.
  8. The ____ teacher gave a great lecture on science.
Down
  1. He looked ____ _____in his new suit for the wedding.
  2. We need to ___ __ the chairs before the party starts.
  3. Can you help me ___ the game on my tablet?
  4. He was _____ and spilled juice on the table.
  5. The _____ of the bike made him very sad.
  6. The___ of fruit and yogurt makes a healthy snack.
  7. I like to keep my ___ when I use social media.
  8. The ____ of the table shows that it is two meters long.
  9. Be careful with ___ networks; they are not safe.
  10. The ___ stole important information from the company.
  11. I will ___ that I can finish the race on time.

19 Clues: The ___ told the story to the police.The _____ of the bike made him very sad.Can you help me ___ the game on my tablet?He was _____ and spilled juice on the table.I like to keep my ___ when I use social media.I will ___ that I can finish the race on time.She is ___ about joining the art club this year....

Cyber - Key words 2024-12-03

Cyber - Key words crossword puzzle
Across
  1. Protects systems by controlling incoming and outgoing network traffic.
  2. Malicious software that blocks access to data until a ransom is paid.
  3. Virtual Private Network, enhances online privacy and security.
  4. Software designed to disrupt, damage, or gain unauthorized access to systems.
  5. Small data stored on a user's computer by a website.
  6. A string of characters used to authenticate access to a system.
  7. Regularly applied software improvements for security and functionality.
  8. An attack that floods a system with traffic to disrupt its normal operations.
  9. Moral principles guiding responsible use of technology.
Down
  1. Fraudulent attempt to obtain sensitive information through deceptive emails.
  2. Information processed or stored by a computer.
  3. A group of interconnected devices sharing resources.
  4. A type of malware disguised as legitimate software.
  5. A barrier to protect a network from unauthorized access.
  6. Software designed to detect and remove malicious programs.
  7. Software that secretly gathers user information without consent.
  8. Unwanted or junk email messages.
  9. The process of converting data into a code to prevent unauthorized access.
  10. A set of rules governing data communication over a network.
  11. A person who exploits weaknesses in computer systems or networks.

20 Clues: Unwanted or junk email messages.Information processed or stored by a computer.A type of malware disguised as legitimate software.A group of interconnected devices sharing resources.Small data stored on a user's computer by a website.Moral principles guiding responsible use of technology.A barrier to protect a network from unauthorized access....

Achievements of the Muslim civilization 8.3 2025-02-26

Achievements of the Muslim civilization 8.3 crossword puzzle
Across
  1. A place in the Sahara where west Africans traded gold for salt, cloth, bronze, books, ceramics
  2. Developed riles for writing explaining religious and worldly themes
  3. Writing by hand in an artistic way
  4. Developed rules for writing developing religious and worldly things
  5. What projects drained swamplands because there isn’t enough water in desert areas
  6. Studied the philosophy of this ancient civilization
  7. To give and get something in exchange
  8. Who did they get steel swords from
  9. Traders carried frankincense and other stuff over what road that is 100 miles along the read sea
  10. Stretch 7000 miles starting in Chang’an going to Baghdad
  11. Head physician, wrote many books on medicine
Down
  1. What were the Persians famous for
  2. Build fast trading networks across Muslim land
  3. ability to get higher authority
  4. He was one of the greatest mathematicians
  5. He set standards for scientific study of history
  6. He put all knowledge except Quran to the test of reason
  7. During the Golden Age Muslim cities adapting from Byzantine buildings, domes and arches
  8. The period when Spain Sicily and Christian scholars studied Muslim art and science
  9. Established Baghdad as the greatest Muslim center of learning

20 Clues: ability to get higher authorityWhat were the Persians famous forWriting by hand in an artistic wayWho did they get steel swords fromTo give and get something in exchangeHe was one of the greatest mathematiciansHead physician, wrote many books on medicineBuild fast trading networks across Muslim landHe set standards for scientific study of history...

Computer fundamentals 2025-05-23

Computer fundamentals crossword puzzle
Across
  1. Machines that mimic human intelligence to perform tasks.
  2. This company is known for electric cars and autonomous driving innovations.
  3. Virtual space where people interact using digital avatars.
  4. Security field that protects networks from hackers.
  5. A search engine developed by Microsoft.
  6. A cloud storage service provided by Google.
  7. Type of file format commonly used for storing high-quality images.
  8. Wearable device used for fitness tracking and health monitoring.
  9. This programming language is widely used for AI development and is known for its simplicity.
  10. A virtual assistant developed by Apple.
  11. Fifth-generation mobile network technology faster than 4G.
Down
  1. This type of digital currency operates on blockchain technology.
  2. A software application designed to mimic human conversation and assist users online.
  3. The process of transmitting data wirelessly over a network.
  4. A social media platform known for short 280-character posts.
  5. Short videos popular on Instagram and YouTube.
  6. A mobile operating system widely used in smartphones, developed by Google.
  7. Technology that immerses users in simulated environments through headsets.
  8. The study of designing systems that allow computers to learn without being explicitly programmed.

19 Clues: A search engine developed by Microsoft.A virtual assistant developed by Apple.A cloud storage service provided by Google.Short videos popular on Instagram and YouTube.Security field that protects networks from hackers.Machines that mimic human intelligence to perform tasks.Virtual space where people interact using digital avatars....

