networks Crossword Puzzles
COSBOA Acronym Challenge 2021-07-01
Across
- One half of the duopoly plans to acquire this food distributor.
- Industry association for petrol stations. COSBOA member.
- This amazing conference will take place in Sydney on the 9th and 10th of September.
- Position currently held by Bruce Bilson, previously held by Kate Carnell.
- Government agency providing advice on hackers and scams among other things.
- Regulator of competition.
- When this is implemented, debit card payments go through the cheapest route.
- This government agency collects your money!
- Industry association for reflexologists, acupuncturists,naturopaths, homeopaths, and more.
Down
- One of Australia's domestic payment networks, usually the cheapest option for merchants.
- Mental health coaching service by Beyond Blue that recently expanded its program for small business owners.
- Australia's peak body exclusively representing the interests of small business.
- COSBOA member representing independent supermarkets.
- Industry association for bookkeepers. COSBOA member.
- Independent body for workplace relations.
- Position currently held by Maree Adshead.
- Industry association for the banking sector (a COSBOA member also has this acronym).
- Regulator of the banks.
- Businesses must register their name with this regulator.
19 Clues: Regulator of the banks. • Regulator of competition. • Independent body for workplace relations. • Position currently held by Maree Adshead. • This government agency collects your money! • COSBOA member representing independent supermarkets. • Industry association for bookkeepers. COSBOA member. • Industry association for petrol stations. COSBOA member. • ...
Body Systems 2020-11-16
Across
- The ________________ is a short loop from the heart to the lungs and back again
- The nerves that go through the whole body make up the __________________
- the brain and the spinal cord are the _________________
- The ______ is also called the voice box
- The human brain weighs ______ pounds
- _______ is where most of the body's blood cells are made
- Cancellous bone resembles _____
- ________ is found in the heart
- ____________ are networks of tiny blood vessels
Down
- _________ is the solid, hard outside part of the bone
- Bones are made up of a framework of a protein called ________
- The lungs and ____________ allow us to breathe
- smooth muscle is also referred to as_________
- The _____ is a big artery that leaves the heart carrying this oxygenated blood
- Muscles move body parts by contracting and then ________
- ________is attached by cord-like tendons
- air enters the respiratory system through the ____ or the mouth.
- The _________ is the largest and most complex part of the brain
- The __________________ carries blood from the heart to all the other parts of the body and back again
19 Clues: ________ is found in the heart • Cancellous bone resembles _____ • The human brain weighs ______ pounds • The ______ is also called the voice box • ________is attached by cord-like tendons • smooth muscle is also referred to as_________ • The lungs and ____________ allow us to breathe • ____________ are networks of tiny blood vessels • ...
Civil War Dylan Dela Cruz 2017-02-14
Across
- commander of the confederate Army of Northern Virginia in the American Civil War from 1862 until his surrender in 1865.
- south.
- seperated from a state so they would not secceed from the union.
- Emancipation Proclamation enabled to change the status of slaves in what part of the U.S.?
- which side does Ulysses S. Grant command?
- known as one the major achievements of the war; sabotage enemy infrastructure,disrupts confederate economy and transportation networks.
- president of the U.S. and processed the Emancipation Proclamation.
- The ________ court house is the site of the confederate surrender.
- northern's main money maker.
Down
- withdrawal from a union
- civil war starts here.
- first and only president of the Confederate States of America.
- key point that is an advantage of the war.
- three-part strategy to win the civil war.
- drafting of civilians to serve in the Army.
- court order that says that a person who is jailed to appear before the court to determine he or she is being jailed.
- union victory in mississippi
- turning point of the civil war; most decisive battle of the war.
- union victory.
19 Clues: south. • union victory. • civil war starts here. • withdrawal from a union • union victory in mississippi • northern's main money maker. • three-part strategy to win the civil war. • which side does Ulysses S. Grant command? • key point that is an advantage of the war. • drafting of civilians to serve in the Army. • first and only president of the Confederate States of America. • ...
Westward Expansion 2024-11-08
Across
- State that the majority of Exodusters headed for
- railroad that linked eastern and western rail networks
- Hobbit that found the Ring of Power in a cave under the Misty Mountains
- Act that forced Native Americans to assimilate
- Site of the battle between the Sioux and American Cavalry
- Lieutenant that led his men against the Sioux and were all killed
- Ceremony that the Lakota Sioux believed would restart the world
- Site of a massacre of Native Americans by the army
- silver mine that produced $300 million in silver
- What would be left behind after a mine went "bust"
- Leader of the Exodusters
Down
- process by which a person or group adopts another dominate culture
- Animals that Plains Indians relied on for food and resources
- President that signed the Homestead Act
- Leader of the Lakota Sioux
- Homesteads that were made of sod instead of wood
- Settlers got 160 for free through the Homestead Act
- Act that encouraged Americans to settle West by giving free land
- created after the transcontinental railroad was formed
19 Clues: Leader of the Exodusters • Leader of the Lakota Sioux • President that signed the Homestead Act • Act that forced Native Americans to assimilate • State that the majority of Exodusters headed for • Homesteads that were made of sod instead of wood • silver mine that produced $300 million in silver • Site of a massacre of Native Americans by the army • ...
Ethylene 2024-01-15
Across
- Networks of transduction pathways regulate cellular responses to change the_____.
- ETR1, ERS1, ETR2, EIN4, and ERS2 are examples of _______.
Down
- Which of the receptors works as a positive regulator in ethylene signaling?
- Where are the ethylene receptors found? (short Form)
- One physiological change in the plant cells is _______ uptake by roots.
- This "fruit ripening hormone" is also known as ________.
6 Clues: Where are the ethylene receptors found? (short Form) • This "fruit ripening hormone" is also known as ________. • ETR1, ERS1, ETR2, EIN4, and ERS2 are examples of _______. • One physiological change in the plant cells is _______ uptake by roots. • Which of the receptors works as a positive regulator in ethylene signaling? • ...
Text 1 2025-02-03
Across
- Harmful software that damages or exploits computers and networks. (N)
- An attempt to steal, damage, or destroy data or systems without permission. (N)
- Unhappy or annoyed, often due to unfair treatment. (Adj.)
- To do or carry out, often something wrong or illegal. (V)
Down
- Punishment or revenge for a past action. (N)
- Forcing someone to pay or do something through threats. (N)
6 Clues: Punishment or revenge for a past action. (N) • Unhappy or annoyed, often due to unfair treatment. (Adj.) • To do or carry out, often something wrong or illegal. (V) • Forcing someone to pay or do something through threats. (N) • Harmful software that damages or exploits computers and networks. (N) • ...
Internet 2024-12-04
Across
- a small segment of a larger message
- a temporary storage area on a device that saves copies of frequently visited web pages, images, and other online content
- receives and sends data on computer networks
Down
- a group of connected computers that are able to send data to each other
- a machine that can store and process information.
- an application for accessing websites
6 Clues: a small segment of a larger message • an application for accessing websites • receives and sends data on computer networks • a machine that can store and process information. • a group of connected computers that are able to send data to each other • ...
cyberspace 2021-11-08
Across
- a listing of the computer files stored in memory
- a set sequence of steps, part of larger computer program
- transfer out of a database or document
- locate and correct errors in a computer program code
Down
- a facial expression represented by a sequence of characters
- the organization of data according to preset specifications
- a worldwide network of computer networks
- transfer a file or program to a smaller computer
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
9 Clues: transfer out of a database or document • a worldwide network of computer networks • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • a set sequence of steps, part of larger computer program • a facial expression represented by a sequence of characters • ...
cyberspace 2021-11-08
Across
- a listing of the computer files stored in memory
- a set sequence of steps, part of larger computer program
- transfer out of a database or document
- locate and correct errors in a computer program code
Down
- a facial expression represented by a sequence of characters
- the organization of data according to preset specifications
- a worldwide network of computer networks
- transfer a file or program to a smaller computer
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
9 Clues: transfer out of a database or document • a worldwide network of computer networks • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • a set sequence of steps, part of larger computer program • a facial expression represented by a sequence of characters • ...
ENCRYPTION 2023-08-22
Across
- A type of encryption where a single key is used for both encryption and decryption.
- Privilege The principle that suggests granting users the minimum privileges required.
- This type of encryption uses a pair of keys: public and private.
- Administrator The role responsible for managing and maintaining databases.
- The process of disguising plaintext within another message or medium.
Down
- The process of converting encrypted data back to its original form.
- A protocol used for ensuring secure communication over the internet.
- The role that often holds elevated privileges to manage database access.
- An encryption standard commonly used for securing Wi-Fi networks.
9 Clues: This type of encryption uses a pair of keys: public and private. • An encryption standard commonly used for securing Wi-Fi networks. • The process of converting encrypted data back to its original form. • A protocol used for ensuring secure communication over the internet. • The process of disguising plaintext within another message or medium. • ...
Malware and Social Engineering Crossword 2023-11-22
Across
- A
- A software with malicious intent
- A type of virus which does not carry out malicious activity but uses up the networks resources
- A
- A type of virus where your files are held at ransom and you are told to pay to get them back
Down
- A
- A type of spyware which monitors every key typed on a computer
- A type of Phishing
- A
- A malware which replicates itself and modifies code and other computer programmes
- A type of software which monitors and gathers information on a computer
- A type of virus which appears as something you want but also performs malicious actions
12 Clues: A • A • A • A • A type of Phishing • A software with malicious intent • A type of spyware which monitors every key typed on a computer • A type of software which monitors and gathers information on a computer • A malware which replicates itself and modifies code and other computer programmes • ...
Malware 2023-11-21
Across
- A piece of software that appears to perform a useful function but unbeknownst to the user performs malicious actions
- Software that is designed to gain access to your computer with malicious intent
- It infects a computer and causes it to download or display malicious adverts
- A large collection of malware-infected devices
Down
- Encrypts files, attacker asks for money to decrypt them
- Automated programs that perform tasks repeatedly
- A malicious form of self replicating software
- A self replicating software that causes problems by using up a networks bandwidth
- Unwanted software that monitors and gathers information on a person
9 Clues: A malicious form of self replicating software • A large collection of malware-infected devices • Automated programs that perform tasks repeatedly • Encrypts files, attacker asks for money to decrypt them • Unwanted software that monitors and gathers information on a person • It infects a computer and causes it to download or display malicious adverts • ...
Digital Citizenship Crossword Puzzle 2023-11-02
Across
- The practice of protecting computer systems and networks from digital attacks.
- Etiquette Appropriate behavior and manners when interacting with others online.
- Media Websites and apps that allow users to create and share content with others.
- Attempting to obtain sensitive information, like usernames and passwords, by pretending to be a trustworthy entity.
- A secret combination of characters used to access your accounts.
Down
- The legal protection of an original creative work (e.g., music, writing) from unauthorized use.
- Footprint The trail of data you create while using the internet.
- Harassment or threats that occur on the internet.
- Your right to keep personal information safe online.
9 Clues: Harassment or threats that occur on the internet. • Your right to keep personal information safe online. • Footprint The trail of data you create while using the internet. • A secret combination of characters used to access your accounts. • The practice of protecting computer systems and networks from digital attacks. • ...
Network Hardware 2024-05-10
Across
- 7-9-4,Allows a computer to connect to a network.
- 6, Allows devices to be connected within a network. Sends data to only the intended recipient.
- 5, Translates between digital signals and analogue signals for internet connection.
