networks Crossword Puzzles
Crypto Review 2023-11-09
Across
- a one way cryptographic function that converts a some text like "I like cats" into a scrambled looking thing like"sdkf83ru39ijflku"
- money system that is backed up by a central bank and/or government
- a distributed ledger of transactions that are linked together through a cryptographic hash
- people that sell crypto are often like this
Down
- a decentralized money system that uses peer to peer networks and encryption
- files and transactions of a crypto system are replicated all over the internet
6 Clues: people that sell crypto are often like this • money system that is backed up by a central bank and/or government • a decentralized money system that uses peer to peer networks and encryption • files and transactions of a crypto system are replicated all over the internet • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Provides the physical connection to the network at the PC or other host device
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Real-time communication between two or more people
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- identify the physical location of intermediary devices and cable installation.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Hosts that request information
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Something that helps people work together on a particular file or piece of software
- Type of network provides access to users over a small geographical area
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Applications can be accessed over the Internet through a subscription.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- hello
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
Down
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Examples include copper, fiber and wireless
- Private networks in use by just one company
- Identify devices, ports, and addressing scheme.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- diagram Diagram of a network
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Type of network provides access to users over a large geographical area
- limits the impact of a failure, so that the fewest number of devices are affected.
- allows people to share files with each other without having to store and download them from a central server
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Examples include routers, switches and wireless access points
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- lol
- Web pages that groups of people can edit and view together
41 Clues: lol • hello • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Something that helps people work together on a particular file or piece of software
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a large geographical area
- Having multiple paths to a destination
- Hosts that provide information
- Applications can be accessed over the Internet through a subscription.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Down
- Hosts that request information
- limits the impact of a failure, so that the fewest number of devices are affected.
- Web pages that groups of people can edit and view together
- Type of network provides access to users over a small geographical area
- Examples include routers, switches and wireless access points
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- diagram Diagram of a network
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Real-time communication between two or more people
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Identify devices, ports, and addressing scheme.
- Provides the physical connection to the network at the PC or other host device
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- allows people to share files with each other without having to store and download them from a central server
- Private networks in use by just one company
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Interactive websites where people create and share user-generated content with friends and family
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
39 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
NFT Crossword 2022-03-30
Across
- an organization that was designed to be automated and decentralized.
- the price of the cheapest NFT in a collection.
- the largest holders.
- the fee you have to pay for minting smart contracts into the blockchain.
- unique cryptographic tokens that exist on a blockchain and cannot be replicated.
- converting digital files into crypto collections or digital assets stored on the blockchain.
- a network of 3D virtual worlds focused on social connection.
- a distribution of cryptocurrency, tokens, or NFTs that are sent to a web3 wallet address for free as a promotion.
- cryptocurrency used on the Polygon network.
Down
- anxiety that an exciting or interesting event may currently be happening elsewhere, often aroused by posts seen on social media.
- a scaling solution that aims to provide multiple tools to improve the speed and reduce the cost and complexities of transactions on blockchain networks.
- fear, uncertainty and doubt.
- The world's first and largest digital marketplace for NFTs
- usually when developers market a project to generate sales and then abandon it, taking the existing profits.
- a decentralized, open-source blockchain with smart contract functionality.
- We're All Going to Make It
- experiencing a significant spike in price and volume.
17 Clues: the largest holders. • We're All Going to Make It • fear, uncertainty and doubt. • cryptocurrency used on the Polygon network. • the price of the cheapest NFT in a collection. • experiencing a significant spike in price and volume. • The world's first and largest digital marketplace for NFTs • a network of 3D virtual worlds focused on social connection. • ...
TECHNOLOGY VOCABULARY 2021-08-12
Across
- the process in which output of a system is returned to input
- a worldwide network of computer networks
- the symbolic arrangement of data in a computer program
- crime committed using a computer and the internet
- the amount of information that can be stored on a disk drive
- a set of characters comprising a unit of information
- RAM memory that is set aside as a specialized buffer storage
Down
- a set of related records kept together
- a list of questions that are frequently asked (about a given topic) along with their answers
- a failure or defect in a computer program, system,or machine
- science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- a listing of the computer files stored in memory
- an organized body of related information
- put into a format that can be read or processed by computers
- the exclusive right to sell a work
- indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- any small compartment
17 Clues: any small compartment • the exclusive right to sell a work • a set of related records kept together • an organized body of related information • a worldwide network of computer networks • a listing of the computer files stored in memory • crime committed using a computer and the internet • a set of characters comprising a unit of information • ...
Digital Technology Final part 1 2023-05-08
Across
- the physical parts of the computer that store and run written instructions
- type of file that has been created or saved by an application
- everything you see when you start your computer
- wide area network
- Arranging all folders files and other documents in an organized manner
- a document created by a program or system
- Something used to hold files or other folders
Down
- a computer file like an image, video or document which can be included in an email and shared
- Free cloud storage service that is integrated with the company's other services and systems
- Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
- a set of digital instructions, data or programs used to operate computers
- website that allows users to add and update content on the site using their own web browser.
- online journal which creates interaction from readers. They consist of special or common interest groups
- free web-based application in which documents and spreadsheets can be edited, created and stored online
- local area network
- the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
- the screen that displays the desktop
17 Clues: wide area network • local area network • the screen that displays the desktop • a document created by a program or system • Something used to hold files or other folders • everything you see when you start your computer • type of file that has been created or saved by an application • Arranging all folders files and other documents in an organized manner • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Marwan crossword 2024-04-17
Across
- a symmetric encryption algorithm (block cipher) using 56-bit keys
- attack which consists of testing all the words in a list as a keyword
- attack which consists of testing all possible password or key solutions.
- a public-key cryptosystem, one of the oldest widely used for secure data transmission.
Down
- The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
- is used to transmit data securely and anonymously over public networks.
6 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keys • attack which consists of testing all the words in a list as a keyword • is used to transmit data securely and anonymously over public networks. • attack which consists of testing all possible password or key solutions. • ...
CSI106 Cross Word - 4 2024-11-05
Across
- A set of rules or procedures that govern the format and transmission of data between two or more devices.
- A networking device that forwards data packets between computer networks.
Down
- A secret word or phrase that is used to authenticate a user.
- A formatted unit of data carried by a packet-switched network.
- A connection point on a computer.
- A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.
6 Clues: A connection point on a computer. • A secret word or phrase that is used to authenticate a user. • A formatted unit of data carried by a packet-switched network. • A networking device that forwards data packets between computer networks. • A set of rules or procedures that govern the format and transmission of data between two or more devices. • ...
Internet Terminology 2022-11-19
Across
- The rules of etiquette that apply when communicating over computer networks
- An object, as text or graphics linked through hypertext to a document, another object.
- A website containing a writers or group of writer's own experiences, observations, opinions,
- Also called index page, main page the initial page of a website
Down
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
- engine A computer program that searches documents, especially on the world wide web
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons
- a protocol for specifying addresses on the internet
9 Clues: a protocol for specifying addresses on the internet • A secret word or expression used by authorized persons • Also called index page, main page the initial page of a website • The rules of etiquette that apply when communicating over computer networks • engine A computer program that searches documents, especially on the world wide web • ...
Internet Terminology - 2 2022-11-19
Across
- engine A computer program that searches documents
- An object, as text or graphics linked through hypertext to a document, another object
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions
Down
- Also called index page, main page the initial page of a website, usually containing an introduction
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
- A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons to prove their right to access, information, ect.
9 Clues: engine A computer program that searches documents • The rules of etiquette that apply when communicating over computer networks • A website that allows users to add, delete or revise content by using a web browser. • An object, as text or graphics linked through hypertext to a document, another object • ...
Wireless Router Security Crossword Puzzle By Taheem Bhuiyan 2022-02-11
Across
- This filter keeps port 113 from being scanned by devices from the internet.
- transmitting a packet that will be received by every device on the network
- the security method added to WPA for wireless networks that provides stronger data protection and network access control.
- a single, direct request sent from one host to another
Down
- method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- short for Internet Protocol
- an interface that enables the serial (one bit at a time) exchange of data between two devices
9 Clues: short for Internet Protocol • a single, direct request sent from one host to another • transmitting a packet that will be received by every device on the network • This filter keeps port 113 from being scanned by devices from the internet. • method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- An employee must press this button, when he/she receives the suspicious mail.
- Specific agreement and setup that allow an employee to connect a personal device.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Specific agreement and setup that allow an employee to connect a personal device.
- An employee must press this button, when he/she receives the suspicious mail.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Interactive websites where people create and share user-generated content with friends and family
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- limits the impact of a failure, so that the fewest number of devices are affected.
- Web pages that groups of people can edit and view together
- Hosts that request information
- identify the physical location of intermediary devices and cable installation.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Hosts that provide information
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Identify devices, ports, and addressing scheme.
- Applications can be accessed over the Internet through a subscription.
