networks Crossword Puzzles
Crossword 4 2023-09-04
Across
- An action taken to withdraw/remove a product or system from distribution
- A fraudulent imitation of something.
- A process of increasing the knowledge and skills of an employee for doing a particular job.
Down
- the practice of protecting systems, networks, and programs from digital attacks.
- Anything that permitted by law.
- A practice to ensure that products are stored and handled under sanitary conditions.
6 Clues: Anything that permitted by law. • A fraudulent imitation of something. • An action taken to withdraw/remove a product or system from distribution • the practice of protecting systems, networks, and programs from digital attacks. • A practice to ensure that products are stored and handled under sanitary conditions. • ...
ICE BREAK IT TO ME GENTLY 2024-12-09
Across
- a type of device that bridges wired and wireless networks, enabling multiple connections.
- a system ensuring frictionless login and controlled guest access.
- delivers guest folios, dynamic broadcasted messages, and housekeeping updates via TV.
Down
- a firewall appliance by Servo offering robust network security.
- integrates with Xenia for energy savings, key management, and usage reporting.
- an integration solution offering controlled connectivity and network security.
6 Clues: a firewall appliance by Servo offering robust network security. • a system ensuring frictionless login and controlled guest access. • integrates with Xenia for energy savings, key management, and usage reporting. • an integration solution offering controlled connectivity and network security. • ...
AI Crossword 2025-04-01
Across
- A type of AI that stands on datas to predict an event
- A video where the face has been changed with another
Down
- The name of the first industrial robot
- A type of AI that stands on neural networks as the human brain
- To imitate
- An AI you can talk with ! He'll answer thanks to datas but can't answer everything..
6 Clues: To imitate • The name of the first industrial robot • A video where the face has been changed with another • A type of AI that stands on datas to predict an event • A type of AI that stands on neural networks as the human brain • An AI you can talk with ! He'll answer thanks to datas but can't answer everything..
Marketing 2014-04-03
Across
- Internal records, Marketing Intelligence and Marketing Research are all parts of what?
- Prestige pricing, arket-Skimming pricing and Market-penetration pricing are all "__"
- The MIS system equals CRM + LP + ?
- Which word is used to define sales representatives deciding how to allocate their time among prospects and customers.
- What is it called when a product is made for a different product to sell
Down
- Reference Groups, Family and Online Social Networks are key '__' factors
- Where goods and services are sold to the end user for personal use
- The Promotional mix consists of advertising, personal selling, public relations and "__'
- The "__" consists of larger societal forces that affect the entire environment.
- What is the fourth step in buyer decision process.
10 Clues: The MIS system equals CRM + LP + ? • What is the fourth step in buyer decision process. • Where goods and services are sold to the end user for personal use • Reference Groups, Family and Online Social Networks are key '__' factors • What is it called when a product is made for a different product to sell • ...
Leadership and Social Capital 2015-10-09
Across
- theory that states that people have preconceptions about how leaders should behave in general and in specific leadership situations
- social process of other people perceptually assimilates them to the relevant ingroup or outgroup protoype
- the most significant managerial challenge
- perspective that says people define and evaluate themselves and others in terms of the group they belong to
Down
- people's ability to associate with one another, networks, norms and trust
- approach what thinks people should support the systems
- approach what thinks people should be the priority in the management of services
- leadership focus on charisma and tranformational leadership
- a group member who embodies the integrative essence of the group
- where is the research done in the article of Anthony Brien and Clive Smallman
- a manager who positevely engage a humanistic and rationalistic management style
11 Clues: the most significant managerial challenge • approach what thinks people should support the systems • leadership focus on charisma and tranformational leadership • a group member who embodies the integrative essence of the group • people's ability to associate with one another, networks, norms and trust • ...
Education 2016-11-09
Across
- ,The idea of molding a diverse population into one society by teaching cultural norms and values.
- ,Teaching the skills the youth needs to succeed in life, as well as cultural values and norms.
- ,Provides childcare and the opportunity for building social networks.
- ,Seeks to make schools more accountable to the public.
- ,Providing the opportunity for academic research that leads to discoveries.
- ,How self image can affect how student perform in school.
- ,The integration of students with disabilities and special needs into the overall educational program.
Down
- ,The ways at which schooling contributes to the orderly operation of society.
- ,How we build reality in our day to day interactions.
- ,Reinforces meritocracy and providing a path for social upward mobility.
10 Clues: ,How we build reality in our day to day interactions. • ,Seeks to make schools more accountable to the public. • ,How self image can affect how student perform in school. • ,Provides childcare and the opportunity for building social networks. • ,Reinforces meritocracy and providing a path for social upward mobility. • ...
Mobile technology 2020-08-30
Across
- owns to trade mark wifi.
- id a temporary ip address for a mobile node.
- smpp cilent is termed a external short message.
- unique number,usually fifteen digits,associated with global system for mobile communication.
- has an onboard power source,usually a battery,and an active transmitter.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- provides a means of reading or interrogating the data using the tag.
- a set of two or more interconnection piconets form
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node. • smpp cilent is termed a external short message. • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag. • has an onboard power source,usually a battery,and an active transmitter. • ...
Mobile technology 2020-08-30
Across
- owns to trade mark wifi.
- id a temporary ip address for a mobile node.
- smpp cilent is termed a external short message.
- unique number,usually fifteen digits,associated with global system for mobile communication.
- has an onboard power source,usually a battery,and an active transmitter.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- provides a means of reading or interrogating the data using the tag.
- a set of two or more interconnection piconets form
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node. • smpp cilent is termed a external short message. • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag. • has an onboard power source,usually a battery,and an active transmitter. • ...
Chapter 2 - The French in North America 2020-12-10
Across
- A government with three officials: a governor, an intendant, and a bishop.
- A country extending its control over other countries, often using economic or military means.
- A Francophone citizen of Acadia.
- Networks of colonies controlled by a single country, sometimes called the home country.
Down
- An order of missionaries who came to North America to convert First Nations peoples to the Catholic religion.
- A territory of land that is controlled by another country.
- A Francophone farmer of New France.
- When only one company or group is allowed to sell or trade a product in a certain area.
- A social system based on nobles who rented land to farmers.
- A member of society.
10 Clues: A member of society. • A Francophone citizen of Acadia. • A Francophone farmer of New France. • A territory of land that is controlled by another country. • A social system based on nobles who rented land to farmers. • A government with three officials: a governor, an intendant, and a bishop. • ...
Information Technology Crossword Puzzle 14 - Praveen Jonnala 2021-07-19
Across
- What Praveen wants all CommScope employees to become
- Praveen and his leadership team face how to help his team through challenges and build resilience to transform IT mindset from being technology-centric to business results-driven
- The spin-off of the Home Networks business
Down
- The shift from a technology-centric group so we can drive outcomes and serve our customers better
- Plan for moving from a product-centric approach to platform-based solutions and speed
- Automates manual tasks, which contributes to speed, productivity, and quality
- Senior vice president and CIO
- Project kicked off in February 2020
- Strategy that accelerates CommScope's transformation
- Praveen joined CommScope this number of years ago
10 Clues: Senior vice president and CIO • Project kicked off in February 2020 • The spin-off of the Home Networks business • Praveen joined CommScope this number of years ago • What Praveen wants all CommScope employees to become • Strategy that accelerates CommScope's transformation • Automates manual tasks, which contributes to speed, productivity, and quality • ...
Advancements in Technology 2024-05-14
Across
- Technology that utilizes biological systems, living organisms or parts of this to develop or create different products.
- the growth of online shopping and the decline of traditional brick-and-mortar retail stores.
- The use of science and technology to develop eco-friendly products and services that protect our environment.
- People can use this to connect, communicate, and share information online
- Wi-Fi, Bluetooth, and 3G/4G networks; not needing a wire
Down
- The World Wide Web
- Laptops, desktops,tablets
- Multifunctional devices capable of accessing the internet, taking photos, and running apps.
- Enables users to quickly find relevant information on the internet.
- Primary means of consuming entertainment, including music, movies, and television shows; streaming services
10 Clues: The World Wide Web • Laptops, desktops,tablets • Wi-Fi, Bluetooth, and 3G/4G networks; not needing a wire • Enables users to quickly find relevant information on the internet. • People can use this to connect, communicate, and share information online • Multifunctional devices capable of accessing the internet, taking photos, and running apps. • ...
set 1 2024-02-15
Across
- The software that helps to enter and organize data in a database is _______.
- ___________ are the programs which are created deliberately to damage data on the web.
- ___________ are preceded by an ampersand (&) and followed by a semicolon(;).
- A row in a table that contains information is called _________.
- The language used to make web pages is _______.
Down
- Columns can be used to hold ________ in a table.
- You can use __________ to add space between the border and the contents of a cell.
- A software that installs on your computer without your consent is __________.
- The __________ declaration at the beginning of web page specifies HTML5 documents.
- _______ is one of the largest networks that links millions or trillions of computer.
10 Clues: The language used to make web pages is _______. • Columns can be used to hold ________ in a table. • A row in a table that contains information is called _________. • The software that helps to enter and organize data in a database is _______. • ___________ are preceded by an ampersand (&) and followed by a semicolon(;). • ...
TECH ADVANCEMENT - PART 2 - ARTICLE 1A - L1 2023-02-16
Across
- To criticize or belittle someone or something.
- The origin or mode of formation of something.
- The final resolution of a complex plot in a story, often involving the unraveling of secrets and the tying up of loose ends.
- Changes or variations in a quantity or value over time.
- Digital or virtual tokens that use cryptography to secure and verify transactions and to control the creation of new units.
Down
- The process of creating a systematic and organized approach to a particular task or field.
- The practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- To provoke or oppose someone or something.
- Lacking in seriousness or importance.
- Present, appearing, or found everywhere.
10 Clues: Lacking in seriousness or importance. • Present, appearing, or found everywhere. • To provoke or oppose someone or something. • The origin or mode of formation of something. • To criticize or belittle someone or something. • Changes or variations in a quantity or value over time. • ...
