networks Crossword Puzzles
Rougayyah's Internet Puzzle 2015-09-22
Across
- (e.g. Cell Phones, Web TV,Internet Tablets)
- Mainframe computers that are capable of processing very fast.
- connection device
- technology that allows two or more devices (eg. phones)
- Using the basic finger chart. (e.g.A,S,D,F AND J,K,L;)
- Where you can keep URLs that you would like to visit frequently.
- Collection of networks of computers & storage devices linked by cables & satellite
- Gap between those of us who have Internet access and those who don’t
Down
- Allows a lot more data to be sent over traditional copper telephone lines
- A location on the www (World Wide Web)
- Internet or USB cable and a DSL or cable modem
- Companies that proved users with access to the Internet, usually for a fee (e.g. Rogers, Bell)
- Created by the U.S. Department of Defense to link together most mainframe computers to create a communication system
- Collections of millions of hypertext documents.
- Represents an Internet Protocol
15 Clues: connection device • Represents an Internet Protocol • A location on the www (World Wide Web) • (e.g. Cell Phones, Web TV,Internet Tablets) • Internet or USB cable and a DSL or cable modem • Collections of millions of hypertext documents. • Using the basic finger chart. (e.g.A,S,D,F AND J,K,L;) • technology that allows two or more devices (eg. phones) • ...
Computer Science Keywords 2015-07-13
Across
- a statement of instruction followed in order by the next set of instruction.
- the process of writing computer programs.
- measures how much data can be sent over a specific connection in a given amount of time.
- step by step instructions to achieve something.
- a question is asked, and depending on the answer, the program takes one of two courses of action.
- A popular programming language.
- a place where you store data in an organised way.
- a data type to represent text rather than numbers.
Down
- A variable that only holds two states, true or false.
- a number which is not a fraction; a whole number.
- an electronic document in which data is arranged in the rows and columns of a grid and can be manipulated and used in calculations.
- changing inputs to see how outputs are affected.
- the repetition of a block of statements within a computer program.
- Type a particular kind of data item.
- two or more computers connected together.
15 Clues: A popular programming language. • Type a particular kind of data item. • the process of writing computer programs. • two or more computers connected together. • step by step instructions to achieve something. • changing inputs to see how outputs are affected. • a number which is not a fraction; a whole number. • a place where you store data in an organised way. • ...
Texas History 2022-04-20
Across
- space comprising the earth’s atmosphere and the space
- the process by which an economy is transformed from primarily agricultural to one based on the manufacturing of goods
- period of temporary economic decline during which trade and industrial activities are reduced.
- who mapped the coast of Texas
Down
- sectors areas that are distinct from others that produce goods and services within an economy
- a long and severe recession in an economy or market
- The act of competing
- an economic model which states that the price at which a good is sold is determined by the good’s supply, and its demand.
- he process of increasing the percentage and number of people living in urban settlements.
- The battle of the Alamo was here
- What major war happened in 1939
- the single worldwide computer network that interconnects other computer networks
- an economic system in which private businesses operate in competition and largely free of state control.
- Financial gain
- migrating within one country or state.
15 Clues: Financial gain • The act of competing • who mapped the coast of Texas • What major war happened in 1939 • The battle of the Alamo was here • migrating within one country or state. • a long and severe recession in an economy or market • space comprising the earth’s atmosphere and the space • the single worldwide computer network that interconnects other computer networks • ...
Cybersecurity Careers Crossword 2022-09-26
Across
- the process of getting new software or hardware up and running
- small groups of similar careers within a career cluster
- the study of technologies to determine their usefulness
- a person who creates, manages, and maintains computer networks, software, and systems
- they ensure hardware, software, and other systems are working properly
- This person improves and maintains an information technology system
- creating or improving any part of technology
- the change in the number of people that are employed in a certain occupation in the future
- computer programs that run by giving instructions to the computer
Down
- a flaw or weakness that may allow harm to occur in an information technology system
- it is two or more computers or devices that exchange data
- all hardware, software, and other equipment operated by a group of users
- A type of software that can be installed and run on a computer, tablet, or other electronic device
- clusters a group of careers with similar features
- the physical parts that make up a computer or device
15 Clues: creating or improving any part of technology • clusters a group of careers with similar features • the physical parts that make up a computer or device • small groups of similar careers within a career cluster • the study of technologies to determine their usefulness • it is two or more computers or devices that exchange data • ...
Communications 2022-11-30
Across
- websites that allow any users to create or edit their web pages using any web browser.
- allow files to be transferred from one computer to another over the internet
- the common courtesy that internet users should adopt and obey and respect over user’s views when accessing an online forum or emailing.
- laws of sending emails
- forum there is a moderated forum and a ______ forum
- personal internet journals where the writer (blogger) will type in their observations on a topic and perhaps provide links to some relevant websites.
- carbon copy
- Uniform resource locator
Down
- a computer network that allows sharing resources within a single organization or company.
- unwanted messages that come in bulk
- controls incoming and outgoing traffic on the network based on predetermined security rules
- A worldwide collection of interconnected networks and devices
- a company that provides users with access to the internet
- blind carbon copy
- Allows data to be sent and received securely over the internet
15 Clues: carbon copy • blind carbon copy • laws of sending emails • Uniform resource locator • unwanted messages that come in bulk • forum there is a moderated forum and a ______ forum • a company that provides users with access to the internet • A worldwide collection of interconnected networks and devices • Allows data to be sent and received securely over the internet • ...
Ensuring Poorer Kids Don't Feel Marginalised in Top Schools: A 2021-04-09
Across
- Raffles Institution is considered as a _____ school
- having special rights or advantages
- to feel uneasy or embarrassed
- students who did not have a opportunity to travel abroad due to financial ______ may find some classroom activities embarrassing
- the prime minister wanted social networks to remain _______
- students who just make it to a better school often feel ________ when compared to peers
Down
- we aim to increase the ______ of student backgrounds
- students and teachers have to be mindful of the ________ differences between students
- children from economically _________ families may not be able to raise as much as their advantaged peers
- unintentionally
- _____ students are put in the same schools with their advantaged peers
- students from lower income families may not feel at home when _______ to a school of high renown
- we have to be aware that children from poorer families do not feel _______ in their new communities
- changes have been made to the Direct School Admission scheme to _______ the application process
- in a permanent, essential or characteristic way
15 Clues: unintentionally • to feel uneasy or embarrassed • having special rights or advantages • in a permanent, essential or characteristic way • Raffles Institution is considered as a _____ school • we aim to increase the ______ of student backgrounds • the prime minister wanted social networks to remain _______ • ...
Ancient people Szokolai Adelina 2023-12-19
Across
- They had elaborate ceremonies and human sacrifices to appease their gods
- They created one of the earliest alphabets
- They discovered life-sized clay soliders in the tomb of their first emperor
- They had very famous philosophers like Socrates, Plato, and Aristotle
- Their language became the language of scholarship and diplomacy in medieval Europe
- They are most known for their warrior culture, and contributions to the migrations and invasions that shaped European history
- They developed one of the earliest known writing systems called cuneiform
Down
- They are known for their ancient rock-hewn churches, as well as their unique script, Ge'ez
- They had complex metal work
- They built the hanging gardens, one of the seven wonders of the ancient world
- They are recognies for their extensive road networks
- They were famous for their powerful and efficent military
- They founded one of the world's earliest and largest empires, the Achaemenid Empire
- They had a significant influence on the roman civilization
- They built massive piramids
15 Clues: They had complex metal work • They built massive piramids • They created one of the earliest alphabets • They are recognies for their extensive road networks • They were famous for their powerful and efficent military • They had a significant influence on the roman civilization • They had very famous philosophers like Socrates, Plato, and Aristotle • ...
IT 2023-11-27
Across
- The use of largely automatic equipment in a system of operation.
- programs follow a step-by-step ______ to perform tasks efficiently."
- mechanics explores the fundamental properties and behavior of subatomic particles."
- A set of instructions for solving a problem, often used in computer programming.
- holds promise for advancements in medicine, electronics, and materials science."
- The design, construction, operation, and use of robots.
Down
- The practice of protecting computer systems, networks, and data from digital attacks.
- Relating to the branch of physics dealing with the behavior of very small particles.
- The introduction of new ideas, methods, or products.
- Information that is collected and stored, often used for analysis and decision-making.
- The manipulation of matter on an atomic or molecular scale.
- invest in research and development to drive ______ and stay ahead in the market."
- is a field that combines engineering and technology to create intelligent machines."
- implement ______ to streamline production processes and increase efficiency."
- growing reliance on digital technologies highlights the importance of strong ______ measures."
- rely on accurate and reliable ______ to draw meaningful conclusions."
16 Clues: The introduction of new ideas, methods, or products. • The design, construction, operation, and use of robots. • The manipulation of matter on an atomic or molecular scale. • The use of largely automatic equipment in a system of operation. • programs follow a step-by-step ______ to perform tasks efficiently." • ...
Instagram crossword 2020-12-05
Across
- Twenty-four-hour posts found at the top of the Instagram news feed
- Instagram Stories saved to your profile
- Your home screen, where you can view posts from people you follow
- Hiding old posts without deleting them
- A post that doesn’t make it to Instagram until days after the event happened
- The section of text under a username where you can list information about yourself/your brand
- A word or phrase with the # symbol placed in front, making it searchable
- A brief description that appears underneath a photo
- A humorous image or video that spreads quickly across the Internet
Down
- The total number of times your post has been viewed
- Another term for username
- Someone who produces content for a large audience, often in a specific niche
- A section of statistics that helps you learn about your audience, your content, and how it’s performing
- Interacting with users on social networks
- Something that decides which posts people see everytime they open their feed
15 Clues: Another term for username • Hiding old posts without deleting them • Instagram Stories saved to your profile • Interacting with users on social networks • The total number of times your post has been viewed • A brief description that appears underneath a photo • Your home screen, where you can view posts from people you follow • ...
BrainRiddle 2025-02-05
Across
- A cryptographic function that converts data into a fixed-size string.
- A vulnerability in software that is exploited before the developer fixes it.
- A type of malware that secretly gathers information from a user’s device.
- The process of securing data by converting it into an unreadable format.
- A cyber-attack where attackers trick users into revealing sensitive information.
- A type of malware that disguises itself as legitimate software.
- A hidden part of the internet where anonymous activities take place.
- A network of infected computers controlled remotely by hackers.
- A network security system that monitors and controls incoming and outgoing traffic.
Down
- A type of software designed to harm or exploit devices and networks.
- A hacking method that tries multiple password combinations to gain access.
- The act of manipulating people into revealing confidential
- A cyber attack that manipulates databases through malicious SQL queries.
- Malicious software that locks files and demands payment to restore access.
- A set of tools that allow hackers to maintain access to a system unnoticed.
