networks Crossword Puzzles
PHPR 4270 Grad Student Assignment 2023-02-13
Across
- Political circumstances include Political Will and Political Forces
- Expanding more opportunities for ambulatory care
- Licensing of practitioners is an example of allocative health policy
- highest spending in healthcare expenditure in the United States
- Screening for cervical cancer is an example of which type of prevention?
- How does US health policy operate?
- Action that marked the beginning of high medical education costs
Down
- A non-physician provider that is considered complementary and alternative medicine
- An Accountable Care Organization can include services from
- Most numerous profession in the healthcare system
- The ability for a policy to move through the process depends on?
- Improving the quality of healthcare can lead to the improvement in __
- community pharmacies can help improve star ratings of health plans by improving this
- One post-ACA ambulatory care models for improving quality care
- Problematic goal for Integrated Delivery Networks
- Why were private insurance schemes developed?
- Organization is focused on leading quality improvement of the US HealthSystem
- One of which is part of healthcare regulation at the State level
18 Clues: How does US health policy operate? • Why were private insurance schemes developed? • Expanding more opportunities for ambulatory care • Most numerous profession in the healthcare system • Problematic goal for Integrated Delivery Networks • An Accountable Care Organization can include services from • One post-ACA ambulatory care models for improving quality care • ...
Military Careers 2025-12-05
Across
- The organized movement of troops and resources to a mission location.
- Designing, building, and repairing structures or systems (e.g., runways, bridges).
- The planning and movement of supplies, equipment, and personnel.
- A technician who repairs and maintains vehicles and equipment.
- Instruction and exercises that develop skills, certifications, and readiness.
- Leadership structure responsible for decision-making and orders.
- Hub A central location where supplies and equipment are stored and distributed.
- Military roles related to aircraft operations, maintenance, and support.
- Pertaining to military operations at sea and related career roles.
- Support Roles that provide essential services enabling combat operations (e.g., engineering, medical, logistics).
- Protecting computer systems and networks from attacks.
- The process of returning troops and equipment home after a mission.
Down
- Systems and personnel who transmit information and coordinate operations.
- Collecting and analyzing information to support missions and decisions.
- Specialist A role focused on supply chain, transportation, and inventory management.
- — Medical personnel who treat injured service members.
- The act of gathering information about enemy positions or terrain.
- People who have served in the military.
- Soldiers trained to fight on foot.
- Operations On-site activities and tasks carried out during missions or training.
20 Clues: Soldiers trained to fight on foot. • People who have served in the military. • — Medical personnel who treat injured service members. • Protecting computer systems and networks from attacks. • A technician who repairs and maintains vehicles and equipment. • The planning and movement of supplies, equipment, and personnel. • ...
IT and Tech 2023-10-03
Across
- Management Strategies and practices for attracting, developing, and retaining skilled individuals within an organization.
- The evaluation or appraisal of someone or something.
- The practice of recruiting highly skilled individuals for specialized positions.
- Measures taken to protect computer systems, networks, and data from cyber threats.
Down
- Solutions Services or strategies for finding and hiring suitable employees.
- The process of integrating a new employee into a company.
- The practice of analyzing and interpreting complex data sets to inform decision-making.
7 Clues: The evaluation or appraisal of someone or something. • The process of integrating a new employee into a company. • Solutions Services or strategies for finding and hiring suitable employees. • The practice of recruiting highly skilled individuals for specialized positions. • Measures taken to protect computer systems, networks, and data from cyber threats. • ...
Fake News 2022-04-04
Across
- Information or ideas,whether true or false,that are spreed to promote or injure a cause,movement,nation...
- A report of recent event,information
- An act of expressing or declaring one's objection to,disapproval of,or disagreement with some act or action.
Down
- Trickery carried out for profit or to gain some unfair or dishonest adventage
- a large computer network linking smaller computer networks worldwide
- not true or correct,erroneus,wrong
- Of,relating to,or caused by a virus
7 Clues: not true or correct,erroneus,wrong • Of,relating to,or caused by a virus • A report of recent event,information • a large computer network linking smaller computer networks worldwide • Trickery carried out for profit or to gain some unfair or dishonest adventage • ...
Complete the crossword about connectivism 2024-09-21
Across
- A system of interconnected people and resources that facilitate learning.
- An online tool or environment that supports collaborative and connectivist learning.
- The act of working together with others to enhance understanding and knowledge.
Down
- The learning theory proposed by George Siemens that emphasizes the role of networks in knowledge acquisition.
- An individual who engages actively in the learning process.
- Relating to technology, particularly the internet, used as a medium for learning.
- The information and skills acquired through experience or education.
7 Clues: An individual who engages actively in the learning process. • The information and skills acquired through experience or education. • A system of interconnected people and resources that facilitate learning. • The act of working together with others to enhance understanding and knowledge. • ...
among the hidden 2014-04-23
Across
- of numerical information.
- belife or practice trusting in magic or chance.
- type of government in wich individual differences are allowed.
- eggs, salted and eaten as a delicacy.
- computer user who is able to penétrate, carefully protected computer networks such as those of the government.
- offered with the intention of influencing or inducing.
- ban on a subject, action, behavior or the like imposed by a societal or religeus custom.
- Little or not faith in human nature, disthrustful or contemtuous of other motives.
- carefully, being alert and attentive.
- quick journeyor side trip taken to fulfill a particular prupose.
- burst of loud or bosterous laughter.
Down
- person employed to inspect something.
- irregulary, or in a thinly scattered manner in time.
- or opinión circulated among the public in order to persuade the population.
- whole number of people or inhabitants in a country or región.
- member of a nobel class, very powerfull.
- thing, a person, or event that causes awe, admiration, or amazement.
- quality of being fearless.
18 Clues: of numerical information. • quality of being fearless. • burst of loud or bosterous laughter. • person employed to inspect something. • eggs, salted and eaten as a delicacy. • carefully, being alert and attentive. • member of a nobel class, very powerfull. • belife or practice trusting in magic or chance. • irregulary, or in a thinly scattered manner in time. • ...
Body Systems 2020-11-16
Across
- The ______ is also called the voice box
- Muscles move body parts by contracting and then ________
- The _________ is the largest and most complex part of the brain
- ________ is found in the heart
- ____________ are networks of tiny blood vessels
- The nerves that go through the whole body make up the __________________
- The lungs and ____________ allow us to breathe
- The __________________ carries blood from the heart to all the other parts of the body and back again
Down
- Cancellous bone resembles _____
- smooth muscle is also referred to as_________
- Bones are made up of a framework of a protein called ________
- _________ is the solid, hard outside part of the bone
- air enters the respiratory system through the ____ or the mouth.
- The ________________ is a short loop from the heart to the lungs and back again
- The _____ is a big artery that leaves the heart carrying this oxygenated blood centralnervoussystem the brain and the spinal cord are the _________________
- ________is attached by cord-like tendons
- The human brain weighs ______ pounds
- _______ is where most of the body's blood cells are made
18 Clues: ________ is found in the heart • Cancellous bone resembles _____ • The human brain weighs ______ pounds • The ______ is also called the voice box • ________is attached by cord-like tendons • smooth muscle is also referred to as_________ • The lungs and ____________ allow us to breathe • ____________ are networks of tiny blood vessels • ...
GA READING AND LISTENING REVIEW 2021-10-21
Across
- (adjective) related to the sense of hearing.
- (adjective) related to seeing or sight. (Hint: If you learn better by seeing, then you are a (...?) learner.)
- (noun) an electronic communications network that connects computer networks around the world.
- (noun) a member of the same class in a school or college.
- (noun) a person who is learning a subject or skill; similar in meaning to the word 'student'.
- (noun) the activity, or pastime of planning and working in gardens.
- (noun) a building or room containing collections of books.
- (noun) a person who is studying at a school or college.
- (plural noun) who is responsible for educating homeschooled children?
- (noun) the education of children at home by their parents.
Down
- (adjective) causing stress; the adjective form of the noun 'stress'.
- (adjective) small in size; not much.
- (adjective) modern or relating to the present time.
- (noun) the opposite of advantage (?).
- (noun) a phone that performs many of the functions of a computer.
- (adjective) not the same (?).
- (noun) the second biggest country in the world.
- (noun) schoolwork that a student is required to do at home.
18 Clues: (adjective) not the same (?). • (adjective) small in size; not much. • (noun) the opposite of advantage (?). • (adjective) related to the sense of hearing. • (noun) the second biggest country in the world. • (adjective) modern or relating to the present time. • (noun) a person who is studying at a school or college. • ...
Lesson 7 Review 2025-11-18
Across
- Freedoms protected by the First Ten Amendments, aka the. . .
- set of beliefs that don't fall neatly into one category, but are somewhere in the middle
- Ideology favoring free markets and broad personal freedom
- 1954 case that ended segregation in public schools ________ vs Board of Education
- document giving a legal permanent resident the right to work in the US
- Ideology focused on protecting natural resources
- Belief emphasizing limited government and traditional values
- Required payments that fund government operations
Down
- Legal duty requiring citizens to appear in court if selected and serve on a . . .
- after completing their interview, immigrants in the naturalization process must complete the oath of ________
- U.S. amendment that defines birthright citizenship
- Peaceful 1960s protest tactic at segregated lunch counters
- Connections that give people influence and power
- Networks and groups that build civic engagement
- right held only by citizens (not permanent residents)
- Process by which an immigrant becomes a U.S. citizen
- Belief supporting government programs and more economic regulation
- 1896 Supreme Court case that established “separate but equal” ________ vs Ferguson
18 Clues: Networks and groups that build civic engagement • Connections that give people influence and power • Ideology focused on protecting natural resources • Required payments that fund government operations • U.S. amendment that defines birthright citizenship • Process by which an immigrant becomes a U.S. citizen • right held only by citizens (not permanent residents) • ...
UNIT 2017-03-17
Across
- Something that is too old.
- That may be relied on or trusted.
- Abnormal fear of or anxiety about the effects of advanced technology
- Able to resist wear, decay, etc., well; lasting; enduring
- Something that is easy and comfortable.
- Pricy.
- A website containing a writer's or group of writers' own experiences, observations, opinions
- The rules of etiquette that apply when communicating over computer networks, especially the Internet.
- Software intended to damage a computer, mobile device, computer system, or computer network
- Easily broken, shattered, or damaged; delicate; brittle.
Down
- Something cheap.
- A lightweight handheld video camera.
- A child of approximately eight to fourteen years of age
- Performing or functioning in the best possible manner with the least waste of time and effort
- A digital icon or a sequence of keyboard symbols that serves to represent a facial expression.
- A lecture, slide show, or motion picture describing travels.
- Computer software distributed without charge.
- A system for sending messages from one individual to another via telecommunications links between computers or terminals using dedicated software:
18 Clues: Pricy. • Something cheap. • Something that is too old. • That may be relied on or trusted. • A lightweight handheld video camera. • Something that is easy and comfortable. • Computer software distributed without charge. • A child of approximately eight to fourteen years of age • Easily broken, shattered, or damaged; delicate; brittle. • ...
Mmorkos Computer sci Assignment 6 2016-02-22
Across
- Illegal download of music
- type of cache located on a person's computer to make accessing a website faster
- online software type programs
- when both the sender and receiver are active at the same time
- this type of communication is mostly used on the internet. the sender and receiver are not active at the same time
- neutral sentences is an example of ___ language
- HTML program on a MAC
- when computers are geographically close and linked by a single cable
Down
- Allowed up to 10% music in your work but no more than 30 seconds under the ___
- group of information on a computer that can be software programs or data
- Exclusive rights given to original author of a type of music
- "Sniffing Passwords"
- Using a bulleted list is an example of
- number of webtool that allows user to interact freely with the tool
- HTML program on a PC
- Hypertext Markup Language
- type of cache when the cache is stored on a offshore server
- The internet is a collection of these wide area networks
18 Clues: "Sniffing Passwords" • HTML program on a PC • HTML program on a MAC • Illegal download of music • Hypertext Markup Language • online software type programs • Using a bulleted list is an example of • neutral sentences is an example of ___ language • The internet is a collection of these wide area networks • type of cache when the cache is stored on a offshore server • ...
Cybersecurity in Schools 2025-10-19
Across
- The goal of teaching students about online safety and responsible behavior.
- People who gain unauthorized access to computer systems.
- School and home connections that are often easy targets for hackers.
- What the article suggests should include cybersecurity education.
- The entity the article says should help implement cybersecurity education.
- What schools should develop to respond to cyber threats.
- The sector most affected by cyberattacks, according to Microsoft research.
- Working together between schools, families, and the government to fight cyber threats.
Down
- The online space where students face increasing security risks.
- A type of cyberattack that locks data until a payment is made.
- Harmful software used by cybercriminals to damage or steal data.
- The practice of protecting systems and data from digital attacks.
- A scam where hackers trick people into revealing personal information.
- What students are increasingly using in classrooms instead of pen and paper.
- What teachers need before they can effectively teach cybersecurity.
- The dangers posed by cyberattacks.
- Key partners who should collaborate on cybersecurity education efforts.
- Sensitive information that hackers often try to steal from schools.
18 Clues: The dangers posed by cyberattacks. • People who gain unauthorized access to computer systems. • What schools should develop to respond to cyber threats. • A type of cyberattack that locks data until a payment is made. • The online space where students face increasing security risks. • Harmful software used by cybercriminals to damage or steal data. • ...
Game based learning test drive 2021-04-26
5 Clues: no idea what this is.... • The Matrix is an elaborate one of these • these fuzzy objects can appear on a rearview mirror in some cars • This game uses tiles and letters to built interactive word networks • Something faculty think is always fun but may be tedious to students
Cisco Chapter 1 Crossword 2020-09-24
Across
- Web pages that groups of people can edit and view together
- Applications can be accessed over the Internet through a subscription.
- diagram Diagram of a network
- Real-time communication between two or more people
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Interactive websites where people create and share user-generated content with friends and family
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- limits the impact of a failure, so that the fewest number of devices are affected.
- Hosts that provide information
- Hosts that request information
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- allows people to share files with each other without having to store and download them from a central server
- Provides the physical connection to the network at the PC or other host device
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Describes the state of a network when the demand on the network resources exceeds the available capacity
Down
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Examples include copper, fiber and wireless
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Examples include routers, switches and wireless access points
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Type of network provides access to users over a small geographical area
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Private networks in use by just one company
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Having multiple paths to a destination
35 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Real-time communication between two or more people • Web pages that groups of people can edit and view together • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Identify devices, ports, and addressing scheme.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Web pages that groups of people can edit and view together
- Interactive websites where people create and share user-generated content with friends and family
- Type of network provides access to users over a large geographical area
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Type of network provides access to users over a small geographical area
- diagram Diagram of a network
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- Private networks in use by just one company
- Something that helps people work together on a particular file or piece of software
Down
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- limits the impact of a failure, so that the fewest number of devices are affected.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Examples include routers, switches and wireless access points
- Applications can be accessed over the Internet through a subscription.