Technology 2023-04-07
Across
- A device that converts digital signals into analog signals
- type of computer memory that can be written to and read from
- A program that replicates itself and spreads to other computers or networks
- Computing The use of a network of remote servers hosted on the internet to store, manage, and process data
Down
- Input device for typing on a computer keyboard
- A small, portable device used for reading books
- A device used to connect a computer to the internet
- Intelligence The ability of a computer program or machine to think and learn
- Operating system developed by Apple Inc
- Transfer The process of transferring data from one computer system to another over the internet
10 Clues: Operating system developed by Apple Inc • Input device for typing on a computer keyboard • A small, portable device used for reading books • A device used to connect a computer to the internet • A device that converts digital signals into analog signals • type of computer memory that can be written to and read from • ...
Azure Core Day of Learning | May 2023-05-25
Across
- ----- language models are computer programs for natural language processing that use deep learning and neural networks, like GPT-3
- An annual conference event held by Microsoft, aimed at software engineers and web developers using Microsoft technologies
- The team in Azure Core, which focuses on product launches and their release checklist to ensure excellence
- An IDC Product & Technical Excellence Summit, held in May 2023
- Film festival held recently in France
- An artificial intelligence assistant feature for Microsoft 365 applications and services
Down
- Ask me anything
- A multilingual AI-chat bot for rural India launched by Microsoft
- Anant Maheshwari was recently appointed as Chairperson of this association
- The IPL team with most finals appearances
10 Clues: Ask me anything • Film festival held recently in France • The IPL team with most finals appearances • An IDC Product & Technical Excellence Summit, held in May 2023 • A multilingual AI-chat bot for rural India launched by Microsoft • Anant Maheshwari was recently appointed as Chairperson of this association • ...
Cybersecurity Week 1 2021-10-05
Across
- Short for malicious software designed to obtain information from a computer without the user's consent
- Protection of information assets within internetworked information systems
- Ensures the timely and reliable access and use of information systems
- Full use of a vulnerability for the benefit of an attacker
Down
- Protection of information from authorized access and disclosure
- A protected string of characters that authenticate a computer user to a system
- the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
- The protection of information from unauthorized modification
- A system or combination of systems that enforces a boundary between two or more networks
- An individual who attempts to gain unauthorized access to a computer system
10 Clues: Full use of a vulnerability for the benefit of an attacker • The protection of information from unauthorized modification • Protection of information from authorized access and disclosure • Ensures the timely and reliable access and use of information systems • Protection of information assets within internetworked information systems • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
CYBER SECURITY 2025-01-07
Across
- - A copy of data stored in a safe location to protect against loss or damage.
- - The protection of personal information from unauthorized access.
- - The process of converting information into a secure format to prevent unauthorized access.
- - A security system that monitors and controls incoming and outgoing network traffic.
- - Malicious software designed to infect and damage computer systems.
Down
- - A secret word or code used to protect access to systems or accounts.
- - A method used to trick individuals into revealing personal information through deceptive emails or websites.
- - A person who illegally gains access to computers or networks.
- - Information stored electronically, often used for analysis and decision-making.
- - Malicious software designed to harm or exploit any device, service, or network.
10 Clues: - A person who illegally gains access to computers or networks. • - The protection of personal information from unauthorized access. • - Malicious software designed to infect and damage computer systems. • - A secret word or code used to protect access to systems or accounts. • - A copy of data stored in a safe location to protect against loss or damage. • ...
Solawinds Puzzle 2024-12-18
Across
- I’m the invisible thread connecting billions, a web spun worldwide
- Making copies so your data never gets lonely.
- The language of computers, made up of ones and zeros.
- The captain of containers, it orchestrates your ship on the cloud!
Down
- I’m the streak every network brags about, a sign of no crashes and constant work
- The secret handshake that helps devices communicate with each other.
- The software that lives inside your devices and tells them how to behave.
- The map of how devices and networks are connected to each other
- The ability to stretch or shrink your system to meet changing demands
- A tech emergency—something broke and needs fixing fast
10 Clues: Making copies so your data never gets lonely. • The language of computers, made up of ones and zeros. • A tech emergency—something broke and needs fixing fast • The map of how devices and networks are connected to each other • I’m the invisible thread connecting billions, a web spun worldwide • The captain of containers, it orchestrates your ship on the cloud! • ...
IT period 2 2024-10-18
Across
- informal rules for proper and respectful behavior when communication online.
- a piece of text or input given to a computer AI system to guide it in generating a response.
- a set of sep/by/step instructions that a computer follows to perform a task.
- a global computer network providing information and communication facilities.
Down
- a computer program with a graphical user interface.
- a software program that can simulate a conversation with users.
- Citizen, a pearson who actively participates in society using digital technologies.
- AI a type of AI that creates new content such as images.
- is the address of a unique resourse on the internet.
- device that connects two or more packet/swiched networks.
10 Clues: a computer program with a graphical user interface. • is the address of a unique resourse on the internet. • AI a type of AI that creates new content such as images. • device that connects two or more packet/swiched networks. • a software program that can simulate a conversation with users. • ...
ICT Word Puzzle 2024-09-28
Across
- A small unit of digital image data that represents a single point on a screen.
- A collection of organized data that can be easily accessed and managed.
- To gain unauthorized access to a computer system or network.
- A remote storage system that allows access to data over the internet.
- Software designed to harm or exploit a computer system.
- A device that connects multiple computer networks together.
Down
- A system that protects a network from unauthorized access.
- A remote storage system that allows access to data over the internet.
- A unit of digital information that represents 8 bits.
- Relating to the internet, computers, or digital technology.
- A computer that provides data, services, or applications to other computers over a network.Byte: A unit of digital information that represents 8 bits.
11 Clues: A unit of digital information that represents 8 bits. • Software designed to harm or exploit a computer system. • A system that protects a network from unauthorized access. • Relating to the internet, computers, or digital technology. • A device that connects multiple computer networks together. • To gain unauthorized access to a computer system or network. • ...
esla clement 2024-11-14
Across
- A value calculated from data to check for errors during transfer or storage.
- A device that connects computers to the internet
- A secure protocol for remote access to a computer over a network.
- A hidden way to access a computer or network, bypassing normal security measures.
- A protocol that prevents loops in a network with multiple switches.
Down
- A part of the internet that is hidden and only accessible through special software, often used for illegal activities.
- An automated program that performs tasks over the internet.
- Programs created to damage or interfere with a computer
- A communication protocol used for computer networks.
- A protocol that automatically assigns IP addresses to devices on a network.
10 Clues: A device that connects computers to the internet • A communication protocol used for computer networks. • Programs created to damage or interfere with a computer • An automated program that performs tasks over the internet. • A secure protocol for remote access to a computer over a network. • A protocol that prevents loops in a network with multiple switches. • ...
GRID-GENIUS 1 2024-11-26
Across
- A state where a collection of items is ordered according to specific criteria.
- The process of confirming the identity of a user or system.
- A theoretical machine that can simulate any computer algorithm.
- A programming technique that solves problems by solving smaller instances of the same problem.
Down
- A cryptographic process that converts plaintext into unreadable text.
- A subset of Artificial Intelligence that uses neural networks.
- A structure consisting of nodes and edges used to represent relationships.
- A special-purpose register in a CPU for intermediate data storage.
- A type of memory that retains its data even when power is lost.
- An anomalous condition in a program that disrupts normal execution.
10 Clues: The process of confirming the identity of a user or system. • A subset of Artificial Intelligence that uses neural networks. • A type of memory that retains its data even when power is lost. • A theoretical machine that can simulate any computer algorithm. • A special-purpose register in a CPU for intermediate data storage. • ...
Technology 2022-09-19
Across
- controlled by or connected to a computer.
- the working surface of a desk.
- copy (data) from one computer system to another, typically over the internet.
- a worldwide system of computer networks.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
Down
- a relationship in which a person or thing is linked or associated with something else.
- To connect or set in position and prepare for use.
- the programs and other operating information used by a computer.
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- a video camera connected to a computer, allowing its images to be seen by internet users
10 Clues: the working surface of a desk. • a worldwide system of computer networks. • controlled by or connected to a computer. • To connect or set in position and prepare for use. • the programs and other operating information used by a computer. • copy (data) from one computer system to another, typically over the internet. • ...
CrossWord_Puzzle 2 2022-04-24
Across
- Fast data transfer speeds, always connected and can transmit multiple signals simultaneously.
- Objects with computing devices in them that are able to connect to each other and exchange data using the internet.
- offers external chips for memory and peripheral interface circuits.
Down
- The father of theoretical computer science and artificial intelligence.
- Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing
- A measurement of loudness. The higher the rating, the louder the sound.
- an embedded system communicates with the outside world.
- Delivers hosted services over the Internet.
- IC chips are usually made of.
- A process of reorganizing the data stored on the hard drive.
10 Clues: IC chips are usually made of. • Delivers hosted services over the Internet. • an embedded system communicates with the outside world. • A process of reorganizing the data stored on the hard drive. • offers external chips for memory and peripheral interface circuits. • The father of theoretical computer science and artificial intelligence. • ...
Puzzle buzzle 2022-12-16
Across
- An object in many programming languages that stores a memory address.
- The repetition of a process in order to generate an outcome
- The first section of an operating system to load into memory.
- The process of encoding information.
Down
- A multiple of the unit byte for digital information.
- It is an abstract data type that can store unique values,without any particular order.
- The part of an operating system that is responsible for loading programs and libraries
- In OOPS,a procedure associated with a message and an object.
- A networking device that forwards data packets between computer networks.
- Occurs when a thing is defined in terms of itself or of its type.
10 Clues: The process of encoding information. • A multiple of the unit byte for digital information. • The repetition of a process in order to generate an outcome • In OOPS,a procedure associated with a message and an object. • The first section of an operating system to load into memory. • Occurs when a thing is defined in terms of itself or of its type. • ...
unit 6 vo. 2025-11-25
Across
- A law that set strict immigration quotas favoring northern Europeans and restricting others.
- The constitutional amendment granting women the right to vote.
- Harding’s promise to return the U.S. to pre-WWI peace, stability, and traditional policies.
- Taxes on imported goods meant to protect American industries.
Down
- A young woman of the 1920s who challenged traditional norms through fashion and behavior.
- Large criminal networks that grew during Prohibition by controlling illegal activities.
- A period of intense fear of communism and radical political ideas after WWI.
- Government raids ordered by Attorney General Palmer to arrest suspected radicals and anarchists.
- The illegal production and distribution of alcohol during Prohibition.