Down
- Real-time communication between two or more people
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Something that helps people work together on a particular file or piece of software
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Examples include routers, switches and wireless access points
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Private networks in use by just one company
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Having multiple paths to a destination
- Type of network provides access to users over a large geographical area
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Type of network provides access to users over a small geographical area
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- allows people to share files with each other without having to store and download them from a central server
- diagram Diagram of a network
38 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Elijah Chapter 9 2024-05-06
Across
- A multiplexor that un-multiplexes the data stream and delivers the individual streams to the appropriate devices
- A number indicating a protocol's reliability
- A multiplexing technique where binary 1s and 0s are replaced with larger, unique binary sequences to allow multiple user to share a common set of frequencies
- A set of unused frequencies between 2 channels on a frequency division multiplexed system
- A adaptive routing technique in which routing tables react to network fluctuations when calculating the best paths between networks
- A second Generation mobile telephone technology that is based on a form of time division multiplexing
- A transitional cellular network technology between 3G and 4G that takes advantage of some improved 4G technologies to exceed 3G speeds
- A type of routing protocol that enables routers to share performance and status information about their connected links with routers throughout the network
- The device that combines multiple input signals for transmission over a single medium and then demultiplexes the composite signal back into multiple signals
- An expensive form of wavelength division multiplexing that involves the transfer of a large number of data streams over a single optical fiber using multiple lasers emitting light of different wavelengths
- Assigning non-overlapping frequency ranges to different signals or to each user of a medium
- The use of one or more fixed routes manually added to the routing table, often when the network is installed
- 4th generation mobile phone service characterized by an all-IP network for both data and voice transmission
- A path vector routing protocol that is the only routing protocol used on the open Internet
- A compression technique that offers lossless compression by creating a dictionary of character strings and associated codes
- A compression technique in which data is compressed and then decompressed but doesn't return the original data
- A compression technique in which data is compressed and the decompressed such that the original data is returned
- Early cellular phone networks
Down
- The multiplexing of multiple data streams onto a single fiber-optic cable through the use of lasers emitting lights of varying wavelength
- The simplest type of routing protocols; used to determine the best route for data based on the distance to a destination
- A form of multiplexing that relies on multiple antennae transmitting and receiving in different locations so that signals are separated by some distance in space
- A multiplexing technique that gives each incoming source a turn to transmit, proceeding through the sources in round-robin fashion
- A technique commonly used to compress images
- A path or connection typically supporting one user
- The process of a network reconfiguring itself if a network failure is detected
- A compression technique in which a commonly occurring symbol in a data set is replaced with a simpler character and a count of how many times that symbol occurs
- A database stored in a router's memory that maintains information about the location of hosts and networks and the best paths for forwarding messages between them
- A link state routing protocol that uses a best-path algorithm
- A routing protocols that exhibits characteristics of both distance vector and link state routing protocols
- distance vector protocols that use hop count as their routing metric and only allow up to 15 hops
- Modern multiplexing technology technology that combines FDM and TDM techniques and takes advantage of mathematical manipulation of wavelengths to compress multiple signals within a smaller bandwidth
- The application of multiplexing in the support of many users at one time
- Techniques used to decrease the demand on limited WAN resources and increase the effective speed of data transmissions over WAN connections
- 3rd generation mobile phone service released in the early 2000s that supported up to 384 Kbps
- A form of time division multiplexing in which the multiplexor creates a data packet of only those devices that have something to transmit
- A multiplexing technique in which the sharing of a signal is accomplished by dividing the available transmissions on a medium among the medium's users
- A compression/encryption technique that allows a high quality audio sample to be reduced to a much smaller sized file
- A link state routing protocol that improves on some of the limitations of RIP and con coexist with RIP on a network
- An advanced distance vector routing protocol developed by Cisco that combines some of the features of a link state routing protocols and so is sometimes referred to as a hybrid protocol
39 Clues: Early cellular phone networks • A number indicating a protocol's reliability • A technique commonly used to compress images • A path or connection typically supporting one user • A link state routing protocol that uses a best-path algorithm • The application of multiplexing in the support of many users at one time • ...
Lesson 3 Conputer Vocabulary 2013-09-06
Across
- plug into electric outlets, and can protect against power strikes
- a command to test connectivity and isolate hardware problems and any mismatched configurations
- instructs the operating system on how to operating specific hardware
- a secure process for keeping confidential information private
- can cause computers to short circuit, resulting in the loss of data and damage to hardware
Down
- a procedure that places a priority on files that would be difficult or impossible to replace or reconstruct if they were lost
- a device that ranges from basic kits to ones more sophisticated models designed for desktop computers and networks
- are short, fast transfers of electrical voltage, current, or energy
- occurs when older systems are discarded and the data is not deleted
9 Clues: a secure process for keeping confidential information private • plug into electric outlets, and can protect against power strikes • are short, fast transfers of electrical voltage, current, or energy • occurs when older systems are discarded and the data is not deleted • instructs the operating system on how to operating specific hardware • ...
Wraparound Puzzle 2022-08-01
Across
- Wraparound identifies these to build on and enhance capabilities and skills
- Family and youth perspectives are intentionally elicited and prioritized during all phases of the wraparound process
- Encourages participation of team mebers drawn from networks of interpersonal community relationships
- Wraparound prcess demonstrates respect for and builds on the values preferences beliefs and identify of the child youth and their family
- Team members work cooperatively and share responsibility
- Despite challenges the team continues working towards the goals until the team reaches agreement that Wraparound process is no longer required
Down
- Observable and measurable indicators of succcess monitors progress
- team develops a customized set of strategies, supports and services based on this
- Least restrictive setting that promotes child and family intergration into home
9 Clues: Team members work cooperatively and share responsibility • Observable and measurable indicators of succcess monitors progress • Wraparound identifies these to build on and enhance capabilities and skills • Least restrictive setting that promotes child and family intergration into home • ...
CyberSecurity 2022-08-25
Across
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
- Detailed report, usually about a person
- rules for interacting politely online
- files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
- the practice of protecting systems, networks, and programs from digital attacks
- Someone who intentionally targets people for harm using online chat rooms or social media.
Down
- The ability to act in a safe and responsible way on the Internet and other connected environments.
- A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
- Information about you and what you do online
9 Clues: rules for interacting politely online • Detailed report, usually about a person • Information about you and what you do online • the practice of protecting systems, networks, and programs from digital attacks • Someone who intentionally targets people for harm using online chat rooms or social media. • ...
Internet Terminology - 2 2022-11-19
Across
- engine A computer program that searches documents
- An object, as text or graphics linked through hypertext to a document, another object
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions
Down
- Also called index page, main page the initial page of a website, usually containing an introduction
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
- A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons to prove their right to access, information, ect.
9 Clues: engine A computer program that searches documents • The rules of etiquette that apply when communicating over computer networks • A website that allows users to add, delete or revise content by using a web browser. • An object, as text or graphics linked through hypertext to a document, another object • ...
Commerce 2022-11-02
Across
- Pay back.
- Swapping or exchanging one good for another without using coins and notes.
- someone who creates and supplies goods or services
- It is a payment processing networks in the world.
- items that are usually tangible.
- Its actual value of goods.
- Amount of money that households have available for spending and saving after income taxes have been accounted for.
Down
- One that can be used many times
- The business of drawing people's attention to a good or service.
- Good pre-sales and after-sales service makes you feel you are valued customer.
- the standard of something as measured against other things of a similar kind
- What an individual gives up in order to satisfy a need or want
- The variety of items people want cannot be fulfilled because resources are limited.
- The buying and selling of goods and services between individuals and businesses.
- The amount of money that is expected to pay for something. Consumers want the best value for their money.
- The process of exploring, creating, and delivering value to meet the needs of customers.
- An online payment system that makes paying for things online and sending and receiving money safe and secure.
17 Clues: Pay back. • Its actual value of goods. • One that can be used many times • items that are usually tangible. • It is a payment processing networks in the world. • someone who creates and supplies goods or services • What an individual gives up in order to satisfy a need or want • The business of drawing people's attention to a good or service. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- An individual's physical characteristic.
- Rules and Regulatory measures to be followed.
- The secret asset of a user.
- A sequence of operations that ensure protection of data.
- A security technique that regulates who or what can view or use resources in a computing environment.
- Approval, permission, or empowerment for someone or something to do something.
- A node in a computer network, a key single point for data on its way to or from other networks.
- An account that is given a non-restrictive access to the system.
- Process of confirming the correctness of the claimed identity.
Down
- An unauthorized user able to access and misuse information.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Authentication Dictionary.
- A software program that keeps passwords in a secure digital location.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- Rules and Regulatory measures to be followed.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The secret asset of a user.
- An account that is given a non-restrictive access to the system.
- Authentication Dictionary.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- A security technique that regulates who or what can view or use resources in a computing environment.
Down
- An individual's physical characteristic.
- A node in a computer network, a key single point for data on its way to or from other networks.
- Process of confirming the correctness of the claimed identity.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- A sequence of operations that ensure protection of data.
- Approval, permission, or empowerment for someone or something to do something.
- A software program that keeps passwords in a secure digital location.
- An unauthorized user able to access and misuse information.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
Computer (Ch-1&Ch-2) 2024-06-02
Across
- abbreviation for Unified Payments Interface
- Booking a service
- When multiple mismatched copies of a file are stored on different computers it is called ____________
- Computer network restricted to an organisation
- Computer network that allows controlled access to an information source available on the internet
- It is a device that connect two different types of networks with each other. It also increases the speed of the network
- Duplication of data at multiple places
- Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection
Down
- Abbreviation for National Programme on Technology Enhanced Learning
- E-shopping app
- Website used for e-learning
- One of the most common job portals
- When two users have simultaneous conversation why are the internet, it is called ___________
- Certain sets of rules that determine how data should be transferred over network, compressed, presented on screen, and so on
- It works similar to a hub. However, it does not broadcast the message on the entire network
- Each computer in a network is called a _______
- It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc., are connected and communicated with each other
17 Clues: E-shopping app • Booking a service • Website used for e-learning • One of the most common job portals • Duplication of data at multiple places • abbreviation for Unified Payments Interface • Computer network restricted to an organisation • Each computer in a network is called a _______ • Abbreviation for National Programme on Technology Enhanced Learning • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The illegal trade and distribution of drugs is called drug ________
- Illegal networks that distribute drugs internationally
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- Excessive use of drugs can lead to ________, which can be fatal.
