networks Crossword Puzzles

Crypto Review 2023-11-09

Crypto Review crossword puzzle
Across
  1. a one way cryptographic function that converts a some text like "I like cats" into a scrambled looking thing like"sdkf83ru39ijflku"
  2. money system that is backed up by a central bank and/or government
  3. a distributed ledger of transactions that are linked together through a cryptographic hash
  4. people that sell crypto are often like this
Down
  1. a decentralized money system that uses peer to peer networks and encryption
  2. files and transactions of a crypto system are replicated all over the internet

6 Clues: people that sell crypto are often like thismoney system that is backed up by a central bank and/or governmenta decentralized money system that uses peer to peer networks and encryptionfiles and transactions of a crypto system are replicated all over the internet...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. Provides the physical connection to the network at the PC or other host device
  2. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  3. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  4. Real-time communication between two or more people
  5. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Interactive websites where people create and share user-generated content with friends and family
  8. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  9. identify the physical location of intermediary devices and cable installation.
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Hosts that request information
  12. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  13. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  14. Something that helps people work together on a particular file or piece of software
  15. Type of network provides access to users over a small geographical area
  16. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  17. Applications can be accessed over the Internet through a subscription.
  18. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  19. Hosts that provide information
  20. hello
  21. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
Down
  1. Describes the state of a network when the demand on the network resources exceeds the available capacity
  2. Examples include copper, fiber and wireless
  3. Private networks in use by just one company
  4. Identify devices, ports, and addressing scheme.
  5. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  6. splits traffic into packets that are routed over a shared network. Helps create redundancy
  7. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  8. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  9. diagram Diagram of a network
  10. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  11. Having multiple paths to a destination
  12. Audio-based medium that allows people to deliver their recordings to a wide audience
  13. Type of network provides access to users over a large geographical area
  14. limits the impact of a failure, so that the fewest number of devices are affected.
  15. allows people to share files with each other without having to store and download them from a central server
  16. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  17. Examples include routers, switches and wireless access points
  18. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  19. lol
  20. Web pages that groups of people can edit and view together

41 Clues: lolhellodiagram Diagram of a networkHosts that request informationHosts that provide informationHaving multiple paths to a destinationExamples include copper, fiber and wirelessPrivate networks in use by just one companyIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  2. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  3. splits traffic into packets that are routed over a shared network. Helps create redundancy
  4. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  5. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  8. Something that helps people work together on a particular file or piece of software
  9. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  10. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  11. Type of network provides access to users over a large geographical area
  12. Having multiple paths to a destination
  13. Hosts that provide information
  14. Applications can be accessed over the Internet through a subscription.
  15. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  16. Describes the state of a network when the demand on the network resources exceeds the available capacity
  17. identify the physical location of intermediary devices and cable installation.
  18. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Down
  1. Hosts that request information
  2. limits the impact of a failure, so that the fewest number of devices are affected.
  3. Web pages that groups of people can edit and view together
  4. Type of network provides access to users over a small geographical area
  5. Examples include routers, switches and wireless access points
  6. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  7. Audio-based medium that allows people to deliver their recordings to a wide audience
  8. diagram Diagram of a network
  9. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  10. Examples include copper, fiber and wireless
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Real-time communication between two or more people
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Identify devices, ports, and addressing scheme.
  15. Provides the physical connection to the network at the PC or other host device
  16. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  17. allows people to share files with each other without having to store and download them from a central server
  18. Private networks in use by just one company
  19. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  20. Interactive websites where people create and share user-generated content with friends and family
  21. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.

39 Clues: diagram Diagram of a networkHosts that request informationHosts that provide informationHaving multiple paths to a destinationExamples include copper, fiber and wirelessPrivate networks in use by just one companyIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

NFT Crossword 2022-03-30

NFT Crossword crossword puzzle
Across
  1. an organization that was designed to be automated and decentralized.
  2. the price of the cheapest NFT in a collection.
  3. the largest holders.
  4. the fee you have to pay for minting smart contracts into the blockchain.
  5. unique cryptographic tokens that exist on a blockchain and cannot be replicated.
  6. converting digital files into crypto collections or digital assets stored on the blockchain.
  7. a network of 3D virtual worlds focused on social connection.
  8. a distribution of cryptocurrency, tokens, or NFTs that are sent to a web3 wallet address for free as a promotion.
  9. cryptocurrency used on the Polygon network.
Down
  1. anxiety that an exciting or interesting event may currently be happening elsewhere, often aroused by posts seen on social media.
  2. a scaling solution that aims to provide multiple tools to improve the speed and reduce the cost and complexities of transactions on blockchain networks.
  3. fear, uncertainty and doubt.
  4. The world's first and largest digital marketplace for NFTs
  5. usually when developers market a project to generate sales and then abandon it, taking the existing profits.
  6. a decentralized, open-source blockchain with smart contract functionality.
  7. We're All Going to Make It
  8. experiencing a significant spike in price and volume.

17 Clues: the largest holders.We're All Going to Make Itfear, uncertainty and doubt.cryptocurrency used on the Polygon network.the price of the cheapest NFT in a collection.experiencing a significant spike in price and volume.The world's first and largest digital marketplace for NFTsa network of 3D virtual worlds focused on social connection....

TECHNOLOGY VOCABULARY 2021-08-12

TECHNOLOGY VOCABULARY crossword puzzle
Across
  1. the process in which output of a system is returned to input
  2. a worldwide network of computer networks
  3. the symbolic arrangement of data in a computer program
  4. crime committed using a computer and the internet
  5. the amount of information that can be stored on a disk drive
  6. a set of characters comprising a unit of information
  7. RAM memory that is set aside as a specialized buffer storage
Down
  1. a set of related records kept together
  2. a list of questions that are frequently asked (about a given topic) along with their answers
  3. a failure or defect in a computer program, system,or machine
  4. science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  5. a listing of the computer files stored in memory
  6. an organized body of related information
  7. put into a format that can be read or processed by computers
  8. the exclusive right to sell a work
  9. indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  10. any small compartment

17 Clues: any small compartmentthe exclusive right to sell a worka set of related records kept togetheran organized body of related informationa worldwide network of computer networksa listing of the computer files stored in memorycrime committed using a computer and the interneta set of characters comprising a unit of information...

Digital Technology Final part 1 2023-05-08

Digital Technology Final part 1 crossword puzzle
Across
  1. the physical parts of the computer that store and run written instructions
  2. type of file that has been created or saved by an application
  3. everything you see when you start your computer
  4. wide area network
  5. Arranging all folders files and other documents in an organized manner
  6. a document created by a program or system
  7. Something used to hold files or other folders
Down
  1. a computer file like an image, video or document which can be included in an email and shared
  2. Free cloud storage service that is integrated with the company's other services and systems
  3. Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
  4. a set of digital instructions, data or programs used to operate computers
  5. website that allows users to add and update content on the site using their own web browser.
  6. online journal which creates interaction from readers. They consist of special or common interest groups
  7. free web-based application in which documents and spreadsheets can be edited, created and stored online
  8. local area network
  9. the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
  10. the screen that displays the desktop

17 Clues: wide area networklocal area networkthe screen that displays the desktopa document created by a program or systemSomething used to hold files or other folderseverything you see when you start your computertype of file that has been created or saved by an applicationArranging all folders files and other documents in an organized manner...

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The misuse of substances that affect both physical and mental health
  2. The illegal trade and distribution of drugs is called drug ________
  3. The condition of relying on drugs and unable to function without them
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. In the long term, drug use leads to ___________, making it hard to stop
  7. The crime of cleaning illegally obtained money, often linked to drug trafficking
  8. Drug addiction often leads to losing this, impacting economic productivity.
  9. Illegal networks that distribute drugs internationally
Down
  1. The illegal act of transporting or selling drugs
  2. Many drug users experience this mental condition, causing sadness and hopelessness.
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Mental health disorder caused by drug use, involving extreme fear and nervousness
  5. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  6. Drug users often experience ________, a mental disorder involving intense fear
  7. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  8. Excessive use of drugs can lead to ________, which can be fatal.
  9. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  10. A fatal consequence of drug use, often from excessive consumption
  11. Drug users are often involved in illegal ________ acts to support their addictio

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Marwan crossword 2024-04-17

Marwan crossword crossword puzzle
Across
  1. a symmetric encryption algorithm (block cipher) using 56-bit keys
  2. attack which consists of testing all the words in a list as a keyword
  3. attack which consists of testing all possible password or key solutions.
  4. a public-key cryptosystem, one of the oldest widely used for secure data transmission.
Down
  1. The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
  2. is used to transmit data securely and anonymously over public networks.

6 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keysattack which consists of testing all the words in a list as a keywordis used to transmit data securely and anonymously over public networks.attack which consists of testing all possible password or key solutions....

CSI106 Cross Word - 4 2024-11-05

CSI106 Cross Word - 4 crossword puzzle
Across
  1. A set of rules or procedures that govern the format and transmission of data between two or more devices.
  2. A networking device that forwards data packets between computer networks.
Down
  1. A secret word or phrase that is used to authenticate a user.
  2. A formatted unit of data carried by a packet-switched network.
  3. A connection point on a computer.
  4. A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.

6 Clues: A connection point on a computer.A secret word or phrase that is used to authenticate a user.A formatted unit of data carried by a packet-switched network.A networking device that forwards data packets between computer networks.A set of rules or procedures that govern the format and transmission of data between two or more devices....

Internet Terminology 2022-11-19

Internet Terminology crossword puzzle
Across
  1. The rules of etiquette that apply when communicating over computer networks
  2. An object, as text or graphics linked through hypertext to a document, another object.
  3. A website containing a writers or group of writer's own experiences, observations, opinions,
  4. Also called index page, main page the initial page of a website
Down
  1. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
  2. engine A computer program that searches documents, especially on the world wide web
  3. A website that allows users to add, delete or revise content by using a web browser.
  4. A secret word or expression used by authorized persons
  5. a protocol for specifying addresses on the internet

9 Clues: a protocol for specifying addresses on the internetA secret word or expression used by authorized personsAlso called index page, main page the initial page of a websiteThe rules of etiquette that apply when communicating over computer networksengine A computer program that searches documents, especially on the world wide web...

Internet Terminology - 2 2022-11-19

Internet Terminology - 2 crossword puzzle
Across
  1. engine A computer program that searches documents
  2. An object, as text or graphics linked through hypertext to a document, another object
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions
Down
  1. Also called index page, main page the initial page of a website, usually containing an introduction
  2. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
  3. A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
  4. A website that allows users to add, delete or revise content by using a web browser.
  5. A secret word or expression used by authorized persons to prove their right to access, information, ect.

9 Clues: engine A computer program that searches documentsThe rules of etiquette that apply when communicating over computer networksA website that allows users to add, delete or revise content by using a web browser.An object, as text or graphics linked through hypertext to a document, another object...

Wireless Router Security Crossword Puzzle By Taheem Bhuiyan 2022-02-11

Wireless Router Security Crossword Puzzle By Taheem Bhuiyan crossword puzzle
Across
  1. This filter keeps port 113 from being scanned by devices from the internet.
  2. transmitting a packet that will be received by every device on the network
  3. the security method added to WPA for wireless networks that provides stronger data protection and network access control.
  4. a single, direct request sent from one host to another
Down
  1. method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts
  2. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  3. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. short for Internet Protocol
  5. an interface that enables the serial (one bit at a time) exchange of data between two devices

9 Clues: short for Internet Protocola single, direct request sent from one host to anothertransmitting a packet that will be received by every device on the networkThis filter keeps port 113 from being scanned by devices from the internet.method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts...