- Two Italian immigrants whose controversial conviction and execution symbolized anti-immigrant bias.
10 Clues: Taxes on imported goods meant to protect American industries. • The constitutional amendment granting women the right to vote. • The illegal production and distribution of alcohol during Prohibition. • A period of intense fear of communism and radical political ideas after WWI. • ...
Year 6 Revision - Network 2020-11-15
Across
- the amount of data that can be transmitted at a given moment in a network
- uses internet protocol language
- each connection in a hub
- uses hyper text transfer protocol language
- protect your private network from threats of the Internet
- topology, each node is connect to two others to create a ring
- a network device that connect together or more networks
- a computer in a network to which a printer is connected
- topology, nodes are connected to a central cable
Down
- a segment of data sent from one computer or device to another over a network
- topology, all nodes are connected to a central station
- a network that connect many computers over long distances
- connect computers with cables in a network
- placed in between a telephone line and computer to convert analogue signals into digital signals and vice versa
- consist of network number and client number
- a network set up in one small area
- acts as a wiring centre
- the power of this network is limited only to a few metres
18 Clues: acts as a wiring centre • each connection in a hub • uses internet protocol language • a network set up in one small area • connect computers with cables in a network • uses hyper text transfer protocol language • consist of network number and client number • topology, nodes are connected to a central cable • topology, all nodes are connected to a central station • ...
GA READING AND LISTENING REVIEW: UNIT 3 AND UNIT 4 2021-10-19
Across
- (adjective) related to the sense of hearing.
- (adjective) related to seeing or sight. (Hint: If you learn better by seeing, then you are a ...).
- (noun) an electronic communications network that connects computer networks around the world.
- (noun) a member of the same class in a school or college.
- (noun) a person who is learning a subject or skill; similar in meaning to the word 'student'.
- (noun) the activity, or pastime of planning and working in gardens.
- (noun) a building or room containing collections of books.
- (noun) a person who is studying at a school or college.
- (plural noun) who is responsible for educating homeschooled children?
- (noun) the education of children at home by their parents.
Down
- (adjective) causing stress; the adjective form of the noun 'stress'.
- (adjective) small in size; not much.
- (adjective) modern or relating to the present time.
- (noun) the opposite of advantage (?).
- (noun) a phone that performs many of the functions of a computer.
- (adjective) not the same (?).
- (noun) the second biggest country in the world.
- (noun) schoolwork that a student is required to do at home.
18 Clues: (adjective) not the same (?). • (adjective) small in size; not much. • (noun) the opposite of advantage (?). • (adjective) related to the sense of hearing. • (noun) the second biggest country in the world. • (adjective) modern or relating to the present time. • (noun) a person who is studying at a school or college. • ...
2 ESO Technology Keywords 2023-03-21
Across
- Most wires are made out of the metal _______________
- My favourite radio show is broadcast at a __________________ of 12,588 GHz.
- My phone is able to connect to 3G ______________.
- The signal has been picked up by the ______________.
- Algorithms can be encrypted or decrypted using a ______________.
- If you don't install the __________ on your computer your software will stop working well
- If you look at the rooftops of buildings, sometimes you can see the __________.
- Old people are often a _____________ for cybercrime.
- The offices’ network is composed of 15 ___________.
Down
- The unit of measurement for frequency is __________________ (Hz).
- You can contact us through any communication _____________
- Their receivers transform this weak radiation into an electrical ______________.
- If you commit a __________ you will have to face the consequences.
- All modern algorithms use a key to control ____________ and decryption
- In the middle of the forest there is no ___________.
- The __________________ may be too busy to accept new connections.
- A message has to be ____________ before it can be understood.
- Every year millions of people are the victims of _________ and lose a lot of money.
18 Clues: My phone is able to connect to 3G ______________. • The offices’ network is composed of 15 ___________. • Most wires are made out of the metal _______________ • In the middle of the forest there is no ___________. • The signal has been picked up by the ______________. • Old people are often a _____________ for cybercrime. • ...
CBDCs are they a good idea. 2024-02-08
Across
- (4)a financial institution that is licensed to accept checking and savings deposits and make loans
- (13)credential Des (anag)
- (5)country situated in eastern Asia on the western shore of the Pacific Ocean, with an area of 9.6 million square kilometers.
- (7)she cark (anag)
- (6)a digital currency, such as Bitcoin, that is used as an alternative payment method or specula
- (8,9)federal agency
- (8)the ability to make your own decisions without being controlled by anyone else
- (7)island country of the West Indies Capital is Kingston.
- (4)information (syn)
Down
- (5,8)the practice of protecting systems, networks, and programs from digital attacks
- (8)acquisition (syn)
- (10)of or relating to the control or direction of an activity by a set of rules, laws, etc.
- (7)computerised (syn)
- (8)legal tender
- (7,2,6)confiscation of property by the authorities
- (9)surmount. surpass (rule of law)
- (4)a currency not backed by a commodity and typically authorised by the issuing government to be legal tender.
- (1,1,1,1) Central Bank digital currency
18 Clues: (8)legal tender • (7)she cark (anag) • (8,9)federal agency • (8)acquisition (syn) • (4)information (syn) • (7)computerised (syn) • (13)credential Des (anag) • (9)surmount. surpass (rule of law) • (1,1,1,1) Central Bank digital currency • (7,2,6)confiscation of property by the authorities • (7)island country of the West Indies Capital is Kingston. • ...
Terrorism 2024-01-01
Across
- A type of terrorism that is committed by groups of up to 3 people.
- Terrorism acts are defined mostly by their impact, and their _______ effects.
- A type of terrorism that goes beyond state boundaries.
Down
- Left-wing extremist groups tend to have extreme beliefs in ______.
- Right-wing extremist groups usually act against the ______.
- Terrorism that uses the destruction of computer/communication networks is called ______ terrorism.
6 Clues: A type of terrorism that goes beyond state boundaries. • Right-wing extremist groups usually act against the ______. • A type of terrorism that is committed by groups of up to 3 people. • Left-wing extremist groups tend to have extreme beliefs in ______. • Terrorism acts are defined mostly by their impact, and their _______ effects. • ...
International security 14 (KCNS) 2022-01-08
Across
- It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- It is the process of validating a cryptocurrency transaction.
- The programs and other operating information used by a computer.
Down
- Using, requiring, or involved in high technology or short for high technology.
- Criminal activities carried out by means of computers or the internet.
- An arrangement of intersecting horizontal and vertical lines.
- The state of being connected or interconnected.
- A legal or other formal measure intended to preserve civil liberties and rights .
- A cryptocurrency, a virtual currency or a digital currency.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: The state of being connected or interconnected. • A cryptocurrency, a virtual currency or a digital currency. • An arrangement of intersecting horizontal and vertical lines. • It is the process of validating a cryptocurrency transaction. • The programs and other operating information used by a computer. • ...
International security 14 (KCNS) 2022-01-08
Across
- It is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- It is the process of validating a cryptocurrency transaction.
- The programs and other operating information used by a computer.
Down
- Using, requiring, or involved in high technology or short for high technology.
- Criminal activities carried out by means of computers or the internet.
- An arrangement of intersecting horizontal and vertical lines.
- The state of being connected or interconnected.
- A legal or other formal measure intended to preserve civil liberties and rights .
- A cryptocurrency, a virtual currency or a digital currency.
- Wrongful or criminal deception intended to result in financial or personal gain.
10 Clues: The state of being connected or interconnected. • A cryptocurrency, a virtual currency or a digital currency. • An arrangement of intersecting horizontal and vertical lines. • It is the process of validating a cryptocurrency transaction. • The programs and other operating information used by a computer. • ...
Communication Technology 2013-02-10
Across
- a device used for sending and receiving radio signals
- a connection or link between people that allows them to share information is a ................system
- spacecraft that travel around Earth and receive signals that can be sent back to a different place on Earth
- a type of energy that travels through the air
- the invention or improvement of tools or machines that help us perform tasks or solve problems
Down
- machines that are used to send written messages through telephone lines
- a device that sends signals to a distant place
- something that is done in order to make money
- sent out or communicated to many people – a television show is an example
- systems connecting many people
10 Clues: systems connecting many people • something that is done in order to make money • a type of energy that travels through the air • a device that sends signals to a distant place • a device used for sending and receiving radio signals • machines that are used to send written messages through telephone lines • ...
The Internet 2014-09-16
Across
- The data sent between the connected computers.
- The combination of hardware and software that allow connected computers to share data or devices such as printers.
- The physical equipment that carries signals from one point in the network to another.
- A network of connected computers and other devices at a single location.
- A powerful central computer that responds requests from individual computers.
Down
- Programs that allow us to send files along the hardware of the network.
- An individual computer on the network.
- A global system of interconnected networks and computers.
- A group of related files organized around a common topic and are connected with hyperlinks.
- A single file which has a unique name.
10 Clues: An individual computer on the network. • A single file which has a unique name. • The data sent between the connected computers. • A global system of interconnected networks and computers. • Programs that allow us to send files along the hardware of the network. • A network of connected computers and other devices at a single location. • ...
How far were people's lives transformed after independence? 2016-07-25
Across
- Basic facilities such as communications and transport and power supply networks
- A situation in which there were too many people in the city
- National symbols such as the pledge and National Anthem were introduced to cultivate a sense of ________________.
- Companies that have offices and factories in more than one country
Down
- Areas where people live that have not been approved for residential purposes by the relevant authorities
- Areas in Singapore reserved for the building of factories
- A form of education that emphasises hands-on, practical skills.
- An economy that has a variety of industries
- The compulsory enrolment of people for military service
- Singapore attempted to increase military ____________ with other countries in order to increase its security.
10 Clues: An economy that has a variety of industries • The compulsory enrolment of people for military service • Areas in Singapore reserved for the building of factories • A situation in which there were too many people in the city • A form of education that emphasises hands-on, practical skills. • Companies that have offices and factories in more than one country • ...
Remus crossword 2023-01-27
Across
- See Q2, a commonly used metal. (G)
- Early farmers in the region cultivated this cereal crop. (R)
- Western Europeans refer to the area comprising Jordan, Isreal, Gaza, Lebanon and Western Syria as the Ancient ?(L)
- Phoenicians excelled in this kind of ornamental craftmanship. (J)
Down
- The colour of dye that Phoenicians famously produced. (P)
- Phoenicians are known for creating this standardized set of letters. (a)
- By 2800BC, urban development saw examples of the world’s first ? in the region.