World War 1 Crossword (all lowercase with underscore as space) 2025-05-15

World War 1 Crossword  (all lowercase with underscore as space) crossword puzzle
Across
  1. Gradually wearing down the enemy
  2. famous aviator company in WWI
  3. Deadliest battle fought by the British in response of the French calling for aid
  4. The current Kaiser of the German Empire
  5. Famous British officer known for helping the Arab tribes in leading a revolt against the Ottoman
  6. Networks of dug fortifications
  7. Alliance comprised of the British, French, and Russia.
  8. A plan by the Germans to quickly achieve victory
Down
  1. The genocide started by the Ottomans after they accused an ethnic group for their failures
  2. Birds that were used to carry messages
  3. An Alliance comprised of the Germans, A-H, Italy, and later the Ottomans
  4. A form of a long-range gun used to shell positions
  5. A term used to described people who were affected by PTSD
  6. Assassinated Archduke of Austria-Hungary
  7. Armed and tracked vehicles once used to fight trench warfare
  8. The gas used by both sides while engaging in Chemical Warfare
  9. A large and powerful class of battleships
  10. The president of the U.S at the time of WWI
  11. Airships that were filled with buoyant gasses

19 Clues: famous aviator company in WWINetworks of dug fortificationsGradually wearing down the enemyBirds that were used to carry messagesThe current Kaiser of the German EmpireAssassinated Archduke of Austria-HungaryA large and powerful class of battleshipsThe president of the U.S at the time of WWIAirships that were filled with buoyant gasses...

East Asia Vocabulary 2025-09-10

East Asia Vocabulary crossword puzzle
Across
  1. Confucian revival blending Buddhist and Daoist ideas.
  2. A fine, high-quality ceramic from China, valued in trade.
  3. A ruling family that passes down power through generations.
  4. The belief that rulers ruled with divine approval but could lose power if they failed.
  5. Trade route connecting China to Central Asia and beyond.
  6. A government system with officials handling taxes, records, and duties.
  7. Song Dynasty capital, a major trade and cultural center.
  8. Respect and obedience toward parents and ancestors.
  9. Sea-based trade networks in East and South Asia.
  10. The blending of different religions or cultural traditions.
Down
  1. New farming techniques and technologies that increased food production.
  2. A Chinese dynasty known for prosperity, trade, and culture.
  3. A philosophy stressing respect, education, and order.
  4. A Chinese invention first used in fireworks, later for weapons.
  5. Producing goods for markets instead of family use.
  6. Neighboring states paying respect and gifts to China for trade.
  7. Growth of cities as centers of trade, government, and culture.
  8. Fast-ripening rice from Vietnam, boosting population growth.
  9. Waterway linking northern and southern China for trade.

19 Clues: Sea-based trade networks in East and South Asia.Producing goods for markets instead of family use.Respect and obedience toward parents and ancestors.Confucian revival blending Buddhist and Daoist ideas.A philosophy stressing respect, education, and order.Waterway linking northern and southern China for trade....

Canadian Identity 2013-01-06

Canadian Identity crossword puzzle
Across
  1. Who was the one to introduce a complete medicare program?
  2. The company put in charge of television development in Canada
  3. What was television was designed for in the U.S?
  4. In 1966 Pearson introduced Canada's system of _______
  5. The belief of Equality for all Canadians is known as this
  6. mWhat province was the majority of Canada's factories and plants located?
Down
  1. The feeling on the part of western Canada that federal policies favour central Canada
  2. what was discovered in Leduc Alberta in 1947?
  3. On March 31, 1941 What did Newfoundland become part of?
  4. The Trans-Canada highway was considered a _________
  5. The program that improved on existing pension plan schemes was known as ___
  6. Who was the man that took lead in persuading Newfoundland to join Canada?
  7. Created by the government to regulate foreign material on Canada's Television networks

13 Clues: what was discovered in Leduc Alberta in 1947?What was television was designed for in the U.S?The Trans-Canada highway was considered a _________In 1966 Pearson introduced Canada's system of _______On March 31, 1941 What did Newfoundland become part of?Who was the one to introduce a complete medicare program?...

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  2. You are required to ______ suspicious behavior.
  3. A potential risk indicator for person living above his means.
  4. Reportable action. (two words)
  5. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  6. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  7. An employee who hates his job to the point of aggression.
Down
  1. Threat of injury to persons.
  2. ________ Assistance Program
  3. Goal of an Insider Threat Program.
  4. An adversary having the intent, capability, and opportunity to cause loss or damage.
  5. ____ ________ Monitoring (two words)
  6. The ability and opportunity to obtain knowledge of classified sensitive information.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. An adversary having the intent, capability, and opportunity to cause loss or damage.
  2. A potential risk indicator for person living above his means.
  3. ________ Assistance Program
  4. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  5. Goal of an Insider Threat Program.
  6. Reportable action. (two words)
Down
  1. The ability and opportunity to obtain knowledge of classified sensitive information.
  2. Threat of injury to persons.
  3. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  4. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  5. ____ ________ Monitoring (two words)
  6. You are required to ______ suspicious behavior.
  7. An employee who hates his job to the point of aggression.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

Evolution of IT Cross-Key-Word 2024-05-20

Evolution of IT Cross-Key-Word crossword puzzle
Across
  1. What we call data when it is given a context.
  2. The word in AR that describes adding to our reality.
  3. The network we use to connect to each other.
  4. Computers take in data, then do what before sending it out?
  5. Our personal beliefs and rules.
Down
  1. A network connected over a wider geographical area. Typically connecting smaller networks together.
  2. A network connected over a small geographical area.
  3. The word to describe how data is received by the computer which is then processed.
  4. Physical components of the computer are called this.
  5. The word to describe when data is sent back to the user.
  6. The beliefs and rules suggested by your culture.
  7. The first word sent over the internet, it is half of a full word.
  8. What we call the coded programs and instructions. Opposite of hardware.