15 Clues: The act of manipulating people into revealing confidential • A type of malware that disguises itself as legitimate software. • A network of infected computers controlled remotely by hackers. • A type of software designed to harm or exploit devices and networks. • A hidden part of the internet where anonymous activities take place. • ...
cyber security class 7-8 2025-07-07
Across
- A person who tries to break into computers or networks
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- Small data stored by websites to remember what you did
- A program that helps protect your computer from harmful software
- A program or device that guards your network from threats
Down
- Something you install to fix or improve software
- Any software made to harm your computer or data
- A harmful program that spreads and damages your files
- A test websites use to check if you’re a human
- A small window that appears on your screen, sometimes as part of a scam
- A harmful file that tricks you by looking like something safe
- A tool that helps block unwanted content or messages
- A scam where someone pretends to be trustworthy to steal your info
- A tool that blocks unwanted connections to your computer or network
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
cyber security 2025-07-07
Across
- A small window that appears on your screen, sometimes as part of a scam
- A tool that blocks unwanted connections to your computer or network
- A program that helps protect your computer from harmful software
- A test websites use to check if you’re a human
- A harmful program that spreads and damages your files
- Something not real, often used to trick people online
- A tool that helps block unwanted content or messages
Down
- Any software made to harm your computer or data
- A scam where someone pretends to be trustworthy to steal your info
- A harmful file that tricks you by looking like something safe
- A program or device that guards your network from threats
- A personal profile you log into on websites or apps
- A program that secretly collects what you do on your device
- A person who tries to break into computers or networks
- Small data stored by websites to remember what you did
- A part of a website or message that takes you to another page
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • Something not real, often used to trick people online • ...
cyber security class 7-8 2025-07-07
Across
- A tool that blocks unwanted connections to your computer or network
- Something you install to fix or improve software
- Small data stored by websites to remember what you did
- A harmful program that spreads and damages your files
- A tool that helps block unwanted content or messages
- A program that secretly collects what you do on your device
- A scam where someone pretends to be trustworthy to steal your info
- A test websites use to check if you’re a human
Down
- Any software made to harm your computer or data
- A personal profile you log into on websites or apps
- A program that helps protect your computer from harmful software
- A harmful file that tricks you by looking like something safe
- A person who tries to break into computers or networks
- A small window that appears on your screen, sometimes as part of a scam
- A part of a website or message that takes you to another page
- A program or device that guards your network from threats
16 Clues: A test websites use to check if you’re a human • Any software made to harm your computer or data • Something you install to fix or improve software • A personal profile you log into on websites or apps • A tool that helps block unwanted content or messages • A harmful program that spreads and damages your files • ...
Ethical Online Teaching 2025-07-21
Across
- law that restricts data collection from children under 13 online
- law that protects the privacy of student education records
- The trail of data left behind by users on digital platforms
- Required permission from users before collecting or using their personal data
- A digital platform used to deliver and manage educational content
- The practice of protecting systems, networks, and data from digital attacks
- A security method that requires two forms of identification to access an account
- Using someone else's work without proper attribution
Down
- An incident where data is accessed or disclosed without authorization
- Any data that could identify a specific individual, like name or student ID
- A method of converting data into a secure format to prevent unauthorized access
- The ethical duty to keep sensitive information private
- The principle of collecting only the data that is necessary
- Designing digital content so it can be used by people with disabilities and more accessible
- A document that explains how a website or platform collects and uses user data
15 Clues: Using someone else's work without proper attribution • The ethical duty to keep sensitive information private • law that protects the privacy of student education records • The principle of collecting only the data that is necessary • The trail of data left behind by users on digital platforms • law that restricts data collection from children under 13 online • ...
Gathering Information 2025-10-14
Across
- the act of doing several things at the same time
- a type of website or app that allows users to share content and communicate (e.g. Instagram, TikTok).
- the state of being connected or linked, especially through digital networks
- the record of your activities and data created when you use the internet
- describing something that spreads very quickly online, often through social media
- needing or depending on something or someone
- the quality of being real, true, or genuine
- happening immediately, without delay
Down
- false or inaccurate information, especially when shared widely online
- the process by which the world becomes more connected through trade, communication, and culture
- the level of interaction that users have with online content, such as likes, shares, or comments
- the quality of being trusted or believed in
- a set of rules or calculations used by social media sites to decide what content users see
- the act of communicating or spreading information to a wide audience
- an unfair preference or prejudice that influences judgment
15 Clues: happening immediately, without delay • the quality of being trusted or believed in • the quality of being real, true, or genuine • needing or depending on something or someone • the act of doing several things at the same time • an unfair preference or prejudice that influences judgment • the act of communicating or spreading information to a wide audience • ...
Technology words 2025-11-26
Across
- A wireless technology for connecting devices to the internet
- Harmful software designed to damage or access a computer without permission
- A computer that provides data or services to other computers on a network
- Protection of computers and networks from attacks or unauthorized access
- Programs and applications that run on a computer or device
Down
- A program used to access and view websites
- The physical parts of a computer, like the keyboard or processor.
- An organized collection of information stored electronically
- The amount of data that can be transmitted over a network in a given time
- Software that is built into hardware devices to help them operate
- The smallest unit of a Digital image or screen display
- A method of encoding information so only authorized people can read it
- A group of connected computers that share information
- A set of instructions that tells a computer how to solve a problem
- The address of a webpage on the internet
15 Clues: The address of a webpage on the internet • A program used to access and view websites • A group of connected computers that share information • The smallest unit of a Digital image or screen display • Programs and applications that run on a computer or device • An organized collection of information stored electronically • ...
Narcotic investigative terms 2025-12-08
Across
- Delivering or selling narcotics to another person.
- A sting operation where an undercover officer purchases drugs and arrests the seller immediately.
- Investigation where officers pose as buyers or sellers to infiltrate drug networks.
- Law enforcement technique where a shipment of narcotics is monitored to identify suspects.
- Categorization of drugs into Schedules I–V based on abuse potential and medical use.
- Illegaltrade or distribution of narcotics, often across borders.
- Items used to consume, package, or produce narcotics (e.g., syringes, scales).
Down
- Specially trained dogs used to detect narcotics.
- A drug or chemical whose manufacture, possession, or use is regulated by law.
- person who provides information to law enforcement about narcotics activities.
- Unique identifier for individuals authorized to handle controlled substances.
- A monitored purchase of narcotics by law enforcement to gather evidence.
- Having control over a narcotic substance, either actual or constructive.
- Documentation of the handling of evidence from seizure to court to ensure integrity.
- On-site chemical test to identify suspected narcotics.
15 Clues: Specially trained dogs used to detect narcotics. • Delivering or selling narcotics to another person. • On-site chemical test to identify suspected narcotics. • Illegaltrade or distribution of narcotics, often across borders. • A monitored purchase of narcotics by law enforcement to gather evidence. • ...
CYBER SECURITY 2024-09-19
Across
- Refers to someone who breaks into computer systems or networks without permission.
- Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______.
- It is an act of someone taking something that doesn’t belong to them without any permission.
Down
- a tool that allows people to connect with others and perform online activities.
- refers to improvements or changes.
- Refers to a possibility of something bad or undesirable happening.
6 Clues: refers to improvements or changes. • Refers to a possibility of something bad or undesirable happening. • a tool that allows people to connect with others and perform online activities. • Refers to someone who breaks into computer systems or networks without permission. • Laptop, Smartphone, Smart TV, Ipad, Tablet and etc are examples of Electronic ______. • ...
TLE 2022-10-10
Across
- any storage media that holds content in digital format and is read using a laser assembly
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- list detail or summary data or computed
- separation of data into various categories
- is a high-speed access area that can be either a reserved section of main memory or a storage device
- ensuring that supplied data is correct and relevant
- software programs that allows a user to locate, access, and display web pages
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- are small pictures that are linked to actual program
- the collection, organization, analysis, interpretation and presentation of data
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- refers to where the typist positions his/her fingers
- the common storage unit in a computer
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- is the main, and usually the largest, data storage device in a computer
Down
- not directly accessible by the CPU
- a soft magnetic disk
- combining multiple pieces of data
- a software or a device that allows users to create, edit, and print documents
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- reducing detailed data to its main points
- also known as main memory
- used as the computer begins to boot up
- can be accessed just as fast as any other data
- hardware data storage device developed by lomega that functions like a standard 1.44
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- arranging items in some sequence and/or in different sets
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- is used in the computers to store the data
- coated strip of plastic on which data can be encoded
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • separation of data into various categories • ...
Chapter 8 E-Commerce Security 2020-11-19
Across
- The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
- People who commit crime on the Internet.
- Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
- One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
- Able to replicate itself and spread faster than viruses.
- _____ of attacks means the attackers are also improving themselves with new technologies over time.
- _____-of-service attempts to make a server or network resource unavailable to users.
- The e-commerce security battleground involves the attacks, target, and _____.
- The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
- The probability that a threat will impact an information system.
- ______ measures help find security breaches in a system.
Down
- One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
- _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
- _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
- Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
- The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
- _____ threat in e-commerce security includes human error and environmental hazards.
- _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
- The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
- Information _____ refers to activities and that protect an information systems.
- _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
- Information _____ is a measure taken to protect customer information online.
- _____ communication is one of the technical nature that contributes to the weakness of a system.
- _____ nature of e-commerce is one of the causes of security issues.
- A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
- Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.
26 Clues: People who commit crime on the Internet. • Able to replicate itself and spread faster than viruses. • ______ measures help find security breaches in a system. • The probability that a threat will impact an information system. • _____ nature of e-commerce is one of the causes of security issues. • ...
it 2023-10-30
Across
- Converting data into a secret code to prevent unauthorized access.
- A step-by-step procedure for solving a problem.
- Instructions written in a programming language.
- Local Area Network, a network that connects computers within a limited area.
- Storing and accessing data and programs over the internet instead of a local computer.
- Software that translates high-level programming code into machine-readable code.
- A person who gains unauthorized access to computer systems or networks.
- An operating system developed by Microsoft.
- A secret combination of characters used to authenticate a user's identity.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- A networking device that forwards data packets between computer networks.
- A software tool used for organizing and analyzing data in rows and columns.
- Malicious software disguised as legitimate software.
- A type of malicious software that can replicate itself and spread to other computers.
- Uniform Resource Locator, the address used to access resources on the internet.
- Wireless Fidelity, a technology that allows devices to connect to the internet wirelessly.
- The process of creating computer programs using programming languages.
- Universal Serial Bus, a common interface for connecting devices to a computer.
Down
- A display device used to view output from a computer.
- An input device used to enter data and commands into a computer.
- A global network of interconnected computers and devices.
- A popular programming language used for developing a wide range of applications.
- Programs and applications that run on a computer system.
- Hypertext Markup Language, the standard language for creating web pages.
- Structured Query Language, a programming language used for managing and manipulating databases.
- Software used to access and view websites on the internet.
- Transmission Control Protocol/Internet Protocol, the basic communication protocol of the internet.
- Malicious software designed to harm or exploit computer systems.
- Creating a copy of data to protect against loss or damage.
- The capacity to hold and retain data or information.
- A network security system that monitors and controls incoming and outgoing network traffic
- development: The process of creating websites and web applications.
- A computer or system that provides resources or services to other computers or clients.
- Virtual Private Network, a secure connection between a user and a private network over the internet.
- system: Software that manages computer hardware and software resources.
- A structured collection of data stored and organized for easy retrieval.
- The process of identifying and fixing errors or bugs in software code.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Extensible Markup Language, a markup language used for storing and transporting data.
- A group of interconnected computers and devices.
40 Clues: An operating system developed by Microsoft. • A step-by-step procedure for solving a problem. • Instructions written in a programming language. • A group of interconnected computers and devices. • The capacity to hold and retain data or information. • Malicious software disguised as legitimate software. • A display device used to view output from a computer. • ...