- Phoenician dye was a symbol of this in Ancient Rome. (R)
- It was necessary for merchants to travel over to reach widespread trade networks. (S)
- Phoenicians invented powerful ships that were adopted by which ancient Mediterranean population? (G)
10 Clues: See Q2, a commonly used metal. (G) • Phoenician dye was a symbol of this in Ancient Rome. (R) • The colour of dye that Phoenicians famously produced. (P) • Early farmers in the region cultivated this cereal crop. (R) • Phoenicians excelled in this kind of ornamental craftmanship. (J) • Phoenicians are known for creating this standardized set of letters. (a) • ...
Cybersecurity Crossword 2021-02-12
Across
- a worm, virus, or trojan that infects a computer and causes it to download or display malicious pop-ups
- unwanted software that monitors and gathers information on a person
- an attack where a victim gets an email disguised to look legit, in order to trick them into giving up valuable data
- malicious software
- a secret sequence of letters, numbers and characters to help verify someone.
Down
- a virus which tricks you into being downloaded
- information that relates to an identified or identifiable individual
- a type of worm, virus or trojan that demands money
- a malicious form of self-replicating software
- exploit vulnerabilities in a computer's operating system or a networks hardware
10 Clues: malicious software • a malicious form of self-replicating software • a virus which tricks you into being downloaded • a type of worm, virus or trojan that demands money • unwanted software that monitors and gathers information on a person • information that relates to an identified or identifiable individual • ...
Input Devices 2021-10-05
Across
- one or more Central Processing Units that carry out software instructions
- a device’s ability to connect to networks and other devices.
- the memory in the computer system which is used for running software.
- this interface is controlled by the user giving spoken commands to the device.
- A computer security system
Down
- A type of security to prevent unauthorized access to data.
- this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- a user interface controlled by a pointer on the screen
- used to make a device inactive so that it requires a password or PIN to reactive it
- a user interface controlled by entering text instructions
10 Clues: A computer security system • a user interface controlled by a pointer on the screen • a user interface controlled by entering text instructions • A type of security to prevent unauthorized access to data. • a device’s ability to connect to networks and other devices. • the memory in the computer system which is used for running software. • ...
Connectivity, Media Support, Expansion capability & Security features 2021-10-05
Across
- one or more Central Processing Units that carry out software instructions
- a device’s ability to connect to networks and other devices.
- the memory in the computer system which is used for running software.
- this interface is controlled by the user giving spoken commands to the device.
- A computer security system
Down
- A type of security to prevent unauthorized access to data.
- this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- a user interface controlled by a pointer on the screen
- used to make a device inactive so that it requires a password or PIN to reactive it
- a user interface controlled by entering text instructions
10 Clues: A computer security system • a user interface controlled by a pointer on the screen • a user interface controlled by entering text instructions • A type of security to prevent unauthorized access to data. • a device’s ability to connect to networks and other devices. • the memory in the computer system which is used for running software. • ...
OUTPUT DEVICES (By Venushree 9E) 2021-10-07
Across
- a user interface controlled by a pointer on the screen
- A type of security to prevent unauthorized access to data.
- a device’s ability to connect to networks and other devices.
- one or more Central Processing Units that carry out software instructions
- the memory in the computer system which is used for running software.
- a user interface controlled by entering text instructions
Down
- this interface is controlled by the user giving spoken commands to the device.
- this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- A computer security system
- used to make a device inactive so that it requires a password or PIN to reactive it
10 Clues: A computer security system • a user interface controlled by a pointer on the screen • a user interface controlled by entering text instructions • A type of security to prevent unauthorized access to data. • a device’s ability to connect to networks and other devices. • the memory in the computer system which is used for running software. • ...
CSIT Crossword Puzzle! 2017-10-24
Across
- We exploit infocomm technologies to advance national security. This is CSIT's ________.
- What is the colour of CSIT's logo?
- How many job families are there in CSIT?
- Centre for ___________ Infocomm Technologies
- How many treadmills are there in CSIT Rec Club gym?
- This job family researches and explores the latest High Performing Computing technologies to design, develop and integrate accelerated cryptologic applications.
Down
- This job family does vulnerability research, penetration testing and the development of secure applications for PCs, mobile devices, networks and all things connected.
- This job family studies communication patterns of mobile and web applications to uncover potential vulnerabilities and anomalies.
- CSIT is an agency under ___________.
- One of CSIT's EVP: We aim to maximise your ___________.
10 Clues: What is the colour of CSIT's logo? • CSIT is an agency under ___________. • How many job families are there in CSIT? • Centre for ___________ Infocomm Technologies • How many treadmills are there in CSIT Rec Club gym? • One of CSIT's EVP: We aim to maximise your ___________. • We exploit infocomm technologies to advance national security. This is CSIT's ________. • ...
CRIME DOESN'T PAY 2023-11-28
Across
- Someone who commits a crime
- The act of stealing from someone's pocket without their knowledge or consent.
- Unlawful entry into a building with the intent to commit theft, vandalism, or another crime.
- The forcible taking of a person against their will.
Down
- The act of stealing goods from a store without paying for them.
- Criminal activities carried out through the use of computers, networks, or the internet.
- The creation or imitation of documents, signatures, or other items with the unlawful intents.
- The killing of another person with intent.
- The act of demanding money, goods, or services from an individual or entity in exchange for not revealing compromising information.
- Exceeding the posted speed limits while operating a vehicle.
10 Clues: Someone who commits a crime • The killing of another person with intent. • The forcible taking of a person against their will. • Exceeding the posted speed limits while operating a vehicle. • The act of stealing goods from a store without paying for them. • The act of stealing from someone's pocket without their knowledge or consent. • ...
Relax 2023-09-01
Across
- Building and maintaining meaningful relationships and social support networks.
- Focusing on the positive aspects of life and appreciating what you have.
- Understanding and sharing the feelings of others, which can foster positive relationships.
- Prioritizing activities and practices that promote physical and emotional well-being.
Down
- Striving for a balance between work, personal life, and self-care to maintain mental well-being.
- Developing healthy strategies to manage stress and difficult emotions.
- Cultivating a growth mindset, which encourages learning and resilience.
- The ability to bounce back from adversity and adapt to life's challenges.
- Being present in the moment, observing thoughts and feelings without judgment.
- compassion Treating yourself with kindness and understanding, especially during difficult times.
10 Clues: Developing healthy strategies to manage stress and difficult emotions. • Cultivating a growth mindset, which encourages learning and resilience. • Focusing on the positive aspects of life and appreciating what you have. • The ability to bounce back from adversity and adapt to life's challenges. • ...
33-35 HK 2024-01-26
Across
- a small card with an embedded microchip
- an area that holds the things you copy, ready to be pasted anywhere else
- a site that offers email, news web searching, online shopping and links to other sites
- the configuration of hardware and software
- a bar that allows you to select the portion of the document you want to see
- the amount of data can be transmitted along channel
Down
- a special file wich redirects to another file or program
- a utility to adjust computer settings such as fonts, sound and networks
- a small piece of silicon witch used in computers
- a type of data transmission that provides fast Internet accsess
10 Clues: a small card with an embedded microchip • the configuration of hardware and software • a small piece of silicon witch used in computers • the amount of data can be transmitted along channel • a special file wich redirects to another file or program • a type of data transmission that provides fast Internet accsess • ...
tomi Crossword 2024-07-24
Across
- a word that describes the tomi ecosystem
- a way to earn passively in the tomi ecosystem
- Ready to moon
- an initiative that ensures everyone has a voice in decision-making and keeping tomi community driven
- a domain support that allows you to access websites using human readable ENS names
Down
- a blockchain technology that harnesses the power of decentralized networks to enhance infrastructure scalability and reduce reliance on centralized systems
- a protocol that manages the domain name system of tomi
- a product and a key feature that'll be included on the tomiBrowser for quick payment
- a decentralized internt for anyone in the world to access
- a benefit of using tomi browser
10 Clues: Ready to moon • a benefit of using tomi browser • a word that describes the tomi ecosystem • a way to earn passively in the tomi ecosystem • a protocol that manages the domain name system of tomi • a decentralized internt for anyone in the world to access • a domain support that allows you to access websites using human readable ENS names • ...
Cyber Security 2024-03-26
Across
- A piece of software designed to update or fix vulnerabilities in a computer program.
- The practice of protecting systems, networks, and programs from digital attacks.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Software designed to harm or gain unauthorized access to a computer system.
- A secret combination of characters used to gain access to a system.
Down
- A network security system that monitors and controls incoming and outgoing network traffic.
- Software designed to detect and remove malicious software.
- Software that secretly gathers information about a person or organization.
- A type of malware disguised as legitimate software.
- The process of converting information into a code to prevent unauthorized access.
10 Clues: A type of malware disguised as legitimate software. • Software designed to detect and remove malicious software. • A secret combination of characters used to gain access to a system. • Software that secretly gathers information about a person or organization. • Software designed to harm or gain unauthorized access to a computer system. • ...
BEYOND 5G 2024-11-19
Across
- A goal of 5G to promote energy efficiency and eco-friendliness
- The number of key principles driving 5G technology design
- A defining feature of 5G ensuring stable and uninterrupted services
- Applications like smart cities and autonomous vehicles empowered by 5G.
- The measure of data speed and capacity, drastically improved in 5G networks
Down
- The seamless linking of billions of devices in the Internet of Things ecosystem
- The progression of LTE to Beyond 4G, defining advancements in wireless technology
- The type of wave spectrum utilized in 5G for ultra-high-speed communication
- The time delay reduced significantly in 5G to enable real-time communication
- The ability of 5G to support a large number of devices per unit area
10 Clues: The number of key principles driving 5G technology design • A goal of 5G to promote energy efficiency and eco-friendliness • A defining feature of 5G ensuring stable and uninterrupted services • The ability of 5G to support a large number of devices per unit area • Applications like smart cities and autonomous vehicles empowered by 5G. • ...