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Mobile device application that secures users network connectivity and protect a device from malware.
  4. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Specific agreement and setup that allow an employee to connect a personal device.
  5. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  4. Mobile device application that secures users network connectivity and protect a device from malware.
  5. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Specific agreement and setup that allow an employee to connect a personal device.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. Provides the physical connection to the network at the PC or other host device
  2. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  3. Interactive websites where people create and share user-generated content with friends and family
  4. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  5. Examples include copper, fiber and wireless
  6. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  7. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  8. limits the impact of a failure, so that the fewest number of devices are affected.
  9. Web pages that groups of people can edit and view together
  10. Hosts that request information
  11. identify the physical location of intermediary devices and cable installation.
  12. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  13. Hosts that provide information
  14. Describes the state of a network when the demand on the network resources exceeds the available capacity
  15. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  18. Identify devices, ports, and addressing scheme.
  19. Applications can be accessed over the Internet through a subscription.
Down
  1. Real-time communication between two or more people
  2. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  3. Something that helps people work together on a particular file or piece of software
  4. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  5. Examples include routers, switches and wireless access points
  6. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  7. Private networks in use by just one company
  8. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  9. Having multiple paths to a destination
  10. Type of network provides access to users over a large geographical area
  11. splits traffic into packets that are routed over a shared network. Helps create redundancy
  12. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  13. Type of network provides access to users over a small geographical area
  14. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  15. Audio-based medium that allows people to deliver their recordings to a wide audience
  16. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  17. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  18. allows people to share files with each other without having to store and download them from a central server
  19. diagram Diagram of a network

38 Clues: diagram Diagram of a networkHosts that request informationHosts that provide informationHaving multiple paths to a destinationExamples include copper, fiber and wirelessPrivate networks in use by just one companyIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Elijah Chapter 9 2024-05-06

Elijah Chapter 9 crossword puzzle
Across
  1. A multiplexor that un-multiplexes the data stream and delivers the individual streams to the appropriate devices
  2. A number indicating a protocol's reliability
  3. A multiplexing technique where binary 1s and 0s are replaced with larger, unique binary sequences to allow multiple user to share a common set of frequencies
  4. A set of unused frequencies between 2 channels on a frequency division multiplexed system
  5. A adaptive routing technique in which routing tables react to network fluctuations when calculating the best paths between networks
  6. A second Generation mobile telephone technology that is based on a form of time division multiplexing
  7. A transitional cellular network technology between 3G and 4G that takes advantage of some improved 4G technologies to exceed 3G speeds
  8. A type of routing protocol that enables routers to share performance and status information about their connected links with routers throughout the network
  9. The device that combines multiple input signals for transmission over a single medium and then demultiplexes the composite signal back into multiple signals
  10. An expensive form of wavelength division multiplexing that involves the transfer of a large number of data streams over a single optical fiber using multiple lasers emitting light of different wavelengths
  11. Assigning non-overlapping frequency ranges to different signals or to each user of a medium
  12. The use of one or more fixed routes manually added to the routing table, often when the network is installed
  13. 4th generation mobile phone service characterized by an all-IP network for both data and voice transmission
  14. A path vector routing protocol that is the only routing protocol used on the open Internet
  15. A compression technique that offers lossless compression by creating a dictionary of character strings and associated codes
  16. A compression technique in which data is compressed and then decompressed but doesn't return the original data
  17. A compression technique in which data is compressed and the decompressed such that the original data is returned
  18. Early cellular phone networks
Down
  1. The multiplexing of multiple data streams onto a single fiber-optic cable through the use of lasers emitting lights of varying wavelength
  2. The simplest type of routing protocols; used to determine the best route for data based on the distance to a destination
  3. A form of multiplexing that relies on multiple antennae transmitting and receiving in different locations so that signals are separated by some distance in space
  4. A multiplexing technique that gives each incoming source a turn to transmit, proceeding through the sources in round-robin fashion
  5. A technique commonly used to compress images
  6. A path or connection typically supporting one user
  7. The process of a network reconfiguring itself if a network failure is detected
  8. A compression technique in which a commonly occurring symbol in a data set is replaced with a simpler character and a count of how many times that symbol occurs
  9. A database stored in a router's memory that maintains information about the location of hosts and networks and the best paths for forwarding messages between them
  10. A link state routing protocol that uses a best-path algorithm
  11. A routing protocols that exhibits characteristics of both distance vector and link state routing protocols
  12. distance vector protocols that use hop count as their routing metric and only allow up to 15 hops
  13. Modern multiplexing technology technology that combines FDM and TDM techniques and takes advantage of mathematical manipulation of wavelengths to compress multiple signals within a smaller bandwidth
  14. The application of multiplexing in the support of many users at one time
  15. Techniques used to decrease the demand on limited WAN resources and increase the effective speed of data transmissions over WAN connections
  16. 3rd generation mobile phone service released in the early 2000s that supported up to 384 Kbps
  17. A form of time division multiplexing in which the multiplexor creates a data packet of only those devices that have something to transmit
  18. A multiplexing technique in which the sharing of a signal is accomplished by dividing the available transmissions on a medium among the medium's users
  19. A compression/encryption technique that allows a high quality audio sample to be reduced to a much smaller sized file
  20. A link state routing protocol that improves on some of the limitations of RIP and con coexist with RIP on a network
  21. An advanced distance vector routing protocol developed by Cisco that combines some of the features of a link state routing protocols and so is sometimes referred to as a hybrid protocol

39 Clues: Early cellular phone networksA number indicating a protocol's reliabilityA technique commonly used to compress imagesA path or connection typically supporting one userA link state routing protocol that uses a best-path algorithmThe application of multiplexing in the support of many users at one time...

Lesson 3 Conputer Vocabulary 2013-09-06

Lesson 3 Conputer Vocabulary crossword puzzle
Across
  1. plug into electric outlets, and can protect against power strikes
  2. a command to test connectivity and isolate hardware problems and any mismatched configurations
  3. instructs the operating system on how to operating specific hardware
  4. a secure process for keeping confidential information private
  5. can cause computers to short circuit, resulting in the loss of data and damage to hardware
Down
  1. a procedure that places a priority on files that would be difficult or impossible to replace or reconstruct if they were lost
  2. a device that ranges from basic kits to ones more sophisticated models designed for desktop computers and networks
  3. are short, fast transfers of electrical voltage, current, or energy
  4. occurs when older systems are discarded and the data is not deleted

9 Clues: a secure process for keeping confidential information privateplug into electric outlets, and can protect against power strikesare short, fast transfers of electrical voltage, current, or energyoccurs when older systems are discarded and the data is not deletedinstructs the operating system on how to operating specific hardware...

Wraparound Puzzle 2022-08-01

Wraparound Puzzle crossword puzzle
Across
  1. Wraparound identifies these to build on and enhance capabilities and skills
  2. Family and youth perspectives are intentionally elicited and prioritized during all phases of the wraparound process
  3. Encourages participation of team mebers drawn from networks of interpersonal community relationships
  4. Wraparound prcess demonstrates respect for and builds on the values preferences beliefs and identify of the child youth and their family
  5. Team members work cooperatively and share responsibility
  6. Despite challenges the team continues working towards the goals until the team reaches agreement that Wraparound process is no longer required
Down
  1. Observable and measurable indicators of succcess monitors progress
  2. team develops a customized set of strategies, supports and services based on this
  3. Least restrictive setting that promotes child and family intergration into home

9 Clues: Team members work cooperatively and share responsibilityObservable and measurable indicators of succcess monitors progressWraparound identifies these to build on and enhance capabilities and skillsLeast restrictive setting that promotes child and family intergration into home...

CyberSecurity 2022-08-25

CyberSecurity crossword puzzle
Across
  1. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
  2. Detailed report, usually about a person
  3. rules for interacting politely online
  4. files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
  5. the practice of protecting systems, networks, and programs from digital attacks
  6. Someone who intentionally targets people for harm using online chat rooms or social media.
Down
  1. The ability to act in a safe and responsible way on the Internet and other connected environments.
  2. A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
  3. Information about you and what you do online

9 Clues: rules for interacting politely onlineDetailed report, usually about a personInformation about you and what you do onlinethe practice of protecting systems, networks, and programs from digital attacksSomeone who intentionally targets people for harm using online chat rooms or social media....

Internet Terminology - 2 2022-11-19

Internet Terminology - 2 crossword puzzle
Across
  1. engine A computer program that searches documents
  2. An object, as text or graphics linked through hypertext to a document, another object
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions
Down
  1. Also called index page, main page the initial page of a website, usually containing an introduction
  2. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
  3. A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
  4. A website that allows users to add, delete or revise content by using a web browser.
  5. A secret word or expression used by authorized persons to prove their right to access, information, ect.

9 Clues: engine A computer program that searches documentsThe rules of etiquette that apply when communicating over computer networksA website that allows users to add, delete or revise content by using a web browser.An object, as text or graphics linked through hypertext to a document, another object...

Commerce 2022-11-02

Commerce crossword puzzle
Across
  1. Pay back.
  2. Swapping or exchanging one good for another without using coins and notes.
  3. someone who creates and supplies goods or services
  4. It is a payment processing networks in the world.
  5. items that are usually tangible.
  6. Its actual value of goods.
  7. Amount of money that households have available for spending and saving after income taxes have been accounted for.
Down
  1. One that can be used many times
  2. The business of drawing people's attention to a good or service.
  3. Good pre-sales and after-sales service makes you feel you are valued customer.
  4. the standard of something as measured against other things of a similar kind
  5. What an individual gives up in order to satisfy a need or want
  6. The variety of items people want cannot be fulfilled because resources are limited.
  7. The buying and selling of goods and services between individuals and businesses.
  8. The amount of money that is expected to pay for something. Consumers want the best value for their money.
  9. The process of exploring, creating, and delivering value to meet the needs of customers.
  10. An online payment system that makes paying for things online and sending and receiving money safe and secure.