Outcome 1 Crossword Puzzle - Social 10-2 2024-02-01
Across
- The process of expanding world trading networks and the world's countries' economies being connected to each other - "_________ Globalization".
- A group whose mission is to promote the French language between its 84 member countries, including 274 million French speakers.
- The process of bringing back a group's cultural identity that has suffered from assimilation or marginalization - "Cultural __________".
- A media company (television, radio, film, social media, etc) that operates worldwide with the focus of offering access to information and entertainment services - "Media _______".
- The amount of Canadian content in media such as television programs shot in Canada, produced by Canadian companies or music created by Canadian artists, etc.
- Group in charge of regulating and supervising Canadian broadcasting and telecommunications.
- The process by which the world's societies and citizens are becoming increasingly connected to and dependent on each other.
- The common characteristics and values used to define a group - "________ Identity".
- Providing equal opportunity for participation of different groups of society.
- Large company that operates in a number of countries around the world.
- TV channel which aims to promote programs with an FNMI connection and support sharing of indigenous cultures.
- The process by which a minority cultural group adopts or is absorbed into the majority culture.
- The process by which people's lifestyles are influenced by global networks like transnational corporations and media - "__________ Globalization".
Down
- Putting a group of people in a lower or powerless position within a society.
- A process that occurs when people from different cultures come into contact and make adjustments to reach compromise while still allowing for differences.
- Current cultural trends that are spread by commercial mass media.
- The mixing of elements of existing cultures to create a new expression of culture, often using new media communication and technology - "Cultural _________".
- The spread of one popular culture around the world - "____________ of Pop Culture".
- A company trying to reduce costs by using the workers from another company in other countries where labour is cheaper and government regulation may be less strict.
- The process of attempting to protect, maintain and promote the unique aspects of a culture - "Cultural ________".
- Separation of people in a society based on racial, ethnic, or other differences.
- The process by which political decisions and actions are becoming increasingly international through bodies like the UN, EU, NATO, etc, - "_________ Globalization".
- Canadian Crown corporation, consisting of television, radio and Internet content with the goal of supporting and promoting "Canadian" content and culturally relevant material.
- Differences in characteristics of people; can involve personality, age, ethnicity, gender, religion, education, functional level at work, etc. - "Cultural _________".
24 Clues: Current cultural trends that are spread by commercial mass media. • Large company that operates in a number of countries around the world. • Putting a group of people in a lower or powerless position within a society. • Providing equal opportunity for participation of different groups of society. • ...
DIGITAL TECHONOLGIES 2024-10-22
Across
- Initialism of Internet of Things
- An input device that is moved over a pad or other flat surface to produce a corresponding movement of a pointer on a graphical display
- Data sent out of the computer, as to output device such as a monitor or printer
- A set of keys used to operate a typewriter, computer etc
- A virtual container in a computer's file system, in which files and other folders may be stored. The files and subfolders in a folder are usually related
- A measure of the rate at which data is downloaded and uploaded
- A device, such as a printer or scanner, connected to a computer
- Is a standardized twisted pair cable for Ethernet and other network physical layers
- A computer programming language often used to build websites and software, automate tasks, and conduct data analysis
- The connection between a user and a machine
- A software application, or a collection of software applications, designed to perform a specific task
- The internet, regarded as an abstract amorphous omnipresent space for processing and storage
- 5th generation mobile networks or wireless systems
- A person who uses a computer or a computing network, especially a person who has received an account
- An electromechanical transducer that converts an electrical signal into audible sound
- A device that encodes digital computer signals into analog/analogue telephone signals and vice versa and allows computers to communicate over a phone line
Down
- An aggregation of data on a storage device, identified by a name
- A computer memory chip that stores values but does not allow updates, in which the values are non-volatile in that they are retained even when the computer is unpowered
- The visualised data or imagery displayed on a computer screen
- An industrial specification for wireless personal area networks
- Multiple computers and other devices connected to share information
- A device, usually attached to a computer, used to print text or images onto paper
- A networking hardware device that allows other Wi-Fi devices to connect to a wired network
- A device which scans documents in order to convert them to a digital medium
- A unit of computing storage equal to eight bits
- The main memory of a computer or smartphone available for program execution or data storage
- The smallest unit of storage in a digital computer, consisting of a binary digit
- A task or program that is or was executing
- Of or relating to computers or the Information Age
- The part of a computer that stores variable executable code or data or unalterable executable code or default data
30 Clues: Initialism of Internet of Things • A task or program that is or was executing • The connection between a user and a machine • A unit of computing storage equal to eight bits • Of or relating to computers or the Information Age • 5th generation mobile networks or wireless systems • A set of keys used to operate a typewriter, computer etc • ...
Background Knowledge 2024-01-31
Across
- Helps you think outside of immediate context
- Help develop concepts (ex:furit:oranges,grapes)
Down
- Background knowledge helps you make( )while reading
- Help children build knowledge by making connections to something they already know
- comprised of clusters of concepts that are coherent, generative, and supportive of future learning in a domain
5 Clues: Helps you think outside of immediate context • Help develop concepts (ex:furit:oranges,grapes) • Background knowledge helps you make( )while reading • Help children build knowledge by making connections to something they already know • comprised of clusters of concepts that are coherent, generative, and supportive of future learning in a domain
A New Canada: Then and Now 2013-05-26
Across
- The first passenger planes began flying during this time in history
- Used as a weapon of war among other things
- What powered the earliest cars
- an economic system that focuses on large industries
- A global system of computer networks that are interconnected
- As more automobiles were created, making this better became a huge need
Down
- Took its first flight which was almost a kilometer in 1909
- Reheats, defrosts, and cooks food within a matter of minutes (or seconds!)
- Making things by hand in a small shop
- In 1954 this was known as CHCT-TV in Calgary
- Engines that ran on this were more reliable and easy to use
- A workplace where machines are operated by workers to produce many goods
- You can check your email, surf the web, play a game, skype with a relative, all from this handheld device
- A major change
- Each worker doing one task on an incomplete product until it is completed
- A popular form of social media that connects you to just about anyone anywhere
- This is needed to build a railway
17 Clues: A major change • What powered the earliest cars • This is needed to build a railway • Making things by hand in a small shop • Used as a weapon of war among other things • In 1954 this was known as CHCT-TV in Calgary • an economic system that focuses on large industries • Took its first flight which was almost a kilometer in 1909 • ...
AI Terminology and Concepts 2024-03-25
Across
- The process of converting information or data into a code.
- Source Software for which the original source code is made freely available
- Information processed or stored by a computer.
- Learning A subset of AI that provides systems the ability to automatically learn.
- A software application that runs automated tasks.
- The branch of technology that deals with the design, construction, operation, and application of robots.
- Moral principles that govern behavior.
- The use of technology to perform tasks with minimal human intervention.
- Language Processing AI’s ability to understand human language.
Down
- A network of remote servers to store, manage, and process data.
- Learning A complex neural networks approach to machine learning.
- A computer program designed to simulate conversation with human users, especially over the internet.
- The process of making something as effective as possible.
- A step-by-step procedure for calculations.
- A systematic error in data or algorithms.
- The central part of an operating system; it’s not just a part of corn.
- Test A measure of a machine’s ability to exhibit intelligent behavior.
17 Clues: Moral principles that govern behavior. • A systematic error in data or algorithms. • A step-by-step procedure for calculations. • Information processed or stored by a computer. • A software application that runs automated tasks. • The process of making something as effective as possible. • The process of converting information or data into a code. • ...
CROSSWORD LAB 2025-10-30
Across
- The database key that uniquely identifies each record.
- The phase in SDLC where the system is deployed for real-world use.
- A machine learning technique inspired by the human brain.
- Model defining seven layers of network communication
- The process of verifying a user's identity.
- Sorting algorithm with best-case time complexity O(n).
- A security technique involving hiding data within other data (e.g., images).
- A data structure organized as LIFO (Last In, First Out).
- The network device that connects multiple networks and directs data packets.
Down
- Java feature allowing a subclass to provide specific implementation for a superclass method.
- Memory management technique dividing memory into equal-sized blocks.
- A collection of interrelated tables in a database.
- Protocol used for transferring files securely over a network
- The main memory of the computer, also known as volatile memory.
- Algorithm that finds the shortest path between nodes in a graph.
- A system program that translates assembly language into machine code.
- Type of malware that replicates itself and spreads to other computers.
17 Clues: The process of verifying a user's identity. • A collection of interrelated tables in a database. • Model defining seven layers of network communication • The database key that uniquely identifies each record. • Sorting algorithm with best-case time complexity O(n). • A data structure organized as LIFO (Last In, First Out). • ...
Wireless Technologies Part 1 2025-10-06
Across
- This wireless technology provides broadband access over long distances using microwave signals.
- This wireless technology enables devices to communicate over short distances, often used for headsets and smartwatches.
- A disadvantage of WLAN where signals can be affected by walls or other obstacles.
- Delay in wireless data transmission
- Common device that broadcasts wireless signal in a network.
- Important feature to protect WLAN from unauthorized access
- Process of converting data into secure code in WLAN
- A wireless network that covers a large geographic area using cellular towers.
Down
- Amount of data transmitted over a network in a given time
- Advantage of WLAN that allows users to move freely
- One of the main advantages of WLAN compared to wired LAN.
- This technology provides Internet access from orbiting communication devices.
- Organization that develops 802.11 wireless standards
- A wireless network that allows devices to connect within a local area, such as in a home or office.
- The type of broadband that uses mobile carrier networks like 4G or 5G.
- Measurement that defines the range of wireless transmission
- Unique network name used to identify a WLAN
- A type of network that connects devices within a short range, typically using Bluetooth.
18 Clues: Delay in wireless data transmission • Unique network name used to identify a WLAN • Advantage of WLAN that allows users to move freely • Process of converting data into secure code in WLAN • Organization that develops 802.11 wireless standards • Amount of data transmitted over a network in a given time • One of the main advantages of WLAN compared to wired LAN. • ...
Kret Tkacik 2021-05-04
Across
- It is hardware or software — that protects your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer
- Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment.
- Local Area Network – home network
Down
- Receives a network signal, cleans and regenerates it.
- Wide Area Network – Internet
- Creates networks and connects devices.
6 Clues: Wide Area Network – Internet • Local Area Network – home network • Creates networks and connects devices. • Receives a network signal, cleans and regenerates it. • Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment. • ...
Tic-Tac-Toe Vocabulary 2015-04-27
Across
- a group of connected computers
- software used to view the Internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material
Down
- network etiquette; Online manners; following the rules online, being a good digital citizen
- a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- text or graphics that, when clicked, will connect the user to a new web page or another place
- a restricted computer network; a private network created using World Wide Web software
8 Clues: a group of connected computers • software used to view the Internet • a restricted computer network; a private network created using World Wide Web software • the unauthorized use, reproduction, distribution, or transmission of copyrighted material • network etiquette; Online manners; following the rules online, being a good digital citizen • ...