Networking 2025-04-28
Across
- a form of data transmission where data is sent in blocks or frames and there is no gap between data
- it regenerate the signal over the same network before the signal becomes too weak
- the loss of signal strength in networking cables or connection
Down
- the maximum data transfer rate of a network or Internet connection
- unguided communication media used for very short distance communication and cannot penetrate through obstacles
- the flow of data in a single direction
- modulation and demodulation.
- it forward data packets between one or more networks.
- a device used to extend a network so that additional workstations can be attached
- any device attached to a network capable of communicating with other network devices
10 Clues: modulation and demodulation. • the flow of data in a single direction • it forward data packets between one or more networks. • the loss of signal strength in networking cables or connection • the maximum data transfer rate of a network or Internet connection • it regenerate the signal over the same network before the signal becomes too weak • ...
Automotive cybersecurity Set II 2025-08-05
Across
- ability to encrypt sensitive data and provide robust defences against attacks.
- servers manage vehicle authentication and store results on the blockchain for quick re-authentication by edge nodes.
- cryptographic techniques for mutual authentication support local re-authentication when vehicles switch between edge nodes.
- Metric detects deviations from normal behaviour but may generate false positives.
- Protocol (AVTP) packets within Automotive Ethernet networks.
- is specifically designed to detect replay attacks on AVTP streams.
Down
- labelled dataset of benign and malicious packets by simulating client-server behaviour.
- Secure decentralized communication system for CAVs.
- model employs reset and update gates to manage memory connections, using an attention mechanism to enhance detection accuracy.
- Attack detection methods are classified into infrastructure-less.
10 Clues: Secure decentralized communication system for CAVs. • Protocol (AVTP) packets within Automotive Ethernet networks. • Attack detection methods are classified into infrastructure-less. • is specifically designed to detect replay attacks on AVTP streams. • ability to encrypt sensitive data and provide robust defences against attacks. • ...
Fundamentals of Computer Systems 2017-01-31
Across
- A computer system that forms part of an electronic device
- A text based system for defining web pages
- A file standard that displays a document accurately on any computer platform
Down
- Something which is designed for one particular purpose
- The lowest level of an operating system that controls the hardware
- A set of standards that control how data is sent across networks, including the internet
6 Clues: A text based system for defining web pages • Something which is designed for one particular purpose • A computer system that forms part of an electronic device • The lowest level of an operating system that controls the hardware • A file standard that displays a document accurately on any computer platform • ...
s25 2024-08-04
Across
- A type of Denial of Service attack that sends numerous SYN packets
- Wired Equivalent Privacy, an outdated security protocol for wireless networks
- The process of identifying, assessing, and controlling threats
Down
- The use of cyber attacks to disrupt or damage enemy capabilities
- Distributed Denial of Service, an attack that uses multiple systems to flood a target
- A protocol suite for securing internet protocol communications
6 Clues: A protocol suite for securing internet protocol communications • The process of identifying, assessing, and controlling threats • The use of cyber attacks to disrupt or damage enemy capabilities • A type of Denial of Service attack that sends numerous SYN packets • Wired Equivalent Privacy, an outdated security protocol for wireless networks • ...
Mobile technology 2020-08-30
Across
- is a technology that is used to transfer information from one program to one or more other programs.
- A dynamic change in pont of attachment maintains the network properties is done through
- unique number,usually fifteen digits,associated with global system for mobile communication.
- id a temporary ip address for a mobile node
- provides a means of reading or interrogating the data using the tag
- smpp cilent is termed a external short message
- is the process of selecting a path for taffic in a network or between or across multiple networks.
Down
- owns to trade mark wifi.
- a set of two or more interconnection piconets form
- has an onboard power source,usually a battery,and an active transmitter.
10 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Grasslands 2021-05-17
Across
- a hardy plant that remains green throughout the seasons with minimal watering needs.
- resilient to temperature and rainfall fluctuations, they require no fertilizers and minimal maintenance.
- big animals that feed on grass with flat topped teeth
- have front legs and paws that allow them to burrow into the ground
Down
- a pink flower that has roots that extend downward and form networks to absorb moisture during dry periods.
- a grass that has adapted to fires and grows better after one
- a type of biome that is between deserts and forests
- areas of grassland that are preserved and protected
- the biggest area of grasslands
- withstands prolonged droughts, can fix nitrogen in the soil, withstand freezing temperature
10 Clues: the biggest area of grasslands • a type of biome that is between deserts and forests • areas of grassland that are preserved and protected • big animals that feed on grass with flat topped teeth • a grass that has adapted to fires and grows better after one • have front legs and paws that allow them to burrow into the ground • ...
Connectivity, Media Support, Expansion capability & Security features 2021-10-05
Across
- one or more Central Processing Units that carry out software instructions
- a device’s ability to connect to networks and other devices.
- the memory in the computer system which is used for running software.
- this interface is controlled by the user giving spoken commands to the device.
- A computer security system
Down
- A type of security to prevent unauthorized access to data.
- this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- a user interface controlled by a pointer on the screen
- used to make a device inactive so that it requires a password or PIN to reactive it
- a user interface controlled by entering text instructions
10 Clues: A computer security system • a user interface controlled by a pointer on the screen • a user interface controlled by entering text instructions • A type of security to prevent unauthorized access to data. • a device’s ability to connect to networks and other devices. • the memory in the computer system which is used for running software. • ...
How far were people's lives transformed after independence? 2016-07-25
Across
- The compulsory enrolment of people for military service
- Areas where people live that have not been approved for residential purposes by the relevant authorities
- Basic facilities such as communications and transport and power supply networks
- A situation in which there were too many people in the city
- Areas in Singapore reserved for the building of factories
- An economy that has a variety of industries
Down
- Companies that have offices and factories in more than one country
- Singapore attempted to increase military ____________ with other countries in order to increase its security.
- National symbols such as the pledge and National Anthem were introduced to cultivate a sense of ________________.
- A form of education that emphasises hands-on, practical skills.
10 Clues: An economy that has a variety of industries • The compulsory enrolment of people for military service • Areas in Singapore reserved for the building of factories • A situation in which there were too many people in the city • A form of education that emphasises hands-on, practical skills. • Companies that have offices and factories in more than one country • ...
Leadership and Social Capital 2015-10-11
Across
- A manager who positively engage a humanistic and rationalistic management style
- People's ability to associate with one another, networks, norms and trust
- Approach what thinks people should be the priority in the management of services
Down
- Social process of other people perceptually assimilates them to the relevant ingroup or outgroup protoype
- Approach what thinks people should support the systems
- A group member who embodies the integrative essence of the group
- the most significant managerial challenge
- where is the research done in the article of Anthony Brien and Clive Smallman
- Leadership focus on charisma and transformational leadership
- Perspective that says people define and evaluate themselves and others in terms of the group they belong to
10 Clues: the most significant managerial challenge • Approach what thinks people should support the systems • Leadership focus on charisma and transformational leadership • A group member who embodies the integrative essence of the group • People's ability to associate with one another, networks, norms and trust • ...
Data Security 2024-04-11
Across
- Involves intentional deception for financial gain or to cause harm.
- Process of converting data into a format that cannot be easily understood by unauthorized parties.
- Refers to the malfunctioning or breakdown of physical components in computer systems or devices.
- fires, floods, earthquakes
Down
- Record of events or activities occurring within a system, network, or application.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
- Used to authenticate users and control access to computer systems, networks, or applications.
- Software designed to detect, prevent, and remove malicious software (malware) from computer systems.
- Security system designed to monitor and control incoming and outgoing network traffic.
- inaccurate data entry, accidental deletion or changing of data)
10 Clues: fires, floods, earthquakes • inaccurate data entry, accidental deletion or changing of data) • Involves intentional deception for financial gain or to cause harm. • Record of events or activities occurring within a system, network, or application. • Security system designed to monitor and control incoming and outgoing network traffic. • ...
Digital safety 2024-10-14
Across
- responsibility for actions and deeds.
- it refers to physical and emotional well-being
- a gadget used To go online and have fun
- the use of technology to harass, threaten, embarrass, or target another person.
- a set of instructions, data or programs used to operate computers and execute specific tasks.
Down
- the use of information and communication technologies by an individual or group to repeatedly cause harm to another person.
- Security in the online world
- the act of compromising digital devices and networks through unauthorized access to an account or computer system.
- electronic technology that generates, stores and processes data in terms of positive and nonpositive states
- Filling yourself in someone’s shoes
10 Clues: Security in the online world • Filling yourself in someone’s shoes • responsibility for actions and deeds. • a gadget used To go online and have fun • it refers to physical and emotional well-being • the use of technology to harass, threaten, embarrass, or target another person. • ...
Mayan Crossword 2023-04-11
Across
- During the Classic Era, Tikal and the city of _____ were frequently at war
- Mayans had The World, The Heavens, and The Underworld, called ____?
- Astronomers at that time was able to predict solar ____?
- Mayans had 4 major gods that controlled their lives -- The Sun, The Moon, The Rain, and ____?
- Tikal ______ was slow and faced drought, climate change, or soil reduction
- The _____ networks that supported the city moved to the coasts
Down
- Two big cities Tikal and Palenque rose in the _____ era (250-900 C.E.)
- _____ made huge contributions to many things including Math, Astronomy, and the calendar
- Mayans created a _____ system?
- Who are famous for their weaving with handspun yarn and natural vegetable dyes?
10 Clues: Mayans created a _____ system? • Astronomers at that time was able to predict solar ____? • The _____ networks that supported the city moved to the coasts • Mayans had The World, The Heavens, and The Underworld, called ____? • Two big cities Tikal and Palenque rose in the _____ era (250-900 C.E.) • ...
Kaien 8Gamma 2023-01-19
Across
- it is created when that data has been processed and becomes meaningful.
- a secret word that must be used to gain admission to a place.
- number a number that you dial on the telephone to reach a particular person, business, and more.
- media a collective term of website that focus on communication and more.
- a panel of keys that operate a computer or typewriter.
Down
- it is the practice of protecting system, networks, and programs from digital attacks.
- a device where people use to communicate when ever they want.
- a social media that was created by Mark Zuckerberg.
- a app that you could search anything.
- it is the raw facts and figures.
10 Clues: it is the raw facts and figures. • a app that you could search anything. • a social media that was created by Mark Zuckerberg. • a panel of keys that operate a computer or typewriter. • a device where people use to communicate when ever they want. • a secret word that must be used to gain admission to a place. • ...