Down
- 8,Amplifies and retransmits signals to extend a network's range.
- 8, Acts as a security barrier, filtering incoming and outgoing traffic.
- 7,A device that serves as an entry point to another network.
- 8-6-5,Enables wireless connections to a network.
- 6, Connects and routes data between different networks.
- 3,Allows devices to be connected within a network. Broadcasts all data it receives.
9 Clues: 8-6-5,Enables wireless connections to a network. • 7-9-4,Allows a computer to connect to a network. • 6, Connects and routes data between different networks. • 7,A device that serves as an entry point to another network. • 8,Amplifies and retransmits signals to extend a network's range. • 8, Acts as a security barrier, filtering incoming and outgoing traffic. • ...
Techy Wishlist 2025-05-17
Across
- A 3D image formed by the interference of light beams
- Technology that overlays digital images or data onto the real world
- Vehicles that use AI, sensors, and cameras to drive without human input.
- Online storage and computing services accessible over the internet.
Down
- The virtual environment of computer networks where digital communication happens.
- A residence that can be controlled remotely or automatically,often connected to the internet
- Small electronic devices that perform specific functions,often useful or entertaining.
- A computer-generated simulation of a 3D environment that users can interact with cyberspace
- The science and technology of designing, building, and using robots
9 Clues: A 3D image formed by the interference of light beams • Technology that overlays digital images or data onto the real world • The science and technology of designing, building, and using robots • Online storage and computing services accessible over the internet. • Vehicles that use AI, sensors, and cameras to drive without human input. • ...
Cybersecurity Ylan 2024-11-07
Across
- A test used to verify if a user is human and not a robot.
- A program that protects your computer from viruses.
- Network of devices connected to the internet to exchange data.
- A company that makes equipment and software to help connect and protect computer networks.
- A secret part of the internet, often used for anonymous activities.
Down
- A unique number that identifies a computer or device on the internet or a network.
- A protocol used to connect and control a remote computer.
- A secret word or code to log in.
- A person who tries to break into computers illegally.
9 Clues: A secret word or code to log in. • A program that protects your computer from viruses. • A person who tries to break into computers illegally. • A protocol used to connect and control a remote computer. • A test used to verify if a user is human and not a robot. • Network of devices connected to the internet to exchange data. • ...
Internet Infrastructure 2024-11-12
Across
- a switch that can also send data across networks
- unique identifier that points to an IP address
- the combination of both a switch and a modem
- a device that serves as a bridge between a LAN and WAN
- Application Programming Interface
- the time it takes for one piece of data to go from point A to point B in a network
Down
- the protocol that allows for communication within a LAN
- according to the FCC, this must deliver a certain upload and download speed to qualify
- the amount of data that can be sent during a specific unit of time across a network
9 Clues: Application Programming Interface • the combination of both a switch and a modem • unique identifier that points to an IP address • a switch that can also send data across networks • a device that serves as a bridge between a LAN and WAN • the protocol that allows for communication within a LAN • ...
Risks of Emerging Technology 2025-10-03
Across
- Computing Data breaches, third party vendor risks, data sovereignty risk and service outages
- Security vulnerabilities in faster networks, increased dependency on connected devices and data interception
- Automation errors, lack of human oversight, cyber vulnerabilities
- Increased attack surface linked to bio-technologies, device vulnerabilities, data security and privacy concerns
Down
- Regulatory uncertainty, scalability challenges, smart contract vulnerabilities.
- Security of virtual environments, fraud in immersive platforms, and privacy issues
- Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks
- Privacy concerns, data theft, spoofing attacks and regulatory scrutiny
- Potential to break current cryptographic systems which may lead to data breaches and fraud
9 Clues: Automation errors, lack of human oversight, cyber vulnerabilities • Privacy concerns, data theft, spoofing attacks and regulatory scrutiny • Algorithmic bias, model errors, data privacy and misuse in fraud/cyberattacks • Regulatory uncertainty, scalability challenges, smart contract vulnerabilities. • ...
IT Quiz 2020-04-17
4 Clues: Linux based operating system • How users communicate with a computer • Has word processing and spreadsheet programs • Allows Linux computers to connect to networks
computer science 2025-10-21
Are your parents your "friends" in social networks? 2021-01-18
Across
- more and more; zunehmend p.47
- inner; innewohnend/innere(r)
- downside; Nachteil
- give up and admit that sth is true
- very important; lebenswichtig. p.43
- Privatsphäre
- not accept sth (ablehnen)
- completely, fully
Down
- authorization; Erlaubnis
- come into existence
- keep away from sth, not do sth; vermeiden
- for this reason, as a consequence. p.40
- offense; Einbruch/Eindringen/Eingriff
- mainly/ most importantly
- a call for sth; die Bitte
- disappear, leave
- makes you feel uncomfortable; peinlich
- tension is gone; erleichtert (sich...fühlen)
18 Clues: Privatsphäre • disappear, leave • completely, fully • downside; Nachteil • come into existence • authorization; Erlaubnis • mainly/ most importantly • a call for sth; die Bitte • not accept sth (ablehnen) • inner; innewohnend/innere(r) • more and more; zunehmend p.47 • give up and admit that sth is true • very important; lebenswichtig. p.43 • offense; Einbruch/Eindringen/Eingriff • ...
Introduction To Computer Networks || Lecturer :Kelly Jae Ferguson 2018-04-03
Across
- 32 bit dotted decimal IP address version
- Layer which provides a firm communication interface and end-user services
- When data flows in one direction at a time
- The most common type of LAN
- Cables cables are broadly classified into two types namely Single-mode and Multi-mode
- Wireless standard that secures the data with the much stronger TKIP encryption algorithm.
- Use IP addresses to forward traffic to other networks
- The world's largest WAN
- Server Server which translates Internet Protocol (IP) addresses to human-readable names
Down
- Application used to block certain IP addresses
- Used by sending host to add one or more protocol headers
- Each device is connected to two other devices in this topology
- Regenerates weak signals
- Computer hardware component that connects a computer to a computer network
- Ethernet cables connect two host devices
- Protocol Data Units at the network access layer
- IP address that is assigned is unique to each host within the same network or subnet
- The amount of time it takes data to travel from source to destination
18 Clues: The world's largest WAN • Regenerates weak signals • The most common type of LAN • 32 bit dotted decimal IP address version • Ethernet cables connect two host devices • When data flows in one direction at a time • Application used to block certain IP addresses • Protocol Data Units at the network access layer • Use IP addresses to forward traffic to other networks • ...
Introduction To Computer Networks Lecturer :Kelly Jae Ferguson 2018-04-03
Across
- Layer which provides a firm communication interface and end-user services
- When data flows in one direction at a time
- Ethernet cables connect two host devices
- Used by sending host to add one or more protocol headers
- The world's largest WAN
- The amount of time it takes data to travel from source to destination
- Use IP addresses to forward traffic to other networks
- Protocol Data Units at the network access layer
- 32 bit dotted decimal IP address version
Down
- Wireless standard that secures the data with the much stronger TKIP encryption algorithm.
- Computer hardware component that connects a computer to a computer network
- Cables cables are broadly classified into two types namely Single-mode and Multi-mode
- Regenerates weak signals
- Each device is connected to two other devices in this topology
- Application used to block certain IP addresses
- The most common type of LAN
- IP address that is assigned is unique to each host within the same network or subnet
- Server Server which translates Internet Protocol (IP) addresses to human-readable names
18 Clues: The world's largest WAN • Regenerates weak signals • The most common type of LAN • Ethernet cables connect two host devices • 32 bit dotted decimal IP address version • When data flows in one direction at a time • Application used to block certain IP addresses • Protocol Data Units at the network access layer • Use IP addresses to forward traffic to other networks • ...
Security Threats 2021-07-09
Across
- Takes advantage of a vulnerability in order to access or infect a computer
- software that permits advertisers or hackers to gather sensitive information without your permission
- a form of malware that replicates across the Internet or local networks
- software that denies you access to your files or computer until you pay a ransom
- a form of trap security specialists use to detect hacking attacks or collect malware samples
- malicious computer programs that can spread to other files
Down
- A collection of infected computers that are remotely controlled by a hacker
- malicious software
- unsolicited bulk email
- Files placed on your computer that allow websites to remember details
- reports of false and unsubstantiated claims, in an attempt to trick or defraud users.
- software add-ons designed to fix software bugs
- deceiving recipients into sharing sensitive
13 Clues: malicious software • unsolicited bulk email • deceiving recipients into sharing sensitive • software add-ons designed to fix software bugs • malicious computer programs that can spread to other files • Files placed on your computer that allow websites to remember details • a form of malware that replicates across the Internet or local networks • ...
Theoretical and methodological foundations of determining behavior of small business entities in network activities and network offer! 2025-12-15
Across
- – Joint actions of businesses to achieve mutual benefits.
- platform – An online system that connects businesses and customers.
- offer – The set of products or services provided through a business network.
- – A system of interconnected businesses cooperating to achieve common goals.
- activity – Business operations carried out through interconnected firms or digital platforms.
- – A set of methods and approaches used to analyze business activities.
- – A long-term cooperative relationship between business entities.
Down
- exchange – The sharing of data and knowledge among network participants.
- behavior – The way firms make decisions and react to market conditions.
- – The ability of a business to adapt to changes in a network environment.
- – The introduction of new ideas, products, or methods in business networks.
- – The process of working together to create shared value.
- segment – A specific group of customers targeted by businesses.
- business – Business entities that operate on a small scale with limited resources.
- – A system of ideas explaining the behavior of small business entities.
15 Clues: – Joint actions of businesses to achieve mutual benefits. • – The process of working together to create shared value. • segment – A specific group of customers targeted by businesses. • – A long-term cooperative relationship between business entities. • platform – An online system that connects businesses and customers. • ...
Types of Engineering 2022-07-26
Across
- designing spacecraft, aircraft, satellites, and missiles
- care for internal systems of ships, submarines, sailboats, and tankers
- work on systems and instruments that can derive the benefit of nuclear energy
- solve problems that affect the use or production of chemicals, food, drugs, and more
- improve issues such as drinking water, climate change, public and sustainability
- solve problems concerning the storage and processing of agricultural products
- designing, building, and maintaining bridges, roads, tunnel, and water systems
Down
- designing, building, and developing engines, tools, and machines
- works with computer components such as circuit boards, processors, networks, and routers
- specialize in working designing and building robots
- study the properties and structures of metals, ceramics, plastics, and more
- working to extract oil and gas from below Earth's surface
- designing, testing, and manufacturing with components with electricity
- ensure individuals in a workplace remain safe from potential injury and other health hazards
14 Clues: specialize in working designing and building robots • designing spacecraft, aircraft, satellites, and missiles • working to extract oil and gas from below Earth's surface • designing, building, and developing engines, tools, and machines • care for internal systems of ships, submarines, sailboats, and tankers • ...
Computer Science Crossword 2023-05-02
Across
- An email sent by attacker that tricks users into providing information
- System where numbers are expressed 0 or 1
- Rules for communication between browsers
- A network that connects devices around the world
- Allows computer to make decisions
- Removing errors from computer
- Any group of word or symbols that is a value
Down
- The hierarchical addressing protocol that is human-readable
- Converting information into code to prevent unauthorized access
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Using a looping control structure, such as for, repeat
- File or code that typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- Manage the breakdown of a message into packets to be transmitted and reconstructed after arrival
- Device that route traffic between networks
14 Clues: Removing errors from computer • Allows computer to make decisions • Rules for communication between browsers • System where numbers are expressed 0 or 1 • Device that route traffic between networks • Any group of word or symbols that is a value • A network that connects devices around the world • Using a looping control structure, such as for, repeat • ...