- Provides the physical connection to the network at the PC or other host device
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
37 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Real-time communication between two or more people
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- limits the impact of a failure, so that the fewest number of devices are affected.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Having multiple paths to a destination
- Applications can be accessed over the Internet through a subscription.
- diagram Diagram of a network
- Web pages that groups of people can edit and view together
- Type of network provides access to users over a large geographical area
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- hooray
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Interactive websites where people create and share user-generated content with friends and family
- Hosts that provide information
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- allows people to share files with each other without having to store and download them from a central server
- identify the physical location of intermediary devices and cable installation.
Down
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Type of network provides access to users over a small geographical area
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Examples include copper, fiber and wireless
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Private networks in use by just one company
- Provides the physical connection to the network at the PC or other host device
- Hosts that request information
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include routers, switches and wireless access points
- Identify devices, ports, and addressing scheme.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
38 Clues: hooray • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cybersecurity 2023-06-04
Across
- process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- when a programmer gains access to a computer or network by bypassing security steps through a trapdoor programs
- a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device
- provides additional- revised or updated code for an operating system or application
- software that is secretly installed on a user’s device to gather sensitive data
- someone who intentionally challenges the security of a computer system- network- or web application to discover vulnerabilities that an attacker or hacker could exploit
- information should be consistently and readily accessible for authorized parties
- attack when one or more compromised systems launch a flooding attack on a remote target(s)- in an attempt to overload network resources and disrupt service.
- a type of internet fraud that seeks to acquire a user’s credentials by deception- usually taking the form of fake notifications from banks- providers- e-pay systems- and other organizations.
- taking advantage of a vulnerability or flaw in a network system to penetrate or attack it.
- the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience.
- the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data
- an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other
- maintaining the consistency- accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit- and steps must be taken to ensure data cannot be altered by unauthorized people
Down
- assurance that information is not disclosed to unauthorized persons- processes- or devices.
- an attack method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- criminals who break into computer networks with malicious intent.
- an increasingly popular method of gaining access to unauthorized resources by exploiting human psychology and manipulating users – rather than by breaking in or using technical hacking techniques
- a facility where enterprise information systems (websites- applications- databases- data centers and servers- networks- desktops- and other endpoints) are monitored- assessed- and defended by SOC analysts.
- look for vulnerabilities in a system without the owner's permission or knowledge. If issues are found- they report them to the owner- sometimes requesting a small fee to fix the problem
- sometimes also called “ethical hackers” or “good hackers” – exploit computer systems or networks to identify their security flaws so they can make recommendations for improvement.
- the practice and study of techniques for secure communication in the presence of adversarial behavior.
- the process of verifying the identity of a user or piece of information and the veracity of the information provided. In computing- it is the process of identifying a person or system with a username- password- etc.
- encrypted parts of the internet that are not indexed by search engines- most notoriously used by all types of criminals including; pedophiles- illicit human and contraband traffickers- and cyber criminals- to communicate and share information without being detected or identified by law enforcement.
- a kind of spyware software that records every keystroke made on a computer’s keyboard
- when a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- a security system that forms a virtual perimeter around a network of workstations preventing viruses- worms- and hackers from penetrating.
- a general term for any type of intrusive computer software with malicious intent against the user.
- a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
- a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
30 Clues: criminals who break into computer networks with malicious intent. • software that is secretly installed on a user’s device to gather sensitive data • information should be consistently and readily accessible for authorized parties • provides additional- revised or updated code for an operating system or application • ...
tech terms 2025-04-29
Across
- (Personally Identifiable Information): Any data that could identify a specific individual, such as name, address, social security number, or email.
- Reality (VR): A computer-generated simulation of a 3D environment that users can interact with using special equipment like VR headsets.
- Malware (Malicious Software) refers to any software intentionally designed to cause harm to a computer system, such as viruses, worms, or ransomware.
- (Open Source Software): Software with source code that anyone can inspect, modify, and enhance freely.
- Property (IP): Legal rights that protect creations of the mind such as inventions, literary and artistic works, symbols, names, and images.
- is the process of restarting a computer or device, usually to apply changes, updates, or to troubleshoot issues.
- Modem (Modulator-Demodulator) is a device that converts digital data from a computer into analog signals that can be transmitted over telephone or cable lines, and vice versa. It allows computers to connect to the internet. What is a bit?
- (Portable Document Format) is a file format created by Adobe that preserves the original formatting of a document across devices and platforms. It's widely used for documents that require consistent display and printing.
- (Internet Protocol) is a set of rules that govern the format of data sent over the internet or a local network. It provides addressing for devices on a network and ensures data is routed correctly.
- Megabyte (MB) is a unit of data storage equal to 1,048,576 bytes or 1,024 kilobytes. It’s commonly used to measure file sizes, memory, or disk space.
- (Read-Only Memory): A type of non-volatile memory that holds data permanently, even when the computer is turned off; often contains firmware.
- Router is a device that forwards data packets between computer networks. It directs data from a local network to the internet or between different sub-networks within a larger network.
- The main circuit board of a computer that connects all components, including the CPU, memory, and peripheral devices.
- Cookies are small pieces of data stored by a web browser that help websites remember user preferences, login sessions, and browsing history. They can also be used for tracking and advertising purposes.
- A bit (short for binary digit) is the smallest unit of data in computing. It can have one of two values: 0 or 1. Bits are the building blocks for all data in computers. What is a byte?
- Ethernet is a widely used technology for local area networks (LANs), where computers and devices are connected using physical cables to allow data transmission.
Down
- Divide: The gap between individuals, households, or communities that have access to modern information and communication technology and those who do not.
- (HyperText Markup Language) is the standard language used to create and structure content on the web. It uses tags to format text, images, links, and other elements.
- A regularly updated website or web page, typically run by an individual or group, that is written in an informal or conversational style.
- The process of converting data into a coded format to prevent unauthorized access, typically using algorithms and keys.
- A computer or system that provides data, services, or resources to other computers (clients) over a network.
- Systems (OS) are system software that manage computer hardware and software resources. They provide services for computer programs, such as managing files, hardware components, and user interfaces. Examples include Windows, macOS, and Linux.
- Firewall is a security system that monitors and controls incoming and outgoing network traffic. It can be either hardware or software and is used to protect a network from unauthorized access or attacks.
- Systems:
- (Random Access Memory): A type of volatile memory used by computers to store data that is actively being used or processed.
- refers to the process of starting a computer or device from a powered-off state, loading the operating system to make it ready for use.
- (Domain Name System): The system that translates human-readable domain names (like www.google.com) into IP addresses that computers use to identify each other on the network.
- A byte consists of 8 bits. It is a standard unit of data storage that can represent a wide range of values (e.g., a character like 'A' or '1').
28 Clues: Systems: • (Open Source Software): Software with source code that anyone can inspect, modify, and enhance freely. • A computer or system that provides data, services, or resources to other computers (clients) over a network. • is the process of restarting a computer or device, usually to apply changes, updates, or to troubleshoot issues. • ...
Math & IT 2025-08-30
Across
- The time delay between an input and the corresponding output.
- A program that translates code from a high-level language into a lower-level one.
- A program that converts low-level symbolic instructions into machine-readable form.
- A process where a function calls itself to solve smaller instances of a problem.
- A numerical label used to divide an IP address into network and host parts.
- Modern firmware that initializes hardware, supports larger storage, and provides an interface before the operating system loads.
- The result of multiplying two or more numbers.
- A visual pattern of parallel lines representing information that can be read by a scanner.
- Two numbers whose greatest common divisor is 1.
- Random data added to a password before hashing to increase security.
- A connection point within a network that can send, receive, or process data.
- A computer that provides resources, data, or services to other machines over a network.
- A tool for encoding and decoding digital media files.
- A method of reasoning or proof where general conclusions are drawn from specific cases.
- The measure of detail in an image or display, given by the number of pixels.
- A mounted hardware unit with ports for managing and connecting network cables.
- A small external device that adds functionality or enables access to software or networks.
- The branch of mathematics dealing with basic number operations.
- A mathematical statement asserting that two expressions are equal.
- A base-16 numeral system using digits 0–9 and letters A–F.
- The creation of a virtual version of hardware, storage, or networks to run multiple systems on one machine.
- Firmware that initializes hardware and starts the boot process before the operating system loads.
- A set of rules governing communication between devices.
Down
- The point of interaction between two systems, devices, or programs.
- An error screen shown by some operating systems when the system encounters a critical failure.
- A number that indicates how many times a base is multiplied by itself.
- A symbol in logic or mathematics that specifies the quantity of elements under discussion.
- A number sequence where each term is the sum of the two preceding terms.
- A proven statement used as a stepping stone toward a larger result in mathematics.
- The result obtained by dividing one number by another.
- The number that is to be taken away in a subtraction.
- A condition where two figures or numbers have the same shape, size, or equivalence under a relation.
- A communication pathway that transfers data between components inside a computer.
- A device that connects devices in a network and forwards data only where needed.
- A program that directly executes instructions written in a high-level programming language.
- A cyberattack that tricks users into giving away sensitive information by pretending to be trustworthy.
- A CPU technology that allows one physical processor core to handle multiple instruction threads simultaneously.
- The lowest-level instructions understood directly by a computer’s CPU.
- The power to which a base must be raised to produce a given number.
- A temporary exchange of information between a user and a system.
- The product of all positive integers up to a given number.
- A file format containing instructions a computer can run directly.
- A method of combining multiple storage drives for improved performance, redundancy, or both.
- A rectangular arrangement of numbers or symbols in rows and columns.
- A device that directs data between computer networks.
- An organized collection of structured information stored electronically.
- Using a mobile device to share its internet connection with other devices.
- Unencrypted, readable data or text.
- A unit of volume representing a value in three-dimensional space.
- A piece of software or method that takes advantage of a system vulnerability.
- A small memory component powered by a battery that stores system settings such as time and configuration.
51 Clues: Unencrypted, readable data or text. • The result of multiplying two or more numbers. • Two numbers whose greatest common divisor is 1. • The number that is to be taken away in a subtraction. • A tool for encoding and decoding digital media files. • A device that directs data between computer networks. • The result obtained by dividing one number by another. • ...
"INTERNET" CROSSWORD 2021-04-22
Across
- To connect to a computer by entering your username and password
- An unofficial set of rules for how you should behave when communicating online
- a person who uses his/her computer skills to enter computers and networks without permission
Down
- The device that allows PCs to communicate over telephone lines
- .............can infect your files and corrupt your hard drive
- A cafeteria where you can use computers and access the internet while you drink or eat something.
- book in digital form
7 Clues: book in digital form • The device that allows PCs to communicate over telephone lines • .............can infect your files and corrupt your hard drive • To connect to a computer by entering your username and password • An unofficial set of rules for how you should behave when communicating online • ...
Cardiovascular System 2014-05-27
Across
- muscular pumping organ located medial to the lungs along the body's midline in the thoracic region
- red pigment used to transport oxygen in the blood
- smallest, thinnest, and most common of the blood vessels in the body
- red blood cells lack a nucleus, therefore they contain no...
- largest artery in the human body
- ____ portal vein arises from networks in the stomach, intestines, pancreas, and spleen
- red blood cells
- essential for respiration
Down
- this artery carries blood to the brachial (arm) and cephalic (head) regions
- the average human body contains 4 to __ liters of blood
- vessels lined with endothelium
- arteries that branch off the aorta to provide blood to the left and right side of the heart
- blood vessels that carry blood away from the heart
- coronary ____ vein on the posterior side of the heart that returns deoxygenated blood from the myocardium to the vena cava
- shape of erythrocytes
- removes toxins, stores sugars, and processes the products of digestion before they reach the other body tissues
- branch off from arteries and carry blood to capillaries
- carry blood back to the heart
18 Clues: red blood cells • shape of erythrocytes • essential for respiration • carry blood back to the heart • largest artery in the human body • vessels lined with endothelium • red pigment used to transport oxygen in the blood • blood vessels that carry blood away from the heart • the average human body contains 4 to __ liters of blood • ...
Computer Science Crossword 2024-03-26
Across
- Not just a passage, but a critical node that bridges distinct networks
- A notation used to classify algorithms by running time
- In one of the languages in this crossword, this punctuates the end of a statement
- A common network security system
- Ctrl + C
- Transforming data into a puzzle which only a key can solve
- This programming language shares its name with an Indonesian island
- Purposefully harmful and/or exploitative software
Down
- The core of an operating system
- Its serpentine name belies a language that's anything but constrictive
- Fundamental command in machine code that tells the computer what to do
- In C, this function allocates memory dynamically
- This sequence can be big or little, and is important for how data is interpreted
- He pioneered the shortest path algorithm
- A type of statement in almost all high level programming languages that repeats a block of code for a set amount of times
- A step-by-step procedure for calculations
- 1's and 0's
- The physical components of a computer system
18 Clues: Ctrl + C • 1's and 0's • The core of an operating system • A common network security system • He pioneered the shortest path algorithm • A step-by-step procedure for calculations • The physical components of a computer system • In C, this function allocates memory dynamically • Purposefully harmful and/or exploitative software • ...
Internet 2023-03-01
Across
- A worldwide system of computer networks.
- the traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
- (LAN)____ Area Network.
- ____ servers store files in the cloud which can be accessed through the internet (e.g. google drive, dropbox, etc)
- Data is sent either using a wire or _____.
- The fastest part of the internet, which connects very powerful servers together using high-speed, high-bandwidth connections.
- ____ servers handle web-based email.
- (WAN) ____ Area Network.
- (ISP)Internet _____ Provider.
Down
- A ____ directs traffic around within a LAN.
- A digital security system that checks all incoming and outgoing traffic on a network according to a defined set of rules.
- The global internet is powered by vast _____ cables.
- The inner part of the undersea cable(put a hyphen between 2 words)
- A set of rules governing the exchange or transmission of data between devices.
- Gb
- ____ servers store and maintain web content.
- ____ servers allow clients to stream music and video.
- ____ storage is a mode of computer data storage in which digital data is stored on servers in off-site locations.
18 Clues: Gb • (LAN)____ Area Network. • (WAN) ____ Area Network. • (ISP)Internet _____ Provider. • ____ servers handle web-based email. • A worldwide system of computer networks. • Data is sent either using a wire or _____. • A ____ directs traffic around within a LAN. • ____ servers store and maintain web content. • The global internet is powered by vast _____ cables. • ...
Vocabulary Crossword Puzzle 2022-12-06
Across
- customers needs that are satisfied by a product or service
- A physical property or feature
- directly approaching a employers and marketing yourself to them
- influences or motivations forces determine his buying
- A sales person welcoming a customer into the store
- Promoting the sale of goods
- A individual that fits a sellers criteria to be a potential customer
- Reasons to purchase something based on your feelings or emotions patronage
- goods to be bought or sold
- A method determining the value of an asset based on a selling price
Down
- marketing tactic to grow a business customer base through networks
- A products traits or attributes
- reasons to purchase something based on facts or logics
- Connecting things to your product to help the customers achieve their goals
- What makes your product or service better than others
- finding possible customers
- The process of expanding a existing product line
- A sales person asks the customer if he or she needs anything
18 Clues: finding possible customers • goods to be bought or sold • Promoting the sale of goods • A physical property or feature • A products traits or attributes • The process of expanding a existing product line • A sales person welcoming a customer into the store • influences or motivations forces determine his buying • What makes your product or service better than others • ...