Transportation In Animals and Plants 2022-11-26
Across
- process of elimination of excess water from the plant body.
- a major waste product produced in our body.
- The networks of hollow tubes like pipes, which carry blood to and from all parts of the body,
- the extremely thin blood vessels which connect arteries to veins.
Down
- collect oxygen-poor blood throughout your body and carry it back to your heart.
- refers to the heart and a network of blood vessels that move blood, nutrients and oxygen throughout the body.
- that transports water and nutrients from the plant–soil
- distribute oxygen-rich blood to your body.
- protecting the body against both infectious .
- transports photosynthetically prepared food materials from the leaves to the storage organs
10 Clues: distribute oxygen-rich blood to your body. • a major waste product produced in our body. • protecting the body against both infectious . • that transports water and nutrients from the plant–soil • process of elimination of excess water from the plant body. • the extremely thin blood vessels which connect arteries to veins. • ...
Cyber Safety 2024-10-10
Across
- This involves the exchange of information through electronic channels, such as emails, instant messaging, or social media.
- _____________ means taking part in an online community safely, ethically and respectfully.
- It’s an obligation or duty which you have towards yourself and to others.
- Avoid connecting to ______________ public wifi networks.
- To fully participate in society which uses electronic devices and the internet.
Down
- It is the process of learning and teaching about technology and how to use it effectively.
- It refers to the buying and selling of goods using electronic means, like online shopping.
- Protect your personal information with strong _____________.
- ___________________ means being secure online.
- The continuing and spreading results of an event or an action.
10 Clues: ___________________ means being secure online. • Avoid connecting to ______________ public wifi networks. • Protect your personal information with strong _____________. • The continuing and spreading results of an event or an action. • It’s an obligation or duty which you have towards yourself and to others. • ...
Durar key words 2025-01-06
Across
- : short form of uniform resource locater which means a text based address for a website
- : is a piece of network hardware that stores data
- : using knowledge of computing to achieve a goal or overcome an obstacle
- : a set of rules that devices use when communicating
- : the whole of a wave from the top of one wave to the next one
Down
- : a hardware piece that connects networks
- : putting two things together
- : the part of the text based website address that is the file name for a web page
- : interference in a data signals that can happen when electrical energy in one cable causes an unwanted effect in a another cable
- : how many cycles there per seconds
10 Clues: : putting two things together • : how many cycles there per seconds • : a hardware piece that connects networks • : is a piece of network hardware that stores data • : a set of rules that devices use when communicating • : the whole of a wave from the top of one wave to the next one • : using knowledge of computing to achieve a goal or overcome an obstacle • ...
Basic concepts in CAT 2025-09-22
Across
- What is a collection of web pages called?
- Exchanging data and information with other computers or users, often through networks.
- What type of software is used to browse the internet?
- What are those operating systems that run on a computer hardware, such as windows?
Down
- A global network of interconnected computers that communicate using standardized protocols is called an?
- What is a type of input device used for typing?
- The process of entering data into a computer using input devices such as keyboard or mouse is called?
- What are the physical components of a computer system?
- What is database used for?
- What type of a software is used for creating spreadsheets?
10 Clues: What is database used for? • What is a collection of web pages called? • What is a type of input device used for typing? • What type of software is used to browse the internet? • What are the physical components of a computer system? • What type of a software is used for creating spreadsheets? • ...
CONFLICTS 2025-08-29
Across
- a violence act/threats against people because of difference in ideology.
- transnational jihadist group that seeks to rebuild its networks.
- a head covering worn in public by some Muslim women.
- a hardline Islamist fundamentalist group.
- code of ethical conduct and about worship and charity but a part of it deals with crime.
Down
- of or belonging to a population group or subgroup made up of people who share a common cultural background or descent.
- a monotheistic, Abrahamic religion founded in Mecca around 610 CE by the prophet Muhammad.
- a pursuit or interest to which someone ascribes supreme importance.
- guidance that is considered a formal legal ruling.
- groups that despise each other due to an ideological conflict.
10 Clues: a hardline Islamist fundamentalist group. • guidance that is considered a formal legal ruling. • a head covering worn in public by some Muslim women. • groups that despise each other due to an ideological conflict. • transnational jihadist group that seeks to rebuild its networks. • a pursuit or interest to which someone ascribes supreme importance. • ...
Cybersecurity and Common Online Threats 2025-10-14
Across
- A weakness that can be exploited by cybercriminals
- Engineering A manipulation technique that tricks people into giving away confidential information.
- The practice of protecting computers, networks, and data from digital attacks or unauthorized access.
- A kind of malware that locks your files and demands payment to unlock them.
- The process of converting information into a secure code to prevent unauthorized access.
- A type of scam where someone pretends to be trustworthy to steal personal information.
Down
- Software designed to harm or disrupt computers or steal data.
- The quality of being real or genuine.
- Software that secretly tracks your online activity or gathers personal data.
- To weaken or harm something, especially security or privacy.
10 Clues: The quality of being real or genuine. • A weakness that can be exploited by cybercriminals • To weaken or harm something, especially security or privacy. • Software designed to harm or disrupt computers or steal data. • A kind of malware that locks your files and demands payment to unlock them. • ...
IT addressing and network hardware 2024-10-10
5 Clues: Connects network segments • The static address given a a devidce by its manufacturs • The unique identification of the device, used to locate it. • A device that forwards data packets between computer networks • The amount of time used by data to reach its destination and come back.
Modern theories # 2 (1500 AD - Present) 2025-04-11
Across
- learned behaviors are acquired through conditioning and interactions with the environment
- examines how social factors such as relationships or culture contribute to mental health
- views mental disorders as arising from complex networks of interconnected symptoms
- mental health issues stem from unconscious conflicts and unresolved childhood experiences
Down
- emphasizes the individual's inherent capacity for growth
- explores the role of genetics, brain chemistry, and hormones and how they contribute to mental health
- negative and distorted thinking can contribute to mental health problems
7 Clues: emphasizes the individual's inherent capacity for growth • negative and distorted thinking can contribute to mental health problems • views mental disorders as arising from complex networks of interconnected symptoms • examines how social factors such as relationships or culture contribute to mental health • ...
Networking Task4 2022-10-17
Across
- A type of network that uses radio waves to send and receive messages.
- Hardware that connects networks together.
- Fitted into the extension slots on the motherboard and gives each computer on the network its own address.
- Hardware that is used to direct messages to the connected computer on the cabled network.
Down
- A faster more expensive cable that transfers data using light.
- The most common type of cabling used in LANS.
- A piece of hardware that boosts a wireless signal.
7 Clues: Hardware that connects networks together. • The most common type of cabling used in LANS. • A piece of hardware that boosts a wireless signal. • A faster more expensive cable that transfers data using light. • A type of network that uses radio waves to send and receive messages. • ...
TECH-CROSS 2017-03-06
Across
- Describe the process of switching back and forth between settings or between programs
- Is used in flat-panel displays, is much thinner than lcd, and requires less power to run
- is a website that provides users with a microblogging platform and social networking capabilities
- The company which bought the “Microsoft” mobile market
- A term that describes junk and unsolicited e-mail
Down
- Used to send or receive data
- is the time difference a performed task and its result
- The path that routes the traffic between network
- That connects to infected networks
- is a protocol used to assign an IP address to a computer or device that has been connected to a network automatically
10 Clues: Used to send or receive data • That connects to infected networks • The path that routes the traffic between network • A term that describes junk and unsolicited e-mail • is the time difference a performed task and its result • The company which bought the “Microsoft” mobile market • ...
Computer Terms 2012-04-23
Across
- Often refered as the brain of the computer
- A system of numbers using only the two digits 1 and 0.
- The main circuit board that connects all of the computer's components together.
- A term referring to mass email forwarded messages, junk email, email hoaxes, and etc.
- Enables user to control the cursor of the computer.
Down
- A form of external storage that you can trasnfer from computer to computer.
- A section connected to the computer that enables typing of letters, numbers and symbols.
- Memory that the computer can easily access and readily reads from and writes to.
- The screen in which we can view the computer from.
- The electronic transmission of messages over communication networks like the Internet.
10 Clues: Often refered as the brain of the computer • The screen in which we can view the computer from. • Enables user to control the cursor of the computer. • A system of numbers using only the two digits 1 and 0. • A form of external storage that you can trasnfer from computer to computer. • ...
Telecom-Crossword 6 2013-11-28
Across
- Database of the IMEI numbers of blacklisted handsets
- Central database that contains user-related and subscription-related information.
- Protocol is used in UMTS signaling between the Core Network and UTRAN.
- It's a set of protocols defined to transport SS7 messages over IP networks
- Diameter Accounting and Authorization Charging
- Node designated in real-time to determine policy rules in a multimedia network.
Down
- Operating System used by TSP in CCN.
- Network protocol that enables a server to automatically assign an IP address to a computer.
- Network protocol analyzer for Windows and Unix that allows examination of data from a live network, or from a capture file on disk.
- It's a reliable transport protocol
10 Clues: It's a reliable transport protocol • Operating System used by TSP in CCN. • Diameter Accounting and Authorization Charging • Database of the IMEI numbers of blacklisted handsets • Protocol is used in UMTS signaling between the Core Network and UTRAN. • It's a set of protocols defined to transport SS7 messages over IP networks • ...
Concept of Information System 2015-09-01
Across
- belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization
- action to retrieve, create, delete, modify and update
- is a global network of computers which maybe server or client
- Support of Business Decision Making
- Process data resulting from business transactions, update operational databases, and produce business documents
Down
- is a collection of data convey meaning to a user
- is the buying, selling, marketing, and servicing of products, services, and information over a variety of computer networks.
- is between an enterprise and its trading partners who have access to information of their interest and concern
- Management information system
- they are using the system
10 Clues: they are using the system • Management information system • Support of Business Decision Making • is a collection of data convey meaning to a user • action to retrieve, create, delete, modify and update • is a global network of computers which maybe server or client • ...
digital tech crossword 2021-03-04
Across
- any piece of computer hardware equipment which converts information into a readable form. (2 words)
- a type of file that organizes other files in a hierarchical structure
- a person who uses computers to gain unauthorized access to data.