13 Clues: Our personal beliefs and rules.The network we use to connect to each other.What we call data when it is given a context.The beliefs and rules suggested by your culture.A network connected over a small geographical area.Physical components of the computer are called this.The word in AR that describes adding to our reality....

All About Computers 2024-02-25

All About Computers crossword puzzle
Across
  1. The brain of the computer that carries out instructions
  2. Main printed circuit board in general-purpose computers and other expandable systems
  3. A local computer bus for attaching hardware devices in a computer
  4. Any data that is stored, transferred, read, and used by networks, computers, and other machines
  5. Smallest unit of data
  6. To provide or give something to the computer
  7. Conducts electricity, the microprocessor has billions!
Down
  1. The smallest unit of data that a computer can process and store
  2. A mechanism used to connect peripheral devices to computers
  3. A small processor
  4. Form of electronic computer memory that can be read and changed in any order
  5. Piece of equipment used to provide data and control signals to an information processing system
  6. One of the small dots or squares that make up an image on a computer screen

13 Clues: A small processorSmallest unit of dataTo provide or give something to the computerConducts electricity, the microprocessor has billions!The brain of the computer that carries out instructionsA mechanism used to connect peripheral devices to computersThe smallest unit of data that a computer can process and store...

Hairstyling Crossword 2024-11-06

Hairstyling Crossword crossword puzzle
Across
  1. the clasp or clamp of a curling thermal iron
  2. Foundation for a chignon, bun, and knot, among other designs
  3. Pin curls also known as sculptured curls
  4. Smooths and controls the fine hair around the face’s perimeter
  5. Styling product popularized by the “greasers” movement in the1950s
  6. technique done on short chemically relaxed hair prepares the hair for a thermal service
Down
  1. technique used to build a soft cushion or to mesh
  2. f hair pressing that removes about 50 to 60 percent of the curl
  3. the panel of hair on which the roller or barrel is placed
  4. networks of coily, textured hair that are intertwined
  5. Quick-drying liquid delivered to the hair via spray bottle
  6. Involves forcing the hair between the thumb and comb to create tension
  7. a styling product that gives a soft luster and shine to the hair

13 Clues: Pin curls also known as sculptured curlsthe clasp or clamp of a curling thermal irontechnique used to build a soft cushion or to meshnetworks of coily, textured hair that are intertwinedthe panel of hair on which the roller or barrel is placedQuick-drying liquid delivered to the hair via spray bottle...

M2 CIRCULATORY SYSTEM2 2021-07-13

M2 CIRCULATORY SYSTEM2 crossword puzzle
Across
  1. Tiny blood vessels in the tissues form vast networks called (9,4)
  2. Smaller arteries
  3. The biggest vein in the human body (4,4)
  4. Fancy name describing the innermost tunic of a blood vessel
  5. The biggest artery in the human body
  6. The tiniest blood vessels of all
  7. A blue mark on the body that indicates that there is bleeding under the skin
  8. Vasodilation of blood vessels in the cheeks when you’re embarrassed
  9. Big arteries contain this protein to make them more balloon like and ‘elastic’
Down
  1. Blood vessels that carry blood away from the heart
  2. Caused by the relaxation of smooth muscles in the arteries
  3. Caused by the contraction of smooth muscles in the arteries
  4. Fancy name describing the middle tunic of a blood vessel
  5. Blood vessels that carry blood to the heart
  6. Fancy name describing the outermost tunic of a blood vessel
  7. Describes the type of muscle found in the tunica media
  8. These structures are found within veins and stop backflow
  9. Smaller veins
  10. The open space at the centre of a vessel

19 Clues: Smaller veinsSmaller arteriesThe tiniest blood vessels of allThe biggest artery in the human bodyThe biggest vein in the human body (4,4)The open space at the centre of a vesselBlood vessels that carry blood to the heartBlood vessels that carry blood away from the heartDescribes the type of muscle found in the tunica media...

Vocabulary 1,2,3 2019-11-13

Vocabulary 1,2,3 crossword puzzle
Across
  1. Pantalla it serves to look at the things you do
  2. Anglès It's a matter
  3. cpu is the hardware inside a computer or other programmable devices
  4. main memory of the computer
  5. Teclat Xatejar SERVICE TO WRITE
  6. Mainframe It is a great computer capable of performing complex data processing
  7. Xarxes It serves so that you can access google etc.
  8. Assignatura It's what you do in class
  9. Micròfon It is used to talk with friends when we play games
  10. It serves to listen to music
Down
  1. Integrated read-only memory circuit that stores instructions and data permanently.
  2. Ratolí It is used to move the arrow on the computer
  3. Impressora It is useful to keep up the work you have done
  4. Palmtop Small computer
  5. Ponents It is used to listen to music or other things
  6. It's where you talk to friends
  7. Ventall Ventilador que se utiliza en los gabinetes de computadoras y otros dispositivos electrónicos para refrigerarlos
  8. Placa base It is also known as motherboard
  9. Torre The computer is burning up

19 Clues: Anglès It's a matterPalmtop Small computermain memory of the computerIt serves to listen to musicIt's where you talk to friendsTorre The computer is burning upTeclat Xatejar SERVICE TO WRITEAssignatura It's what you do in classPlaca base It is also known as motherboardPantalla it serves to look at the things you do...

