networks Crossword Puzzles
Supply Chain | Risk & Resilience 2024-11-27
Across
- The process of bringing manufacturing and production back to the home country
- *The networks and relationships that provide value to supply chain partners.
- The concept of keeping some resources in reserve to be used in case of a disruption.
- *Collaborative actions like shared decision-making to strengthen supply chains.
- *Shared goals and understanding that enhance collaboration in supply chains.
- *Trust and shared relationships that facilitate better supply chain coordination.
- Mutual benefit exchange among partners, important for trust in relationships.
Down
- *Potential disruptions affecting the supply chain's performance.
- *Formal systems and processes that influence supply chain effectiveness.
- Partnerships between firms to enhance supply chain resilience.
- The ability to bounce back from a disruption
11 Clues: The ability to bounce back from a disruption • Partnerships between firms to enhance supply chain resilience. • *Potential disruptions affecting the supply chain's performance. • *Formal systems and processes that influence supply chain effectiveness. • *The networks and relationships that provide value to supply chain partners. • ...
Friday February 19th, 2015 2015-02-19
Across
- This is the brain of a computer, that processes all information.
- What does HDD stand for?
- What does RAM stand for?
- This type of interface uses buttons and images to help you navigate
- This modern HDD connector can be recognized by its "L" shape
Down
- This older HDD connector can be recognized by its 40 pins.
- The manager of a computer's hardware and software.
- Your HDTV probably uses this common connector
- This older connector was used for mice and keyboards
- You can find this display connector on older monitors and projectors
- This type of card can add functionality to a computer.
- This is the nervous system or heart of a computer
- A standard for the physical dimensions and locations on a piece of hardware is called its...
- This is a modern flat panel style of monitor
- This connector is used to connect you to the internet or other networks
- This common connector is used will all sorts of equipment
16 Clues: What does HDD stand for? • What does RAM stand for? • This is a modern flat panel style of monitor • Your HDTV probably uses this common connector • This is the nervous system or heart of a computer • The manager of a computer's hardware and software. • This older connector was used for mice and keyboards • This type of card can add functionality to a computer. • ...
Sales Management - Session 1 & 2 2015-08-12
Across
- Always high during pre-industrialization era
- One of the most basic objective of any organization
- Sales - Cost of sales (2 words)
- The role of a sales executive in personal selling activity
- First step in sales management
- Sum total of sales done by all sales personnel (2 words)
- A sales organizational structure based on roles played by the team members
Down
- Sales management means planning,________ & control
- Structure of sales organization with narrow span of control and more levels of management
- Sales executive builds and maintains this network
- A major activity conducted by sales executive along with distributive networks concerning business goals
- Performance and _________of sales executive is vital for success of any growth strategy
- Importance was given to this aspect post industrial revolution era
- A process which was given more importance during pre-industrial revolution era
- Sales executive co-ordinates for overall implementation of marketing_________
- A contract involving transfer of possession of a property for monetary consideration or value
16 Clues: First step in sales management • Sales - Cost of sales (2 words) • Always high during pre-industrialization era • Sales executive builds and maintains this network • Sales management means planning,________ & control • One of the most basic objective of any organization • Sum total of sales done by all sales personnel (2 words) • ...
TECHNICAL QUIZ 2023-01-30
Across
- operator is used for concise conditional expressions in Python
- Code automatically executed in response to an event
- Process of organizing data into separate tables
- the main loop construct in Python
- software that is designed to harm computer systems and networks
- process of converting plain text into unreadable text to protect it
- a popular web framework for Python
Down
- main advantage of using a DBMS over traditional file-based systems
- A class that defines a set of methods to be implemented by other classes
- way to reuse code in multiple classes
- A way to perform the same action in different ways
- Discovering hidden patterns and relationships in data
- identifier for each record in a table
- Java program that runs on a server and generates dynamic web pages
- / Data structure used to speed up searching and sorting
- hardware device that prevents firewall/unauthorized access to a computer system in cyber security
16 Clues: the main loop construct in Python • a popular web framework for Python • way to reuse code in multiple classes • identifier for each record in a table • Process of organizing data into separate tables • A way to perform the same action in different ways • Code automatically executed in response to an event • Discovering hidden patterns and relationships in data • ...
Unit 2 Book 4 2024-03-21
Across
- help to develop
- suddenly and noticeably
- see, notice or realize sth., esp. when it is not obvious
- breaking sth. into small pieces
- cause sth. to be not straight or exact; twist or distort
- an occasion when an activity is done in an extreme way, esp. eating, drinking or spending mondy
- sb. who can not stop drinking large amounts of alcohol, even when this is making him or her ill
Down
- the state of developing or being developed so as to make possible international influence or operation
- action of making a situation, quality or feature appear greater, more obvious or more important than it really is
- neither small nor large but between the two; clearly within the limits of a range of possibilities
- satisfaction; pleasure
- means of right of using, reaching or entering
- the opposite
- low in spirits
- causing sb. to feel very distant from or not welcome to sb. else
- data banks and networks in computer technology considered as a space
16 Clues: the opposite • low in spirits • help to develop • satisfaction; pleasure • suddenly and noticeably • breaking sth. into small pieces • means of right of using, reaching or entering • see, notice or realize sth., esp. when it is not obvious • cause sth. to be not straight or exact; twist or distort • causing sb. to feel very distant from or not welcome to sb. else • ...
397 Quiz 2 2021-01-13
Across
- pathogen of phloem tissue without a cell wall
- needed to help with the global nature of pathogen movements
- Interactive biological agents that pick up and move microbes, genetic material from one part of the world to another part of the world
- study of plant disease epidemics
- woman scientist working on bacteria and first woman president of the American Phytopathological Society
- expectation of food supply in the developed world
Down
- an infectious disease affecting a third of the world
- what plant disease does to photosynthesis
- kind of impact you get when marshalling individual growers to make disease management changed in their practice
- pathogen that can cause severe disease
- yellowing of tissue because of lack of chlorophyll
- Salem witch trials were caused by its poisoning
- home state of Norman Borlaug
- 21st century is nicknamed for this
- one of the crops affected in salem witch trials
- food security crop worked on in East Africa by James Legg
16 Clues: home state of Norman Borlaug • study of plant disease epidemics • 21st century is nicknamed for this • pathogen that can cause severe disease • what plant disease does to photosynthesis • pathogen of phloem tissue without a cell wall • Salem witch trials were caused by its poisoning • one of the crops affected in salem witch trials • ...
Social Studies Crossword Part 1 - Chapters 1-6 2012-06-07
Across
- Rapid transition from an agriculture based economy to a maufacturing based one
- Process of expanding world trading networks
- Adjustments or reaching compromises to allow for differences
- Basic physical systems of a community (roads, utilities, water, sewage, ect)
- Processes, tools, and techniques to transmit data/information from one person to another
- The mixing of identies and cultures in new and different ways
- One company hiring another to fulfill certain tasks in production
- A change in and individual or group that results from contact with other groups
- An effort to restore new life to a culture
- Process by which the world's citizens are becoming more connected and dependant on one another
- Control of large amount of the worlds media by transnational companies
Down
- Spread of one popular culture around the world
- The total value of goods and services produced in a country in a year
- United Nations
- North American Free Trade Agreement
- Canadian Radio-televison and Telecommunications Commissions
16 Clues: United Nations • North American Free Trade Agreement • An effort to restore new life to a culture • Process of expanding world trading networks • Spread of one popular culture around the world • Canadian Radio-televison and Telecommunications Commissions • Adjustments or reaching compromises to allow for differences • ...
Reorbit's Cartoon Crossword 2024-06-15
Across
- The planet in which Invader Zim is originally from.
- Name the well loved doll owned by Angelica in the Rugrats.
- Samurai Jack's main love interest.
- The TV network "Hey Arnold" was first released on.
- This magical green man makes several appearances on "The Flintstones".
- Cat and Mouse duo, Tom and "_______".
- Which one of Scooby Doo's gang wears glasses?
- The city in which three super powered little girls regularly fight crime.
Down
- The adventurous young girl who discovers a hidden world in Studio Ghibli's "Spirited Away".
- Homer Simpson's middle name.
- One fine day with a woof and a purr. A baby was born and it caused a little stir. No blue buzzard, no three-eyed frog. Just a feline canine little..___________.
- The species of Professor Utonium's former pet and lab assistant.
- The first name of Teen Titans character Cyborg.
- The colour of Super Mario's dungarees.
- In Danny Phantom, Ember Mclain's debut song.
- A popular trading card game on Cartoon Networks website, Cartoon Orbit.
16 Clues: Homer Simpson's middle name. • Samurai Jack's main love interest. • Cat and Mouse duo, Tom and "_______". • The colour of Super Mario's dungarees. • In Danny Phantom, Ember Mclain's debut song. • Which one of Scooby Doo's gang wears glasses? • The first name of Teen Titans character Cyborg. • The TV network "Hey Arnold" was first released on. • ...
Heheheh 2022-05-18
Across
- sail or travel all the way around (something, especially the world)
- (of two or more people) exchange (things) with each other.
- characterized by or given to introspection.
- relating to relationships or communication between people
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- existing or occurring within a state
- bring (something, especially a product, measure, or concept) into use or operation for the first time
Down
- the enclosing boundary of a curved geometric figure, especially a circle
- find a way around (an obstacle).
- a shy, reticent person.
- wary and unwilling to take risks.
- intervene in a situation without invitation or necessity
- (of two people or things) influencing each other.
- existing or taking place within, or administered into, a vein or veins
- obstruct (someone or something) so as to prevent them from continuing to a destination
- a fact or condition connected with or relevant to an event or action.
16 Clues: a shy, reticent person. • find a way around (an obstacle). • wary and unwilling to take risks. • existing or occurring within a state • characterized by or given to introspection. • (of two people or things) influencing each other. • intervene in a situation without invitation or necessity • relating to relationships or communication between people • ...
PRIVACY ESCAPE ROOM 2025-06-10
Across
- Upholding privacy principles requires ongoing _
- A client may make one of these following a breach if they think their personal information has been mishandled
- Making parts of a document hidden to protect privacy
- Sharing information
- It's important to send sensitive and personal client information via _ attach
- A type of AI that client information should never be entered into (or any for that matter!)