Service Desk Refresher 3 2023-06-30
Across
- If a user's disk quota is full, they can still log into ieng6 via this method
- Service managed by Messaging Collaboration related to email security
- Certain classes provide users with a specific ___ account
- Wired computers automatically obtain IP addresses through this protocol
- The standard for the PROTECTED networks; also related to the software team
- Alumni might need to use this Google tool, but not for ordering food
- The team that can schedule dry runs of a room for users
Down
- Emails ending with -l or -g are called an email ___
- A synonym for a long poem, for which we send all related issues to Health
- The method by which former employees can retain their email, "brought to you by" their department
- Type of block affecting people off-campus
- Questions about the campus firewall should go to this group
- The group that faculty can call for Canvas questions/issues
- Contact for revoked Business Systems
14 Clues: Contact for revoked Business Systems • Type of block affecting people off-campus • Emails ending with -l or -g are called an email ___ • The team that can schedule dry runs of a room for users • Certain classes provide users with a specific ___ account • Questions about the campus firewall should go to this group • ...
Industry 4.0 Newsletter 2024-03-14
Across
- A machine used to smoothen and polish paper
- A standardized test used to measure the drainage rate of pulp suspension
- A machine used to remove water from pulp to form paper
- measure of how much the values in a dataset vary from the mean
- An algorithmic approach that iteratively improves a solution
- ________ is an unsupervised ML algorithm for classifying data into groups
- ________ machine learning algorithms deal with labelled data
Down
- ________ length is a measure indicating the strength of a paper
- A method for checking the accuracy and quality of the data
- _______ capture is a method for mitigating greenhouse gas emissions by trapping and containing carbon dioxide
- The process of transforming unstructured data into structured data
- A type of machine learning algorithm inspired by the structure of the brain, _______ Networks
- A statistical technique for estimating the relationship between variables
- It is the nearest Paper Machine to the Admin Block in ITC BCM
14 Clues: A machine used to smoothen and polish paper • A machine used to remove water from pulp to form paper • A method for checking the accuracy and quality of the data • An algorithmic approach that iteratively improves a solution • ________ machine learning algorithms deal with labelled data • It is the nearest Paper Machine to the Admin Block in ITC BCM • ...
Computer Science Crossword 2024-03-19
Across
- Protecting computers and networks from theft or damage.
- Wireless local area network that uses radio waves to connect devices to the internet.
- An icon or figure representing a person in video games, forums, etc.
- Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- The ability to read and write.
- A secret word or phrase that must be used to gain admission to something.
- A computer program designed to simulate conversation with human users.
Down
- The programs and other operating information used by a computer.
- Facts and statistics collected for reference or analysis.
- A system of numerical notation that has 2 rather than 10 as a base.
- The action or practice of playing video games.
- A program or piece of software designed to fulfill a particular purpose.
- The physical parts of a computer system.
- A step-by-step procedure for calculations.
14 Clues: The ability to read and write. • The physical parts of a computer system. • A step-by-step procedure for calculations. • The action or practice of playing video games. • Protecting computers and networks from theft or damage. • Facts and statistics collected for reference or analysis. • The programs and other operating information used by a computer. • ...
Vocbulary - compound nouns in IT industry 2024-09-11
Across
- A copy of data stored separately to protect against loss.
- The process of transferring data from a remote system to a local one.
- A security system that controls incoming and outgoing network traffic
- A device used to input text and commands into a computer.
- A unique identifier used to log into a system or account.
- The protection of computer systems and networks from attacks.
- The physical components of a computer system, like the CPU, monitor, and keyboard.
- A group of connected computers and devices that share resources.
Down
- The process of transferring data from a local system to a remote one.
- A secret word or phrase used to access a system or account.
- The main page of a website that users first see.
- Programs and applications that run on computers and devices.
- A collection of related web pages accessed via the internet.
- A structured collection of data stored electronically
14 Clues: The main page of a website that users first see. • A structured collection of data stored electronically • A copy of data stored separately to protect against loss. • A device used to input text and commands into a computer. • A unique identifier used to log into a system or account. • A secret word or phrase used to access a system or account. • ...
cybersecurity Crossword 2025-08-26
Across
- Type of hacker who violates securities for personal gain
- Any information that can be acccessed through a combination of information
- Revealing of personal details online with intention of harassment, intimidation, or threats
- Special piece of software that stores data and can be easily acccessed
- Information stored digitally
- Field dedicated to the protection of individuals and corporations from the misuse of technology
Down
- Using the internet with intentions of with intention of harassment, intimidation, or threats
- System that connects multiple devices to enable communication and sharing internet, files, etc.
- A weakness or flaw in a digital system or software
- Type of hacker who uses their skills to test and assess the security of networks and systems
- Someone who wrongly uses a software or database than intended
- A term meaning that a system was acccessed by someone unauthorized
- Person in charge of maintaining a network
- Type of hacker who may violates laws without ill intent
14 Clues: Information stored digitally • Person in charge of maintaining a network • A weakness or flaw in a digital system or software • Type of hacker who may violates laws without ill intent • Type of hacker who violates securities for personal gain • Someone who wrongly uses a software or database than intended • ...
Learning about learning 2024-03-01
Across
- digital learning, networks, information flow, knowledge construction, connectivity, and technology
- a way of learning in which shared traditions, values, customs, language, and intergenerational knowledge transfer
Down
- a way of learning that improves through group interaction, cooperation, and shared goals
- cultural identity, traditions, ancestral knowledge, community resilience
- our emotional well-being
- learning that is rooted in nature, environment, sustainability, and indigenous knowledge
6 Clues: our emotional well-being • cultural identity, traditions, ancestral knowledge, community resilience • a way of learning that improves through group interaction, cooperation, and shared goals • learning that is rooted in nature, environment, sustainability, and indigenous knowledge • ...
ICT in Construction 2020-04-14
Across
- ICT creates the big _____________ into construction industry
- ___________ is a device used in information and communication technology
Down
- people can ______________ in real-time with others in different countries using technologies
- ICT encompasses both the ____________-enabled sphere as well as the mobile one powered by wireless networks
- ___________ is known as one of the component of ICT
- a large number of _________ are generated and exchanged
6 Clues: ___________ is known as one of the component of ICT • a large number of _________ are generated and exchanged • ICT creates the big _____________ into construction industry • ___________ is a device used in information and communication technology • people can ______________ in real-time with others in different countries using technologies • ...
Exams 2023-06-15
Across
- numbers with decimal points and lesser precision
- The primary source of news and entertainment for many households
- A way of connecting different computer networks together.
Down
- The tab in MS PowerPoint that allows you to add and manage animations in a presentation.
- tab that consists of variants and customize groups
- A type of data that represents true or false values
6 Clues: numbers with decimal points and lesser precision • tab that consists of variants and customize groups • A type of data that represents true or false values • A way of connecting different computer networks together. • The primary source of news and entertainment for many households • ...
CYBERSECURITY 2015-03-25
Across
- ... device forensics roots began when mobile devices started to become popular, about 2000.
- Digital ... is used to capture volatile information from random access memory (RAM) and other running processes, including networks.
- ...are fast moving and increasing in number and severity.
Down
- ISACA publication Transforming ...
- Digital forensics scientific process: ...of custody.
- ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion.
- Implementing the NIST Cybersecurity Framework guide implements the CSF using ISACA’s ... 5 processes.
7 Clues: ISACA publication Transforming ... • Digital forensics scientific process: ...of custody. • ...are fast moving and increasing in number and severity. • ... device forensics roots began when mobile devices started to become popular, about 2000. • ...reasoning uses a series of specific pieces of information to extrapolate a broad conclusion. • ...
Network Tepology 2016-10-27
Across
- a device that connects two Ethernet networks
- a server which connects all computers
- making a code simple
- it is a box with the server for the internet
Down
- refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range. For example, an audio signal may have a baseband range from 20 to 20,000 hertz.
- a bus with topology
- making a file into a code
7 Clues: a bus with topology • making a code simple • making a file into a code • a server which connects all computers • a device that connects two Ethernet networks • it is a box with the server for the internet • ...
Cyber Ethics 2025-06-11
Across
- - secretly break into computers to steal or destroy data
- - being aware the ethical practices and behaving responsibly while using the internet
- - impression or information about a person that exists on internet because of his online activities
- - unwanted bulk emails coming from unwanted resource
Down
- - criminal activities involving computer, networks and internet
- - defined as legal rules and restrictions imposed on online users
- - act of using or imitating the language and thoughts of another person as one's original work
7 Clues: - unwanted bulk emails coming from unwanted resource • - secretly break into computers to steal or destroy data • - criminal activities involving computer, networks and internet • - defined as legal rules and restrictions imposed on online users • - being aware the ethical practices and behaving responsibly while using the internet • ...
TecNova Set-1 2021-09-17
5 Clues: To Measure Voltage or Potential Difference • Type of Security for Computers and Networks • Converts Electrical Energy into Sound Energy • This Engineer work at places like Google&Apple Like Company. • A Human Colony on the moon would be planned by these types of Engineers
Lessons 1-9 Crossword 2015-09-30
Across
- A related group of networked computers.
- Malicious code.
- Website used for HTML Essential Training.
- Number of seconds you can legally use of music or lyrics.
- What kind of language you should use rather than subjective, boastful, or exaggerated.
- Popular ones of these are Google, Yahoo!, and AOL.
- Where Lynda.com can be accessed from for UT students.
- Number of images you can legally use from one artist or photographer.
- Reading on a screen is _____ _____ % slower than reading from paper.
- The main technology for local area networks.
Down
- Type of operators for search engines that include "AND", "OR", and "NOT".
- Converts the bits a computer outputs into a form that is compatible with a carrier.
- Communication in which both the sender and the receiver are active at the same time.
- Using UT IT resources in an unauthorized manner.
- Hypertext Markup Language.
- The number of employees for ScrippNetworks.
- Used to view web pages containing text, images, videos, and other multimedia.
- Data stored to help load webpages faster.
- A group of information on a computer that can be software programs or data.
19 Clues: Malicious code. • Hypertext Markup Language. • A related group of networked computers. • Website used for HTML Essential Training. • Data stored to help load webpages faster. • The number of employees for ScrippNetworks. • The main technology for local area networks. • Using UT IT resources in an unauthorized manner. • Popular ones of these are Google, Yahoo!, and AOL. • ...
Insider Threat 2022-09-21
Across
- The ability and opportunity to obtain knowledge of classified sensitive information
- A potential risk indicator for person living above his means
- Devotion or loyalty to a person, group, cause, or country
- You are required to ------ suspicious behavior
- Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, Networks, or systems
- An adversary having the intent, capability, and opportunity to cause loss or damage
Down
- Reportable action (two words)
- Goal of an Insider Threat Program
- An employee who hates his job to the point of aggression
- -------- Assistance Program
- ---- -------- Monitoring (two words)
- Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities
12 Clues: -------- Assistance Program • Reportable action (two words) • Goal of an Insider Threat Program • ---- -------- Monitoring (two words) • You are required to ------ suspicious behavior • An employee who hates his job to the point of aggression • Devotion or loyalty to a person, group, cause, or country • A potential risk indicator for person living above his means • ...