Unit 7 Globalization Crossword Puzzle 2015-04-01

Unit 7 Globalization Crossword Puzzle crossword puzzle
Across
  1. an ancient trade route from Europe to Asia
  2. a large company that has operations in more than one country
  3. the development of a worldwide society
  4. ability of one country to produce more efficiently than another country
  5. a global system of interconnected computer networks that allows for info. to move quickly
  6. being able to provide for yourself
  7. a material that satisfies human wants and needs
Down
  1. the movement of people, animals, and goods from one place to another
  2. the process of making something
  3. inexpensive work, often found in less developed nations
  4. includes computers, communication satellites, cell phones, and the Internet
  5. the state of being connected or interconnected
  6. hiring someone outside a company to do work that was once done inside the company
  7. the basic things a person needs to live
  8. an activity that provides something at a cost
  9. the process of passing information across space
  10. an area that uses the same clock time
  11. little or no government involvement in trade
  12. the exchange of goods for other goods or money

19 Clues: the process of making somethingbeing able to provide for yourselfan area that uses the same clock timethe development of a worldwide societythe basic things a person needs to livean ancient trade route from Europe to Asialittle or no government involvement in tradean activity that provides something at a cost...

Lessons 1-9 Crossword 2015-09-30

Lessons 1-9 Crossword crossword puzzle
Across
  1. A related group of networked computers.
  2. Malicious code.
  3. Website used for HTML Essential Training.
  4. Number of seconds you can legally use of music or lyrics.
  5. What kind of language you should use rather than subjective, boastful, or exaggerated.
  6. Popular ones of these are Google, Yahoo!, and AOL.
  7. Where Lynda.com can be accessed from for UT students.
  8. Number of images you can legally use from one artist or photographer.
  9. Reading on a screen is _____ _____ % slower than reading from paper.
  10. The main technology for local area networks.
Down
  1. Type of operators for search engines that include "AND", "OR", and "NOT".
  2. Converts the bits a computer outputs into a form that is compatible with a carrier.
  3. Communication in which both the sender and the receiver are active at the same time.
  4. Using UT IT resources in an unauthorized manner.
  5. Hypertext Markup Language.
  6. The number of employees for ScrippNetworks.
  7. Used to view web pages containing text, images, videos, and other multimedia.
  8. Data stored to help load webpages faster.
  9. A group of information on a computer that can be software programs or data.

19 Clues: Malicious code.Hypertext Markup Language.A related group of networked computers.Website used for HTML Essential Training.Data stored to help load webpages faster.The number of employees for ScrippNetworks.The main technology for local area networks.Using UT IT resources in an unauthorized manner.Popular ones of these are Google, Yahoo!, and AOL....

Lessons 1-9 Crossword 2015-09-30

Lessons 1-9 Crossword crossword puzzle
Across
  1. Website used for HTML Essential Training.
  2. Malicious code.
  3. Using UT IT resources in an unauthorized manner.
  4. A related group of networked computers.
  5. Popular ones of these are Google, Yahoo!, and AOL.
  6. Hypertext Markup Language.
  7. Where Lynda.com can be accessed from for UT students.
  8. Data stored to help load webpages faster.
  9. A group of information on a computer that can be software programs or data.
  10. The number of employees for ScrippNetworks.
  11. Number of seconds you can legally use of music or lyrics.
  12. Reading on a screen is _____ _____ % slower than reading from paper.
Down
  1. Communication in which both the sender and the receiver are active at the same time.
  2. Number of images you can legally use from one artist or photographer.
  3. What kind of language you should use rather than subjective, boastful, or exaggerated.
  4. Used to view web pages containing text, images, videos, and other multimedia.
  5. The main technology for local area networks.
  6. Converts the bits a computer outputs into a form that is compatible with a carrier.
  7. Type of operators for search engines that include "AND", "OR", and "NOT".

19 Clues: Malicious code.Hypertext Markup Language.A related group of networked computers.Website used for HTML Essential Training.Data stored to help load webpages faster.The number of employees for ScrippNetworks.The main technology for local area networks.Using UT IT resources in an unauthorized manner.Popular ones of these are Google, Yahoo!, and AOL....