- Unique data set used to represent a person's identity
Down
- PAW occurs every year to increase _ of privacy issues and and the importance of protecting personal information
- Scheme under which risk related information can be shared
- Privacy is __'s business
- Information provided to the wrong person would be considered a _
- 1988 is the year the Australian Parliament passed the Privacy _
- Relating to, or involving computers or computer networks
- The way cyber criminals trick you into giving them personal information
- Client information provided to the courts is requested under a _
- Sensitive information is personal information that includes information or an opinion about an individual
16 Clues: Sharing information • Privacy is __'s business • Upholding privacy principles requires ongoing _ • Making parts of a document hidden to protect privacy • Unique data set used to represent a person's identity • Relating to, or involving computers or computer networks • Scheme under which risk related information can be shared • ...
cyber security quiz 2025-07-07
Across
- A security method using fingerprints, face, or retina scans
- A tool that records everything typed on a keyboard
- A software that secretly monitors and collects user information
- The process of verifying the identity of a user or device
- Malware that locks or encrypts data and demands payment to release it
- The process of converting data into a coded form to protect it
- A harmful program that disguises itself as useful software
- The illegal copying, use, or distribution of software
- A set of rules for formatting and transmitting data over networks
Down
- A hidden entry point used to bypass normal security
- A protective barrier that blocks unauthorized access to or from a network
- A group of infected computers remotely controlled by a hacker
- A general term for any software designed to harm or exploit devices
- The act of tricking people into revealing sensitive information online
- A software used to detect, prevent, and remove malicious programs
- A defined sequence of steps used to solve a problem or perform a task
16 Clues: A tool that records everything typed on a keyboard • A hidden entry point used to bypass normal security • The illegal copying, use, or distribution of software • The process of verifying the identity of a user or device • A harmful program that disguises itself as useful software • A security method using fingerprints, face, or retina scans • ...
study 2023-05-03
Across
- sign that there is a problem on a computer network ; between 169.254.0.0 to 169.254.255.255
- layer 2 PDU
- a protocol that allows a node on a computer network to request an IPv4 address assignment from an external server ; an option for dynamically configuring a node with an IPv4 address on a computer network
- the address of the Router's Interface (port) through which all traffic of your Local Area Network goes to the Internet
- rack mounted pieces of equipment that provide another layer of fault tolerance to a communications rack setup
- World's largest association of technical professionals focused on education & advancement of telecommunications & computer engineering.
- this topology is when all nodes are connected via a common & shared link ; advantages: simple design and linear architecture, easy to extend ; disadvantages: performance suffers, bandwidth is shared, if there is a break in the main cable then entire computer network shuts down
- group of computers or other devices that use a common set of communication protocols over digital interconnections for the purpose of sharing resources
- rapid transmission of bits in a series
Down
- not routable over the Internet & is primarily assigned to a node on an internal computer network ; can be reused for different internal computer networks
- the degree to which our computer networks can suffer degradation in operations due to some type of failure but still maintain mission capable functionality
- this topology is when all nodes connect to each other ; advantages: full redundancy, decreased latency ; disadvantages: expensive, requires more administrative oversight
- leading series of bits ; contains a source & destination address field to assist in the frame getting to its destination
- _____ layer of the OSI model ; responsible for taking a packet and encapsulating it inside of a frame before it is transmitted over the physical layer as a bitstream on a computer network.
- a mechanism that allows nodes or pieces of network equipment to have both an IPv4 & IPv6 address associated to them
- Principal technical development & standard settings organization for the Internet. Focused on development of voluntary standards & those related to the TCP/IP Internet protocol suite
- devices that are in some way connected to a computer network ; also referred to as hosts or clients depending on the situation ; (Ex: IP phones, computers)
- primarily used for troubleshooting nodes on a computer network ; utilizes echo reply requests to determine connectivity ; command syntax "ping"
- a protocol that provides mechanisms for collecting & organizing information from participating nodes on a computer network ; provides the capability to change configuration options for devices & establish configuration baselines on a computer network
19 Clues: layer 2 PDU • rapid transmission of bits in a series • sign that there is a problem on a computer network ; between 169.254.0.0 to 169.254.255.255 • rack mounted pieces of equipment that provide another layer of fault tolerance to a communications rack setup • ...
ML 2020-10-06
5 Clues: column oriented data analysis API in Python • process used to evaluate the quality of ML model • In ML, a mechanism for bucketing categorical data • ensemble approach to find the decision tree that best fits the data • primary Algorithm for performing gradient descendant on neural networks
Internet 2023-02-07
5 Clues: single page of the website. • Use to connect different web pages of the website. • A collection of pages of information connected to each other. • A bigger network of many computer networks connected across the world. • The website’s unique address that specified its location on the internet.
QUIZ 2024-12-10
Across
- Protects systems,networks,and data from unauthorized access and attacks
- Represents information stored digitally and needs protection from breaches
Down
- A person who gains unauthorized access to systems or data
- A secret mix of letters, numbers, and symbols used to secure accounts
- A potential danger to systems
5 Clues: A potential danger to systems • A person who gains unauthorized access to systems or data • A secret mix of letters, numbers, and symbols used to secure accounts • Protects systems,networks,and data from unauthorized access and attacks • Represents information stored digitally and needs protection from breaches
internet vocbulary by:samantha garcia 2014-05-05
Across
- software that prevents access to inappropriate sites and protects the network from unauthorized users.
- Network etiquette ,online manners, being a good digital citizen
- Text or graphics that when clicked will take you to a website page or to a certain place on that website
Down
- NETWORKS online communities where people meet, socialize, exchange digital files, etc.
- A person who bullies online
- A collaborative website which can be directly edited by anyone with access to it
- Technology that prevents users from visiting inappropriate web sites, and protects the network from unauthorized users.
- to reload a page on the internet
- An unauthorized person who secretly gains access to computer files.
9 Clues: A person who bullies online • to reload a page on the internet • Network etiquette ,online manners, being a good digital citizen • An unauthorized person who secretly gains access to computer files. • A collaborative website which can be directly edited by anyone with access to it • ...
Unit 3 Cyber Security 2017-05-12
Across
- someone who doesn't have the technical expertise to create their own software so they use software or scripts created by someone else
- gaining access to computer systems,networks,data and programmes without permission
- data is available to those who need it, when they need it
- loss or theft of equipment
Down
- data is entered,amended,stored and deleted by those with authorisation
- intercepting data packets and identify suspicious traffic
- someone who uses a computer as either a tool and/or a target to commit a crime
- network or system attack by someone who has authorised access
8 Clues: loss or theft of equipment • intercepting data packets and identify suspicious traffic • data is available to those who need it, when they need it • network or system attack by someone who has authorised access • data is entered,amended,stored and deleted by those with authorisation • someone who uses a computer as either a tool and/or a target to commit a crime • ...
Βρείτε τις λέξεις... 2023-02-14
Across
- If you are under 13 years you cannot open profiles at social……….. since you cannot protect yourself.
- If we spend too much time on the internet it might cause us …………
- Grandma stay…………online. The book’s title.
- Did Athena know all the secrets, so that she could …… safely online?
Down
- Through the I learn the news, I watch videos, I listen to music.
- We should always keep our profiles…
- Software program designed to spread from one device to another, affecting your computer and its operation.
- ……… gaming can have negative effects.
8 Clues: We should always keep our profiles… • ……… gaming can have negative effects. • Grandma stay…………online. The book’s title. • Through the I learn the news, I watch videos, I listen to music. • If we spend too much time on the internet it might cause us ………… • Did Athena know all the secrets, so that she could …… safely online? • ...
Neural and Social Network 2021-11-12
Across
- ___ learning is a model of learning based on neural plasticity
- ___ networks are made up of individuals and communicate through different medium or channel of communication
- ___is a microblogging platform, where users post short status updates
Down
- ____ is one of the most extensive social created in 2004
- social ____ in which a person, thing or idea is linked or associated with something else.
- ____ Vygotsky had a theory which states that community and language play a central part in learning
- ____ language is an invention by Tim Berners Lee in 1991
- make web browsing accessible and straightforward
8 Clues: make web browsing accessible and straightforward • ____ is one of the most extensive social created in 2004 • ____ language is an invention by Tim Berners Lee in 1991 • ___ learning is a model of learning based on neural plasticity • ___is a microblogging platform, where users post short status updates • ...
ALGO ML 2024-10-09
Across
- A popular framework for deep learning models often used for research.
- The technique of teaching computers to understand spoken language.
- A common framework used for building and training neural networks.
- The approach of learning without explicit supervision, focused on hidden structures in data.
Down
- The problem where a neural network model becomes less effective at learning after a certain point.
- A function that computes the weighted sum of inputs in a neural network.
- An algorithm used in deep learning for mapping hierarchical representations.
- The statistical relationship between two variables in machine learning.
8 Clues: The technique of teaching computers to understand spoken language. • A common framework used for building and training neural networks. • A popular framework for deep learning models often used for research. • The statistical relationship between two variables in machine learning. • A function that computes the weighted sum of inputs in a neural network. • ...
Cybersecurity Crossword 2025-07-15
Across
- A type of malicious software that demands money to unlock your files.
- The process of turning data into something more secure so people can't understand it.
- Software that secretly monitors your actions on a computer or phone.
Down
- A harmful program that tricks you into thinking it's something safe.
- A hidden method of accessing a computer system without the user's knowledge.
- A digital document that verifies the identity of a website or server.
- Self-replicating malware that spreads across networks, often causing damage.
- A scam that uses fake emails or websites to steal personal information.
8 Clues: A harmful program that tricks you into thinking it's something safe. • Software that secretly monitors your actions on a computer or phone. • A digital document that verifies the identity of a website or server. • A type of malicious software that demands money to unlock your files. • A scam that uses fake emails or websites to steal personal information. • ...
Ransomware Crossword 2017-11-13
Across
- A program or system designed to take advantage of a particular error or security vulnerability in computers or networks.
- Susceptible to physical harm or damage
- Evidence or testimonials concerning one's right to credit, confidence, or authority
- Malware that disables the normal operation of a computer
- To increase or spread at a rapid rate
- A deception practiced in order to induce another to give up possession of property or surrender a right.