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Many drug users experience this mental condition, causing sadness and hopelessness.
- In the long term, drug use leads to ___________, making it hard to stop
Down
- The illegal act of transporting or selling drugs
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- A harmful mental effect caused by drug use, where users see things that aren't real
- Drug users often experience ________, a mental disorder involving intense fear
- The condition of relying on drugs and unable to function without them
- The misuse of substances that affect both physical and mental health
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- Drug users are often involved in illegal ________ acts to support their addictio
- Drug addiction often leads to losing this, impacting economic productivity.
- A fatal consequence of drug use, often from excessive consumption
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Secret to Learning English! 2013-09-02
Across
- a large computer network linking smaller computer networks worldwide
- the condition of desiring and wanting something
- an art of sound in time that expresses ideas and emotions in significant forms through the elements of rhythm, melody, harmony, and color.
- a motion picture; a film
- the habits, attitudes, tastes, moral standards, economic level, etc., that together constitute the mode of living of an individual or group.
- a small device that transits sounds and people speak to one over through
Down
- to involve deeply; absorb, to be completely surrounded by something
- showing much interest and high energy for something
- the broadcasting of a still or moving image via radiowaves to receivers that project a view of the image on a picture tube.
- a publication containing daily news and information
- the behaviors and beliefs characteristic of a particular social, ethnic, or age group
- a handwritten or printed work of fiction or nonfiction, usually on sheets of paper fastened or bound together within covers.
- a person attached to another by feelings of affection or trust
13 Clues: a motion picture; a film • the condition of desiring and wanting something • showing much interest and high energy for something • a publication containing daily news and information • a person attached to another by feelings of affection or trust • to involve deeply; absorb, to be completely surrounded by something • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Schneider Electric cloud-based file collaboration space to store and share company files.
- An employee must press this button, when he/she receives the suspicious mail.
- Mobile device application that secures users network connectivity and protect a device from malware.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- For Schneider Electric's technical support to complete customer service, contact _____.
- Specific agreement and setup that allow an employee to connect a personal device.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service, contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
What is the Internet? 2022-03-18
Across
- Funding a project by raising money from a large number of people via the Internet.
- Science that harnesses the problem solving capacity of hundreds or thousands of citizens on the Internet to solve complicated problems is called ______ science.
- Is this TRUE or FAKE: Less than 67% of the world uses the Internet.
- A group of interconnected computing devices capable of sending and receiving data is called a computer ______.
Down
- The Internet has made it much easier to do this.
- The global network of networks.
- Is this TRUE or FAKE: There are no negative consequences of the Internet.
- Personal computers volunteering processing time so that more calculations can be computed is called _______ computing.
- Agreed upon set of rules that standardize communication between machines.
9 Clues: The global network of networks. • The Internet has made it much easier to do this. • Is this TRUE or FAKE: Less than 67% of the world uses the Internet. • Is this TRUE or FAKE: There are no negative consequences of the Internet. • Agreed upon set of rules that standardize communication between machines. • ...
OCTH 224 Impact of Disability on Participation: Environmental Factors 2021-03-03
Across
- Method of delivering information, includes devices & tech
- Climate and weather conditions, geographic and topographic features of the environment
- Resources to live and participate in the community across environmental contexts. Includes recessions, cutbacks, systemic subsidy reallocation, changes in benefits
- Vehicular travel from one location to another via private and public modes
Down
- Architecture, land development, accessibility, noise, crowds, air quality. affects mobility, cognitive, social/communication, sensory accessibility features.
- Access to systems to support participation, health care, housing, community, education, employment, police, emergency response, etc.
- Specialized tools or modifications to facilitate participation in everyday activities
- Positive/negative attitudes, reactions, and treatments that are societally defined on disability. Includes inclusion, enfranchisement, empowerment.
- Physical assistance, material support, emotional support, networks, social capital. involves issues of companionship, trust, and relational strain
9 Clues: Method of delivering information, includes devices & tech • Vehicular travel from one location to another via private and public modes • Specialized tools or modifications to facilitate participation in everyday activities • Climate and weather conditions, geographic and topographic features of the environment • ...
NETWORKS 2016-09-07
Intermolecular Forces 2023-02-16
Across
- IMF that holds non-polar things together
- rings of water molecules surrounding ions
- when electrons are free to fly around from atom to atom
- combination of more than one type metal atom together
- forces between molecules in a "bead"
- when molecules evaporate and condense continually; it never stops
- type of alloy where atoms are placed between metal atoms
- other than carbon networks, this is the only other substance to exhibit covalent network bonding
- molecules that have h-bonding or dipole-dipole are this
- hydrogen bonds between massive molecules in the body give this
- graph that shows how temp and pressure are related to phase changes
- almost perfect crystal
- happens to an adjacent non-polar molecule when the electron cloud is uneven in another
- the energy required to vaporize 1 mole of stuff at 1 atm
- force that holds water molecules around an ion
- liquid above its boiling point (rare)
- a molecule that is separate; not actually part of other molecules
- forces between the molecules in the "bead" and the surface it is on
- non-polar things are this when they have lots of electrons
- change from liquid to gas below boiling point
- when vapor pressure equals atmospheric pressure
- resistance to flow
- when something evaporates very easily
- capillary action is stronger when tubes are of a _______ ______
Down
- when electrons are trapped between atoms
- sheets of carbon networks that slide easily on each other
- forces "in" molecules
- a misnomer; the way to describe how a water strider walks on water
- between an H that is attached to an N, O, or F, and a really electronegative atom on another molecule
- general force that hold polar things together
- IMF that hold metal atoms together
- take thousands of degrees to melt
- water moving up a tube because of IMFs
- have molecules at the lattice points
- type of crystal that is perfect
- have ions at the lattice points
- force that hold atoms together in quartz, glass or diamond
- describes the structure of a crystal
- hydrogen bonds make this molecules "zip" together
- thing we eat that has a super high viscosity
- type of substance that has nuclei swimming in a sea of elctrons
- liquid below its freezing point (rare)
- cute way of remembering h-bonding
- equally and oppositely opposed tetrahedral covalent bonds
- forces "between" molecules
- not crystalline solid; no real repeating structure
- liquids exhibit this when the forces between the moleculues are stronger than the forces between the molecules and the surface it is on
- the pressure a liquid puts on the atmosphere
- happens when you "catch" the electron cloud on a non-polar molecule to one side
- type of alloy where atoms are replaced by other atoms
- the surface a "bead" is on
- tubes in a tree that use capillary action to drink
52 Clues: resistance to flow • forces "in" molecules • almost perfect crystal • forces "between" molecules • the surface a "bead" is on • type of crystal that is perfect • have ions at the lattice points • take thousands of degrees to melt • cute way of remembering h-bonding • IMF that hold metal atoms together • forces between molecules in a "bead" • have molecules at the lattice points • ...
Laws of Cybercrime Crossword 2021-06-12
Across
- the process by which criminals attempt to conceal the illicit origin and ownership of the proceeds of their unlawful activities.
- Any illegal activity already in the criminal code committed by using a computer.
- The use of the computer to sabotage computer networks vital to national welfare.
- Area of the law which concerns computers and computer related crime.
- manufacture of false money for gain, a kind of forgery in
Down
- mailing or electronically transmitting something associated with fraud.
- A crime that involves using a computer to steal computer data stored in a digital format.
- A crime in which a cyber criminal falsely adopts the identity of another computer user in order to commit fraud.
- The communication via computer or other electronic device of false data that damages a person's reputation.
- Provides for criminal prosecution of individuals who engage in copyright infringement. electronic theft
- Protecting the rights of people's original creative
11 Clues: Protecting the rights of people's original creative • manufacture of false money for gain, a kind of forgery in • Area of the law which concerns computers and computer related crime. • mailing or electronically transmitting something associated with fraud. • Any illegal activity already in the criminal code committed by using a computer. • ...
Workplace Readiness Skills (Professional Skills) 2022-08-14
Across
- PlanS personal and professional goals related to education, career, finances, and health
- SAFETY Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
- Meets organizational expectations regarding work schedule, behavior, appearance, and communication
- and interprets workplace documents and writes effectively
- Locates information efficiently, evaluates the credibility and relevance of sources and facts
- TECHNOLOGY Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
- Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
Down
- Accepts constructive feedback well and is open to new ideas and ways of doing things
- Applies mathematical skills to complete tasks as necessary
- Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
- Plans, prioritizes, and adapts work goals to manage time and resources effectively
- SECURITY Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
12 Clues: and interprets workplace documents and writes effectively • Applies mathematical skills to complete tasks as necessary • Plans, prioritizes, and adapts work goals to manage time and resources effectively • Accepts constructive feedback well and is open to new ideas and ways of doing things • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for refences or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for refences or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
6th Grade Computers Vocabulary 5 2019-11-13
Across
- a copy of a file or directory on a separate storage device
- a string of characters beginning with a period and followed by one or more letters; the optional second part of a PC computer filename
- RAM memory that is set aside as a specialized buffer storage
- any computer that is hooked up to a computer network
- a set of related records kept together
Down
- adjusting the parts of a something in relation to each other
- a computer providing shared resources to a computer network
- a model or standard for making comparisons
- security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet
- the organization of data according to preset specifications
- (computer science) a computer that provides client stations with access to files and printers as shared resources to a computer network
11 Clues: a set of related records kept together • a model or standard for making comparisons • any computer that is hooked up to a computer network • a copy of a file or directory on a separate storage device • a computer providing shared resources to a computer network • the organization of data according to preset specifications • ...
