networks Crossword Puzzles
crossword puzzle 2021-03-04
Across
- a network system that protects you from unauthorized access
- Shutdown Turning off a computer by pressing and holding the power button until the system turns off
- One piece of data along with a destination address used in a packet switching network
- A network device whose software and hardware are customized
- A device that routes traffic between networks
- Re-booting a device either with a cold or warm boot
Down
- A type of file that organizes other files in a hierarchical structure
- A type of file that organizes other files in a hierarchical structure
- Server A computer, currently Print2, that manages one or more printers for computers on a network
- a distance subset of the internet with a address sharing a common suffix
10 Clues: A device that routes traffic between networks • Re-booting a device either with a cold or warm boot • a network system that protects you from unauthorized access • A network device whose software and hardware are customized • A type of file that organizes other files in a hierarchical structure • ...
9th M4 L2 Internet Shopping 2023-02-25
Across
- very big
- individuals who have computer skills and use them to access computer systems and networks without authorization
- something that is protected from danger, harm or unauthorized access
- being connected to the internet or available through the internet
- the advantages or positive outcomes that a particular action or decision can bring
Down
- a tool, resource, or approach that can be used to achieve a specific goal or objective
- give something to someone in return for something else
- to arrange or request something to delivered, or provided, by filling out a form or making a payment
- have a casual conversation or talk informally with someone
9 Clues: very big • give something to someone in return for something else • have a casual conversation or talk informally with someone • being connected to the internet or available through the internet • something that is protected from danger, harm or unauthorized access • the advantages or positive outcomes that a particular action or decision can bring • ...
Digital Citinzenship 2022-09-30
Across
- balance Using media in a way that feels healthy and balance with other life activities.
- habits Behaviors we do often with digital media.
- It is sometimes called simply "the Net," it is a worldwide system of computer networks.
Down
- media Information that comes to us thought the internet.
- A fake instagram account.
- flag media When something happens in digital media that makes you feel uncomfortable.
- Without a name of other information that identifies who you are.
7 Clues: A fake instagram account. • habits Behaviors we do often with digital media. • media Information that comes to us thought the internet. • Without a name of other information that identifies who you are. • flag media When something happens in digital media that makes you feel uncomfortable. • ...
5.5 Crossword 2015-03-11
Across
- access to telephone lines for telephone and broadband internet services, and mobile phone coverage
- links to roads, sea, and air.
- the support and complementary services that are essential for running a business.
- when a business relocates near other organizations that operate in similar or opposing markets.
- a decision that occurs when managers need to consider moving to alternative premises.
- businesses that locate near the source of raw materials that are more heavy and costly to transport.
Down
- the geographical position of a business.
- the reluctance to relocate due to the inconvenience of moving.
- the term used to describe the transportation, communication and support networks in a certain area.
- organizations that are not restricted to certain locations.
- the benefits that have been established over time by a firm's presence in a certain location.
- industries businesses that locate near their markets.
- costs that cannot be recovered
13 Clues: links to roads, sea, and air. • costs that cannot be recovered • the geographical position of a business. • industries businesses that locate near their markets. • organizations that are not restricted to certain locations. • the reluctance to relocate due to the inconvenience of moving. • ...
Hardware of the internet - William Senjack 2023-03-06
Across
- device that connects two or more packet-switched networks
- network security device that monitors and filters incoming and outgoing
- connects very powerful servers together using high-speed connections.
- mode of data storage in which data is stored on servers in off-site locations
- a thing made or adapted for a particular purpose
- the main means of mass communication
Down
- your computer is receiving data from the Internet
- server intermediary server that retrieves data from an Internet source, such as a webpage, on behalf of a user
- provides wireless high-speed Internet access
- light signals can be sent with very little loss of strength
- maximum amount of data transmitted over an internet connection in a given amount of time
- Domain Name System, translates human readable domain names to machine readable IP addresses
- computer program or device that provides a service to another computer program
13 Clues: the main means of mass communication • provides wireless high-speed Internet access • a thing made or adapted for a particular purpose • your computer is receiving data from the Internet • device that connects two or more packet-switched networks • light signals can be sent with very little loss of strength • ...
Communication 2022-11-07
Across
- is an online service platform or site that focuses on facilitating on the building of social relations among people
- uses electrical signals, usually conveyed via telecommunication signals on radio
- is a method of exchanging digital messages from an author to one or more recipients
- is the collection of computer and other hardware components interconnected by communication channels
- a global system of interconnected computer networks that serve billion users worldwide
- device that can make and receive telephone calls over a radio link
Down
- effective messengers due to their natural homing abilities
- oldest form of long-distance communication
- is a telecommunication device that transmits and receives sounds
- is the transmission of signals through free space by electromagnetic waves
- is a scheduled publication containing current events, informative articles, diverse features, editorials, and advertisements
- is a telecommunication medium for transmitting and receiving moving images
- a system for transporting letters and other tangible objects
13 Clues: oldest form of long-distance communication • effective messengers due to their natural homing abilities • a system for transporting letters and other tangible objects • is a telecommunication device that transmits and receives sounds • device that can make and receive telephone calls over a radio link • ...
Cybersecurity/Web Design 2019-11-05
Across
- to scramble information so that it can be sent safely over the Internet
- Hacking’ - Testing a computer systems to find security vulnerabilities
- Audience
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- preferred way to present/layout digital material
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
- to help protect a computer network from unauthorised access
- reason for which the website has been created e.g. to entertain
Down
- Testing
- a secret word to unlock a device – must include numbers/special characters
- by reproducing itself or infecting other programs by modifying them.
- to use and understand
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- simple way to get passwords/PIN numbers by criminals standing behind you and watching.
14 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • by reproducing itself or infecting other programs by modifying them. • Hacking’ - Testing a computer systems to find security vulnerabilities • ...
Cybersecurity/Web Design - use your KNOWLEDGE PLANNER 2019-11-05
Across
- to help protect a computer network from unauthorised access
- Hacking’ - Testing a computer systems to find security vulnerabilities
- is the branch of Computer Science that deals with online threats, how to keep data safe and preventing cybercrime (criminal activity carried out using a computer/computer networks)
- group of people at which the website is aimed e.g. teenage girls
- test that a human can pass but a computer program cannot
- reason for which the website has been created e.g. to entertain
- to scramble information so that it can be sent safely over the Internet
- attack intended to direct a website’s traffic to another fake site by hacking a DNS server or redirecting the computer electronically.
Down
- by reproducing itself or infecting other programs by modifying them.
- a secret word to unlock a device – must include numbers/special characters
- Testing
- Audience
- a user is sent a fake email that looks like it is from a bank/business hoping to gather personal information.
- to use and understand
- preferred way to present/layout digital material
15 Clues: Testing • Audience • to use and understand • preferred way to present/layout digital material • test that a human can pass but a computer program cannot • to help protect a computer network from unauthorised access • reason for which the website has been created e.g. to entertain • group of people at which the website is aimed e.g. teenage girls • ...
The internet 2023-06-19
Across
- media Online platforms for people to connect, communicate, and share content
- Sending data or files from a device to the internet or another user
- Protecting devices, networks, and data from digital threats, like hackers and viruses
- Method of sending messages electronically between people
- Collection of related webpages accessed with a browser
- Receiving data or files from the internet and saving them on a device
- Regularly updated website or web page featuring personal or informational content
Down
- Technology allowing devices to connect wirelessly to the internet or a network
- Program used to access and view websites on the World Wide Web
- game Interactive entertainment played together or against others using the internet
- engine Tool that helps find information, images, or websites using keywords
- Transmitting video or audio content allowing users to watch or listen without downloading
- Unique address of a website on the internet, often starting with "www"
13 Clues: Collection of related webpages accessed with a browser • Method of sending messages electronically between people • Program used to access and view websites on the World Wide Web • Sending data or files from a device to the internet or another user • Receiving data or files from the internet and saving them on a device • ...
RAČUNALNE MREŽE-Domnik hjaster 2023-10-19
Across
- modilnih podatak
- mreža, sustav međusobno povezanih računala.
- Ethernet (/ˈiːθərnɛt/ EE-thər-net) is a family of wired computer networking technologies commonly used in local
- Klijent (en. client) je oznaka za bilo koji računalni program koji služi za prihvat i prikaz podataka, odnosno komunikaciju s računalom koje ima ulogu poslužitelja. Jednostavnije rečeno, klijent označava računalni program (ponekad i računalo) koje se koristi uslugama servera.
- svjetlovod (optičko vlakno), svjetlosni vodič, prozirna nit, najčešće izrađena od vrlo čistoga stakla ili polimernoga materijala
- osodne mraže
Down
- or networking is a distributed application architecture that partitions tasks or workloads
- (server), računalo u računalnoj mreži koje drugim računalima omogućuje pristup perifernim
- mreže
- mreže-optičke elektrokomunikacije, prijenos informacija (zvuka, slike ili podataka u električnom obliku)
- gratske mreže
- mreže osjetila (engl. wireless sensor networks – WSN) su računalne mreže građene od prostorno raspoređenih samostalnih čvorova (uređaja)
- široko rasprostranjena mreža
13 Clues: mreže • osodne mraže • gratske mreže • modilnih podatak • široko rasprostranjena mreža • mreža, sustav međusobno povezanih računala. • (server), računalo u računalnoj mreži koje drugim računalima omogućuje pristup perifernim • or networking is a distributed application architecture that partitions tasks or workloads • ...
Cybersecurity 2025-08-22
Across
- A term that defines when a system is accessed by an unauthorized person.
- Hackers that are authorized by companies to find flaws in systems in order to patch them.
- Protection of computer systems, networks, and data from attacks.
- Information that can be identified as belonging to someone or information that can be used to identify someone.
- The person in charge of maintaining a network.
- Hackers that maliciously violate computer security for personal gain.
Down
- Where data is stored.
- Digitally harassing, humiliating, embarrassing, and/or threatening someone.
- Information stored digitally.
- A person who attempts to use things in a way other than it's original intention.
- Revealing, or threatening to reveal, a person's personal data in order to harass and/or intimidate.
- A flaw in a computer system, operating system, or software.
- Hackers that may sometimes violate laws and are socially or politically motivative.
13 Clues: Where data is stored. • Information stored digitally. • The person in charge of maintaining a network. • A flaw in a computer system, operating system, or software. • Protection of computer systems, networks, and data from attacks. • Hackers that maliciously violate computer security for personal gain. • ...
Network Operations 2012-03-26
Across
- I am what nodes are attached to
- I filter traffic in and out of private networks
- I provide Internet access to wireless network devices in public locations
- This topology directly connects each node to a central network hub
- I include devices such as printers and workstations
- I am a networking technology that allows devices to communicate without wires.
Down
- the amount of data that can be carried from one point to another in a given time period
- The network needed to connect The Woodlands High School with another school in our district
- the traffic directors of the internet, communicate frequently with one another
- I am the smallest and most confined network
- I am a twisted pair cable for carrying signals over the Ethernet
- This topology combines linear bus and star topologies
- I am a network that allows files to be shared with a management source
- I determine the speed and performance of a network
- Connects LAN's and MAN's to communicate worldwide
15 Clues: I am what nodes are attached to • I am the smallest and most confined network • I filter traffic in and out of private networks • Connects LAN's and MAN's to communicate worldwide • I determine the speed and performance of a network • I include devices such as printers and workstations • This topology combines linear bus and star topologies • ...
Workplace Communication 2012-12-06
Across
- a figure of speech that creates an analogy between two objects
- organizations that generate and distribute power and control within society
- misinterpreting information
- organizations that help to mediate and resolve discord among members of society
- messages between members of an organization with equal power
- messages that follow prescribed channels of communication throughout the organization
- organizations that manufacture products and/or offer services for consumers
- subordinates issue messages to superiors
Down
- an unfounded or false notion, traditionally a legend
- social collectives where activities are coordinated to achieve individual and collective goals
- groups of similar businesses or clubs that have common interests and become networked together to provide mutual support and resources
- organizations that promote cultural and educational regularity and development within society
- patterns of relationships through which information flows in an organization
- interaction that does not follow the formal structure of organization but emerges out of natural social interaction among organization members
- superiors issue messages to subordinates
15 Clues: misinterpreting information • superiors issue messages to subordinates • subordinates issue messages to superiors • an unfounded or false notion, traditionally a legend • messages between members of an organization with equal power • a figure of speech that creates an analogy between two objects • ...
Syyskuu Sanaristikko 2013-09-17
Across
- Tellabs CEO in February 2004 (an Indian name :))
- The routing protocol used in Fibre Channel networks, created by Brocade Communications Systems
- CS7, EF, AF, BE are all called as ---- in the DiffServ world!
- Small cells encompass ------, picocell, and microcell
- In September 1985, this company (short form) became the fifth company to register a .com domain name
- This company founded Flow Management Protocol in 1996 which was the basis for the discovery of MPLS protocol!!!
Down
- One of the key investors of Aricent Group (short form is mentioned here)
- This is used to control network access based on the MAC Address of the network adapter.
- Remove the label one-hop before its destination :)
- They fix bugs from MASI :)
- MG-Soft is used for browsing these objects.
- The backbone of our devices - comes in two versions. Version 2 is vital for CIR2 :)
- This table contains the information necessary to 'forward' IP Datagrams such as nexthop information.
- Traps are associated with this protocol.
- LACP talks about this feature!
15 Clues: They fix bugs from MASI :) • LACP talks about this feature! • Traps are associated with this protocol. • MG-Soft is used for browsing these objects. • Tellabs CEO in February 2004 (an Indian name :)) • Remove the label one-hop before its destination :) • Small cells encompass ------, picocell, and microcell • ...