17 Clues: Pay back.Its actual value of goods.One that can be used many timesitems that are usually tangible.It is a payment processing networks in the world.someone who creates and supplies goods or servicesWhat an individual gives up in order to satisfy a need or wantThe business of drawing people's attention to a good or service....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. An individual's physical characteristic.
  2. Rules and Regulatory measures to be followed.
  3. The secret asset of a user.
  4. A sequence of operations that ensure protection of data.
  5. A security technique that regulates who or what can view or use resources in a computing environment.
  6. Approval, permission, or empowerment for someone or something to do something.
  7. A node in a computer network, a key single point for data on its way to or from other networks.
  8. An account that is given a non-restrictive access to the system.
  9. Process of confirming the correctness of the claimed identity.
Down
  1. An unauthorized user able to access and misuse information.
  2. A malicious activity caused to an organization that comes from within the organization.
  3. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  4. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. Authentication Dictionary.
  7. A software program that keeps passwords in a secure digital location.
  8. A software that forms a barrier between the computer and the outside world to prevent intrusion.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  2. Rules and Regulatory measures to be followed.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. The secret asset of a user.
  5. An account that is given a non-restrictive access to the system.
  6. Authentication Dictionary.
  7. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. A security technique that regulates who or what can view or use resources in a computing environment.
Down
  1. An individual's physical characteristic.
  2. A node in a computer network, a key single point for data on its way to or from other networks.
  3. Process of confirming the correctness of the claimed identity.
  4. A malicious activity caused to an organization that comes from within the organization.
  5. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  6. A sequence of operations that ensure protection of data.
  7. Approval, permission, or empowerment for someone or something to do something.
  8. A software program that keeps passwords in a secure digital location.
  9. An unauthorized user able to access and misuse information.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

Computer (Ch-1&Ch-2) 2024-06-02

Computer (Ch-1&Ch-2) crossword puzzle
Across
  1. abbreviation for Unified Payments Interface
  2. Booking a service
  3. When multiple mismatched copies of a file are stored on different computers it is called ____________
  4. Computer network restricted to an organisation
  5. Computer network that allows controlled access to an information source available on the internet
  6. It is a device that connect two different types of networks with each other. It also increases the speed of the network
  7. Duplication of data at multiple places
  8. Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection
Down
  1. Abbreviation for National Programme on Technology Enhanced Learning
  2. E-shopping app
  3. Website used for e-learning
  4. One of the most common job portals
  5. When two users have simultaneous conversation why are the internet, it is called ___________
  6. Certain sets of rules that determine how data should be transferred over network, compressed, presented on screen, and so on
  7. It works similar to a hub. However, it does not broadcast the message on the entire network
  8. Each computer in a network is called a _______
  9. It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc., are connected and communicated with each other

17 Clues: E-shopping appBooking a serviceWebsite used for e-learningOne of the most common job portalsDuplication of data at multiple placesabbreviation for Unified Payments InterfaceComputer network restricted to an organisationEach computer in a network is called a _______Abbreviation for National Programme on Technology Enhanced Learning...

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The illegal trade and distribution of drugs is called drug ________
  2. Illegal networks that distribute drugs internationally
  3. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  7. Excessive use of drugs can lead to ________, which can be fatal.
  8. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  9. Many drug users experience this mental condition, causing sadness and hopelessness.
  10. In the long term, drug use leads to ___________, making it hard to stop
Down
  1. The illegal act of transporting or selling drugs
  2. The crime of cleaning illegally obtained money, often linked to drug trafficking
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Drug users often experience ________, a mental disorder involving intense fear
  5. The condition of relying on drugs and unable to function without them
  6. The misuse of substances that affect both physical and mental health
  7. Mental health disorder caused by drug use, involving extreme fear and nervousness
  8. Drug users are often involved in illegal ________ acts to support their addictio
  9. Drug addiction often leads to losing this, impacting economic productivity.
  10. A fatal consequence of drug use, often from excessive consumption

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Secret to Learning English! 2013-09-02

Secret to Learning English! crossword puzzle
Across
  1. a large computer network linking smaller computer networks worldwide
  2. the condition of desiring and wanting something
  3. an art of sound in time that expresses ideas and emotions in significant forms through the elements of rhythm, melody, harmony, and color.
  4. a motion picture; a film
  5. the habits, attitudes, tastes, moral standards, economic level, etc., that together constitute the mode of living of an individual or group.
  6. a small device that transits sounds and people speak to one over through
Down
  1. to involve deeply; absorb, to be completely surrounded by something
  2. showing much interest and high energy for something
  3. the broadcasting of a still or moving image via radiowaves to receivers that project a view of the image on a picture tube.
  4. a publication containing daily news and information
  5. the behaviors and beliefs characteristic of a particular social, ethnic, or age group
  6. a handwritten or printed work of fiction or nonfiction, usually on sheets of paper fastened or bound together within covers.
  7. a person attached to another by feelings of affection or trust

13 Clues: a motion picture; a filmthe condition of desiring and wanting somethingshowing much interest and high energy for somethinga publication containing daily news and informationa person attached to another by feelings of affection or trustto involve deeply; absorb, to be completely surrounded by something...

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. Schneider Electric cloud-based file collaboration space to store and share company files.
  4. An employee must press this button, when he/she receives the suspicious mail.
  5. Mobile device application that secures users network connectivity and protect a device from malware.
  6. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. For Schneider Electric's technical support to complete customer service, contact _____.
  3. Specific agreement and setup that allow an employee to connect a personal device.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service, contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

What is the Internet? 2022-03-18

What is the Internet? crossword puzzle
Across
  1. Funding a project by raising money from a large number of people via the Internet.
  2. Science that harnesses the problem solving capacity of hundreds or thousands of citizens on the Internet to solve complicated problems is called ______ science.
  3. Is this TRUE or FAKE: Less than 67% of the world uses the Internet.
  4. A group of interconnected computing devices capable of sending and receiving data is called a computer ______.
Down
  1. The Internet has made it much easier to do this.
  2. The global network of networks.
  3. Is this TRUE or FAKE: There are no negative consequences of the Internet.
  4. Personal computers volunteering processing time so that more calculations can be computed is called _______ computing.
  5. Agreed upon set of rules that standardize communication between machines.

9 Clues: The global network of networks.The Internet has made it much easier to do this.Is this TRUE or FAKE: Less than 67% of the world uses the Internet.Is this TRUE or FAKE: There are no negative consequences of the Internet.Agreed upon set of rules that standardize communication between machines....

OCTH 224 Impact of Disability on Participation: Environmental Factors 2021-03-03

OCTH 224 Impact of Disability on Participation: Environmental Factors crossword puzzle
Across
  1. Method of delivering information, includes devices & tech
  2. Climate and weather conditions, geographic and topographic features of the environment
  3. Resources to live and participate in the community across environmental contexts. Includes recessions, cutbacks, systemic subsidy reallocation, changes in benefits
  4. Vehicular travel from one location to another via private and public modes
Down
  1. Architecture, land development, accessibility, noise, crowds, air quality. affects mobility, cognitive, social/communication, sensory accessibility features.
  2. Access to systems to support participation, health care, housing, community, education, employment, police, emergency response, etc.
  3. Specialized tools or modifications to facilitate participation in everyday activities
  4. Positive/negative attitudes, reactions, and treatments that are societally defined on disability. Includes inclusion, enfranchisement, empowerment.
  5. Physical assistance, material support, emotional support, networks, social capital. involves issues of companionship, trust, and relational strain

9 Clues: Method of delivering information, includes devices & techVehicular travel from one location to another via private and public modesSpecialized tools or modifications to facilitate participation in everyday activitiesClimate and weather conditions, geographic and topographic features of the environment...

NETWORKS 2016-09-07

NETWORKS crossword puzzle
Across
  1. NETWORK FOR THE WHOLE WORLD
Down
  1. LOCAL NETWORK TYPE

2 Clues: LOCAL NETWORK TYPENETWORK FOR THE WHOLE WORLD

Intermolecular Forces 2023-02-16

Intermolecular Forces crossword puzzle
Across
  1. IMF that holds non-polar things together
  2. rings of water molecules surrounding ions
  3. when electrons are free to fly around from atom to atom
  4. combination of more than one type metal atom together
  5. forces between molecules in a "bead"
  6. when molecules evaporate and condense continually; it never stops
  7. type of alloy where atoms are placed between metal atoms
  8. other than carbon networks, this is the only other substance to exhibit covalent network bonding
  9. molecules that have h-bonding or dipole-dipole are this
  10. hydrogen bonds between massive molecules in the body give this
  11. graph that shows how temp and pressure are related to phase changes
  12. almost perfect crystal
  13. happens to an adjacent non-polar molecule when the electron cloud is uneven in another
  14. the energy required to vaporize 1 mole of stuff at 1 atm
  15. force that holds water molecules around an ion
  16. liquid above its boiling point (rare)
  17. a molecule that is separate; not actually part of other molecules
  18. forces between the molecules in the "bead" and the surface it is on
  19. non-polar things are this when they have lots of electrons
  20. change from liquid to gas below boiling point
  21. when vapor pressure equals atmospheric pressure
  22. resistance to flow
  23. when something evaporates very easily
  24. capillary action is stronger when tubes are of a _______ ______
Down
  1. when electrons are trapped between atoms
  2. sheets of carbon networks that slide easily on each other
  3. forces "in" molecules
  4. a misnomer; the way to describe how a water strider walks on water
  5. between an H that is attached to an N, O, or F, and a really electronegative atom on another molecule
  6. general force that hold polar things together
  7. IMF that hold metal atoms together
  8. take thousands of degrees to melt
  9. water moving up a tube because of IMFs
  10. have molecules at the lattice points
  11. type of crystal that is perfect
  12. have ions at the lattice points
  13. force that hold atoms together in quartz, glass or diamond
  14. describes the structure of a crystal
  15. hydrogen bonds make this molecules "zip" together
  16. thing we eat that has a super high viscosity
  17. type of substance that has nuclei swimming in a sea of elctrons
  18. liquid below its freezing point (rare)
  19. cute way of remembering h-bonding
  20. equally and oppositely opposed tetrahedral covalent bonds
  21. forces "between" molecules
  22. not crystalline solid; no real repeating structure
  23. liquids exhibit this when the forces between the moleculues are stronger than the forces between the molecules and the surface it is on
  24. the pressure a liquid puts on the atmosphere
  25. happens when you "catch" the electron cloud on a non-polar molecule to one side
  26. type of alloy where atoms are replaced by other atoms
  27. the surface a "bead" is on
  28. tubes in a tree that use capillary action to drink

52 Clues: resistance to flowforces "in" moleculesalmost perfect crystalforces "between" moleculesthe surface a "bead" is ontype of crystal that is perfecthave ions at the lattice pointstake thousands of degrees to meltcute way of remembering h-bondingIMF that hold metal atoms togetherforces between molecules in a "bead"have molecules at the lattice points...

Laws of Cybercrime Crossword 2021-06-12

Laws of Cybercrime Crossword crossword puzzle
Across
  1. the process by which criminals attempt to conceal the illicit origin and ownership of the proceeds of their unlawful activities.
  2. Any illegal activity already in the criminal code committed by using a computer.
  3. The use of the computer to sabotage computer networks vital to national welfare.
  4. Area of the law which concerns computers and computer related crime.
  5. manufacture of false money for gain, a kind of forgery in
Down
  1. mailing or electronically transmitting something associated with fraud.
  2. A crime that involves using a computer to steal computer data stored in a digital format.
  3. A crime in which a cyber criminal falsely adopts the identity of another computer user in order to commit fraud.
  4. The communication via computer or other electronic device of false data that damages a person's reputation.
  5. Provides for criminal prosecution of individuals who engage in copyright infringement. electronic theft
  6. Protecting the rights of people's original creative

11 Clues: Protecting the rights of people's original creativemanufacture of false money for gain, a kind of forgery inArea of the law which concerns computers and computer related crime.mailing or electronically transmitting something associated with fraud.Any illegal activity already in the criminal code committed by using a computer....