Abooban 2023-03-12
Across
- the making of a judgement about the amount, number, or value of something
- a stock or supply of money, materials, staff, and other assets that can be drawn on by a person or organization in order to function effectively
- Ability to write without mistakes
- verb, when you are the main person in the group you tell them what to do
- facts provided or learned about something or someone
- the principal method of human communication, consisting of words used in a structured and conventional way and conveyed by speech, writing, or gesture
- the imparting or exchanging of information by speaking, writing, or using some other medium
Down
- Worldwide system of computer networks
- the earth, together with all of its countries and peoples
- an organized group of people with a particular purpose, such as a business or a government department
- he main means of mass communication (broadcasting, publishing, and the internet) regarded collectively
11 Clues: Ability to write without mistakes • Worldwide system of computer networks • facts provided or learned about something or someone • the earth, together with all of its countries and peoples • verb, when you are the main person in the group you tell them what to do • the making of a judgement about the amount, number, or value of something • ...
Science & Technology After WW2 2013-05-14
Across
- What kind of phone cables were laid in 1956?
- Scientist who introduced the polio vaccine in 1955.
- How many major broadcasting networks where operationg during the mid-50s?
- In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
- In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
- The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
Down
- The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
- Perfected a polio vaccine that could be administrated by mouth.
- What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
- What pace were the improvements in television technology?
- In 1951, what transcontinental dialing services were first begun?
11 Clues: What kind of phone cables were laid in 1956? • Scientist who introduced the polio vaccine in 1955. • What pace were the improvements in television technology? • Perfected a polio vaccine that could be administrated by mouth. • In 1951, what transcontinental dialing services were first begun? • ...
Science & Technology After WW2 2013-05-14
Across
- Scientist who introduced the polio vaccine in 1955.
- What pace were the improvements in television technology?
- The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
Down
- The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
- In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
- In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
- What kind of phone cables were laid in 1956?
- In 1951, what transcontinental dialing services were first begun?
- How many major broadcasting networks where operationg during the mid-50s?
- What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
- Perfected a polio vaccine that could be administrated by mouth.
11 Clues: What kind of phone cables were laid in 1956? • Scientist who introduced the polio vaccine in 1955. • What pace were the improvements in television technology? • Perfected a polio vaccine that could be administrated by mouth. • In 1951, what transcontinental dialing services were first begun? • ...
E-Commerce 2015-03-12
Across
- /knowledge communicated or received concerning a particular fact or circumstance; news
- /abbreviation: WWW.
- /a business model that facilitates an environment where customers can trade with each other.
- /a business model in which consumers (individuals) create value and businesses consume that value
- /when a business or organisation entity provides products or services to individual customers
- /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
- /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
- /a vast computer network linking smaller computer networks worldwide
Down
- /when business entities or organisations participate with other businesses or organisations to do e-commerce
- /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
- /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
11 Clues: /abbreviation: WWW. • /a vast computer network linking smaller computer networks worldwide • /knowledge communicated or received concerning a particular fact or circumstance; news • /when a business or organisation entity provides products or services to individual customers • ...
Compliance Crossword 2023 2023-10-25
Across
- Moral principles and values that guide a person.
- When there is a breach of PHI, it is important to notify Compliance .
- HDS employees must all suspected or observed improper practices, violations of policies and laws.
- The act of intimidating or engaging in behavior against someone for a good faith report of noncompliance or participating in an investigation.
- All PHI is to be kept .
Down
- The set of measures to ensure that networks, systems, & data breaches are avoided.
- Set of standards or rules that guide business behavior in a positive direction. Code of
- When HDS contracts services or functions to another entity which involves PHI, a or business associate agreement is needed.
- An authorized person viewing protected health information is an example of a reportable incident.
- A method of securing access to PHI on your computer, is to it when away from your computer.
- All employees will receive upon hire and annually thereafter.
11 Clues: All PHI is to be kept . • Moral principles and values that guide a person. • All employees will receive upon hire and annually thereafter. • When there is a breach of PHI, it is important to notify Compliance . • The set of measures to ensure that networks, systems, & data breaches are avoided. • ...
Station 5 2024-05-24
Across
- When acids are added to water, they form positively charged ________ ions
- Forces on materials can cause them to __________ or extend (get longer)
- is a method of exchanging messages and files over the internet
- Liquids and solutions that are able to conduct electricity are called __________
- _______ is a very large global network that consists of many other interconnected networks
Down
- The products of photosynthesis are glucose and ______
- One of the input devices that allow users to enter data or instructions into a computer system
- A thread like structure made of DNA and protein by which hereditary information is passed to next generation.
- is an atom, or atoms, of the same element that have an equal number of protons but a different number of neutrons
- The distance from the undisturbed position to the peak (crest) or trough of a wave
- _______ is a wireless communication technology that allows devices to be connected within a maximum range of about 30 meters
11 Clues: The products of photosynthesis are glucose and ______ • is a method of exchanging messages and files over the internet • Forces on materials can cause them to __________ or extend (get longer) • When acids are added to water, they form positively charged ________ ions • Liquids and solutions that are able to conduct electricity are called __________ • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Hosts that provide information
- Private networks in use by just one company
- Web pages that groups of people can edit and view together
- limits the impact of a failure, so that the fewest number of devices are affected.
- Applications can be accessed over the Internet through a subscription.
- identify the physical location of intermediary devices and cable installation.
- yes
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Identify devices, ports, and addressing scheme.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a large geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- Real-time communication between two or more people
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Interactive websites where people create and share user-generated content with friends and family
Down
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Hosts that request information
- allows people to share files with each other without having to store and download them from a central server
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a small geographical area
- Having multiple paths to a destination
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Examples include routers, switches and wireless access points
41 Clues: yes • diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cyber Security CrossWord Puzzel 2021-03-02
Across
- Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
- _______________ is any crime perpetrated using computers and networks.
- A__________ monitored a network, blocking dangerous content such as viruses.
- _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
- Viruses, trojans and worms are examples of __________________________.
- An ethical hacker.
- Your favorite teacher.
- A statement of an intention to inflict harm or damage .
Down
- Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- Your favorite class.
- __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
- The exposure to the possibility of the attacked or harmed.
- Actual action that causes harm or damage.
- A blend between an ethical hacker and a cracker.
- __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- An action taken to counteract the threat.
- ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.
17 Clues: An ethical hacker. • Your favorite class. • Your favorite teacher. • Actual action that causes harm or damage. • An action taken to counteract the threat. • A blend between an ethical hacker and a cracker. • A statement of an intention to inflict harm or damage . • The exposure to the possibility of the attacked or harmed. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A security technique that regulates who or what can view or use resources in a computing environment.
- Approval, permission, or empowerment for someone or something to do something.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- Authentication Dictionary.
- A software program that keeps passwords in a secure digital location.
- The secret asset of a user.
Down
- A malicious activity caused to an organization that comes from within the organization.
- Rules and Regulatory measures to be followed.
- An individual's physical characteristic.
- An account that is given a non-restrictive access to the system.
- Process of confirming the correctness of the claimed identity.
- A node in a computer network, a key single point for data on its way to or from other networks.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- A sequence of operations that ensure protection of data.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- An unauthorized user able to access and misuse information.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- Rules and Regulatory measures to be followed.
- The secret asset of a user.
- Authentication Dictionary.
- An account that is given a non-restrictive access to the system.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
- A sequence of operations that ensure protection of data.
- An unauthorized user able to access and misuse information.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- Approval, permission, or empowerment for someone or something to do something.
- Process of confirming the correctness of the claimed identity.
- A node in a computer network, a key single point for data on its way to or from other networks.
- A security technique that regulates who or what can view or use resources in a computing environment.
- A software program that keeps passwords in a secure digital location.
- An individual's physical characteristic.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
CLucas - Network Devices 2023-01-03
Across
- This kind of router includes a switch and a wireless AP.
- IPS does not allow _____ to enter the target system without first being analyzed.
- ______ provides higher dedicated bandwidth to each divide on the network.
- A cloud-based network controller is a device in the cloud that allows _____ administrators to manage network devices.
- What are repeaters also known as?
- These are an all-in-one security device.
- This is the process of physically isolating legacy systems from other networks and particularly the internet. (2 words)
Down
- An endpoint management server can restrict an end device’s ______ to the network.
- Does IDS work offline or online?
- How many types of NIC cards are there?
- Firewalls protect data and equipment on a network from _______ access.
- What kind of power do PoE's transfer?
- A patch _____ is commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility.
- What do bridges divide LANs into?
- These are embedded and used to program to perform specific actions.
- This kind of switch allows administrators to add security and additional features.
- Wireless APs use these to communicate with Wireless NICs. (2 words)
17 Clues: Does IDS work offline or online? • What do bridges divide LANs into? • What are repeaters also known as? • What kind of power do PoE's transfer? • How many types of NIC cards are there? • These are an all-in-one security device. • This kind of router includes a switch and a wireless AP. • These are embedded and used to program to perform specific actions. • ...