RU ITEC11 Chapter 5 2023-12-01

RU ITEC11 Chapter 5 crossword puzzle
Across
  1. to ask questions, research questions and to know about security measures
  2. using someone else identity without being authorized and using it for criminal activities
  3. obtain sensitive information as in text messages
  4. creating a fake website to get into personal information by creating a fake url into a domain Name servers
  5. use security tools and monitor networks to avoid attacks
  6. open access was first implemented to share study materials.
  7. obtain sensitive information as in e-mail
  8. is an extremely sophisticated worm
  9. monitor and block communication from unreliable websites.
  10. prohibited use of a computer unless authorized
  11. obtain sensitive information as in voice phishing
  12. techniques on how to steal personal and financial data
Down
  1. prioritize security in their advancements
  2. involves hacking for political purposes
  3. publishers must prevent access towards other nations when it is prohibited
  4. The cost of defending an attack is included in the definition of loss under the Act
  5. traits that are specific to an individual biologically
  6. using someone else identity without being authorized and using it for criminal activities
  7. Programming's excitement
  8. is the expansion of online and mobile technologies

20 Clues: Programming's excitementis an extremely sophisticated worminvolves hacking for political purposesprioritize security in their advancementsobtain sensitive information as in e-mailprohibited use of a computer unless authorizedobtain sensitive information as in text messagesobtain sensitive information as in voice phishing...

Social Media 2023-04-19

Social Media crossword puzzle
Across
  1. The use of electronic communication to show dislike of a person.
  2. A one-to-one communication in the internet.
  3. A website updated frequently to talk about opinions and different topics
  4. A self-portrait taken with the front or backside of your smartphone camera.
  5. Videos/post who are popular and get a lot of clicks.
  6. The most popular social media platform right in 2023.
  7. A platform used mainly to post pictures.
  8. A message sent on Twitter.
  9. An action which can be made on Instagram or TikTok if a post appeals to you.
Down
  1. The platform Donald Trump is banned from.
  2. Before TikTok there was?
  3. Action you can take if you want to stop someone from texting you.
  4. A software made to protect your computer.
  5. #
  6. Website where you can find basic information about nearly everything.
  7. An image or username which represents a person online, for example in social networks
  8. You use this funtion if you want to send a meme to a friend.
  9. A platform founded by Mark Zuckerberg.
  10. A pictural way to communicate your feelings over texting.

19 Clues: #Before TikTok there was?A message sent on Twitter.A platform founded by Mark Zuckerberg.A platform used mainly to post pictures.The platform Donald Trump is banned from.A software made to protect your computer.A one-to-one communication in the internet.Videos/post who are popular and get a lot of clicks....

Ict 7-green 2025-05-25

Ict 7-green crossword puzzle
Across
  1. named memory location that can store a value
  2. continiually varying signal , e,g. a sound signal
  3. step by step instruction to solve a particular problem
  4. short for binary digit
  5. copying files to another location in case the original is lost or damaged
  6. translates each line of high - level language code into machine code
  7. which network hardware directs data between networks
  8. unit of measurement of how many sound samples are taken in 1 second
  9. carrying out an operation on data
  10. convert into digital format , i.e. into 1s and 0s
  11. single letter, digit or symbol
Down
  1. translates assembly-language .
  2. continually varying signal
  3. data structure in Python that can store multiple items of data of mixed data types under a single identifier ;data items can be changed
  4. taking samples of a sound wave at fixed intervals
  5. change from one unit to another
  6. converts program instuction into machine-code format so the processor can carry out the instructions
  7. eight bits of data
  8. initial product created for testing and reviewing , before a final product
  9. code made up of numbers or numbers and letters and other characters

20 Clues: eight bits of datashort for binary digitcontinually varying signaltranslates assembly-language .single letter, digit or symbolchange from one unit to anothercarrying out an operation on datanamed memory location that can store a valuetaking samples of a sound wave at fixed intervalscontiniually varying signal , e,g. a sound signal...

First Nation Crossword 2015-03-23

First Nation Crossword crossword puzzle
Across
  1. What is families that are based on social networks of people called?
  2. What month is National Aboriginal Day celebrated in?
  3. type of services assist people who have chronic and acute illnesses
  4. the major cause of poor dietary changes
  5. the name of the dome-shaped tent that is used for physical and spiritual purification?
  6. The ________ Man can perform ceremonies for the death in their tribes native language.
Down
  1. Type of barrier method birth control
  2. What is the leading cause of death and hospitalization among First Nations.
  3. Which ritual is preformed at the time of a full moon?
  4. The gender that determines the mens status in the clan?
  5. First Nations believe in the concept of _____.
  6. inter professional healthcare team is involved in delivery of newborns
  7. 20% of First Nations adults on reserves suffer from this disease
  8. New parents ask _____ about traditions and culture to prepare spiritually for becoming parents.

14 Clues: Type of barrier method birth controlthe major cause of poor dietary changesFirst Nations believe in the concept of _____.What month is National Aboriginal Day celebrated in?Which ritual is preformed at the time of a full moon?The gender that determines the mens status in the clan?20% of First Nations adults on reserves suffer from this disease...

networking 2015-12-04

networking crossword puzzle
Across
  1. something used by the wider community
  2. interface card a circuit board or card that is put into in a computer so that it can connected to a network.
  3. is the buying and selling of good, or the transmitting of funds, over an electronic network,
  4. cable cable that has an inner copper wire surrounded by a plastic insulating layer
  5. a personal for the short-range wireless interconnection
  6. may be characterized as network
  7. cable a cable designed to connect either to a laptop, desktop computer via a cable connection
Down
  1. service provider someone that provides you access the internet
  2. internet global system of interconnected computer networks
  3. a fast connection to the internet
  4. optic cable a cable that consists of a bundle of glass threads.
  5. something for the local community
  6. a device that allows you to connect to the internet
  7. interface any type of computer that uses wireless data connections

14 Clues: may be characterized as networka fast connection to the internetsomething for the local communitysomething used by the wider communitya device that allows you to connect to the interneta personal for the short-range wireless interconnectioninternet global system of interconnected computer networks...