- a set of rules by which computers communicate
Down
- device provide data and control signals to an information processing system (2 words)
- devices that routes traffic between networks
- part of a computer system or network that is design block unauthorized access but still permits authorized communications
- what can infect your computer?
- what do you wright with?
- a small piece of data stored on the user's computer by the web browser while browsing a website
10 Clues: what do you wright with? • what can infect your computer? • devices that routes traffic between networks • a set of rules by which computers communicate • a person who uses computers to gain unauthorized access to data. • a type of file that organizes other files in a hierarchical structure • ...
Crossword Rex 2022-05-12
Across
- A device that connects to the wifi
- Running a program in a user's machine.
- Starts with D and end with E
- How we get onto the internet with computer keys by a device
- A computer network that connects other smaller networks together.
Down
- Transfers from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- One of the basic methods computers use to communicate with each other in a network
- A computer or computer program which manages access to a centralized resource or service in a network.
- Short for internet service provider.
- Copy (data) from one computer system to another, typically over the internet.
10 Clues: Starts with D and end with E • A device that connects to the wifi • Short for internet service provider. • Running a program in a user's machine. • How we get onto the internet with computer keys by a device • A computer network that connects other smaller networks together. • Copy (data) from one computer system to another, typically over the internet. • ...
Crossword Rex 2022-05-12
Across
- A device that connects to the wifi
- Running a program in a user's machine.
- Starts with D and end with E
- How we get onto the internet with computer keys by a device
- A computer network that connects other smaller networks together.
Down
- Transfers from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- One of the basic methods computers use to communicate with each other in a network
- A computer or computer program which manages access to a centralized resource or service in a network.
- Short for internet service provider.
- Copy (data) from one computer system to another, typically over the internet.
10 Clues: Starts with D and end with E • A device that connects to the wifi • Short for internet service provider. • Running a program in a user's machine. • How we get onto the internet with computer keys by a device • A computer network that connects other smaller networks together. • Copy (data) from one computer system to another, typically over the internet. • ...
MULTIMEDIA 2021-07-16
Across
- Blend multiple types of media and are easily accessed and searched.
- Viewed as a cultural process that reflects values and societal transformation
- Used to merge multimedia elements into a project.
- A combination of hypertext, graphics, audio, video, linked elements, and interactivity of culminating in a non-linear computer-based experience.
- Contains several types of media such as text, graphics, photos, sound and performances.
- Enhances the real world as it exist with graphical overlays.
Down
- Simulate an environment along with the user's physical presence and sensory experience.
- Centers on creating, sharing and exchanging informatin, ideas and content in online networks and communities.
- Have no control over the content.
- Have control over the content.
10 Clues: Have control over the content. • Have no control over the content. • Used to merge multimedia elements into a project. • Enhances the real world as it exist with graphical overlays. • Blend multiple types of media and are easily accessed and searched. • Viewed as a cultural process that reflects values and societal transformation • ...
Digital Tech Computer Functions Crossword 2021-08-04
Across
- What is a group of electronics with a common set of rules and procedures called?
- Pressing and holding down the power button on a computer will result in a...
- What is the service that routes traffic between networks?
- A facility used to house computer systems is referred to as...
- A system or network that is created to block unauthorized access is referred to as a?
- What does DNS stand for?
Down
- What does QoS stand for?
- A system used to connect multiple computer systems to form a local area network is called?
- What element is the smallest part of a graphic image?
- A...is a filing system that organises other files in a hierarchical system.
10 Clues: What does QoS stand for? • What does DNS stand for? • What element is the smallest part of a graphic image? • What is the service that routes traffic between networks? • A facility used to house computer systems is referred to as... • A...is a filing system that organises other files in a hierarchical system. • ...
CrossWord 2024-02-15
Across
- The "brain" of a computer, responsible for processing data
- A type of storage that retains data even when the power is turned off
- A popular open-source operating system
- A high-level programming language often used for scientific and numerical computing
- A method of protecting computer networks from unauthorized access or attacks
Down
- A widely used markup language for styling web pages
- The process of finding and fixing errors in computer programs
- What modern connectivity solution liberates devices from physical tethers, enabling seamless internet access?)
- A popular programming language used for creating web pages
- A programming language known for its platform independence and used extensively in web development, initially developed by Sun Microsystems and now maintained by Oracle.
10 Clues: A popular open-source operating system • A widely used markup language for styling web pages • The "brain" of a computer, responsible for processing data • A popular programming language used for creating web pages • The process of finding and fixing errors in computer programs • A type of storage that retains data even when the power is turned off • ...
The roaring 20s 2024-01-23
Across
- (2 words-name) Famous baseball player
- (2 words-name)American Pilot who flew across the Atlantic Ocean non-stop from New York to Paris.
- Networks such as NBC and CBS formed.
- (2 words-name)Painted images of loneliness of modern urban life
- (2 words-name)He had the idea of making cars with an assembly line
- (2 words-name)Helped reform public school and thought that education institutions should have the goal of “Education for Life”.
Down
- (2 words-name)Was known for detailed paintings of flowers and of the Southwest
- First Motion picture with sound
- (2 words-name)One of the writers of the lost generation
- Developed in New Orleans
10 Clues: Developed in New Orleans • First Motion picture with sound • Networks such as NBC and CBS formed. • (2 words-name) Famous baseball player • (2 words-name)One of the writers of the lost generation • (2 words-name)Painted images of loneliness of modern urban life • (2 words-name)He had the idea of making cars with an assembly line • ...
Jargon Digitalk 2020-02-05
Across
- A small text file which a website stores in the users' computer
- A reference to data that a reader can follow
- A part of technology where it allows you to adjust your device the way you want it
- It is a measurement unit used to measure the amount of data you have left
- Information that is stored onto the computer
Down
- It is at the start of every website
- A hard drive where the user can store information on from the computer
- A piece of silicon with an electronic circuit embedded in it
- A three letter abbreviation which allows you to secure a connection to networks from other countries.
- A search engine
10 Clues: A search engine • It is at the start of every website • A reference to data that a reader can follow • Information that is stored onto the computer • A piece of silicon with an electronic circuit embedded in it • A small text file which a website stores in the users' computer • A hard drive where the user can store information on from the computer • ...
Networking Puzzle 2024-06-30
Across
- Two or more computers that are connected for transmitting, exchanging, or sharing data and resources
- Forwards data packets between devices
- Device that connects two or more packet-switched networks or subnetworks
- A type of network configuration where devices are connected in a circular manner
- A wireless technology that lets devices like phones, tablets etc. connect to each other and share information
Down
- Technology that connects offices, data centers, cloud applications, and cloud storage together.
- Raw information that simply includes basic numbers or texts
- A group of devices connected without the use of wires or cables
- The endpoints, communication, or redistribution points over a network
- A vast network that connects computers all over the world
10 Clues: Forwards data packets between devices • A vast network that connects computers all over the world • Raw information that simply includes basic numbers or texts • A group of devices connected without the use of wires or cables • The endpoints, communication, or redistribution points over a network • ...
Tech 2023-06-07
Across
- is a mobile operating system
- is a mapping from some domain
- is a method of representing data in a visual, machine-readable form.
- is the protection of computer systems and networks from attack by malicious actors
Down
- are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- is the world's largest technology company by revenue
- is a collection of discrete values
- represents text, computer processor instructions, or any other data using a two-symbol system.
- is the most important processor in a given computer.
- is a hardware or software component that stores data
10 Clues: is a mobile operating system • is a mapping from some domain • is a collection of discrete values • is the world's largest technology company by revenue • is the most important processor in a given computer. • is a hardware or software component that stores data • is a method of representing data in a visual, machine-readable form. • ...
Digital Divide 2023-06-06
Across
- High-speed internet connection enabling faster data transmission.
- The ability to connect to and use digital devices and the internet.
- The state of being connected to the internet or other digital networks.
- The gap between those who have access to and can effectively use technology and those who do not.
- Having less access or opportunities compared to others.
Down
- Unequal distribution or access to resources, opportunities, or services.
- A global network that allows communication and access to information.
- The process of enabling individuals with tools and resources to take control of their lives.
- Competence and knowledge in using digital devices and applications.
- Literacy: The ability to use digital tools and technology effectively.
10 Clues: Having less access or opportunities compared to others. • High-speed internet connection enabling faster data transmission. • The ability to connect to and use digital devices and the internet. • Competence and knowledge in using digital devices and applications. • A global network that allows communication and access to information. • ...
PSG COLLEGE OF TECHNOLOGY Placement and training – Coding club CodeXplore 23’ Round 1 2023-07-10
Across
- A type of attack in which an attacker floods a network with excessive traffic
- A programming construct used to traverse and access elements of a collection or data structure
- A system that stores and manages large sets of structured data
- The set of rules and structure for writing valid statements in a programming language
- A network protocol that allows for secure communication over the internet
Down
- The process of finding and fixing bugs in computer programs
- A programming paradigm that emphasizes immutability and functional purity
- A symbol or function that performs an operation on one or more operands
- Method of protecting computer networks from unauthorized access
- A programming language designed for creating web pages and web applications
10 Clues: The process of finding and fixing bugs in computer programs • A system that stores and manages large sets of structured data • Method of protecting computer networks from unauthorized access • A symbol or function that performs an operation on one or more operands • A programming paradigm that emphasizes immutability and functional purity • ...
Mayan Crossword 2023-04-11
Across
- During the Classic Era, Tikal and the city of _____ were frequently at war
- Mayans had The World, The Heavens, and The Underworld, called ____?
- Astronomers at that time was able to predict solar ____?
- Mayans had 4 major gods that controlled their lives -- The Sun, The Moon, The Rain, and ____?
- Tikal ______ was slow and faced drought, climate change, or soil reduction
- The _____ networks that supported the city moved to the coasts
Down
- Two big cities Tikal and Palenque rose in the _____ era (250-900 C.E.)
- _____ made huge contributions to many things including Math, Astronomy, and the calendar
- Mayans created a _____ system?
- Who are famous for their weaving with handspun yarn and natural vegetable dyes?
10 Clues: Mayans created a _____ system? • Astronomers at that time was able to predict solar ____? • The _____ networks that supported the city moved to the coasts • Mayans had The World, The Heavens, and The Underworld, called ____? • Two big cities Tikal and Palenque rose in the _____ era (250-900 C.E.) • ...