Computer Science for Digital Litearcy 2024-02-24
Across
- the physical parts of a computer, things you can touch
- a computer whose function is to store, process, send, or receive data
- the information computers give to users, devices, or other computers, i.e. video, sound, images
- established rules that determine how data is transmitted
- giant warehouses that house thousands of processing and storage devices
- a service that translates URLs to IP addresses
- the thinking work a computer does to turn an input into an output
- saving information on a physical device so it can be used later
- information that is entered into or received by a computer
Down
- programs, data and instructions to complete tasks
- a connection made of tiny glass tubes that use light to pass information
- an easy to remember address for calling a specific IP address
- a network of computer networks that can exchange information between devices
- a number assigned to any device connected to the Internet
- the delivery of technology resources – including storage and processing – through the Internet
15 Clues: a service that translates URLs to IP addresses • programs, data and instructions to complete tasks • the physical parts of a computer, things you can touch • established rules that determine how data is transmitted • a number assigned to any device connected to the Internet • information that is entered into or received by a computer • ...
AZ104KH 2024-07-25
Across
- A fully managed service that provides more secure and seamless Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to virtual machines (VMs)
- The abbreviation used to identify the category of service for an Azure virtual machine
- Network Security Group (abbreviation)
- The abbreviation used to give people access to a file in a storage account for a small amount of time
- Distributes network traffic across multiple servers
- Provides a private connection between your on-premises networks and Azure
- The correct term we use when we stop a virtual machine properly
- The number of ip addresses that Azure reserves per subnet
Down
- (7,7) The home of a virtual machine
- An emulation of a physical computer
- A container that holds related resources for an Azure solution
- (5,2,4)This is a secure connection to your virtual network from an individual client computer
- Microsoft's cloud-based identity and access management service
- Scalable object storage for unstructured binary data
- A group of identical, load-balanced VMs
15 Clues: (7,7) The home of a virtual machine • An emulation of a physical computer • Network Security Group (abbreviation) • A group of identical, load-balanced VMs • Distributes network traffic across multiple servers • Scalable object storage for unstructured binary data • The number of ip addresses that Azure reserves per subnet • ...
AP CSP Vocab Review - Jayden Rose 2023-04-25
Across
- The process of removing errors from computer hardware/software
- The art/science of writing hidden or encrypted messages
- A machine that processes information
- Electronic and mechanical components within a computer that allow it to carry out a program's instructions
- Selection or conditional algorithm that lets a program choose between different actions
- Malware that encrypts and locks computer systems until a ransom is paid
- Data sent by a user to a computer for processing by a program
Down
- A data abstraction that allows a user to name a memory location and have it hold different values
- Limited use of copyrighted material without needing the permission of the copyright holder
- A computer connected directly to the internet; Usually provides services
- A way to store persistent data, such as TinyDB or Firebase
- A device that transmits data between two different networks
- A barrier that protects a network from unauthorized access
- A malicious program that disguises itself as a useful program
- A 32 bit IP address
15 Clues: A 32 bit IP address • A machine that processes information • The art/science of writing hidden or encrypted messages • A way to store persistent data, such as TinyDB or Firebase • A barrier that protects a network from unauthorized access • A device that transmits data between two different networks • A malicious program that disguises itself as a useful program • ...
Business Function Review 2023-05-18
Across
- function of business that resolves employee issues with management
- legal way to protect a design or invention from being copied
- function of business that deals with advertising and promotion
- keeps the computers and networks in working order for a business
- things that are desirable, but not needed to sustain life
- function of business that deals with day to day functions that a business requires to exist
- a business owned by many people who share no liability for business failures
- legal way to protect a work of art-song-or writing
Down
- a business owned by only one person
- function of business that deals with running the business and controlling employees
- function of business that deals with money and finances
- a business owned by two or more people who share liability
- things required to sustain human life
- a business that does not seek to grow its bank account, only to grow a better community
- legal way to protect a symbol or character of a business
15 Clues: a business owned by only one person • things required to sustain human life • legal way to protect a work of art-song-or writing • function of business that deals with money and finances • legal way to protect a symbol or character of a business • things that are desirable, but not needed to sustain life • a business owned by two or more people who share liability • ...
Scientific terms 2024-09-25
Across
- The study of the nervous system.
- The practice of protecting computer systems and networks from cyberattacks.
- Intelligence The simulation of human intelligence in machines that can learn and solve problems.
- The application of computer science to biology, especially in the analysis of biological data.
- The study of genes and heredity.
- The complete set of genetic material of an organism.
- A well-substantiated explanation of an aspect of the natural world based on observation, experimentation, and reasoning.
Down
- The study of the physics of the universe.
- A proposed explanation for a phenomenon that can be tested through experimentation
- The design of products and processes inspired by nature.
- The design and construction of robots, often used to automate tasks.
- A set of rules or instructions to solve a problem or perform a task.
- The manipulation of matter on an atomic and molecular scale.
- The brain's ability to change and adapt throughout life.
- The use of living organisms to create products or processes.
15 Clues: The study of the nervous system. • The study of genes and heredity. • The study of the physics of the universe. • The complete set of genetic material of an organism. • The design of products and processes inspired by nature. • The brain's ability to change and adapt throughout life. • The manipulation of matter on an atomic and molecular scale. • ...
Methods of Communication 1 2025-03-02
Across
- The attitude or emotional quality of the speaker's voice.
- A response to information or behavior that helps improve communication.
- Communication through video over the internet, allowing face-to-face interaction from a distance.
- Looking directly into someone’s eyes during communication.
- The physical behaviors, expressions, and mannerisms used to communicate.
- Online platforms where people can create, share, or exchange content and connect with others.
- The transmission of messages or information without the use of words (e.g., body language, facial expressions).
- The quality of being clear and easy to understand.
Down
- Movements of facial muscles that convey emotions or reactions.
- Movements of the body or limbs that express thoughts or feelings.
- Real-time text communication over the internet or networks.
- The application of scientific knowledge for practical purposes, particularly in communication tools (e.g., smartphones, computers).
- Fully concentrating, understanding, and responding during a conversation.
- The use of words to convey messages, both spoken and written.
- Electronic messages sent over the internet.
15 Clues: Electronic messages sent over the internet. • The quality of being clear and easy to understand. • The attitude or emotional quality of the speaker's voice. • Looking directly into someone’s eyes during communication. • Real-time text communication over the internet or networks. • The use of words to convey messages, both spoken and written. • ...
IT Insights 2023-10-25
Across
- Electronic letters you send and receive through the Internet
- Acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- Aerial term used to describe online data storage
- Team name used for St. Clair College athletic teams
- This device has rules to control the flow of data into and out of a network
- Branch of IT responsible for protecting networks and data from external attack
- Where you can find your course materials, and collaborate with your instructor
- A program that you use to access websites on the Internet
- Harmful software that can infect your computer and cause problems
Down
- St. Clair College emblem
- A web site where you can ask a question and it provides matches(ie. Google, Bing)
- A global network of connected computers where you can find information, watch videos, and communicate with others
- Where you can find your student timetable, transcript, etc.(abbrev.)
- Term used for organized, competitive computer gaming
- A network connection without wires
15 Clues: St. Clair College emblem • A network connection without wires • Aerial term used to describe online data storage • Team name used for St. Clair College athletic teams • Term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • Electronic letters you send and receive through the Internet • ...
Information Technology 2024-09-11
Across
- An electronic device that receives data, processes data, stores data, and produces a result known as output
- A system of computers, peripherals, terminals, and databases connected by communication lines
- A set of instructions that tells the computer what to do
- the temporary memory of a computer
- Technology that enables information to be used to produce products and services
- The brain of a computer, also known as the hard drive
- hardware that allows you to communicate with your computer
- hardware that allows you to store or retrieve information
Down
- software that controls the operation of the whole computer system
- the use of audio, video, animation, or graphics in a publication
- software that performs a specific task
- device hardware that allows your computer to communicate with the user
- the sequence of events that a computer uses to process information (Information _______ ______)
- The physical parts of a computer
- Electronic information networks that carry audio, video, and computer data
15 Clues: The physical parts of a computer • the temporary memory of a computer • software that performs a specific task • The brain of a computer, also known as the hard drive • A set of instructions that tells the computer what to do • hardware that allows you to store or retrieve information • hardware that allows you to communicate with your computer • ...
Unit 26-28 P.M 2024-11-26
Across
- personal identifaction number
- transaction authorization number
- authentication Something the shows who the user is.
- type of cetiface used to make a credit card transactions secure.
- a security system that controls network traffic to protect against unauthorized access.
- banking The type of banking where you can use mobile phone networks to perform transactions.
- buying and selling of goods or services over the internet.
- the most common type of e-commerece.
Down
- a cyberattack where attackers trick individuals into revealing sensitive information, like passwords or credit card details, by impersonating legitimate entities.
- This is malicious software designed to secretly collect user data without their consent.
- The type of commerce that links two firms.
- self copying programs
- Computer criminals who use technology to perform a variety of crimes.
- malicious software what is designed to damage, disrupt, or gain unauthorized access to computer systems or data
- the act of illegally copying, distributing, or using software, media, or other copyrighted content.
15 Clues: self copying programs • personal identifaction number • transaction authorization number • the most common type of e-commerece. • The type of commerce that links two firms. • authentication Something the shows who the user is. • buying and selling of goods or services over the internet. • type of cetiface used to make a credit card transactions secure. • ...
AUTOMATION TECHNOLOGY AND TOOLS 2024-03-27
Across
- learning / A type of technology that allows machines to learn from experience.
- / The act of making something known globally.
- / The systematic study of the structure and behavior of the physical and natural world through observation and experiment.
- / A period of time that is important for its developments in technology, culture, or society.
- / The process of making something operate automatically.
- / The examination or inspection of something to assess its quality.
- / A global system of interconnected computer networks.
Down
- /The opposite of analog; converting information into a digital format.
- / The practice of protecting information from unauthorized access.
- / The science of artificial intelligence.
- / The collective name for services and applications that run on the internet instead of locally on a computer.
- / A measure of how well a system or process works.
- / The creation of goods and services.
- / The act of making or producing something in a way that has not been done before.
- / The act of making errors less frequent or eliminating them entirely.
15 Clues: / The creation of goods and services. • / The science of artificial intelligence. • / The act of making something known globally. • / A measure of how well a system or process works. • / A global system of interconnected computer networks. • / The process of making something operate automatically. • / The practice of protecting information from unauthorized access. • ...
1984 Vocab 2023-01-23
Across
- an economic and political system based on collective ownership of the means of production
- the action of subjecting a country or person to one's control, or the fact of being subjected
- discover or identity the presence or existence of
- the dissemination of information - facts, arguments, rumours, or lies to influence public opinion
- relating to or typical of the middle class
- a secret plan by a group to do something unlawful or harmful
- intense and eager enjoyment, interest, or approval
Down
- capacity to endure pain or hardship
- the quality or state of being chaste
- tube systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum
- softened or matured by age or experience
- the act of simultaneously accepting two mutually contradictory beliefs as correct
- the specialized language used by people in the same work or profession
- fail to resist pressure, temptation, or some other negative force
- offering nothing that is stimulating or challenging
15 Clues: capacity to endure pain or hardship • the quality or state of being chaste • softened or matured by age or experience • relating to or typical of the middle class • discover or identity the presence or existence of • intense and eager enjoyment, interest, or approval • offering nothing that is stimulating or challenging • ...
Unit 3 2022-08-26
Across
- The amount of data moving across a computer network at any given time.
- The physical and logical network layout of the network.
- When you have two or more computers connected to each other.
- It is a necessary precaution to minimize the risk of hackers illegally accessing a network.
- Most devices are equipped with a wireless Network _______________ Card.
- A topology that integrates a star and a bus topology.
- The actual layout of the computer cables and other network devices.
- The way which the network appears to the devices the uses it.
- "Wifi" stands for____________.
Down
- A host on a bus network is called a/an ___________.
- LAN stands for ________ Area Network.
- It is one of the most common used cable for networks.
- This network topology can withstand high traffic.
- In this topology, devices are connected in a circular shape.
- A bus topology is where each computer and network device are connected to a single cable or __________.
15 Clues: "Wifi" stands for____________. • LAN stands for ________ Area Network. • This network topology can withstand high traffic. • A host on a bus network is called a/an ___________. • It is one of the most common used cable for networks. • A topology that integrates a star and a bus topology. • The physical and logical network layout of the network. • ...
COMPUTER ASSIGNMENT 2025-06-19
Across
- In this type of computer network, computer terminals can be physically connected with wires.
- Each computer in a network is called _____.
- This kind of network connects two or more distant places.
- when multiple mismatched copies of a file are stored on different computers, it is called data ____.
- It refers to a computer network that allows controlled informationsource available on internet.
- _____ in computers brings efficiency, economy and effectiveness in an organisation.
Down
- It refers to a computer network restricted to an organisation.
- It can be either physical or logical.
- It is a computer network that is mainly created for an individual person.
- It is a larger network than LAN and is spread across the city.
- It enables you to connect your computer to the available internet.
- A work similar to a hub.
- Network ____ means protecting data and resources from any unauthorised access.
- It is a device that connects two different types of networks with each other.
- In ____ topology, all the nodes are connected in a circular manner.
15 Clues: A work similar to a hub. • It can be either physical or logical. • Each computer in a network is called _____. • This kind of network connects two or more distant places. • It refers to a computer network restricted to an organisation. • It is a larger network than LAN and is spread across the city. • ...
networking concepts 2025-06-09
Across
- each computer in a network
- Secure code to login with Username.
- larger network than LAN and is spread across a city.
- a group of computers linked together for sharing data and resources tions.
- each node is connected every other node in the network.
- a network device that is used to connect all computers in a network with each other.
- refers to a computer network that allows controlled access to an information source.
- certain sets of rules that determine how data should be transferred over networks.
Down
- modulator-demodulator
- a computer network restricted to an organisation.