Erins network quiz 2019-12-12

Erins network quiz crossword puzzle
Across
  1. a topology that flows in only one direction
  2. long version of a URL
  3. a private communication network
  4. a topology that has fast data transfere and a switch
  5. an abbreviation of something that enables computer and file server to communicate, can be wired or wireless
  6. an abreviaton of a language used to create a web page
Down
  1. these are normally contained within a single building or a cluster of buildings
  2. examines data as it passes, can connect two or more networks together
  3. uses radio frequencies to communicate and is wireless
  4. this is used in a bus topology
  5. checks the destination of data it receives, forwards it to the intended computer
  6. a cable that you would see at the back of a tv
  7. a topology that requires each machine to be connected to at least two or more computers
  8. a network that could cover a city

14 Clues: long version of a URLthis is used in a bus topologya private communication networka network that could cover a citya topology that flows in only one directiona cable that you would see at the back of a tva topology that has fast data transfere and a switchuses radio frequencies to communicate and is wireless...

Technology 2019-11-05

Technology crossword puzzle
Across
  1. software program that allows a user to locate, access, and display web pages
  2. random access memory
  3. brains of the computer where most calculations take place.
  4. computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication
  5. programs and other operating information used by a computer.
  6. output device that displays information in pictorial form.
Down
  1. panel of keys that operate a computer
  2. Distributed Denial of Service
  3. can move the cursor to different items on the screen
  4. malware which misleads users of its true intent
  5. powerful computers used for large information processing jobs. They are mainly used by government institutions and large companies
  6. Fraud email from companies to get personal information such as passwords or credit card info
  7. Messages sent electronically
  8. malware which misleads users of its true intent
  9. piece of code which is capable of copying itself and typically can corrupt the system or destroying data.

15 Clues: random access memoryMessages sent electronicallyDistributed Denial of Servicepanel of keys that operate a computermalware which misleads users of its true intentmalware which misleads users of its true intentcan move the cursor to different items on the screenbrains of the computer where most calculations take place....

MYOWS (Sam and Gigi) 2025-02-05

MYOWS (Sam and Gigi) crossword puzzle
Across
  1. The vast ships and communication networks were made by?
  2. What ship was made by the Industrialization that extended the West’s military?
  3. What is a society that the British gave “More care to” after losing the US?
  4. What document warned against European meddling in the Americas?
  5. What war caused an “Industrial Boom” in America?
  6. immigration What created/ expanded Western settler societies?
  7. What American firms set up branches in other countries?
Down
  1. What country did not play a substantial role in world history during this colonial period?
  2. What Revolution prompted a major expansion of the West’s power in the world?
  3. What revolution caused a “Stir” in Europe?
  4. What invention gave small western forces superiority over masses of local troops?
  5. Who were the new strain of immigrants in America?
  6. Who were American engineers mostly inspired by?
  7. What was the most important Western nation overseas?
  8. Who created empires in Africa, Southeast Asia, parts of China, and the middle east?

15 Clues: What revolution caused a “Stir” in Europe?Who were American engineers mostly inspired by?What war caused an “Industrial Boom” in America?Who were the new strain of immigrants in America?What was the most important Western nation overseas?The vast ships and communication networks were made by?What American firms set up branches in other countries?...

FY2025 Cyber Security Training 2024-11-05

FY2025 Cyber Security Training crossword puzzle
Across
  1. Don't click without _____.
  2. The number of principles the GDPR requires companies to adhere to.
  3. A piece of evidence a user must produce to verify they are an account’s true owner.
  4. BEC means Business ____ Compromise.
  5. On average Parker blocks 32 ____ attempts to access Parker Networks.
  6. _____, unique passwords are best practice.
Down
  1. This is voice phishing.
  2. This is something you are, including fingerprints or facial recognition.
  3. _____ Data means any data relating to a living individual who is or can be identified from the data itself.
  4. Before leaving your workstation, you should always do this to the area.
  5. Text message phishing.
  6. Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
  7. CEO fraud is one of the most common forms of this.
  8. Designed to damage devices or exploit them for sensitive information and access.

14 Clues: Text message phishing.This is voice phishing.Don't click without _____.BEC means Business ____ Compromise._____, unique passwords are best practice.CEO fraud is one of the most common forms of this.The number of principles the GDPR requires companies to adhere to.On average Parker blocks 32 ____ attempts to access Parker Networks....

Ch. 11 Technology 2024-04-17

Ch. 11 Technology crossword puzzle
Across
  1. mechanical devices programmed to do routine tasks
  2. computer programs that perform specific tasks such as word processing, database or accounting
  3. the use of technology to create product styles and designs
  4. a series of detailed, step-by-step instructions that tell a computer what functions to complete
  5. the use of computers, networks, and technology to store, send, and retrieve information.
Down
  1. a coordinated system of processing and reporting information in an organization
  2. the instructions that run the computer system.
  3. computer programs that help people solve technical problems
  4. control center of the computer
  5. the use of computers to help employees learn or improve skills at their own pace
  6. control center of the computer
  7. physical elements of a computer system
  8. all functional components of a computer, including input, processing unit, memory, storage, output devices.
  9. group of computers used in business and schools linked together share hardware and software
  10. software that enables computers to reason, learn, make decisions

15 Clues: control center of the computercontrol center of the computerphysical elements of a computer systemthe instructions that run the computer system.mechanical devices programmed to do routine tasksthe use of technology to create product styles and designscomputer programs that help people solve technical problems...