BEYOND 5G 2024-11-19
Across
- A goal of 5G to promote energy efficiency and eco-friendliness
- The number of key principles driving 5G technology design
- A defining feature of 5G ensuring stable and uninterrupted services
- Applications like smart cities and autonomous vehicles empowered by 5G.
- The measure of data speed and capacity, drastically improved in 5G networks
Down
- The seamless linking of billions of devices in the Internet of Things ecosystem
- The progression of LTE to Beyond 4G, defining advancements in wireless technology
- The type of wave spectrum utilized in 5G for ultra-high-speed communication
- The time delay reduced significantly in 5G to enable real-time communication
- The ability of 5G to support a large number of devices per unit area
10 Clues: The number of key principles driving 5G technology design • A goal of 5G to promote energy efficiency and eco-friendliness • A defining feature of 5G ensuring stable and uninterrupted services • The ability of 5G to support a large number of devices per unit area • Applications like smart cities and autonomous vehicles empowered by 5G. • ...
AI 2025-03-06
Across
- Extremely large datasets used to train AI systems and improve their decision-making.
- The tendency of an AI system to produce unfair outcomes due to flaws in data or algorithms
- AI-generated media, such as videos or images, that convincingly mimic real people or events
- The programs and applications that run on a computer
- Moral principles that govern a person’s behaviour or the conducting of an activity.
Down
- The physical parts of a computer
- Able to operate independently without human control
- A collection of information used to train AI systems
- The process of converting data into a code for security
- The protection of AI systems and networks from hacking and malicious attacks
10 Clues: The physical parts of a computer • Able to operate independently without human control • A collection of information used to train AI systems • The programs and applications that run on a computer • The process of converting data into a code for security • The protection of AI systems and networks from hacking and malicious attacks • ...
IT crossword 2025-03-20
Across
- A global network that connects millions of private, public, academic, and government networks.
- An organized collection of data for easy access and management.
- The physical components of a computer system.
- A step-by-step procedure used for calculations, data processing, and automated reasoning.
- A group of interconnected computers that share resources.
Down
- The process of converting data into a code to prevent unauthorized access.
- A high-level programming language commonly used for web development.
- A hardware or software component that stores data for quick access.
- A fundamental principle of computing that deals with true and false values.
- A system of numerical notation that has 2 as its base, used in computers.
10 Clues: The physical components of a computer system. • A group of interconnected computers that share resources. • An organized collection of data for easy access and management. • A hardware or software component that stores data for quick access. • A high-level programming language commonly used for web development. • ...
LCaravelli-Network Devices 2023-01-04
Across
- introduced to divide LANs into segments
- typically responsible for monitoring all you end devices on your network
- networking systems that are no longer supported but are still in operation in today’s networks
Down
- security should be top of mind when the technician recommends and installs this type of system
- its main purpose is to regenerating weak signals
- receives data from one port and sends it to all other ports
- uses various techniques for determining what is and what is not permitted in a network segment
- does not allow packets to enter the target system without first being analyzed
- passively monitors traffic on the network
- a generic name for an all in one network appliance
10 Clues: introduced to divide LANs into segments • passively monitors traffic on the network • its main purpose is to regenerating weak signals • a generic name for an all in one network appliance • receives data from one port and sends it to all other ports • typically responsible for monitoring all you end devices on your network • ...
Internet 2025-02-19
Across
- A network of computers that allows users to access web pages and other resources
- WHAT HARDWARE IS USED TO CONNECT A COMPUTER TO INTERNET
- WHAT IS A WIRELESS TECHNOLOGY THAT CAN ONLY WORK WITHIN A FEW CM
- A COMPANY THAT PROVIDES INTERNET
- WHAT IS A NETWORK OF INTERCONNECTED NETWORKS CALLED
Down
- A type of network that provides a means of communication between computers across vast distances
- WHAT IS USED TO MAKE THE CONTENT THAT CAN BE VIEWED AND INTERACTED
- WHAT IUS THE ACT OF RECORDING A CONVERSATION OF OVERHEARING SOMEONE WITHOUT THERE PERMISSION
- A system that allows users to access websites and navigate the internet
- WHAT IS THE MOST COMMON FORM OF Surveillance?
10 Clues: A COMPANY THAT PROVIDES INTERNET • WHAT IS THE MOST COMMON FORM OF Surveillance? • WHAT IS A NETWORK OF INTERCONNECTED NETWORKS CALLED • WHAT HARDWARE IS USED TO CONNECT A COMPUTER TO INTERNET • WHAT IS A WIRELESS TECHNOLOGY THAT CAN ONLY WORK WITHIN A FEW CM • WHAT IS USED TO MAKE THE CONTENT THAT CAN BE VIEWED AND INTERACTED • ...
Internet 2024-12-04
Across
- a machine that can store and process information
- a small segment of a larger message
- an application for accessing websites
- a group of connected computers that are able to send data to each other
- a place on the Internet with one or more pages of information about a subject
Down
- a vast network that connects computers all over the world
- an electronically stored, systematic collection of data
- a piece of electronic equipment which allows one computer to send information to another through telephone wires
- a device that helps connect multiple computer networks together and allows them to communicate with each other
- a wireless networking technology that uses radio waves to provide wireless high-speed Internet access
10 Clues: a small segment of a larger message • an application for accessing websites • a machine that can store and process information • an electronically stored, systematic collection of data • a vast network that connects computers all over the world • a group of connected computers that are able to send data to each other • ...
Vocabulary 2014-12-09
Across
- The industry concerned with the design and manufacture of aircraft, rockets, missiles, and spacecraft.
- Device designed to be launched into orbit around planets and the sun to gather information.
Down
- A vast computer network linking smaller computer networks worldwide.
- To operate or perform by machinery
- The design, development, production, operation and use of aircraft.
- Business that is transacted by transferring data electronically, especially over the internet.
6 Clues: To operate or perform by machinery • The design, development, production, operation and use of aircraft. • A vast computer network linking smaller computer networks worldwide. • Device designed to be launched into orbit around planets and the sun to gather information. • ...
Inglese bullismo e cyberbullismo Kiara 2021-11-20
Across
- he is a boy or a girl, he is arrogant, and thinks he is superior to the victim
- when you are a victim you have a lot ...
- anything bad about people's skin color
Down
- bullying is also transmitted on social networks
- one of the many words bullies say to a victim: L ...
- he is not confident in front of others, and is unable to react
6 Clues: when you are a victim you have a lot ... • anything bad about people's skin color • bullying is also transmitted on social networks • one of the many words bullies say to a victim: L ... • he is not confident in front of others, and is unable to react • he is a boy or a girl, he is arrogant, and thinks he is superior to the victim
Virus of computer 2021-02-11
Across
- Install _____ in your computer to protect the compuer from virus .
- _____ copies and multiples itself using computer networks and security flaws
Down
- __________ is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another .
- _________ is a antivirus software
- Type of virus
- Avoid using pirated ______ to protect your system from virus attack
6 Clues: Type of virus • _________ is a antivirus software • Install _____ in your computer to protect the compuer from virus . • Avoid using pirated ______ to protect your system from virus attack • _____ copies and multiples itself using computer networks and security flaws • ...
BizQiz Crossword 2023-11-21
Across
- The act of solving a problem or question
- It is a careful study and investigation for the purpose of discovering new knowledge
- A global network of networks that connects us to online information
Down
- To consider or look at something in detail so you can better understand its meaning
- A situation which is difficult to deal with
- A proof that shows something is true
6 Clues: A proof that shows something is true • The act of solving a problem or question • A situation which is difficult to deal with • A global network of networks that connects us to online information • To consider or look at something in detail so you can better understand its meaning • ...
Chicago Dispatcher's February Crossword Puzzle 2014-02-07
Across
- What is the last name of Uber NYC's general manager?
- Baruch Herzfeld traveled around the world setting up _____ networks.
- Currently wheelchair users in New York City are served by ______ paratransit service.
- What organization is suing the City for the proposed ridesharing ordinance?
- Which Emanuel ally is also a registered lobbyist for uberX?
- What Ward does Larry Moore live in?
- Start-up app Gett identified many Uber employees through which networking site?
- Who is playing at Lincoln Hall on February 18?
- Which mayor's administration originally strongly supported commercial ridesharing?
- New York City will increase its wheelchair accessibility to _____ percent by 2020.
- What kind of watch did Pete lose in a Flash Cab?
Down
- What company turns your cell phone into a radio?
- The biggest ride sharing companies are Lyft, uberX, and _____.
- Which bank conducted a survey focusing on taxi industry growth?
- Last year, Mayor Rahm Emanuel presented the Taxicab Driver Excellence award to Imran _____.
- February 12 is which U.S. president's birthday?
- The philosopher Zeno thought he had proved the impossibility of what?
- 100% of cabs in the city of _____ are wheelchair accessible.
18 Clues: What Ward does Larry Moore live in? • Who is playing at Lincoln Hall on February 18? • February 12 is which U.S. president's birthday? • What company turns your cell phone into a radio? • What kind of watch did Pete lose in a Flash Cab? • What is the last name of Uber NYC's general manager? • Which Emanuel ally is also a registered lobbyist for uberX? • ...
Intro to Computing 2016-02-22
Across
- Tools or websites online that can help you perform a certain service or action
- The codes or tags that browsers use to create web pages
- Wide-area network
- is the main technology for local area networks
- Communication in which sending and receiving do not happen at the same time
- You must do this and identify yourself on UT systems
- A group of information on a computer that can be software or programs
- Do not do this or interfere with security mechanisms
Down
- Built from the instruction of HTML
- An app that lets you specifically just edit text
- Type of communication where the sender and receiver are active at the same time
- No more than 5 of these from one artist can be used
- numbers or letters in an informational form
- All users do this with the computing resources in an ethical manner
- The rights to use a certain picture, video, or information for personal use
- The act of traversing a website
- Local-area network
- Type of website that takes multiple people to work on and maintain day-to-day
18 Clues: Wide-area network • Local-area network • The act of traversing a website • Built from the instruction of HTML • numbers or letters in an informational form • is the main technology for local area networks • An app that lets you specifically just edit text • No more than 5 of these from one artist can be used • You must do this and identify yourself on UT systems • ...