Macie Dyson - Tech Concepts - 4th Period 2016-10-26
Across
- The study or use of systems (especially computers) for storing, retrieving, and sending information
- A networking device that forwards data packets between computer networks
Down
- Network is created when two or more computers are connected and share resources without going through a separate computer
- Typically networked and more powerful than a personal computer
- A networking hardware device that allows a Wi-Fi to connect to a wired network
- A computer networking that connects devices together on a computer
- A common connection point for devices in a network
7 Clues: A common connection point for devices in a network • Typically networked and more powerful than a personal computer • A computer networking that connects devices together on a computer • A networking device that forwards data packets between computer networks • A networking hardware device that allows a Wi-Fi to connect to a wired network • ...
Cyber Security 2021-02-12
Across
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your personal information or devices.
- Short for malicious software, that gains access to your computer or device
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Gathers information about how you use your computer
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Someone that tries to gain access to your personal information or devices. • Short for malicious software, that gains access to your computer or device • ...
CYB 2024-05-07
Across
- the term used for various pop-up advertisements that show up on your computer or mobile device
- malware that holds a victim's data unless the victim pays a ransom to the attacker
- malware, that spreads between computers and causes damage to data and software
- malicious software that spies on the victim
Down
- malware that downloads onto a computer disguised as a legitimate program
- the practice of protecting systems, networks, and programs from digital attacks
- a type of malware that can automatically self-replicate without human interaction
7 Clues: malicious software that spies on the victim • malware that downloads onto a computer disguised as a legitimate program • malware, that spreads between computers and causes damage to data and software • the practice of protecting systems, networks, and programs from digital attacks • ...
Internet 2023-01-16
5 Clues: A single page of the website. • Use to connect different web pages of the website. • A collection of pages of information connected to each other. • A bigger network of many computer networks connected across the world. • The unique address of the website that specified its location on the internet.
Week 4 Vocab 2023-08-25
Across
- land or sea networks for the buying and selling of goods (silk road)
- the condition of being alone (seclude)
- the process of identifying and evaluating a document (evaluating)
Down
- the adoption of idea by one culture from another (spread).
- a person who trades in goods produced by other people (trader)
5 Clues: the condition of being alone (seclude) • the adoption of idea by one culture from another (spread). • a person who trades in goods produced by other people (trader) • the process of identifying and evaluating a document (evaluating) • land or sea networks for the buying and selling of goods (silk road)
TechFest'16 2016-08-25
Across
- The place that is titled as the birth place of the Web.
- The most basic Building block to create anything in minecraft.
- Popluar online game created by Blizzard Entertainment.
- A general-purpose machine that processes data according to a set of instructions that are stored internally either temporarily or permanently.
- The monitor is connected to the computer using a ____________.
- The values that a function uses to perform operations or calculations.
- No wires.
- When you send a letter to someone.
- A program that allows users to communicate through email.
- Type of computer and peripherals all on top of a desk.
Down
- Hardware that connects computer to a network.
- Input device used mainly for playing games
- Data stored in hard disk is ___________. It will still be available even if computer is switched off.
- Connects computer to the internet.
- The space all around your document.
- A sheet in a workbook that contains only a chart.
- External networks or devices are connected to the computer using _________.
- PlayStation VR is aslo known by the codename Project 'X'. What is X.
- One of the major browsers, that is used on the Internet.
- Giant computer that connects other computers to a network.
20 Clues: No wires. • Connects computer to the internet. • When you send a letter to someone. • The space all around your document. • Input device used mainly for playing games • Hardware that connects computer to a network. • A sheet in a workbook that contains only a chart. • Popluar online game created by Blizzard Entertainment. • ...
Part 1 Crossword 2015-09-28
Across
- A ____ processor gets keywords from user and looks them up in its index.
- When creating a web page, these must have alt labels and browser safe colors.
- A good web page does not have ______ scroll.
- The main technology for local area networks.
- Most interactions over the Internet use ____/server interaction protocol.
- Abbreviated as WWW
- Always ask the owner of copyrighted material for ____
- A group of information on a computer that can be software programs or data
- It is permissible to use up to ___ percent of media work.
- Composed of HTML tags and multimedia files
Down
- Digital company that manages large websites
- The team that is in charge of writing content for a professional website.
- A person who falsifies data to pretend to be someone else is...
- The sending and receiving occur at different times in this communication
- The most important "language" of creating a webpage
- Each computer connected to the internet is given a unique ___ address
- Orders links by relevance to user
- Controls how a website behaves
- High quality graphics and good writing can increase a web page's
- Each TCP/IP packet is
- Your UT email is NOT
21 Clues: Abbreviated as WWW • Your UT email is NOT • Each TCP/IP packet is • Controls how a website behaves • Orders links by relevance to user • Composed of HTML tags and multimedia files • Digital company that manages large websites • A good web page does not have ______ scroll. • The main technology for local area networks. • The most important "language" of creating a webpage • ...
Unit 7 Crossword 2015-12-16
Across
- / provides security for citizens and businesses.
- / service industries that cater to the general population and businesses.
- / quantity of something that producers have available for sale.
- / heavy industry such as steel, to consumer goods.
- / quantity that consumers are willing and able to buy.
- / ability of woman to achieve improvement in status.
- / costs associated with the established transportation networks accessible from a specific place.
- / extracts or harvests products from the earth including production from raw materials and basic foods.
- Services /provides services to consumers who desire and afford to pay for them.
Down
- / when people interact with new technology through trade.
- / second stage of Rostow’s model that has to deal with stimulating an increase in productivity.
- / people engaged in agriculture and national wealth allocated to “nonproductive” activities.
- / countries open themselves to foreign investment and international markets.
- / modern technology that sparks rapid growth.
- / doesn’t account for money entering and leaving the country.
- a plant in Mexico near the U.S. border.
- / facilitates other businesses; three different types it.
- / manufactures finished goods including processing and construction.
- / rapid growth is generated in a limited number of economic activities.
- / costs resulting from the unique characteristics of a location.
20 Clues: a plant in Mexico near the U.S. border. • / heavy industry such as steel, to consumer goods. • / modern technology that sparks rapid growth. • / provides security for citizens and businesses. • / facilitates other businesses; three different types it. • ...
Computers100 2016-02-21
Across
- social bookmarking site for teachers
- page is composed of HTML tags and multimedia files
- the main technology for Local Area Networks
- use this wonderful looking slideshows with images, music, video, etc.
- use this to create basic HTML pages
- the first step in creating a large scale website is to take
- when both the sender and receiver are active at the same time
- division that refers to the hardware that operates websites
- are when computers are geographically close
- Extension tell a computer what program to use to open a file
- interfering with security mechanisms, sending malicious content, etc.
Down
- a system of interlinked hypertexts documents accessed via the internet
- a related group of networked computers
- neutral rather than subjective, boastful, or exaggerated language
- your webpage can include no more than 5 from the same artist
- the internet is a connection of
- <head></head> are examples of
- under this law you must gain permission to use someone's work
- these should be highlighted on your webpage
- a universal communication medium
- failing to login and identify yourself on the UT System
- big challenge of a large website is high
- these should be underlined on your webpage
23 Clues: <head></head> are examples of • the internet is a connection of • a universal communication medium • use this to create basic HTML pages • social bookmarking site for teachers • a related group of networked computers • big challenge of a large website is high • these should be underlined on your webpage • the main technology for Local Area Networks • ...
Computers100 2016-02-21
Across
- social bookmarking site for teachers
- page is composed of HTML tags and multimedia files
- the main technology for Local Area Networks
- use this wonderful looking slideshows with images, music, video, etc.
- use this to create basic HTML pages
- the first step in creating a large scale website is to take
- when both the sender and receiver are active at the same time
- division that refers to the hardware that operates websites
- are when computers are geographically close
- Extension tell a computer what program to use to open a file
- interfering with security mechanisms, sending malicious content, etc.
Down
- a system of interlinked hypertexts documents accessed via the internet
- a related group of networked computers
- neutral rather than subjective, boastful, or exaggerated language
- your webpage can include no more than 5 from the same artist
- the internet is a connection of
- <head></head> are examples of
- under this law you must gain permission to use someone's work
- these should be highlighted on your webpage
- a universal communication medium
- failing to login and identify yourself on the UT System
- big challenge of a large website is high
- these should be underlined on your webpage
23 Clues: <head></head> are examples of • the internet is a connection of • a universal communication medium • use this to create basic HTML pages • social bookmarking site for teachers • a related group of networked computers • big challenge of a large website is high • these should be underlined on your webpage • the main technology for Local Area Networks • ...
Computers100 2016-02-21
Across
- social bookmarking site for teachers
- page is composed of HTML tags and multimedia files
- the main technology for Local Area Networks
- use this wonderful looking slideshows with images, music, video, etc.
- use this to create basic HTML pages
- the first step in creating a large scale website is to take
- when both the sender and receiver are active at the same time
- division that refers to the hardware that operates websites
- are when computers are geographically close
- Extension tell a computer what program to use to open a file
- interfering with security mechanisms, sending malicious content, etc.
Down
- a system of interlinked hypertexts documents accessed via the internet
- a related group of networked computers
- neutral rather than subjective, boastful, or exaggerated language
- your webpage can include no more than 5 from the same artist
- the internet is a connection of
- <head></head> are examples of
- under this law you must gain permission to use someone's work
- these should be highlighted on your webpage
- a universal communication medium
- failing to login and identify yourself on the UT System
- big challenge of a large website is high
- these should be underlined on your webpage
23 Clues: <head></head> are examples of • the internet is a connection of • a universal communication medium • use this to create basic HTML pages • social bookmarking site for teachers • a related group of networked computers • big challenge of a large website is high • these should be underlined on your webpage • the main technology for Local Area Networks • ...
COSC 2016-02-15
Across
- Use a computer to gain unauthorized access to data in a system.
- Abbreviation for wide area network.
- Device used to connect to the internet.
- The quality of being trusted and believed in.
- Abbreviation for Internet service provider.
- A related group of networked computers.
- The main technology for local area networks.
- Abbreviation for universal resource locator.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Abbreviation for land area network.
- The codes or tags that browsers use to create webpages.
Down
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- Abbreviation for world wide web
- Communication in which the sender and receiver are active at the same time.
- Language using neutral rather than subjective.
- Abbreviation for domain name system
- The universal communication medium
- The main means of mass communication (especially television, radio, newspapers, and the Internet) regarded collectively.
- The number Javascript starts counting from
- A group of information on a computer that can be software or data
20 Clues: Abbreviation for world wide web • The universal communication medium • Abbreviation for wide area network. • Abbreviation for domain name system • Abbreviation for land area network. • Device used to connect to the internet. • A related group of networked computers. • The number Javascript starts counting from • Abbreviation for Internet service provider. • ...
Word Chapter 1 glossary 2016-01-13
Across
- Duplicate content that you can use in case the original is damaged or lost
- Collection of related instructions
- Series of related instructions organized for a common purpose
- Collection of unprocessed items
- Input device that enables you to speak into a computer or mobile device
- Worldwide collection of computer networks
- Programs designed to make users more productive, or assist them with tasks
- Collection of computers and devices connected together
- Software that deliberately alters a computer's normal operation
- Electronic components that store instructions waiting to be executed
Down
- Light-sensing device that converts printed text into a form a computer can process
- Pointing device that fits under the palm of your hand
- Recorded media that users can download
- Software that enables users to access and view webpages
- Internet-capable phone that includes many apps
- Built-in connection to other documents, webpages, or websites
- Output device that visually conveys text, graphics, and video information
- Computer dedicated to providing one or more services to other computers
- Lightweight mobile computer with a screen in its lid and a keyboard in its base
- Informal website consisting of posts in a diary or journal format
20 Clues: Collection of unprocessed items • Collection of related instructions • Recorded media that users can download • Worldwide collection of computer networks • Internet-capable phone that includes many apps • Pointing device that fits under the palm of your hand • Collection of computers and devices connected together • ...