- a type of topology which is very popular..Point-to-Point simplest form of network..Username user is given a unique login name
- it stands for Local Area Network.
- transmitting message from the source computer and destination computer by using the physical address.
- device that connects two different types of network with each other.
- a wireless technology used to interconnect phones and many devices.
15 Clues: modulator-demodulator • each computer in a network • it stands for Local Area Network. • Secure code to login with Username. • a computer network restricted to an organisation. • larger network than LAN and is spread across a city. • each node is connected every other node in the network. • a wireless technology used to interconnect phones and many devices. • ...
Organizational Structure, Design, Technology, and Information Technology 2025-11-01
Across
- The protection of digital systems and data from unauthorized access or attacks.
- The introduction of new ideas or technologies to improve public sector performance.
- Online platforms enabling citizens to access government services digitally.
- The process of converting traditional public services into technology-based systems.
- Extremely large datasets analyzed to reveal patterns and trends in public management.
- A decentralized digital ledger ensuring transparency and security of records.
Down
- Monitoring citizens’ data or behavior, often raising ethical and legal concerns.
- Intelligence The simulation of human intelligence in machines to perform administrative tasks.
- The process through which innovation spreads within and across organizations.
- The use of machines or software to perform repetitive government functions efficiently.
- The ability of systems, devices, and citizens to interact through digital networks.
- The right to control personal data and protection from misuse in digital governance.
- An urban area using sensors, IoT, and analytics to enhance citizen life quality.
- Openness in government activities, allowing citizens to access information freely.
- The synchronization between digital initiatives and organizational strategy.
15 Clues: Online platforms enabling citizens to access government services digitally. • The synchronization between digital initiatives and organizational strategy. • The process through which innovation spreads within and across organizations. • A decentralized digital ledger ensuring transparency and security of records. • ...
Chapter 10 2013-03-24
Across
- Strategy used primarily in web marketing that relies on consumers to pass on messages about a product
- blasting millions of unsolicited e-mail ads
- Internet services that locate information based on key words,
- Gossip created by people over a popular interest in something
- Audio shows broadcast from the web that can be downloaded to an MP3.
- Allows users to express themselves,interact with friends, and publish their owm content on the internet.
- iconic figure used in entertainment
- Web "bugs" that can be placed on your computer by a web server to track your online movements
- A linked system of international computer networks
Down
- Use of wireless communication to reach people on the move with a location-based message.
- Personal diary-like web page.
- Web advertisements that are similar to TV programs with a developing storyling
- A form of unconventional marketing,Often associated with staged events.
13 Clues: Personal diary-like web page. • iconic figure used in entertainment • blasting millions of unsolicited e-mail ads • A linked system of international computer networks • Internet services that locate information based on key words, • Gossip created by people over a popular interest in something • Audio shows broadcast from the web that can be downloaded to an MP3. • ...
Chapter 10 2013-03-24
Across
- Personal diary-like web page.
- A form of unconventional marketing,Often associated with staged events.
- Web advertisements that are similar to TV programs with a developing storyling
- Strategy used primarily in web marketing that relies on consumers to pass on messages about a product
- Internet services that locate information based on key words,
- Audio shows broadcast from the web that can be downloaded to an MP3.
Down
- Allows users to express themselves,interact with friends, and publish their owm content on the internet.
- Web "bugs" that can be placed on your computer by a web server to track your online movements
- Marketing Use of wireless communication to reach people on the move with a location-based message.
- Gossip created by people over a popular interest in something
- Iconic figure used in entertainment
- A linked system of international computer networks
- blasting millions of unsolicited e-mail ads
13 Clues: Personal diary-like web page. • Iconic figure used in entertainment • blasting millions of unsolicited e-mail ads • A linked system of international computer networks • Gossip created by people over a popular interest in something • Internet services that locate information based on key words, • Audio shows broadcast from the web that can be downloaded to an MP3. • ...
The internet and social media 2016-09-07
Across
- a place to communicate with others over the internet
- a self-portrait; a picture that you take of your self
- on the internet
- a portable personal computer
- to create a link a person or a page to a picture or post you upload
Down
- a person that gets information without permission
- a type of communications system that sends messages via internet
- to transfer (as data or files) from a computer to the memory of another device or a network
- the part of the computer that you look at
- a response to a post or message on social networks
- a website or webpage that is regularly updated by a person or group of people about their own experiences
- a piece of content (video or post) that becomes popular and is seen by many people
- to publish a message in a public place such as a social media website
13 Clues: on the internet • a portable personal computer • the part of the computer that you look at • a person that gets information without permission • a response to a post or message on social networks • a place to communicate with others over the internet • a self-portrait; a picture that you take of your self • ...
Internet 2023-07-05
Across
- A digital message sent electronically to communicate with others.
- Safety Guidelines and precautions to ensure safe and responsible internet use.
- Gaming Playing games with other people over the internet.
- To transfer data or files from the internet to your computer.
- Measures taken to protect computers, networks, and data from unauthorized access or attacks.
- Media Websites and applications that allow people to connect and share content online.
- A global network that connects computers and allows communication and access to information.
Down
- A collection of web pages that can be accessed on the internet.
- To communicate with others in real time using text messages on the internet.
- Connected to or available through the internet.
- A wireless technology that allows devices to connect to the internet without using cables.
- A program used to access and navigate websites on the internet.
- Playing audio or video content directly from the internet without downloading it.
- Engine A tool that helps you find information on the internet.
- To transfer data or files from your computer to the internet.
15 Clues: Connected to or available through the internet. • Gaming Playing games with other people over the internet. • To transfer data or files from the internet to your computer. • To transfer data or files from your computer to the internet. • Engine A tool that helps you find information on the internet. • ...
danielisdanielisdanielisdanielisdaniel(who is cool) 2025-03-11
Across
- practical contact with and observation of facts or events
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- practical contact with and observation of facts or events
- (with reference to a solid) become or cause to become incorporated into a liquid so as to form a solution
- extreme anxiety, sorrow, or pain
- reaching a high or the highest degree; very great
- a disagreement, argument, or debate
Down
- a scientific procedure undertaken to make a discovery, test a hypothesis, or demonstrate a known fact.
- without discrepancy (used to emphasize the accuracy of a figure or description).
- cause to cover a larger area; make longer or wider.
- a disagreement, argument, or debate
- get rid of by throwing away or giving or selling to someone else
- fail to obey (rules, a command, or someone in authority)
- the state of wanting to know or learn about something or someone
- cry out suddenly, especially in surprise, anger, or pain.
15 Clues: extreme anxiety, sorrow, or pain • a disagreement, argument, or debate • a disagreement, argument, or debate • reaching a high or the highest degree; very great • cause to cover a larger area; make longer or wider. • fail to obey (rules, a command, or someone in authority) • practical contact with and observation of facts or events • ...
Computer Science Vocabulary 2025-03-10
Across
- A set of steps carried out, in order, to solve a problem
- Converting actions into a symbolic language
- Shows a start or end point on a flowchart
- Shows a decision on a flowchart
- The protection of computing devices, systems, and networks from theft of, or damage to their hardware, software, or electronic data
- When you write down a computer code in plain English, shorthand, or bullet points to communicate the high level design without actually writing the program
- Shows a process on a flowchart
Down
- Finding and fixing issues in code
- A graphical representation that depicts a troubleshooting process, system, or algorithm
- The study of computers and their algorithmic processes
- Shows the relationships between things in a flowchart
- A programming concept that is a set of steps carried out, in order
- All information stored and processed by a computing device
13 Clues: Shows a process on a flowchart • Shows a decision on a flowchart • Finding and fixing issues in code • Shows a start or end point on a flowchart • Converting actions into a symbolic language • Shows the relationships between things in a flowchart • The study of computers and their algorithmic processes • A set of steps carried out, in order, to solve a problem • ...
cybersecurity axel 2025-11-26
Across
- – A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
- – The process of confirming that someone or something is genuine.
- – Software designed to harm or exploit any device, service, or network.
- - Protocol similar to arp , but for IPv6
- – A secret word or phrase used to verify a user’s identity.
Down
- - Type of malware that secretly gathers information from an infected computer.
- - Code that assigns a numerical value to basic English letters, characters, and symbols
- - Used to perform distributed denial-of-service (DDoS) attacks.
- - Secret method of bypassing normal authentication or security controls.
- - A standalone malware that replicates itself in order to spread to other computers.
- - A group of communicating computers and peripherals known as hosts
- – An attempt to damage, steal, or disrupt digital systems or networks.
- – The process of converting data into a code to prevent unauthorized access
13 Clues: - Protocol similar to arp , but for IPv6 • – A secret word or phrase used to verify a user’s identity. • - Used to perform distributed denial-of-service (DDoS) attacks. • – The process of confirming that someone or something is genuine. • - A group of communicating computers and peripherals known as hosts • ...
Be generous 2017-12-04
4 Clues: this is what you show others • this is built between two people • are created she students follow this principle • are made based on the generosity shown by students
Chapter 1 Crossword 2016-01-13
Across
- book Electronic version of a printed book
- Electronic document on the web
- Collaborative website that allows users to create/modify content via browsers
- message Photo or image sent from a smartphone or other mobile device
- A hard copy
- Thin, light weight computer that has a touch screen
- Internet-capable phone that includes many apps
- device Any hardware component that conveys information from a computer to a user
- computing Involves reducing electricity and waste generated when using a computer
- Computer dedicated to providing one or more services to other computers
Down
- Pointing device that fits under the palm of your hand
- Programs designed to make users more productive, or assist them with tasks
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
- Worldwide collection of computer networks
- flash drive Portable flash memory storage device that you plug into a USB port
- message Short video clip sent from a smartphone or other mobile device
- Light-sensing device that converts printed text into a form a computer can process
- Recorded media that users can download
- Small speakers that rest inside each ear canal
- Anyone who interacts with a computer or mobile device
20 Clues: A hard copy • Electronic document on the web • Recorded media that users can download • book Electronic version of a printed book • Worldwide collection of computer networks • Internet-capable phone that includes many apps • Small speakers that rest inside each ear canal • Thin, light weight computer that has a touch screen • ...
Chapter 1 Crossword 2016-01-13
Across
- Collaborative website that allows users to create/modify content via browsers
- Small speakers that rest inside each ear canal
- message Short video clip sent from a smartphone or other mobile device
- Internet-capable phone that includes many apps
- Recorded media that users can download
- computing Involves reducing electricity and waste generated when using a computer
- Worldwide collection of computer networks
- Pointing device that fits under the palm of your hand
- Thin, light weight computer that has a touch screen
- A hard copy
- Anyone who interacts with a computer or mobile device
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
Down
- Electronic document on the web
- Computer dedicated to providing one or more services to other computers
- Light-sensing device that converts printed text into a form a computer can process
- Programs designed to make users more productive, or assist them with tasks
- flash drive Portable flash memory storage device that you plug into a USB port
- book Electronic version of a printed book
- message Photo or image sent from a smartphone or other mobile device
- device Any hardware component that conveys information from a computer to a user
20 Clues: A hard copy • Electronic document on the web • Recorded media that users can download • Worldwide collection of computer networks • book Electronic version of a printed book • Small speakers that rest inside each ear canal • Internet-capable phone that includes many apps • Thin, light weight computer that has a touch screen • ...
Chapter 1 Crossword 2016-01-13
Across
- Collaborative website that allows users to create/modify content via browsers
- Computer dedicated to providing one or more services to other computers
- Light-sensing device that converts printed text into a form a computer can process
- device Any hardware component that conveys information from a computer to a user
- Internet-capable phone that includes many apps
- Worldwide collection of computer networks
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
- book Electronic version of a printed book
- Recorded media that users can download
- Pointing device that fits under the palm of your hand
- Small speakers that rest inside each ear canal
Down
- message Photo or image sent from a smartphone or other mobile device
- A hard copy
- Anyone who interacts with a computer or mobile device
- Programs designed to make users more productive, or assist them with tasks
- message Short video clip sent from a smartphone or other mobile device
- Thin, light weight computer that has a touch screen
- Electronic document on the web
- computing Involves reducing electricity and waste generated when using a computer
- flash drive Portable flash memory storage device that you plug into a USB port
20 Clues: A hard copy • Electronic document on the web • Recorded media that users can download • Worldwide collection of computer networks • book Electronic version of a printed book • Internet-capable phone that includes many apps • Small speakers that rest inside each ear canal • Thin, light weight computer that has a touch screen • ...
Unit 7 2015-12-16
Across
- an energy source from burning wood and crops
- women achieving improvements
- provide security and protection for citizens
- provides services to individual people
- energy that hasn’t been discovered but thoughts to exist
- based off of decent standards of living, long and healthy living, and access to knowledge
- marked by a shift from heavy industry to consumer goods
- amount that people are willing to buy at
- costs resulting from the unique characteristics of a location
- marked by a very high percentage of people engaged in agriculture and a high percentage of national wealth allocated to nonproductive activities
- the interaction of people with technology
- costs associated with the established transportation networks accessible from a specific place
Down
- purpose is to facilitate other businesses
- power harnessed from the movement of water turned into electricity
- energy that has been discovered
- renewable energy resource supplied by the sun
- elite group initiates innovative economic activities that ultimately stimulate an increase in productivity
- modern technology pervades from the few takeoff industries to other economics sectors, thus sparking rapid growth
- rapid growth is generated in a limited number of economic activities
- amount of something you have for sale
20 Clues: women achieving improvements • energy that has been discovered • amount of something you have for sale • provides services to individual people • amount that people are willing to buy at • purpose is to facilitate other businesses • the interaction of people with technology • an energy source from burning wood and crops • provide security and protection for citizens • ...