Down
- Represented as existing or as being as described but not so proved
- To admit the existence or truth of
- To damage or weaken by pressure or tension
- To open to a fuller extent or width; stretch
- To invade and proliferate in, often resulting in disease. Used of microorganisms or other infectious agents
11 Clues: To admit the existence or truth of • To increase or spread at a rapid rate • Susceptible to physical harm or damage • To damage or weaken by pressure or tension • To open to a fuller extent or width; stretch • Malware that disables the normal operation of a computer • Represented as existing or as being as described but not so proved • ...
ethics terms 2013-01-18
Across
- The computer equivalent of breaking and entering
- kids who experience this are 3 times more likely to be depressed.
- software programs that claim to do one thing but instead damage your computer
- protects artists, publishers, and other owners against unauthorized use
- Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
Down
- program that records every keystroke
- software that piggybacks on other programs; impairs or destroys a computer's ability to function properly
- property Property of the mind
- protects computers from users on other networks, offensive websites, and potential hackers
- emails that attempt to trick people into revealing person information to be used for identity theft
- software installed without your knowledge that is programmed to show you advertisements
11 Clues: property Property of the mind • program that records every keystroke • The computer equivalent of breaking and entering • kids who experience this are 3 times more likely to be depressed. • protects artists, publishers, and other owners against unauthorized use • software programs that claim to do one thing but instead damage your computer • ...
Social Studiessss 2020-10-09
Across
- were another animal they tried to domesticate for the war
- , were the first animal thought to be domesticated
- can include a family history such as stories of parents , grandparents , great grandparents
- stone age ,was a period of time during which early humans made lasting tools and weapons mainly from stone
- , / Europe is where the nomads moved
Down
- ,is the act of supplying land with water from another place using networks of canals
- ,soil is rich in the substance that plants need to grow
- nomads, are people who travel from place to place looking for grazing areas
- was made 1 million to 500,000 years ago
- , are people with no settled home
- is a worker who is skilled in crafting items by hand
- stone, stage was when humans did not yet know how to farm
12 Clues: , are people with no settled home • , / Europe is where the nomads moved • was made 1 million to 500,000 years ago • , were the first animal thought to be domesticated • is a worker who is skilled in crafting items by hand • ,soil is rich in the substance that plants need to grow • were another animal they tried to domesticate for the war • ...
Find the words! 2020-05-23
Across
- _______ reality technology will continue to evolve in the future.
- The major of Computer Science at Korea University deals with computer-related __________(ies).
- ____ has high expectations in business areas such as logistics distribution, military and food safety due to its
- recognition rate, contactless recognition media, reach, connectivity with other networks and scalability of
- These days, cell phones have iris recognition ______s.
Down
- My dream is to make a mobile game ___________.
- All machines in this factory operate _____________ without people.
- The team leader _______d the roles of each member according to the abilities of the team members.
- I _______ed my name to participate in the game programming competition.
- The ______ of technology is in vogue these days.
- In the near future, ____-_______ cars will be commercialized.
11 Clues: My dream is to make a mobile game ___________. • The ______ of technology is in vogue these days. • These days, cell phones have iris recognition ______s. • In the near future, ____-_______ cars will be commercialized. • _______ reality technology will continue to evolve in the future. • All machines in this factory operate _____________ without people. • ...
DC 2024-12-16
Across
- One-way communication (e.g., TV broadcast).
- Any unwanted interference that distorts a signal during transmission.
- The process of converting data into a specific format for efficient transmission or storage.
- The delay between when data is sent and when it is received.
- the actual data transfer rate experienced by a user.
- the weakening of a signal as it travels over a medium.
Down
- Two-way, but one direction at a time.
- A set of rules that devices follow to communicate.
- converts signals to higher frequencies for transmission over long distances
- The process of directing data between devices or networks to reach the correct destination
- the variation in packet arrival times, causing delays or interruptions in video/audio streams
11 Clues: Two-way, but one direction at a time. • One-way communication (e.g., TV broadcast). • A set of rules that devices follow to communicate. • the actual data transfer rate experienced by a user. • the weakening of a signal as it travels over a medium. • The delay between when data is sent and when it is received. • ...
Cyber Security Revision 2024-10-10
Across
- Part of the Internet that can be accessed using a search engine.
- A way of convincing people to give up personal information.
- A way of strengthening logins by sending a code to a phone or email.
- A simple (and very old) method of encryption where the alphabet is shifted.
Down
- Part of the Internet that is unmonitored and often contains illegal content.
- A way of jumbling up data so it is unreadable.
- Type of hacker that commits illegal actions.
- A small piece of software designed to cause damage.
- Type of hacker who commits illegal actions but for the greater good.
- Part of the Internet hidden behind logins, etc.
- Type of hacker who legally hacks, often to test networks.
11 Clues: Type of hacker that commits illegal actions. • A way of jumbling up data so it is unreadable. • Part of the Internet hidden behind logins, etc. • A small piece of software designed to cause damage. • Type of hacker who legally hacks, often to test networks. • A way of convincing people to give up personal information. • ...
Lamila 2025-09-17
Across
- a computer network all over the world.
- the program we use to view content on the web.
- example of a web browser.
- a program we use to search for information on the web.
- illegally getting access to data by looking for, and using, loopholes or weaknesses in networks or computer systems.
Down
- a group of related web pages linked to one another.
- secure your device with a password, PIN code or screen lock pattern.
- the main sevice on the internet that we use to find information.
- when someone pretends to be someone else by finding and using that person's personal information.
- a technique used by criminals to try and trick users into revealing confidential information.
- unique address of a webpage.
11 Clues: example of a web browser. • unique address of a webpage. • a computer network all over the world. • the program we use to view content on the web. • a group of related web pages linked to one another. • a program we use to search for information on the web. • the main sevice on the internet that we use to find information. • ...
Designing and Building 2014-05-10
Across
- ___________ hoop was successful in its second try
- Well-water is lifted using a system of ____________
- People travelled a great deal for business or __________
- _________ uses power of running water to make it turn
- Suspension bridges use cables attached to strong supports to hold up the __________
- Underground __________ conduct water directly from an underground source to where it is needed.
- Engineers use __________ to design and construct different machines and buildings
- ________ bridges allowed boats to pass underneath
- Mowlana Hazir Imam guides us to think carefully about the way we shape our __________
Down
- Engineers need to determine the number of ___________ and cost before beginning the task
- ____________ Engineering tool used in war can cause great __________
- Vast networks of ________ canals is needed to water the fields
- Imam Al-Muizz invented the fountain __________
- Rulers in _________ lands founded new cities in such as Cairo and Baghdad
- Engineers found a way to power mills and bring __________
- A dam is a barrier that is built across the path of a _________ to hold back the water
16 Clues: Imam Al-Muizz invented the fountain __________ • ___________ hoop was successful in its second try • ________ bridges allowed boats to pass underneath • Well-water is lifted using a system of ____________ • _________ uses power of running water to make it turn • People travelled a great deal for business or __________ • ...
Financial Literacy by Cole 2023-11-07
Across
- A medium of exchange in the form on bank notes and coins
- Scams sent by email, text, or on websites. Looks like trusted businesses, financial insitutions, or gov agencies.
- The overall term for phones, computers, laptops, tablets, etc.
- What you owe - what you own
- Putting in money in funds to make more money through it over time with interest
- Money that is subtracted from your income from the government
- Proper term for things that you owe
- A percent of money taken by the government from your income, purchases, etc.
Down
- The internet or other computer networks
- Limiting the amount of money you can spend over a period of time
- Things that should be shared with yourself and only yourself
- Knowing or Learning how to be safe with your information online
- Phishing messages are sent by ______
- Fraud that tries to get bank info, personal information, etc from you
- Proper term for things that you own
- Financial institution that manages your money or loans you money
16 Clues: What you owe - what you own • Proper term for things that you own • Proper term for things that you owe • Phishing messages are sent by ______ • The internet or other computer networks • A medium of exchange in the form on bank notes and coins • Things that should be shared with yourself and only yourself • Money that is subtracted from your income from the government • ...
Software Engineering 2023-11-01
Across
- Pre-written code or routines that can be reused in different software applications
- ____ Code, portions of code that are never executed and serve no purpose
- Combinations of symbols that correctly program a certain language
- This is done to revise a program after finished
- Ability of software system to gracefully handle unexpected input
- field that focuses on systems that do taska typically done by humans
- person who exploits weaknesses in computer systems or networks
- Software suite with code editing, debugging, and building tools for software.
Down
- 0s and 1s used by computers to represent data and instructions
- Point in software system where performance is limited or slowed from resource constraint
- Overall experience and satisfaction user have with software application.
- Set of instructions to transform input to output using maths, repetition, etc.
- Part of the software that users interact with
- Collection of data that can be accessed, managed, and updated
- Error in the software program
- _____ language, language for automating tasks, ease of use and rapid development
16 Clues: Error in the software program • Part of the software that users interact with • This is done to revise a program after finished • Collection of data that can be accessed, managed, and updated • 0s and 1s used by computers to represent data and instructions • person who exploits weaknesses in computer systems or networks • ...
IT 7.3 key words 2024-01-14
Across
- Data from one digital to another
- doesn't use cables to connect different devices
- a standardized set of rules for formatting and processing data.
- are a type of computer network that connects multiple devices or nodes in order to share resources, information, and services.
- A router is a device that connects two or more packet-switched networks or subnetworks
- Transaction processing performance council and is used to compare the performance of online transaction processing.
- uses cables to connect different devices
- Another name for a web address
- Collections of data
Down
- is something that lots of people can join
- a group of interconnected nodes or computing devices that share data or info together
- refers to the physical devices that facilitate communication between hardware running on a computer network.
- measure of the data transfer rate or capacity of a given network
- The world wide web
- are used to interconnect, connect and transfer info between computers, routers, switches and storage area
- A way of contacting another person through the internet
16 Clues: The world wide web • Collections of data • Another name for a web address • Data from one digital to another • uses cables to connect different devices • is something that lots of people can join • doesn't use cables to connect different devices • A way of contacting another person through the internet • a standardized set of rules for formatting and processing data. • ...
ITA Vocab by Leilani Tuitubou 2020-09-03
Across
- The number of transistors on a chip will double every 2 years, while the cost goes down by half.