Workplace Readiness Skills (Professional Skills) 2022-08-14

Workplace Readiness Skills (Professional Skills) crossword puzzle
Across
  1. PlanS personal and professional goals related to education, career, finances, and health
  2. SAFETY Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
  3. Meets organizational expectations regarding work schedule, behavior, appearance, and communication
  4. and interprets workplace documents and writes effectively
  5. Locates information efficiently, evaluates the credibility and relevance of sources and facts
  6. TECHNOLOGY Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
  7. Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
Down
  1. Accepts constructive feedback well and is open to new ideas and ways of doing things
  2. Applies mathematical skills to complete tasks as necessary
  3. Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
  4. Plans, prioritizes, and adapts work goals to manage time and resources effectively
  5. SECURITY Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities

12 Clues: and interprets workplace documents and writes effectivelyApplies mathematical skills to complete tasks as necessaryPlans, prioritizes, and adapts work goals to manage time and resources effectivelyAccepts constructive feedback well and is open to new ideas and ways of doing things...

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for refences or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for refences or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

6th Grade Computers Vocabulary 5 2019-11-13

6th Grade Computers Vocabulary 5 crossword puzzle
Across
  1. a copy of a file or directory on a separate storage device
  2. a string of characters beginning with a period and followed by one or more letters; the optional second part of a PC computer filename
  3. RAM memory that is set aside as a specialized buffer storage
  4. any computer that is hooked up to a computer network
  5. a set of related records kept together
Down
  1. adjusting the parts of a something in relation to each other
  2. a computer providing shared resources to a computer network
  3. a model or standard for making comparisons
  4. security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet
  5. the organization of data according to preset specifications
  6. (computer science) a computer that provides client stations with access to files and printers as shared resources to a computer network

11 Clues: a set of related records kept togethera model or standard for making comparisonsany computer that is hooked up to a computer networka copy of a file or directory on a separate storage devicea computer providing shared resources to a computer networkthe organization of data according to preset specifications...

Abooban 2023-03-12

Abooban crossword puzzle
Across
  1. the making of a judgement about the amount, number, or value of something
  2. a stock or supply of money, materials, staff, and other assets that can be drawn on by a person or organization in order to function effectively
  3. Ability to write without mistakes
  4. verb, when you are the main person in the group you tell them what to do
  5. facts provided or learned about something or someone
  6. the principal method of human communication, consisting of words used in a structured and conventional way and conveyed by speech, writing, or gesture
  7. the imparting or exchanging of information by speaking, writing, or using some other medium
Down
  1. Worldwide system of computer networks
  2. the earth, together with all of its countries and peoples
  3. an organized group of people with a particular purpose, such as a business or a government department
  4. he main means of mass communication (broadcasting, publishing, and the internet) regarded collectively

11 Clues: Ability to write without mistakesWorldwide system of computer networksfacts provided or learned about something or someonethe earth, together with all of its countries and peoplesverb, when you are the main person in the group you tell them what to dothe making of a judgement about the amount, number, or value of something...

Science & Technology After WW2 2013-05-14

Science & Technology After WW2 crossword puzzle
Across
  1. What kind of phone cables were laid in 1956?
  2. Scientist who introduced the polio vaccine in 1955.
  3. How many major broadcasting networks where operationg during the mid-50s?
  4. In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
  5. In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
  6. The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
Down
  1. The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
  2. Perfected a polio vaccine that could be administrated by mouth.
  3. What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
  4. What pace were the improvements in television technology?
  5. In 1951, what transcontinental dialing services were first begun?

11 Clues: What kind of phone cables were laid in 1956?Scientist who introduced the polio vaccine in 1955.What pace were the improvements in television technology?Perfected a polio vaccine that could be administrated by mouth.In 1951, what transcontinental dialing services were first begun?...

Science & Technology After WW2 2013-05-14

Science & Technology After WW2 crossword puzzle
Across
  1. Scientist who introduced the polio vaccine in 1955.
  2. What pace were the improvements in television technology?
  3. The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
Down
  1. The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
  2. In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
  3. In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
  4. What kind of phone cables were laid in 1956?
  5. In 1951, what transcontinental dialing services were first begun?
  6. How many major broadcasting networks where operationg during the mid-50s?
  7. What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
  8. Perfected a polio vaccine that could be administrated by mouth.

11 Clues: What kind of phone cables were laid in 1956?Scientist who introduced the polio vaccine in 1955.What pace were the improvements in television technology?Perfected a polio vaccine that could be administrated by mouth.In 1951, what transcontinental dialing services were first begun?...

E-Commerce 2015-03-12

E-Commerce crossword puzzle
Across
  1. /knowledge communicated or received concerning a particular fact or circumstance; news
  2. /abbreviation: WWW.
  3. /a business model that facilitates an environment where customers can trade with each other.
  4. /a business model in which consumers (individuals) create value and businesses consume that value
  5. /when a business or organisation entity provides products or services to individual customers
  6. /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
  7. /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
  8. /a vast computer network linking smaller computer networks worldwide
Down
  1. /when business entities or organisations participate with other businesses or organisations to do e-commerce
  2. /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
  3. /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another

11 Clues: /abbreviation: WWW./a vast computer network linking smaller computer networks worldwide/knowledge communicated or received concerning a particular fact or circumstance; news/when a business or organisation entity provides products or services to individual customers...

Compliance Crossword 2023 2023-10-25

Compliance Crossword 2023 crossword puzzle
Across
  1. Moral principles and values that guide a person.
  2. When there is a breach of PHI, it is important to notify Compliance .
  3. HDS employees must all suspected or observed improper practices, violations of policies and laws.
  4. The act of intimidating or engaging in behavior against someone for a good faith report of noncompliance or participating in an investigation.
  5. All PHI is to be kept .
Down
  1. The set of measures to ensure that networks, systems, & data breaches are avoided.
  2. Set of standards or rules that guide business behavior in a positive direction. Code of
  3. When HDS contracts services or functions to another entity which involves PHI, a or business associate agreement is needed.
  4. An authorized person viewing protected health information is an example of a reportable incident.
  5. A method of securing access to PHI on your computer, is to it when away from your computer.
  6. All employees will receive upon hire and annually thereafter.

11 Clues: All PHI is to be kept .Moral principles and values that guide a person.All employees will receive upon hire and annually thereafter.When there is a breach of PHI, it is important to notify Compliance .The set of measures to ensure that networks, systems, & data breaches are avoided....

Station 5 2024-05-24

Station 5 crossword puzzle
Across
  1. When acids are added to water, they form positively charged ________ ions
  2. Forces on materials can cause them to __________ or extend (get longer)
  3. is a method of exchanging messages and files over the internet
  4. Liquids and solutions that are able to conduct electricity are called __________
  5. _______ is a very large global network that consists of many other interconnected networks
Down
  1. The products of photosynthesis are glucose and ______
  2. One of the input devices that allow users to enter data or instructions into a computer system
  3. A thread like structure made of DNA and protein by which hereditary information is passed to next generation.
  4. is an atom, or atoms, of the same element that have an equal number of protons but a different number of neutrons
  5. The distance from the undisturbed position to the peak (crest) or trough of a wave
  6. _______ is a wireless communication technology that allows devices to be connected within a maximum range of about 30 meters

11 Clues: The products of photosynthesis are glucose and ______is a method of exchanging messages and files over the internetForces on materials can cause them to __________ or extend (get longer)When acids are added to water, they form positively charged ________ ionsLiquids and solutions that are able to conduct electricity are called __________...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. Hosts that provide information
  2. Private networks in use by just one company
  3. Web pages that groups of people can edit and view together
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Applications can be accessed over the Internet through a subscription.
  6. identify the physical location of intermediary devices and cable installation.
  7. yes
  8. Describes the state of a network when the demand on the network resources exceeds the available capacity
  9. Identify devices, ports, and addressing scheme.
  10. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  11. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  12. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  13. Type of network provides access to users over a large geographical area
  14. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  15. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  16. Real-time communication between two or more people
  17. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  18. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  19. diagram Diagram of a network
  20. splits traffic into packets that are routed over a shared network. Helps create redundancy
  21. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  22. Interactive websites where people create and share user-generated content with friends and family
Down
  1. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  2. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  3. Hosts that request information
  4. allows people to share files with each other without having to store and download them from a central server
  5. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  6. Examples include copper, fiber and wireless
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Audio-based medium that allows people to deliver their recordings to a wide audience
  9. Something that helps people work together on a particular file or piece of software
  10. Provides the physical connection to the network at the PC or other host device
  11. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  12. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  13. Type of network provides access to users over a small geographical area
  14. Having multiple paths to a destination
  15. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  16. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  17. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  18. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  19. Examples include routers, switches and wireless access points

41 Clues: yesdiagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cyber Security CrossWord Puzzel 2021-03-02

Cyber Security CrossWord Puzzel crossword puzzle
Across
  1. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. _______________ is any crime perpetrated using computers and networks.
  3. A__________ monitored a network, blocking dangerous content such as viruses.
  4. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. Viruses, trojans and worms are examples of __________________________.
  6. An ethical hacker.
  7. Your favorite teacher.
  8. A statement of an intention to inflict harm or damage .
Down
  1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. Your favorite class.
  3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. The exposure to the possibility of the attacked or harmed.
  5. Actual action that causes harm or damage.
  6. A blend between an ethical hacker and a cracker.
  7. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. An action taken to counteract the threat.
  9. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.

17 Clues: An ethical hacker.Your favorite class.Your favorite teacher.Actual action that causes harm or damage.An action taken to counteract the threat.A blend between an ethical hacker and a cracker.A statement of an intention to inflict harm or damage .The exposure to the possibility of the attacked or harmed....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. A security technique that regulates who or what can view or use resources in a computing environment.
  3. Approval, permission, or empowerment for someone or something to do something.
  4. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. Authentication Dictionary.
  6. A software program that keeps passwords in a secure digital location.
  7. The secret asset of a user.
Down
  1. A malicious activity caused to an organization that comes from within the organization.
  2. Rules and Regulatory measures to be followed.
  3. An individual's physical characteristic.
  4. An account that is given a non-restrictive access to the system.
  5. Process of confirming the correctness of the claimed identity.
  6. A node in a computer network, a key single point for data on its way to or from other networks.
  7. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. A sequence of operations that ensure protection of data.
  9. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  10. An unauthorized user able to access and misuse information.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. Rules and Regulatory measures to be followed.
  2. The secret asset of a user.
  3. Authentication Dictionary.
  4. An account that is given a non-restrictive access to the system.
  5. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  6. The process of converting information or data into a code, especially to prevent unauthorized access.
  7. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
  1. A sequence of operations that ensure protection of data.
  2. An unauthorized user able to access and misuse information.
  3. A malicious activity caused to an organization that comes from within the organization.
  4. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  5. Approval, permission, or empowerment for someone or something to do something.
  6. Process of confirming the correctness of the claimed identity.
  7. A node in a computer network, a key single point for data on its way to or from other networks.
  8. A security technique that regulates who or what can view or use resources in a computing environment.
  9. A software program that keeps passwords in a secure digital location.
  10. An individual's physical characteristic.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

CLucas - Network Devices 2023-01-03

CLucas - Network Devices crossword puzzle
Across
  1. This kind of router includes a switch and a wireless AP.
  2. IPS does not allow _____ to enter the target system without first being analyzed.
  3. ______ provides higher dedicated bandwidth to each divide on the network.
  4. A cloud-based network controller is a device in the cloud that allows _____ administrators to manage network devices.
  5. What are repeaters also known as?
  6. These are an all-in-one security device.
  7. This is the process of physically isolating legacy systems from other networks and particularly the internet. (2 words)
Down
  1. An endpoint management server can restrict an end device’s ______ to the network.
  2. Does IDS work offline or online?
  3. How many types of NIC cards are there?
  4. Firewalls protect data and equipment on a network from _______ access.
  5. What kind of power do PoE's transfer?
  6. A patch _____ is commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility.
  7. What do bridges divide LANs into?
  8. These are embedded and used to program to perform specific actions.
  9. This kind of switch allows administrators to add security and additional features.
  10. Wireless APs use these to communicate with Wireless NICs. (2 words)

17 Clues: Does IDS work offline or online?What do bridges divide LANs into?What are repeaters also known as?What kind of power do PoE's transfer?How many types of NIC cards are there?These are an all-in-one security device.This kind of router includes a switch and a wireless AP.These are embedded and used to program to perform specific actions....