Computer Safety Crossword Puzzle 2018-08-15
Across
- To copy information from your internet-enabled device to the internet
- engine An Internet service that helps you search for information on the web
- A word or series of letters, numbers and characters that only you know
- unwanted email from someone you don't know
- To represent a literary work or close interpretation of one as one's own
- A program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web
- A collection of web pages
- theft Practice of stealing personal details
- computer programs that can destroy files or make your computer crash
- mail Unwanted email messages
- Programs that run on your computer
- A small device connected to a computer that is used for the cursor
Down
- A term for the actual computer equipment
- internet harassment
- A panel of keys that operate a computer
- a tracking feature of internet browsers that shows all the recent websites visited
- A worldwide network of computer networks
- The arrow that appears on your computer screen
- A person who accesses a computer illegally or legally
- A way to exchange messages over the internet
20 Clues: internet harassment • A collection of web pages • mail Unwanted email messages • Programs that run on your computer • A panel of keys that operate a computer • A term for the actual computer equipment • A worldwide network of computer networks • unwanted email from someone you don't know • theft Practice of stealing personal details • ...
CH 5 LIFE IN THE ENGLISH COLONIES 2014-10-08
Across
- emotional gatherings to hear sermons and declare their faith
- crops grown in the South for profit
- a free African American who predicted a solar eclipse
- crops grown in the Middle Colonies that are always needed
- one of the most important thinkers who opened the University of Pennsylvania
- England's national legislature, or lawmaking body
- economic competition with little government control
- widespread Christian movement involving sermons and revivals that emphasized faith in God
- were elected by colonists to represent Virginia's plantations and towns
- specialized in tobacco
Down
- trading networks in which goods and slaves moved among England, the American colonies, the West Indies, and West Africa
- one of England's main reasons for founding its American colonies
- laws passed in the South to control slaves
- nations created and maintained wealth by controlling trade
- passed 1689 to reduce the powers of the English monarchy and increase the power of Parliament
- are import taxes placed on trade products
- goods sold to other countries
- a group of royal advisers who set English policies in the colonies
- lawmaking body made up of two houses
- was particularly important in the southern colonies because of the plantation system
20 Clues: specialized in tobacco • goods sold to other countries • crops grown in the South for profit • lawmaking body made up of two houses • are import taxes placed on trade products • laws passed in the South to control slaves • England's national legislature, or lawmaking body • economic competition with little government control • ...
Tech Inventions 2021-10-21
Across
- the act of designing, building, and problem solving
- design, install, or maintain biomedical equipment.
- group of interacting elements
- focuses on improving production of an item
- works on public health/environmental solutions
- series of actions that lead to a result
- material ready to use
- use of original ideas
- materials used in primary production
- something put into a system
- design computers, networks, and build devices
- understanding of information through experience
- moving things from one place to another
- designing of aircrafts and spacecrafts
- send and receive information
- people who design, build, and problem solve
Down
- raw-materials that have been processed or changed
- artificial, not natural items
- criticism provided to improve something
- design major transportation buildings and projects
- study about the natural world
- a unit part of a larger system
- designs chemical manufacturing processes.
- design and discovery of new materials
- creation of something with basic inputs
- strength that allows something to work
- something produced by a system
- design power producing machines
- makes science and tasks easier
- ability to do something well with the use of knowledge
30 Clues: material ready to use • use of original ideas • something put into a system • send and receive information • artificial, not natural items • study about the natural world • group of interacting elements • a unit part of a larger system • something produced by a system • makes science and tasks easier • design power producing machines • materials used in primary production • ...
WWW List 19 2021-06-08
Across
- Many types of _______ form within the lungs and cause damage to the neurons.
- disperse: disband as ______:convoke
- When we are walking outside, we are often walking on_______.
- New Zealand is known to have _______ grasslands.
- When I could not see the board in class, my teacher recommended I go see an _______.
- A ________ is a type of marine biologist who studies fish’s bones.
- Humans are never satisfied, we may even call them ________.
- Max had a huge ________ on whether he wanted to live with his mom or dad.
Down
- life:biologist as weather: _______.
- 1,000 watts of electrical power is called a ________.
- The ________ of the atom consists of protons and neutrons.
- Johnny had to clean his room because his clothes always ________ into a heap on the floor.
- Many engineering projects start with a ________, then move on to the final stages.
- Salt happens to be a _______ in water.
- Protesters were _____ed by the police
- Nuclear ________ may cause a war in the future.
- Suzy ate many sweets and went on a bike ride to burn ________.
- Gmail users are connected through a ______ of networks.
- Mark’s face was so pink, some people even called him a _______.
- equinox:earth as _______:sun.
20 Clues: equinox:earth as _______:sun. • life:biologist as weather: _______. • disperse: disband as ______:convoke • Protesters were _____ed by the police • Salt happens to be a _______ in water. • Nuclear ________ may cause a war in the future. • New Zealand is known to have _______ grasslands. • 1,000 watts of electrical power is called a ________. • ...
IT Networking Terms 2023-09-07
Across
- a set of computers sharing resources provided by nodes
- an independent U.S.A agency that is a part of the government and enforces consumer protection
- hardware such as computers an
- the process of a fraudulent scheme
- a U.S agency that promotes American innovation
- a government agency that supports small businesses
- a person who is hired for a salary that is also not at an executive level
- the center of your network that serves as the main connecting point for all of your devices
- converting data into a code
- electronics that allow you to access the internet like smartphones, laptops and tablets
- an an encrypted security protocol that protects internet traffic on wireless networks
Down
- the ability to have physical access to a computer system
- the process of copying files over to a secondary loin case in case of equipment failure
- a federal executive department that is responsible for public security
- a layered approach to protecting data and applications
- a container for storing data on a computer
- practice of protecting data from hackers
- programs used by a computer
- a structure used to build software on
- a string of special characters used to allow access to a computer service
20 Clues: programs used by a computer • converting data into a code • hardware such as computers an • the process of a fraudulent scheme • a structure used to build software on • practice of protecting data from hackers • a container for storing data on a computer • a U.S agency that promotes American innovation • a government agency that supports small businesses • ...
THE INTERNET 2023-09-19
Across
- Secret code to access protected online accounts?
- The device that connects a computer to the internet?
- The term for online storage and computing resources accessible via the internet?
- Transferring files from the internet to a device?
- Method of watching/listening to media content online in real-time?
- Wireless technology that allows internet access?
- Action of looking for information on the web?
- The term for online platforms for connecting with others?
- Symbol used to categorize and search for topics on social media?
- the harmful behavior of using the internet to harass others?
Down
- The process of converting data into a code to secure it during transmission?
- Security system that blocks unauthorized access to a network?
- The practice of protecting computer systems and networks from online threats?
- An online seminar/presentation conducted over the internet?
- Electronic communication system for sending messages over the internet?
- Software used to access and view web pages?
- A collection of web pages accessible via the internet?
- Device that directs internet traffic to various devices in a network?
- A unique address used to locate a website on the web?
- The term for content that spreads rapidly across the internet?
20 Clues: Software used to access and view web pages? • Action of looking for information on the web? • Secret code to access protected online accounts? • Wireless technology that allows internet access? • Transferring files from the internet to a device? • The device that connects a computer to the internet? • A unique address used to locate a website on the web? • ...
UW ENV Crossword 2020-08-17
Across
- Only ENV degree other than a BEs (Abbr)
- ESS event held every winter
- Where the ENV living learning community can be found (2 wrds)
- Popular student hangout in EV1 (2 wrds)
- One of two certified programs in Ontario
- Geography & _____, Program that spends time in Breslau
- Building where WUSA services can be found (Abbr)
- ___ 200, Field Ecology, For example (Abbr)
- President of the University (first name)
- Popular ESS event run every term (2 wrds)
- number of programs in ENV
- Road on which EV3 sits
- Program society serving ENV's largest program (Abbr)
Down
- Mascot of ENV (2 wrds)
- Program with a 4th year overseas placement (Abbr)
- Environment, Resources & _______
- WUSA service aimed at building networks for international students (Abbr)
- President of the University (last name)
- You can't spell ____ without ES (ENV cheer)
- WUSA Service offering peer support for mental health (Abbr)
- Dean ___
- Sustainable _____, Dance created every oweek
- Second smallest faculty after ENV (Abbr)
- What ENV hopes to accomplish by 2030 (Abbr)
- Biggest program in SEED (Abbr)
- ENV Program Society serving GEM & Geomatics (Abbr)
- Program Society that meets in a studio (Abbr)
27 Clues: Dean ___ • Mascot of ENV (2 wrds) • Road on which EV3 sits • number of programs in ENV • ESS event held every winter • Biggest program in SEED (Abbr) • Environment, Resources & _______ • Only ENV degree other than a BEs (Abbr) • Popular student hangout in EV1 (2 wrds) • President of the University (last name) • One of two certified programs in Ontario • ...
AP Psychology Unit 1-7A 2018-12-11
Across
- Inactive genes
- Standard deviation equals...
- On a normal curve the standard deviation mean is...
- If more flu shots are given and then less people have the flu this is an example of...
- Process of our sensory receptors and nervous system receiving stimulus
- Events where you can remember all the details of said event.
- This type of psychology was born out of the fact that they did not like structuralism or functionalism.
- Demonstrated the powerful influence observational learning has in his Bobo Doll experiment
Down
- One reason why antisocial effects can occur in humans
- Psychology's big prehistoric debate.
- organizing stimuli into groups
- memories arise from certain activation patterns/interconnected neural networks.
- Regulates our daily schedule and body temperature
- Punished behavior is..., not forgotten
- Process of organizing and interpreting sensory information allowing us to recognize objects and events
- What regulates reproduction, metabolic energy, growth development, body defenses, and general homeostasis.
- The three main components of...are curiosity, humility, and skepticism.
- ...helps to protect, recuperate, making memories, and creative thinking.
- The statistical significance in a set of data is the...
- ...of the data lies within two standard deviations.
20 Clues: Inactive genes • Standard deviation equals... • organizing stimuli into groups • Psychology's big prehistoric debate. • Punished behavior is..., not forgotten • Regulates our daily schedule and body temperature • On a normal curve the standard deviation mean is... • ...of the data lies within two standard deviations. • One reason why antisocial effects can occur in humans • ...