Media and Technology: Unit 1 & Unit 2 Vocabulary 2023-03-02
Across
- The information computers get from users, devices, or other computers
- Special skill or knowledge about a particular thing
- The reason that someone does something; intention
- The main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- Using media in a way that feels healthy and in balance with other life activities (family, friends, school, hobbies, etc.)
- Someone or something that provides information
- A machine that works with information
- Content (text, audio, images, video) or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
- When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
- Word or concept of great significance
- Behaviors we do often or regularly with digital media and devices
- Believable
- An attempt to trick someone online, usually with the intention of stealing money or private information
- The way we apply scientific knowledge for practical purposes.
- Deciding what to include and what to keep out in digital media
- The thinking work computers do to turn input into output
- The information computers give to users, devices, or other computers
17 Clues: Believable • Word or concept of great significance • A machine that works with information • Someone or something that provides information • The reason that someone does something; intention • Special skill or knowledge about a particular thing • The thinking work computers do to turn input into output • The way we apply scientific knowledge for practical purposes. • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Vocabulary 4 2012-09-18
Across
- The main international standards organization for the world wide web
- strands of optically pure glass
Down
- a program accessible on the web which has a catalog of scanned websites in a large data base
- protocol devised and implemented to help researchers share information across a diverse computer network
- directs packets between separate local area networks by reading each packet header and directing it into the fastest direction
- the address of a document or other resource available on the inernet
6 Clues: strands of optically pure glass • The main international standards organization for the world wide web • the address of a document or other resource available on the inernet • a program accessible on the web which has a catalog of scanned websites in a large data base • ...
3D AJ 2021-04-29
Across
- local area network
- Is a networking device that forwards data packets between computer networks
- consists of multiple devices that communicate with one another
Down
- device, such as a wireless router, that allows wireless devices to connect to a network.
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- the service of providing the computer equipment and software for a website on the internet and making it available for people to see
6 Clues: local area network • consists of multiple devices that communicate with one another • Is a networking device that forwards data packets between computer networks • device, such as a wireless router, that allows wireless devices to connect to a network. • ...
Showtime 2019-03-22
Across
- Showtime has this many commercial free channels (Write out the number).
- This series stars NY 'Fixer' Liev Schreiber.
- This hit comedy series stars Frankie Shaw as a single mom struggling in Boston to make ends meet.
- What series airs on Sundays at 9PM.
- This movie premieres April 20th.
- This is Showtime's first Late-Night Talk Show.
- This hit showtime series stars Claire Danes as a CIA operative.
- This iconic Hip-Hop group has a docu-series premiering in May.
- This movie premieres on April 6th.
Down
- This Showtime series stars Jim Carrey in his first lead TV role in over 20 years.
- This Showtime Sports documentary is based on what NBA All-Star?
- This 4-part Sports Doc is based on professional sports gambling.
- Watch 1000s of hours of Showtime content through your set top box via what feature?
- What Showtime App allows 2 Live Feeds and Download Capabilities?
- This series takes place on the day of the worst stock market crash in U.S. History.
- What Original Series premieres April 7th?
- This series is the #1 Comedy on a premium network.
- How much is the Showtime Cash Back Offer? (Write out the number).
- How many additional networks are included in a Showtime Subscription? (Write out the number).
19 Clues: This movie premieres April 20th. • This movie premieres on April 6th. • What series airs on Sundays at 9PM. • What Original Series premieres April 7th? • This series stars NY 'Fixer' Liev Schreiber. • This is Showtime's first Late-Night Talk Show. • This series is the #1 Comedy on a premium network. • This iconic Hip-Hop group has a docu-series premiering in May. • ...
Computer Components 2021-10-06
Across
- disruptive online messages.
- local area network, gives network to buildings.
- it controls the flow of the data from one computer to another.
- a website developed by many people and it allows you to add and edit content.
- stands for solid-state drive, a storage device that contains semiconductor chips.
- the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work.
- one of the most main parts of a computer system.
- WAN stands for wide area network, a telecommunication network that stretches over a large geographic area.
- use reasonable use of copyrighted material.
- a set of rules made to protect integrity.
Down
- it stands for random-access memory, it’s where data is stored.
- to take/copy someone’s work and not give them credit.
- pertaining to, or situated in.
- a part of an electric system or part of a mechanical system.
- stands for hard disk drive, a storage device that contains one or more spinning magnetic hard disks.
- the rules of kindness that apply when communicating over computer networks.
- gain information without the permission from the person you are hacking.
- Drive a very small, solid-state hard drive that can be plugged into a USB port.
- universal serial bus, to connect peripheral devices to a computer.
19 Clues: disruptive online messages. • pertaining to, or situated in. • a set of rules made to protect integrity. • use reasonable use of copyrighted material. • local area network, gives network to buildings. • one of the most main parts of a computer system. • to take/copy someone’s work and not give them credit. • a part of an electric system or part of a mechanical system. • ...
Technology vocabulary 2021-03-16
Across
- transfer out of a database or document
- something reduced in volume to its full volume
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- decompress
- the exclusive right to sell a work
- a facial expression represented by a sequence of characters
- a worldwide network of computer networks
- transfer a file or program to a smaller computer
- put into a format that can be read or processed by computers
Down
- set up for a particular purpose
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- the activity of converting data or information into code
- crime committed using a computer and the internet
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- a listing of the computer files stored in memory
- an organized body of related information
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- locate and correct errors in a computer program
- the symbolic arrangement of data in a computer program
21 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • transfer out of a database or document • an organized body of related information • a worldwide network of computer networks • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
NATURAL NAVIGATION 2024-02-25
Across
- Covered with clouds; lacking clear skies.
- The star at the center of our solar system that provides light and heat to Earth.
- A visual representation of an area, typically showing geographical features, roads, and other landmarks.
- Parallel to the horizon; flat or level.
- Half of the Earth, usually divided into Northern and Southern Hemispheres or Eastern and Western Hemispheres.
- after To take care of or watch over someone or something.
- To recognize the value or significance of something; to be grateful for.
- for: To look for something by making an effort to find it.
Down
- The natural satellite of Earth that orbits around it.
- A course along which someone or something moves or points.
- Having balanced proportions; exhibiting symmetry.
- Divisions or offshoots of a tree or plant.
- Used to emphasize a statement or confirm its truth.
- Confused or lost in terms of direction or understanding.
- Networks of threads spun by spiders and other insects to catch prey.
- The region of the atmosphere above the Earth; where the sun, moon, stars, and clouds are seen.
- Those from whom a person is descended, typically one's parents or grandparents.
- Having a moderate degree of heat; opposite of cold.
- To set up or create something, typically an organization, system, or set of rules.
19 Clues: Parallel to the horizon; flat or level. • Covered with clouds; lacking clear skies. • Divisions or offshoots of a tree or plant. • Having balanced proportions; exhibiting symmetry. • Used to emphasize a statement or confirm its truth. • Having a moderate degree of heat; opposite of cold. • The natural satellite of Earth that orbits around it. • ...
Carrington Event 2025-02-07
Across
- A powerful burst of solar plasma and magnetic field from the Sun.
- The protective magnetic field around Earth that helps shield us from solar storms.
- A sudden explosion of energElectromagnetic radiationoften associated with CMEs.
- The ability to recover from a disaster like a major solar storm.
- Devices in space that could be damaged by a strong CME.
- A disturbance in Earth’s magnetic field caused by solar activity.
- Steps taken to protect against future CMEs.
- Energy released from the Sun in the form of light and waves.
- The environmental conditions in space that can affect technology on Earth.
- A loss of electricity over a large area.
- The systems (power lines, roads, communication networks) that support society.
Down
- The modern electrical system that could fail in a future solar storm.
- A navigation system that could stop working if ais solar storm disrupts satellites.
- Used for emergency services and aviation, which could be affected by solar activity.
- A massive solar storm that occurred in 1859, causing global telegraph failures.
- Natural light displays in the sky caused by solar particles interacting with Earth’s atmosphere.
- The main communication network in 1859, which the Carrington Event disrupted.
- A disturbance on the Sun that can send energy and particles toward Earth.
- on Society
19 Clues: on Society • A loss of electricity over a large area. • Steps taken to protect against future CMEs. • Devices in space that could be damaged by a strong CME. • Energy released from the Sun in the form of light and waves. • The ability to recover from a disaster like a major solar storm. • A powerful burst of solar plasma and magnetic field from the Sun. • ...
Media Tech Crossword 2022-04-13
Across
- a platform that allows you to create servers and talk to people from around the world. It’s great for gamers!
- a scam made to trick you into revealing your personal info.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- A service that encrypts your data and makes you less vulnerable to tracking
- a set of data that describes and gives information about other data.
- a matching game set in a magical kingdom your parents probably play.
- a platform that allows you to post videos and comment on others videos
Down
- the footprint a person leaves online after posting something.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
9 Clues: a scam made to trick you into revealing your personal info. • the footprint a person leaves online after posting something. • a set of data that describes and gives information about other data. • a matching game set in a magical kingdom your parents probably play. • a platform that allows you to post videos and comment on others videos • ...
Internet Terminology 2022-11-19
Across
- A secret word or expression used by authorized persons
- An object, as text or graphics linked through hypertext to a document, another object.
- A website that allows users to add, delete or revise content by using a web browser.
- Also called index page, main page the initial page of a website
- engine A computer program that searches documents, especially on the world wide web
Down
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
- a protocol for specifying addresses on the internet
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions,
9 Clues: a protocol for specifying addresses on the internet • A secret word or expression used by authorized persons • Also called index page, main page the initial page of a website • The rules of etiquette that apply when communicating over computer networks • engine A computer program that searches documents, especially on the world wide web • ...