Media and Technology: Unit 1 & Unit 2 Vocabulary 2023-03-02

Media and Technology: Unit 1 & Unit 2 Vocabulary crossword puzzle
Across
  1. The information computers get from users, devices, or other computers
  2. Special skill or knowledge about a particular thing
  3. The reason that someone does something; intention
  4. The main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  5. Using media in a way that feels healthy and in balance with other life activities (family, friends, school, hobbies, etc.)
  6. Someone or something that provides information
  7. A machine that works with information
  8. Content (text, audio, images, video) or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
  9. When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
  1. Word or concept of great significance
  2. Behaviors we do often or regularly with digital media and devices
  3. Believable
  4. An attempt to trick someone online, usually with the intention of stealing money or private information
  5. The way we apply scientific knowledge for practical purposes.
  6. Deciding what to include and what to keep out in digital media
  7. The thinking work computers do to turn input into output
  8. The information computers give to users, devices, or other computers

17 Clues: BelievableWord or concept of great significanceA machine that works with informationSomeone or something that provides informationThe reason that someone does something; intentionSpecial skill or knowledge about a particular thingThe thinking work computers do to turn input into outputThe way we apply scientific knowledge for practical purposes....

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The misuse of substances that affect both physical and mental health
  2. The illegal trade and distribution of drugs is called drug ________
  3. The condition of relying on drugs and unable to function without them
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. In the long term, drug use leads to ___________, making it hard to stop
  7. The crime of cleaning illegally obtained money, often linked to drug trafficking
  8. Drug addiction often leads to losing this, impacting economic productivity.
  9. Illegal networks that distribute drugs internationally
Down
  1. The illegal act of transporting or selling drugs
  2. Many drug users experience this mental condition, causing sadness and hopelessness.
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Mental health disorder caused by drug use, involving extreme fear and nervousness
  5. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  6. Drug users often experience ________, a mental disorder involving intense fear
  7. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  8. Excessive use of drugs can lead to ________, which can be fatal.
  9. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  10. A fatal consequence of drug use, often from excessive consumption
  11. Drug users are often involved in illegal ________ acts to support their addictio

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Vocabulary 4 2012-09-18

Vocabulary 4 crossword puzzle
Across
  1. The main international standards organization for the world wide web
  2. strands of optically pure glass
Down
  1. a program accessible on the web which has a catalog of scanned websites in a large data base
  2. protocol devised and implemented to help researchers share information across a diverse computer network
  3. directs packets between separate local area networks by reading each packet header and directing it into the fastest direction
  4. the address of a document or other resource available on the inernet

6 Clues: strands of optically pure glassThe main international standards organization for the world wide webthe address of a document or other resource available on the inerneta program accessible on the web which has a catalog of scanned websites in a large data base...

3D AJ 2021-04-29

3D AJ crossword puzzle
Across
  1. local area network
  2. Is a networking device that forwards data packets between computer networks
  3. consists of multiple devices that communicate with one another
Down
  1. device, such as a wireless router, that allows wireless devices to connect to a network.
  2. any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
  3. the service of providing the computer equipment and software for a website on the internet and making it available for people to see

6 Clues: local area networkconsists of multiple devices that communicate with one anotherIs a networking device that forwards data packets between computer networksdevice, such as a wireless router, that allows wireless devices to connect to a network....

Showtime 2019-03-22

Showtime crossword puzzle
Across
  1. Showtime has this many commercial free channels (Write out the number).
  2. This series stars NY 'Fixer' Liev Schreiber.
  3. This hit comedy series stars Frankie Shaw as a single mom struggling in Boston to make ends meet.
  4. What series airs on Sundays at 9PM.
  5. This movie premieres April 20th.
  6. This is Showtime's first Late-Night Talk Show.
  7. This hit showtime series stars Claire Danes as a CIA operative.
  8. This iconic Hip-Hop group has a docu-series premiering in May.
  9. This movie premieres on April 6th.
Down
  1. This Showtime series stars Jim Carrey in his first lead TV role in over 20 years.
  2. This Showtime Sports documentary is based on what NBA All-Star?
  3. This 4-part Sports Doc is based on professional sports gambling.
  4. Watch 1000s of hours of Showtime content through your set top box via what feature?
  5. What Showtime App allows 2 Live Feeds and Download Capabilities?
  6. This series takes place on the day of the worst stock market crash in U.S. History.
  7. What Original Series premieres April 7th?
  8. This series is the #1 Comedy on a premium network.
  9. How much is the Showtime Cash Back Offer? (Write out the number).
  10. How many additional networks are included in a Showtime Subscription? (Write out the number).

19 Clues: This movie premieres April 20th.This movie premieres on April 6th.What series airs on Sundays at 9PM.What Original Series premieres April 7th?This series stars NY 'Fixer' Liev Schreiber.This is Showtime's first Late-Night Talk Show.This series is the #1 Comedy on a premium network.This iconic Hip-Hop group has a docu-series premiering in May....

Computer Components 2021-10-06

Computer Components crossword puzzle
Across
  1. disruptive online messages.
  2. local area network, gives network to buildings.
  3. it controls the flow of the data from one computer to another.
  4. a website developed by many people and it allows you to add and edit content.
  5. stands for solid-state drive, a storage device that contains semiconductor chips.
  6. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work.
  7. one of the most main parts of a computer system.
  8. WAN stands for wide area network, a telecommunication network that stretches over a large geographic area.
  9. use reasonable use of copyrighted material.
  10. a set of rules made to protect integrity.
Down
  1. it stands for random-access memory, it’s where data is stored.
  2. to take/copy someone’s work and not give them credit.
  3. pertaining to, or situated in.
  4. a part of an electric system or part of a mechanical system.
  5. stands for hard disk drive, a storage device that contains one or more spinning magnetic hard disks.
  6. the rules of kindness that apply when communicating over computer networks.
  7. gain information without the permission from the person you are hacking.
  8. Drive a very small, solid-state hard drive that can be plugged into a USB port.
  9. universal serial bus, to connect peripheral devices to a computer.

19 Clues: disruptive online messages.pertaining to, or situated in.a set of rules made to protect integrity.use reasonable use of copyrighted material.local area network, gives network to buildings.one of the most main parts of a computer system.to take/copy someone’s work and not give them credit.a part of an electric system or part of a mechanical system....

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. transfer out of a database or document
  2. something reduced in volume to its full volume
  3. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  4. decompress
  5. the exclusive right to sell a work
  6. a facial expression represented by a sequence of characters
  7. a worldwide network of computer networks
  8. transfer a file or program to a smaller computer
  9. put into a format that can be read or processed by computers
Down
  1. set up for a particular purpose
  2. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  3. the activity of converting data or information into code
  4. crime committed using a computer and the internet
  5. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  6. a listing of the computer files stored in memory
  7. an organized body of related information
  8. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  9. (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  10. a short line of text that a web site puts on your computer's hard drive when you access the web site
  11. locate and correct errors in a computer program
  12. the symbolic arrangement of data in a computer program

21 Clues: decompressset up for a particular purposethe exclusive right to sell a worktransfer out of a database or documentan organized body of related informationa worldwide network of computer networkssomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

NATURAL NAVIGATION 2024-02-25

NATURAL NAVIGATION crossword puzzle
Across
  1. Covered with clouds; lacking clear skies.
  2. The star at the center of our solar system that provides light and heat to Earth.
  3. A visual representation of an area, typically showing geographical features, roads, and other landmarks.
  4. Parallel to the horizon; flat or level.
  5. Half of the Earth, usually divided into Northern and Southern Hemispheres or Eastern and Western Hemispheres.
  6. after To take care of or watch over someone or something.
  7. To recognize the value or significance of something; to be grateful for.
  8. for: To look for something by making an effort to find it.
Down
  1. The natural satellite of Earth that orbits around it.
  2. A course along which someone or something moves or points.
  3. Having balanced proportions; exhibiting symmetry.
  4. Divisions or offshoots of a tree or plant.
  5. Used to emphasize a statement or confirm its truth.
  6. Confused or lost in terms of direction or understanding.
  7. Networks of threads spun by spiders and other insects to catch prey.
  8. The region of the atmosphere above the Earth; where the sun, moon, stars, and clouds are seen.
  9. Those from whom a person is descended, typically one's parents or grandparents.
  10. Having a moderate degree of heat; opposite of cold.
  11. To set up or create something, typically an organization, system, or set of rules.

19 Clues: Parallel to the horizon; flat or level.Covered with clouds; lacking clear skies.Divisions or offshoots of a tree or plant.Having balanced proportions; exhibiting symmetry.Used to emphasize a statement or confirm its truth.Having a moderate degree of heat; opposite of cold.The natural satellite of Earth that orbits around it....

Carrington Event 2025-02-07

Carrington Event crossword puzzle
Across
  1. A powerful burst of solar plasma and magnetic field from the Sun.
  2. The protective magnetic field around Earth that helps shield us from solar storms.
  3. A sudden explosion of energElectromagnetic radiationoften associated with CMEs.
  4. The ability to recover from a disaster like a major solar storm.
  5. Devices in space that could be damaged by a strong CME.
  6. A disturbance in Earth’s magnetic field caused by solar activity.
  7. Steps taken to protect against future CMEs.
  8. Energy released from the Sun in the form of light and waves.
  9. The environmental conditions in space that can affect technology on Earth.
  10. A loss of electricity over a large area.
  11. The systems (power lines, roads, communication networks) that support society.
Down
  1. The modern electrical system that could fail in a future solar storm.
  2. A navigation system that could stop working if ais solar storm disrupts satellites.
  3. Used for emergency services and aviation, which could be affected by solar activity.
  4. A massive solar storm that occurred in 1859, causing global telegraph failures.
  5. Natural light displays in the sky caused by solar particles interacting with Earth’s atmosphere.
  6. The main communication network in 1859, which the Carrington Event disrupted.
  7. A disturbance on the Sun that can send energy and particles toward Earth.
  8. on Society

19 Clues: on SocietyA loss of electricity over a large area.Steps taken to protect against future CMEs.Devices in space that could be damaged by a strong CME.Energy released from the Sun in the form of light and waves.The ability to recover from a disaster like a major solar storm.A powerful burst of solar plasma and magnetic field from the Sun....