- Hypertext mark language
- A mutually aagreed method of communication
- a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user
- company that provides subscribers with access to the internet
- tiny switches that control the flow of electrical current
- a progam or automated script which browses the World Wide Web
Down
- the address of a World Wide Web
- used to navigate the World Wide Web.
- a link from a hypertext file or document to another location or file
- data that is routed between an origin and a destination on the Internet
- a number expressed in the base-2 numeral system
- collection of data or computer instructions that tell the computer how to work
- connected set of networks
- Transmission Control Protocol/Internet Protocol
- 8 bits of data
16 Clues: 8 bits of data • Hypertext mark language • connected set of networks • the address of a World Wide Web • used to navigate the World Wide Web. • A mutually aagreed method of communication • a number expressed in the base-2 numeral system • Transmission Control Protocol/Internet Protocol • tiny switches that control the flow of electrical current • ...
ROUND 3 2025-05-14
Across
- : A portable storage device used to transfer digital files between devices.
- : A handheld device used to control the cursor on a screen.
- : A method of exchanging digital messages over the Internet.
- : The first word in the term for machine-based intelligence.
- : A secret combination of characters used to access secure systems.
- : A device that produces hard copies of documents or images.
- : A mobile phone with advanced computing and Internet capability.
- : A machine capable of carrying out complex tasks automatically.
- : A panel of keys used to enter data into a computer.
Down
- : A flat visual display unit for computers or mobile devices.
- : To send data or files from a local device to the Internet or a server.
- : An electronic device that processes and stores digital information.
- : A wireless connection that enables devices to access the Internet.
- : To receive data or files from the Internet to a local device.
- : A global system of interconnected computer networks.
- : A software application designed to perform specific functions on mobile devices.
16 Clues: : A panel of keys used to enter data into a computer. • : A global system of interconnected computer networks. • : A handheld device used to control the cursor on a screen. • : A method of exchanging digital messages over the Internet. • : The first word in the term for machine-based intelligence. • : A device that produces hard copies of documents or images. • ...
Genius Grid - II 2025-02-18
Across
- Via ________ protocol fire alarm panels communicate with each other in a networked system
- Fire can be reduced by removing, Oxygen, _______ and heat.
- Communication protocol specifically designed for building automation and control networks
- Method used to prevent data from accessing into it
- Component of an AHU responsible for adjusting the flow of air
- A virtual model that simulates the physical city and its processes in context of smart cities
- Heating, ventilation and air conditioning systems
- Sensor to convert light to electrical signals
- Component of a BMS responsible for executing predefined schedules
- _____ building designed to be environmentally responsible and resouce efficient
Down
- ______tests verify that the system can handle huge data as expected in a large system test.
- Type of Smoke detector most suitable for detecting slow burning fires with smoldering smoke and low flames
- Material that acts between Conductor and insulator
- Large and complex datasets that require advanced tools for analysis
- A fire alarm notification appliance
- Device used to record the video footage in Hard drive
16 Clues: A fire alarm notification appliance • Sensor to convert light to electrical signals • Heating, ventilation and air conditioning systems • Material that acts between Conductor and insulator • Method used to prevent data from accessing into it • Device used to record the video footage in Hard drive • Fire can be reduced by removing, Oxygen, _______ and heat. • ...
world geography vocab 2024-11-04
Across
- smaller society adopts the culture of a majority group
- looks really steep a lot of babies being born, people dying closer to a big age
- different countries that have certain traits in common
- group that share a geographic region, a sense of ia dentity, and culture
- spread of ideas, inventions, or patterns of behavior
- specific group that shares a language, customs and common heritage
- defined by a limited number of related characteristics
- features of the earth that humans created
Down
- feelings and prejudices that may or may nthe ot be true
- how far across the earth a person or product travels
- the amount of time it takes an idea, person, or product to travel
- public services or systems such as power water sewage, transportation, communication networks ect.
- divides the earth into northern and southern hemispheres
- a map in which information has been substituted for land area or distance
- directs you and tells you where you are
- shows a theme connected to a specific area
16 Clues: directs you and tells you where you are • features of the earth that humans created • shows a theme connected to a specific area • how far across the earth a person or product travels • spread of ideas, inventions, or patterns of behavior • smaller society adopts the culture of a majority group • different countries that have certain traits in common • ...
The Right To Education:Martina 2020-06-03
Across
- of choice
- through this it provides technical assistance and policy advice
- provides citizens legal recourse before the law courts or administrative tribunals
- The United Nations Educational, Scientific and Cultural Organization
Down
- a measure to check the implementation of the right to education at country level
- partnerships and networks around key issues
- this type of education should be free, compulsory and universal
- of education requires States to allocate at least 4-6 per cent of GDP and/or at least 15-20 per cent of public expenditure to education
- states need to strike a balance between educational freedom and ensuring everyone receives a quality education
- 1 out of 5 is left out of a secondary education
10 Clues: of choice • partnerships and networks around key issues • 1 out of 5 is left out of a secondary education • this type of education should be free, compulsory and universal • through this it provides technical assistance and policy advice • The United Nations Educational, Scientific and Cultural Organization • ...
E safety 2019-03-01
Across
- Tag The nickname a user has chosen to be identified by when playing Internet games
- A form of malicious code that displays unsolicited advertising on your computer
- A location online that allows multiple users to communicate electronically
- To copy a file from one computer system to another via the Internet
- A giant collection of computer networks that connects people and information all over the world
Down
- A hostile, strongly worded message that may contain obscene language
- A program that lets u find, see and hear material on web pages
- A term for the actual computer equipment and related machines or computer parts
- To upload information to the Web
- Where u find a particular web page
10 Clues: To upload information to the Web • Where u find a particular web page • A program that lets u find, see and hear material on web pages • To copy a file from one computer system to another via the Internet • A hostile, strongly worded message that may contain obscene language • A location online that allows multiple users to communicate electronically • ...
mobile technology 2020-08-30
Across
- owns to trade mark wifi.
- id a temporary ip address for a mobile node
- smpp cilent is termed a external short message
- unique number,usually fifteen digits,associated with global system for mobile communication.
- has an onboard power source,usually a battery,and an active transmitter.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- provides a means of reading or interrogating the data using the tag
- a set of two or more interconnection piconets form
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Connectivity, Media Support, Expansion capability & Security features 2021-10-05
Across
- a user interface controlled by entering text instructions
- a user interface controlled by a pointer on the screen
- a device’s ability to connect to networks and other devices.
- A type of security to prevent unauthorized access to data.
Down
- one or more Central Processing Units that carry out software instructions
- this interface is controlled by the user giving spoken commands to the device.
- this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- A computer security system
- used to make a device inactive so that it requires a password or PIN to reactive it
- the memory in the computer system which is used for running software.
10 Clues: A computer security system • a user interface controlled by a pointer on the screen • a user interface controlled by entering text instructions • A type of security to prevent unauthorized access to data. • a device’s ability to connect to networks and other devices. • the memory in the computer system which is used for running software. • ...
computer words 2021-03-04
Across
- what is a type of file that organizes other files in a hierarchical structure?
- what would you say to shorten access point?
- whats a logical group of computers and electronic devices with a common set of rules?
- whats the short way of saying internet service provider?
- what is a part of a computer system or network that is designed to block unauthorized access?
Down
- what is a device that routes traffic between networks called?
- what is it called when you re-boot a device either with a cold or warm boot?
- what is the short way to say uniform resource locator?
- what does cat6 mean?
- whats the short way of saying domain name system
10 Clues: what does cat6 mean? • what would you say to shorten access point? • whats the short way of saying domain name system • what is the short way to say uniform resource locator? • whats the short way of saying internet service provider? • what is a device that routes traffic between networks called? • ...
Internet Vocabulary 2023-01-29
Across
- A network security device that monitors and filters incoming and outgoing network traffic based on security policies
- What is the name of the most popular search engine
- What does www stand for
- Collection of web pages and related content that is identified by a common domain name and published on at least one web server
- worldwide network of computer networks
Down
- Electronic mail that allows you and other people to send letters to people via the internet
- Abbreviation for Uniform Resource Locator
- Program that you use to view different pages on the internet
- What is the opening page of a website called
- a company that provides subscribers with access to the internet.
10 Clues: What does www stand for • worldwide network of computer networks • Abbreviation for Uniform Resource Locator • What is the opening page of a website called • What is the name of the most popular search engine • Program that you use to view different pages on the internet • a company that provides subscribers with access to the internet. • ...
Cyber Security Crossword 2023-06-21
Across
- Company which developed 7 step model for identification and prevention of cyber intrusions activity
- Type of Malware derived from the Greek Story
- Cyber Security model designed to guide policies for information security
- Keyword entered in Command Prompt which will give the IP address of the device
- Type of computer memory that is used to store data and instructions that are often accessed
Down
- Open Source platform for containerization designed by Google
- LINUX based OS developed for penetration testing and digital forensics
- Intergovernmental Organisation where "The Web was born"
- Free and open-source utility which is used to scan networks and security auditing.
- Set of rules and standards that govern how data is transmitted over a network
10 Clues: Type of Malware derived from the Greek Story • Intergovernmental Organisation where "The Web was born" • Open Source platform for containerization designed by Google • LINUX based OS developed for penetration testing and digital forensics • Cyber Security model designed to guide policies for information security • ...
Vocab # 1 2013-02-19
Across
- Intentional programming error.
- All the parts of the computer that you can see and touch.
- An enormous network made up of interconnected smaller networks throughout the entire network.
- Crystal Display A thin, flat electronics visual display that uses the light modulating properties of liquid crystals ( LC’s ).
Down
- Babbage The father of computers.
- A private network used for employees within an organization to communicate.
- Programs that run on your computer.
- System All the parts of the computer together. It is made up of the CPU, memory, peripheral devices, and the operating system.
- Processing Unit The brain of your computer that carries out the functions needed to control the operations within your computer.
- Programming error.
10 Clues: Programming error. • Intentional programming error. • Babbage The father of computers. • Programs that run on your computer. • All the parts of the computer that you can see and touch. • A private network used for employees within an organization to communicate. • An enormous network made up of interconnected smaller networks throughout the entire network. • ...
Tech Conundra - 2 2013-02-26
Across
- Methods to shrink size of a movie.
- A method of synchronizing potentially concurrent uses of a database or other common resource.
- A twitterer with a million or more followers.