Cyber Crossword 2021-04-26
Across
- media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
- Electronic device most students own at home and is square and mostly portable.
- the use of technology to harass, threaten, embarrass, or target another person.
Down
- A result or effect, typically one that is unwelcome or unpleasant.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- A repetitive action toward another human purposely causing harm or intimidation.
- safety, The act of protecting ones self or others from harm or intimidation online.
- An individual who causes harm or stress to another human intentionally and repetitively.
- Having firm belief or reliability in someone.
9 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • A repetitive action toward another human purposely causing harm or intimidation. • ...
Social Customer Service 2019-05-21
Across
- A type of automated artificial intelligence tool used to converse with users
- A prediction of the net profit attributed to the entire future relationship with a customer
- An app that enables users to message each other instantaneously – usually on a smartphone
Down
- Tracking conversations online for mentions of your product, brand, or competitors
- A social media user with a large audience who can drive awareness about a topic, product, or service
- The interaction between people and brands on social networks.
- A social media user who makes offensive or annoying postings which provoke other users
- Someone who talks favorably about a brand or product, and passes on positive word-of-mouth to other people.
- The potential audience that a message can reach
9 Clues: The potential audience that a message can reach • The interaction between people and brands on social networks. • A type of automated artificial intelligence tool used to converse with users • Tracking conversations online for mentions of your product, brand, or competitors • ...
Finance Cross 2023-11-23
Across
- Open banking technology aims to create new routes between customers' bank accounts and these.
- Former Nationwide chief executive who led the review.
- The review calls for the payment sector to use this technology for creating new routes.
- The country that should develop strategies to challenge card network dominance.
- Digital wallets, including Google Pay and Apple Pay, account for this percentage of UK retail payments.
Down
- A service at risk of falling behind and needing an alternative.
- A widely used service in the UK, taking 70-80 seconds on average.
- The time alternative methods in Brazil, India, and Sweden take to process a transaction.
- Visa and Mastercard together accounted for this percentage of all debit and credit card payments in the UK in 2021.
- Card networks facing a probe into cross-border interchange fees.
10 Clues: Former Nationwide chief executive who led the review. • A service at risk of falling behind and needing an alternative. • Card networks facing a probe into cross-border interchange fees. • A widely used service in the UK, taking 70-80 seconds on average. • The country that should develop strategies to challenge card network dominance. • ...
IS-95 CHANNELS 2023-09-25
Across
- How does Power Control in IS-95 help improve system capacity?
- Which channel is used for initial access and call setup procedures in IS-95?
- What channel is used by the mobile device to send data and voice to the base station in IS-95?
- What is the typical unit of measurement for power control adjustments in IS-95?
Down
- What is the primary purpose of the Reverse Traffic Channel in IS-95?
- Why is power control important in IS-95 CDMA networks?
- What type of power control is used in IS-95 to maintain signal quality?
- What is the primary purpose of the Forward Traffic Channel in IS-95?
- Which channel notifies the mobile device to adjust its power level in IS-95?
- What key function does Power Control serve in IS-95 CDMA?
- In IS-95, which channel carries voice and data from the base station to the mobile device?
11 Clues: Why is power control important in IS-95 CDMA networks? • What key function does Power Control serve in IS-95 CDMA? • How does Power Control in IS-95 help improve system capacity? • What is the primary purpose of the Reverse Traffic Channel in IS-95? • What is the primary purpose of the Forward Traffic Channel in IS-95? • ...
Unit 32 How networks can be attacked 2013-11-28
Across
- Is a type of malicious software that is activated each time your system boots up
- Know as malicious software
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- of service It attempts to make a user or organisation lose its services
- Also known for advertising supported software
- force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
Down
- Usually these are statistical analyses that attempt to discover keys
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
- Is a software that gathers information about a person or organisation without their knowledge
- door Is a method where any virus such Trojan, Malware can get through all security procedures
11 Clues: Know as malicious software • Also known for advertising supported software • Usually these are statistical analyses that attempt to discover keys • of service It attempts to make a user or organisation lose its services • Is a type of malicious software that is activated each time your system boots up • ...
Cyberpesten 2013-12-18
Across
- Cyberpesten is pesten. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
- uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
- Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
- Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
- Opslagplaats voor wapens
Down
- Naamloos, ongenoemd, wie of wat je niet kent.
- Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
- Zoals Facebook, Twitter, Netlog, Google+, MySpace.
- Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
- Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
- Developmental Issues in Cyberbullying amongst Adolescents.
11 Clues: Opslagplaats voor wapens • Naamloos, ongenoemd, wie of wat je niet kent. • Zoals Facebook, Twitter, Netlog, Google+, MySpace. • Developmental Issues in Cyberbullying amongst Adolescents. • Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven. • Vaardigheden die te maken hebben met wat je wel en niet kan doen online. • ...
Cyberpesten 2013-12-18
Across
- Naamloos, ongenoemd, wie of wat je niet kent.
- Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
- Opslagplaats voor wapens
- Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
- Zoals Facebook, Twitter, Netlog, Google+, MySpace.
- Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
Down
- uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
- Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
- Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
- Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
- Developmental Issues in Cyberbullying amongst Adolescents.
11 Clues: Opslagplaats voor wapens • Naamloos, ongenoemd, wie of wat je niet kent. • Zoals Facebook, Twitter, Netlog, Google+, MySpace. • Developmental Issues in Cyberbullying amongst Adolescents. • Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven. • Vaardigheden die te maken hebben met wat je wel en niet kan doen online. • ...
Quinlan K. 2015-04-30
Across
- To renew or revitalize; To reload a webpage on the internet
- a list of citations that appear at the end of a paper, article, chapter or book.
- A system of connected computers that allows the sharing of files and equipment
- TABS The name for a way to display information on websites
Down
- An unauthorized person who secretly gains access to computer files
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text
- TABS The name for a way to display information on websites
- the unauthorized use, reproduction, distribution, or transmission of copyrighted
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- Software program that is designed to damage files on a computer that receives it.
- A collaborative website which can be directly edited by anyone with access to it
- Originally known as Web Log.
12 Clues: Originally known as Web Log. • TABS The name for a way to display information on websites • TABS The name for a way to display information on websites • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • A system of connected computers that allows the sharing of files and equipment • ...
Functions & Characteristics of Money 2017-11-28
Across
- Since we use money on a daily basis, it should be _______ and easy to use.
- To avoid mistakes during monetary transactions, money should have this characteristic.
- A function of money that allows value to b
- Money should be __________________ (3 words)to deter to ability to create counterfeit bills.
- A function of money that allows comparisons of the value of various goods and services; also called standard unit of account.
- The main function of money, allowing the exchange of goods and services.
Down
- Another term for measure of value.
- The ease with which an asset can be used to make
- This characteristic of money allows for facilitation of both small and large purchases.
- Money in electronic networks, or cash cards that can be used by consumers.
- As money is passed from hand to hand countless times and is stored in wallets and purses and used in vending machines it needs to be ________________.
11 Clues: Another term for measure of value. • A function of money that allows value to b • The ease with which an asset can be used to make • The main function of money, allowing the exchange of goods and services. • Since we use money on a daily basis, it should be _______ and easy to use. • Money in electronic networks, or cash cards that can be used by consumers. • ...
STEM 2023-01-19
Across
- use the principles of engineering, soil science, biology, and chemistry to develop solutions to environmental problems.
- studies the solid, liquid, and gaseous matter that constitutes Earth and other terrestrial planets, as well as the processes that shape them
- a person who works with theoretical or applied statistics
- Plan and conduct complex projects in basic and applied research.
Down
- research, design, develop, build, and test mechanical and thermal sensors and devices, including tools, engines, and machines.
- helps businesses make critical financial decisions by collecting, tracking, and correcting the company's finances.
- create the computer applications that allow users to do specific tasks and the underlying systems that run the devices or control networks
- responsible for analyzing financial statements and predicting the future performance of the company.
- application of principles and design concepts to medicine and biology for healthcare purposes.
- an expert in or student of mathematics.
- Conduct scientific studies of behavior and brain function
11 Clues: an expert in or student of mathematics. • Conduct scientific studies of behavior and brain function • a person who works with theoretical or applied statistics • Plan and conduct complex projects in basic and applied research. • application of principles and design concepts to medicine and biology for healthcare purposes. • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for reference or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for reference or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
ICT crosswords Aurelia 2023-03-28
Across
- sharing Two or more employees doing the same job but working at different times is called
- work time When a person is employed to work fewer hours than the normal working week, this is called
- type of virus that can record the activities of the user, such as password, and transmit this information to the person who wrote the malware
- computer software with malicious intent
- learning new skills outside of the worker's existing skillset
- The act of compromising digital devices and networks by gaining unauthorized access to an account or computer system
Down
- The safe and responsible use of technology
- work When employees work the full normal hours in a week but work at times which
- work When an employee works the full normal hours in a week but works fewer days, this is called
- Loss of skills that an employee or group of employees once had
- them and the employer, this is called
11 Clues: them and the employer, this is called • computer software with malicious intent • The safe and responsible use of technology • learning new skills outside of the worker's existing skillset • Loss of skills that an employee or group of employees once had • work When employees work the full normal hours in a week but work at times which • ...
Cyber Intelligence (Medium) 2023-06-01
Across
- The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
- An individual or group that carries out cyber attacks for political or ideological reasons.