COMMUNITY ORGANIZATION AND DEVELOPMENT 2025-03-07
Across
- A public campaign to raise awareness and support a cause
- The ability to take action and influence decisions in a community
- A meeting where community members discuss important issues
- A public gathering to voice concerns and suggest improvements
- Promoting long-term solutions that enhance the community's capacity to meet its own needs.
- A project designed to benefit the community
- A legal document that establishes a community organization
- The process of finding and training new community leaders
- A project designed to benefit the community
Down
- A group of people working together towards a common goal
- A survey conducted to understand community needs
- A set of principles guiding a community's actions
- Being responsive to changing circumstances and needs within the community.
- A small group working on a specific project within a community
- Financial aid provided to support community projects
- community's ability to withstand and recover from challenges such as natural disasters and economic downturns
- communities to take ownership of their development process.
- An event where people raise funds for a cause
- Capital builds social networks and trust among community members, leading to increased cooperation and collective action
- A place where people can seek help and resources
20 Clues: A project designed to benefit the community • A project designed to benefit the community • An event where people raise funds for a cause • A place where people can seek help and resources • A set of principles guiding a community's actions • A survey conducted to understand community needs • Financial aid provided to support community projects • ...
Networks and Factors Affecting Network Performance 2021-04-23
Across
- The delay from transmitting to receiving data
- How you can communicate on a LAN
- When you do not own the hardware to communicate on a WAN
- How you can communicate on a WAN
- Large geographical area
Down
- How you can communicate on a WAN
- The number of _____ which can affect the speed of the network
- Resending data due to errors with the network
- Wired connection that has a higher bandwidth
- How you can communicate on a LAN
- The amount of data that can travel across a network
- Small geographical area
12 Clues: Small geographical area • Large geographical area • How you can communicate on a WAN • How you can communicate on a LAN • How you can communicate on a LAN • How you can communicate on a WAN • Wired connection that has a higher bandwidth • The delay from transmitting to receiving data • Resending data due to errors with the network • ...
The fifth generation of cellular networks 2020-11-08
Across
- The spectrum used by 5G will potentially cause significant interference to this already widely used satellite technology.
- The high frequency spectrum used by 5G causes this destructive effect on beehives.
- The key antenna technology that enables 5G.
- The process that makes cellular waves to provide fast speeds but make them highly directional, not being able to cover large areas.
Down
- This in combination with 5G can enable the use of IOT on a massive scale.
- The wave spectrum used by the fastest form of 5G.
- The biggest cyber threat for 5G owing to the extremely large quantities of data transmitted.
- The maximum rate of error free data transmission by which 5G data speeds are bound (name of the barrier limit).
- Tesla Inc's satellite project that will make the implementation of 5G a lot more omnipresent.
- One metric in which 5G is still comparable to LTE and is years away from realizing its true potential.
10 Clues: The key antenna technology that enables 5G. • The wave spectrum used by the fastest form of 5G. • This in combination with 5G can enable the use of IOT on a massive scale. • The high frequency spectrum used by 5G causes this destructive effect on beehives. • The biggest cyber threat for 5G owing to the extremely large quantities of data transmitted. • ...
Crossword: Cybersecurity 2023-11-09
Across
- the current era characterized by widespread use of digital technology
- a person who uses computers to gain unauthorized access to data.
- a computer program that records every keystroke made by a computer user,
- concept of protecting computer systems, networks, and data from theft, damage, or unauthorized access
Down
- a type of disk storage composed of a thin and flexible disk of a magnetic storage medium
- Malicious software designed to spread from one computer to another
- a type of crime involving a computer or a computer network
- various types of malicious software, including viruses, worms, and spyware.
- process of converting information into a code to prevent unauthorized access
9 Clues: a type of crime involving a computer or a computer network • a person who uses computers to gain unauthorized access to data. • Malicious software designed to spread from one computer to another • the current era characterized by widespread use of digital technology • a computer program that records every keystroke made by a computer user, • ...
Cybersecurity 2024-02-06
Across
- A piece of software designed to fix security vulnerabilities or improve functionality.
- The process of converting information into a code to prevent unauthorized access.
- Software designed to harm or exploit computer systems and data.
- Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
- Network security device that monitors and controls incoming and outgoing network traffic.
- Process of verifying the identity of a user, system, or application.
- The practice of protecting systems, networks, and programs from digital attacks.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- Malicious software that can replicate itself and spread to other computers.
9 Clues: Software designed to harm or exploit computer systems and data. • Process of verifying the identity of a user, system, or application. • Malicious software that can replicate itself and spread to other computers. • The practice of protecting systems, networks, and programs from digital attacks. • ...
Networking Concept 2025-05-18
Across
- it is spread across a city
- each node is connected to every other node in the network. this type of topology can handle large data traffic
- a device that connects two different types of networks with each other
- used to physically attach a computer to a network commnication
- this kind of network connects one or more computers,located at a distant place
Down
- this topology uses a single communication line or one main cable to which all nodes are directly connected
- can be defined as a group of comps & other devices
- the computers which are in a network are called_______
- a computer network that is mainly created for an individual person
9 Clues: it is spread across a city • can be defined as a group of comps & other devices • the computers which are in a network are called_______ • used to physically attach a computer to a network commnication • a computer network that is mainly created for an individual person • a device that connects two different types of networks with each other • ...
Trial 6th Mar 2024-03-06
Across
- ________ refers to an algorithm’s ability to be codified and understood at least by some party. It is a property of an algorithm.
- AI’s ______ capability (i.e., its ability to think humanly) presents both managerial opportunities and challenges.
- Generative __________ networks involve involve two neural networks that make up a generator and a discriminator that function as adversaries.
- Employing Generative AI in enterprises can extend the level of assistance for workers and open up opportunities for ___________ and automation of the job, leading to new forms of collaborations between humans and machines.
Down
- __________ AI refers to the general capability of computers to understand and respond using natural human language.
- While discussing typologies of AI systems, we have discussed one that differentiates AI systems based on ______, technology and function.
- In the context of misuse of AI, we have discussed _________ that have become increasingly sophisticated over the past decade as a result of the low cost and ease of creating such media using x-to-image, x-to-video, and x-to-sound GAI models They are authentic media content designed to impersonate individuals, such as celebrities or politicians, and are created to entertain or manipulate the viewers.
- _________ refers to the openness or willingness to disclose on the part of the owners of the algorithm, and the amount that those owners wish to disclose or occlude. It implies disclosure.
- By design, the outputs of _________ AI models are probabilistic and not replicable compared to the deterministic outcomes of discriminative AI
- To reduce potential _________ bias, managers will need to be proactive by performing smallscale experiments and simulations before implementing such algorithms, regularly evaluating the dataset used for training, and using human reviewers who regularly provide feedback to system designers.
10 Clues: AI’s ______ capability (i.e., its ability to think humanly) presents both managerial opportunities and challenges. • __________ AI refers to the general capability of computers to understand and respond using natural human language. • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Identify devices, ports, and addressing scheme.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Web pages that groups of people can edit and view together
- Interactive websites where people create and share user-generated content with friends and family
- Type of network provides access to users over a large geographical area
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Type of network provides access to users over a small geographical area
- diagram Diagram of a network
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- Private networks in use by just one company
- Something that helps people work together on a particular file or piece of software
Down
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- limits the impact of a failure, so that the fewest number of devices are affected.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Examples include routers, switches and wireless access points
- Applications can be accessed over the Internet through a subscription.
- Provides the physical connection to the network at the PC or other host device
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
37 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Chapter 2 - Network Communication 2024-04-23
Across
- an HTML- embedded scripting language used to write web pages, uses server side processing
- cable made up of central copper core, insulation, copper mesh and outer insulation.
- store which holds data temporarily
- simple type of network that uses a single shared cable for communication
- software used to render a webpage
- simple component used to connect devices together in a LAN, sends to all devices regardless of intended recipient
- network covering a very large geographical area
- converts voice and webcam images into digital packages to be sent over the internet
- network that uses separate dedicated servers and specific client workstations. All client computers are connected to the dedicated servers.
- client machine that has sufficient hardware to do processing without network access
- practice of dividing networks into two or more groups of networks
- the same data is stored on several servers (actually a good thing as servers can break)
- protocol used by many wired LANs
- method of data storage where files are stored on servers instead of on a local drive (example: Google Drive)
- device that connects LANs which use different protocols.
- contiguous sequence of digital bits sent over a network/internet, often used for video and music
- object-orientated (or scripting) programming language used mainly on the web to enhance HTML pages, uses client side processing
- the main advantage of peer-to-peer
- large computer that handles requests from clients
- newer IP address format which uses 128 bits, such as A8F0:7FFF:F0F1:F000:3DD0:256A:22FF:AA00
- network component used in star topology, sends to only one specific device as specified by the recipient MAC address
- an IP address reserved for internal network use behind a router
- collection of multimedia web pages stored on a website, which uses the internet to access information from servers and other computers
- situation in which two messages/data from different sources are trying to transmit along the same data channel
- network consisting of cables, switches, and WAP
- network that can handle file requests WITHOUT any server
- company that provides you with internet access
Down
- network used by traditional telephones when making calls or when sending faxes
- cable made up of glass fibre wires which use pulses of light (rather than electricity) to transmit data
- type of wireless connection for short distance data transmission
- used to connect devices to a LAN wirelessly
- an IP address allocated by the user’s ISP to identify the location of their device on the internet
- type of cable in which two wires of a single circuit are twisted together. Several of them make up a single cable.
- smol computer that needs to make requests to a server
- text that links to a specific webpage
- one chunk of data that is sent along the network
- device that connects your LAN to the internet, also used to send data packets along the internet, can choose a direction
- main disadvantage of thick clients
- device used to boost a signal on both wired and wireless networks.
- gives domain names for internet hosts and is a system for finding IP addresses of a domain name
- must be at both ends of a bus topology network
- HTML
- these cards allow devices to connect to a network/internet (usually associated with a MAC address set at the factory
- IP address format which uses 32 bits, such as 200.21.100.6
- client machine that needs access to the network, cannot do much processing without the server
- more modern network topology, most LANs nowadays are set up like this, uses a switch to connect all components
- a method used to detect collisions and resolve the issue
- protocol of the internet
- network set up where all devices are connected via cables
- the type of electromagnetic waves uses for WiFi
- number of bits per second that can be transmitted over a network. It is a measure of the data transfer rate over a digital telecoms network
- device that connects LANs which use the same protocols.
52 Clues: HTML • protocol of the internet • protocol used by many wired LANs • software used to render a webpage • store which holds data temporarily • main disadvantage of thick clients • the main advantage of peer-to-peer • text that links to a specific webpage • used to connect devices to a LAN wirelessly • must be at both ends of a bus topology network • ...
What is the internet? 2025-02-11
Across
- Facts provided or trends learned about something or someone, often as a result of studying data.
- In computer science, a device that handles the exchange of digital information between different points in a network.
- An adjective that describes the ability of certain devices to send and receive radio signals over the air. It often refers to Wi-Fi networks and the networks operated by cell-phone companies to transmit data called up by phone users.
- A network of computers (hardware), known as servers, which are connected to the internet. They can be used to store data and computer programs (software) that can be accessed by one or many people at once, and from anywhere in the world.
- An adjective indicating that something has been developed numerically on a computer or on some other electronic device, based on a binary system (where all numbers are displayed using a series of only zeros and ones).
- Short for application, or a computer program designed for a specific task.
- The underlying structure of a system. The term usually refers to the basic physical structures and facilities on which a society depends. These include roads, bridges, sewers, drinking water supplies, electrical power grids and phone systems.
- The huge land masses that sit upon tectonic plates. In modern times, there are six established geologic continents: North America, South America, Eurasia, Africa, Australia and Antarctica. In 2017, scientists also made the case for yet another: Zealandia.
- A term for a computer — and especially the software on it — that provides services (hence, the name server) to other computers. A server computer program, for instance, stands ready to fulfill requests by its clients (which are other computer programs)
- Being almost like something. An object or concept that is virtually real would be almost true or real — but not quite. The term often is used to refer to something that has been modeled by (or accomplished by) a computer using numbers, not by using real-world parts. (in computing) Things that are performed in or through digital processing and/or the internet.
- Something with a thin, thread-like shape.
Down
- Something whose shape resembles a thread or filament.
- A system that can convert data or information into code that other people can’t easily decipher.
- A straight line from the center to the circumference of a circle or sphere.
- A moon orbiting a planet or a vehicle or other manufactured object that orbits some celestial body in space.
- Facts and/or statistics collected together for analysis but not necessarily organized in a way that gives them meaning. For digital information (the type stored by computers), those data typically are numbers stored in a binary code, portrayed as strings of zeros and ones.
- A disturbance or variation that travels through space and matter in a regular, oscillating fashion.
- The curved path of a celestial object or spacecraft around a galaxy, star, planet or moon. One complete circuit around a celestial body.
- An electronic device that connects your computer to the Internet. Modems also can translate digital data into analog mode, so that they can be sent across telephone lines.
- A group of interconnected people or things. (v.) The act of connecting with other people who work in a given area or do similar thing (such as artists, business leaders or medical-support groups), often by going to gatherings where such people would be expected, and then chatting them up. (n. networking)
- A flow of charge, usually from the movement of negatively charged particles, called electrons.
- A network of parts that together work to achieve some function.
- A technology that relies on a large number of base stations to relay signals. Each base station covers only a small area, which is known as a cell. Phones that rely on this system are typically referred to as cell phones.
- An electronic communications network. It allows computers anywhere in the world to link into other networks to find information, download files and share data (including pictures).
24 Clues: Something with a thin, thread-like shape. • Something whose shape resembles a thread or filament. • A network of parts that together work to achieve some function. • Short for application, or a computer program designed for a specific task. • A straight line from the center to the circumference of a circle or sphere. • ...
tle 2023-05-29
Across
- a computer networking device that builds connection with the other bridge networks which use the same protocol
- an 8-pin connection used for ethernet network adapters
- it uses radio frequencies or infrared waves to transmit data between devices on a LAN
- it is a cable used in transmission of video, communications and audio
- a popular type of cable that consists of two unshielded wires twisted around each other
- enable computers to communicate and they can pass information between two networks such as between your home network and the internet
- what do you call a wireless networking technology that allows computer and other devices to communicate over wireless signal
- what benefit of computer networking referred to a document tacking software which may be used to prevent users from making changes to files that are currently accessed by other users
- it is a network where the server manages data transmission and the client would have to first make a request from the server when data is required
- it is a computer network that interconnects computer within a limited area such as a residence, school, laboratories or university campus.