- The only state that can be typed on one row of keys on a “QWERTY” keyboard.
- A file that contains data is a specific format,requiring a special interpretation of its bits.
Down
- Acronym of a research and development organization under the Department of Information Technology, India.
- A special set of circuits in a microprocessor chip.
- The register holding the instruction currently being executed.
- formal rules governing the construction of valid instructions
- A node that handles communication between its LAN and other networks.
10 Clues: Methods to shrink size of a movie. • A twitterer with a million or more followers. • A special set of circuits in a microprocessor chip. • formal rules governing the construction of valid instructions • The register holding the instruction currently being executed. • A node that handles communication between its LAN and other networks. • ...
Globalisation 2013-08-07
Across
- it is something that is put in space to connect everyone in the world, it provides signal for news, TV and phone calls to be received all around the world.
- it is how you get in contact with people
- it is travel for recreational, leisure, or business purposes
- a huge computer network linking smaller computer networks worldwide
- a report of a recent event
Down
- buying and selling goods
- moving people or things from one place to another
- it is our surroundings, it is where people, animals and plants operate
- it is the way different people do their things, Eg. food, language, religion
- it is the he wealth and resources of a country or region
10 Clues: buying and selling goods • a report of a recent event • it is how you get in contact with people • moving people or things from one place to another • it is the he wealth and resources of a country or region • it is travel for recreational, leisure, or business purposes • a huge computer network linking smaller computer networks worldwide • ...
Digestive care 2014-05-21
Across
- What is a name for extreme dryness of the mouth
- The digestive juice product containing enzymes capable of digesting all 4 major foodstuff categories
- Blood carrying the products of protein digestion reaches the heart. It first passes through capillary networks where
- When protein digestion is circulated throughout the body how do they enter individual body cells
- What are the finger like projections lining the small intestine
Down
- What is the name of the sphinctre between the stomach and the duodemum
- Who is the term for motility through digestive system
- What deodorizes and gives colour to faeces
- What operation where the vagus nerve is severed to decrease secretions of gastric juices
- The vistamin associated with calcium absorption
10 Clues: What deodorizes and gives colour to faeces • What is a name for extreme dryness of the mouth • The vistamin associated with calcium absorption • Who is the term for motility through digestive system • What are the finger like projections lining the small intestine • What is the name of the sphinctre between the stomach and the duodemum • ...
Cyber attack crossword puzzle 2023-09-03
Across
- A secret word or phrase used to gain access to your accounts.
- Criminal activities carried out using computers or the internet.
- A security barrier that filters network traffic to prevent unauthorized access.
- A set of rules and practices for ensuring the security of computer systems and data.
- A fake email or website that tricks individuals into revealing sensitive information.
Down
- The unauthorized access, theft, or manipulation of data.
- Malicious software specifically designed to harm, infiltrate, or compromise computer systems.
- A malicious software that can encrypt files and demand a ransom for their release.
- An organization or individual responsible for securing computer systems and networks.
- A program designed to protect a computer from viruses and malware.
10 Clues: The unauthorized access, theft, or manipulation of data. • A secret word or phrase used to gain access to your accounts. • Criminal activities carried out using computers or the internet. • A program designed to protect a computer from viruses and malware. • A security barrier that filters network traffic to prevent unauthorized access. • ...
CW-4 2023-09-15
Across
- unique identifier key for a record in a database table
- a cmd used to retrieve data from a database table in SQL
- the process of converting analog signals to digital signals
- a linux cmd to modify existing database tables
- a cmd create an empty file in linux
- a term which describes a piece of code that can be reused in different parts of a program
- a type of computer memory that can be accessed quickly
Down
- computer's main circuit board, housing the CPU and other essential components.
- the process of ensuring that software or hardware is free from vulnerabilities.
- in networking, what device is used to forward data packets between computer networks
10 Clues: a cmd create an empty file in linux • a linux cmd to modify existing database tables • unique identifier key for a record in a database table • a type of computer memory that can be accessed quickly • a cmd used to retrieve data from a database table in SQL • the process of converting analog signals to digital signals • ...
Unit 3_1 2025-04-03
Across
- A device that connects different networks and directs data packets (6 letters)
- A protocol that provides connectionless service at the network layer (3 letters)
- A method of allocating IP addresses dynamically (4 letters)
- A protocol that translates private IP addresses into public ones (3 letters)
- A technique used to allocate multiple IP addresses dynamically (8 letters)
Down
- The process of sending a data packet from source to destination (9 letters)
- A protocol that helps resolve IP addresses to MAC addresses (3 letters)
- A technique used to divide a network into smaller subnetworks (10 letters)
- A routing protocol that finds the best path based on distance vectors (3 letters)
- A connectionless network layer protocol (4 letters)
10 Clues: A connectionless network layer protocol (4 letters) • A method of allocating IP addresses dynamically (4 letters) • A protocol that helps resolve IP addresses to MAC addresses (3 letters) • A technique used to divide a network into smaller subnetworks (10 letters) • A technique used to allocate multiple IP addresses dynamically (8 letters) • ...
Computer Hardware Crossword 2024-09-06
Across
- The main processor of the computer responsible for executing instructions.
- The display screen that outputs visual information from the computer.
- A device that provides emergency power to the computer during a power outage.
- A cable used to connect computers to a network for wired internet access.
- A device that forwards data packets between computer networks, creating an internetwork.
- Temporary memory used for storing data that is actively being used by the CPU.
Down
- Keeps the computer's components cool to prevent overheating.
- The main circuit board that connects and allows communication between various components of the computer.
- A pointing device used to control the cursor on the screen.
- An input device used to type and interact with the computer.
10 Clues: A pointing device used to control the cursor on the screen. • Keeps the computer's components cool to prevent overheating. • An input device used to type and interact with the computer. • The display screen that outputs visual information from the computer. • A cable used to connect computers to a network for wired internet access. • ...
Cyber/Digital Literacy 2024-11-06
Across
- Type of crime that uses computers or networks harm.
- It is use protect your personal information
- It has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness
- Type of malware that can make copies of itself and spread automatically across computers in a network.
- typing targeted keywords about a subject into a search engine.
Down
- Bullying that takes place online using your smartphone, tablet and computer
- Who's actively participate in cyberspace and the online community offered through the internet
- An example of computer virus
- Refers to the trail of data you leave when using the internet.
- Assessing the credibility, reliability, and relevance of the information found online.
10 Clues: An example of computer virus • It is use protect your personal information • Type of crime that uses computers or networks harm. • Refers to the trail of data you leave when using the internet. • typing targeted keywords about a subject into a search engine. • Bullying that takes place online using your smartphone, tablet and computer • ...
Cybersecurity 2024-09-16
Across
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- Malware that locks or encrypts data, demanding payment for its release
- A person who gains unauthorized access to systems or networks
- Process of converting data into a code to prevent unauthorized access
Down
- A secret word or phrase used to authenticate access to data or systems
- Software that secretly monitors user activity and collects information
- Malicious software designed to harm, exploit, or disable computers
- A security system that monitors and controls incoming and outgoing network traffic
- Software used to detect, prevent, and remove malicious software
- A secure network connection that allows users to send and receive data as if they were on a private network
10 Clues: A person who gains unauthorized access to systems or networks • Software used to detect, prevent, and remove malicious software • Malicious software designed to harm, exploit, or disable computers • Process of converting data into a code to prevent unauthorized access • A secret word or phrase used to authenticate access to data or systems • ...
We Grow: Learning Week - Crossword Conquest! 2025-02-11
Across
- The ability to inspire and motivate others (10 letters)
- The act of working together towards a common goal (11 letters)
- A plan for achieving long-term goals (8 letters)
- A version control system widely used for tracking changes in source code (3 letters)
- A programming language known for its simplicity and readability (6 letters)
Down
- A person who guides and supports others (6 letters)
- A popular operating system used in servers and desktops (5 letters)
- The ability to understand and share the feelings of another (10 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- The process of improving your skills and knowledge to advance in your career (10 letters)
10 Clues: A plan for achieving long-term goals (8 letters) • A person who guides and supports others (6 letters) • The ability to inspire and motivate others (10 letters) • The act of working together towards a common goal (11 letters) • A popular operating system used in servers and desktops (5 letters) • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
Internet Safety 2025-10-06
Across
- Details like your name, address, phone number, or passwords
- Knowing how to find, evaluate, and use digital information safely
- The personal trail of info you leave behind when using the internet
- Protecting networks, devices, and data from attacks or damage
- Controls that help you decide who can see your posts or account info
- A second security step that confirms your identity, like a code sent to your phone
Down
- The version of yourself you create or share online
- An online message or email meant to trick you into sharing private data
- When private information is accessed or stolen without permission
- How others view you based on what they see about you online
10 Clues: The version of yourself you create or share online • Details like your name, address, phone number, or passwords • How others view you based on what they see about you online • Protecting networks, devices, and data from attacks or damage • Knowing how to find, evaluate, and use digital information safely • ...
Globalization 2022-05-07
Across
- A group or system of interconnected people or things.
- A gradual increase in world temperatures caused by gases such as carbon dioxide.
- A person who have a lot of money.
- Items for sale, or possessions that can be moved.
Down
- It is a term used to describe how trade and technology have made the world into a more connected place.
- Happening or existing all over the world.
- Something that is made to be sold, usually something that is produced by an industrial process.
- The process of increasing in size.
8 Clues: A person who have a lot of money. • The process of increasing in size. • Happening or existing all over the world. • Items for sale, or possessions that can be moved. • A group or system of interconnected people or things. • A gradual increase in world temperatures caused by gases such as carbon dioxide. • ...
Lecture 2: Introduction to Media Theory 2022-07-04
Across
- Two words: “People, technologies, and institutions all have power and agency to influence the development and subsequent use of technology”.
- This requires us to stop and think about what we are doing. It is a system of ideas intended to explain something.
- This is the singular form of media.
- Two words meaning technology has the power.
Down
- Two words giving people the power.
- one-way communication (___ media.
- The processes of communication.
- There is not one definition, we take a nuanced approach that includes technological devices, infrastructure, networks, platforms, content and text.
8 Clues: The processes of communication. • one-way communication (___ media. • Two words giving people the power. • This is the singular form of media. • Two words meaning technology has the power. • This requires us to stop and think about what we are doing. It is a system of ideas intended to explain something. • ...