Computer Vocabulary 2020-03-11
Across
- Random-access memory
- a facility allowing computers, smartphones, or other devices to connect to the Internet
- Provides additional features to a computer such as video, sound, advanced graphics, Ethernet or memory
- Passive form of cooling
- a unit of information equal to one million
- a unit of measurement for alternating current or electromagnetic
- Electronic device that connects a computer to a computer network
- Self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- a device that you connect to a home entertainment system
Down
- a hardware component that supplies power to an electrical device
- an abbreviation for Peripheral Component Interconnect
- Generates a feed of output images to a display device
- a small device able to be connected to and used with a computer
- Provides input and output of audio signals to and from a computer under control of computer programs
- One of the most common forms of network cable used on wired networks
- Used to measure the transmission speed of electronic devices, including channels, buses and the computer's internal clock
- Distributor of computer hardware
- The most essential parts of a computer system
- Read-only memory
- Central Processing unit
20 Clues: Read-only memory • Random-access memory • Passive form of cooling • Central Processing unit • Distributor of computer hardware • a unit of information equal to one million • The most essential parts of a computer system • an abbreviation for Peripheral Component Interconnect • Generates a feed of output images to a display device • ...
Technical Concepts Crossword 2020-09-04
Across
- types of malware; ads start popping up
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- a small amount of data sent over a network
- a software application for accessing the information on the World Wide Web
- the method by which information is converted into a secret code that hides the information's
- Internet service provider
- software with malicious behavior that aims to gather information about a person or organization
- pretends to be one thing, usually legit software, but hides malware inside
- the programs and other operating information used by a computer.
Down
- A mutually agreed method of communication
- Evil software
- transmission control protocol/Internet protocol, used to govern the connection of computer
- an interpreted, high-level and general-purpose programming language
- law, a prediction that transistors on chips -- double every 2 year
- local area network
- to the Internet.
- Crawler, a script that explores the web
- Smart Messaging Service(Can use satellites, emails) also known as message
- meaning
- a numeric system that only uses two digits — 0 and 1.
- A connected set of networks
- a computer program that modifies another computer program and executes its own code
22 Clues: meaning • Evil software • to the Internet. • local area network • Internet service provider • A connected set of networks • types of malware; ads start popping up • Crawler, a script that explores the web • A mutually agreed method of communication • a small amount of data sent over a network • a numeric system that only uses two digits — 0 and 1. • ...
ML Crossword Puzzle 2020-09-12
Across
- a group or system of interconnected people or things
- a neural network model whose goal is to predict the input itself
- the process of adding information in order to prevent overfitting
- the machine learning task of learning a function with labels' priori
- a function that can be "ON" (1) or "OFF" (0) depending on input
- Generative Adversarial Network
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
Down
- the act or process of normalizing
- an algorithm to efficiently calculate the gradients in a neural network
- a regularization technique for neural networks that prevents overfitting
- an open source machine learning framework based on the Torch library
- a function derived from two given functions by integration
- in contrast to feedback
- rectified linear unit
- an apparatus using mechanical power and having several parts
- notice taken of someone or something
- the process of partitioning a digital image into multiple segments
- arrange (things) in sets or groups
- involving or characterized by conflict or opposition
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • a group or system of interconnected people or things • involving or characterized by conflict or opposition • a function derived from two given functions by integration • ...
Technical Literacy Crossword 2020-09-03
Across
- An element that lets you jump from one file or location to another
- A device in computer chips used to switch electronic signals
- System of computer networks
- The process of encoding information
- Program displaying HTML files and used to navigate the World Wide Web
- Malware that pretends to be other software but hides danger inside
- Prediction that the number of transistors on a chip will double every 2 years, while the cost goes down by half
- Malware that causes ads to show up
- Smallest unit of information in computing
Down
- Malware that tries to get your info through keyloggers, your webcam, and microphone
- Malware that infects your computer, reproduces, and infects others
- Malware that locks your machine until a ransom is paid
- Protocol that checks if packets are all present at destination in correct order
- Program that finds information in response to keywords
- Malware that installs unwanted stuff on your machine
- Unit of data that carries information in pieces and combine together at destination
- Digital-only currency
- Data using a two-number system
- Servers that are used across the internet, commonly for storage
- Evil Software
20 Clues: Evil Software • Digital-only currency • System of computer networks • Data using a two-number system • Malware that causes ads to show up • The process of encoding information • Smallest unit of information in computing • Malware that installs unwanted stuff on your machine • Malware that locks your machine until a ransom is paid • ...
Diana's crossword 2024-03-22
Across
- rhythmic throbbing generated by contractions of the health detected over the major arteries of the body
- condition of diseased heart muscle
- sound
- pathological condition in which excess fluid accumulates in the pericardium
- pressure
- cardiovascular disease
- made up of blood vessels that carry blood away from and towards the heart
- not slow but____.
- heartbeat
- abnormal sound heard during auscultation of the heart
- vessels that return blood to the heart
- a fibroserous sac that encloses the heart
Down
- condition in which the atria beats more rapidly than the ventricles causing a quivering movement
- procedure used to stop atrial or ventricular fibrillation
- high blood pressure
- inflammation of the inner layer of the heart muscle
- networks of small vessels that perfuse tissue
- electrical device that is implanted in the chest to control abnormal cardiac rhythms
- prevent the backflow of blood between chambers
- atrial fibrillation
- a record of the electrical activity of the heart
- a shunt established surgically that allows blood to travel from the aorta to a branch of the coronary artery
- process of listening to the internal sounds of the body using a stethoscope
- pumps blood through the system
- surgical opening
25 Clues: sound • pressure • heartbeat • surgical opening • not slow but____. • high blood pressure • atrial fibrillation • cardiovascular disease • pumps blood through the system • condition of diseased heart muscle • vessels that return blood to the heart • a fibroserous sac that encloses the heart • networks of small vessels that perfuse tissue • prevent the backflow of blood between chambers • ...
Week 31 Quincy Adams 2024-04-15
Across
- be filled with wonder
- the arrangement of all visual elements on a webpage
- an area of control or a sphere of knowledge
- group of people that have been identified as the most likely potential customers
- provides cloud-based web development services
- easily understood or appreciated
- a computer suitable for use at an ordinary desk
- a tool that generates a full static HTML website based on raw data and a set of templates.
- a person who uses or operates something, especially a computer or other machine.
- negative space
- a system that empowers your users to interact with and use your product
Down
- internet as accessed via smartphones or other devices
- HyperText Markup Language
- someone who prepares content for the Web
- an area of control or a sphere of knowledge.
- Website function
- unique address that identifies a device on the internet
- a hypertext document on the World Wide Web
- Image Manipulation Program,
- Cascading Style Sheets
- a worldwide system of interconnected computer networks
- provider allocates space on a web server for a website to store its files
- a list of commands or options
- a collection of web pages
- advance or raise
25 Clues: negative space • Website function • advance or raise • be filled with wonder • Cascading Style Sheets • HyperText Markup Language • a collection of web pages • Image Manipulation Program, • a list of commands or options • easily understood or appreciated • someone who prepares content for the Web • a hypertext document on the World Wide Web • ...
Concepts for network requirements 2024-08-13
Across
- The ability of a network to grow and manage increased demand.
- A key factor in ensuring that network services are operational.
- A device that connects different networks.
- A measure of how well a network can recover from failures.
- A set of rules that dictate how data is transmitted over a network.
- A network structure where every device connects to a central hub.
- A network configuration that helps in load balancing and redundancy.
- Essential exchange of data or information within a network.
Down
- The software or hardware that controls network traffic.
- Technology enabling devices to connect wirelessly.
- A unique identifier assigned to each device in a network.
- A key requirement ensuring that the network can meet future needs.
- Planning and outlining how the network will function.
- The physical medium through which network signals travel.
- Protecting network data from unauthorized access.
- The process of evaluating network needs and potential problems.
- The speed at which data is transferred across a network.
- Amount of data that can be transmitted over a network.
- Part of the network where data is stored and managed.
- A link or association between network components.
20 Clues: A device that connects different networks. • Protecting network data from unauthorized access. • A link or association between network components. • Technology enabling devices to connect wirelessly. • Planning and outlining how the network will function. • Part of the network where data is stored and managed. • Amount of data that can be transmitted over a network. • ...
crossword 2024-06-17
Across
- Where data is saved permanently (e.g., hard drive, SSD).
- (Uniform Resource Locator): The address of a web page.
- A global network connecting millions of private, public, academic, business, and government networks.
- Electronic mail, a method of exchanging digital messages.
- A unique identifier for a user on a system.
- (Central Processing Unit) The brain of the computer that processes instructions.
- Wireless technology for connecting devices to the internet.
- A wireless technology for exchanging data over short distances.
- A secret word or phrase used to authenticate access.
Down
- An electronic device for storing and processing data.
- A collection of web pages on the internet.
- The physical parts of a computer.
- Programs and operating information used by a computer.
- System (OS) Software that manages computer hardware and software (e.g., Windows, macOS).
- Storage Saving data on remote servers accessed via the internet.
- DeviceA device that receives data from a computer (e.g., monitor, printer).
- Device A device used to provide data to a computer (e.g., keyboard, mouse).
- A group of interconnected computers.
- Software used to access the internet (e.g., Chrome, Firefox).
- (Random Access Memory) Short-term memory that stores data temporarily.
20 Clues: The physical parts of a computer. • A group of interconnected computers. • A collection of web pages on the internet. • A unique identifier for a user on a system. • A secret word or phrase used to authenticate access. • An electronic device for storing and processing data. • Programs and operating information used by a computer. • ...
Mr. Singer's Technology Crossword 2023-02-04
Across
- - A path for electricity to flow
- - a device that forwards data between networks
- - A collection of related data
- - Software that manages the resources of a computer
- - Information that is stored and processed by a computer
- - A visual way of interacting with a computer
- - A global network of connected devices
- - The last name of your technology teacher
- - Software that translates code into machine language
- - A type of networking protocol used to connect devices
- - A language used to create websites
- - A virtual place to store and access data and programs over the Internet
Down
- - The central processing unit, or "brain," of a computer
- - A unit of measurement for digital information
- - Data that is entered into a computer
- - Measures taken to protect against online threats
- - Finding and fixing errors in code
- - A brand of 3D design software
- - A coding platform that utilizes blocks instead of text
- - A set of steps for solving a problem or achieving a goal
- - A program that can harm a computer or steal information
- - A security system that blocks unauthorized access to a network
- - A system of numbers using only two digits, 0 and 1
23 Clues: - A collection of related data • - A brand of 3D design software • - A path for electricity to flow • - Finding and fixing errors in code • - A language used to create websites • - Data that is entered into a computer • - A global network of connected devices • - The last name of your technology teacher • - A visual way of interacting with a computer • ...
Medical Terms Unit 5 Lab 2023-03-22
Across
- test that uses ultrasound to look at the heart and its vessels.
- for automated external defibrillator
- monitor/a portable ECG machine that the patient wears over a few days
- of small vessels that perfuse tissues.
- procedure done in a specialized area of radiology
- for blood
- suffix for written record
- swollen and dilated veins
- that deliver blood to tissues.
- condition in which the pericardial sac around the heart is inflamed
- the heart lies in the middle
- for chief complaint
- to listen for the sounds of the heart, but it also helps us listen to other body sounds like the lungs and intestines
Down
- prefix for between
- to measure pressure
- suffix for inflammation
- blood through the system.
- condition in which an artery has a weakened wall, causing it to swell, like a balloon
- as high blood pressure
- is a complete stopping of the heart.
- that return blood to the heart
- for do not resuscitate
- suffix for pertaining to
- prefix for slow
- for basic metabolic panel
25 Clues: for blood • prefix for slow • prefix for between • to measure pressure • for chief complaint • as high blood pressure • for do not resuscitate • suffix for inflammation • suffix for pertaining to • blood through the system. • suffix for written record • swollen and dilated veins • for basic metabolic panel • the heart lies in the middle • that return blood to the heart • ...