Computer Vocabulary 2020-03-11
Across
- Passive form of cooling
- Distributor of computer hardware
- a device that you connect to a home entertainment system
- a small device able to be connected to and used with a computer
- Provides input and output of audio signals to and from a computer under control of computer programs
- a unit of information equal to one million
- Provides additional features to a computer such as video, sound, advanced graphics, Ethernet or memory
- a hardware component that supplies power to an electrical device
- Central Processing unit
Down
- The most essential parts of a computer system
- an abbreviation for Peripheral Component Interconnect
- Used to measure the transmission speed of electronic devices, including channels, buses and the computer's internal clock
- Self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- Random-access memory
- a unit of measurement for alternating current or electromagnetic
- One of the most common forms of network cable used on wired networks
- Generates a feed of output images to a display device
- Read-only memory
- Electronic device that connects a computer to a computer network
- a facility allowing computers, smartphones, or other devices to connect to the Internet
20 Clues: Read-only memory • Random-access memory • Passive form of cooling • Central Processing unit • Distributor of computer hardware • a unit of information equal to one million • The most essential parts of a computer system • an abbreviation for Peripheral Component Interconnect • Generates a feed of output images to a display device • ...
Unit 5 Lab 2021-01-19
Across
- / Networks of small vessels that perfuse tissues
- / Stands for coronary artery bypass graft surgery
- / An organ that pumps blood through the cardiovascular system
- vessels / Transport oxygenated blood to the heart muscle
- / Root word for "artery"
- / Root word for "heart"
- / Disease that causes irregular heart beat or rhythm
- / A test that uses sound waves to produce live images of your heart
- / Stands for cardiac resynchronization therapy
- / Root word for "vessel"
- / Root word for "Aorta"
- Tests / A scientific examination of a sample of blood
Down
- / Test that measures the heart's electrical activity
- Heart / Disease where a problem with heart function is present from birth
- Artery / Disease that affects the arteries that feed the heart muscle
- Heart / Disease that causes inflammation in the heart and which can affect the function of heart valves
- / Vessels that deliver blood to tissues
- / Stands for cardiovascular disease
- Angiography / Is a procedure that uses contrast dye and x ray pictures to detect blockages
- Testing / A cardiological test that measures the heart's ability to respond to external stress
- / Stands for transcatheter aortic valve replacement
- / Stands for implantable cardioverter defibrillator
- / Root word for "arteriole"
- regurgitation / Disease which blood leaks back through the mitral valve of the heart during contractions
- / Tubes that carry oxygen-depleted blood toward the heart
25 Clues: / Root word for "heart" • / Root word for "Aorta" • / Root word for "artery" • / Root word for "vessel" • / Root word for "arteriole" • / Stands for cardiovascular disease • / Vessels that deliver blood to tissues • / Stands for cardiac resynchronization therapy • / Networks of small vessels that perfuse tissues • / Stands for coronary artery bypass graft surgery • ...
Unit 2 vocabulary 2017-11-17
Across
- a standardized system for tagging text files
- The key component of a computer system
- To communicate electronically on the computer
- a location or address identifying where documents can be found on the Internet
- a system of interlinked hypertext
- A piece of code that is capable of copying itself and has a detrimental effect
- Camera that records and stores digital images
- The programs and other operating information used by a computer
- To copy data from one computer system to another or to a disk
- Combining words and phrases using the words AND, OR, NOT and NEAR
- To browse the Internet; look around casually and randomly
Down
- a camera used for electronic motion picture acquisition
- A link from a hypertext file or document to another location or file
- Computer programs with a user interface
- The machines, wiring, and other physical components of a computer
- The imparting or exchanging of information or news
- The application of scientific knowledge for practical purposes
- An international computer network providing e-mail and information from computers
- A program that accesses and displays files on the Internet and other networks
- The intellectual study of the structure and behavior of the physical and natural world
20 Clues: a system of interlinked hypertext • The key component of a computer system • Computer programs with a user interface • a standardized system for tagging text files • To communicate electronically on the computer • Camera that records and stores digital images • The imparting or exchanging of information or news • a camera used for electronic motion picture acquisition • ...
MLCrossword 2020-09-13
Across
- notice taken of someone or something
- a regularization technique for neural networks that prevents overfitting
- the act or process of normalizing
- a group or system of interconnected people or things
- in contrast to feedback
- the process of adding information in order to prevent overfitting
- a function that can be "ON" (1) or "OFF" (0), depending on input
- a neural network model whose goal is to predict the input itself
Down
- a function derived from two given functions by integration
- the machine learning task of learning a function with labels' priori
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
- the process of partitioning a digital image into multiple segments
- an algorithm to efficiently calculate the gradients in a neural network
- an apparatus using mechanical power and having several parts
- involving or characterized by conflict or opposition
- Generative Adversarial Network
- an open source machine learning framework based on the Torch library
- arrange (things) in sets or groups
- rectified linear unit
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
MLCrossword 2020-09-12
Across
- the machine learning task of learning a function with labels' priori
- arrange (things) in sets or groups
- a neural network model whose goal is to predict the input itself
- a function that can be "ON" (1) or "OFF" (0), depending on input
- an apparatus using mechanical power and having several parts
- notice taken of someone or something
- an algorithm to efficiently calculate the gradients in a neural network
- a regularization technique for neural networks that prevents overfitting
- Generative Adversarial Network
- a function derived from two given functions by integration
Down
- rectified linear unit
- in contrast to feedback
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- the process of partitioning a digital image into multiple segments
- involving or characterized by conflict or opposition
- a group or system of interconnected people or things
- the act or process of normalizing
- the process of adding information in order to prevent overfitting
- an open source machine learning framework based on the Torch library
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
Quiz for your home work 2024-06-04
Across
- An electronic device for storing and processing data.
- Device A device that receives data from a computer (e.g., monitor, printer).
- Device A device used to provide data to a computer (e.g., keyboard, mouse).
- Central Processing Unit The brain of the computer that processes instructions.
- Electronic mail, a method of exchanging digital messages.
- Programs and operating information used by a computer.
- Random Access Memory Short-term memory that stores data temporarily.
- Wireless technology for connecting devices to the internet.
- Uniform Resource Locator The address of a web page.
- System Software that manages computer hardware and software (e.g., Windows, macOS).
- A global network connecting millions of private, public, academic, business, and government networks.
Down
- A wireless technology for exchanging data over short distances.
- Software used to access the internet (e.g., Chrome, Firefox).
- The physical parts of a computer.
- Where data is saved permanently (e.g., hard drive, SSD).
- A secret word or phrase used to authenticate access.
- A group of interconnected computers.
- Storage Saving data on remote servers accessed via the internet.
- A unique identifier for a user on a system.
- A collection of web pages on the internet.
20 Clues: The physical parts of a computer. • A group of interconnected computers. • A collection of web pages on the internet. • A unique identifier for a user on a system. • Uniform Resource Locator The address of a web page. • A secret word or phrase used to authenticate access. • An electronic device for storing and processing data. • ...
HACKER WEEK! 2024-06-24
Across
- An email or phone call you DON'T want
- When hackers fake who they are
- A piece of software that takes your computer hostage
- A type of software that keeps people safe on a network
- Getting people to hack for you, without them knowing it
- A pieces of software that copies itself and infects other computers
- A piece of software that burrows into a network and spreads itself
- A flaw in software that a hacker may take advantage of
- Any form of BAD software, like a virus or trojan
- A hacker who is not bad, but they may not be good
- A zombie computer
Down
- A hidden way into a computer system
- A Distributed Denial Of Service attack
- An email looking to steal someone's personal info
- Stealing and publishing someone's personal information
- A piece of software that infects the very basic parts of a computer
- A hacker who helps companies and schools secure their networks
- A hacker who wants to steal information or cause havoc
- A computer exploit that JUST came out
- A tool to solve an encrypted message
- Secure Socket Layer Technology
- A network of zombie computers
22 Clues: A zombie computer • A network of zombie computers • When hackers fake who they are • Secure Socket Layer Technology • A hidden way into a computer system • A tool to solve an encrypted message • An email or phone call you DON'T want • A computer exploit that JUST came out • A Distributed Denial Of Service attack • Any form of BAD software, like a virus or trojan • ...
Psychology Crossword 2024-07-24
Across
- Division of the PNS that is involved with involuntary responses
- cortex where conscious thought happens
- receives sensory information and sends it to the corresponding brain area
- division of the autonomic nervous system that is involved in the fight or flight response
- Lobe top middle of the brain and responsible for sensory perception
- Returns the body to homeostasis after a stress response
- fluid fluid that surrounds the brain
- Associated with fear and anger and triggers the fight or flight response
- lobe back of the brain and responsible for vision
Down
- Lobe at the front of the brain and responsible for personality
- part of the brain stem and regulates breathing and sleep cycles
- Lobe bottom middle of the brain and responsible for processing auditory information
- Brain and spinal cord
- Gland the gland that releases adrenaline
- Everything other than the brain and spinal cord (nerve networks in the rest of the body)
- Gland regulates circadian rhythms releasing melatonin
- division of the PNS that is involved in voluntary movements
- regulates body temperature appetite thirst and hormones
- responsible for the formation of new memories
- responsible for muscle control coordination and balance
20 Clues: Brain and spinal cord • fluid fluid that surrounds the brain • responsible for the formation of new memories • cortex where conscious thought happens • Gland the gland that releases adrenaline • regulates body temperature appetite thirst and hormones • responsible for muscle control coordination and balance • ...
Network: Functionality and performance of network systems 2024-08-08
Across
- you connect multiple devices, granting access to the web and more
- a network private and wont reveal your location or IP address
- assigns IP addresses to devices on a network
- amount of time it takes a packet to travel and get to its destination
- network traffic across multiple servers to ensure stability
- the network
- slight stutters
- a physical connection
- some pieces of data sent over a network don’t arrive at their destination, causing potential gaps in the received information
Down
- security device that monitors and filters incoming and outgoing network traffic
- certain types of traffic to ensure performance.
- the process of selecting paths in a network along which to send data packets
- network efficiencyand uses switches
- max amount of transfering data over a network
- multiple devices on a private network to share a single public IP address
- the assignment of unique identifiers to devices on a network
- use of communicating on a large scaleon a global or local netcwork but main purpose is to communicate
- larger networks into smaller....
- :are used to connect devices (such as computers, printers, servers, etc.) within a local area network (LAN)
- domain names into IP addresses
20 Clues: the network • slight stutters • a physical connection • domain names into IP addresses • larger networks into smaller.... • network efficiencyand uses switches • assigns IP addresses to devices on a network • max amount of transfering data over a network • certain types of traffic to ensure performance. • network traffic across multiple servers to ensure stability • ...
ORGANIZED CRIME - 1 2024-08-29
Across
- One of the two most known traits of OC.
- When a generation passes down their values, attitudes and crime techniques to the next.
- A subculture whose conduct is the opposite of its surrounding culture.
- A reason transnational OC has extended its reach.
- General rules about how to behave.
- OC crime groups do not have these kinds of goals.
- Provides a sense of entitlement.
- Individuals from criminal networks meet at points of ______.
- A person is more likely to be recruited into OC if they are this.
- As part of OC you never want to be this.
- Asks, "Why do most people conform to societal norms?
- A large group of people or term for OC.
- A state of normlessness.
Down
- OC is considered this as it does not like free trade.
- The solution to OC's bureaucratic structure.
- A term without a formal, agreed upon definition.
- Slang term for OC.
- Terrorists are motivated by this while OC groups are not.
- Terrorists seek this type of attention.
- "You are who you hang with" describes differential ______.
- A characteristic of OC with a vertical power structure.
21 Clues: Slang term for OC. • A state of normlessness. • Provides a sense of entitlement. • General rules about how to behave. • One of the two most known traits of OC. • Terrorists seek this type of attention. • A large group of people or term for OC. • As part of OC you never want to be this. • The solution to OC's bureaucratic structure. • ...
Cardiovascular Crossword 2023-06-23
Across
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- used to measure the level of other substances in your blood
- networks of small vessels that perfuse tissues
- specialized body fluid
- an emergency life-saving procedure that is done when someone's breathing or heartbeat has stopped
- abnormal heart rhythm
- when the heat does not get enought blood
- collect blood from capillaries and drain into veins
- history of
- to view
- veins that deliver blood to tissues
Down
- above/over or excessive
- narrowing, blocking, or spasms in a blood vessel
- heart is cut off from oxygen
- An X-ray tube inside the machine rotates around your body and collects images of your heart and chest
- gives a picture of your heart using ultrasound
- disease that makes it head for the heart to pump blood to the rest of the body
- slow
- pumps blood for the body
- intensive care unit
- emergency room
- vessels that return blood to the heart
- under or insufficient
- reads your heart’s electrical impulses. It shows how well your heart is beating.
- surgically remove
25 Clues: slow • to view • history of • emergency room • surgically remove • intensive care unit • abnormal heart rhythm • under or insufficient • specialized body fluid • above/over or excessive • pumps blood for the body • heart is cut off from oxygen • veins that deliver blood to tissues • vessels that return blood to the heart • when the heat does not get enought blood • ...
Year 9 Cycle 2 Recap 2023-04-26
Across
- The type of iteration where you specify how many times you want to repeat
- 0-9, A-F
- The network topology where every device is connected to every other device
- The type of iteration where you set a rule to repeat until it is met or no longer met
- The correct name for a network cable
- Data type for 2 possible values
- Each device that connects to a network needs one of these
- The network topology where all devices are connected to a central switch/server
- Images are made up of.....?
- Data type for whole numbers
- The amount of data that can be passed through a network in a given time
- The word used for 0s and 1s
- The device used to connect devices to other networks
Down
- Data type for a single letter, number or symbol
- What does WAN stand for?
- Connects multiple devices together in a LAN
- What does LAN stand for?