- it is a telecommunication network that extends over a large geographical area for primary purpose of computer networking
- also called a krone tool, is a hand tool used to connect telecommunications and network wires to a patch panel, punch down block, keystone module, or surface mount box
- it is the most basic networking that connects multiple computers or other network devices together
- it refers to the communication channels used to interconnect notes on a computer network
- connects devices on a computer network by using packet switching to receive and forward data to the destination device meaning they can identify the intended destination of the information that they receive
- it is a device used to conjoin two pieces of metal by deforming one of both of them in a way that causes them to hold each other
Down
- is a process of creating cable that will be used in creating a network between computer, routers, switches and storage network
- plugs into a hub, switch, or wired router and sends out wireless signals
- allows multiple devices to be connected and managed in a more efficient manner
- it is a device that converts computer-generated digital signals to enable their traveling via phone lines
- it covers larger area by connections Lans to a larger network of computer
- a device that is used to test the strength and connectivity of a popular type of cable or other wired assemblies
- a tool designed to remove the protective covering off of a cable to expose
- what do you call a device that is connected to the host such as a printer
- it is a cable configuration used in different devices for networking like desktop to a hub, router, etc.
- a type of network where the hosts are directly connected to one another without the use of any network devices
- it is a cable that contains optical fibers coated in plastic that are used to send data by pulses of light
- a type of configuration that enables users to connect similar devices such as desktop to another desktop
- inner wires
- this refer to reducing the amount of manpower required to manage data on the network
- it is a type of cabling that is used for telephone communication and most ethernet networks
- also known as wall jack or plate, it is used to cover a portion of a wall where there is an opening for networking outlets
- it is a group of interconnected devices under a single administrative control group that governs the security and access control policies enforced on the network
- It is a set of computers connected together for the purpose of sharing
34 Clues: inner wires • an 8-pin connection used for ethernet network adapters • it is a cable used in transmission of video, communications and audio • It is a set of computers connected together for the purpose of sharing • plugs into a hub, switch, or wired router and sends out wireless signals • it covers larger area by connections Lans to a larger network of computer • ...
CIW-NTA Lesson 1 Vocabulary 2025-01-08
Across
- (Abbreviation only.) A layered network architecture model of communication developed by the International Organization for Standardization (ISO). Defines seven layers of network functions.
- Any material that allows data to flow through it or be stored on it; includes hard and floppy disks, wire, cable, and fiber optics.
- A point in network communication at which information is processed more slowly. Also, any element (a hard drive, I/O card or network interface card) that slows network connectivity rates.
- An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
- A circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
- An operating system that manages network resources.
- The ability for a device to automatically track and report the user's location and availability.
- A computer that other computers can use to gain information; in network architecture, a host is a client or workstation.
- An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
- The coding necessary to create relationships in the data stored in a database.
- (Abbreviation only.)A technology that converts voice into data packets for transmission over a packet-switched IP network. It allows the use of the Internet for real-time voice and video traffic.
- A group of computers connected over an expansive geographic area so their users can share files and services.
- A group of computers connected within a confined geographic area.
- A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.
- The forms in which the data and business logic are presented on your screen. Presentation responsibilities include HTML forms and application-specific interfaces such as Web browsers.
- A model that, because of its age, may not support modern technologies without manipulation or upgrades.
Down
- Part of a larger structure; a common term used in networking.
- Information being stored, usually in a database.
- A command-based interface that allows a user to issue commands.
- A business trend that seeks to simplify and integrate all forms of communication. Also, a set of technologies that enable voice to be converted into text, and vice versa.
- The LAN access method used by Token Ring networks. A data frame, or token, is passed from one node to the next around the network ring.
- Software, infrastructure, and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.
- A peer-to-peer file sharing protocol used for distributing large amounts of data.
- The highest level in the computer network hierarchy, to which smaller networks typically connect.
- A device that contains a battery to provide power during a power outage.
- Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device attached to a network; a host.
- An open-source software platform that allows the storage, processing, and analysis of massive amounts of unstructured data; used primarily for cloud applications.
- The essential part of an operating system; provides basic services; always resides in memory.
- The ability of one computer system to communicate with another; often refers to different operating systems working together.
- (Include the dash)A series of systems that fulfill requests made by a client. Back-end systems can include mainframes and servers containing information databases.
- A computer in a network that manages the network resources and provides, or serves, information to clients.
- (Include the dash)A client that acts as an interface to a collection of servers (for example, mainframes or PC-based servers). A Web browser is a typical front-end client.
- (Include the period.)A windowing system used with UNIX and all popular operating systems.
33 Clues: Information being stored, usually in a database. • An operating system that manages network resources. • Part of a larger structure; a common term used in networking. • A command-based interface that allows a user to issue commands. • A group of computers connected within a confined geographic area. • ...
Math & IT 2025-08-30
Across
- The time delay between an input and the corresponding output.
- A program that translates code from a high-level language into a lower-level one.
- A program that converts low-level symbolic instructions into machine-readable form.
- A process where a function calls itself to solve smaller instances of a problem.
- A numerical label used to divide an IP address into network and host parts.
- Modern firmware that initializes hardware, supports larger storage, and provides an interface before the operating system loads.
- The result of multiplying two or more numbers.
- A visual pattern of parallel lines representing information that can be read by a scanner.
- Two numbers whose greatest common divisor is 1.
- Random data added to a password before hashing to increase security.
- A connection point within a network that can send, receive, or process data.
- A computer that provides resources, data, or services to other machines over a network.
- A tool for encoding and decoding digital media files.
- A method of reasoning or proof where general conclusions are drawn from specific cases.
- The measure of detail in an image or display, given by the number of pixels.
- A mounted hardware unit with ports for managing and connecting network cables.
- A small external device that adds functionality or enables access to software or networks.
- The branch of mathematics dealing with basic number operations.
- A mathematical statement asserting that two expressions are equal.
- A base-16 numeral system using digits 0–9 and letters A–F.
- The creation of a virtual version of hardware, storage, or networks to run multiple systems on one machine.
- Firmware that initializes hardware and starts the boot process before the operating system loads.
- A set of rules governing communication between devices.
Down
- The point of interaction between two systems, devices, or programs.
- An error screen shown by some operating systems when the system encounters a critical failure.
- A number that indicates how many times a base is multiplied by itself.
- A symbol in logic or mathematics that specifies the quantity of elements under discussion.
- A number sequence where each term is the sum of the two preceding terms.
- A proven statement used as a stepping stone toward a larger result in mathematics.
- The result obtained by dividing one number by another.
- The number that is to be taken away in a subtraction.
- A condition where two figures or numbers have the same shape, size, or equivalence under a relation.
- A communication pathway that transfers data between components inside a computer.
- A device that connects devices in a network and forwards data only where needed.
- A program that directly executes instructions written in a high-level programming language.
- A cyberattack that tricks users into giving away sensitive information by pretending to be trustworthy.
- A CPU technology that allows one physical processor core to handle multiple instruction threads simultaneously.
- The lowest-level instructions understood directly by a computer’s CPU.
- The power to which a base must be raised to produce a given number.
- A temporary exchange of information between a user and a system.
- The product of all positive integers up to a given number.
- A file format containing instructions a computer can run directly.
- A method of combining multiple storage drives for improved performance, redundancy, or both.
- A rectangular arrangement of numbers or symbols in rows and columns.
- A device that directs data between computer networks.
- An organized collection of structured information stored electronically.
- Using a mobile device to share its internet connection with other devices.
- Unencrypted, readable data or text.
- A unit of volume representing a value in three-dimensional space.
- A piece of software or method that takes advantage of a system vulnerability.
- A small memory component powered by a battery that stores system settings such as time and configuration.
51 Clues: Unencrypted, readable data or text. • The result of multiplying two or more numbers. • Two numbers whose greatest common divisor is 1. • The number that is to be taken away in a subtraction. • A tool for encoding and decoding digital media files. • A device that directs data between computer networks. • The result obtained by dividing one number by another. • ...
Module 1-3 Review 2021-03-31
5 Clues: malicious code • network of networks • a type of topology that maps the physical location of the devices • a restricted network (usually where all the company's data is stored • a network where some of the company's data can be accessed to a subset of approved consumers or suppliers
IS 2021-08-20
5 Clues: What is Stuxnet • Which is the least secure method of authentication • a code injecting method used for attacking db of a system. • a complementary mechanism to OpenID and is used to create SSO systems • a popular tool used for discovering networks as well as in security auditing.
Bruin AI Crossword Puzzle Week 7 2023-11-12
Across
- Relating to networks that mimic the human brain's structure.
- The study of communication and control in animals and machines.
- - Type of neural network used in image recognition.
Down
- Technique in unsupervised learning, grouping similar data points.
- - Making predictions based on data and patterns. Clue: Anticipating outcomes based on patterns
5 Clues: - Type of neural network used in image recognition. • Relating to networks that mimic the human brain's structure. • The study of communication and control in animals and machines. • Technique in unsupervised learning, grouping similar data points. • - Making predictions based on data and patterns. Clue: Anticipating outcomes based on patterns
NTA Lesson 1 Vocab 2024-01-09
Across
- Information being stored, usually in a database.Information being stored, usually in a database.
- A technology that converts voice into data packets for transmission over a packet switched IP network. It allows the use of the Internet for real time voice and video traffic.
- The highest level in the computer network hierarchy, to which smaller networks typically connect.
- A point in network communication at which information is processed more slowly. Also, any element (a hard drive, I/O card or network interface card) that slows network connectivity rates.
- An organization that maintains a gateway to the Internet and rents access to customers on a per use or subscription basis.
- A command based interface that allows a user to issue commands.
- An open source software platform that allows the storage, processing, and analysis of massive amounts of unstructured data; used primarily for cloud applications.
- Part of a larger structure; a common term used in networking.
- Software, infrastructure, and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.
- Any material that allows data to flow through it or be stored on it; includes hard and floppy disks, wire, cable, and fiber optics.
- A peer to peer file sharing protocol used for distributing large amounts of data.
- A computer that other computers can use to gain information; in network architecture, a host is a client or workstation.
- An operating system that manages network resources.
- A group of computers connected over an expansive geographic area so their users can share files and services.
- The ability for a device to automatically track and report the user's location and availability.
- A device that routes packets between networks based on network layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.
- A client that acts as an interface to a collection of servers (for example, mainframes or PC based servers). A Web browser is a typical front end client.
- The forms in which the data and business logic are presented on your screen. Presentation responsibilities include HTML forms and application specific interfaces such as Web browsers.
- The ability of one computer system to communicate with another; often refers to different operating systems working together.
Down
- A circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
- The coding necessary to create relationships in the data stored in a database.
- A layered network architecture model of communication developed by the International Organization for Standardization (ISO). Defines seven layers of network functions.
- A business trend that seeks to simplify and integrate all forms of communication. Also, a set of technologies that enable voice to be converted into text, and vice versa.
- An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
- Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device attached to a network; a host.
- A computer in a network that manages the network resources and provides, or serves, information to clients.
- A windowing system used with UNIX and all popular operating systems.
- The LAN access method used by Token Ring networks. A data frame, or token, is passed from one node to the next around the network ring.
- A device that contains a battery to provide power during a power outage.
- A group of computers connected within a confined geographic area.
- A series of systems that fulfill requests made by a client. Back end systems can include mainframes and servers containing information databases.
- The essential part of an operating system; provides basic services; always resides in memory.
- A model that, because of its age, may not support modern technologies without manipulation or upgrades.
33 Clues: An operating system that manages network resources. • Part of a larger structure; a common term used in networking. • A command based interface that allows a user to issue commands. • A group of computers connected within a confined geographic area. • A windowing system used with UNIX and all popular operating systems. • ...
information security 2023-08-28
Across
- networks of computers and devices managed as a unit with the same procedures and rules.
- intent of doing harm
- rights an individual or organization has over information and how it is used.
- gap or weakness which undermines an organization’s security efforts.
- calculated assessment of potential threats to an organization’s security.
- State of being complete or uncorrupted
- Short for malicious software and covers threats such as viruses, worms, trojans, Horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive info on a computer.
- how information is protected
Down
- making sure a person is who they say they are.
- Information or date which can be accessed when needed.
- procedure used to determine users privilege or access levels to the system.
- requirement of being private or secret
- virus macros which have been programmed to carry out malicious intent
13 Clues: intent of doing harm • how information is protected • requirement of being private or secret • State of being complete or uncorrupted • making sure a person is who they say they are. • Information or date which can be accessed when needed. • gap or weakness which undermines an organization’s security efforts. • ...
Famous Inventions 2024-11-03
Across
- An electronic communication network that connects computer networks and organisational computer facilities around the world.
- Plastic building blocks that snap together to create objects like houses, vehicles, and robots.
- This is a small everyday item for securing papers, mostly made of metal or plastic.
- A large, flat device used to project images for presentations or movies.
- A device for capturing images.
- small, portable computer you can carry with one hand.
Down
- Thomas Alva Edison is credited with inventing this illuminating device.
- A hand-held device used to input data into a computer by controlling the cursor on the screen.
- Essential invention by the Wright brothers that enabled human flight.
- A primary hardware system that runs programs and apps.
- Invention by Alexander Graham Bell that revolutionised long-distance communication.
- A gadget worn on the wrist to tell time and sometimes check notifications.
- A device used for printing on paper from a computer.
13 Clues: A device for capturing images. • A device used for printing on paper from a computer. • small, portable computer you can carry with one hand. • A primary hardware system that runs programs and apps. • Essential invention by the Wright brothers that enabled human flight. • Thomas Alva Edison is credited with inventing this illuminating device. • ...
Vocabulary Review #2 - Factors of Population Growth 2017-01-04
Across
- Humans use this type of land to grow food.
- A forest, minerals, fresh water
- Some countries such as China or the former Soviet Union, forced people to live in certain areas.
- People are unevenly spread throughout the world. They live close to the coast as well, capital resources, and economic development
Down
- Transportation networks such as roads, trains, subways, or buses are more heavily populated
- Oceans, lakes, rivers, mountains, plains, plateaus, volcanoes, canyons, valleys, gulfs, bays
- People live in areas where job opportunities are available.
- Urban areas have buildings that are closer together while rural areas are spread farther apart.
- 10,000 per square mile
9 Clues: 10,000 per square mile • A forest, minerals, fresh water • Humans use this type of land to grow food. • People live in areas where job opportunities are available. • Transportation networks such as roads, trains, subways, or buses are more heavily populated • Oceans, lakes, rivers, mountains, plains, plateaus, volcanoes, canyons, valleys, gulfs, bays • ...
AI Theme 2023-05-22
Across
- The OpenAI language model designed for conversational purposes
- A branch of AI that focuses on training machines to learn from and make predictions or decisions based on data
- The ability of a machine to understand and interpret human language
- The branch of knowledge that deals with moral principles
- Sets of rules that tell the computer how to perform a task using code
Down
- Set of techniques used to create machines capable of simulating human intelligence.