Cloud Computing 2022-10-09
Across
- An organizations entire collection of software, hardware, networks & data centers
- Have access to your files, data and software on any device.
- The property of a cloud to grow or shrink capacity with dynamic change as needed
Down
- Used to fulfill the static needs of growth.
- When all infrastructure is located locally, rather than in the cloud
- On-demand delivery of computing power, storage, applications, database, analytics, intelligence, and other IT resources over the Internet
- Easily deploy your application in multiple regions around the world with just a few clicks
- Amazon Web Service
8 Clues: Amazon Web Service • Used to fulfill the static needs of growth. • Have access to your files, data and software on any device. • When all infrastructure is located locally, rather than in the cloud • The property of a cloud to grow or shrink capacity with dynamic change as needed • An organizations entire collection of software, hardware, networks & data centers • ...
NED Workplan Crossword Puzzle 2024-12-10
Across
- A cloud-based firewall solution to enhance the security posture across all eLobby networks
- NED Roadmap plan for April 2025
- Rules to allow Board’s in-house applications and block unsigned applications
- Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop
Down
- Acronym for Network-as-a-Service
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics to solve complex problems faster than on classical computers
- SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG
- Replacing existing IGA system in Feb 2025
8 Clues: NED Roadmap plan for April 2025 • Acronym for Network-as-a-Service • Replacing existing IGA system in Feb 2025 • Rules to allow Board’s in-house applications and block unsigned applications • SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG • Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop • ...
Oakland's Watershed Crossword Puzzle 2025-05-22
Across
- P________ is harmful to our environment and affects the watershed.
- There are many networks of ______ flowing from the hills to the SF Bay.
- An area of land that drains water to a common place, like a river, lake or ocean.
- What fish is native to the Oakland watershed?
Down
- The first National Wildlife Refuge.
- Oakland's watershed has 15 main creeks, over 30 tributaries, Lake Merritt and the _______.
- A stream or river flowing into a larger stream, river or lake.
- Join our Adopt-A-____ program to help protect and restore the watershed!
8 Clues: The first National Wildlife Refuge. • What fish is native to the Oakland watershed? • A stream or river flowing into a larger stream, river or lake. • P________ is harmful to our environment and affects the watershed. • There are many networks of ______ flowing from the hills to the SF Bay. • ...
Cyberspace 2025-10-16
Across
- a hypothetical moment in time when AI and other technologies have become so advanced that humanity undergoes a dramatic change
- the application of scientific knowledge for practical purposes, especially in industry
- a new method, idea, or product
- art of protecting networks, devices, and data from unauthorized access or criminal use
Down
- the perception or knowledge of something
- an integrated set of components for collecting, storing, and processing data
- the ability to learn or understand or to deal with new or trying situations
- Science the interdiscplinary field that involves extracting meaningful insights
8 Clues: a new method, idea, or product • the perception or knowledge of something • the ability to learn or understand or to deal with new or trying situations • an integrated set of components for collecting, storing, and processing data • Science the interdiscplinary field that involves extracting meaningful insights • ...
STRENGTHENING MEDIA LITERACY CROSSPUZZLE 2021-05-03
Across
- short text type used to communicate
- an electronic communication network that allows computer networks to connect to each other
- video and voice speech application
- Information technology security or electronic information security
Down
- it is the common name given to traditional and next-generation communication tools that provide one-way or interactive communication.
- A form of promotion and sharing shaped by graphic design and software languages hosted on the Internet network
- voice communication tool
- a person who provides access to systems that exploit vulnerabilities of electronic-based systems or accounts on the Internet
8 Clues: voice communication tool • video and voice speech application • short text type used to communicate • Information technology security or electronic information security • an electronic communication network that allows computer networks to connect to each other • ...
Network Basics 2016-06-16
Across
- Cables that connect computers and other network devices.
- Also known as a WAP, it is the device that connects you wirelessly to a network.
- A device that connects nodes together and send packets to where they need to go.
- A computer network that extends over a large geographical distance.
Down
- Each node needs a this to connect to the LAN.
- a group of computer systems and other computing hardware devices that are linked together.
- A computer network that extends over a large geographical distance.
- Sends data packets between different networks.
- A device that connects nodes together and sends all packets to all devices.
9 Clues: Each node needs a this to connect to the LAN. • Sends data packets between different networks. • Cables that connect computers and other network devices. • A computer network that extends over a large geographical distance. • A computer network that extends over a large geographical distance. • ...
Mobile phones - key terms 2013-09-11
Across
- like Wi-Fi but over much shorter distances
- allows you to use another mobile phone provider’s network so you can carry on making phone calls and sending texts.
- a card slot found in most mobile phones
- ________ calling allows you to stream live calls so you can speak to and see the person using the handset.
Down
- _________ text allows the user to type more quickly
- _______ messaging service
- The amount of time you can leave your phone on before it needs recharging.
- The network provider sometimes might do this to stop you changing networks
8 Clues: _______ messaging service • a card slot found in most mobile phones • like Wi-Fi but over much shorter distances • _________ text allows the user to type more quickly • The amount of time you can leave your phone on before it needs recharging. • The network provider sometimes might do this to stop you changing networks • ...
Crossword Title 2013-11-07
Across
- An organised collection of data
- Sound, especially when recorded, transmitted, or reproduced
- A vast computer network linking smaller computer networks worldwide
- The combination of the digital media elements displayed using digital devices
Down
- The recording, reproducing, or broadcasting of moving visual images
- Allowing or relating to continuous two-way transfer of information between a user and the central point of a communication system, such as a computer or television
- Represented by a rectangular grid of pixels that can be assigned a particular colour
- An image composed of mathematically defined lines and shapes
8 Clues: An organised collection of data • Sound, especially when recorded, transmitted, or reproduced • An image composed of mathematically defined lines and shapes • The recording, reproducing, or broadcasting of moving visual images • A vast computer network linking smaller computer networks worldwide • ...
NSS Chapter 7A 2023-02-23
Across
- Wireless technologies use _____________________________________________ to carry information between devices.
- ________ stands for Service Set Identifier.
- Self-healing and Self-configuring.
Down
- _______________ creates a reservation on the channel for a specific conversation between devices.
- Small business and home router typically have two primary types of ports: ________ port and an Internet Port.
- ______________ in infrastructure mode contains; wireless host, access point and ad hoc mode: host only.
- A home network is a small ___________ with devices that connect to an integrated router.
- Standards commonly referred to as Wi-Fi.
8 Clues: Self-healing and Self-configuring. • Standards commonly referred to as Wi-Fi. • ________ stands for Service Set Identifier. • A home network is a small ___________ with devices that connect to an integrated router. • _______________ creates a reservation on the channel for a specific conversation between devices. • ...
AI Crossword 2024-06-14
Across
- Use of largely automatic equipment in a system of operation.
- Machine capable of carrying out a complex series of actions automatically.
- A representation of a process or system used for prediction analysis
- A computing system inspired by biological system's networks that constitute animal brains.
- A system of communication used by a particular country or community
Down
- Information, especially facts or numbers.
- A step by step procedure for solving a problem or completing a task.
- A type of AI that allows software applications to become more accurate at predicting outcomes without being explicitly programmed.
8 Clues: Information, especially facts or numbers. • Use of largely automatic equipment in a system of operation. • A system of communication used by a particular country or community • A step by step procedure for solving a problem or completing a task. • A representation of a process or system used for prediction analysis • ...
TECH_TUESDAY 2024-11-26
Across
- NETWORKS: A type of AI inspired by the structure and function of the human brain.
- A process in WatsonX to optimize AI models with specific datasets.
- Oracle’s relational database management system widely used for data storage.
- CLOUD: Oracle’s platform for cloud-based computing, application deployment, and integration.
Down
- IBM's AI platform for building, scaling, and deploying AI models.
- A hardware or software tool designed to block unauthorized access to a network.
- LANGUAGE PROCESSING: The ability of AI to understand and process human language.
- A method used to ensure secure communication by encoding data.
8 Clues: A method used to ensure secure communication by encoding data. • IBM's AI platform for building, scaling, and deploying AI models. • A process in WatsonX to optimize AI models with specific datasets. • Oracle’s relational database management system widely used for data storage. • A hardware or software tool designed to block unauthorized access to a network. • ...
Decoding the Nation's Wallet 2025-04-21
Across
- the act of selling a part or whole of sharesof public sector undertaking held by government
- payments imposed on law breakers
- Fee payment charged by government to grant permission
- Allocation of resources for building and maintaining essential public works like roads, bridges, and communication networks.
Down
- Payments made to retired government employees and sometimes to other eligible individuals.
- claim of the government on property of person who died without leaving any legal heir
- Funding for public health services, hospitals, and medical research to improve citizen well-being.
- Burden cannot be shifted to others
8 Clues: payments imposed on law breakers • Burden cannot be shifted to others • Fee payment charged by government to grant permission • claim of the government on property of person who died without leaving any legal heir • Payments made to retired government employees and sometimes to other eligible individuals. • ...
RCC 3.3 & 3.4 vi (#6) 2024-11-04
Across
- The sharing and blending of ideas, religions, and technologies facilitated by trade routes.
- Systems of exchange that connected different regions, influencing economic and cultural interactions.
- Overland trade routes connecting Asia, the Middle East, and parts of Europe.
- Overland routes that connected West Africa to North Africa and beyond.
Down
- The objective that covers all of these key terms.
- High-value items, such as silk and spices, that were commonly traded along these networks.
- A major maritime network linking port cities across the Indian Ocean.
- Seasonal winds critical for navigation and trade in the Indian Ocean.
8 Clues: The objective that covers all of these key terms. • A major maritime network linking port cities across the Indian Ocean. • Seasonal winds critical for navigation and trade in the Indian Ocean. • Overland routes that connected West Africa to North Africa and beyond. • Overland trade routes connecting Asia, the Middle East, and parts of Europe. • ...
Caffeine Challenges 2024-08-20
5 Clues: Who is the inventor of Artificial Intelligence? • What is the term for AI’s ability to generate text? • What is the primary framework used for deep learning? • What is the primary algorithm used in neural networks? • Face Recognition system is based on which type of approach?