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  2. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  3. You are required to ______ suspicious behavior.
  4. ____ ________ Monitoring (two words)
  5. An adversary having the intent, capability, and opportunity to cause loss or damage.
  6. Goal of an Insider Threat Program.
  7. ________ Assistance Program
Down
  1. Reportable action. (two words)
  2. A potential risk indicator for person living above his means.
  3. The ability and opportunity to obtain knowledge of classified sensitive information.
  4. Threat of injury to persons.
  5. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  6. An employee who hates his job to the point of aggression.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. You are required to ______ suspicious behavior.
  2. An employee who hates his job to the point of aggression.
  3. A potential risk indicator for person living above his means.
  4. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  5. Reportable action. (two words)
  6. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  7. ________ Assistance Program
Down
  1. An adversary having the intent, capability, and opportunity to cause loss or damage.
  2. ____ ________ Monitoring (two words)
  3. Goal of an Insider Threat Program.
  4. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  5. The ability and opportunity to obtain knowledge of classified sensitive information.
  6. Threat of injury to persons.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. Reportable action. (two words)
  2. You are required to ______ suspicious behavior.
  3. An employee who hates his job to the point of aggression.
  4. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  5. An adversary having the intent, capability, and opportunity to cause loss or damage.
  6. A potential risk indicator for person living above his means.
  7. The ability and opportunity to obtain knowledge of classified sensitive information.
Down
  1. ________ Assistance Program
  2. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  3. ____ ________ Monitoring (two words)
  4. Goal of an Insider Threat Program.
  5. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  6. Threat of injury to persons.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

POB 2.02 Vocabulary 2018-02-14

POB 2.02 Vocabulary crossword puzzle
Across
  1. A navigational system that uses satellite technology to determine location and provide directions
  2. The use of computer technology to plan, design, test, and alter products
  3. Working from home or a remote location
  4. Computerized storage for information and facts
  5. The practical application of science to society and industry
  6. A mobile phone with advanced capabilities, such as accessing the Internet
Down
  1. Technology that allows users to make telephone calls over the Internet
  2. Technology that allows users to communicate over the Internet rather than through traditional public networks
  3. Computer software designed to mimic the knowledge of a human expert
  4. The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
  5. Programs that instruct computers to perform specific operations
  6. An object placed into orbit by humans; most are used for communications purposes

12 Clues: Working from home or a remote locationComputerized storage for information and factsThe practical application of science to society and industryPrograms that instruct computers to perform specific operationsComputer software designed to mimic the knowledge of a human expertTechnology that allows users to make telephone calls over the Internet...

Blockchain puzzle 2021-03-07

Blockchain puzzle crossword puzzle
Across
  1. The creator of bitcoin
  2. The maximum number of bitcoins that can ever be created is ___ million
  3. A block in the blockchain can never have more than one parent block- true or false?
  4. Blockchain forms the bedrock for _______ like Bitcoin
  5. What is the first distributed blockchain implementation?
  6. The process of reaching consensus in blockchain networks is called
Down
  1. Which hashing algorithm does Blockchain use?
  2. Name the cryptocurrency created after a famous meme character
  3. Number of different types of Blockchains on the basis of user type
  4. Blockchain is the same as bitcoin - true or false?
  5. An approach that helps organizations to keep their data secure
  6. A file that keeps a permanent record of all the transactions that have taken place between two parties on the blockchain network is called

12 Clues: The creator of bitcoinWhich hashing algorithm does Blockchain use?Blockchain is the same as bitcoin - true or false?Blockchain forms the bedrock for _______ like BitcoinWhat is the first distributed blockchain implementation?Name the cryptocurrency created after a famous meme characterAn approach that helps organizations to keep their data secure...

Technology 2024-11-21

Technology crossword puzzle
Across
  1. – Online storage for saving files and accessing them remotely. (5 letters)
  2. – The amount of data that can be sent through a connection at one time. (9 letters)
  3. – A physical component of a computer, such as a keyboard or monitor. (8 letters)
  4. – The point where a user interacts with a computer system. (9 letters)
  5. – A harmful program that damages or disrupts systems. (7 letters)
  6. – The part of a computer responsible for executing instructions. (9 letters)
  7. – A wireless technology for short-distance communication. (9 letters)
Down
  1. – A collection of data stored electronically. (8 letters)
  2. – Programs and applications used by a computer. (8 letters)
  3. – A set of steps or rules used in programming. (9 letters)
  4. – A security system that protects networks. (8 letters)
  5. – The process of converting data into a secret code. (10 letters)

12 Clues: – A security system that protects networks. (8 letters)– A collection of data stored electronically. (8 letters)– A set of steps or rules used in programming. (9 letters)– Programs and applications used by a computer. (8 letters)– The process of converting data into a secret code. (10 letters)...