- Machine learning technique based on the model of neural networks
- A type of AI algorithm that mimics the structure and functionality of the human brain
- information needed for the AI to work properly
9 Clues: information needed for the AI to work properly • The branch of knowledge that deals with moral principles • The OpenAI language model designed for conversational purposes • Machine learning technique based on the model of neural networks • The ability of a machine to understand and interpret human language • ...
Personal Finance Chapter 1 Vocabulary 2023-01-03
Across
- Someone who organizes, manages, and assumes the ownership risk of a new business
- Daily activities of the job and the environment in which they must be performed
- Advancement to a position of greater responsibility and higher pay
- An evaluation of the positive and negative attributes of a given career
- The amount of monthly or annual pay that you will earn for your labor
Down
- Specialized, intensive programs that prepare students for higher-level work responsibilities
- Organizations that offer services related to careers and employment
- company-provided supplements to salary, such as sick pay, vacation time, and health insurance
- Informal groups of people with common interests who interact for mutual assistance
9 Clues: Advancement to a position of greater responsibility and higher pay • Organizations that offer services related to careers and employment • The amount of monthly or annual pay that you will earn for your labor • An evaluation of the positive and negative attributes of a given career • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Identify devices, ports, and addressing scheme.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Web pages that groups of people can edit and view together
- Interactive websites where people create and share user-generated content with friends and family
- Type of network provides access to users over a large geographical area
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Type of network provides access to users over a small geographical area
- diagram Diagram of a network
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- Private networks in use by just one company
- Something that helps people work together on a particular file or piece of software
Down
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- limits the impact of a failure, so that the fewest number of devices are affected.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Examples include routers, switches and wireless access points
- Applications can be accessed over the Internet through a subscription.
- Provides the physical connection to the network at the PC or other host device
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
37 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Identify devices, ports, and addressing scheme.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Web pages that groups of people can edit and view together
- Interactive websites where people create and share user-generated content with friends and family
- Type of network provides access to users over a large geographical area
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Type of network provides access to users over a small geographical area
- diagram Diagram of a network
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- Private networks in use by just one company
- Something that helps people work together on a particular file or piece of software
Down
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- limits the impact of a failure, so that the fewest number of devices are affected.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Examples include routers, switches and wireless access points
- Applications can be accessed over the Internet through a subscription.
- Provides the physical connection to the network at the PC or other host device
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
37 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cyber Safety Basics 2025-11-02
Across
- create this using letters, numbers, and symbols
- protecting electronic devices, networks, and sensitive information
Down
- by clicking this in emails and websites can lead to malware and viruses
- responsibly using technology and resources available through the internet
- be careful when using this public access to log into your computer
5 Clues: create this using letters, numbers, and symbols • be careful when using this public access to log into your computer • protecting electronic devices, networks, and sensitive information • by clicking this in emails and websites can lead to malware and viruses • responsibly using technology and resources available through the internet
T1Q1 2017-11-23
4 Clues: Browser automation tool • open source - time series visualizer • Distributed storage and processing - Open source • The wireless networking standard that is useful for creating small personal area networks is
Vocabulary game 2023-05-25
Across
- A high-ranking military officer who commands a large group of soldiers.
- A type of substitution cipher used for encoding messages.
- A system of symbols used to convey a hidden or secret message.
- Fights or conflicts between opposing forces, often in a war or military context.
Down
- Portable electronic devices used for communication, typically via voice calls and text messages.
- Individuals who serve in the military and follow the orders of their superiors.
- A person who leads or guides a group of people.
- Individuals or groups that are considered adversaries or opponents.
- Electronic messages sent over the internet or computer networks.
9 Clues: A person who leads or guides a group of people. • A type of substitution cipher used for encoding messages. • A system of symbols used to convey a hidden or secret message. • Electronic messages sent over the internet or computer networks. • Individuals or groups that are considered adversaries or opponents. • ...
Name : 2023-11-08
Across
- several different sorts of the same thing10. to arrive at the place that you have been travelling to
- able to make sensible decisions and give good advice
- that can develop into something or be developed in the future
- a process of teaching, training and learning to improve knowledge and develop skills
- the effect that something has on somebody/something
Down
- to gradually grow or become bigger, more advanced, stronger
- a task or piece of work that somebody is given to do, usually as part of their job
- an international computer network connecting other networks and computers
- a way of entering or reaching a place
9 Clues: a way of entering or reaching a place • the effect that something has on somebody/something • able to make sensible decisions and give good advice • to gradually grow or become bigger, more advanced, stronger • that can develop into something or be developed in the future • an international computer network connecting other networks and computers • ...
Information Managment 2025-09-23
Across
- A business function that involves people, data, processes and organization of data for business.
- The accuracy of data and the validity of it.
- Understanding the challenges that came and are coming and learning how to overcome them and how to avoid those challenges.
- Anything that is made from the mind like ideas and inventions.
- A secret process that gives an advantage to a company and has economic value.
Down
- A computer system that allows the information management business function.
- Anything that is valuable but cannot be found in real life.
- The protection of networks, data and information from unauthorized access.
- An unbiased observation that investigates the safety and accuracy of information.
9 Clues: The accuracy of data and the validity of it. • Anything that is valuable but cannot be found in real life. • Anything that is made from the mind like ideas and inventions. • The protection of networks, data and information from unauthorized access. • A computer system that allows the information management business function. • ...
FAKE NEWS 2019-11-25
Across
- to consider to be true or honest
- to open or expand over a larger area
- giving the same result on successive trials
- a person employed by a newspaper, magazine, or radio or television station to gather, write, or report news
- the spreading of ideas, information, or rumor for the purpose of helping or injuring an institution, a cause, or a person
- to control or take advantage of by artful, unfair, or insidious means
Down
- being exactly as appears or as claimed
- to create a false or misleading impression
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- wit, irony, or sarcasm used to expose and discredit vice or folly
- information that is not completely true or accurate
- a group involved in secret or criminal activities
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- easily duped or cheated
- an act intended to trick or dupe
15 Clues: easily duped or cheated • to consider to be true or honest • an act intended to trick or dupe • to open or expand over a larger area • being exactly as appears or as claimed • to create a false or misleading impression • giving the same result on successive trials • a group involved in secret or criminal activities • information that is not completely true or accurate • ...
cyberspace 2021-11-08
Across
- technology the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
- transfer a file or program to a smaller computer
- a sequence of instructions that a computer can execute
- locate and correct errors in a computer program code
- a set sequence of steps, part of larger computer program
- transfer data into a database or document
Down
- a facial expression represented by a sequence of characters
- the mechanical components making up a computer system
- transfer out of a database or document
- an instruction connecting one part of a program to another
- a listing of the computer files stored in memory
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- the organization of data according to preset specifications
- a worldwide network of computer networks
- an electronic storage device
15 Clues: an electronic storage device • transfer out of a database or document • a worldwide network of computer networks • transfer data into a database or document • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • ...
unit 4 2023-05-11
Across
- In super position theorem while finding individual responses other voltage sources are -----
- This theorem is applicable for nonlinear networks also
- Maximum power transfers from the AC network to load when load impedance is equal to ---- of Thevenins impedance
- theorem used to find errors in readings of ammeters
- this theorem is useful when many voltage sources with resistances are connected in parallel
- this theorem is application of Thevenins theorem
- Nortons circuit consists --------- in parallel with a resistor
- Any network can be reduced in to a current source in parallel with a resistor
Down
- Total response is sum of individual responses
- Maximum power transfers from the network to load when load resistance is equal to
- current through the short circuited load terminals
- Ratio of excitation to response is same after interchanging the positions of excitation and response
- Any network can be reduced in to a voltage source in series with a resistor
- Thevenins circuit consists --------- in series with a resistor.
- Vth is the voltage across -------------- load terminals
15 Clues: Total response is sum of individual responses • this theorem is application of Thevenins theorem • current through the short circuited load terminals • theorem used to find errors in readings of ammeters • This theorem is applicable for nonlinear networks also • Vth is the voltage across -------------- load terminals • ...
Cyberbullying 2013-11-03
Across
- (n.)an orderly, often imposing arrangement, an impressive display or range of a particular type of thing.
- (adj.)(the latter) denoting the second or second mentioned of two people or things.
- (v.)to disregard or overlook (something illegal, objectionable, or the like).
- (v.)to cover; conceals, to hide something.
- (adj.)having the same measure; of equal extent or duration.
- (v.)to come together; assemble, especially in large number.
- (v.)to communicate; impart; make known.
- (adj.)planned or accomplished together; combined.
Down
- (n.)a person or group that has an investment, share, or interest in something.
- (v.)to impose as something that must be borne or suffered (anything unwelcome).
- (n.)a single depression of a key on a keyboard, especially as a measure of work.
- (n.)the notional environment in which communication over computer networks occurs.
- (v.)to remain; continue; stay.
- (adj.)frank; outspoken; open and sincere.
- (v.)to discourage or restrain from acting or proceeding; to prevent.
15 Clues: (v.)to remain; continue; stay. • (v.)to communicate; impart; make known. • (adj.)frank; outspoken; open and sincere. • (v.)to cover; conceals, to hide something. • (adj.)planned or accomplished together; combined. • (adj.)having the same measure; of equal extent or duration. • (v.)to come together; assemble, especially in large number. • ...
Network 2015-03-31
Across
- A network where each node connects to a central hub with a point to point connection is sai to have a _______ topography.
- Often referred to as a network cable.
- This security feature, which can be software or hardware, was designed to Deny or Allow inbound or outbound network traffic.
- Any device that connects to a network must have a(n) _____ installed.
- Any device connected to a network.
- The Internet is the largest example of this type of ntwrk.
- A local area network without cables
- The physical design of a network including the devices, location, and cable installation.
- In a Bus Topography, the cable that runs between th nodes and their dedicated cables is called the _________.
- A shared network location from where data can be retrieved.
Down
- A device that routes information between interconnected networks.
- The “M” in MAN
- LAN where each node is connected to single cable.
- This networking device transmits data only to intended recipient’s port.
- A device that is requesting information.
15 Clues: The “M” in MAN • Any device connected to a network. • A local area network without cables • Often referred to as a network cable. • A device that is requesting information. • LAN where each node is connected to single cable. • The Internet is the largest example of this type of ntwrk. • A shared network location from where data can be retrieved. • ...
Digital citizenship 2017-09-08
Across
- The electronic responsibility for actions and deeds, ethical or unethical
- The dangers to children presented by strangers
- The idea that under circumstances, sections of copyright material may be used without permission
- Appropriate, responsible behavior in regard to technology use
- Information of someone's identity shared over public networks
Down
- Websites or apps that allow people to create and share content
- The correct or acceptable way of using the internet
- The relationship between copyrighted material and user permissions
- The use of the internet and social media to bully someone
- When a writer duplicates someone else's work from the internet and calls it their own
- A password that is difficult to detect by humans and computers
- Digital information of a person as a result of their online activity
- The use of digital technology to change the way research is undertaken
- Maximizing someones personal safety against security risks of private information and property
- The state of being available to the public as a whole, without copyright
15 Clues: The dangers to children presented by strangers • The correct or acceptable way of using the internet • The use of the internet and social media to bully someone • Appropriate, responsible behavior in regard to technology use • Information of someone's identity shared over public networks • Websites or apps that allow people to create and share content • ...
Computer Science 2017-12-08
Across
- Reserved areas of memory in every computer
- ____ flash drive
- A website where a person writes about the latest news and things that are going on in their life.
- An organization that provides access to the Internet. otherwise known as Internet Service Provider
- it is a scam to steal valuable information such as credit card and social security numbers Also known as "brand spoofing,
- a large network made up of smaller networks
- The primary method for keeping a computer secure from intruders
- opposite of Hardware
Down
- The computing part of the computer. otherwise known as Central Processing Unit
- opposite of Software
- The address that defines the route to a file on an Internet server
- Computer people may use the term for capability and time
- The fundamental display element of an electronic screen or bitmapped image
- A website that serves employees only, most larger companies have one.
- created by a website that is stored in the user's computer
15 Clues: ____ flash drive • opposite of Software • opposite of Hardware • Reserved areas of memory in every computer • a large network made up of smaller networks • Computer people may use the term for capability and time • created by a website that is stored in the user's computer • The primary method for keeping a computer secure from intruders • ...
1940s TV 2023-11-19
Across
- Initial lack of these made television broadcasting challenging.
- NBC, CBS, and ABC are examples of television ___________.
- These were initially absent in the early days of television broadcasting, leading to compatibility issues and hindering the establishment of a cohesive broadcasting system.
- a local broadcaster, owned by a company other than the owner of the network
- The type of tube used in early televisions to generate an image on a screen
- Band primarily used by NBC, CBS, and ABC for broadcasting.
- The process of converting visual images into electrical signals.
- Band on which DuMont primarily operated, limiting its coverage.
- Interference faced during transmission affecting television signal quality.
Down
- Inventor credited with the electronic television system in 1927.
- The concept pioneered by DuMont with "The Cavalcade of Stars."
- Concept pioneered by DuMont with "The Ernie Kovacs Show." (2 words)
- DuMont faced financial struggles as it did not own any of these.
- The fate of DuMont after network operations ceased.
- Established as a radio network in 1926, later becoming a major television network.
- The first major television network established in the United States in 1941.
16 Clues: The fate of DuMont after network operations ceased. • NBC, CBS, and ABC are examples of television ___________. • Band primarily used by NBC, CBS, and ABC for broadcasting. • The concept pioneered by DuMont with "The Cavalcade of Stars." • Initial lack of these made television broadcasting challenging. • ...
Computer Science 2024-04-29
Across
- A high-level programming language used to create applications.
- To convert information or data into a secure code.
- Not connected to or served by the Internet or other network.
- A type of memory organization or image file format used for storage of digital images.
- A collection of data duplicating original values stored elsewhere or computed earlier.
- Software designed to interfere with a computer's normal functioning.
- The central part of an operating system, managing system resources.
Down
- A unit of information equal to one billion bytes.
- A global network connecting millions of private, public, academic, business, and government networks.
- A process or set of rules to be followed in calculations or other problem-solving operations.
- A high-level programming language known for its clear syntax and readability.
- A group of two or more computer systems linked together.
- A structured set of data held in a computer.
- A part of a computer system or network designed to block unauthorized access.
- Someone who uses computers to gain unauthorized access to data.
15 Clues: A structured set of data held in a computer. • A unit of information equal to one billion bytes. • To convert information or data into a secure code. • A group of two or more computer systems linked together. • Not connected to or served by the Internet or other network. • A high-level programming language used to create applications. • ...
weathering, erosion, and deposition 2024-12-09
Across
- excess water
- material carried by a stream
- the level or nearly level land that borders a river and is covered by river water in a floodtime
- occurs when rainwater or melted ice soaks into tiny cracks in a rock and freezes
- when wind or running water carries away rock fragments
- networks of underground cavities caused by erosion
- feed into the river at various points along its course, increasing the amount of water it carries
Down
- involves the breaking or peeling away of rock in layers.