Techwest Trainning 2023-08-14
Across
- First information that you ask to create a ticket ___
- Techwest operation hours from Monday to Thursday
- Techwest offers ____ and Adobe software update and installation.
- Techwest provides a ____ consultation to all active UWG students, staff, and faculty
- Good customer service implies active listening, patience, and good____.
- ___ email is required to reset password
- What does SITS stand for? ____ ____ ____ ____
- When should I create a ticket for a customer walk-up? ____
- Techwest is located on the ___ floor of the Ingram library
Down
- Techwest operation hours on Friday
- Forget all existing networks and try again are steps to rest ___
- Who can help me “unlock” a MAC address? ____ ____ ____
- What is the dress code for student assistants at Techwest? ___ ___
- What are students to do if they need help with wifi in their residence hall? ____ ____
- Cannot check in a device if it is under ____
- What is the name of the website used to reset OneLogin email account? ___ ___
- Website to create tickets
- What group provides direct support to Techwest? ____ _____
- Techwest replace hard drives and ___
- MFA is reset when students do not get a___
- Account is used to print.
21 Clues: Website to create tickets • Account is used to print. • Techwest operation hours on Friday • Techwest replace hard drives and ___ • ___ email is required to reset password • MFA is reset when students do not get a___ • Cannot check in a device if it is under ____ • What does SITS stand for? ____ ____ ____ ____ • Techwest operation hours from Monday to Thursday • ...
Graduation Crossword Puzzle 2024-12-19
Across
- The degree Benji earned
- One who completes an academic program successfully
- The pursuit of knowledge to solve unanswered questions
- Turning your research into a written document for others to learn from
- Neural network architecture named after Sesame Street
- A written report to share research findings
- A basic neural network architecture (three words)
- What you do to test a hypothesis
- A periodic event where researchers get together to talk about research
- Benji's first collaboration paper, about learning execution semantics
Down
- An educated guess waiting to be tested
- Something you don't want in your code or your soup
- An essential ingredient of a PhD
- The systematic study of the natural world
- The fuel of late-night programmers and researchers
- A machine learning model inspired by brain connections (two words)
- Benji's closest coworker
- What you call it when lots of code gets together
- A large AI model trained to understand and generate language
- A branch of AI inspired by the human brain (two words)
- The highest academic degree you can achieve
- Benji's second paper, about graph neural networks
- A machine that processes information at lightning speed
- How we tell computers what to do
24 Clues: The degree Benji earned • Benji's closest coworker • An essential ingredient of a PhD • What you do to test a hypothesis • How we tell computers what to do • An educated guess waiting to be tested • The systematic study of the natural world • A written report to share research findings • The highest academic degree you can achieve • ...
Preision Ag Crossword Review 2024-11-22
Across
- _____ segment receives and interprets signals.
- ______ accurately define each locatino on the earth's surface.
- layer located 0-30 miles above the earths surface is called?
- Control acts as a _____ switch
- kinematic,What is RTK?
- of precision will be ____ when satellites are closer together
- utilizes known distances to accurately determine locations?
- information to controller to gain a response.
Down
- Shift,The difference in distances between datums is called?
- measurement that calculates the effects of timing errors.
- of the three major applications of precision agriculture.
- layer that contains electrical charge particles.
- agressiveness determines on how the equipment stays on the chosen line.
- consists of signals being received at a _____ angle.
- runs parallel to the equator?
- Speed,The speed the piece of equipment needs to be going to engage auto steer
- errors,Signals that bounce and reflect of buildings and mountains are called?
- _____ are made up of multiple stations.
- European made satellite made in 2016.
- offline,The distance a piece of equipment can be from the guidance line for auto steer to engage
20 Clues: kinematic,What is RTK? • runs parallel to the equator? • Control acts as a _____ switch • European made satellite made in 2016. • _____ are made up of multiple stations. • information to controller to gain a response. • _____ segment receives and interprets signals. • layer that contains electrical charge particles. • consists of signals being received at a _____ angle. • ...
Computing's Impact on Society - A Crossword Adventure 2025-05-01
Across
- What is the protection of digital information from unauthorized access called?
- The imparting or exchanging of information.
- The introduction of new things, ideas, or ways of doing something.
- A step - by - step procedure for calculations.
- What technology combines computer science and algorithms to make machines “smart”?
- A group of interconnected people or things.
- A very important change in the way that people do things.
- Physical parts of a computer system
- The device that processes data and runs programs.
- The branch of technology that deals with the design, construction, operation of robots.
- A global system of interconnected computer networks.
Down
- Programs and data that tell a computer what to do.
- What is the process of creating programs for computers called?
- A complete change in form, appearance, or nature.
- Facts and statistics collected together for reference or analysis.
- The process by which businesses or other organizations develop international influence.
- What is the collective term for industries based on digital technology?
- Relating to or using computer technology.
- What work mode became more popular due to computer and Internet technology?
- What business model has flourished with the help of the Internet and computers?
20 Clues: Physical parts of a computer system • Relating to or using computer technology. • The imparting or exchanging of information. • A group of interconnected people or things. • A step - by - step procedure for calculations. • A complete change in form, appearance, or nature. • The device that processes data and runs programs. • ...
FAI unit 5 Crossword puzzle 2025-04-30
Across
- – Tech company that created GPT models.
- – Network inspired by the human brain.
- – A computer's ability to identify objects from images. ExpertSystem – Software that mimics human decision-making.
- – The opposite of artificial.
- – AI field concerned with giving computers the ability to learn. Chatbot – Simulated conversation with a machine.
- – A statistical model often used in AI.
- – Machines performing tasks requiring human intelligence.
- – AI used to detect fraud or spam.
- – The “thinking” part of an AI model.
- – Type of AI that imitates human behavior.
- – Subfield dealing with human language understanding.
- – Tech giant that owns DeepMind.
Down
- – Siri is an example of this. Alexa – Popular AI voice assistant by Amazon.
- – Common AI metric for success.
- – Algorithms learn without labeled data in this method.
- – A learning method using reward and punishment.
- – AI tool for creating deepfakes (Generative Adversarial Network).
- – Self-updating AI model from experience.
- – Type of learning using labeled data.
- – IBM's AI that competed on Jeopardy!
- – Common term for computer-generated opponent
- – Collection of structured data for training AI.
- – Google’s open-source AI framework.
- – Creator of the Turing Test.
- – AI-based program that plays chess or Go (like AlphaZero).
- – A key component of neural networks.
- – Common language used in AI development.
27 Clues: – The opposite of artificial. • – Creator of the Turing Test. • – Common AI metric for success. • – Tech giant that owns DeepMind. • – AI used to detect fraud or spam. • – Google’s open-source AI framework. • – IBM's AI that competed on Jeopardy! • – A key component of neural networks. • – The “thinking” part of an AI model. • – Type of learning using labeled data. • ...
FAI - UNIT 5 - CROSSWORD 2025-04-25
Across
- Visual layout of multiple plots
- Visualization library based on Matplotlib
- Content generator using NLP models
- AI model used in creative writing
- Jasper helps generate this type of content
- AI tool that converts spoken words into text
- Cloud platform from Amazon
- AI task performed in Google Docs via Jasper
- Visual plots made using Seaborn
- Mathematical model used in AI training
- Google’s multimodal AI model
- Google’s data and traffic analysis tool
- TensorFlow’s high-level API
- an open-source computer vision and image processing library.
Down
- Device for deploying edge AI
- OpenCV supports this type of tracking
- AI in vehicles to detect lanes
- Transformer model technique used in ChatGPT
- AI used in voice assistants like Siri
- Visual tool in TensorFlow to track model training
- Domain where AI is used to detect fraud
- _____enable deep learning models to analyze big data and make accurate predictions.
- OpenCV converts this to grayscale
- Used in Google Colab for cloud GPU access
- Image format output from Matplotlib
- PyTorch feature allowing dynamic graphs
- AI tool for conversational response generation
- AI platform developed by Facebook AI
- Common optimization technique in ML
- PyTorch supports these neural networks
30 Clues: Cloud platform from Amazon • TensorFlow’s high-level API • Device for deploying edge AI • Google’s multimodal AI model • AI in vehicles to detect lanes • Visual layout of multiple plots • Visual plots made using Seaborn • AI model used in creative writing • OpenCV converts this to grayscale • Content generator using NLP models • Image format output from Matplotlib • ...
INF201 Crossword 2025-05-15
Across
- Understanding the cause and scope of an incident
- A memory overwrite caused by excessive data input
- Isolating affected systems to prevent spread
- Cross-functional groups coordinating governance activities
- First phase in incident response: planning and readiness
- VPN mode used for host-to-host connections
- Risk strategy that reduces impact or likelihood
- Identifying potential security incidents promptly
- Abbreviation for attack where communication is intercepted and altered
- Creates a secure tunnel over public networks
- What your business loses when public trust is damaged
Down
- Internal secure gateway for accessing internal systems
- A hardened public-facing system used for secure remote access
- Security device that protects web applications from attacks like XSS and SQLi
- Risk strategy that eliminates the source of risk entirely
- Risk strategy that shifts responsibility to a third party
- Risk strategy that takes no action because the risk is tolerable
- Restoring normal operations after an incident
- Following laws, standards, and internal policies
- Removing the threat and fixing vulnerabilities
- Database attack that exploits misconfigured input validation
- VPN mode used for site-to-site connections
- Governance structure that sets strategic security direction
23 Clues: VPN mode used for host-to-host connections • VPN mode used for site-to-site connections • Isolating affected systems to prevent spread • Creates a secure tunnel over public networks • Restoring normal operations after an incident • Removing the threat and fixing vulnerabilities • Risk strategy that reduces impact or likelihood • ...
Tech Trails: The Ultimate IT Crossword 2025-07-30
Across
- A control structure used for repeating a block of code.
- The smallest unit of data in computing.
- An open-source operating system kernel.
- A small, fast memory located close to the CPU.
- Software designed to disrupt or damage a computer system.
- A cyber-attack that tricks users into giving up sensitive information.
- Address A unique string identifying each device on a network.
- The standard markup language for creating web pages.
- A device that forwards data packets between networks.
- A language used to communicate with and manage databases.
- Storing and accessing data over the internet instead of a local drive.
Down
- A program that converts source code into executable code.
- A widely-used, class-based, object-oriented programming language.
- A network security system that monitors and controls incoming and outgoing traffic.
- An error in a program that prevents it from running correctly.
- The blinking indicator showing where the next character will appear on the screen.
- A type of computer memory that is volatile and temporary.
- The smallest unit of a digital image or display.
- A high-level programming language known for its simplicity.
- A version control system used for tracking changes in source code.
20 Clues: The smallest unit of data in computing. • An open-source operating system kernel. • A small, fast memory located close to the CPU. • The smallest unit of a digital image or display. • The standard markup language for creating web pages. • A device that forwards data packets between networks. • A control structure used for repeating a block of code. • ...