NEETS MODULE 1 CHAPTER 3 DIRECT CURRENT 2020-08-07
Across
- The basic unit of electrical current.
- The flow of electrons past a reference point.
- An individual current path in a parallel circuit.
- A circuit that consists of both series and parallel networks.
- A low resistance connection between two points of different potential in a circuit
- An electric current that flows in one direction only.
Down
- An arrangement where electrical devices are connected so that the total current must flow through all the devices
- a circuit which does not provide a complete path for the flow of current.
- Two or more electrical devices connected to the same pair of terminals so separate currents flow through each
- The complete path of an electric current.
- The unit of electrical resistance.
- A combination of electrical components.
12 Clues: The unit of electrical resistance. • The basic unit of electrical current. • A combination of electrical components. • The complete path of an electric current. • The flow of electrons past a reference point. • An individual current path in a parallel circuit. • An electric current that flows in one direction only. • ...
Glitchsters Recruitment Test 2021-04-27
Across
- The power to influence or direct people's behaviour or the outcome of events
- A system of government that is dictatorial and requires complete subservience to the state
- Use of computer networks to gain illicit access to confidential information, typically held by a government or other organisation
- Held in or conducted with secrecy
- The ability of an individual or group to seclude themselves, and thereby express themselves selectively
Down
- To check the progress or quality of something
- To comply with certain standards of society
- The monitoring of behaviour, activities, or information for the purpose of information gathering, and influencing
- Facts and statistics collected together for analysis
- State of being unknown to most people
- Freedom from restrictions on thought or behaviour
- Breaking into a computer system or a private network through a computer
12 Clues: Held in or conducted with secrecy • State of being unknown to most people • To comply with certain standards of society • To check the progress or quality of something • Freedom from restrictions on thought or behaviour • Facts and statistics collected together for analysis • Breaking into a computer system or a private network through a computer • ...
TCOE Business Day of Job 2023-03-22
Across
- Allows callers to be automatically transferred to an extension; a virtual receptionist
- IP number is the number the customer uses
- A customer setting; open access port for information to route through
- Wifi provided to a designated area
- Provides a backup connection keeping customers online during times of service or power interruption. Battery backup provided.
- IP stays the same over time (3 words)
Down
- The order in switch numbers roll when previous line is busy
- Restrictions on the modem, i.e. pass through mode- Internet only no wifi
- Add equipment/load statistics only
- The packet of information that we send to the modem to tell it what speed services to allow/
- Provides advanced-feature Private Wifi and Guest Wifi Networks
- An appointment that has to be scheduled ASAP
12 Clues: Add equipment/load statistics only • Wifi provided to a designated area • IP stays the same over time (3 words) • IP number is the number the customer uses • An appointment that has to be scheduled ASAP • The order in switch numbers roll when previous line is busy • Provides advanced-feature Private Wifi and Guest Wifi Networks • ...
Networking 2023-05-01
Across
- The language computers within networks use to communicate
- The maximum range of frequencies in a band
- A network of devices within a small local area, such as a building
- How connections are arranged in a network
- A program or device that provides service to a client
Down
- Hiding the contents of data by encoding it
- A protective fortification around a network that requires a password to get through
- A network used within a business, inaccessible by outsiders
- A unique identification address that identifies a device on a network
- A person that controls a network and has access to all aspects of it, can change things in it
- A person that pays for and uses a network
- A virtual point where connection are start and finish
12 Clues: A person that pays for and uses a network • How connections are arranged in a network • Hiding the contents of data by encoding it • The maximum range of frequencies in a band • A virtual point where connection are start and finish • A program or device that provides service to a client • The language computers within networks use to communicate • ...
Computer Systems 2013-10-24
Across
- device – Used to transfer data out of a computer eg.Speakers
- - the exclusive and assignable legal right, given to the originator for a fixed number of years, to print, publish, perform, film, or record literary, artistic, or musical material.
- - a group or system of interconnected people or things.
- - the programs and other operating information used by a computer.
- – Where data is stored e.g. Computer
Down
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- – A structured set of data held in a computer
- - the machines, wiring, and other physical components of a computer or other electronic system.
- - Brains of the computer
- - Internal storage areas in the computer
- - a panel of keys that operate a computer or typewriter.
- - random access memory
12 Clues: - random access memory • - Brains of the computer • – Where data is stored e.g. Computer • - Internal storage areas in the computer • – A structured set of data held in a computer • - a group or system of interconnected people or things. • - a panel of keys that operate a computer or typewriter. • device – Used to transfer data out of a computer eg.Speakers • ...
We Are Still Here 2025-04-07
Across
- Laws that help protect native children from being taken from native homes and support help support native education.
- Native people speaking up about their rights and the
- Speaking up for individual rights.
- How land is controlled and divided.
- Tribal people being encouraged and pushed off of their lands away from families and support networks.
Down
- Native Americans pressuring congress to change federal laws to start supporting tribal sovereignty.
- Challenging federal laws and policies that had previously banned tribal religious practices.
- Finding ways to help Native people succeed economically; including opening casinos.
- to adopt someone elses beliefs and practices.
- Laws passed to allow, encourage, teach and finance native languages being spoken.
- To stop honoring treaty agreements of over 100 tribes.
- New laws made by congress to help native people.
12 Clues: Speaking up for individual rights. • How land is controlled and divided. • to adopt someone elses beliefs and practices. • New laws made by congress to help native people. • Native people speaking up about their rights and the • To stop honoring treaty agreements of over 100 tribes. • Laws passed to allow, encourage, teach and finance native languages being spoken. • ...
Technology - Unit 12 2025-03-06
Across
- A digital world where users can interact in simulated environments.
- Programs and operating systems used by a computer.
- The field involving computers, networks, and data
Down
- A type of malicious program designed to secretly gather user information.
- The act of moving content up or down on a screen.
- A platform that allows people to connect, share, and interact online.
- A malicious attempt to damage or disrupt computer systems, often over the internet.
- Moving an item on a computer screen by clicking and holding it with a mouse.
- A system for communicating via physical letters instead of electronic messages.
- The physical parts of a computer system.
- Sending digital content, such as videos or music, in real-time over the internet.
- A sudden failure of a computer or software system.
12 Clues: The physical parts of a computer system. • The act of moving content up or down on a screen. • The field involving computers, networks, and data • Programs and operating systems used by a computer. • A sudden failure of a computer or software system. • A digital world where users can interact in simulated environments. • ...
Ethics in AT 2024-09-04
Across
- Fairness in individual, interpersonal, organizational, and societal contexts
- The constructed norms of internal consistency regarding what is right and what is wrong
- Not causing harms to other directly or through avoidance of actions that risk harming others
- Faithful, loyal, honest, and trustworthy behavior
- Freedom from unnecessary constraints, interference
- A required part of AT service delivery
- All forms of action intended to benefit or promote the good of other persons
Down
- Opportunity to make a choice on how and when a daily function are carried out
- Privacy of the person and personal information
- A sign of social unacceptability when there is perceived shame
- The freedom of individuals are viewed as basic building blocks
- Environment Every electronic device is linked on local networks or the internet
12 Clues: A required part of AT service delivery • Privacy of the person and personal information • Faithful, loyal, honest, and trustworthy behavior • Freedom from unnecessary constraints, interference • A sign of social unacceptability when there is perceived shame • The freedom of individuals are viewed as basic building blocks • ...
Terminology Termination 2017-08-30
Across
- a computing-infrastructure and software model for enabling ubiquitous access to shared pools of configurable resources (such as computer networks, servers, storage, applications and services)
- is a prototype grocery store operated by online retailer Amazon.com where customers are able to purchase products without using a cashier or checkout station
- the first 64-bit OS
Down
- first operating system by windows
- standardized javascript
- a compiled English-like computer programming language designed for business use
- latest android version
7 Clues: the first 64-bit OS • latest android version • standardized javascript • first operating system by windows • a compiled English-like computer programming language designed for business use • is a prototype grocery store operated by online retailer Amazon.com where customers are able to purchase products without using a cashier or checkout station • ...
Keeping safe online 2024-01-17
Across
- These are where scammers use social networks to gain your trust and ask for money from you.
- These scams focus on medical-related products
- These websites may look like the official website but they are not.
- Phishing can be conducted via a text, social media, email or ...
Down
- Computer viruses are programs spread by a link or an ... in an email.
- What is another term for computer viruses?
- This is what scam emails can be referred to.
7 Clues: What is another term for computer viruses? • This is what scam emails can be referred to. • These scams focus on medical-related products • Phishing can be conducted via a text, social media, email or ... • These websites may look like the official website but they are not. • Computer viruses are programs spread by a link or an ... in an email. • ...
A Special Place 2025-10-08
Across
- when people explored and settled the western part of North America
- a long, sandy island parallel to the seashore that protects the shores from waves and wind off the ocean
- mounds or small hills of sand created by wind and waves
- a group or category of plants
Down
- travel from one location to another at certain times of the year
- almost extinct
- networks of plants, animals, and the environment they live in
7 Clues: almost extinct • a group or category of plants • mounds or small hills of sand created by wind and waves • networks of plants, animals, and the environment they live in • travel from one location to another at certain times of the year • when people explored and settled the western part of North America • ...
The circulatory system 2024-05-01
Across
- tubular branching vessels that carry blood from the capillaries toward the heart
- the chambers of the heart that receives blood from the veins
- the smallest blood vessels arterioles with venules and forming networks throughout the body
- liquid that flows through the veins
- carry blood from the heart through the body
Down
- a chamber of the heart which receives blood from a corresponding atrium
- acts as a force pump maintaining the circulation of the blood
7 Clues: liquid that flows through the veins • carry blood from the heart through the body • the chambers of the heart that receives blood from the veins • acts as a force pump maintaining the circulation of the blood • a chamber of the heart which receives blood from a corresponding atrium • tubular branching vessels that carry blood from the capillaries toward the heart • ...
Computer Network Puzzle 2023-02-07
Across
- of the main protocols in TPC/IP network
- two or more devices connected together to send information
- The exchange of computer-stored messages sent from one person to the other .
Down
- A system of rules that explain the correct conduct or procedures to be followed in formal situations .
- A worldwide system of computer networks
- a computer or computer program which manages access to a centralized resource or service in a network.
- Broadcasts data to every computer .
7 Clues: Broadcasts data to every computer . • A worldwide system of computer networks • of the main protocols in TPC/IP network • two or more devices connected together to send information • The exchange of computer-stored messages sent from one person to the other . • A system of rules that explain the correct conduct or procedures to be followed in formal situations . • ...
rrr 2025-03-30
Across
- What type of ai mimics human conversation
- What does G stands for when we say GPT
- What structures can be found in neural networks
- What the term for a step-by-step procedure used to solve a problem
Down
- What language is commonly used for AI development
- What is the name of the process used to improve an AI's performance through examples
- What the name of the process by which ai improve its performance through experience
7 Clues: What does G stands for when we say GPT • What type of ai mimics human conversation • What structures can be found in neural networks • What language is commonly used for AI development • What the term for a step-by-step procedure used to solve a problem • What the name of the process by which ai improve its performance through experience • ...