Media Tech Crossword 2022-04-13

Media Tech Crossword crossword puzzle
Across
  1. a platform that allows you to create servers and talk to people from around the world. It’s great for gamers!
  2. a scam made to trick you into revealing your personal info.
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. A service that encrypts your data and makes you less vulnerable to tracking
  5. a set of data that describes and gives information about other data.
  6. a matching game set in a magical kingdom your parents probably play.
  7. a platform that allows you to post videos and comment on others videos
Down
  1. the footprint a person leaves online after posting something.
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

9 Clues: a scam made to trick you into revealing your personal info.the footprint a person leaves online after posting something.a set of data that describes and gives information about other data.a matching game set in a magical kingdom your parents probably play.a platform that allows you to post videos and comment on others videos...

Internet Terminology 2022-11-19

Internet Terminology crossword puzzle
Across
  1. A secret word or expression used by authorized persons
  2. An object, as text or graphics linked through hypertext to a document, another object.
  3. A website that allows users to add, delete or revise content by using a web browser.
  4. Also called index page, main page the initial page of a website
  5. engine A computer program that searches documents, especially on the world wide web
Down
  1. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
  2. a protocol for specifying addresses on the internet
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions,

9 Clues: a protocol for specifying addresses on the internetA secret word or expression used by authorized personsAlso called index page, main page the initial page of a websiteThe rules of etiquette that apply when communicating over computer networksengine A computer program that searches documents, especially on the world wide web...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
  2. Electronic device most students own at home and is square and mostly portable.
  3. the use of technology to harass, threaten, embarrass, or target another person.
Down
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  3. A repetitive action toward another human purposely causing harm or intimidation.
  4. safety, The act of protecting ones self or others from harm or intimidation online.
  5. An individual who causes harm or stress to another human intentionally and repetitively.
  6. Having firm belief or reliability in someone.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person.A repetitive action toward another human purposely causing harm or intimidation....

Social Customer Service 2019-05-21

Social Customer Service crossword puzzle
Across
  1. A type of automated artificial intelligence tool used to converse with users
  2. A prediction of the net profit attributed to the entire future relationship with a customer
  3. An app that enables users to message each other instantaneously – usually on a smartphone
Down
  1. Tracking conversations online for mentions of your product, brand, or competitors
  2. A social media user with a large audience who can drive awareness about a topic, product, or service
  3. The interaction between people and brands on social networks.
  4. A social media user who makes offensive or annoying postings which provoke other users
  5. Someone who talks favorably about a brand or product, and passes on positive word-of-mouth to other people.
  6. The potential audience that a message can reach

9 Clues: The potential audience that a message can reachThe interaction between people and brands on social networks.A type of automated artificial intelligence tool used to converse with usersTracking conversations online for mentions of your product, brand, or competitors...

Finance Cross 2023-11-23

Finance Cross crossword puzzle
Across
  1. Open banking technology aims to create new routes between customers' bank accounts and these.
  2. Former Nationwide chief executive who led the review.
  3. The review calls for the payment sector to use this technology for creating new routes.
  4. The country that should develop strategies to challenge card network dominance.
  5. Digital wallets, including Google Pay and Apple Pay, account for this percentage of UK retail payments.
Down
  1. A service at risk of falling behind and needing an alternative.
  2. A widely used service in the UK, taking 70-80 seconds on average.
  3. The time alternative methods in Brazil, India, and Sweden take to process a transaction.
  4. Visa and Mastercard together accounted for this percentage of all debit and credit card payments in the UK in 2021.
  5. Card networks facing a probe into cross-border interchange fees.

10 Clues: Former Nationwide chief executive who led the review.A service at risk of falling behind and needing an alternative.Card networks facing a probe into cross-border interchange fees.A widely used service in the UK, taking 70-80 seconds on average.The country that should develop strategies to challenge card network dominance....

IS-95 CHANNELS 2023-09-25

IS-95 CHANNELS crossword puzzle
Across
  1. How does Power Control in IS-95 help improve system capacity?
  2. Which channel is used for initial access and call setup procedures in IS-95?
  3. What channel is used by the mobile device to send data and voice to the base station in IS-95?
  4. What is the typical unit of measurement for power control adjustments in IS-95?
Down
  1. What is the primary purpose of the Reverse Traffic Channel in IS-95?
  2. Why is power control important in IS-95 CDMA networks?
  3. What type of power control is used in IS-95 to maintain signal quality?
  4. What is the primary purpose of the Forward Traffic Channel in IS-95?
  5. Which channel notifies the mobile device to adjust its power level in IS-95?
  6. What key function does Power Control serve in IS-95 CDMA?
  7. In IS-95, which channel carries voice and data from the base station to the mobile device?

11 Clues: Why is power control important in IS-95 CDMA networks?What key function does Power Control serve in IS-95 CDMA?How does Power Control in IS-95 help improve system capacity?What is the primary purpose of the Reverse Traffic Channel in IS-95?What is the primary purpose of the Forward Traffic Channel in IS-95?...

Unit 32 How networks can be attacked 2013-11-28

Unit 32 How networks can be attacked crossword puzzle
Across
  1. Is a type of malicious software that is activated each time your system boots up
  2. Know as malicious software
  3. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
  4. of service It attempts to make a user or organisation lose its services
  5. Also known for advertising supported software
  6. force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
Down
  1. Usually these are statistical analyses that attempt to discover keys
  2. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
  3. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
  4. Is a software that gathers information about a person or organisation without their knowledge
  5. door Is a method where any virus such Trojan, Malware can get through all security procedures

11 Clues: Know as malicious softwareAlso known for advertising supported softwareUsually these are statistical analyses that attempt to discover keysof service It attempts to make a user or organisation lose its servicesIs a type of malicious software that is activated each time your system boots up...

Cyberpesten 2013-12-18

Cyberpesten crossword puzzle
Across
  1. Cyberpesten is pesten. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
  2. uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
  3. Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
  4. Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
  5. Opslagplaats voor wapens
Down
  1. Naamloos, ongenoemd, wie of wat je niet kent.
  2. Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
  3. Zoals Facebook, Twitter, Netlog, Google+, MySpace.
  4. Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
  5. Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
  6. Developmental Issues in Cyberbullying amongst Adolescents.

11 Clues: Opslagplaats voor wapensNaamloos, ongenoemd, wie of wat je niet kent.Zoals Facebook, Twitter, Netlog, Google+, MySpace.Developmental Issues in Cyberbullying amongst Adolescents.Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.Vaardigheden die te maken hebben met wat je wel en niet kan doen online....

Cyberpesten 2013-12-18

Cyberpesten crossword puzzle
Across
  1. Naamloos, ongenoemd, wie of wat je niet kent.
  2. Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
  3. Opslagplaats voor wapens
  4. Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
  5. Zoals Facebook, Twitter, Netlog, Google+, MySpace.
  6. Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
Down
  1. uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
  2. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
  3. Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
  4. Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
  5. Developmental Issues in Cyberbullying amongst Adolescents.

11 Clues: Opslagplaats voor wapensNaamloos, ongenoemd, wie of wat je niet kent.Zoals Facebook, Twitter, Netlog, Google+, MySpace.Developmental Issues in Cyberbullying amongst Adolescents.Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.Vaardigheden die te maken hebben met wat je wel en niet kan doen online....

Quinlan K. 2015-04-30

Quinlan K. crossword puzzle
Across
  1. To renew or revitalize; To reload a webpage on the internet
  2. a list of citations that appear at the end of a paper, article, chapter or book.
  3. A system of connected computers that allows the sharing of files and equipment
  4. TABS The name for a way to display information on websites
Down
  1. An unauthorized person who secretly gains access to computer files
  2. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text
  3. TABS The name for a way to display information on websites
  4. the unauthorized use, reproduction, distribution, or transmission of copyrighted
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  6. Software program that is designed to damage files on a computer that receives it.
  7. A collaborative website which can be directly edited by anyone with access to it
  8. Originally known as Web Log.

12 Clues: Originally known as Web Log.TABS The name for a way to display information on websitesTABS The name for a way to display information on websitesTo renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer filesA system of connected computers that allows the sharing of files and equipment...

Functions & Characteristics of Money 2017-11-28

Functions & Characteristics of Money crossword puzzle
Across
  1. Since we use money on a daily basis, it should be _______ and easy to use.
  2. To avoid mistakes during monetary transactions, money should have this characteristic.
  3. A function of money that allows value to b
  4. Money should be __________________ (3 words)to deter to ability to create counterfeit bills.
  5. A function of money that allows comparisons of the value of various goods and services; also called standard unit of account.
  6. The main function of money, allowing the exchange of goods and services.
Down
  1. Another term for measure of value.
  2. The ease with which an asset can be used to make
  3. This characteristic of money allows for facilitation of both small and large purchases.
  4. Money in electronic networks, or cash cards that can be used by consumers.
  5. As money is passed from hand to hand countless times and is stored in wallets and purses and used in vending machines it needs to be ________________.

11 Clues: Another term for measure of value.A function of money that allows value to bThe ease with which an asset can be used to makeThe main function of money, allowing the exchange of goods and services.Since we use money on a daily basis, it should be _______ and easy to use.Money in electronic networks, or cash cards that can be used by consumers....

STEM 2023-01-19

STEM crossword puzzle
Across
  1. use the principles of engineering, soil science, biology, and chemistry to develop solutions to environmental problems.
  2. studies the solid, liquid, and gaseous matter that constitutes Earth and other terrestrial planets, as well as the processes that shape them
  3. a person who works with theoretical or applied statistics
  4. Plan and conduct complex projects in basic and applied research.
Down
  1. research, design, develop, build, and test mechanical and thermal sensors and devices, including tools, engines, and machines.
  2. helps businesses make critical financial decisions by collecting, tracking, and correcting the company's finances.
  3. create the computer applications that allow users to do specific tasks and the underlying systems that run the devices or control networks
  4. responsible for analyzing financial statements and predicting the future performance of the company.
  5. application of principles and design concepts to medicine and biology for healthcare purposes.
  6. an expert in or student of mathematics.
  7. Conduct scientific studies of behavior and brain function

11 Clues: an expert in or student of mathematics.Conduct scientific studies of behavior and brain functiona person who works with theoretical or applied statisticsPlan and conduct complex projects in basic and applied research.application of principles and design concepts to medicine and biology for healthcare purposes....

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for reference or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for reference or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

ICT crosswords Aurelia 2023-03-28

ICT crosswords Aurelia crossword puzzle
Across
  1. sharing Two or more employees doing the same job but working at different times is called
  2. work time When a person is employed to work fewer hours than the normal working week, this is called
  3. type of virus that can record the activities of the user, such as password, and transmit this information to the person who wrote the malware
  4. computer software with malicious intent
  5. learning new skills outside of the worker's existing skillset
  6. The act of compromising digital devices and networks by gaining unauthorized access to an account or computer system
Down
  1. The safe and responsible use of technology
  2. work When employees work the full normal hours in a week but work at times which
  3. work When an employee works the full normal hours in a week but works fewer days, this is called
  4. Loss of skills that an employee or group of employees once had
  5. them and the employer, this is called

11 Clues: them and the employer, this is calledcomputer software with malicious intentThe safe and responsible use of technologylearning new skills outside of the worker's existing skillsetLoss of skills that an employee or group of employees once hadwork When employees work the full normal hours in a week but work at times which...