- The word used in programming when asking for data from the user
- The word used for repeating code in Python
- Data type for text
- Data type for a decimal number
21 Clues: 0-9, A-F • Data type for text • What does WAN stand for? • What does LAN stand for? • Images are made up of.....? • Data type for whole numbers • The word used for 0s and 1s • Data type for a decimal number • Data type for 2 possible values • The correct name for a network cable • The word used for repeating code in Python • Connects multiple devices together in a LAN • ...
Regulations Affecting Instant Payments 2023-05-22
Across
- What type of compliance does OFAC encourage be accounted for with new emerging payment technologies?
- Who has authority over the RTP Network?
- Applies to wholesale credits and requires commercially reasonable security practices.
- ________is governed by Regulation J, Operating Circular 8, and FedNow Operating Procedures.
- What part of Regulation CC defines availability for electronic payments?
- Type of settlement occurring with instant payments.
- What subpart of Regulation J addresses FedNow payments?
- Intended to protect individual consumers engaging in electronic fund transfers and remittance transfers.
- Message formatting standard used for instant payments.
Down
- These payments process 24X7X365.
- To be an instant payment, a transmission of a payment______must occur.
- ________requires next-day availability for withdrawal of electronic payments received.
- The________Operating Procedures govern participants transmitting payments through the RTP System.
- If you receive a high dollar instant payment you may need to file a what?
- Who initiates an instant payment?
- Requires a financial institution to compare accounts to government lists, and report and block any transactions resulting in a positive match.
- RTP and FedNow are both________payment networks.
- _________requires that we properly identify the payment and report any suspicious activity.
- An_______payment offers real-time funds availability.
- These payments process 24X7X52.
20 Clues: These payments process 24X7X52. • These payments process 24X7X365. • Who initiates an instant payment? • Who has authority over the RTP Network? • RTP and FedNow are both________payment networks. • Type of settlement occurring with instant payments. • An_______payment offers real-time funds availability. • Message formatting standard used for instant payments. • ...
Unit 1 Concepts - Intro to Cyber 2025-01-22
Across
- A type of malware that locks files until a ransom is paid
- An attack that floods a system with traffic to make it unavailable
- A scam where attackers impersonate a trusted entity to steal sensitive information
- Verifying the identity of a user or system
- A security system that monitors and controls network traffic
- A security process requiring two forms of verification to access an account
- A tool to store and generate secure passwords
- Software that secretly gathers user information without consent
Down
- An incident where data is altered without authorization
- A key used in encryption to secure communications that can be shared openly
- The process of converting information into a secure format to prevent unauthorized access
- Ensuring information is not accessed by unauthorized parties
- Practices designed to protect computers, networks, and data from attacks
- Ensuring information remains accurate and trustworthy
- Ensuring authorized users have access to information when needed
- Manipulating people to give up confidential information
- Harassment or bullying that occurs through digital platforms
- Malicious software designed to harm or exploit computers
- An incident where sensitive data is accessed without authorization
- A key used in encryption that must remain confidential
20 Clues: Verifying the identity of a user or system • A tool to store and generate secure passwords • Ensuring information remains accurate and trustworthy • A key used in encryption that must remain confidential • An incident where data is altered without authorization • Manipulating people to give up confidential information • ...
Struktur Keruangan dan Perkembangan Desa dan Kota 2024-09-23
Across
- Potensi nonfisik yang bertugas menjaga ketertiban dan keamanan demi kelancaran jalannya pemerintahan desa.
- Masyarakat kota memiliki hubungan sosial yang bersifat jangka pendek.
- Teori ini dikembangkan oleh Homer Hoyt ( 1930 ).
- Pusat pemukiman dan kegiatan penduduk yang mempunyai batas wilayah administrasi yang diatur dalam perundang-undangan.
- Tiga Unsur utama desa.
- Tahap kemunduran dari suatu kota.
- Pedesaan ( Zona Interaksi Pedesaan .
- Jumlah rumah umumnya kurang dari 40 rumah.
- Teori ini sebenarnya digunakan dalam hukum fisika, namun di aplikasikan dalam geografi.
- Ahli ini mengemukakan sebuah teori dalam bukunya yang berjudul Structure of Transportation Networks.
- Desa yang berpenduduk 250-1.000.
Down
- Sumber tenaga kerja potensial.
- Suatu hasil perpaduan antara kegiatan kelompok manusia dan lingkungan.
- Kota ini memiliki jumlah penduduk lebih dari 5 juta jiwa.
- Pola Pemukiman ini berbentuk memanjang mengikuti suatu ketampakan, seperti sungai dan jalan raya.
- Daerah Pusat Kegiatan.
- Daerah yang letaknya dekat dengan pusat kota atau inti kota.
- Desa yang kehidupannya didasarkan pada kegiatan industri.
- Unsur yang dapat menimbulkan keserasian dan ketenangan hidup warga kota.
- Wilayah ini merupakan daerah industri manufaktur dan pabrik - pabrik.
- Merupakan desa yang kehidupannya didasarkan pada kegiatan perikanan.
- Potensi ini sangat penting bagi desa yang bersifat agraris.
22 Clues: Daerah Pusat Kegiatan. • Tiga Unsur utama desa. • Sumber tenaga kerja potensial. • Desa yang berpenduduk 250-1.000. • Tahap kemunduran dari suatu kota. • Pedesaan ( Zona Interaksi Pedesaan . • Jumlah rumah umumnya kurang dari 40 rumah. • Teori ini dikembangkan oleh Homer Hoyt ( 1930 ). • Kota ini memiliki jumlah penduduk lebih dari 5 juta jiwa. • ...
COMMUNITY ORGANIZATION AND DEVELOPMENT 2025-03-07
Across
- A group of people working together towards a common goal
- A small group working on a specific project within a community
- communities to take ownership of their development process.
- ] A project designed to benefit the community
- Promoting long-term solutions that enhance the community's capacity to meet its own needs.
- ] A project designed to benefit the community
- A meeting where community members discuss important issues
- A set of principles guiding a community's actions
- A public campaign to raise awareness and support a cause
- A legal document that establishes a community organization
Down
- An event where people raise funds for a cause
- The process of finding and training new community leaders
- Being responsive to changing circumstances and needs within the community.
- A public gathering to voice concerns and suggest improvements
- The ability to take action and influence decisions in a community
- ] A place where people can seek help and resources
- community's ability to withstand and recover from challenges such as natural disasters and economic downturns
- survey conducted to understand community needs
- Capital] builds social networks and trust among community members, leading to increased cooperation and collective action
- aid provided to support community projects
20 Clues: aid provided to support community projects • An event where people raise funds for a cause • survey conducted to understand community needs • ] A project designed to benefit the community • ] A project designed to benefit the community • A set of principles guiding a community's actions • A group of people working together towards a common goal • ...
Technology vocabulary 2023-12-15
Across
- a secret word used to access a computer system
- engine a program that searches for information on the internet
- a portable computer with a touchscreen
- a mobile phone with more features
- a regularly updated website or webpage on a specific topic
- an input device with keys used to type
- wireless technology that allows devices to connect
- malicious software that replicates and spreads causing harm
- a global network connecting computers
- to make something current or bring up to date
- media online platforms to connect with others
- real-time communication between users over the internet
Down
- a pointing device used to interact with a computer
- the physical components of a computer
- programs and application that run on a electronic device
- computer system that protect data, networks, etc.
- a software application used to access websites
- word short for the word 'application'
- to transfer data to your device
- to transfer data from the internet
- an electronic device that starts with a 'c'
- a collection of webpages available through internet
- to end a session on a website or computer
- electronic mail
- a unique name used to identify an individual on a computer
25 Clues: electronic mail • to transfer data to your device • a mobile phone with more features • to transfer data from the internet • the physical components of a computer • word short for the word 'application' • a global network connecting computers • a portable computer with a touchscreen • an input device with keys used to type • to end a session on a website or computer • ...
Cybersecurity 2024-10-17
Across
- The process of transforming data into a secret code
- A weak point in a system that can be exploited
- Protects digital data by requiring two forms of authentication
- The action of intercepting communication without permission
- An encrypted tunnel used for secure internet communication
- A deceptive method used to trick systems into executing harmful code
- A software update meant to fix bugs or vulnerabilities
- The overall practice of protecting networks and systems from digital attacks
- A malicious program that replicates itself
Down
- The concept of ensuring only authorized users have access to data
- Software designed to protect against malware
- A method used to guess a password by systematically checking all possibilities
- A type of software that monitors and blocks unauthorized network traffic
- A program that logs user keystrokes to steal information
- Unsolicited or junk email
- A small piece of malicious software disguised as legitimate software
- A person who tests security systems legally to find vulnerabilities
- A database of known vulnerabilities used by security analysts
- A type of attack that overwhelms a network with traffic
- A tool used to scan for vulnerabilities in a system
- A technique used by attackers to trick users into providing sensitive information
- The unauthorized access and use of data
22 Clues: Unsolicited or junk email • The unauthorized access and use of data • A malicious program that replicates itself • Software designed to protect against malware • A weak point in a system that can be exploited • The process of transforming data into a secret code • A tool used to scan for vulnerabilities in a system • ...
History 2024-10-04
Across
- Located in central Africa with overflowing wildlife
- Made the hajj during africa golden age
- permanent groups that were known for their cattle
- the Bantu language spoken by the costal city staetes
- The worlds second largest desert
- The language created in Ethiopia
- an Ethiopian king who built the churches in northern Ethiopia
- Kingdom that traded art
- The line of Ethiopian Christian monarchs that ruled Ethiopia from 1270-1636
- Founder of the Mali empire
- empire in west Africa with lots of trade
- built trade networks and traded with Europeans
- The empire in east africa which took over the western Sahel
Down
- the winds that help the people in city-states travel
- Dry land with shrubs and few animals
- Located in Southern Africa and great for farming
- Grasslands where most animals and people live
- The ruler of the kingdom of Aksum
- The powerful kingdom in Northern Ethiopia
- The stone ruins
- The kingdom lasting from 700's to now in western Africa
- Musa Richest man in the world
- The area of land in east africa that was known for their agriculture
- The founder of Songhai
- The walled circular area in zimbababwe
25 Clues: The stone ruins • The founder of Songhai • Kingdom that traded art • Founder of the Mali empire • Musa Richest man in the world • The worlds second largest desert • The language created in Ethiopia • The ruler of the kingdom of Aksum • Dry land with shrubs and few animals • Made the hajj during africa golden age • The walled circular area in zimbababwe • ...
nevaeh gamboa 2024-11-20
Across
- root word that means "the heart"
- carries blood away from your heart to your tissues and organs
- right ventricle
- damage to the heart muscle and heart valves
- used to see how your heart performs under physical stress
- blood pressure
- left atrium
- birth defects that affect the normal development and functioning of the heart
- sometimes called cardiac catheterisation, may be done after a heart attack or angina
- networks of small vessels that perfuse tissues
- coronary artery bypass grafting
- vessels that deliver blood to tissues
- a disease of the blood vessels supplying the heart muscle
Down
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- used to detect the risk factors for heart diseases
- vessels that return blood to the heart
- a disease of blood vessels supplying the arms and legs
- means to "pertain"
- ultrasound scan of the heart
- pumps blood through the system
- a disease of blood vessels supplying the brain
- root word that means "artery"
- root word that means "little vessel"
- beats per minute
- root word that means "atrium"
25 Clues: left atrium • blood pressure • right ventricle • beats per minute • means to "pertain" • ultrasound scan of the heart • root word that means "artery" • root word that means "atrium" • pumps blood through the system • coronary artery bypass grafting • root word that means "the heart" • root word that means "little vessel" • vessels that deliver blood to tissues • ...
Medical term 2024-11-08
Across
- atrial fibrillation
- vessels that deliver blood to tissues.
- antidiuretic hormone
- common tests healthcare providers use to measure or examine substances in your blood
- one dimensional
- a type of portable electrocardiogram (ECG)
- pumps blood through the system.
- also known as congestive heart failure
- Atrium
- how the heart works during physical activity. It also may be called a stress exercise test.
- creates high-resolution images of your heart
- type of heart disease involving the reduction of blood flow to the cardiac muscle due to build-up of atherosclerotic plaque in the arteries of the heart.
Down
- cardiovascular disease process involving one or more of the four valves of the heart.
- irregularities in the heartbeat, including when it is too fast or too slow.
- networks of small vessels that perfuse tissues.
- vessels that return blood to the heart.
- Yellowish fatty plaque
- automatic implantable cardioverter defibrillator
- Artery
- occurs when blood flow decreases or stops in one of the coronary arteries of the heart, causing infarction to the heart muscle.
- Vessel
- Aorta
- acute coronary syndromes
- looks at the chest
24 Clues: Aorta • Artery • Vessel • Atrium • one dimensional • looks at the chest • atrial fibrillation • antidiuretic hormone • Yellowish fatty plaque • acute coronary syndromes • pumps blood through the system. • vessels that deliver blood to tissues. • also known as congestive heart failure • vessels that return blood to the heart. • a type of portable electrocardiogram (ECG) • ...
tech terms 2025-05-02
Across
- software designed to corrupt
- 8 bits put together
- restarting the computer
- a way to backup information on your computer
- globally connected system of networks
- central processing unit
- basic unit of information represented by 0 and 1
- personally identifiable information
- regularly updated websites about a certain topic
- curcuit board that connects components of the computer
- drive a way to store data
- an example of an input device
- read only memory
- property creations of the mind
- physical parts of a computer
- an example of a browser
- portable document format
- an example of an output device
Down
- a unit of multiple bytes
- computer software that provides resources
- open source software
- an example of a search engine
- using code to protect sensitive information
- hypertext markup link
- machine language
- part of a computer you cant touch
- uniform resource locater
- transfer of data from one place to another
- reality computer generated simulation
- a program to block unauthorized access to your computer
- random access memory
- domain name system
- internet protocol
- divide difference between regions who have access to modern tech and those who dont
34 Clues: machine language • read only memory • internet protocol • domain name system • 8 bits put together • open source software • random access memory • hypertext markup link • restarting the computer • central processing unit • an example of a browser • a unit of multiple bytes • uniform resource locater • portable document format • drive a way to store data • software designed to corrupt • ...