- when eroded rock fragments are eventually set down in a new location
- source of the river
- when running water eventually carves a channel, or gully, in the ground that cannot be repaired by ordinary cultivation
- pools up on the ground and runs downhill, stripping away a thin sheet of topsoil
- natural formed ridge at the edge of a river
- winding, looping curves in a river
- large streams that carry water from the mountains to the sea
15 Clues: excess water • source of the river • material carried by a stream • winding, looping curves in a river • natural formed ridge at the edge of a river • networks of underground cavities caused by erosion • when wind or running water carries away rock fragments • involves the breaking or peeling away of rock in layers. • ...
Improving Human Wellbeing 2025-11-08
Across
- The acronym used for charities or organisations that are not associated with the government
- A charity that secures food and provides it to people in need
- The suburb of the Ramadan Night Markets in South-west Sydney
- The physical and intagible things passed down through generations
- A holy month in the Islamic calendar
- A suburb in Sydney were the Aboriginal Medical Service was established in 1971
- The acronym for organisations run for and by Aborigial and Torres Strait Islander peoples
Down
- Refers to people and social networks that individuals belong to
- Some examples of this include traditions, beliefs, values and customs
- A country that receives aid from Australia
- One Closing the Gap initiative associated with life expectancy and access to care
- A social factor associated with school attendance and completion rates
- An economic factor associated wtih creating more job opportunities
- The promotion of human welfare
- Something a government provides either at a national or international level
15 Clues: The promotion of human welfare • A holy month in the Islamic calendar • A country that receives aid from Australia • The suburb of the Ramadan Night Markets in South-west Sydney • A charity that secures food and provides it to people in need • Refers to people and social networks that individuals belong to • ...
Cyber Ethics 2025-05-22
Across
- The combination of the word net and etiquetee.
- The combination of the word voice and phishing.
- Legal rules and restrictions imposed on online users.
- Equivalent term to hacking.
- Unwanted bulk emails that come from unknown sources.
- The act of using and imitating the language and thoughts of another parson as one's original work.
- Accessing the internet in an illegal manner
Down
- Type of a cybercrime that includes sending an email to a user,misleading him to believe that it is from a trusted person or an organisation.
- When software is copied and distributed illegally.
- Hacking which is done for a good cause.
- Criminal activities that involve the use of computers, networks,and the internet connections with the intent to cause harm to individuals.
- Illegal intrusion into a computer system or network.
- Program that disrupts the normal functioning of a computer
- When spam attackers keep sending bulk emails till the mail server gets full.
- Security system that prevents unauthorised people from accessing your system.
15 Clues: Equivalent term to hacking. • Hacking which is done for a good cause. • Accessing the internet in an illegal manner • The combination of the word net and etiquetee. • The combination of the word voice and phishing. • When software is copied and distributed illegally. • Illegal intrusion into a computer system or network. • ...
The Brain and Behaivor 2025-08-28
Across
- Coordinates leg and arm movements and has a role in social thinking and social behavior.
- The brain and spinal chord
- Controls many vital functions and regulates reflexes.
- Nerves that carry information out of the brain and spinal cord to other areas of the body.
- Networks of nerve cells that integrate sensory input and motor output
- The lowest part of the brain located at the brains rear.
- A part of the Peripheral nervous system that takes messages to and from the body's internal organs.
- Nerves that carry information from sensory receptors to the brain and spinal cord.
Down
- Responsible for the most complex mental function.
- The most ancient part of the brain
- The brains largest division and its most foreword part.
- The brains special ability for change.
- The network of Nerves that connects the brain and spinal cord to other parts of the body.
- A part of the Peripheral nervous system that is also known as sensory nerves.
- The bodies electrochemical communication circuitry
15 Clues: The brain and spinal chord • The most ancient part of the brain • The brains special ability for change. • Responsible for the most complex mental function. • The bodies electrochemical communication circuitry • Controls many vital functions and regulates reflexes. • The brains largest division and its most foreword part. • ...
workplace communication 2026-01-12
Across
- a group of people who gather together to listen to something or watch something
- helpful information or criticism that is given to someone to say what can be done to improve a performance, product, etc.
- the oral, written, and visual communicative activities used in a workplace
- The exchange of news or information
- to clear up confusion and make it all understandable
- the sharing of ideas through the spoken and written word
- the failure of communicating clearly the intended message or idea
- use of physical behavior, expressions, and gesture
- the learned process of receiving, interpreting, recalling, evaluating, and responding to verbal and nonverbal messages
Down
- the development and expression of ideas in writing
- the process of conveying a message without the use of words
- any communication using digital media and networks
- use of visual elements to convey ideas and information
- the social expectations around how to behave in various interactions in society
- how you utilise words or phrases to create an impact on the audience
15 Clues: The exchange of news or information • the development and expression of ideas in writing • any communication using digital media and networks • use of physical behavior, expressions, and gesture • to clear up confusion and make it all understandable • use of visual elements to convey ideas and information • the sharing of ideas through the spoken and written word • ...
EMPOWERMENT TECHNOLOGY 2021-04-05
Across
- The user is able to see website differently than others which he can make his personal accounts
- the do’s and don’ts of online communication
- a malicious program designed to transfer from one computer to another in any means possible
- a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot
- manipulated by the user.
Down
- Sites that allow users to post their own news items or links to other news sources.
- an electronic device for storing and processing data
- It deals with the use of different communication technologies
- is the global system of interconnected computer networks that uses protocol
9 Clues: manipulated by the user. • the do’s and don’ts of online communication • an electronic device for storing and processing data • It deals with the use of different communication technologies • is the global system of interconnected computer networks that uses protocol • a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot • ...
puzzle 43 2023-03-30
Across
- a cover or shell that protects or encloses something
- A device containing an electric cell or a series of electric cells storing energy that can be converted into electrical power
- is a physical docking point using which an external device can be connected
- a flat panel or area on an electronic device
- communication device, which is used to produce sound
Down
- translates sound vibrations in the air into electronic signals and scribes them to a recording medium or over a loudspeaker
- is a worldwide system of computer networks
- in a prominent place in order that it may readily be seen
- is an application for accessing websites
9 Clues: is an application for accessing websites • is a worldwide system of computer networks • a flat panel or area on an electronic device • a cover or shell that protects or encloses something • communication device, which is used to produce sound • in a prominent place in order that it may readily be seen • ...
EF Selection Day - The Last Minute Challenge 2023-04-06
Across
- A term used to describe a startup that reaches a $10 billion valuation
- A popular book on entrepreneurship by Peter Thiel
- A popular programming language used for data analysis and machine learning
- A type of business model where customers pay a recurring fee for access to a product or service
- A digital currency created by Facebook
Down
- A type of alternative financing that allows companies to raise funds from the public
- A technology used for decentralized finance and trading on blockchain networks
- A popular online collaboration tool acquired by Salesforce
- A term used to describe the use of artificial intelligence in automating customer service
9 Clues: A digital currency created by Facebook • A popular book on entrepreneurship by Peter Thiel • A popular online collaboration tool acquired by Salesforce • A term used to describe a startup that reaches a $10 billion valuation • A popular programming language used for data analysis and machine learning • ...
Mrs. Dewey's CSIT - Network Types Vocab Review 2024-02-26
Across
- a group of computers and peripheral devices that share a common communications line or wireless link to a server (LAN)
- a network of multiple devices in a limited geographical area
- WLAN) A network that provides connectivity to wireless devices within a limited geographic area
- operating by means of transmitted electromagnetic waves
- a group or system of interconnected devices
Down
- a global computer network
- WAN) a large network of information that is not tied to a single location
- Small Office and Home Office Networks that are typically Local Area setups
- a set of rules for how data is transmitted between devices in the same network
9 Clues: a global computer network • a group or system of interconnected devices • operating by means of transmitted electromagnetic waves • a network of multiple devices in a limited geographical area • WAN) a large network of information that is not tied to a single location • Small Office and Home Office Networks that are typically Local Area setups • ...
The Human BOdy 2024-08-20
Across
- a pump to push the blood throughout the body
- made up of blood vessels that carry blood away from and towards the heart
- the continuous movement of blood throughout the body, driven by the pumping action of the heart.
- The networks of hollow tubes like pipes, which carry blood to and from all parts of the body
- a colorless, odorless, tasteless gas at room temperature and pressure
Down
- a colorless and non-flammable gas at normal temperature and pressure
- the physical force exerted on an object
- the rhythmic throbbing of the arterial walls due to the regular contraction of the heart.
- made up of blood cells and plasma.
9 Clues: made up of blood cells and plasma. • the physical force exerted on an object • a pump to push the blood throughout the body • a colorless and non-flammable gas at normal temperature and pressure • a colorless, odorless, tasteless gas at room temperature and pressure • made up of blood vessels that carry blood away from and towards the heart • ...
Happy Father's Day 2020-06-16
Across
- Cocktail of Choice
- Childhood oatmeal with brown sugar
- First electrically-lit city
- Boyhood Beagle
- Computer Brand Loyalist
- Favorite music that Mom hates
- Sunday Morning Face
- Christmas Car-ride CD
- Most traveled-to cities
- Best county fair in 3 states
- How many footballs does each team bring to the superbowl?
- Whip that ____ around
- Alma Mater Mascot
- Cause of broken bone
- Webster Nursery
- Intersection of SR15 and 1000N
- Video Conferencing Software
- Surround Sound
- Blue Hardware Store
- Easter Monday Polish Holiday
- Two-time owner of this model
Down
- Adam's Ale Occupation
- Go-to meal during Mom's Tuesday night MMPA meetings
- Bike Trail
- Deer Deterrent Concoction Spice
- Number of internet networks in the house...
- 2013 Father's Day Gift
- Nursery Thoroughfare
- Ketchup with the ____
- Webster summer festival
- Senior Role in High School
- Skier says go
- Christmas Movie
- The Johnny Before the Jimmys
- Betty & Her Gang
- In hand at all family gatherings
- Loveable TVLand Show
- Pigs to farm kids
- Location of the Oh-My-God Hardware Store
- You could have been named...
- B105 Genre
41 Clues: Bike Trail • B105 Genre • Skier says go • Boyhood Beagle • Surround Sound • Christmas Movie • Webster Nursery • Betty & Her Gang • Alma Mater Mascot • Pigs to farm kids • Cocktail of Choice • Sunday Morning Face • Blue Hardware Store • Nursery Thoroughfare • Cause of broken bone • Loveable TVLand Show • Adam's Ale Occupation • Christmas Car-ride CD • Ketchup with the ____ • Whip that ____ around • ...
MLCrossword 2020-09-12
Across
- the machine learning task of learning a function with labels' priori
- arrange (things) in sets or groups
- a neural network model whose goal is to predict the input itself
- a function that can be "ON" (1) or "OFF" (0), depending on input
- an apparatus using mechanical power and having several parts
- notice taken of someone or something
- an algorithm to efficiently calculate the gradients in a neural network
- a regularization technique for neural networks that prevents overfitting
- Generative Adversarial Network
- a function derived from two given functions by integration
Down
- rectified linear unit
- in contrast to feedback
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- the process of partitioning a digital image into multiple segments
- involving or characterized by conflict or opposition
- a group or system of interconnected people or things
- the act or process of normalizing
- the process of adding information in order to prevent overfitting
- an open source machine learning framework based on the Torch library
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
MLCrossword 2020-09-12
Across
- an open source machine learning framework based on the Torch library
- involving or characterized by conflict or opposition
- the process of adding information in order to prevent overfitting
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- an apparatus using mechanical power and having several parts
- a function that can be "ON" (1) or "OFF" (0) depending on input
- a regularization technique for neural networks that prevents overfitting
- the process of partitioning a digital image into multiple segments
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
- rectified linear unit
Down
- an algorithm to efficiently calculate the gradients in a neural network
- arrange (things) in sets or groups
- the act or process of normalizing
- a function derived from two given functions by integration
- Generative Adversarial Network
- a neural network model whose goal is to predict the input itself
- in contrast to feedback
- a group or system of interconnected people or things
- the machine learning task of learning a function with labels' priori
- notice taken of someone or something
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
MLCrossword 2020-09-12
Across
- an algorithm to efficiently calculate the gradients in a neural network
- a neural network model whose goal is to predict the input itself
- an open source machine learning framework based on the Torch library
- rectified linear unit
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
- involving or characterized by conflict or opposition
- notice taken of someone or something
- Generative Adversarial Network
- an apparatus using mechanical power and having several parts
Down
- arrange (things) in sets or groups
- the process of adding information in order to prevent overfitting
- in contrast to feedback
- the process of partitioning a digital image into multiple segments
- the act or process of normalizing
- the machine learning task of learning a function with labels' priori
- a function derived from two given functions by integration
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- a regularization technique for neural networks that prevents overfitting
- a group or system of interconnected people or things
- a function that can be "ON" (1) or "OFF" (0) depending on input
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • a group or system of interconnected people or things • involving or characterized by conflict or opposition • a function derived from two given functions by integration • ...
05.02.2020.(3) 2020-02-01
Across
- the remains of something broken to pieces or destroyed
- to prove that someone is a particular person.
- a thing that is the most important part of a system’s operation
- able to be easily hurt, influenced, or attacked
- the study of secret code systems in order to obtain secret information
- prevention from acting
- against a law or a rule
- a computer user who uses the internet; someone who explores cyberspace
- a gravitationally bound system of stars, stellar remnants, interstellar gas, dust, and dark matter
- having knowledge or understanding
- to experience difficulty
- a hidden set of instructions in a computer program in order to introduce faults into a computer system
Down
- – ending; destroying completely of (of crime / disease)
- practice of obtaining information without the permission of the holder using methods on the Internet, networks or individual computers.
- clash
- Building up (ramping up) of military weapons and equipment
- saying what is going to happen at some future time
- recording or showing information in the form of numbers.
- the introduction of something new
- to become different
- a sudden great misfortune
- to express strong disapproval of someone or some action
22 Clues: clash • to become different • prevention from acting • against a law or a rule • to experience difficulty • a sudden great misfortune • the introduction of something new • having knowledge or understanding • to prove that someone is a particular person. • saying what is going to happen at some future time • the remains of something broken to pieces or destroyed • ...
Nervous System Review 2020-11-02
Across
- abbreviation for a test that detects electrical activity in the brain
- membranes that protect the brain and spinal cord
- loss of feeling
- the CNS consists of the _______ and spinal cord
- the part of the brain that is inferior to the occipital lobe and coordinates complex skeletal muscle contractions
- the branch of the autonomic system that is known for "fight or flight"
- part of the peripheral nervous system that is controlled by voluntary control
- part of the brain that maintains homeostasis
- occurs when brain cells die because of inadequate blood flow
- abbreviation for fluid that cushions the CNS
Down
- absence of reflex
- name for spinal nerves innervate skin segments
- name for main portions of spinal nerves that are fused together & form networks
- most severe type of headache
- decreased reflex
- very strong reflex
- chemicals that are released by the synaptic knob to transport nerve impulses to their destination
- group of disorders commonly referred to as nerve pain
- the lobe in the brain that interprets what a person sees
- a disorder when facial muscles are weak or paralyzed
- occurs when the sciatic nerve is damaged
- abbreviation for a scan that is helpful in diagnosing Parkinson's and Alzheimer's.