IT Jobs 2025-07-27
4 Clues: Creates new apps or websites • Builds and fixes software and apps • Studies data and gives simple reports • Keeps computers, systems, and networks running
Technology 2020-08-12
Across
- Investigating to identify where a fault is
- Automatically gives ipaddress to nodes on the network
- Device allowing more than two nodes to communicate
- Founder of Microsoft
- Process where two different operating systems are installed on one computer or laptop
- Permanent storage in devices such as computer
- Networks that are connected globally to pride resources to share
- Private and public model of providing access to resources remotely through paid subscription
- Container of a value stored in the memory during programming
- Cable allows switch or router to be configured using computer or laptop
- Language used by devices on the network to communicate
Down
- Digital kidnapping of data through encryption which is decrypted after money is paid
- Houses all the major components and circuitry in the computer
- Place or join together common use in programming
- Enables admistrative and secured management of local area network
- where more than two devices are connected to exchabge data
- Software app that allows access to the web
- Allowed user to input into the system
- Used by router to identify where to send data packets
19 Clues: Founder of Microsoft • Allowed user to input into the system • Investigating to identify where a fault is • Software app that allows access to the web • Permanent storage in devices such as computer • Place or join together common use in programming • Device allowing more than two nodes to communicate • Automatically gives ipaddress to nodes on the network • ...
Social Media Crossword 2020-06-11
Across
- #
- a network for online picture sharing
- anything shared across social networks that get passed along rapidly e.g Youtube
- a self portrait taken using the reverse camera screen on a smart phone
- here you are allowed to share a 140 character update.
- a site updated frequently by an individual or group to record opinions or information.
- simple web pages that can be edited by other users
- clusters of a user's friends, colleague, family or connections on google+
Down
- a one-to-one communication on the internet.
- a system that manages content
- they are also known as message boards.
- a free URL shortening service
- It is an image or username that represents a person online most often within forums and social network
- a message sent on twitter.
- an action that can be made by a facebook user.
- a photo sharing application gained more than 300 million users.
- a pictorial representation of a facial expression which is used in writing.
- platform founded by Mark Zuckerberg
- a small attractive application on a website such as a hit counter.
19 Clues: # • a message sent on twitter. • a system that manages content • a free URL shortening service • platform founded by Mark Zuckerberg • a network for online picture sharing • they are also known as message boards. • a one-to-one communication on the internet. • an action that can be made by a facebook user. • simple web pages that can be edited by other users • ...
Chapter 12- Relationships in the Workplace 2016-01-09
Across
- Networking only through internet accessories.
- Working from home.
- Form of upward communication based on six principles.
- People holding positions of organizational status and power similar to your own.
- The act of bullying online.
- Equivalent-status peers you share high levels of emotional support with.
- Type of climate featuring unfriendly and rigid personnel.
- A form of communication to persuade your superiors for work-related needs.
- Type of harassment involving misconduct and unwelcome advances between two different genders.
Down
- Coworkers who communicate mainly through phone or computer.
- Relationships between coworkers of different status.
- Relationship involving status, intimacy, and choice.
- Peers that are equivalent in status to whom you share limited work-related content.
- Engaging in personal interests on your computer when you should be working.
- A dense network of coworkers sharing the same beliefs and values.
- A climate where the employees communicate honestly and openly.
- The general atmosphere of the workplace.
- Communicating with subordinates.
- Coworkers you consider to be your friend.
- Workers who are reputable, knowledgeable, and connected to dense organizational networks.
20 Clues: Working from home. • The act of bullying online. • Communicating with subordinates. • The general atmosphere of the workplace. • Coworkers you consider to be your friend. • Networking only through internet accessories. • Relationships between coworkers of different status. • Relationship involving status, intimacy, and choice. • ...
Body Systems 2020-11-16
Across
- ____________ are networks of tiny blood vessels
- The human brain weighs ______ pounds
- The ______ is also called the voice box
- The lungs and ____________ allow us to breathe
- Muscles move body parts by contracting and then ________
- ________ is found in the heart
- _______ is where most of the body's blood cells are made
- Bones are made up of a framework of a protein called ________
- air enters the respiratory system through the ____ or the mouth.
Down
- The __________________ carries blood from the heart to all the other parts of the body and back again
- _________ is the solid, hard outside part of the bone
- smooth muscle is also referred to as_________
- The ________________ is a short loop from the heart to the lungs and back again
- ________is attached by cord-like tendons
- The _____ is a big artery that leaves the heart carrying this oxygenated blood centralnervoussystem the brain and the spinal cord are the _________________
- The nerves that go through the whole body make up the __________________
- The _________ is the largest and most complex part of the brain
- Cancellous bone resembles _____
- The cells in our bodies need ______ to stay alive
19 Clues: ________ is found in the heart • Cancellous bone resembles _____ • The human brain weighs ______ pounds • The ______ is also called the voice box • ________is attached by cord-like tendons • smooth muscle is also referred to as_________ • The lungs and ____________ allow us to breathe • ____________ are networks of tiny blood vessels • ...
physics - electromagnetic spectrum 2021-05-24
Across
- light pulses transmitted along these (5,6)
- penetrating radiation which can cause damage to body tissues, useful to kill cancer etc.
- objects that absorb uv waves and emit the energy as visible light
- penetrate our body and provide a valuable way for doctors to diagnose illness or damage to our bodies
- electromagnetic waves are
- repeating the results reduces the effect of errors, this is called ________
- hot objects emit this, used in efficient lamps
- radio waves transmitted over long distances by being reflected off this (layer in the earth's upper atmosphere)
- used to send ____ and television signals from transmitters to homes, terrestrial as they go across ground
- _______ wavelength at highest energy
Down
- used to see
- used for satellite communication, satellite television, mobile phone networks through tall aerial masts, cooking, heating
- electromagnetic waves can travel through a
- ________ wavelength at lowest energy
- heating from electrical heaters, cooking in ovens, cameras for photographs at night, remote controls
- the required practical of this topic to see the emission of _________
- _______ frequency at lowest energy
- wave formed by a change in the nucleus of an atom, when this is emitted the nuclear store decreases
- control variables ensure ________
- the speed that they travel at in a vacuum
- _____ frequency at highest energy
21 Clues: used to see • electromagnetic waves are • control variables ensure ________ • _____ frequency at highest energy • _______ frequency at lowest energy • ________ wavelength at lowest energy • _______ wavelength at highest energy • the speed that they travel at in a vacuum • electromagnetic waves can travel through a • light pulses transmitted along these (5,6) • ...
Network 2018-02-08
Across
- (Internet Service Provider)
- collection of data that can be used by computers which need to communicate with each other, usually as part of a network.
- in which constituent parts are interrelated or arranged.
- or computer program which manages access to a centralized resource or service in a network.
- that provides services accessing and using the Internet.
- of rules or procedures for transmitting data between electronic devices
- device that forwards data packets between computer networks.
- allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- (Domain Name Server)
- Has a trunk
Down
- computer or workstation that is capable of obtaining information and applications from a server.
- string of numbers separated by full stops that identifies each computer using the Internet Protocol to communicate over a network.
- Large marsupial
- Man's best friend
- bunch of wires used to connect two things.
- system for converting alphabetic names into numeric IP addresses
- address
- Likes to chase mice
- Flying mammal
19 Clues: address • Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • (Domain Name Server) • (Internet Service Provider) • bunch of wires used to connect two things. • in which constituent parts are interrelated or arranged. • that provides services accessing and using the Internet. • device that forwards data packets between computer networks. • ...
A2+ 2024-10-17
Across
- My teacher is my __ because she helps me learn every day.
- She is ___ about joining the art club this year.
- The ___ told the story to the police.
- The ____ man enjoys reading books in the park every afternoon.
- A helmet can help ___ your head when you ride a bike.
- I use my phone as a ___ to connect to the internet.
- The firefighter was ___ when he saved the child from the fire.
- The ____ teacher gave a great lecture on science.
Down
- He looked ____ _____in his new suit for the wedding.
- We need to ___ __ the chairs before the party starts.
- Can you help me ___ the game on my tablet?
- He was _____ and spilled juice on the table.
- The _____ of the bike made him very sad.
- The___ of fruit and yogurt makes a healthy snack.
- I like to keep my ___ when I use social media.
- The ____ of the table shows that it is two meters long.
- Be careful with ___ networks; they are not safe.
- The ___ stole important information from the company.
- I will ___ that I can finish the race on time.
19 Clues: The ___ told the story to the police. • The _____ of the bike made him very sad. • Can you help me ___ the game on my tablet? • He was _____ and spilled juice on the table. • I like to keep my ___ when I use social media. • I will ___ that I can finish the race on time. • She is ___ about joining the art club this year. • ...
Cyber - Key words 2024-12-03
Across
- Protects systems by controlling incoming and outgoing network traffic.
- Malicious software that blocks access to data until a ransom is paid.
- Virtual Private Network, enhances online privacy and security.
- Software designed to disrupt, damage, or gain unauthorized access to systems.
- Small data stored on a user's computer by a website.
- A string of characters used to authenticate access to a system.
- Regularly applied software improvements for security and functionality.
- An attack that floods a system with traffic to disrupt its normal operations.
- Moral principles guiding responsible use of technology.
Down
- Fraudulent attempt to obtain sensitive information through deceptive emails.
- Information processed or stored by a computer.
- A group of interconnected devices sharing resources.
- A type of malware disguised as legitimate software.
- A barrier to protect a network from unauthorized access.
- Software designed to detect and remove malicious programs.
- Software that secretly gathers user information without consent.
- Unwanted or junk email messages.
- The process of converting data into a code to prevent unauthorized access.
- A set of rules governing data communication over a network.
- A person who exploits weaknesses in computer systems or networks.
20 Clues: Unwanted or junk email messages. • Information processed or stored by a computer. • A type of malware disguised as legitimate software. • A group of interconnected devices sharing resources. • Small data stored on a user's computer by a website. • Moral principles guiding responsible use of technology. • A barrier to protect a network from unauthorized access. • ...
Achievements of the Muslim civilization 8.3 2025-02-26
Across
- A place in the Sahara where west Africans traded gold for salt, cloth, bronze, books, ceramics
- Developed riles for writing explaining religious and worldly themes
- Writing by hand in an artistic way
- Developed rules for writing developing religious and worldly things
- What projects drained swamplands because there isn’t enough water in desert areas
- Studied the philosophy of this ancient civilization
- To give and get something in exchange
- Who did they get steel swords from
- Traders carried frankincense and other stuff over what road that is 100 miles along the read sea
- Stretch 7000 miles starting in Chang’an going to Baghdad
- Head physician, wrote many books on medicine
Down
- What were the Persians famous for
- Build fast trading networks across Muslim land
- ability to get higher authority
- He was one of the greatest mathematicians
- He set standards for scientific study of history
- He put all knowledge except Quran to the test of reason
- During the Golden Age Muslim cities adapting from Byzantine buildings, domes and arches
- The period when Spain Sicily and Christian scholars studied Muslim art and science
- Established Baghdad as the greatest Muslim center of learning
20 Clues: ability to get higher authority • What were the Persians famous for • Writing by hand in an artistic way • Who did they get steel swords from • To give and get something in exchange • He was one of the greatest mathematicians • Head physician, wrote many books on medicine • Build fast trading networks across Muslim land • He set standards for scientific study of history • ...
Computer fundamentals 2025-05-23
Across
- Machines that mimic human intelligence to perform tasks.
- This company is known for electric cars and autonomous driving innovations.
- Virtual space where people interact using digital avatars.
- Security field that protects networks from hackers.
- A search engine developed by Microsoft.
- A cloud storage service provided by Google.
- Type of file format commonly used for storing high-quality images.