Digital Transformation 2024-06-12
Across
- Technology that connects devices and allows them to communicate over the internet
- Technology that creates an interactive experience of a real-world environment
- a digital representation of the physical world
Down
- The global system of interconnected computer networks
- The science of making intelligent machines and programs
5 Clues: a digital representation of the physical world • The global system of interconnected computer networks • The science of making intelligent machines and programs • Technology that creates an interactive experience of a real-world environment • Technology that connects devices and allows them to communicate over the internet
OE 2 Assignment Crossword Puzzle By Shivam Dharamthok B168 2024-11-18
Across
- One complete pass through the training dataset.
- Number of training samples used in one iteration of training.
- Function used in neural networks to introduce non-linearity.
Down
- Measures how well a model's predictions match the actual values.
- The output or result generated by a machine learning model.
5 Clues: One complete pass through the training dataset. • The output or result generated by a machine learning model. • Function used in neural networks to introduce non-linearity. • Number of training samples used in one iteration of training. • Measures how well a model's predictions match the actual values.
Fake News 2022-04-04
Across
- Information or ideas,whether true or false,that are spreed to promote or injure a cause,movement,nation...
- A report of recent event,information
- An act of expressing or declaring one's objection to,disapproval of,or disagreement with some act or action.
Down
- Trickery carried out for profit or to gain some unfair or dishonest adventage
- a large computer network linking smaller computer networks worldwide
- not true or correct,erroneus,wrong
- Of,relating to,or caused by a virus
7 Clues: not true or correct,erroneus,wrong • Of,relating to,or caused by a virus • A report of recent event,information • a large computer network linking smaller computer networks worldwide • Trickery carried out for profit or to gain some unfair or dishonest adventage • ...
Computer 2017-03-21
Across
- A wireless local area network (WLAN) is a wireless distribution method for two or more devices that use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.
- local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- Do ,Network
- Devices A network host is a computer or other device connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network. A network host is a network node that is assigned a network layer host address.,intermediary Devices Intermediary devices interconnect end devices. These devices provide connectivity and work behind the scenes to ensure that data flows across the network. Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork.
- he official procedure or system of rules governing affairs of state or diplomatic occasions.
- energy or mental capacity required to deal with a situation.
- International Standards Organization (ISO) developed the Open Systems Interconnection (OSI) model. It divides network communication into seven layers. Layers 1-4 are considered the lower layers, and mostly concern themselves with moving data around.
- personal area network (PAN) is a computer network used for data transmission amongst devices such as computers, telephones, tablets and personal digital assistants.
- To Peer Networks In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer. A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files
- MAN Do A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
Down
- range of frequencies within a given band, in particular that used for transmitting a signal.
- Simplex composed of or characterized by a single part or structure.
- MAN A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
- Media Network media is the actual path over which an electrical signal travels as it moves from one component to another. This chapter describes the common types of network media, including twisted-pair cable, coaxial cable, fiber-optic cable, and wireless.
- standards?,"Open Standards" are standards made available to the general public and are developed (or approved) and maintained via a collaborative and consensus driven process. "Open Standards" facilitate interoperability and data exchange among different products or services and are intended for widespread adoption.
- server networks client/server network. A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.
- Full Duplex (adj.) Refers to the transmission of data in two directions simultaneously. For example, a telephone is a full-duplex device because both parties can talk at once. In contrast, a walkie-talkie is a half-duplex device because only one party can transmit at a time.
- a house divided into two apartments, with a separate entrance for each.
- Transmission Data transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices. It enables the transfer and communication of devices in a point-to-point, point-to-multipoint and multipoint-to-multipoint environment.
19 Clues: Do ,Network • energy or mental capacity required to deal with a situation. • Simplex composed of or characterized by a single part or structure. • a house divided into two apartments, with a separate entrance for each. • range of frequencies within a given band, in particular that used for transmitting a signal. • ...
Mobile phones - key terms 2013-09-11
Across
- like Wi-Fi but over much shorter distances
- allows you to use another mobile phone provider’s network so you can carry on making phone calls and sending texts.
- a card slot found in most mobile phones
- ________ calling allows you to stream live calls so you can speak to and see the person using the handset.
Down
- _________ text allows the user to type more quickly
- _______ messaging service
- The amount of time you can leave your phone on before it needs recharging.
- The network provider sometimes might do this to stop you changing networks
8 Clues: _______ messaging service • a card slot found in most mobile phones • like Wi-Fi but over much shorter distances • _________ text allows the user to type more quickly • The amount of time you can leave your phone on before it needs recharging. • The network provider sometimes might do this to stop you changing networks • ...
ICT Lesson 2 Activity 2021-10-26
Across
- google.com
- skilled or optimized way of searching the Internet based on the “context” provided
- Using social networks and information tools to gather and share information
- laws protect the rights of people to maintain legal ownership of their works and ideas.
- google scholar
- is a set of rules and guidelines that determines how to properly communicate and use the web
Down
- Evaluating information found in your sources based on accuracy, validity, appropriateness for needs,importance,and social and cultural context
- Displaying emotional resilience by persisting in information searching despite challenges
8 Clues: google.com • google scholar • Using social networks and information tools to gather and share information • skilled or optimized way of searching the Internet based on the “context” provided • laws protect the rights of people to maintain legal ownership of their works and ideas. • ...
Chapter 8- BASIC OPERATIVE SYSTEMS 2022-09-10
Across
- It is the act of compromising digital devices and networks
- It is a mobile operating system based on a modified version of Linux
- It is an Operating system open source
- It is an Operating system belonging to Microsoft
- Linux version with 350 hacking tools
Down
- It is a weakness in an IT system that can be exploited by an attacker
- It is a network security device that monitors and filters incoming and outgoing network traffic
- It is a Linux distribution based on Debian and composed mostly of free and open source software
8 Clues: Linux version with 350 hacking tools • It is an Operating system open source • It is an Operating system belonging to Microsoft • It is the act of compromising digital devices and networks • It is a mobile operating system based on a modified version of Linux • It is a weakness in an IT system that can be exploited by an attacker • ...
Photomontage 2021-06-22
Across
- an obect that holds something up so thet it does not fall
- media websites and computer programs that allow people to communicate and share information on the internet using a computer mobile phone.
- a pattern, plan or arrangement.
- a wordwile system of computer networks used to exchange information.
Down
- the things that are done to keep someone or something safe.
- a technique to put different kind of pictures all togheter to make only one picture.
- a short piece of witing about a particular subject, done by a student.
- information or facts about something.
8 Clues: a pattern, plan or arrangement. • information or facts about something. • an obect that holds something up so thet it does not fall • the things that are done to keep someone or something safe. • a wordwile system of computer networks used to exchange information. • a short piece of witing about a particular subject, done by a student. • ...
tech 2023-10-04
Across
- The evaluation or appraisal of someone or something.
- The practice of analyzing and interpreting complex data sets to inform decision-making.
- Services or strategies for finding and hiring suitable employees.
Down
- Measures taken to protect computer systems, networks, and data from cyber threats.
- The practice of recruiting highly skilled individuals for specialized positions.
- The process of integrating a new employee into a company.
6 Clues: The evaluation or appraisal of someone or something. • The process of integrating a new employee into a company. • Services or strategies for finding and hiring suitable employees. • The practice of recruiting highly skilled individuals for specialized positions. • Measures taken to protect computer systems, networks, and data from cyber threats. • ...
Crossword 4 2023-09-04
Across
- An action taken to withdraw/remove a product or system from distribution
- A fraudulent imitation of something.
- A process of increasing the knowledge and skills of an employee for doing a particular job.
Down
- the practice of protecting systems, networks, and programs from digital attacks.
- Anything that permitted by law.
- A practice to ensure that products are stored and handled under sanitary conditions.
6 Clues: Anything that permitted by law. • A fraudulent imitation of something. • An action taken to withdraw/remove a product or system from distribution • the practice of protecting systems, networks, and programs from digital attacks. • A practice to ensure that products are stored and handled under sanitary conditions. • ...
ICE BREAK IT TO ME GENTLY 2024-12-09
Across
- a type of device that bridges wired and wireless networks, enabling multiple connections.
- a system ensuring frictionless login and controlled guest access.
- delivers guest folios, dynamic broadcasted messages, and housekeeping updates via TV.
Down
- a firewall appliance by Servo offering robust network security.
- integrates with Xenia for energy savings, key management, and usage reporting.
- an integration solution offering controlled connectivity and network security.
6 Clues: a firewall appliance by Servo offering robust network security. • a system ensuring frictionless login and controlled guest access. • integrates with Xenia for energy savings, key management, and usage reporting. • an integration solution offering controlled connectivity and network security. • ...
AI Crossword 2025-04-01
Across
- A type of AI that stands on datas to predict an event
- A video where the face has been changed with another
Down
- The name of the first industrial robot
- A type of AI that stands on neural networks as the human brain
- To imitate
- An AI you can talk with ! He'll answer thanks to datas but can't answer everything..
6 Clues: To imitate • The name of the first industrial robot • A video where the face has been changed with another • A type of AI that stands on datas to predict an event • A type of AI that stands on neural networks as the human brain • An AI you can talk with ! He'll answer thanks to datas but can't answer everything..
Marketing 2014-04-03
Across
- Internal records, Marketing Intelligence and Marketing Research are all parts of what?
- Prestige pricing, arket-Skimming pricing and Market-penetration pricing are all "__"
- The MIS system equals CRM + LP + ?
- Which word is used to define sales representatives deciding how to allocate their time among prospects and customers.
- What is it called when a product is made for a different product to sell
Down
- Reference Groups, Family and Online Social Networks are key '__' factors
- Where goods and services are sold to the end user for personal use
- The Promotional mix consists of advertising, personal selling, public relations and "__'
- The "__" consists of larger societal forces that affect the entire environment.
- What is the fourth step in buyer decision process.
10 Clues: The MIS system equals CRM + LP + ? • What is the fourth step in buyer decision process. • Where goods and services are sold to the end user for personal use • Reference Groups, Family and Online Social Networks are key '__' factors • What is it called when a product is made for a different product to sell • ...