22 Clues: loss of feeling • decreased reflex • absence of reflex • very strong reflex • most severe type of headache • occurs when the sciatic nerve is damaged • part of the brain that maintains homeostasis • abbreviation for fluid that cushions the CNS • name for spinal nerves innervate skin segments • the CNS consists of the _______ and spinal cord • ...
Cardiovascular System 2021-01-15
Across
- surgical repair
- vessels that return blood to the heart
- vessels that deliver blood to tissues
- blood pressure cuff
- History Of
- A condition where the major blood vessels supplying the heart are narrowed.
- Blood
- EKG
- ECHO
Down
- is a procedure done in a specialized area of radiology. X-ray dye called contrast is injected into blood vessels to diagnose things like narrowing (stenosis) or aneurysms.
- pain
- An acquired or inherited disease of the heart muscle which makes it difficult for the heart to pump blood to other parts of the body.
- Vital Signs Stable
- networks of small vessels that perfuse tissues
- A heart rhythm disorder with heartbeats faster than usual, greater than 100 beats per minute.
- are found in all tissues of the body with very few exceptions, such as epithelia and cartilage
- Death of heart muscle caused by a loss of blood supply.
- A progressive heart disease that affects pumping action of the heart muscles.
- excessive
- Shortness of Breath
- inner
- pumps blood
- test used to look at blood going through blood vessels to determine if they are narrowed or have a thrombus.
- around
- Discharge
25 Clues: EKG • pain • ECHO • inner • Blood • around • excessive • Discharge • History Of • pumps blood • surgical repair • Vital Signs Stable • blood pressure cuff • Shortness of Breath • vessels that deliver blood to tissues • vessels that return blood to the heart • networks of small vessels that perfuse tissues • Death of heart muscle caused by a loss of blood supply. • ...
5.6 Key Words 2021-03-04
Across
- changed the looks or nature of something
- succeed
- to break through a boundary or law
- use math to solve or answer a problem
- soft, shiny threads at the top of corn
- sending from one place to another
- trying to do something
- parts or features of something
- the result of something
- people-skilled at designing things
- small spacecraft
- something that a person hopes to do
- the ways things are in a certain area
- government in which people elect leaders
- changed completely
- section of spacecraft that holds the crew
- flag
- measure of how much work someone can do
- cold-blooded animals
- demonstrations or shows of skill
Down
- having many uses
- divisions to keep things apart
- fertilized with pollen
- song honoring something
- act of finding a way through an area
- very poor
- made the original plans for something
- curving paths that objects follow
- players can create their own movements
- government owns country's business
- use of machines to make things
- any object that is thin, flat, and round
- helping new plants grow from seeds
- groups of stations that broadcast together
- brand name for a round, flat, plastic toy
35 Clues: flag • succeed • very poor • having many uses • small spacecraft • changed completely • cold-blooded animals • fertilized with pollen • trying to do something • song honoring something • the result of something • divisions to keep things apart • parts or features of something • use of machines to make things • demonstrations or shows of skill • sending from one place to another • ...
Las redes sociales también transforman la vida rural 2012-10-11
Across
- Different areas (9, 6)
- To bury (7)
- Virtual world (5, 7)
- Shortwave (4, 5)
- Agricultural sector (6, 8)
- To save (7)
- Growing crimewave (9, 3, 2, 7)
- Or even (1, 8)
- Appearance (9)
- It attracted (6)
- Disconnected (12)
- Networkers, plugged-in people (10)
- Hyperconnectivity (17)
- Even more pronounced (f) (3, 3, 11)
- Spanish-speakers (16)
- To group together (7)
- Social networks (5, 8)
- Tools (12)
- Farmer (10)
- Interchange (11)
Down
- Success (5)
- Storm (8)
- Primary producers (11, 8)
- In every region (2, 4, 6)
- Users (8)
- Neighbour (6)
- One lives attached to a machine (3, 4, 8, 1, 3, 7)
- Platform (10)
- Hail (7)
- Is clearly felt (2, 6, 3, 8)
- Intended (7)
- Country people (10)
- In very little time (2, 3, 4, 6)
- To acquire (8)
- That mixes (3, 6)
- To usually associate it (5, 9)
- Livestock or cattle farmer (8)
- To interact (11)
- Digital gap/breach (6, 7)
- We create (7)
- Of the day to day (3, 3, 1, 3)
- Uniting (7)
- To attract (6)
43 Clues: Hail (7) • Storm (8) • Users (8) • Tools (12) • Success (5) • To bury (7) • To save (7) • Uniting (7) • Farmer (10) • Intended (7) • Neighbour (6) • Platform (10) • We create (7) • To acquire (8) • Or even (1, 8) • Appearance (9) • To attract (6) • Shortwave (4, 5) • It attracted (6) • To interact (11) • Interchange (11) • Disconnected (12) • That mixes (3, 6) • Country people (10) • Virtual world (5, 7) • ...
Chapter 1 Crossword 2016-01-13
Across
- message Short video clip sent from a smartphone or other mobile device
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
- message Photo or image sent from a smartphone or other mobile device
- Anyone who interacts with a computer or mobile device
- Computer dedicated to providing one or more services to other computers
- Recorded media that users can download
- Programs designed to make users more productive, or assist them with tasks
- Worldwide collection of computer networks
- Electronic document on the web
Down
- device Any hardware component that conveys information from a computer to a user
- Thin, light weight computer that has a touch screen
- A hard copy
- flash drive Portable flash memory storage device that you plug into a USB port
- Pointing device that fits under the palm of your hand
- Internet-capable phone that includes many apps
- Light-sensing device that converts printed text into a form a computer can process
- book Electronic version of a printed book
- Small speakers that rest inside each ear canal
- Collaborative website that allows users to create/modify content via browsers
- computing Involves reducing electricity and waste generated when using a computer
20 Clues: A hard copy • Electronic document on the web • Recorded media that users can download • book Electronic version of a printed book • Worldwide collection of computer networks • Internet-capable phone that includes many apps • Small speakers that rest inside each ear canal • Thin, light weight computer that has a touch screen • ...
World of the Web 2016-02-21
Across
- permanently fixed work that can still seen or heard
- a physical setup for a network, a wire
- the limitations to a copyright
- increases with high quality graphics
- sending and receiving happen at different times
- networks that are not geographically close
- related group of networking computers
- pictures/movies/graphics
- easy to skim or read over quickly
- Using a computer to gain unauthorized access to data
- program used to editing plain text files
- computers programmed to send files to a browser running on other computer connected to the internet
Down
- belonging to the public as a whole, not subject to copyright
- companies that sell connections to the internet
- a panel of sequenced sketches put together to tell a story
- mark up language
- administration of digital content through out its lifecycle
- a group of info on a computer
- person masquerades as another to falsify data
- caches and/or mirrors multimedia content otherwise stored on the WWW
- describes a relationship of the target object to the link object
- a temporary storage space or memory that allows fast access to data
- ex. glogster, ACMI generator
- any content that imports other content
24 Clues: mark up language • pictures/movies/graphics • ex. glogster, ACMI generator • a group of info on a computer • the limitations to a copyright • easy to skim or read over quickly • increases with high quality graphics • related group of networking computers • a physical setup for a network, a wire • any content that imports other content • program used to editing plain text files • ...
Computers100 2016-02-21
Across
- use this wonderful looking slideshows with images, music, video, etc.
- big challenge of a large website is high
- under this law you must gain permission to use someone's work
- the internet is a connection of
- a related group of networked computers
- interfering with security mechanisms, sending malicious content, etc.
- neutral rather than subjective, boastful, or exaggerated language
- these should be underlined on your webpage
- your webpage can include no more than 5 from the same artist
- a system of interlinked hypertexts documents accessed via the internet
- <head></head> are examples of
- a universal communication medium
Down
- are when computers are geographically close
- division that refers to the hardware that operates websites
- social bookmarking site for teachers
- when both the sender and receiver are active at the same time
- use this to create basic HTML pages
- the first step in creating a large scale website is to take
- Extension tell a computer what program to use to open a file
- the main technology for Local Area Networks
- these should be highlighted on your webpage
- failing to login and identify yourself on the UT System
- page is composed of HTML tags and multimedia files
23 Clues: <head></head> are examples of • the internet is a connection of • a universal communication medium • use this to create basic HTML pages • social bookmarking site for teachers • a related group of networked computers • big challenge of a large website is high • these should be underlined on your webpage • are when computers are geographically close • ...
Computer science 2016-02-18
Across
- this is 25 percent slower than on paper
- up 10 percent of this kind of work can be used legally
- this style is different than writing for other mediums
- isolate the system to preserve evidence
- where you identify yourself to the system
- a related group of networked computers
- 79 percent of users do this to a webpage
- browsers used to view webpages
- information stored on a website server for reuse
- no more than 5 of these from one artist can be used legally
- main technology for connecting local computers
- a group of information on a computer
Down
- type of local server used for quicker transfer of information
- no more than 2,500 fields of these can be used legally
- what html uses to build webpages
- the way html instructions are grouped
- a specific challenge of a large website
- basic program for using html
- what some computers connected to the internet are
- networks that are not geographically close
- how bits are converted to a carrier compatible form
- what the internet becomes, with each additional computer
- the codes or tags that browsers use to create webpages
23 Clues: basic program for using html • browsers used to view webpages • what html uses to build webpages • a group of information on a computer • the way html instructions are grouped • a related group of networked computers • this is 25 percent slower than on paper • a specific challenge of a large website • isolate the system to preserve evidence • ...
Computer science 2016-02-18
Across
- what html uses to build webpages
- information stored on a website server for reuse
- this is 25 percent slower than on paper
- the codes or tags that browsers use to create webpages
- browsers used to view webpages
- the way html instructions are grouped
- type of local server used for quicker transfer of information
- main technology for connecting local computers
- basic program for using html
- this style is different than writing for other mediums
- a related group of networked computers
- up 10 percent of this kind of work can be used legally
- a group of information on a computer
Down
- networks that are not geographically close
- no more than 2,500 fields of these can be used legally
- isolate the system to preserve evidence
- 79 percent of users do this to a webpage
- what the internet becomes, with each additional computer
- what some computers connected to the internet are
- no more than 5 of these from one artist can be used legally
- where you identify yourself to the system
- a specific challenge of a large website
- how bits are converted to a carrier compatible form
23 Clues: basic program for using html • browsers used to view webpages • what html uses to build webpages • a group of information on a computer • the way html instructions are grouped • a related group of networked computers • isolate the system to preserve evidence • this is 25 percent slower than on paper • a specific challenge of a large website • ...
Science vocabulary word search 2018-03-12
Across
- lamella thin film between cell walls of adjacent plant cells
- streaming motion of cytoplasm in a cell
- removal of substances that can not be dissolved in cells
- the study of cells
- organelles that contain pigments used in photisythesis
- organelle n animal cells that make hydrolysis reactions
- organelles that store starches or oils
- cells break down monosaccharides and produces energy
- ER ER that is dotted with ribosoms
- vacuole large vacuole at the center of plant cells
- mass with 1 or more atoms has imbalance of protons/electrons
- removal of substances dissolved in the fluids of cells
Down
- organelles in which nutrients are to energy
- maintaining properly functioning cells
- non-membrane-bounded organelles
- bodies organelles where proteins and lipides are stored
- when cells make more cells
- reticulum organelle compose of networks of membranes
- wall rigid structure on the outside of certain cells
- ER ER that has no ribisomes
- dissolved substance must enter the cell from outside
- polysaccharides are broken down into monosaccharides
- membrane membrane between cells and the cell wall
- the release of biosynthesis substances
- fluid inside cells which organelles are suspended
25 Clues: the study of cells • when cells make more cells • ER ER that has no ribisomes • non-membrane-bounded organelles • ER ER that is dotted with ribosoms • maintaining properly functioning cells • organelles that store starches or oils • the release of biosynthesis substances • streaming motion of cytoplasm in a cell • organelles in which nutrients are to energy • ...
Cardiovascular system 2021-12-02
Across
- The opposite of big.
- Acute coronary syndromes.
- When blood is blocked from flowing to the heart muscle.
- Inflammation
- Acute myocardial infarction.
- Cardiovascular disease.
- The problem of the heart rate or rythem of your heartbeat.
- Disease Disorders of the aorta.
- When the heart muscle doesn't pump blood as well as it should.
- Vessels that return blood to the heart.
- Coronary artery bypass graft surgery.
- Uses X-ray imaging to see your heart's blood vessels.
Down
- The cardiovascular system pumps blood from the heart to this organ to get oxygen.
- A simple and fast test used to evaluate the heart.
- Pain.
- Uses X-rays to look at the structures and organs in your chest.
- Makes it harder for your heart to pump to the rest of the body.
- Pertaining to.
- Networks of small vessels that perfuse tissues.
- Uses sound waves to create moving pictures of your heart.
- Vessels that deliver blood to tissues.
- The cardiovascular system has this organ at the center of its function.
- A disorder of structure or function in a human, animal, or plant.
- Cardiac resynchronization therapy.
- Makes detailed images of the beating heart.
25 Clues: Pain. • Inflammation • Pertaining to. • The opposite of big. • Cardiovascular disease. • Acute coronary syndromes. • Acute myocardial infarction. • Disease Disorders of the aorta. • Cardiac resynchronization therapy. • Coronary artery bypass graft surgery. • Vessels that deliver blood to tissues. • Vessels that return blood to the heart. • Makes detailed images of the beating heart. • ...
RU ITEC411( Crime and Security) 2023-10-17
Across
- Thieves utilize the identity of an ignorant, innocent person in a variety of crimes
- utilize their expertise to expose system flaws and enhance security
- voice phishing
- open access was first implemented as a method of sharing material for study.
- methods for stealing financial and personal data
- By putting fake U RLs in Domain Name Servers, fake websites that fish for personal and financial information
- text messaging
Down
- the expansion of mobile and online technologies
- Unauthorized use of a computer is prohibited.
- a duty to advance with security as a priority
- are employed to keep an eye on and block communication from unreliable websites.
- Publishers are required to stop content or services from being accessed in nations where they are prohibited.
- A worm with incredible sophistication
- is hacking used to advance a political purpose
- biological traits that are specific to an individual
- a duty to employ security tools and keep an eye on their networks to thwart attacks
- a duty to research the available resources, ask questions, and become knowledgeable about security measures
- The expense of defending against an attack was included to the definition of loss under Act.
- The excitement of programming
20 Clues: e-mail • voice phishing • text messaging • The excitement of programming • A worm with incredible sophistication • Unauthorized use of a computer is prohibited. • a duty to advance with security as a priority • is hacking used to advance a political purpose • the expansion of mobile and online technologies • methods for stealing financial and personal data • ...