Science Fiction Crossword 2024-03-01

Science Fiction Crossword crossword puzzle
Across
  1. The smallest unit of matter
  2. A region of space having a gravitational field so intense that no matter or radiation can escape
  3. It includes all of space, and all the matter and energy that space contains
  4. They live in your computer and are created by humans but even exceed the intelligence of their creator
  5. A small rocky body orbiting the sun, usually found between Mars and Jupiter
Down
  1. The notional environment in which communication over computer networks occurs
  2. Using a device to travel across time, past or future
  3. A celestial body moving in an elliptical orbit round a star
  4. Duplicates
  5. Space of more than three dimensions
  6. An inorganic humanoid that carries out a set of instructions
  7. They live in space and travel in UFOs

12 Clues: DuplicatesThe smallest unit of matterSpace of more than three dimensionsThey live in space and travel in UFOsUsing a device to travel across time, past or futureA celestial body moving in an elliptical orbit round a starAn inorganic humanoid that carries out a set of instructions...

Digital Media Technology 2022-09-14

Digital Media Technology crossword puzzle
Across
  1. content which can be created, viewed, distributed, modified and stored within electronic devices
  2. programs used within computers which provide operating information
  3. designates where and how a file will be stored
  4. physical equipment used in digital media
  5. design a user can see when interacting with a device
  6. process of making corrections or improvements to digital media
  7. process of transferring content from the site of creation to a site for publishing or viewing
  8. location where files are safe and protected
Down
  1. connection between two or more devices allowing for sharing and collaborating
  2. program which manages the hardware and software on a computer
  3. process of preparing to create a project
  4. process of bringing content from the device used to create or capture it onto an electronic device to be edited or stored

12 Clues: process of preparing to create a projectphysical equipment used in digital medialocation where files are safe and protecteddesignates where and how a file will be storeddesign a user can see when interacting with a deviceprogram which manages the hardware and software on a computerprocess of making corrections or improvements to digital media...

Circulatory System 2020-09-22

Circulatory System crossword puzzle
Across
  1. contains hemoglobin, which reacts with oxygen
  2. defend the body against pathogens
  3. to stop blood from flowing backward
  4. muscular, elastic tubes that transport oxygenated blood away from the eart
  5. carry deoxygenated blood to hte heart
  6. a dark red chemical responsible for transporting oxygen
  7. heart has a double pump and circulation. Pulmonary circuit and systemic circuit
Down
  1. is the volume of blood pumped out of the heart with every beat.
  2. tiny blood vessels that form networks. Blood from arteries flow into capillaries
  3. is the amount of blood pumped from the heart every minute and can be calculated by multiplying heart rate (HR) by stroke volume (SV)
  4. consists water, allows susbstances to dissolve and be transported easily
  5. contains enzymes that causes blood to clot when there is damage to blood vessels.
  6. a liquid containing four components: plasma, RBC's, WBC's,platelets

13 Clues: defend the body against pathogensto stop blood from flowing backwardcarry deoxygenated blood to hte heartcontains hemoglobin, which reacts with oxygena dark red chemical responsible for transporting oxygenis the volume of blood pumped out of the heart with every beat.a liquid containing four components: plasma, RBC's, WBC's,platelets...

INSIDER THREAT crossword 2017-04-27

INSIDER THREAT crossword crossword puzzle
Across
  1. Threat of injury to persons.
  2. Goal of an Insider Threat Program.
  3. The ability and opportunity to obtain knowledge of classified sensitive information.
  4. Reportable action. (two words)
  5. An employee who hates his job to the point of aggression.
  6. An adversary having the intent, capability, and opportunity to cause loss or damage.
Down
  1. ________ Assistance Program
  2. Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
  3. A potential risk indicator for person living above his means.
  4. ____ ________ Monitoring (two words)
  5. A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
  6. Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
  7. You are required to ______ suspicious behavior.

13 Clues: ________ Assistance ProgramThreat of injury to persons.Reportable action. (two words)Goal of an Insider Threat Program.____ ________ Monitoring (two words)You are required to ______ suspicious behavior.An employee who hates his job to the point of aggression.A potential risk indicator for person living above his means....

Fortress Crossword 2023 2023-12-07

Fortress Crossword 2023 crossword puzzle
Across
  1. Where is the Fortress Safety HQ located?
  2. Who is the parent company of Fortress Safety?
  3. This is a separate part of an interlock that transmits the state of a guard (closed or not closed)
  4. Fortress offer short, informative, and entertaining online safety…
  5. The product range that uses heavy duty guard locking with network connectivity?
  6. Which solution can be used to manage permissions over industrial networks?
Down
  1. A type of inhibit function
  2. US regulatory agency whose mission is to assure safe and healthy working conditions by setting and enforcing standards
  3. A network protocol now available on proNet
  4. Which Fortress safeguarding solution is suitable for washdown environments?
  5. Fortress webinars are generally hosted on a specific day of the week
  6. An ______ release is actuated from outside the safeguarded space and requires a special tool
  7. Fortress Safety is well-known for manufacturing

13 Clues: A type of inhibit functionWhere is the Fortress Safety HQ located?A network protocol now available on proNetWho is the parent company of Fortress Safety?Fortress Safety is well-known for manufacturingFortress offer short, informative, and entertaining online safety…Fortress webinars are generally hosted on a specific day of the week...