- A technique used to gather intelligence by infiltrating target networks or systems.
- A technique used to gather intelligence by monitoring and analyzing public sources of information.
- A covert technique used to gain unauthorized access to a computer system.
- A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
- The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
- The process of identifying and mapping potential vulnerabilities in a system or network.
- a centralized team responsible for monitoring and responding to security incidents.
- A software program that disguises itself as a legitimate program but performs malicious activities.
- The proactive search for indicators of compromise and potential threats within a network or system.
11 Clues: A covert technique used to gain unauthorized access to a computer system. • a centralized team responsible for monitoring and responding to security incidents. • A technique used to gather intelligence by infiltrating target networks or systems. • The process of identifying and mapping potential vulnerabilities in a system or network. • ...
Artificial Intelligence Crossword 2024-02-17
Across
- The person who coined the term Artificial Intelligence
- A many valued logic in which truth values of variable may be any real number between 0 and 1
- A logic programming language associated with AI and computational linguistics made in 1972
- A machine that defeated world chess champion Garry Kasparov
- The branch of AI that deals with the interaction between computers and human language enabling computers to understand, interpret and generate human language
- A subset of machine learning that consists of three or more layers of neural network
Down
- ------ Network is a computational model inspired by the structure and function of human brain
- An AI chatboat that uses natural language processing to create human like conversational dialogue
- Test used to determine whether or not a computer can think intelligently like humans
- The company that owns Chat GPT
- Neural networks require large amount of ------- to make accurate decisions
11 Clues: The company that owns Chat GPT • The person who coined the term Artificial Intelligence • A machine that defeated world chess champion Garry Kasparov • Neural networks require large amount of ------- to make accurate decisions • Test used to determine whether or not a computer can think intelligently like humans • ...
Chapter Vocabulary Review Extension 2023-12-04
Across
- waste produced from nuclear fission or in a nuclear reactor
- the energy that holds protons toghether & neutrons alike in the nucleus of an atom.
- a type of mining in which layers of surface soil & rock are removed from large areas to expose a resources.
- an energy surce that CAN'T be replentished ina short time.
- a kind of mining pollutionthay results from rainwater entering caves with iron sulfide & draining out
- a rock containing hydrocarbons.
- reeducing eergy use to prolong the time it takes for us to run out of fossil fuels.
Down
- a type of mining which involves digging deep shafts and networks of horizonta tunnels are made, either by blasting or mining to find resurces.
- an ice-like solid that consists of molecules of methane within a crystal network of molecules.
- an energy source that's repeatedly avaliable is self-replentishing, or can be replaced in a relatively short time
- a liquid fossil fuel(contains hydrocarbns)
11 Clues: a rock containing hydrocarbons. • a liquid fossil fuel(contains hydrocarbns) • an energy surce that CAN'T be replentished ina short time. • waste produced from nuclear fission or in a nuclear reactor • the energy that holds protons toghether & neutrons alike in the nucleus of an atom. • ...
AV Lesson 5 2024-03-10
Across
- The act of compelling observance of or compliance with a law or rule.
- Existing or occurring in a digital environment, often simulated or computer-generated.
- Designed to be easily understood and operated by ordinary people.
- A penalty or coercive measure imposed to ensure compliance with a law or rule.
- To bring legal action against someone, typically in a court of law.
Down
- To introduce new methods or ideas, especially to promote change or improvement.
- To make a process or system operate automatically, reducing the need for human intervention.
- The practice of protecting computer systems, networks, and programs from digital attacks.
- The status of being a member of a particular country and having the rights and duties associated with it.
- Transmitting signals without the need for physical connection, typically using radio waves.
- To officially require or authorize something, often by law or command.
11 Clues: Designed to be easily understood and operated by ordinary people. • To bring legal action against someone, typically in a court of law. • The act of compelling observance of or compliance with a law or rule. • To officially require or authorize something, often by law or command. • A penalty or coercive measure imposed to ensure compliance with a law or rule. • ...
Networking protocols Kennert, Mattias 2020-10-14
Across
- protocol specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network.
- Protocol the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
- is the process of "stealing" bits from the HOST part of an IP address in order to divide the larger network into smaller sub-networks called subnets.
- is the process of selecting a path for traffic in a network or between or across multiple networks.
- The highest OS Protocol layer.
Down
- is a logical subdivision of an IP network.
- is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
- characteristics or information, usually numerical, that are collected through observation.
- In software engineering, ... is the process of adapting software for the purpose of achieving some form of execution in a computing environment
- is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- In networking, a ... is a standardized set of rules for formatting and processing data.
- The lowes OS Protocol layer.
- an Hyprid protocol
13 Clues: an Hyprid protocol • The lowes OS Protocol layer. • The highest OS Protocol layer. • is a logical subdivision of an IP network. • In networking, a ... is a standardized set of rules for formatting and processing data. • characteristics or information, usually numerical, that are collected through observation. • ...
Tech Terms 2022-04-13
Across
- the information about a person that is on the internet from their online activity.
- Using encryption to provide secure access to a remote computer over the internet.
- sending emails disguised to look from companies to make people reveal personal information, like passwords
- a set of data that describes and gives information about other data.
- something baiting you into clicking on it, used to make money from each click
- a social media app/website where you post and watch 15-second videos and infinitely scroll
Down
- websites and applications that enable users to create and share content or to participate in social networking.
- a global computer network providing lots of information and communication ways, made of interconnected networks
- a network made up of social interactions and personal relationships.
- software that is made to disrupt, damage, or gain unauthorized access to a computer system.
- a micro-blogging social media site to share news and other things
11 Clues: a micro-blogging social media site to share news and other things • a network made up of social interactions and personal relationships. • a set of data that describes and gives information about other data. • something baiting you into clicking on it, used to make money from each click • ...
FUN DAY-ESC TRIVIA 2018-01-05
Across
- 3.Charter Partnered with___________ Channel to connect veterans with their communities.
- 8.Philo Farnsworth battled with ________, Zworykin to be called the "father of television."
- 6.The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
- 1.One of our key necessities is expanding access to ___________. This is a necessity to compete.
- 2.How many business units do we service?
- 10.Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
Down
- 7.The Second Largest Cable Provider in the U.S.
- Benefits 11. Which team handles repayment agreements for medical deductions
- 4.If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
- 9.Charter, Time Warner Cable and _________ house networks combined in 2016.
- 5.If I am out on workman’s compensation, my updates are completed by the _________ team.
11 Clues: 2.How many business units do we service? • 7.The Second Largest Cable Provider in the U.S. • Benefits 11. Which team handles repayment agreements for medical deductions • 9.Charter, Time Warner Cable and _________ house networks combined in 2016. • 3.Charter Partnered with___________ Channel to connect veterans with their communities. • ...
Australian Deportation Laws 2018-11-13
Across
- a relationship in which a person or thing is linked or associated with something else.
- an arrangement of intersecting horizontal and vertical lines. Or interact with others to exchange information and develop professional or social contacts.
- person or thing regarded as perfect. Or a standard or principle to be aimed at.
- of or involving the agreement or cooperation of two political parties that usually oppose each other's policies.
Down
- the state of being famous or well known for some bad quality or deed.
- concerned with or seeking to promote human welfare.
- acting or done in the same way over time, especially so as to be fair or accurate.
- the expression of disapproval of someone or something on the basis of perceived faults or mistakes.
- done or existing alone.
- the mental and moral qualities distinctive to an individual.
- showing or motivated by susceptibility to bribery; corrupt.
11 Clues: done or existing alone. • concerned with or seeking to promote human welfare. • showing or motivated by susceptibility to bribery; corrupt. • the mental and moral qualities distinctive to an individual. • the state of being famous or well known for some bad quality or deed. • person or thing regarded as perfect. Or a standard or principle to be aimed at. • ...
Psychological Distress 2015-11-09
Across
- Name of the theorist
- Another determining factor for how you may deal with stress, this has to do with the people and networks around you
- A determining factor of how you deal with stress, has to do with how well you are able to respond to stress
- According to the Psychological Distress theory, distress helps lead to this
- Pearlin says that life is less of this, and more of a continuous journey
- Distress is a _____ that requires a psychological response
Down
- Theory suggests life is a _____ course of change
- Individual _______________ are some of the determining factors in how you respond to stress/distress, examples include race, gender, age, etc.
- Different ____s of stress will determine its impact
- If stress happens all at once or over a period of ____, the impact would be different
- An individual develops in order to respond to this
11 Clues: Name of the theorist • Theory suggests life is a _____ course of change • An individual develops in order to respond to this • Different ____s of stress will determine its impact • Distress is a _____ that requires a psychological response • Pearlin says that life is less of this, and more of a continuous journey • ...
cyberbullying 2023-10-23
Across
- type of Cyberbullying involves spreading false statements about people
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- a feeling of worry, nervousness, or unease about something with an uncertain outcome
- done or chosen in accordance with wisdom or prudence; likely to be of benefit
- an area on the internet or other computer network where users can communicate, typically one dedicated to a particular topic
- a person who has come to feel helpless and passive in the face of misfortune or ill-treatment
Down
- the action of stopping something from happening or arising
- the action of supervising someone or something
- the action or practice of sending text messages
- aggressive pressure or intimidation, can be done online
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
11 Clues: the action of supervising someone or something • the action or practice of sending text messages • aggressive pressure or intimidation, can be done online • the action of stopping something from happening or arising • type of Cyberbullying involves spreading false statements about people • ...