- Wearable device used for fitness tracking and health monitoring.
- This programming language is widely used for AI development and is known for its simplicity.
- A virtual assistant developed by Apple.
- Fifth-generation mobile network technology faster than 4G.
Down
- This type of digital currency operates on blockchain technology.
- A software application designed to mimic human conversation and assist users online.
- The process of transmitting data wirelessly over a network.
- A social media platform known for short 280-character posts.
- Short videos popular on Instagram and YouTube.
- A mobile operating system widely used in smartphones, developed by Google.
- Technology that immerses users in simulated environments through headsets.
- The study of designing systems that allow computers to learn without being explicitly programmed.
19 Clues: A search engine developed by Microsoft. • A virtual assistant developed by Apple. • A cloud storage service provided by Google. • Short videos popular on Instagram and YouTube. • Security field that protects networks from hackers. • Machines that mimic human intelligence to perform tasks. • Virtual space where people interact using digital avatars. • ...
World War 1 Crossword (all lowercase with underscore as space) 2025-05-15
Across
- Gradually wearing down the enemy
- famous aviator company in WWI
- Deadliest battle fought by the British in response of the French calling for aid
- The current Kaiser of the German Empire
- Famous British officer known for helping the Arab tribes in leading a revolt against the Ottoman
- Networks of dug fortifications
- Alliance comprised of the British, French, and Russia.
- A plan by the Germans to quickly achieve victory
Down
- The genocide started by the Ottomans after they accused an ethnic group for their failures
- Birds that were used to carry messages
- An Alliance comprised of the Germans, A-H, Italy, and later the Ottomans
- A form of a long-range gun used to shell positions
- A term used to described people who were affected by PTSD
- Assassinated Archduke of Austria-Hungary
- Armed and tracked vehicles once used to fight trench warfare
- The gas used by both sides while engaging in Chemical Warfare
- A large and powerful class of battleships
- The president of the U.S at the time of WWI
- Airships that were filled with buoyant gasses
19 Clues: famous aviator company in WWI • Networks of dug fortifications • Gradually wearing down the enemy • Birds that were used to carry messages • The current Kaiser of the German Empire • Assassinated Archduke of Austria-Hungary • A large and powerful class of battleships • The president of the U.S at the time of WWI • Airships that were filled with buoyant gasses • ...
East Asia Vocabulary 2025-09-10
Across
- Confucian revival blending Buddhist and Daoist ideas.
- A fine, high-quality ceramic from China, valued in trade.
- A ruling family that passes down power through generations.
- The belief that rulers ruled with divine approval but could lose power if they failed.
- Trade route connecting China to Central Asia and beyond.
- A government system with officials handling taxes, records, and duties.
- Song Dynasty capital, a major trade and cultural center.
- Respect and obedience toward parents and ancestors.
- Sea-based trade networks in East and South Asia.
- The blending of different religions or cultural traditions.
Down
- New farming techniques and technologies that increased food production.
- A Chinese dynasty known for prosperity, trade, and culture.
- A philosophy stressing respect, education, and order.
- A Chinese invention first used in fireworks, later for weapons.
- Producing goods for markets instead of family use.
- Neighboring states paying respect and gifts to China for trade.
- Growth of cities as centers of trade, government, and culture.
- Fast-ripening rice from Vietnam, boosting population growth.
- Waterway linking northern and southern China for trade.
19 Clues: Sea-based trade networks in East and South Asia. • Producing goods for markets instead of family use. • Respect and obedience toward parents and ancestors. • Confucian revival blending Buddhist and Daoist ideas. • A philosophy stressing respect, education, and order. • Waterway linking northern and southern China for trade. • ...
Canadian Identity 2013-01-06
Across
- Who was the one to introduce a complete medicare program?
- The company put in charge of television development in Canada
- What was television was designed for in the U.S?
- In 1966 Pearson introduced Canada's system of _______
- The belief of Equality for all Canadians is known as this
- mWhat province was the majority of Canada's factories and plants located?
Down
- The feeling on the part of western Canada that federal policies favour central Canada
- what was discovered in Leduc Alberta in 1947?
- On March 31, 1941 What did Newfoundland become part of?
- The Trans-Canada highway was considered a _________
- The program that improved on existing pension plan schemes was known as ___
- Who was the man that took lead in persuading Newfoundland to join Canada?
- Created by the government to regulate foreign material on Canada's Television networks
13 Clues: what was discovered in Leduc Alberta in 1947? • What was television was designed for in the U.S? • The Trans-Canada highway was considered a _________ • In 1966 Pearson introduced Canada's system of _______ • On March 31, 1941 What did Newfoundland become part of? • Who was the one to introduce a complete medicare program? • ...
INSIDER THREAT crossword 2017-04-27
Across
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- You are required to ______ suspicious behavior.
- A potential risk indicator for person living above his means.
- Reportable action. (two words)
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- An employee who hates his job to the point of aggression.
Down
- Threat of injury to persons.
- ________ Assistance Program
- Goal of an Insider Threat Program.
- An adversary having the intent, capability, and opportunity to cause loss or damage.
- ____ ________ Monitoring (two words)
- The ability and opportunity to obtain knowledge of classified sensitive information.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
INSIDER THREAT crossword 2017-04-27
Across
- An adversary having the intent, capability, and opportunity to cause loss or damage.
- A potential risk indicator for person living above his means.
- ________ Assistance Program
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- Goal of an Insider Threat Program.
- Reportable action. (two words)
Down
- The ability and opportunity to obtain knowledge of classified sensitive information.
- Threat of injury to persons.
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- ____ ________ Monitoring (two words)
- You are required to ______ suspicious behavior.
- An employee who hates his job to the point of aggression.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
Evolution of IT Cross-Key-Word 2024-05-20
Across
- What we call data when it is given a context.
- The word in AR that describes adding to our reality.
- The network we use to connect to each other.
- Computers take in data, then do what before sending it out?
- Our personal beliefs and rules.
Down
- A network connected over a wider geographical area. Typically connecting smaller networks together.
- A network connected over a small geographical area.
- The word to describe how data is received by the computer which is then processed.
- Physical components of the computer are called this.
- The word to describe when data is sent back to the user.
- The beliefs and rules suggested by your culture.
- The first word sent over the internet, it is half of a full word.
- What we call the coded programs and instructions. Opposite of hardware.
13 Clues: Our personal beliefs and rules. • The network we use to connect to each other. • What we call data when it is given a context. • The beliefs and rules suggested by your culture. • A network connected over a small geographical area. • Physical components of the computer are called this. • The word in AR that describes adding to our reality. • ...
All About Computers 2024-02-25
Across
- The brain of the computer that carries out instructions
- Main printed circuit board in general-purpose computers and other expandable systems
- A local computer bus for attaching hardware devices in a computer
- Any data that is stored, transferred, read, and used by networks, computers, and other machines
- Smallest unit of data
- To provide or give something to the computer
- Conducts electricity, the microprocessor has billions!
Down
- The smallest unit of data that a computer can process and store
- A mechanism used to connect peripheral devices to computers
- A small processor
- Form of electronic computer memory that can be read and changed in any order
- Piece of equipment used to provide data and control signals to an information processing system
- One of the small dots or squares that make up an image on a computer screen
13 Clues: A small processor • Smallest unit of data • To provide or give something to the computer • Conducts electricity, the microprocessor has billions! • The brain of the computer that carries out instructions • A mechanism used to connect peripheral devices to computers • The smallest unit of data that a computer can process and store • ...
Hairstyling Crossword 2024-11-06
Across
- the clasp or clamp of a curling thermal iron
- Foundation for a chignon, bun, and knot, among other designs
- Pin curls also known as sculptured curls
- Smooths and controls the fine hair around the face’s perimeter
- Styling product popularized by the “greasers” movement in the1950s
- technique done on short chemically relaxed hair prepares the hair for a thermal service
Down
- technique used to build a soft cushion or to mesh
- f hair pressing that removes about 50 to 60 percent of the curl
- the panel of hair on which the roller or barrel is placed
- networks of coily, textured hair that are intertwined
- Quick-drying liquid delivered to the hair via spray bottle
- Involves forcing the hair between the thumb and comb to create tension
- a styling product that gives a soft luster and shine to the hair
13 Clues: Pin curls also known as sculptured curls • the clasp or clamp of a curling thermal iron • technique used to build a soft cushion or to mesh • networks of coily, textured hair that are intertwined • the panel of hair on which the roller or barrel is placed • Quick-drying liquid delivered to the hair via spray bottle • ...
M2 CIRCULATORY SYSTEM2 2021-07-13
Across
- Tiny blood vessels in the tissues form vast networks called (9,4)
- Smaller arteries
- The biggest vein in the human body (4,4)
- Fancy name describing the innermost tunic of a blood vessel
- The biggest artery in the human body
- The tiniest blood vessels of all
- A blue mark on the body that indicates that there is bleeding under the skin
- Vasodilation of blood vessels in the cheeks when you’re embarrassed
- Big arteries contain this protein to make them more balloon like and ‘elastic’
Down
- Blood vessels that carry blood away from the heart
- Caused by the relaxation of smooth muscles in the arteries
- Caused by the contraction of smooth muscles in the arteries
- Fancy name describing the middle tunic of a blood vessel
- Blood vessels that carry blood to the heart
- Fancy name describing the outermost tunic of a blood vessel
- Describes the type of muscle found in the tunica media
- These structures are found within veins and stop backflow
- Smaller veins
- The open space at the centre of a vessel
19 Clues: Smaller veins • Smaller arteries • The tiniest blood vessels of all • The biggest artery in the human body • The biggest vein in the human body (4,4) • The open space at the centre of a vessel • Blood vessels that carry blood to the heart • Blood vessels that carry blood away from the heart • Describes the type of muscle found in the tunica media • ...
Vocabulary 1,2,3 2019-11-13
Across
- Pantalla it serves to look at the things you do
- Anglès It's a matter
- cpu is the hardware inside a computer or other programmable devices
- main memory of the computer
- Teclat Xatejar SERVICE TO WRITE
- Mainframe It is a great computer capable of performing complex data processing
- Xarxes It serves so that you can access google etc.
- Assignatura It's what you do in class
- Micròfon It is used to talk with friends when we play games
- It serves to listen to music
Down
- Integrated read-only memory circuit that stores instructions and data permanently.
- Ratolí It is used to move the arrow on the computer
- Impressora It is useful to keep up the work you have done
- Palmtop Small computer
- Ponents It is used to listen to music or other things
- It's where you talk to friends
- Ventall Ventilador que se utiliza en los gabinetes de computadoras y otros dispositivos electrónicos para refrigerarlos
- Placa base It is also known as motherboard
- Torre The computer is burning up
19 Clues: Anglès It's a matter • Palmtop Small computer • main memory of the computer • It serves to listen to music • It's where you talk to friends • Torre The computer is burning up • Teclat Xatejar SERVICE TO WRITE • Assignatura It's what you do in class • Placa base It is also known as motherboard • Pantalla it serves to look at the things you do • ...