Revision for legislation 2025-03-20
Across
- An automated program that performs tasks over the internet.
- A scam where attackers trick users into providing sensitive information.
- referring to computer monitors and related ergonomics.
- A malicious software that hides its presence to maintain control over a system.
- A social engineering tactic where an attacker fabricates a scenario to steal data.
- The increasing interconnectedness of economies and cultures worldwide.
- A program that automatically displays or downloads advertisements.
- A general term for malicious software, including viruses and spyware.
Down
- A social engineering attack that lures victims with fake offers.
- An error or flaw in software that causes it to malfunction.
- A common issue from prolonged screen use, causing strain and discomfort.
- Physical unease, often from poor posture or screen use.
- The act of gaining unauthorized access to computer systems.
- A type of malware that replicates and spreads by infecting files.
- A regulation protecting personal data and privacy in the EU.
- Malware that locks or encrypts files and demands payment to restore access.
- A cyberattack that redirects users from legitimate sites to fraudulent ones.
- A malicious program disguised as a legitimate file.
- Software that secretly collects user information.
- A self-replicating malware that spreads across networks.
20 Clues: Software that secretly collects user information. • A malicious program disguised as a legitimate file. • referring to computer monitors and related ergonomics. • Physical unease, often from poor posture or screen use. • A self-replicating malware that spreads across networks. • An automated program that performs tasks over the internet. • ...
ELA vocab 2025-03-20
Across
- The total amount of income by the sale of goods or services related to the company's operations
- evoking interest, attention, or admiration in a powerfully irresistible way.
- ___________ enacted a sweeping online safety law that will require many social networks
- _____ and Instagram
- _____ and airbags
- ________ 18 to have accounts without the explicit consent of a parent or guardian.
- _____ platforms.
- ______ Legislature
- risk (a sum of money or valued item) against someone else's on the basis of the outcome of an unpredictable event; bet.
Down
- of an argument or statement) seeming reasonable or probable.
- a statement or assertion that expresses a judgment or opinion.
- _____ health
- a government, especially an authoritarian one.
- a deliberative assembly with the legal authority to make laws for a political entity,
- a group of people leading the way in new developments or ideas.
- necessary for (someone) as a duty or responsibility.
- (of language) open to more than one interpretation; having a double meaning.
- could cut off young people in ____ from major online platforms
- great energy or enthusiasm in pursuit of a cause or an objective.
- a written outline of a movie, novel, or stage work giving details of the plot and individual scenes.
- ______ McKell
21 Clues: _____ health • ______ McKell • _____ platforms. • _____ and airbags • ______ Legislature • _____ and Instagram • a government, especially an authoritarian one. • necessary for (someone) as a duty or responsibility. • of an argument or statement) seeming reasonable or probable. • a statement or assertion that expresses a judgment or opinion. • ...
LAMINA1 Cryptography Challenge #1 2024-03-20
Across
- - Turning plain text into a unique code that cannot be reverted.
- - State of being free from unauthorized intrusion.
- - To convert information into code.
- - Number used once in a cryptographic communication.
- KEY - A key known only to the communicator.
- - Unbreakable encryption if used once.
- - LAMINA1’s chief cryptographer.
- - A puzzle of encryption or decryption.
- - Scaling solutions for blockchains.
- - one of the earliest practical examples of public key exchange.
- - To decode encrypted information.
- - 80s-era digital counterpart to traditional cash.
- - Proof construction where one can prove possession without revealing.
- - Transactions hidden from public view.
Down
- - Language of 0s and 1s.
- - Curved approach to public keys.
- - Widely used algorithm for secure data transmission
- - A cipher that rearranges order without altering actual letters.
- - Networks enabling direct exchanges of digital assets.
- - Attack method using exhaustive key searches.
- - Type of cryptography with two different keys.
- - Digital signature where the content is unseen by the signer.
- - Proof system where the prover convinces the verifier without conveying private information.
- - The foundation of security and cryptography.
- - A device or program used to generate cryptographic keys.
- - Not private; visible to all.
26 Clues: - Language of 0s and 1s. • - Not private; visible to all. • - LAMINA1’s chief cryptographer. • - Curved approach to public keys. • - To decode encrypted information. • - To convert information into code. • - Scaling solutions for blockchains. • - Unbreakable encryption if used once. • - A puzzle of encryption or decryption. • - Transactions hidden from public view. • ...
Grade 8 Vocabulary 2025-07-09
Across
- A satellite-based system that provides location and navigation information
- A medical expert who diagnoses and treats animals
- Relating to recent times, using up-to-date styles or technology
- A creamy dairy product made by fermenting milk with live cultures
- Having important significance in history or the past
- A skilled worker who builds and repairs wooden structures
- engineer A person who designs and manages computer networks
- A trained professional who flies and navigates aircraft
- Located on or near the shore of a sea or ocean
- Visually attractive in a charming or quaint way
- Contaminated with harmful substances, making air or water unsafe
- A scientist who studies stars, planets, and other celestial bodies
Down
- Full of energetic activity and noise, like a busy street
- A low area of land between hills or mountains, often with a river
- Involving or representing several different cultures or ethnic groups
- A healthcare professional who dispenses and counsels on medicines
- A specialist who analyzes and predicts weather patterns
- A natural underground chamber often found in hills or cliffs
- oven An appliance that uses microwave radiation to quickly heat food
- A portable touchscreen device used for browsing and apps
20 Clues: Located on or near the shore of a sea or ocean • Visually attractive in a charming or quaint way • A medical expert who diagnoses and treats animals • Having important significance in history or the past • A specialist who analyzes and predicts weather patterns • A trained professional who flies and navigates aircraft • ...
American Government 3e - Chapter 8 2025-07-16
Across
- “___ round the flag” effect after presidential televised speeches
- Professional who uncovers and reports news stories
- Collective term for television, print, radio, and internet news
- Large corporation owning multiple media outlets
- Online barrier restricting access to content to subscribers
- Agency that regulates broadcast content and licenses
- Role of media as a societal overseer or guardian
- Sensational, scandal-driven newspaper style
- Type of information provided to journalists that can't be attributed
- Cheap, early newspapers with sensational content
- Medium where politicians like Ocasio-Cortez and Trump bypass traditional press
- Combined sound and picture, revolutionizing media
- Modern-day term for type of journalism involving in-depth digging for wrongdoing
Down
- Role responsible for accuracy and clarity in newsroom content
- Publishing defamation not protected by the First Amendment
- FCC rule requiring broadcasters to treat candidates the same in terms of air time
- Informal name for media’s role in democracy
- Personalized online commentaries addressing specific readers
- Theory describing media's role in focusing public attention
- Investigative journalism exposing corruption in the Progressive Era
- 21st century medium with blogs, podcasts, and social networks
- Medium that many families had in the 1930s
22 Clues: Medium that many families had in the 1930s • Informal name for media’s role in democracy • Sensational, scandal-driven newspaper style • Large corporation owning multiple media outlets • Role of media as a societal overseer or guardian • Cheap, early newspapers with sensational content • Combined sound and picture, revolutionizing media • ...
Cognitive Psychology 2025-08-01
Across
- Shift from behaviourism to cognition is called as
- AI that defeated humans in Poker game (Texas hold 'em)
- one of the earliest experiment on memory was conducted by __
- __ of gaze which refers to the place one is looking at in Eye tracking
- Parallel Distributed Processing is known as
- Rays used in SPECT technique
- one of the principle of IP approach
- Magic number (7+/_ 2) was given by ___
- IP approach is known for __ processing
- fMRI works based on this principle
- Full form of CAT is Computer __ Tomography
- A limitation of lesion method
- PET refers to ___ Emission Tomography
Down
- One of the two methods under experimentation
- Method that focuses on the relationship between cognitive performance and cerebral events and structures.
- __ is used in EEG and MEG studies
- German American Psychologist writing the first book on cognitive psychology
- means used to record the information for EEG
- Who wrote the review against B.F Skinner's verbal behaviour
- Father of AI
- Verbal based analysis used to study complex cognitive processes
- TMS and TDCS are an example of Brain ___
- Connectionist emphasises on __ Networks
- Positive stimulation in TDCS
- Device used for MEG is called
25 Clues: Father of AI • Rays used in SPECT technique • Positive stimulation in TDCS • A limitation of lesion method • Device used for MEG is called • __ is used in EEG and MEG studies • fMRI works based on this principle • one of the principle of IP approach • PET refers to ___ Emission Tomography • Magic number (7+/_ 2) was given by ___ • IP approach is known for __ processing • ...
Credit Crossword 2022-09-16
Across
- annual percentage rate
- cash back, miles, points
- the reason why the interest rate changes
- card that takes money directly from checking account
- amount of money that is lent and expected to be paid back
- the smallest number you can pay on balance due
- deferred discount earned from card
- number that you earn shows how reliable you are to pay
- the average number of interest paid (16.22%)
- extra charges
- total money amount you have built up
- rewards earned from spending credit on travel related expenses
- when you only pay what they lended you
Down
- amount of time payment can be delayed without penalty
- federal funds rate
- when payment is due
- word for owing money to someone
- the number of credit networks
- what most credit cards are made of
- interest rate for the first six months
- paper money used for emergencies
- the type of interest on credit
- the length of a credit period
- when you get cash from an atm with credit
- when you spend more than your credit limit
- amount you have to pay for missing a payment
- the amount you pay to use the credit card each year
27 Clues: extra charges • federal funds rate • when payment is due • annual percentage rate • cash back, miles, points • the number of credit networks • the length of a credit period • the type of interest on credit • word for owing money to someone • paper money used for emergencies • what most credit cards are made of • deferred discount earned from card • ...
Africa History Review Crossword 2023-02-09
Across
- factors that influence people to migrate
- pilgrimage by Mansa Musa
- the doctrine that all natural objects and the universe itself have a soul
- arab ships used to cross Indian Ocean
- largest hot desert in the world
- "Land of Gold" first empire to rise in Western Africa
- small patch of vegetation surrounded by desert
- trade route between people of North and West Africa,
- spreading of ideas or products from one culture to another
- trading post on the trans-Saharan caravan route and as a centre of Islamic culture
- trade networks, development in education, wealth in gold and salt, and the establishment and spread of Islam in West Africa
Down
- famous Islamic explorer who wrote about Mansa Musa
- mixed woodland-grassland ecosystem
- movement of people from one place to another with intentions of settling, permanently or temporarily, at a new location
- African king known for spreading his wealth
- West African empire that conquered Mali and controlled trade with an organized government
- region in Africa believed to have 2/3 of worlds gold
- natural preservative needed to prevent dehydration
- known for their migration and "slash and burn"
- vital means of transport for passengers and cargo in the desert
20 Clues: pilgrimage by Mansa Musa • largest hot desert in the world • mixed woodland-grassland ecosystem • arab ships used to cross Indian Ocean • factors that influence people to migrate • African king known for spreading his wealth • small patch of vegetation surrounded by desert • known for their migration and "slash and burn" • ...
Science Branches 2025-11-15
Across
- Study of adaptive and innate defense networks regulating host protection
- Structural analysis of organismal morphology from macroscopic to microstructural levels
- Physics branch exploring propagation, refraction, and quantum behavior of photons
- Study of fungal evolution, pathogenicity, and ecological roles within ecosystems
- Science concerned with biotic–abiotic interactions shaping ecosystem dynamics
- Application of physical laws to stellar, galactic, and cosmological phenomena
- Field investigating mechanisms of inheritance and molecular transmission of traits
- Science assessing biochemical impacts of xenobiotics and exposure-related risk
- Science interpreting functional mechanisms of biological systems across scales
- Characterization of crystalline structures, mineral genesis, and geochemical properties
Down
- Study of lithospheric composition, stratification, and transformative Earth processes
- Field specializing in unicellular and acellular organisms and their biochemical pathways
- Interdisciplinary exploration of marine systems, including chemical cycles and currents
- Biological discipline focused on photosynthetic taxa and plant phylogeny
- Reconstruction of prehistoric biodiversity through fossil stratigraphy and morphology
- Investigation of molecular reactions sustaining cellular metabolism and regulation
- Atmospheric science examining thermodynamic patterns governing climate and weather
- Study of multicellular heterotrophs within the animal kingdom and their diversity
- Science interpreting crustal stress patterns through seismic wave analysis
- Discipline that analyzes extragalactic phenomena and cosmic evolution
20 Clues: Discipline that analyzes extragalactic phenomena and cosmic evolution • Biological discipline focused on photosynthetic taxa and plant phylogeny • Study of adaptive and innate defense networks regulating host protection • Science interpreting crustal stress patterns through seismic wave analysis • ...
JY Operating Systems 2023-08-27
Across
- updated to include bug fixes, security patches, and new features
- protect data and prevent unauthorized access to sensitive information
- __________Execution: manage the loading, running, and termination of programs
- _________Management: allocate resources efficiently, ensuring that multiple applications can run simultaneously
- _________Management: controls and coordinates communication with external devices such as printers, scanners, and cameras
Down
- provides a platform for software developers to create applications that can run on a wide range of hardware configurations
- ________Memory: enhances the efficiency of memory usage and improves system performance
- allows users to interact with the computer through graphical elements like icons, windows, menus, and buttons
- _________Management: allowing users to create, access, organize, and manipulate data easily.
- initializing hardware components and loading necessary system files
- allowing computers to communicate with each other over local or global networks
- allows users to run multiple applications simultaneously
12 Clues: allows users to run multiple applications simultaneously • updated to include bug fixes, security patches, and new features • initializing hardware components and loading necessary system files • protect data and prevent unauthorized access to sensitive information • __________Execution: manage the loading, running, and termination of programs • ...