Chapter Vocabulary Review Extension 2023-12-15
Across
- a type of mining in which layers of soil & roch (both at the surface) are removed from large areas to expose a resource
- a kind of minig pollution that results from rain water draining out of mines with iron sulfide
- the energy that holds protons together & neutrons together in the nucleus of an atom
- waste produced from nuclear fission
- a fossil fuel mostly made up of hydrocarbons, liquid
- an energy source that can't be replentished in a short amount of time
- a kind of mining eich involves digginy deep shafys & networks of horizontal tunnels are made either by blasting or mining to find resource
Down
- a solid that consists of molecules of methane within a crystal network of water molecules, ice-like
- hydrocarbon - containing rock
- an energy source that's repeatedly available, is self-replentishing, or can be replaced/made in a relatively short time
- reducing energy use to prolong the use of fossil fuels
11 Clues: hydrocarbon - containing rock • waste produced from nuclear fission • a fossil fuel mostly made up of hydrocarbons, liquid • reducing energy use to prolong the use of fossil fuels • an energy source that can't be replentished in a short amount of time • the energy that holds protons together & neutrons together in the nucleus of an atom • ...
Artificial Lexicon 2023-12-02
Across
- The field of study that enables computers to interpret visual information from the world.
- The delivery of computing services, including storage and processing power, over the internet.
- The interdisciplinary field that uses scientific methods, processes, and algorithms to extract insights from data.
- A machine learning approach where the algorithm is trained on labeled data.
- A computer system modeled after the human brain, used for tasks like image recognition.
- An AI program designed to simulate conversation with human users.
Down
- Extremely large and complex datasets that traditional data processing applications can't handle.
- The interdisciplinary field that involves the design, construction, operation, and use of robots.
- A subset of machine learning that involves neural networks with many layers.
- An open-source machine learning library developed by Google.
- A set of rules or steps followed to solve a problem or perform a task in AI.
11 Clues: An open-source machine learning library developed by Google. • An AI program designed to simulate conversation with human users. • A machine learning approach where the algorithm is trained on labeled data. • A subset of machine learning that involves neural networks with many layers. • ...
IOT TERMS 2024-03-14
Across
- It is a low-power, low-data rate wireless network used mainly in home and industrial settings.
- Low power, wide area devices used in conjunction with mobile devices interfacing with IoT networks.
- A device used by utility companies to collect information about energy consumption
- a long-range for small data packets with low power consumption.
- An organization focused on driving the network and computing infrastructure needs of automotive big data.
- A data link layer (DLL) sublayer transmits data packets to and from a network interface card
Down
- A computer system designed for long-distance data transmissions
- a location-based service in which GPS or RFID is used to create a virtual geographic boundary
- a weak signal sent over a wide frequency and is employed mostly as a localizing signal and distance measurement.
- A measurement of how well a network supports IT connectivity
- It is an evolved second generation cellular network protocol
11 Clues: A measurement of how well a network supports IT connectivity • It is an evolved second generation cellular network protocol • A computer system designed for long-distance data transmissions • a long-range for small data packets with low power consumption. • A device used by utility companies to collect information about energy consumption • ...
CyberSecurity 2024-03-09
Across
- pairs a public key for encryption and a private key for decryption
- software intended to damage a computing system or to take partial control over its operation
- a malicious program that can copy itself and gain access to a computer in an unauthorized way
- encryption involves one key for both encryption and decryption
- a technique that attempts to trick a user into providing personal information
- infomration about an individual that identifies, links, relates or describes them
Down
- a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentification mechanism
- the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- the process of decoding data
- the process of encoding data to prevent unauthorized access
- a wireless access point that give unauthorized access to to secure networks
11 Clues: the process of decoding data • the process of encoding data to prevent unauthorized access • encryption involves one key for both encryption and decryption • pairs a public key for encryption and a private key for decryption • a wireless access point that give unauthorized access to to secure networks • ...
Unit 4 Establish Personal Branding 2024-05-15
Across
- You personal brand is what that sets you apart from competitor in the mind of interviewers.
- Effective personal branding will emphasize the strengths of an individual and gain___.
- Word of mouth will push you forward and more people recognising your name.
- It helps in gaining recognition in their area of expertise.
- People will feel more comfortable when they can know the background of the person.
- It is the unique combination of skills, experience, and personality
Down
- An organisation may request and call your references and ask them about your claims.
- Your credentials, education and portfolios have to be essentially comes to ______.
- The person can build networks in different fields and their areas of specialty.
- This makes people more comfortable working with you given that your intentions are genuine and clear
- A young professional need to be aware if the way you conduct yourself to lay a solid ______.
11 Clues: It helps in gaining recognition in their area of expertise. • It is the unique combination of skills, experience, and personality • Word of mouth will push you forward and more people recognising your name. • The person can build networks in different fields and their areas of specialty. • ...
8: Ransomware Names (Expert) 2023-06-01
Across
- Exfiltrates victims' data before encrypting it and threatens to publish the stolen data if the ransom is not paid.
- Initially disguised as the Petya ransomware, targeted organizations through a compromised software update.
- Exploited a vulnerability in Windows operating systems, spread rapidly across networks.
- Targets large organizations, encrypts critical systems, and steals sensitive data for ransom payment negotiations.
Down
- Known for its ransomware-as-a-service (RaaS) model, where affiliates distributed the ransomware and shared profits.
- Distributed through malicious email attachments, often in the form of macro-enabled Microsoft Office documents.
- Targets large organizations and frequently utilizes vulnerabilities, exploits, or compromised RDP connections.
- Targets organizations worldwide using various techniques, including phishing campaigns and exploit kits.
- Engages in high-profile attacks on critical infrastructure, employs double extortion tactics.
- Disguised as an Adobe Flash installer, embedded into websites using JavaScript injected into the site's HTML code.
- Typically deployed following an initial compromise using other malware to gain access.
11 Clues: Typically deployed following an initial compromise using other malware to gain access. • Exploited a vulnerability in Windows operating systems, spread rapidly across networks. • Engages in high-profile attacks on critical infrastructure, employs double extortion tactics. • ...
Entrepreneurship Chapter 7, Section 7.1 2025-03-18
Across
- The statistics about the economy indicating how it is performing.
- An area with commercial zoning for many office buildings.
- Local governments create these and regulations that define how property in specific geographic areas can be used, i.e. residential, commercial, industrial, agricultural, and recreational.
- A company with a physical store or facility for at least a portion of its operation, i.e. grocery stores, manufacturing plants, doctor’s offices.
Down
- A blend of two or more location types, i.e. brick-and-mortar and home-based businesses.
- It is important to consider access to this, from the suppliers to the customers, when locating a business.
- Like e-business, these may have lower overhead costs than brick-and-mortar businesses.
- The area from which a business expects to draw most of its customers.
- Conducting retail sales, in particular, through the Internet.
- Buying and selling of goods or services through the Internet.
- Any business process conducted through electronic networks using the Internet.
11 Clues: An area with commercial zoning for many office buildings. • Conducting retail sales, in particular, through the Internet. • Buying and selling of goods or services through the Internet. • The statistics about the economy indicating how it is performing. • The area from which a business expects to draw most of its customers. • ...
Joshua Crossword Puzzle 2024-11-20
Across
- - A weakness, design, or implementation error that can lead to an unexpected, undesirable event that compromises the security of the system.
- - is the process of detecting and preventing illegal or unauthorized use of a computer
- - is ensuring that the information is accessible to authorized persons when required without delay.
- - includes the applications on the computers and operating system.
- theft - Any action of stealing information from a users system.
- - An individual who breaks into computer systems to steal, change, or destroy information.
- - An action or event that has the potential to compromise and/or violate security.
Down
- - A defined method of breaching the security of an IT system through vulnerability.
- - refers to protecting personnel, hardware, programs, networks, and data from physical threats.
- Any action derived from intelligent threats to violate the security of the system.
- preventing intruders from accessing any part of a computer system.
11 Clues: theft - Any action of stealing information from a users system. • - includes the applications on the computers and operating system. • preventing intruders from accessing any part of a computer system. • Any action derived from intelligent threats to violate the security of the system. • ...
HelpDesk Unit3 Vocab 2024-10-30
Across
- applications used to manage and track service requests and support tickets
- the process of prioritizing and categorizing incoming support tickets to ensure that the most important issues are addressed first
- providing assistance from a distance, through remote desktop or screen sharing software
- a tool that is used for IT support or other remote access to allow users to broadcast their screen to other devices
Down
- a repository of information and solutions about common issues and their resolutions
- technology that allows a user to control a computer from another location
- a record created in a help desk system to track a user’s issue
- identifying the nature of a problem based on symptoms
- the individual who uses the technology or services provided
- the use of computer systems and networks to manage and deliver information
- a list of common questions and answers that can help users troubleshoot issues themselves
11 Clues: identifying the nature of a problem based on symptoms • the individual who uses the technology or services provided • a record created in a help desk system to track a user’s issue • technology that allows a user to control a computer from another location • applications used to manage and track service requests and support tickets • ...
technology 2019-09-17
Techology Crossword Puzzle 2016-08-09
Across
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- unsolicited email messages sent for marketing purposes.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Techology Crossword Puzzle 2016-08-09
Across
- unsolicited email messages sent for marketing purposes.
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
Down
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
computer networks and protocols 2023-02-06
5 Clues: like a set rules • like a big hard drive • the result of joining to or more computers • the pat of the computer which acts as the brain. • the maximum amount of data going to a device like a pipe and water