Unit 7 Globalization Crossword Puzzle 2015-04-01
Across
- an ancient trade route from Europe to Asia
- a large company that has operations in more than one country
- the development of a worldwide society
- ability of one country to produce more efficiently than another country
- a global system of interconnected computer networks that allows for info. to move quickly
- being able to provide for yourself
- a material that satisfies human wants and needs
Down
- the movement of people, animals, and goods from one place to another
- the process of making something
- inexpensive work, often found in less developed nations
- includes computers, communication satellites, cell phones, and the Internet
- the state of being connected or interconnected
- hiring someone outside a company to do work that was once done inside the company
- the basic things a person needs to live
- an activity that provides something at a cost
- the process of passing information across space
- an area that uses the same clock time
- little or no government involvement in trade
- the exchange of goods for other goods or money
19 Clues: the process of making something • being able to provide for yourself • an area that uses the same clock time • the development of a worldwide society • the basic things a person needs to live • an ancient trade route from Europe to Asia • little or no government involvement in trade • an activity that provides something at a cost • ...
Lessons 1-9 Crossword 2015-09-30
Across
- A related group of networked computers.
- Malicious code.
- Website used for HTML Essential Training.
- Number of seconds you can legally use of music or lyrics.
- What kind of language you should use rather than subjective, boastful, or exaggerated.
- Popular ones of these are Google, Yahoo!, and AOL.
- Where Lynda.com can be accessed from for UT students.
- Number of images you can legally use from one artist or photographer.
- Reading on a screen is _____ _____ % slower than reading from paper.
- The main technology for local area networks.
Down
- Type of operators for search engines that include "AND", "OR", and "NOT".
- Converts the bits a computer outputs into a form that is compatible with a carrier.
- Communication in which both the sender and the receiver are active at the same time.
- Using UT IT resources in an unauthorized manner.
- Hypertext Markup Language.
- The number of employees for ScrippNetworks.
- Used to view web pages containing text, images, videos, and other multimedia.
- Data stored to help load webpages faster.
- A group of information on a computer that can be software programs or data.
19 Clues: Malicious code. • Hypertext Markup Language. • A related group of networked computers. • Website used for HTML Essential Training. • Data stored to help load webpages faster. • The number of employees for ScrippNetworks. • The main technology for local area networks. • Using UT IT resources in an unauthorized manner. • Popular ones of these are Google, Yahoo!, and AOL. • ...
Lessons 1-9 Crossword 2015-09-30
Across
- Website used for HTML Essential Training.
- Malicious code.
- Using UT IT resources in an unauthorized manner.
- A related group of networked computers.
- Popular ones of these are Google, Yahoo!, and AOL.
- Hypertext Markup Language.
- Where Lynda.com can be accessed from for UT students.
- Data stored to help load webpages faster.
- A group of information on a computer that can be software programs or data.
- The number of employees for ScrippNetworks.
- Number of seconds you can legally use of music or lyrics.
- Reading on a screen is _____ _____ % slower than reading from paper.
Down
- Communication in which both the sender and the receiver are active at the same time.
- Number of images you can legally use from one artist or photographer.
- What kind of language you should use rather than subjective, boastful, or exaggerated.
- Used to view web pages containing text, images, videos, and other multimedia.
- The main technology for local area networks.
- Converts the bits a computer outputs into a form that is compatible with a carrier.
- Type of operators for search engines that include "AND", "OR", and "NOT".
19 Clues: Malicious code. • Hypertext Markup Language. • A related group of networked computers. • Website used for HTML Essential Training. • Data stored to help load webpages faster. • The number of employees for ScrippNetworks. • The main technology for local area networks. • Using UT IT resources in an unauthorized manner. • Popular ones of these are Google, Yahoo!, and AOL. • ...
RU ITEC11 Chapter 5 2023-12-01
Across
- to ask questions, research questions and to know about security measures
- using someone else identity without being authorized and using it for criminal activities
- obtain sensitive information as in text messages
- creating a fake website to get into personal information by creating a fake url into a domain Name servers
- use security tools and monitor networks to avoid attacks
- open access was first implemented to share study materials.
- obtain sensitive information as in e-mail
- is an extremely sophisticated worm
- monitor and block communication from unreliable websites.
- prohibited use of a computer unless authorized
- obtain sensitive information as in voice phishing
- techniques on how to steal personal and financial data
Down
- prioritize security in their advancements
- involves hacking for political purposes
- publishers must prevent access towards other nations when it is prohibited
- The cost of defending an attack is included in the definition of loss under the Act
- traits that are specific to an individual biologically
- using someone else identity without being authorized and using it for criminal activities
- Programming's excitement
- is the expansion of online and mobile technologies
20 Clues: Programming's excitement • is an extremely sophisticated worm • involves hacking for political purposes • prioritize security in their advancements • obtain sensitive information as in e-mail • prohibited use of a computer unless authorized • obtain sensitive information as in text messages • obtain sensitive information as in voice phishing • ...
Social Media 2023-04-19
Across
- The use of electronic communication to show dislike of a person.
- A one-to-one communication in the internet.
- A website updated frequently to talk about opinions and different topics
- A self-portrait taken with the front or backside of your smartphone camera.
- Videos/post who are popular and get a lot of clicks.
- The most popular social media platform right in 2023.
- A platform used mainly to post pictures.
- A message sent on Twitter.
- An action which can be made on Instagram or TikTok if a post appeals to you.
Down
- The platform Donald Trump is banned from.
- Before TikTok there was?
- Action you can take if you want to stop someone from texting you.
- A software made to protect your computer.
- #
- Website where you can find basic information about nearly everything.
- An image or username which represents a person online, for example in social networks
- You use this funtion if you want to send a meme to a friend.
- A platform founded by Mark Zuckerberg.
- A pictural way to communicate your feelings over texting.
19 Clues: # • Before TikTok there was? • A message sent on Twitter. • A platform founded by Mark Zuckerberg. • A platform used mainly to post pictures. • The platform Donald Trump is banned from. • A software made to protect your computer. • A one-to-one communication in the internet. • Videos/post who are popular and get a lot of clicks. • ...
Ict 7-green 2025-05-25
Across
- named memory location that can store a value
- continiually varying signal , e,g. a sound signal
- step by step instruction to solve a particular problem
- short for binary digit
- copying files to another location in case the original is lost or damaged
- translates each line of high - level language code into machine code
- which network hardware directs data between networks
- unit of measurement of how many sound samples are taken in 1 second
- carrying out an operation on data
- convert into digital format , i.e. into 1s and 0s
- single letter, digit or symbol
Down
- translates assembly-language .
- continually varying signal
- data structure in Python that can store multiple items of data of mixed data types under a single identifier ;data items can be changed
- taking samples of a sound wave at fixed intervals
- change from one unit to another
- converts program instuction into machine-code format so the processor can carry out the instructions
- eight bits of data
- initial product created for testing and reviewing , before a final product
- code made up of numbers or numbers and letters and other characters
20 Clues: eight bits of data • short for binary digit • continually varying signal • translates assembly-language . • single letter, digit or symbol • change from one unit to another • carrying out an operation on data • named memory location that can store a value • taking samples of a sound wave at fixed intervals • continiually varying signal , e,g. a sound signal • ...
First Nation Crossword 2015-03-23
Across
- What is families that are based on social networks of people called?
- What month is National Aboriginal Day celebrated in?
- type of services assist people who have chronic and acute illnesses
- the major cause of poor dietary changes
- the name of the dome-shaped tent that is used for physical and spiritual purification?
- The ________ Man can perform ceremonies for the death in their tribes native language.
Down
- Type of barrier method birth control
- What is the leading cause of death and hospitalization among First Nations.
- Which ritual is preformed at the time of a full moon?
- The gender that determines the mens status in the clan?
- First Nations believe in the concept of _____.
- inter professional healthcare team is involved in delivery of newborns
- 20% of First Nations adults on reserves suffer from this disease
- New parents ask _____ about traditions and culture to prepare spiritually for becoming parents.
14 Clues: Type of barrier method birth control • the major cause of poor dietary changes • First Nations believe in the concept of _____. • What month is National Aboriginal Day celebrated in? • Which ritual is preformed at the time of a full moon? • The gender that determines the mens status in the clan? • 20% of First Nations adults on reserves suffer from this disease • ...
networking 2015-12-04
Across
- something used by the wider community
- interface card a circuit board or card that is put into in a computer so that it can connected to a network.
- is the buying and selling of good, or the transmitting of funds, over an electronic network,
- cable cable that has an inner copper wire surrounded by a plastic insulating layer
- a personal for the short-range wireless interconnection
- may be characterized as network
- cable a cable designed to connect either to a laptop, desktop computer via a cable connection
Down
- service provider someone that provides you access the internet
- internet global system of interconnected computer networks
- a fast connection to the internet
- optic cable a cable that consists of a bundle of glass threads.
- something for the local community
- a device that allows you to connect to the internet
- interface any type of computer that uses wireless data connections
14 Clues: may be characterized as network • a fast connection to the internet • something for the local community • something used by the wider community • a device that allows you to connect to the internet • a personal for the short-range wireless interconnection • internet global system of interconnected computer networks • ...
Erins network quiz 2019-12-12
Across
- a topology that flows in only one direction
- long version of a URL
- a private communication network
- a topology that has fast data transfere and a switch
- an abbreviation of something that enables computer and file server to communicate, can be wired or wireless
- an abreviaton of a language used to create a web page
Down
- these are normally contained within a single building or a cluster of buildings
- examines data as it passes, can connect two or more networks together
- uses radio frequencies to communicate and is wireless
- this is used in a bus topology
- checks the destination of data it receives, forwards it to the intended computer
- a cable that you would see at the back of a tv
- a topology that requires each machine to be connected to at least two or more computers
- a network that could cover a city
14 Clues: long version of a URL • this is used in a bus topology • a private communication network • a network that could cover a city • a topology that flows in only one direction • a cable that you would see at the back of a tv • a topology that has fast data transfere and a switch • uses radio frequencies to communicate and is wireless • ...
Technology 2019-11-05
Across
- software program that allows a user to locate, access, and display web pages
- random access memory
- brains of the computer where most calculations take place.
- computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication
- programs and other operating information used by a computer.
- output device that displays information in pictorial form.
Down
- panel of keys that operate a computer
- Distributed Denial of Service
- can move the cursor to different items on the screen
- malware which misleads users of its true intent
- powerful computers used for large information processing jobs. They are mainly used by government institutions and large companies
- Fraud email from companies to get personal information such as passwords or credit card info
- Messages sent electronically
- malware which misleads users of its true intent
- piece of code which is capable of copying itself and typically can corrupt the system or destroying data.
15 Clues: random access memory • Messages sent electronically • Distributed Denial of Service • panel of keys that operate a computer • malware which misleads users of its true intent • malware which misleads users of its true intent • can move the cursor to different items on the screen • brains of the computer where most calculations take place. • ...
MYOWS (Sam and Gigi) 2025-02-05
Across
- The vast ships and communication networks were made by?
- What ship was made by the Industrialization that extended the West’s military?
- What is a society that the British gave “More care to” after losing the US?
- What document warned against European meddling in the Americas?
- What war caused an “Industrial Boom” in America?
- immigration What created/ expanded Western settler societies?
- What American firms set up branches in other countries?
Down
- What country did not play a substantial role in world history during this colonial period?
- What Revolution prompted a major expansion of the West’s power in the world?
- What revolution caused a “Stir” in Europe?
- What invention gave small western forces superiority over masses of local troops?
- Who were the new strain of immigrants in America?
- Who were American engineers mostly inspired by?
- What was the most important Western nation overseas?
- Who created empires in Africa, Southeast Asia, parts of China, and the middle east?