ENGLISH PRESENTATION 2024-11-14
Across
- Principles that guide what is considered morally right and wrong.
- Information collected, stored, and analyzed, especially in digital form.
- Openness about how something operates or how decisions are made, especially in tech.
- Operating independently, as in self-driving cars or machines.
- The state of being free from unwanted observation or public attention.
Down
- Close observation, often by governments or companies, for tracking or monitoring purposes.
- Recognition Technology that identifies or verifies a person using their face.
- Protective measures to safeguard data, systems, or networks from unauthorized access.
- A set of rules or steps that a computer follows to solve a problem.
- Credit A scoring system that evaluates individuals based on their behavior or actions.
- General Data Protection Regulation, an EU law for data privacy and protection.
- prejudice in favor of or against something, leading to unfair outcomes.
12 Clues: Operating independently, as in self-driving cars or machines. • Principles that guide what is considered morally right and wrong. • A set of rules or steps that a computer follows to solve a problem. • The state of being free from unwanted observation or public attention. • prejudice in favor of or against something, leading to unfair outcomes. • ...
Smart System 2021-06-30
Across
- A maintenance technique that estimates when maintenance should be performed
- Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients.
- Application that involves wireless sensor and RFID technology,
Down
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- A sensor that detects movement
- Smart system application that reduces global emission
- Modification of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
7 Clues: A sensor that detects movement • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • Smart system application that leads to better diagnostic tools, to better treatment and quality of life for patients. • ...
Chapter 11- RISK 2022-09-10
Across
- It is a situation that involves danger
- It is the decision of no inverting on security not even if the system is vulnerable
- It is the risk during the transmission or movement of information from one computer to another
- It is the possibility of something unwelcome or unpleasant happening
Down
- It is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
- It is information resting in a hard drive, server
- It is the action of assessing someone or something
7 Clues: It is a situation that involves danger • It is information resting in a hard drive, server • It is the action of assessing someone or something • It is the possibility of something unwelcome or unpleasant happening • It is the decision of no inverting on security not even if the system is vulnerable • ...
GAI 2024-07-01
Across
- Process of tuning AI models for better performance (10 letters)
- A platform for public officers and government agencies in Singapore to use GAI securely (4 letters)
- A type of AI that creates new content (12 letters)
- The process of designing and refining prompts for AI models (17 letters)
Down
- A field that studies AI algorithms and models (11 letters)
- An approach to AI that relies on neural networks to process data (9 letters)
- The name of an AI model that can understand and generate human-like text (3 letters)
7 Clues: A type of AI that creates new content (12 letters) • A field that studies AI algorithms and models (11 letters) • Process of tuning AI models for better performance (10 letters) • The process of designing and refining prompts for AI models (17 letters) • An approach to AI that relies on neural networks to process data (9 letters) • ...
cyberspace 2021-11-08
Across
- a listing of the computer files stored in memory
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- the mechanical components making up a computer system
- technology the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
- locate and correct errors in a computer program code
- transfer data into a database or document
Down
- the organization of data according to preset specifications
- a worldwide network of computer networks
- a sequence of instructions that a computer can execute
- a set sequence of steps, part of larger computer program
- transfer a file or program to a smaller computer
- an electronic storage device
- a facial expression represented by a sequence of characters
- transfer out of a database or document
- an instruction connecting one part of a program to another
15 Clues: an electronic storage device • transfer out of a database or document • a worldwide network of computer networks • transfer data into a database or document • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • ...
zachary crosswored puzzel made in 2-7-22 2022-02-07
Across
- an extra part or extension that is or can be attached to something to perform a particular function
- a movable item used to mark a position
- the virtual location for applications, documents, data, or other sub-folders
- a substance or mixture of substances
- full universal serial bus
- a particular field of thought, activity, or interest
- receives and sends data on computer networks
Down
- consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow
- a computer that is designed to be used on a desk or table
- a computer program used for accessing sites or information on a network
- something that goes in a pc
- mouse that you drag on a flat surface
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices
- a data storage device that uses flash memory
- a device that converts signals produced by one type of device
15 Clues: full universal serial bus • something that goes in a pc • a substance or mixture of substances • mouse that you drag on a flat surface • a movable item used to mark a position • a data storage device that uses flash memory • receives and sends data on computer networks • a particular field of thought, activity, or interest • ...
World War 1 2023-03-30
Across
- Germany, Austria/Hungary, Ottoman empire
- the union of countries to protect and help each other from other countries
- Telegram from germany to mexico, hoping they would attack the US and keep them out of the war
- assassination that caused immediate actions towards the war
- blinded and choked victims, Now banned in modern warfare
- Used to Cross "No Man's Land", Armored vehicles mounted with machine guns
- Country that started siding with germany and later in the war switched sides to russia, great britain, france, and the US
- Battleground between enemy lines, high casualties
Down
- Used to help spy on troop movements, "Dogfights"
- One of wilsons 14 points, one of the most controversial, Unclear whether american troops should be lead by foreign leaders
- Russia, Great Britain, France
- Underground networks of linked bunkers, communication and ammunition
- Declaration of the ottoman empire in hopes to get muslims within the allied forces to fight against their own country
- Acted to prevent another world war
- Last name of the president of the US during WW1
15 Clues: Russia, Great Britain, France • Acted to prevent another world war • Germany, Austria/Hungary, Ottoman empire • Last name of the president of the US during WW1 • Used to help spy on troop movements, "Dogfights" • Battleground between enemy lines, high casualties • blinded and choked victims, Now banned in modern warfare • ...
Unit 1 2021-01-27
Across
- Which one of the following options can be considered as the Cloud?
- SBC stands for
- Which challenge comes under IOT devices reliable bidirectional signaling.
- Write any one of the issues are considered in IOT?
- ____________ in IOT as one of the key characteristics device have different hardware platforms and network.
- The collection of data is achieved with ______ changes.
- _______a cellular network is expensive especially with many IOT devices.
Down
- _______gives an exact up to the second state of all devices on a network
- Which characteristics involve the faculty the thing to response in an intelligent way to a particular situation.
- _______ is security algorithm for wireless networks.
- A wireless network interface controller can work in both infrastructure mode and _______ mode.
- ________empowers IOT by bringing together everyday object.
- which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
- _______allows wireless devices to connect to a wired network.
- IOT devices are naturally vulnerable to _______ threats.
15 Clues: SBC stands for • Write any one of the issues are considered in IOT? • _______ is security algorithm for wireless networks. • The collection of data is achieved with ______ changes. • IOT devices are naturally vulnerable to _______ threats. • ________empowers IOT by bringing together everyday object. • _______allows wireless devices to connect to a wired network. • ...
CSE 167 Vocab / Terminology 2022-04-28
Across
- the idea of adding defense in layers.
- basic Linux file permissions include: read, write, and ____.
- assumes people can get that information when they need it.
- the type of key in asymmetric encryption that you use to decrypt a message when someone encrypts a message for you.
- protection of computer systems and networks from information disclosure.
- type of encryption where only one key is shared amongst sender and receiver.
Down
- only authorized people have access to records.
- verification of identity.
- saving a copy of system data for restoration in the event that the system would need to be reset.
- a system or place that must be protected.
- only authorized people can modify data.
- the practice of secure communications that allow only the sender and receiver to view a message's contents.
- covers the protection of encryption systems.
- the problem with cybersecurity today is that people use TRUST instead of ______.
- come in four types: physical, technical, procedural, and legal.
15 Clues: verification of identity. • the idea of adding defense in layers. • only authorized people can modify data. • a system or place that must be protected. • covers the protection of encryption systems. • only authorized people have access to records. • assumes people can get that information when they need it. • basic Linux file permissions include: read, write, and ____. • ...
Computer Science 2017-12-08
Across
- a scam to steal valuable information such as credit card and social security numbers, Also known as "brand spoofing,"
- _____ flash drive
- The primary method for keeping a computer secure from intruders.
- Computer people may use the term for capability and time.
- known as internet service provider
- large network made up of smaller networks.
- Reserved areas of memory in every computer
- a small text file created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk
Down
- A website where people talk about what they have done or the latest news.
- The opposite of software
- The opposite of Hardware
- The address that defines the route to a file on an Internet server
- An inhouse website that serves employees only, and most medium-sized and large companies have one.
- The fundamental display element of an electronic screen or bitmapped image.
- the computing part of the computer otherwise known as the Central Processing Unit
15 Clues: _____ flash drive • The opposite of software • The opposite of Hardware • known as internet service provider • large network made up of smaller networks. • Reserved areas of memory in every computer • Computer people may use the term for capability and time. • The primary method for keeping a computer secure from intruders. • ...
FAKE NEWS 2019-11-25
Across
- a group involved in secret or criminal activities
- to open or expand over a larger area
- to control or take advantage of by artful, unfair, or insidious means
- information that is not completely true or accurate
- giving the same result on successive trials
- to create a false or misleading impression
Down
- being exactly as appears or as claimed
- wit, irony, or sarcasm used to expose and discredit vice or folly
- a person employed by a newspaper, magazine, or radio or television station to gather, write, or report news
- the spreading of ideas, information, or rumor for the purpose of helping or injuring an institution, a cause, or a person
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- easily duped or cheated
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- an act intended to trick or dupe
- to consider to be true or honest
15 Clues: easily duped or cheated • an act intended to trick or dupe • to consider to be true or honest • to open or expand over a larger area • being exactly as appears or as claimed • to create a false or misleading impression • giving the same result on successive trials • a group involved in secret or criminal activities • information that is not completely true or accurate • ...
Group 3 2023-05-26
Across
- type of computer memory that stores data that can be read from and written to by the processor
- chatgpt, poe, dll
- set of symbols incorporated into files represented for display on the world wide web
- open-source platform that allows developers to automate the deployment and running of applications within isolated containers
- The brain of devices
- connect to the internet using a cable or satellite connection
- A deep learning framework developed by Google, widely used for building and training neural networks
- interaction between people-computers
Down
- technologies that reduce human intervention in processes
- tensorflow method that used for groups a linear stack of layers into a tensorflow model
- temporarily data recorded on your computer
- A type of technology that allows you to connect multiple devices to the internet using a single connection
- store and access files and programs over the internet
- A piece of information that indicates some important state
- A wireless technology used for connecting devices over short distances, commonly found in smartphones and laptops
15 Clues: chatgpt, poe, dll • The brain of devices • interaction between people-computers • temporarily data recorded on your computer • store and access files and programs over the internet • technologies that reduce human intervention in processes • A piece of information that indicates some important state • connect to the internet using a cable or satellite connection • ...
Network Terminology 2023-10-02
Across
- Metropolitan Area Network
- Technique where transmitted data is encoded & decoded to increase network throughput, & reduce delays.
- The process of path selections that data take on their way to one or more networks.
- Physical & logical arrangement of nodes & connections in a network.
- Method of testing computer devices or hardware to see if it is working as intended.
- Local Area Network
- Wide Area Network
- Any logical or physical address that uniquely distinguishes a node or device over a computer or telecommunications network.
- An established set of rules that determine how data is transmitted & exchanged between different devices.
Down
- Technologies that can connect groups of computers over large distances, or not simultaneously in the same location.
- Transmission mediums for devices to seamlessly connect & exchange information.
- Computer OS that is primarily designed to support workstations & PCs (NOS).
- Certain specifications that ensure compatibility across different devices or applications.
- Designed as a flexible approach to represent objects & their relationships.
- Personal Area Network
15 Clues: Wide Area Network • Local Area Network • Personal Area Network • Metropolitan Area Network • Physical & logical arrangement of nodes & connections in a network. • Computer OS that is primarily designed to support workstations & PCs (NOS). • Designed as a flexible approach to represent objects & their relationships. • ...
internet 2023-12-02
Across
- - What process converts information into a code to secure it?
- - What is a graphical representation of a user in a virtual space?
- - What is the process of transferring data from the internet to a computer?
- - What term refers to unwanted or irrelevant messages on the internet?
- - What is the process of transferring data from a computer to the internet?
- - What is a temporary storage area for frequently accessed data?
- - What software do you use to navigate the internet?
- - What is the fraudulent attempt to obtain sensitive information online?
Down
- - What security measure protects a computer from unauthorized access?
- - What term describes the maximum rate of data transfer across a network?
- - What is the unique address of a website on the internet?
- - What is a computer that provides data to other computers on a network?
- - What device connects multiple computer networks together?
- - What are small digital images or icons used to express emotions?
- - What symbol is used to categorize topics on social media?
15 Clues: - What software do you use to navigate the internet? • - What is the unique address of a website on the internet? • - What device connects multiple computer networks together? • - What symbol is used to categorize topics on social media? • - What process converts information into a code to secure it? • ...
IT Insights 2023-10-24
Across
- A program that you use to access websites on the Internet
- acronym used for a computer system that can learn, think for itself and provide natural language interaction(abbrev.)
- where you can find our course materials, and collaborate with your instructor
- aerial term used to describe online data storage
- a web site where you can ask a question and it provides matches
- team name used for St. Clair College athletic teams
- St. Clair College emblem
Down
- term used for organized, competitive computer gaming
- this device has rules to control the flow of data into and out of a network
- a global network of connected computers where you can find information, watch videos, and communicate with others
- branch of IT responsible for protecting networks and data from external attack
- harmful software that can infect your computer and cause problems
- electronic letters you send and receive through the Internet
- a network connection without wires
- where you can find your timetable, transcript, etc.(abbrev.)
15 Clues: St. Clair College emblem • a network connection without wires • aerial term used to describe online data storage • team name used for St. Clair College athletic teams • term used for organized, competitive computer gaming • A program that you use to access websites on the Internet • electronic letters you send and receive through the Internet • ...