Leadership and Social Capital 2015-10-09
Across
- theory that states that people have preconceptions about how leaders should behave in general and in specific leadership situations
- social process of other people perceptually assimilates them to the relevant ingroup or outgroup protoype
- the most significant managerial challenge
- perspective that says people define and evaluate themselves and others in terms of the group they belong to
Down
- people's ability to associate with one another, networks, norms and trust
- approach what thinks people should support the systems
- approach what thinks people should be the priority in the management of services
- leadership focus on charisma and tranformational leadership
- a group member who embodies the integrative essence of the group
- where is the research done in the article of Anthony Brien and Clive Smallman
- a manager who positevely engage a humanistic and rationalistic management style
11 Clues: the most significant managerial challenge • approach what thinks people should support the systems • leadership focus on charisma and tranformational leadership • a group member who embodies the integrative essence of the group • people's ability to associate with one another, networks, norms and trust • ...
Education 2016-11-09
Across
- ,The idea of molding a diverse population into one society by teaching cultural norms and values.
- ,Teaching the skills the youth needs to succeed in life, as well as cultural values and norms.
- ,Provides childcare and the opportunity for building social networks.
- ,Seeks to make schools more accountable to the public.
- ,Providing the opportunity for academic research that leads to discoveries.
- ,How self image can affect how student perform in school.
- ,The integration of students with disabilities and special needs into the overall educational program.
Down
- ,The ways at which schooling contributes to the orderly operation of society.
- ,How we build reality in our day to day interactions.
- ,Reinforces meritocracy and providing a path for social upward mobility.
10 Clues: ,How we build reality in our day to day interactions. • ,Seeks to make schools more accountable to the public. • ,How self image can affect how student perform in school. • ,Provides childcare and the opportunity for building social networks. • ,Reinforces meritocracy and providing a path for social upward mobility. • ...
Mobile technology 2020-08-30
Across
- owns to trade mark wifi.
- id a temporary ip address for a mobile node.
- smpp cilent is termed a external short message.
- unique number,usually fifteen digits,associated with global system for mobile communication.
- has an onboard power source,usually a battery,and an active transmitter.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- provides a means of reading or interrogating the data using the tag.
- a set of two or more interconnection piconets form
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node. • smpp cilent is termed a external short message. • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag. • has an onboard power source,usually a battery,and an active transmitter. • ...
Mobile technology 2020-08-30
Across
- owns to trade mark wifi.
- id a temporary ip address for a mobile node.
- smpp cilent is termed a external short message.
- unique number,usually fifteen digits,associated with global system for mobile communication.
- has an onboard power source,usually a battery,and an active transmitter.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- provides a means of reading or interrogating the data using the tag.
- a set of two or more interconnection piconets form
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node. • smpp cilent is termed a external short message. • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag. • has an onboard power source,usually a battery,and an active transmitter. • ...
Chapter 2 - The French in North America 2020-12-10
Across
- A government with three officials: a governor, an intendant, and a bishop.
- A country extending its control over other countries, often using economic or military means.
- A Francophone citizen of Acadia.
- Networks of colonies controlled by a single country, sometimes called the home country.
Down
- An order of missionaries who came to North America to convert First Nations peoples to the Catholic religion.
- A territory of land that is controlled by another country.
- A Francophone farmer of New France.
- When only one company or group is allowed to sell or trade a product in a certain area.
- A social system based on nobles who rented land to farmers.
- A member of society.
10 Clues: A member of society. • A Francophone citizen of Acadia. • A Francophone farmer of New France. • A territory of land that is controlled by another country. • A social system based on nobles who rented land to farmers. • A government with three officials: a governor, an intendant, and a bishop. • ...
Information Technology Crossword Puzzle 14 - Praveen Jonnala 2021-07-19
Across
- What Praveen wants all CommScope employees to become
- Praveen and his leadership team face how to help his team through challenges and build resilience to transform IT mindset from being technology-centric to business results-driven
- The spin-off of the Home Networks business
Down
- The shift from a technology-centric group so we can drive outcomes and serve our customers better
- Plan for moving from a product-centric approach to platform-based solutions and speed
- Automates manual tasks, which contributes to speed, productivity, and quality
- Senior vice president and CIO
- Project kicked off in February 2020
- Strategy that accelerates CommScope's transformation
- Praveen joined CommScope this number of years ago
10 Clues: Senior vice president and CIO • Project kicked off in February 2020 • The spin-off of the Home Networks business • Praveen joined CommScope this number of years ago • What Praveen wants all CommScope employees to become • Strategy that accelerates CommScope's transformation • Automates manual tasks, which contributes to speed, productivity, and quality • ...
Advancements in Technology 2024-05-14
Across
- Technology that utilizes biological systems, living organisms or parts of this to develop or create different products.
- the growth of online shopping and the decline of traditional brick-and-mortar retail stores.
- The use of science and technology to develop eco-friendly products and services that protect our environment.
- People can use this to connect, communicate, and share information online
- Wi-Fi, Bluetooth, and 3G/4G networks; not needing a wire
Down
- The World Wide Web
- Laptops, desktops,tablets
- Multifunctional devices capable of accessing the internet, taking photos, and running apps.
- Enables users to quickly find relevant information on the internet.
- Primary means of consuming entertainment, including music, movies, and television shows; streaming services
10 Clues: The World Wide Web • Laptops, desktops,tablets • Wi-Fi, Bluetooth, and 3G/4G networks; not needing a wire • Enables users to quickly find relevant information on the internet. • People can use this to connect, communicate, and share information online • Multifunctional devices capable of accessing the internet, taking photos, and running apps. • ...
set 1 2024-02-15
Across
- The software that helps to enter and organize data in a database is _______.
- ___________ are the programs which are created deliberately to damage data on the web.
- ___________ are preceded by an ampersand (&) and followed by a semicolon(;).
- A row in a table that contains information is called _________.
- The language used to make web pages is _______.
Down
- Columns can be used to hold ________ in a table.
- You can use __________ to add space between the border and the contents of a cell.
- A software that installs on your computer without your consent is __________.
- The __________ declaration at the beginning of web page specifies HTML5 documents.
- _______ is one of the largest networks that links millions or trillions of computer.
10 Clues: The language used to make web pages is _______. • Columns can be used to hold ________ in a table. • A row in a table that contains information is called _________. • The software that helps to enter and organize data in a database is _______. • ___________ are preceded by an ampersand (&) and followed by a semicolon(;). • ...
TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 2023-02-16
Across
- To criticize or belittle someone or something.
- The origin or mode of formation of something.
- The final resolution of a complex plot in a story, often involving the unraveling of secrets and the tying up of loose ends.
- Changes or variations in a quantity or value over time.
- Digital or virtual tokens that use cryptography to secure and verify transactions and to control the creation of new units.
Down
- The process of creating a systematic and organized approach to a particular task or field.
- The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- To provoke or oppose someone or something.
- Lacking in seriousness or importance.
- Present, appearing, or found everywhere.
10 Clues: Lacking in seriousness or importance. • Present, appearing, or found everywhere. • To provoke or oppose someone or something. • The origin or mode of formation of something. • To criticize or belittle someone or something. • Changes or variations in a quantity or value over time. • ...
Technology 2023-04-07
Across
- A device that converts digital signals into analog signals
- type of computer memory that can be written to and read from
- A program that replicates itself and spreads to other computers or networks
- Computing The use of a network of remote servers hosted on the internet to store, manage, and process data
Down
- Input device for typing on a computer keyboard
- A small, portable device used for reading books
- A device used to connect a computer to the internet
- Intelligence The ability of a computer program or machine to think and learn
- Operating system developed by Apple Inc
- Transfer The process of transferring data from one computer system to another over the internet
10 Clues: Operating system developed by Apple Inc • Input device for typing on a computer keyboard • A small, portable device used for reading books • A device used to connect a computer to the internet • A device that converts digital signals into analog signals • type of computer memory that can be written to and read from • ...
Azure Core Day of Learning | May 2023-05-25
Across
- ----- language models are computer programs for natural language processing that use deep learning and neural networks, like GPT-3
- An annual conference event held by Microsoft, aimed at software engineers and web developers using Microsoft technologies
- The team in Azure Core, which focuses on product launches and their release checklist to ensure excellence
- An IDC Product & Technical Excellence Summit, held in May 2023
- Film festival held recently in France
- An artificial intelligence assistant feature for Microsoft 365 applications and services
Down
- Ask me anything
- A multilingual AI-chat bot for rural India launched by Microsoft
- Anant Maheshwari was recently appointed as Chairperson of this association
- The IPL team with most finals appearances
10 Clues: Ask me anything • Film festival held recently in France • The IPL team with most finals appearances • An IDC Product & Technical Excellence Summit, held in May 2023 • A multilingual AI-chat bot for rural India launched by Microsoft • Anant Maheshwari was recently appointed as Chairperson of this association • ...
Cybersecurity Week 1 2021-10-05
Across
- Short for malicious software designed to obtain information from a computer without the user's consent
- Protection of information assets within internetworked information systems
- Ensures the timely and reliable access and use of information systems
- Full use of a vulnerability for the benefit of an attacker
Down
- Protection of information from authorized access and disclosure
- A protected string of characters that authenticate a computer user to a system
- the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- The protection of information from unauthorized modification
- A system or combination of systems that enforces a boundary between two or more networks
- An individual who attempts to gain unauthorized access to a computer system
10 Clues: Full use of a vulnerability for the benefit of an attacker • The protection of information from unauthorized modification • Protection of information from authorized access and disclosure • Ensures the timely and reliable access and use of information systems • Protection of information assets within internetworked information systems • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
Solawinds Puzzle 2024-12-18
Across
- I’m the invisible thread connecting billions, a web spun worldwide
- Making copies so your data never gets lonely.
- The language of computers, made up of ones and zeros.
- The captain of containers, it orchestrates your ship on the cloud!
Down
- I’m the streak every network brags about, a sign of no crashes and constant work
- The secret handshake that helps devices communicate with each other.
- The software that lives inside your devices and tells them how to behave.
- The map of how devices and networks are connected to each other
- The ability to stretch or shrink your system to meet changing demands
- A tech emergency—something broke and needs fixing fast
10 Clues: Making copies so your data never gets lonely. • The language of computers, made up of ones and zeros. • A tech emergency—something broke and needs fixing fast • The map of how devices and networks are connected to each other • I’m the invisible thread connecting billions, a web spun worldwide • The captain of containers, it orchestrates your ship on the cloud! • ...