Cyber Intelligence (Medium) 2023-06-01

Cyber Intelligence (Medium) crossword puzzle
Across
  1. The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
  2. An individual or group that carries out cyber attacks for political or ideological reasons.
  3. A technique used to gather intelligence by infiltrating target networks or systems.
  4. A technique used to gather intelligence by monitoring and analyzing public sources of information.
  5. A covert technique used to gain unauthorized access to a computer system.
  6. A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
  7. The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
  1. The process of identifying and mapping potential vulnerabilities in a system or network.
  2. a centralized team responsible for monitoring and responding to security incidents.
  3. A software program that disguises itself as a legitimate program but performs malicious activities.
  4. The proactive search for indicators of compromise and potential threats within a network or system.

11 Clues: A covert technique used to gain unauthorized access to a computer system.a centralized team responsible for monitoring and responding to security incidents.A technique used to gather intelligence by infiltrating target networks or systems.The process of identifying and mapping potential vulnerabilities in a system or network....

Artificial Intelligence Crossword 2024-02-17

Artificial Intelligence Crossword crossword puzzle
Across
  1. The person who coined the term Artificial Intelligence
  2. A many valued logic in which truth values of variable may be any real number between 0 and 1
  3. A logic programming language associated with AI and computational linguistics made in 1972
  4. A machine that defeated world chess champion Garry Kasparov
  5. The branch of AI that deals with the interaction between computers and human language enabling computers to understand, interpret and generate human language
  6. A subset of machine learning that consists of three or more layers of neural network
Down
  1. ------ Network is a computational model inspired by the structure and function of human brain
  2. An AI chatboat that uses natural language processing to create human like conversational dialogue
  3. Test used to determine whether or not a computer can think intelligently like humans
  4. The company that owns Chat GPT
  5. Neural networks require large amount of ------- to make accurate decisions

11 Clues: The company that owns Chat GPTThe person who coined the term Artificial IntelligenceA machine that defeated world chess champion Garry KasparovNeural networks require large amount of ------- to make accurate decisionsTest used to determine whether or not a computer can think intelligently like humans...

Chapter Vocabulary Review Extension 2023-12-04

Chapter Vocabulary Review Extension crossword puzzle
Across
  1. waste produced from nuclear fission or in a nuclear reactor
  2. the energy that holds protons toghether & neutrons alike in the nucleus of an atom.
  3. a type of mining in which layers of surface soil & rock are removed from large areas to expose a resources.
  4. an energy surce that CAN'T be replentished ina short time.
  5. a kind of mining pollutionthay results from rainwater entering caves with iron sulfide & draining out
  6. a rock containing hydrocarbons.
  7. reeducing eergy use to prolong the time it takes for us to run out of fossil fuels.
Down
  1. a type of mining which involves digging deep shafts and networks of horizonta tunnels are made, either by blasting or mining to find resurces.
  2. an ice-like solid that consists of molecules of methane within a crystal network of molecules.
  3. an energy source that's repeatedly avaliable is self-replentishing, or can be replaced in a relatively short time
  4. a liquid fossil fuel(contains hydrocarbns)

11 Clues: a rock containing hydrocarbons.a liquid fossil fuel(contains hydrocarbns)an energy surce that CAN'T be replentished ina short time.waste produced from nuclear fission or in a nuclear reactorthe energy that holds protons toghether & neutrons alike in the nucleus of an atom....

AV Lesson 5 2024-03-10

AV Lesson 5 crossword puzzle
Across
  1. The act of compelling observance of or compliance with a law or rule.
  2. Existing or occurring in a digital environment, often simulated or computer-generated.
  3. Designed to be easily understood and operated by ordinary people.
  4. A penalty or coercive measure imposed to ensure compliance with a law or rule.
  5. To bring legal action against someone, typically in a court of law.
Down
  1. To introduce new methods or ideas, especially to promote change or improvement.
  2. To make a process or system operate automatically, reducing the need for human intervention.
  3. The practice of protecting computer systems, networks, and programs from digital attacks.
  4. The status of being a member of a particular country and having the rights and duties associated with it.
  5. Transmitting signals without the need for physical connection, typically using radio waves.
  6. To officially require or authorize something, often by law or command.

11 Clues: Designed to be easily understood and operated by ordinary people.To bring legal action against someone, typically in a court of law.The act of compelling observance of or compliance with a law or rule.To officially require or authorize something, often by law or command.A penalty or coercive measure imposed to ensure compliance with a law or rule....

Networking protocols Kennert, Mattias 2020-10-14

Networking protocols Kennert, Mattias crossword puzzle
Across
  1. protocol​ specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network.
  2. Protocol the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.​
  3. is the process of "stealing" bits from the HOST part of an IP address in order to divide the larger network into smaller sub-networks called subnets.
  4. is the process of selecting a path for traffic in a network or between or across multiple networks.
  5. The highest OS Protocol layer.
Down
  1. is a logical subdivision of an IP network.
  2. is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
  3. characteristics or information, usually numerical, that are collected through observation.
  4. In software engineering, ... is the process of adapting software for the purpose of achieving some form of execution in a computing environment
  5. is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
  6. In networking, a ... is a standardized set of rules for formatting and processing data.
  7. The lowes OS Protocol layer.
  8. an Hyprid protocol

13 Clues: an Hyprid protocolThe lowes OS Protocol layer.The highest OS Protocol layer.is a logical subdivision of an IP network.In networking, a ... is a standardized set of rules for formatting and processing data.characteristics or information, usually numerical, that are collected through observation....

Tech Terms 2022-04-13

Tech Terms crossword puzzle
Across
  1. the information about a person that is on the internet from their online activity.
  2. Using encryption to provide secure access to a remote computer over the internet.
  3. sending emails disguised to look from companies to make people reveal personal information, like passwords
  4. a set of data that describes and gives information about other data.
  5. something baiting you into clicking on it, used to make money from each click
  6. a social media app/website where you post and watch 15-second videos and infinitely scroll
Down
  1. websites and applications that enable users to create and share content or to participate in social networking.
  2. a global computer network providing lots of information and communication ways, made of interconnected networks
  3. a network made up of social interactions and personal relationships.
  4. software that is made to disrupt, damage, or gain unauthorized access to a computer system.
  5. a micro-blogging social media site to share news and other things

11 Clues: a micro-blogging social media site to share news and other thingsa network made up of social interactions and personal relationships.a set of data that describes and gives information about other data.something baiting you into clicking on it, used to make money from each click...

FUN DAY-ESC TRIVIA 2018-01-05

FUN DAY-ESC TRIVIA crossword puzzle
Across
  1. 3.Charter Partnered with___________ Channel to connect veterans with their communities.
  2. 8.Philo Farnsworth battled with ________, Zworykin to be called the "father of television."
  3. 6.The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
  4. 1.One of our key necessities is expanding access to ___________. This is a necessity to compete.
  5. 2.How many business units do we service?
  6. 10.Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
Down
  1. 7.The Second Largest Cable Provider in the U.S.
  2. Benefits 11. Which team handles repayment agreements for medical deductions
  3. 4.If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
  4. 9.Charter, Time Warner Cable and _________ house networks combined in 2016.
  5. 5.If I am out on workman’s compensation, my updates are completed by the _________ team.

11 Clues: 2.How many business units do we service?7.The Second Largest Cable Provider in the U.S.Benefits 11. Which team handles repayment agreements for medical deductions9.Charter, Time Warner Cable and _________ house networks combined in 2016.3.Charter Partnered with___________ Channel to connect veterans with their communities....

Australian Deportation Laws 2018-11-13

Australian Deportation Laws crossword puzzle
Across
  1. a relationship in which a person or thing is linked or associated with something else.
  2. an arrangement of intersecting horizontal and vertical lines. Or interact with others to exchange information and develop professional or social contacts.
  3. person or thing regarded as perfect. Or a standard or principle to be aimed at.
  4. of or involving the agreement or cooperation of two political parties that usually oppose each other's policies.
Down
  1. the state of being famous or well known for some bad quality or deed.
  2. concerned with or seeking to promote human welfare.
  3. acting or done in the same way over time, especially so as to be fair or accurate.
  4. the expression of disapproval of someone or something on the basis of perceived faults or mistakes.
  5. done or existing alone.
  6. the mental and moral qualities distinctive to an individual.
  7. showing or motivated by susceptibility to bribery; corrupt.

11 Clues: done or existing alone.concerned with or seeking to promote human welfare.showing or motivated by susceptibility to bribery; corrupt.the mental and moral qualities distinctive to an individual.the state of being famous or well known for some bad quality or deed.person or thing regarded as perfect. Or a standard or principle to be aimed at....

Psychological Distress 2015-11-09

Psychological Distress crossword puzzle
Across
  1. Name of the theorist
  2. Another determining factor for how you may deal with stress, this has to do with the people and networks around you
  3. A determining factor of how you deal with stress, has to do with how well you are able to respond to stress
  4. According to the Psychological Distress theory, distress helps lead to this
  5. Pearlin says that life is less of this, and more of a continuous journey
  6. Distress is a _____ that requires a psychological response
Down
  1. Theory suggests life is a _____ course of change
  2. Individual _______________ are some of the determining factors in how you respond to stress/distress, examples include race, gender, age, etc.
  3. Different ____s of stress will determine its impact
  4. If stress happens all at once or over a period of ____, the impact would be different
  5. An individual develops in order to respond to this

11 Clues: Name of the theoristTheory suggests life is a _____ course of changeAn individual develops in order to respond to thisDifferent ____s of stress will determine its impactDistress is a _____ that requires a psychological responsePearlin says that life is less of this, and more of a continuous journey...

cyberbullying 2023-10-23

cyberbullying crossword puzzle
Across
  1. type of Cyberbullying involves spreading false statements about people
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  3. a feeling of worry, nervousness, or unease about something with an uncertain outcome
  4. done or chosen in accordance with wisdom or prudence; likely to be of benefit
  5. an area on the internet or other computer network where users can communicate, typically one dedicated to a particular topic
  6. a person who has come to feel helpless and passive in the face of misfortune or ill-treatment
Down
  1. the action of stopping something from happening or arising
  2. the action of supervising someone or something
  3. the action or practice of sending text messages
  4. aggressive pressure or intimidation, can be done online
  5. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

11 Clues: the action of supervising someone or somethingthe action or practice of sending text messagesaggressive pressure or intimidation, can be done onlinethe action of stopping something from happening or arisingtype of Cyberbullying involves spreading false statements about people...

Chapter Vocabulary Review Extension 2023-12-15

Chapter Vocabulary Review Extension crossword puzzle
Across
  1. a type of mining in which layers of soil & roch (both at the surface) are removed from large areas to expose a resource
  2. a kind of minig pollution that results from rain water draining out of mines with iron sulfide
  3. the energy that holds protons together & neutrons together in the nucleus of an atom
  4. waste produced from nuclear fission
  5. a fossil fuel mostly made up of hydrocarbons, liquid
  6. an energy source that can't be replentished in a short amount of time
  7. a kind of mining eich involves digginy deep shafys & networks of horizontal tunnels are made either by blasting or mining to find resource
Down
  1. a solid that consists of molecules of methane within a crystal network of water molecules, ice-like
  2. hydrocarbon - containing rock
  3. an energy source that's repeatedly available, is self-replentishing, or can be replaced/made in a relatively short time
  4. reducing energy use to prolong the use of fossil fuels

11 Clues: hydrocarbon - containing rockwaste produced from nuclear fissiona fossil fuel mostly made up of hydrocarbons, liquidreducing energy use to prolong the use of fossil fuelsan energy source that can't be replentished in a short amount of timethe energy that holds protons together & neutrons together in the nucleus of an atom...