Digital Banking Training 2024-03-27
Across
- Type of cross border transaction can be performed by indian national from their account
- One of the QR network that we provide to our merchants
- Numbers of sessions that transactions are settled in Fonepay QR
- Maximun tenure in months for FD request from NIMB Smart
- Number of QR Networks present in Nepal
- Real-time payments with order specific details
- Feature to enable for the payments and fund transfers
- What to do with the expired mobile banking users
- Another QR network that we provide to our merchants
- Mobile Banking Platform of the Bank
Down
- Something that can be used in both app and web.
- Something to do if a merchant is acquired by other BFIs.
- Profile made for just NIMB staffs
- Measures ensure customer data and transactions are protected.
- Enables customers to withdraw cash by scanning a QR code through NIMB Smart.
- Provides small short-term loans to customers through NIMB Smart.
- A QR network where payment can be accepted through card
- One of the documents required for Merchant QR
- Profile given to the customers who are abroad are travelling abroad.
- Provides instant payment confirmation through voice
20 Clues: Profile made for just NIMB staffs • Mobile Banking Platform of the Bank • Number of QR Networks present in Nepal • One of the documents required for Merchant QR • Real-time payments with order specific details • Something that can be used in both app and web. • What to do with the expired mobile banking users • Another QR network that we provide to our merchants • ...
Struktur Keruangan dan Perkembangan Desa dan Kota 2024-09-23
Across
- Tiga Unsur utama desa.
- Teori ini dikembangkan oleh Homer Hoyt ( 1930 ).
- Jumlah rumah umumnya kurang dari 40 rumah.
- Daerah Pusat Kegiatan.
- Desa yang berpenduduk 250-1.000.
- Desa yang kehidupannya didasarkan pada kegiatan industri.
- Wilayah ini merupakan daerah industri manufaktur dan pabrik - pabrik.
- Sumber tenaga kerja potensial.
- Daerah yang letaknya dekat dengan pusat kota atau inti kota.
- Unsur yang dapat menimbulkan keserasian dan ketenangan hidup warga kota.
- Merupakan desa yang kehidupannya didasarkan pada kegiatan perikanan.
- Potensi nonfisik yang bertugas menjaga ketertiban dan keamanan demi kelancaran jalannya pemerintahan desa.
Down
- Pedesaan ( Zona Interaksi Pedesaan .
- Tahap kemunduran dari suatu kota.
- Kota ini memiliki jumlah penduduk lebih dari 5 juta jiwa.
- Teori ini sebenarnya digunakan dalam hukum fisika, namun di aplikasikan dalam geografi.
- Potensi ini sangat penting bagi desa yang bersifat agraris.
- Masyarakat kota memiliki hubungan sosial yang bersifat jangka pendek.
- Pola Pemukiman ini berbentuk memanjang mengikuti suatu ketampakan, seperti sungai dan jalan raya.
- Ahli ini mengemukakan sebuah teori dalam bukunya yang berjudul Structure of Transportation Networks.
- Pusat pemukiman dan kegiatan penduduk yang mempunyai batas wilayah administrasi yang diatur dalam perundang-undangan.
- Suatu hasil perpaduan antara kegiatan kelompok manusia dan lingkungan.
22 Clues: Tiga Unsur utama desa. • Daerah Pusat Kegiatan. • Sumber tenaga kerja potensial. • Desa yang berpenduduk 250-1.000. • Tahap kemunduran dari suatu kota. • Pedesaan ( Zona Interaksi Pedesaan . • Jumlah rumah umumnya kurang dari 40 rumah. • Teori ini dikembangkan oleh Homer Hoyt ( 1930 ). • Kota ini memiliki jumlah penduduk lebih dari 5 juta jiwa. • ...
Quiz for your home work 2024-06-10
Across
- A secret word or phrase used to authenticate access.
- A device that receives data from a computer (e.g., monitor, printer).
- An electronic device for storing and processing data.
- (Uniform Resource Locator) The address of a web page.
- (Random Access Memory) Short-term memory that stores data temporarily.
- Where data is saved permanently (e.g., hard drive, SSD).
- The physical parts of a computer.
- Programs and operating information used by a computer.
- Device A device used to provide data to a computer (e.g., keyboard, mouse).
- Software used to access the internet (e.g., Chrome, Firefox).
Down
- (OS) Software that manages computer hardware and software (e.g., Windows, macOS).
- A global network connecting millions of private, public, academic, business, and government networks.
- Wireless technology for connecting devices to the internet.
- A unique identifier for a user on a system.
- A group of interconnected computers.
- Electronic mail, a method of exchanging digital messages.
- Saving data on remote servers accessed via the internet.
- A wireless technology for exchanging data over short distances.
- A collection of web pages on the internet.
- Central Processing Unit The brain of the computer that processes instructions.
20 Clues: The physical parts of a computer. • A group of interconnected computers. • A collection of web pages on the internet. • A unique identifier for a user on a system. • A secret word or phrase used to authenticate access. • An electronic device for storing and processing data. • (Uniform Resource Locator) The address of a web page. • ...
Cybersecurity Terms 2024-05-08
Across
- Impersonation of another device or user on a network.
- A secret key that protects your digital accounts.
- Secret agents in software form, spying on your computer activities.
- A process to confirm someone is who they claim to be.
- A weakness in a system that can be exploited.
- A secure tunnel for data on the internet.
- A coding error that might cause programs to behave unexpectedly.
- A person who breaks into computers, often for malicious reasons.
- Malicious software disguised as legitimate.
- A digital kidnapper of data, demanding payment for release.
- Scrambling data to protect it from prying eyes.
Down
- Ensuring that authorized parties can access information when needed.
- A digital barrier protecting a network from unauthorized access.
- A deceptive attempt to steal sensitive information via email.
- Manipulation techniques to trick people into breaking security procedures.
- Unwanted software that displays ads on your screen.
- Protection against unauthorized data alteration.
- This program defends your computer against malicious agents.
- Malicious software designed to harm or exploit any programmable device.
- Network of computers infected with malicious software intented to cause harm.
- A self-replicating program that spreads through networks.
21 Clues: A secure tunnel for data on the internet. • Malicious software disguised as legitimate. • A weakness in a system that can be exploited. • Scrambling data to protect it from prying eyes. • Protection against unauthorized data alteration. • A secret key that protects your digital accounts. • Unwanted software that displays ads on your screen. • ...
Achievements of the Muslim civilization 8.3 2025-02-26
Across
- He was one of the greatest mathematicians
- Who did they get steel swords from
- To give and get something in exchange
- Animals were used trade and packed up to 650 pounds
- Established Baghdad as the greatest Muslim center of learning
- Traders carried frankincense and other stuff over what road that is 100 miles along the read sea
- ability to get higher authority
- Stretch 7000 miles starting in Chang’an going to Baghdad
- A place in the Sahara where west Africans traded gold for salt, cloth, bronze, books, ceramics
- Build fast trading networks across Muslim land
Down
- The period when Spain Sicily and Christian scholars studied Muslim art and science
- What projects drained swamplands because there isn’t enough water in desert areas
- He put all knowledge except Quran to the test of reason
- Head physician, wrote many books on medicine
- Writing by hand in an artistic way
- He set standards for scientific study of history
- Developed rules for writing developing religious and worldly things
- Developed riles for writing explaining religious and worldly themes
- During the Golden Age Muslim cities adapting from Byzantine buildings, domes and arches
- What were the Persians famous for
- Studied the philosophy of this ancient civilization
21 Clues: ability to get higher authority • What were the Persians famous for • Writing by hand in an artistic way • Who did they get steel swords from • To give and get something in exchange • He was one of the greatest mathematicians • Head physician, wrote many books on medicine • Build fast trading networks across Muslim land • He set standards for scientific study of history • ...
Internet Terminologies 2025-01-12
Across
- refers to not being connected on the internet
- to search for information on the web in a random non-linear way
- Refers to all computer networks on the internet
- Small pictures that represent the program on your computer
- a small file downloaded by some websites to store a packet information
- a real time communication over the internet
- A person responsible for administering a website
- A program that allows users to view web pages
Down
- The act of moving from page to page and website to website online
- illegal copying copyrighted software, music or movies
- a request for information about a certain topic
- Unwanted email from someone you don't know
- An animated face that expresses emotion
- another way to describe having access to the internet
- A series of letters and numbers that identify a location
- A printed copy of a file from a computer
- A special software package that connects to a network and provide data
- A collection of files linked together and available on the world wide web
- a computer program that can destroy files
- Where all the messages are kept
20 Clues: Where all the messages are kept • An animated face that expresses emotion • A printed copy of a file from a computer • a computer program that can destroy files • Unwanted email from someone you don't know • a real time communication over the internet • refers to not being connected on the internet • A program that allows users to view web pages • ...
Crossword information technology 2025-01-24
Across
- An organized collection of structured information, or data.
- DATA Extremely large data sets that may be analyzed to reveal patterns, trends, and associations.
- Electronic mail; messages distributed by electronic means.
- (ARTIFICIAL INTELLIGENCE) The theory and development of computer systems able to perform tasks that normally require human intelligence. 1
- Programs and other operating information used by a computer.
- Relating to or using digital signals.
- A global system of interconnected computer networks.
- Relating to or using mobile phones or other wireless portable devices.
- The physical components of a computer system.
Down
- A network of servers that store and manage data.
- Facts and statistics collected together for reference or analysis.
- The process of writing computer programs.
- A set of related web pages located under a single domain name.
- A secret word or phrase used for access.
- A program designed for a specific task or application.
- A set of rules or instructions for solving a problem.
- An electronic device for storing and processing data.
- The application of scientific knowledge for practical purposes.
- A group of interconnected computers.
- Measures taken to protect against unauthorized access or damage.
20 Clues: A group of interconnected computers. • Relating to or using digital signals. • A secret word or phrase used for access. • The process of writing computer programs. • The physical components of a computer system. • A network of servers that store and manage data. • A global system of interconnected computer networks. • ...
Medical term 2024-11-08
Across
- atrial fibrillation
- vessels that deliver blood to tissues.
- antidiuretic hormone
- common tests healthcare providers use to measure or examine substances in your blood
- one dimensional
- a type of portable electrocardiogram (ECG)
- pumps blood through the system.
- also known as congestive heart failure
- Atrium
- how the heart works during physical activity. It also may be called a stress exercise test.
- creates high-resolution images of your heart
- type of heart disease involving the reduction of blood flow to the cardiac muscle due to build-up of atherosclerotic plaque in the arteries of the heart.
Down
- cardiovascular disease process involving one or more of the four valves of the heart.
- irregularities in the heartbeat, including when it is too fast or too slow.
- networks of small vessels that perfuse tissues.
- vessels that return blood to the heart.
- Yellowish fatty plaque
- automatic implantable cardioverter defibrillator
- Artery
- occurs when blood flow decreases or stops in one of the coronary arteries of the heart, causing infarction to the heart muscle.
- Vessel
- Aorta
- acute coronary syndromes
- looks at the chest
24 Clues: Aorta • Artery • Vessel • Atrium • one dimensional • looks at the chest • atrial fibrillation • antidiuretic hormone • Yellowish fatty plaque • acute coronary syndromes • pumps blood through the system. • vessels that deliver blood to tissues. • also known as congestive heart failure • vessels that return blood to the heart. • a type of portable electrocardiogram (ECG) • ...
MIL 2025-10-13
Across
- - The way a surface feels or is perceived to feel.
- - Someone who writes and shares opinions or commentaries about issues.
- - Facts provided or learned about something or someone.
- - In the field of public service, the media and government have a long-standing relationship.
- - Using more than one medium of expression or communication.
- - A picture, piece of film, or display used to illustrate or accompany something.
- - Having or showing education or knowledge.
- - Accessible to all.
- - A series of frames or graphics that follow a sequence to create a story or message.
- - Large or big, occupying space.
- - Using the internet or other computer networks.
Down
- - A presentation of photographic slides or electronic images on a surface or screen.
- - Written or printed words, typically forming a connected piece of work.
- - Sound, especially when recorded, transmitted, or reproduced.
- - Characterized by unscrupulous control of a situation or person.
- - Use of manipulative information which intends to deceive or defraud the public.
- - To handle, manage, or influence something or someone skillfully.
- - Visual content that creates the illusion of movement.
- - The feature of sound determining how loud or soft it is.
- - The act of moving in a path from point to point.
20 Clues: - Accessible to all. • - Large or big, occupying space. • - Having or showing education or knowledge. • - Using the internet or other computer networks. • - The way a surface feels or is perceived to feel. • - The act of moving in a path from point to point. • - Facts provided or learned about something or someone. • ...
2.3 Given a scenario, select and configure wireless devices and technologies 2025-09-01
Across
- Channels that do not interfere with each other
- Newer Wi-Fi encryption, stronger protections
- Standard Wi-Fi network using an access point
- Standard that adjusts channels and power for regulations
- Pushes clients to the optimal frequency band
- Specific frequency range used by wireless networks
- Authentication using usernames and a central server
- Access point managed by a central controller
- Common Wi-Fi encryption standard, uses AES
- Focuses wireless signal in a single direction
- Newer Wi-Fi band with high throughput and less congestion
- Provides limited access for visitors
- Unique MAC address of a wireless access point
- Shared secret key for Wi-Fi authentication
Down
- Web page that forces login or acceptance before access
- Radiates signal in all directions equally
- Devices connect directly without an access point
- Determines how much bandwidth is available on a channel
- Wireless network type with devices relaying traffic
- Direct wireless link between two sites
- Frequency band with faster speeds and shorter range
- Self-contained access point with all features built in
- Frequency band with longer range but more interference
- Network name that spans multiple access points
- Network name broadcasted by a wireless access point
25 Clues: Provides limited access for visitors • Direct wireless link between two sites • Radiates signal in all directions equally • Common Wi-Fi encryption standard, uses AES • Shared secret key for Wi-Fi authentication • Newer Wi-Fi encryption, stronger protections • Standard Wi-Fi network using an access point • Pushes clients to the optimal frequency band • ...
SeatWork #2 2025-09-06
Across
- The practice of protecting information, systems and assets from threats.
- A model where decision-making is spread across units.
- The detailed steps employees follow to apply a policy.
- Setting security objectives, identifying risks and allocating resources.
- The executive who leads and manages the organization’s security program.
- A model where one authority makes all security decisions.
- Making sure security strategies support business goals.
- Using third-party providers for services such as managed security.
- Directing and motivating teams to meet security objectives.
- A person who oversees IT systems and implements security measures.
Down
- Meeting mandatory laws, regulations and industry standards.
- A person who checks systems for compliance and weaknesses.
- Structuring people and resources to execute the security plan.
- The chance that a threat could harm systems, data or reputation.
- A high-level rule that states how an organization protects its information.
- A professional who monitors networks and investigates threats.
- The system of directing and controlling security decisions and accountability.
- A structured set of best practices and standards for managing security.
- A model combining centralized standards with local flexibility.
- Monitoring security performance and making improvements.
20 Clues: A model where decision-making is spread across units. • The detailed steps employees follow to apply a policy. • Making sure security strategies support business goals. • Monitoring security performance and making improvements. • A model where one authority makes all security decisions. • A person who checks systems for compliance and weaknesses. • ...