#5 Mental Health&WellBeing 2024-08-22
Across
- What type of support networks are vital for youth wellbeing?
- What proportion of young people experience suicidal thoughts?
- What fraction of youth has experienced depression by the age of 18?
- What is a key factor in reducing mental health stigma?
- What concept relates to the ability to recover from mental health challenges?
- What is essential to ensure youth receive timely mental health care?
- What type of environment is promoted for positive mental health?
Down
- What is a major issue youth mental health programs aim to prevent?
- What practice can help reduce stress and anxiety?
- What is a common barrier to seeking mental health support?
- What percentage of youth with mental health issues seek professional help?
- What is the name of the EU-wide survey that gathers data on youth mental health?
- What service is critical for supporting youth mental health?
- What type of pressures contribute significantly to youth mental health issues?
- Which age group is most affected by anxiety disorders?
15 Clues: What practice can help reduce stress and anxiety? • What is a key factor in reducing mental health stigma? • Which age group is most affected by anxiety disorders? • What is a common barrier to seeking mental health support? • What type of support networks are vital for youth wellbeing? • What service is critical for supporting youth mental health? • ...
COMPUTER 2025-05-30
Across
- PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE
- PROCESS OF TRANSFORMING ENCRYPTED INFORMATION INTO READABLE FORM
- NETWORK DEVICE USED TO CONNECT ALL COMPUTERS IN A NETWORK WITH EACH OTHER
- PROGRAM THAT DISRUPTS NORMAL FUNCTIONING OF COMPUTER
- ACT OF USING OR IMITATING THE LANGUAGE AND THOUGHTS OF ANOTHER PERSON AS ONE'S ORIGINAL WORK
- IT CONVERTS DIGITAL SIGNALS OF A COMPUTER INTO ANALOG SIGNALS TO ENABLE THEIR TRANSMISSION VIA PHONE LINES
- SECURITY SYSTEM THAT PREVENTS UNAUTHORISED PEOPLE FROM ACCESSING YOUR SYSTEM AND NETWORK
- ACT OF SENDING AN EMAIL TO USER, MISLEADING HIM TO BELIEVE THAT IT IS FROM A TRUSTED PERSON OR ORGANISATION
Down
- EACH COMPUTER IN A NETWORK
- IT PROVIDES A DIRECT CONNECTION BETWEEN SOURCE AND DESTINATION
- ILLEGAL INTRUSION INTO COMPUTER SYSTEM OR NETWORK
- DEVICE THAT CONNECTS TWO DIFFERENT TYPES OF NETWORKS WITH EACH OTHER
- ACT OF HARMING OR HARRASSING A PERSON THROUGH INFORMATION TECHNOLOGY
- UNWANTED BULK EMAILS COMING FROM UNKNOWN SOURCES
- COMPUTER NETWORK MAINLY CREATED FOR INDIVIDUAL PERSON
15 Clues: EACH COMPUTER IN A NETWORK • UNWANTED BULK EMAILS COMING FROM UNKNOWN SOURCES • ILLEGAL INTRUSION INTO COMPUTER SYSTEM OR NETWORK • PROCESS OF TRANSFORMING DATA INTO UNREADABLE CODE • PROGRAM THAT DISRUPTS NORMAL FUNCTIONING OF COMPUTER • COMPUTER NETWORK MAINLY CREATED FOR INDIVIDUAL PERSON • IT PROVIDES A DIRECT CONNECTION BETWEEN SOURCE AND DESTINATION • ...
cyber security class 7-8 2025-07-07
Across
- A person who tries to break into computers or networks
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- Small data stored by websites to remember what you did
- A program that helps protect your computer from harmful software
- A program or device that guards your network from threats
Down
- Something you install to fix or improve software
- Any software made to harm your computer or data
- A harmful program that spreads and damages your files
- A test websites use to check if you’re a human
- A small window that appears on your screen, sometimes as part of a scam
- A harmful file that tricks you by looking like something safe
- A tool that helps block unwanted content or messages
- A scam where someone pretends to be trustworthy to steal your info
- A tool that blocks unwanted connections to your computer or network
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
Unit 25 Spelling Rules 2020-08-19
Across
- The ability to read and write.
- The quality or condition of being obstinate; stubbornness.
- Public support for or recommendation of a particular cause or policy.
- A state in which one is not observed or disturbed by other people.
- The tendency of a body to float or to rise when submerged in a fluid
- The notional environment in which communication over computer networks occurs.
- Fineness or intricacy of texture or structure.
- The ability to understand and work with numbers.
Down
- A system of winds rotating inwards to an area of low barometric pressure, with an anticlockwise (northern hemisphere) or clockwise (southern hemisphere) circulation.
- The quality or state of being correct or precise.
- The condition of being pregnant.
- Believing that people are motivated purely by self-interest; distrustful of human sincerity or integrity.
- The profession, activity, or skill of managing international relations, typically by a country's representatives abroad.
- Importance requiring swift action.
- An amount of money or property left to someone in a will.
15 Clues: The ability to read and write. • The condition of being pregnant. • Importance requiring swift action. • Fineness or intricacy of texture or structure. • The ability to understand and work with numbers. • The quality or state of being correct or precise. • An amount of money or property left to someone in a will. • ...
Advance Network. 2021-04-08
Across
- Network transmits these data after breaking into manageble chunks. we call this unit_________
- intentionally using a device or software to intercept a conversation or moniter didgital communiction without permission.
- method of sending messages from one computer to another via a communication link.
- direct the traffic between networks
- ability to ensure that data transmitted across the network between users is correct, not lost, corrupted or modified.
- prevents outsiders from accessing private data of the network.
- Unique name used to specify a particular computer on a network.
- uniqe address assinged to a web page.(In short form)
Down
- Hadware and Software standards, which need to be followed when transmitting data between computers.
- the network should be availble whenever it is needed.
- A word or series of alphanumeric characters used as security measure.
- seres of four decimal numbers separated by dot.
- Used to manage the access to web sites.
- computerbased system that allows users and subscribers to exchange personal voice masseges.
- This is used to create web pages. (In short form)
15 Clues: direct the traffic between networks • Used to manage the access to web sites. • seres of four decimal numbers separated by dot. • This is used to create web pages. (In short form) • uniqe address assinged to a web page.(In short form) • the network should be availble whenever it is needed. • prevents outsiders from accessing private data of the network. • ...
cyberspace 2021-11-08
Across
- an instruction connecting one part of a program to another
- an electronic storage device
- a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth by computing the time difference for signals from different satellites to reach the receiver
- the mechanical components making up a computer system
- a facial expression represented by a sequence of characters
- a worldwide network of computer networks
- the organization of data according to preset specifications
- transfer a file or program to a smaller computer
- transfer out of a database or document
Down
- technology the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
- transfer data into a database or document
- a sequence of instructions that a computer can execute
- a listing of the computer files stored in memory
- a set sequence of steps, part of larger computer program
- locate and correct errors in a computer program code
15 Clues: an electronic storage device • transfer out of a database or document • a worldwide network of computer networks • transfer data into a database or document • a listing of the computer files stored in memory • transfer a file or program to a smaller computer • locate and correct errors in a computer program code • ...
Computer Vocabulary Crossword 2022-03-03
Across
- A way to send a message from one computer to another
- Abbreviation for "Sending particular annoying messages"
- Physical piece of hardware that connects to a primary device
- Networking that allows computers to receive and send data via the networks.
- Where all numbers, letters, and other buttons are located.
- abbreviation for "frequently asked questions"
Down
- Small portable computer
- Codes Special language that is translated from algorithms to be read and understanded by a computer
- A device that allows a computer to connect to the intranet
- Email scam that dishonest people use to try to get you to reveal passwords or other personal information
- Buying and shopping online
- Small picture or symbol that represents a program or other things.
- Small arrow on the screen that moves when you move the mouse or being used to make a selection
- Extra copy of a file, document or all data stored on a computer
- Information stored by a computer
15 Clues: Small portable computer • Buying and shopping online • Information stored by a computer • abbreviation for "frequently asked questions" • A way to send a message from one computer to another • Abbreviation for "Sending particular annoying messages" • A device that allows a computer to connect to the intranet • Where all numbers, letters, and other buttons are located. • ...
hi im hi 2018-04-04
Across
- The computing part of the computer
- A website that contains text entries in reverse chronological order
- An organization that provides access to the Internet
- The primary method for keeping a computer secure from intruders
- To store data locally in order to speed up subsequent retrievals
- for the computer. A series of instructions that performs a particular task is called a "program."
- An inhouse website that serves employees only, and most medium-sized and large companies have one
- The address that defines the route to a file on an Internet server
Down
- The most widely used hardware interface for attaching peripherals to a computer
- a circle that is good to eat
- The fundamental display element of an electronic screen or bitmapped image
- it is a scam to steal valuable information such as credit card and social security numbers
- the term for capability and time.
- a large network made up of smaller networks
- and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.)
15 Clues: a circle that is good to eat • the term for capability and time. • The computing part of the computer • a large network made up of smaller networks • An organization that provides access to the Internet • The primary method for keeping a computer secure from intruders • To store data locally in order to speed up subsequent retrievals • ...
Digital citizenship 2017-09-08
Across
- The state of being available to the public as a whole, without copyright
- The use of digital technology to change the way research is undertaken
- Websites or apps that allow people to create and share content
- The electronic responsibility for actions and deeds, ethical or unethical
- Digital information of a person as a result of their online activity
- A password that is difficult to detect by humans and computers
- Maximizing someones personal safety against security risks of private information and property
Down
- The use of the internet and social media to bully someone
- When a writer duplicates someone else's work from the internet and calls it their own
- Appropriate, responsible behavior in regard to technology use
- The relationship between copyrighted material and user permissions
- Information of someone's identity shared over public networks
- The dangers to children presented by strangers
- The correct or acceptable way of using the internet
- The idea that under circumstances, sections of copyright material may be used without permission
15 Clues: The dangers to children presented by strangers • The correct or acceptable way of using the internet • The use of the internet and social media to bully someone • Appropriate, responsible behavior in regard to technology use • Information of someone's identity shared over public networks • Websites or apps that allow people to create and share content • ...
Teach-tastic 2018-09-28
Across
- Technology that allows users to make telephone calls over the internet.
- The physical components of the computer system.
- telephony technology that allows users to communicate over the internet rather than traditional public networks.
- A mobile phone with advanced capabilities, such as accessing the internet.
- An object placed into orbit by human; most are used for communication purpose
- The use of computer technology to plan design, test, and alter products.
- The use of computer software to control machines, tools, and processes involved in manufacturing products.
- The practical application of science to society and industry
- A system of computers connected together by telephone wires, cable wires, or other means.
Down
- Programs that instruct computers to perform specific operations.
- system Computer software designed to mimic the knowledge of human expert.
- computerized storage of information and facts.
- Working from home or a remote location.
- A number you choose to gain access to an account.
- a navigational system that uses satellite technology to determine location and provide directions.
15 Clues: Working from home or a remote location. • computerized storage of information and facts. • The physical components of the computer system. • A number you choose to gain access to an account. • The practical application of science to society and industry • Programs that instruct computers to perform specific operations. • ...
EEE cross word-2 2018-10-03
Across
- A synchronous transmitter is used with control transfer for ___ detection(14).
- The type of resistance offered by the p-n junction under ac conditions(7).
- The curl of an electric field intensity E is ___(10).
- ____ has only one winding which is used as a both primary and secondary(15).
- Y=G+jB what is B(11).
- The commutator segments in DC motor is equal to the number of ___ (9).
- ____ is a combination of different physical components which act together as an entire unit to achieve certain objective(6).
- Bandwidth is the major ratio of Wo to ____(7).
Down
- _____ is max difference between the transient and steady state solutions for unit step input(9).
- Which phenomenon takes place in enhancement type mosfet(9).
- Super conductors exhibit which property(regarding magnetism)(12).
- For g-parameters V1 and I2 are ____ variables(11).
- Passive networks are always ___(10).
- The p-type semiconductor impurities are also called as ____ impurities(8).
- what is the dynamic impedence offered by the ideal tank circuit(8).
15 Clues: Y=G+jB what is B(11). • Passive networks are always ___(10). • Bandwidth is the major ratio of Wo to ____(7). • For g-parameters V1 and I2 are ____ variables(11). • The curl of an electric field intensity E is ___(10). • Which phenomenon takes place in enhancement type mosfet(9). • Super conductors exhibit which property(regarding magnetism)(12). • ...
lost world crossword 2019-04-11
Across
- verb + the chirrups of the crickets + a short, high-pitched sound
- noun + a reduction in the value of an asset over time, due in particular to wear and tear.
- adjective + lacking physical strength, especially as a result of age or illness
- adverb + the telethon was broadcast ...... on 31 US networks
- noun + a parrot with an erectile crest, found in Australia, eastern Indonesia, and neighboring island
- noun + synonyms: lightheartedness, light-mindedness, high spirits, vivacity, liveliness,
- adjective + relating to Freemasons
Down
- adjective + clearly seen or understood; obvious
- verb + past tense: reproved
- adjective + synonyms: constant, persistent, continual, continuous, perpetual, non-stop, recurrent, repeated, frequent
- noun + the father of one's husband or wife
- adjective + synonyms: insensitive, inconsiderate, thoughtless, unthinking, indelicate
- noun + he had absolute ...... over his subordinates
- noun a system of allowing the unrestricted currency of two metals as legal tender at a fixed ratio to each other. (HISTORICAL)
- adjective + the statistics that he quotes with ...... regularity
15 Clues: verb + past tense: reproved • adjective + relating to Freemasons • noun + the father of one's husband or wife • adjective + clearly seen or understood; obvious • noun + he had absolute ...... over his subordinates • adverb + the telethon was broadcast ...... on 31 US networks • adjective + the statistics that he quotes with ...... regularity • ...