15 Clues: What revolution caused a “Stir” in Europe? • Who were American engineers mostly inspired by? • What war caused an “Industrial Boom” in America? • Who were the new strain of immigrants in America? • What was the most important Western nation overseas? • The vast ships and communication networks were made by? • What American firms set up branches in other countries? • ...
FY2025 Cyber Security Training 2024-11-05
Across
- Don't click without _____.
- The number of principles the GDPR requires companies to adhere to.
- A piece of evidence a user must produce to verify they are an account’s true owner.
- BEC means Business ____ Compromise.
- On average Parker blocks 32 ____ attempts to access Parker Networks.
- _____, unique passwords are best practice.
Down
- This is voice phishing.
- This is something you are, including fingerprints or facial recognition.
- _____ Data means any data relating to a living individual who is or can be identified from the data itself.
- Before leaving your workstation, you should always do this to the area.
- Text message phishing.
- Occurs when an unauthorized individual follows closely behind an authorized person to gain entry to a secure area.
- CEO fraud is one of the most common forms of this.
- Designed to damage devices or exploit them for sensitive information and access.
14 Clues: Text message phishing. • This is voice phishing. • Don't click without _____. • BEC means Business ____ Compromise. • _____, unique passwords are best practice. • CEO fraud is one of the most common forms of this. • The number of principles the GDPR requires companies to adhere to. • On average Parker blocks 32 ____ attempts to access Parker Networks. • ...
Ch. 11 Technology 2024-04-17
Across
- mechanical devices programmed to do routine tasks
- computer programs that perform specific tasks such as word processing, database or accounting
- the use of technology to create product styles and designs
- a series of detailed, step-by-step instructions that tell a computer what functions to complete
- the use of computers, networks, and technology to store, send, and retrieve information.
Down
- a coordinated system of processing and reporting information in an organization
- the instructions that run the computer system.
- computer programs that help people solve technical problems
- control center of the computer
- the use of computers to help employees learn or improve skills at their own pace
- control center of the computer
- physical elements of a computer system
- all functional components of a computer, including input, processing unit, memory, storage, output devices.
- group of computers used in business and schools linked together share hardware and software
- software that enables computers to reason, learn, make decisions
15 Clues: control center of the computer • control center of the computer • physical elements of a computer system • the instructions that run the computer system. • mechanical devices programmed to do routine tasks • the use of technology to create product styles and designs • computer programs that help people solve technical problems • ...
INSIDER THREAT crossword 2017-04-27
Across
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- You are required to ______ suspicious behavior.
- ____ ________ Monitoring (two words)
- An adversary having the intent, capability, and opportunity to cause loss or damage.
- Goal of an Insider Threat Program.
- ________ Assistance Program
Down
- Reportable action. (two words)
- A potential risk indicator for person living above his means.
- The ability and opportunity to obtain knowledge of classified sensitive information.
- Threat of injury to persons.
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- An employee who hates his job to the point of aggression.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
INSIDER THREAT crossword 2017-04-27
Across
- You are required to ______ suspicious behavior.
- An employee who hates his job to the point of aggression.
- A potential risk indicator for person living above his means.
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- Reportable action. (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- ________ Assistance Program
Down
- An adversary having the intent, capability, and opportunity to cause loss or damage.
- ____ ________ Monitoring (two words)
- Goal of an Insider Threat Program.
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- The ability and opportunity to obtain knowledge of classified sensitive information.
- Threat of injury to persons.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
INSIDER THREAT crossword 2017-04-27
Across
- Reportable action. (two words)
- You are required to ______ suspicious behavior.
- An employee who hates his job to the point of aggression.
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- An adversary having the intent, capability, and opportunity to cause loss or damage.
- A potential risk indicator for person living above his means.
- The ability and opportunity to obtain knowledge of classified sensitive information.
Down
- ________ Assistance Program
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- ____ ________ Monitoring (two words)
- Goal of an Insider Threat Program.
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- Threat of injury to persons.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
POB 2.02 Vocabulary 2018-02-14
Across
- A navigational system that uses satellite technology to determine location and provide directions
- The use of computer technology to plan, design, test, and alter products
- Working from home or a remote location
- Computerized storage for information and facts
- The practical application of science to society and industry
- A mobile phone with advanced capabilities, such as accessing the Internet
Down
- Technology that allows users to make telephone calls over the Internet
- Technology that allows users to communicate over the Internet rather than through traditional public networks
- Computer software designed to mimic the knowledge of a human expert
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- Programs that instruct computers to perform specific operations
- An object placed into orbit by humans; most are used for communications purposes
12 Clues: Working from home or a remote location • Computerized storage for information and facts • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • Technology that allows users to make telephone calls over the Internet • ...
Blockchain puzzle 2021-03-07
Across
- The creator of bitcoin
- The maximum number of bitcoins that can ever be created is ___ million
- A block in the blockchain can never have more than one parent block- true or false?
- Blockchain forms the bedrock for _______ like Bitcoin
- What is the first distributed blockchain implementation?
- The process of reaching consensus in blockchain networks is called
Down
- Which hashing algorithm does Blockchain use?
- Name the cryptocurrency created after a famous meme character
- Number of different types of Blockchains on the basis of user type
- Blockchain is the same as bitcoin - true or false?
- An approach that helps organizations to keep their data secure
- A file that keeps a permanent record of all the transactions that have taken place between two parties on the blockchain network is called
12 Clues: The creator of bitcoin • Which hashing algorithm does Blockchain use? • Blockchain is the same as bitcoin - true or false? • Blockchain forms the bedrock for _______ like Bitcoin • What is the first distributed blockchain implementation? • Name the cryptocurrency created after a famous meme character • An approach that helps organizations to keep their data secure • ...
Technology 2024-11-21
Across
- – Online storage for saving files and accessing them remotely. (5 letters)
- – The amount of data that can be sent through a connection at one time. (9 letters)
- – A physical component of a computer, such as a keyboard or monitor. (8 letters)
- – The point where a user interacts with a computer system. (9 letters)
- – A harmful program that damages or disrupts systems. (7 letters)
- – The part of a computer responsible for executing instructions. (9 letters)
- – A wireless technology for short-distance communication. (9 letters)
Down
- – A collection of data stored electronically. (8 letters)
- – Programs and applications used by a computer. (8 letters)
- – A set of steps or rules used in programming. (9 letters)
- – A security system that protects networks. (8 letters)
- – The process of converting data into a secret code. (10 letters)
12 Clues: – A security system that protects networks. (8 letters) • – A collection of data stored electronically. (8 letters) • – A set of steps or rules used in programming. (9 letters) • – Programs and applications used by a computer. (8 letters) • – The process of converting data into a secret code. (10 letters) • ...
Science Fiction Crossword 2024-03-01
Across
- The smallest unit of matter
- A region of space having a gravitational field so intense that no matter or radiation can escape
- It includes all of space, and all the matter and energy that space contains
- They live in your computer and are created by humans but even exceed the intelligence of their creator
- A small rocky body orbiting the sun, usually found between Mars and Jupiter
Down
- The notional environment in which communication over computer networks occurs
- Using a device to travel across time, past or future
- A celestial body moving in an elliptical orbit round a star
- Duplicates
- Space of more than three dimensions
- An inorganic humanoid that carries out a set of instructions
- They live in space and travel in UFOs
12 Clues: Duplicates • The smallest unit of matter • Space of more than three dimensions • They live in space and travel in UFOs • Using a device to travel across time, past or future • A celestial body moving in an elliptical orbit round a star • An inorganic humanoid that carries out a set of instructions • ...
Digital Media Technology 2022-09-14
Across
- content which can be created, viewed, distributed, modified and stored within electronic devices
- programs used within computers which provide operating information
- designates where and how a file will be stored
- physical equipment used in digital media
- design a user can see when interacting with a device
- process of making corrections or improvements to digital media
- process of transferring content from the site of creation to a site for publishing or viewing
- location where files are safe and protected
Down
- connection between two or more devices allowing for sharing and collaborating
- program which manages the hardware and software on a computer
- process of preparing to create a project
- process of bringing content from the device used to create or capture it onto an electronic device to be edited or stored
12 Clues: process of preparing to create a project • physical equipment used in digital media • location where files are safe and protected • designates where and how a file will be stored • design a user can see when interacting with a device • program which manages the hardware and software on a computer • process of making corrections or improvements to digital media • ...
Circulatory System 2020-09-22
Across
- contains hemoglobin, which reacts with oxygen
- defend the body against pathogens
- to stop blood from flowing backward
- muscular, elastic tubes that transport oxygenated blood away from the eart
- carry deoxygenated blood to hte heart
- a dark red chemical responsible for transporting oxygen
- heart has a double pump and circulation. Pulmonary circuit and systemic circuit
Down
- is the volume of blood pumped out of the heart with every beat.
- tiny blood vessels that form networks. Blood from arteries flow into capillaries
- is the amount of blood pumped from the heart every minute and can be calculated by multiplying heart rate (HR) by stroke volume (SV)
- consists water, allows susbstances to dissolve and be transported easily
- contains enzymes that causes blood to clot when there is damage to blood vessels.
- a liquid containing four components: plasma, RBC's, WBC's,platelets
13 Clues: defend the body against pathogens • to stop blood from flowing backward • carry deoxygenated blood to hte heart • contains hemoglobin, which reacts with oxygen • a dark red chemical responsible for transporting oxygen • is the volume of blood pumped out of the heart with every beat. • a liquid containing four components: plasma, RBC's, WBC's,platelets • ...
INSIDER THREAT crossword 2017-04-27
Across
- Threat of injury to persons.
- Goal of an Insider Threat Program.
- The ability and opportunity to obtain knowledge of classified sensitive information.
- Reportable action. (two words)
- An employee who hates his job to the point of aggression.
- An adversary having the intent, capability, and opportunity to cause loss or damage.
Down
- ________ Assistance Program
- Data derived from friendly detectable actions and opensource information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities or activities.
- A potential risk indicator for person living above his means.
- ____ ________ Monitoring (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure. (three words)
- Any person with authorized access to an U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems.
- You are required to ______ suspicious behavior.
13 Clues: ________ Assistance Program • Threat of injury to persons. • Reportable action. (two words) • Goal of an Insider Threat Program. • ____ ________ Monitoring (two words) • You are required to ______ suspicious behavior. • An employee who hates his job to the point of aggression. • A potential risk indicator for person living above his means. • ...
Fortress Crossword 2023 2023-12-07
Across
- Where is the Fortress Safety HQ located?
- Who is the parent company of Fortress Safety?
- This is a separate part of an interlock that transmits the state of a guard (closed or not closed)
- Fortress offer short, informative, and entertaining online safety…
- The product range that uses heavy duty guard locking with network connectivity?
- Which solution can be used to manage permissions over industrial networks?
Down
- A type of inhibit function
- US regulatory agency whose mission is to assure safe and healthy working conditions by setting and enforcing standards
- A network protocol now available on proNet
- Which Fortress safeguarding solution is suitable for washdown environments?
- Fortress webinars are generally hosted on a specific day of the week
- An ______ release is actuated from outside the safeguarded space and requires a special tool
- Fortress Safety is well-known for manufacturing
13 Clues: A type of inhibit function • Where is the Fortress Safety HQ located? • A network protocol now available on proNet • Who is the parent company of Fortress Safety? • Fortress Safety is well-known for manufacturing • Fortress offer short, informative, and entertaining online safety… • Fortress webinars are generally hosted on a specific day of the week • ...