Artificial Lexicon 2023-12-02

Artificial Lexicon crossword puzzle
Across
  1. The field of study that enables computers to interpret visual information from the world.
  2. The delivery of computing services, including storage and processing power, over the internet.
  3. The interdisciplinary field that uses scientific methods, processes, and algorithms to extract insights from data.
  4. A machine learning approach where the algorithm is trained on labeled data.
  5. A computer system modeled after the human brain, used for tasks like image recognition.
  6. An AI program designed to simulate conversation with human users.
Down
  1. Extremely large and complex datasets that traditional data processing applications can't handle.
  2. The interdisciplinary field that involves the design, construction, operation, and use of robots.
  3. A subset of machine learning that involves neural networks with many layers.
  4. An open-source machine learning library developed by Google.
  5. A set of rules or steps followed to solve a problem or perform a task in AI.

11 Clues: An open-source machine learning library developed by Google.An AI program designed to simulate conversation with human users.A machine learning approach where the algorithm is trained on labeled data.A subset of machine learning that involves neural networks with many layers....

IOT TERMS 2024-03-14

IOT TERMS crossword puzzle
Across
  1. It is a low-power, low-data rate wireless network used mainly in home and industrial settings.
  2. Low power, wide area devices used in conjunction with mobile devices interfacing with IoT networks.
  3. A device used by utility companies to collect information about energy consumption
  4. a long-range for small data packets with low power consumption.
  5. An organization focused on driving the network and computing infrastructure needs of automotive big data.
  6. A data link layer (DLL) sublayer transmits data packets to and from a network interface card
Down
  1. A computer system designed for long-distance data transmissions
  2. a location-based service in which GPS or RFID is used to create a virtual geographic boundary
  3. a weak signal sent over a wide frequency and is employed mostly as a localizing signal and distance measurement.
  4. A measurement of how well a network supports IT connectivity
  5. It is an evolved second generation cellular network protocol

11 Clues: A measurement of how well a network supports IT connectivityIt is an evolved second generation cellular network protocolA computer system designed for long-distance data transmissionsa long-range for small data packets with low power consumption.A device used by utility companies to collect information about energy consumption...

CyberSecurity 2024-03-09

CyberSecurity crossword puzzle
Across
  1. pairs a public key for encryption and a private key for decryption
  2. software intended to damage a computing system or to take partial control over its operation
  3. a malicious program that can copy itself and gain access to a computer in an unauthorized way
  4. encryption involves one key for both encryption and decryption
  5. a technique that attempts to trick a user into providing personal information
  6. infomration about an individual that identifies, links, relates or describes them
Down
  1. a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
  2. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  3. the process of decoding data
  4. the process of encoding data to prevent unauthorized access
  5. a wireless access point that give unauthorized access to to secure networks

11 Clues: the process of decoding datathe process of encoding data to prevent unauthorized accessencryption involves one key for both encryption and decryptionpairs a public key for encryption and a private key for decryptiona wireless access point that give unauthorized access to to secure networks...

Unit 4 Establish Personal Branding 2024-05-15

Unit 4 Establish Personal Branding crossword puzzle
Across
  1. You personal brand is what that sets you apart from competitor in the mind of interviewers.
  2. Effective personal branding will emphasize the strengths of an individual and gain___.
  3. Word of mouth will push you forward and more people recognising your name.
  4. It helps in gaining recognition in their area of expertise.
  5. People will feel more comfortable when they can know the background of the person.
  6. It is the unique combination of skills, experience, and personality
Down
  1. An organisation may request and call your references and ask them about your claims.
  2. Your credentials, education and portfolios have to be essentially comes to ______.
  3. The person can build networks in different fields and their areas of specialty.
  4. This makes people more comfortable working with you given that your intentions are genuine and clear
  5. A young professional need to be aware if the way you conduct yourself to lay a solid ______.

11 Clues: It helps in gaining recognition in their area of expertise.It is the unique combination of skills, experience, and personalityWord of mouth will push you forward and more people recognising your name.The person can build networks in different fields and their areas of specialty....

8: Ransomware Names (Expert) 2023-06-01

8: Ransomware Names (Expert) crossword puzzle
Across
  1. Exfiltrates victims' data before encrypting it and threatens to publish the stolen data if the ransom is not paid.
  2. Initially disguised as the Petya ransomware, targeted organizations through a compromised software update.
  3. Exploited a vulnerability in Windows operating systems, spread rapidly across networks.
  4. Targets large organizations, encrypts critical systems, and steals sensitive data for ransom payment negotiations.
Down
  1. Known for its ransomware-as-a-service (RaaS) model, where affiliates distributed the ransomware and shared profits.
  2. Distributed through malicious email attachments, often in the form of macro-enabled Microsoft Office documents.
  3. Targets large organizations and frequently utilizes vulnerabilities, exploits, or compromised RDP connections.
  4. Targets organizations worldwide using various techniques, including phishing campaigns and exploit kits.
  5. Engages in high-profile attacks on critical infrastructure, employs double extortion tactics.
  6. Disguised as an Adobe Flash installer, embedded into websites using JavaScript injected into the site's HTML code.
  7. Typically deployed following an initial compromise using other malware to gain access.

11 Clues: Typically deployed following an initial compromise using other malware to gain access.Exploited a vulnerability in Windows operating systems, spread rapidly across networks.Engages in high-profile attacks on critical infrastructure, employs double extortion tactics....

Entrepreneurship Chapter 7, Section 7.1 2025-03-18

Entrepreneurship Chapter 7, Section 7.1 crossword puzzle
Across
  1. The statistics about the economy indicating how it is performing.
  2. An area with commercial zoning for many office buildings.
  3. Local governments create these and regulations that define how property in specific geographic areas can be used, i.e. residential, commercial, industrial, agricultural, and recreational.
  4. A company with a physical store or facility for at least a portion of its operation, i.e. grocery stores, manufacturing plants, doctor’s offices.
Down
  1. A blend of two or more location types, i.e. brick-and-mortar and home-based businesses.
  2. It is important to consider access to this, from the suppliers to the customers, when locating a business.
  3. Like e-business, these may have lower overhead costs than brick-and-mortar businesses.
  4. The area from which a business expects to draw most of its customers.
  5. Conducting retail sales, in particular, through the Internet.
  6. Buying and selling of goods or services through the Internet.
  7. Any business process conducted through electronic networks using the Internet.

11 Clues: An area with commercial zoning for many office buildings.Conducting retail sales, in particular, through the Internet.Buying and selling of goods or services through the Internet.The statistics about the economy indicating how it is performing.The area from which a business expects to draw most of its customers....

Joshua Crossword Puzzle 2024-11-20

Joshua Crossword Puzzle crossword puzzle
Across
  1. - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
  2. - is the process of detecting and preventing illegal or unauthorized use of a computer
  3. - is ensuring that the information is accessible to authorized persons when required without delay.
  4. - includes the applications on the computers and operating system.
  5. theft - Any action of stealing information from a users system.
  6. - An individual who breaks into computer systems to steal, change, or destroy information.
  7. - An action or event that has the potential to compromise and/or violate security.
Down
  1. - A defined method of breaching the security of an IT system through vulnerability.
  2. - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
  3. Any action derived from intelligent threats to violate the security of the system.
  4. preventing intruders from accessing any part of a computer system.

11 Clues: theft - Any action of stealing information from a users system.- includes the applications on the computers and operating system.preventing intruders from accessing any part of a computer system.Any action derived from intelligent threats to violate the security of the system....

HelpDesk Unit3 Vocab 2024-10-30

HelpDesk Unit3 Vocab crossword puzzle
Across
  1. applications used to manage and track service requests and support tickets
  2. the process of prioritizing and categorizing incoming support tickets to ensure that the most important issues are addressed first
  3. providing assistance from a distance, through remote desktop or screen sharing software
  4. a tool that is used for IT support or other remote access to allow users to broadcast their screen to other devices
Down
  1. a repository of information and solutions about common issues and their resolutions
  2. technology that allows a user to control a computer from another location
  3. a record created in a help desk system to track a user’s issue
  4. identifying the nature of a problem based on symptoms
  5. the individual who uses the technology or services provided
  6. the use of computer systems and networks to manage and deliver information
  7. a list of common questions and answers that can help users troubleshoot issues themselves

11 Clues: identifying the nature of a problem based on symptomsthe individual who uses the technology or services provideda record created in a help desk system to track a user’s issuetechnology that allows a user to control a computer from another locationapplications used to manage and track service requests and support tickets...

technology 2019-09-17

technology crossword puzzle
Across
  1. around the cities have crashed
Down
  1. went to go work on the computer
  2. computer crashed

3 Clues: computer crashedaround the cities have crashedwent to go work on the computer

Techology Crossword Puzzle 2016-08-09

Techology Crossword Puzzle crossword puzzle
Across
  1. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
  2. symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
  3. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  4. a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  5. a computer that handles requests for data, email, file transfers, and other network services from other computers.
  6. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  7. unsolicited email messages sent for marketing purposes.
  8. A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
  1. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  2. A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  3. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  4. refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  5. usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
  6. is a device that allows computers to transmit information to each other via ordinary telephone lines.
  7. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.

15 Clues: unsolicited email messages sent for marketing purposes.any type of illegal activity that is undertaken (or relies heavily) on a computer.is a device that allows computers to transmit information to each other via ordinary telephone lines.A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte....

Techology Crossword Puzzle 2016-08-09

Techology Crossword Puzzle crossword puzzle
Across
  1. unsolicited email messages sent for marketing purposes.
  2. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  3. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
  4. A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  5. refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  6. is a device that allows computers to transmit information to each other via ordinary telephone lines.
  7. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
Down
  1. a computer that handles requests for data, email, file transfers, and other network services from other computers.
  2. a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  3. A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
  4. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  5. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  6. symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
  7. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
  8. usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.

15 Clues: unsolicited email messages sent for marketing purposes.any type of illegal activity that is undertaken (or relies heavily) on a computer.is a device that allows computers to transmit information to each other via ordinary telephone lines.A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte....

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication
Down
  1. Link between earth station and satellite
  2. Part of the celestial sphere directly above the observer
  3. Combination of transmitter and receiver in satellite

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satellitePart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Link between earth station and satellite
Down
  1. Part of the celestial sphere directly above the observer
  2. Combination of transmitter and receiver in satellite
  3. Reliability curve in Satellite communication

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satellitePart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

computer networks and protocols 2023-02-06

computer networks and protocols crossword puzzle
Across
  1. the result of joining to or more computers
Down
  1. the maximum amount of data going to a device like a pipe and water
  2. like a set rules
  3. the pat of the computer which acts as the brain.
  4. like a big hard drive

5 Clues: like a set ruleslike a big hard drivethe result of joining to or more computersthe pat of the computer which acts as the brain.the maximum amount of data going to a device like a pipe and water

7th Entrepreneurship & Computer Networks 2022-03-21

7th Entrepreneurship & Computer Networks crossword puzzle
Across
  1. market
  2. plan
  3. Letter
Down
  1. when you work with someone
  2. something you use for selling things
  3. pitch

6 Clues: planpitchmarketLetterwhen you work with someonesomething you use for selling things