1st Semester Reinforcement 2.0 2023-01-06
Across
- document we check when we're confused on a project
- amount of data that can be transmitted in a fixed time period
- another great example of an output device
- first step in creating a database
- a great example of an output device
- process of placing one format into another so that it can be delivered
- system formed by links
- component over which the message travels
- raw bits/pieces of information
- time it takes to travel from source to destination
- responsible for video output
- ________ can be linked by networks to share data
- a great example of an input device
- another great example of an input device
- outer edges of document
Down
- also known as extenders, regenerate signal so it can be sent further
- page orientation that has more room going left and right
- responsible for audio output
- 11010101000101
- act of discarding redundant data
- protects data/devices from unauthorized access
- involves a "three-way handshake"
- uses analog modem to transmit data over telephone lines
- the "brain" of the computer
- little overhead, less reliable
- houses all the components
- little helpers that pitch in
- what a VPN is best remembered as
28 Clues: 11010101000101 • system formed by links • outer edges of document • houses all the components • the "brain" of the computer • responsible for audio output • responsible for video output • little helpers that pitch in • raw bits/pieces of information • little overhead, less reliable • act of discarding redundant data • involves a "three-way handshake" • ...
TECHNOLOGY RELATED WORDS 2023-03-22
Across
- external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- effective communicators
- a set of instructions, data or programs used to operate computers and execute specific tasks
- independent learners and collaborative workers
- computer program designed to carry out a specific task other than one relating to the operation of the computer itself
- devoted catholics
- a set of integrated devices that input, output, process, and store data and information
- having or showing intelligence, especially of a high level.
- outgoing and socially confident
- causing laughter or amusement; humorous.
Down
- problem solvers and critical thinkers
- unable to concentrate because one's mind is preoccupied.
- machine that can be programmed to carry out sequences of arithmetic or logical operations
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- electrical circuits that have electrical components
- an abbreviated form of the word "application."
- the manufacturers of computers considered collectively
- responsible citizens
- a machine resembling a human being and able to replicate certain human movements and functions automatically.
- kind and pleasant.
20 Clues: devoted catholics • kind and pleasant. • responsible citizens • effective communicators • outgoing and socially confident • problem solvers and critical thinkers • causing laughter or amusement; humorous. • independent learners and collaborative workers • an abbreviated form of the word "application." • electrical circuits that have electrical components • ...
Data Communication 2025-02-11
Across
- __________ allows data to be transmitted at 10-30 bps.
- __________ is an example of a system that only allows data to travel at 10-30bps.
- ____________ cables have been used in telephone networks for over 100 yrs
- __________ cables are actually a bundle of glass fibres that can transmit light.
- Data Communication is the ______ transmission of data from a sender to a receiver
- _________ allows data transmission at over 8 Mbps,
- ____________ is an example of systems that allow data transmission of up to 64Kbps
- __________is another name for a communication channel.
- The P in VoIP stands for _______ .
- _________ is on method of data communication.
Down
- ______________are an example of systems that allow data transmission of over 8 Mbps.
- This allows data transmission of up to 64Kbps
- ______________ signals are not able to use broadcast communication.
- _________ is the maximum amount of data that can travel along a communication channel at any given time.
- ________ have a distance that ranges from few meters to millions of Kilometers.
- This type of communication channel is very convenient.
- __________ signals have a very short distance. Range
- This type of communication channel uses wires or cables.
- ___________ cables carry electronic currents at radio frequencies.
- The V in VoIP stands for _______ .
20 Clues: The V in VoIP stands for _______ . • The P in VoIP stands for _______ . • This allows data transmission of up to 64Kbps • _________ is on method of data communication. • __________ signals have a very short distance. Range • __________ allows data to be transmitted at 10-30 bps. • This type of communication channel is very convenient. • ...
Banking Terminologies 2025-09-14
Across
- Official complaint raised by a customer.
- ATM card that allows you to pay for goods at stores or businesses, online.
- Paying for a product or service
- a record of any financial exchange
- Government agency insuring deposits up to $250,000.
- Moving funds from one account to another.
- Banks providing funds to a customer.
- Platform used for banking using internet.
- Contains info about credit history. Lenders use these reports to make lending decisions.
- Money earned on deposits or paid on loans.
- A customer repaying a loan.
Down
- Criminal act done using computers and networks.
- A loan secured by real estate. .
- Occurs when you spend more money than you have.
- form of automatic payment.
- Financial cooperatives that provide traditional banking services to their members.
- Charters, regulates, and supervises all national banks and federal savings associations.
- secret number that protects the security of an account.
- Protects consumers by enforcing federal consumer financial laws and providing education.
- Adding money to an account.
- Taking money out of an account.
- Card that allows you to spend up to a specific limit
- Annual rate that is charged for borrowing.
- Verification process for a customer.
- Charges for specific banking services.
25 Clues: form of automatic payment. • Adding money to an account. • A customer repaying a loan. • Paying for a product or service • Taking money out of an account. • A loan secured by real estate. . • a record of any financial exchange • Banks providing funds to a customer. • Verification process for a customer. • Charges for specific banking services. • ...
Network and Internet 2021-01-02
Across
- Connects a computer to a network
- Can act as a gateway
- Aends the transmitted data to all computers
- The name of an organisation maintaining the site
- Acts as the mediator in a network
- Key device within a client-server network
- This server can also act as a data filter
- This server checks usernames & passwords
- Server which manage files on the network
- Used to amplify the signal in a network
- A program or hardware device that filters the information coming through the Internet
- Modulate and demodulate the signals
Down
- Method of scrambling data to ensure security
- The global network
- Link a web page to another page
- To view files on the web, you need this
- Method used to track a device on a network
- Dynamic address
- This allows devices with Wi-Fi connectivity to connect to wired networks
- Provides the internet facility
- One million bits equals to how many Megabytes
- This server is used to keep installed all the programs, software, etc.
- Connects two different types of network
- This software prevents users from accessing inappropriate information
- Changing static address
25 Clues: Dynamic address • The global network • Can act as a gateway • Changing static address • Provides the internet facility • Link a web page to another page • Connects a computer to a network • Acts as the mediator in a network • Modulate and demodulate the signals • To view files on the web, you need this • Connects two different types of network • ...
RU ITEC411-Chapter 5 Crime and Security 2025-10-22
Across
- Published false statement that damages someone's reputation
- Self replicating malicious software that spreads through networks automatically
- Highly sophisticated computer worm that targeted Iranian facilities
- Identity theft technique using text messages to obtain financial information
- Security system that monitors and filters network traffic from suspicious sources
- Security incident where unauthorized parties access protected systems or data
- International organization whose members agree on cross-border trade and service rules
- Unauthorized access to computer systems without permission
- Legal term describing unauthorized computer system entry
- Using computer techniques to promote political causes
- Converting data into coded format to protect stolen information from being useful
Down
- Authentication method using unique biological characteristics like fingerprints
- Scientific process of retrieving digital evidence from computers and storage devices
- Fraudulent emails disguised as legitimate communications to steal personal information
- Exposing security flaws or wrongdoing within an organization
- Verifying the identity of users or the legitimacy
- Decoy website set up to attract and study hacker behavior
- Cyber attack using false websites planted in domain name servers to collect data
- Federal law passed in 1984 making unauthorized computer access illegal
- Voice based fraud method where criminals call victims pretending to be legitimate businesses
20 Clues: Verifying the identity of users or the legitimacy • Using computer techniques to promote political causes • Legal term describing unauthorized computer system entry • Decoy website set up to attract and study hacker behavior • Unauthorized access to computer systems without permission • Published false statement that damages someone's reputation • ...
Science Branches 2025-11-15
Across
- Study of adaptive and innate defense networks regulating host protection
- Structural analysis of organismal morphology from macroscopic to microstructural levels
- Physics branch exploring propagation, refraction, and quantum behavior of photons
- Study of fungal evolution, pathogenicity, and ecological roles within ecosystems
- Science concerned with biotic–abiotic interactions shaping ecosystem dynamics
- Application of physical laws to stellar, galactic, and cosmological phenomena
- Field investigating mechanisms of inheritance and molecular transmission of traits
- Science assessing biochemical impacts of xenobiotics and exposure-related risk
- Science interpreting functional mechanisms of biological systems across scales
- Characterization of crystalline structures, mineral genesis, and geochemical properties
Down
- Study of lithospheric composition, stratification, and transformative Earth processes
- Field specializing in unicellular and acellular organisms and their biochemical pathways
- Interdisciplinary exploration of marine systems, including chemical cycles and currents
- Biological discipline focused on photosynthetic taxa and plant phylogeny
- Reconstruction of prehistoric biodiversity through fossil stratigraphy and morphology
- Investigation of molecular reactions sustaining cellular metabolism and regulation
- Atmospheric science examining thermodynamic patterns governing climate and weather
- Study of multicellular heterotrophs within the animal kingdom and their diversity
- Science interpreting crustal stress patterns through seismic wave analysis
- Discipline that analyzes extragalactic phenomena and cosmic evolution
20 Clues: Discipline that analyzes extragalactic phenomena and cosmic evolution • Biological discipline focused on photosynthetic taxa and plant phylogeny • Study of adaptive and innate defense networks regulating host protection • Science interpreting crustal stress patterns through seismic wave analysis • ...
The journey of food 2024-03-18
Across
- What factors affect farmers' choices of crops or livestock?
- role does marketing play in shaping consumer behaviour when they consume food?
- What are some activities involved in food production?
- concern What influences consumers' food choices, such as taste, culture, or dietary needs?
- need How do consumers make decisions about what foods to buy and eat?
- How does the environment impact food production?
Down
- What challenges are faced in distributing perishable versus non-perishable foods?
- What methods are used to distribute food, and how do they vary by food type?
- How does food packaging and presentation affect consumer decisions?
- How do farmers ensure the quality and safety of their products during production?
- food How do distribution networks ensure efficient and safe delivery of food?
- What is the role of transportation and logistics in food distribution?
12 Clues: What are some activities involved in food production? • How does the environment impact food production? • What factors affect farmers' choices of crops or livestock? • How does food packaging and presentation affect consumer decisions? • What is the role of transportation and logistics in food distribution? • ...
Computer Newtwork Puzzle 2023-02-07
Across
- two or more devices connected together exchange data
- Computer networks that are not connected by and cable.
- The maximum amount of data transmitted over an internet connection in a given amount of time
- A cable which connects two or more devices to share
- Devices that are linked with each other by a cable.
Down
- transfer of data from one digital device to another
- Broadcasts data to every computer or Ethernet based devices connected with it
- A computer program or device that provides a service to another computer program and its user
- Rules about transmitting data between different devices on the same network.
- Copper cables or fibre optic cable to form the connections between the networked devices
- recieves and sends data
- exchange of computer-stored messages from one user to one or more recipients via the internet
12 Clues: recieves and sends data • transfer of data from one digital device to another • A cable which connects two or more devices to share • Devices that are linked with each other by a cable. • two or more devices connected together exchange data • Computer networks that are not connected by and cable. • ...
Unit 5 - Interdependence 2025-05-23
Across
- Term for the world seen as a community connected by technology and communication (2 words)
- Relationships influencing power, policy, and governance across nations (2 words)
- Relationships between people and natural ecosystems (2 words)
- A person who moves to another country to live permanently (1 word)
- Bonds formed through shared art, language, traditions, or beliefs (2 words)
Down
- Someone forced to flee their country due to conflict or persecution (1 word)
- Links between people, places, and economies worldwide (2 words)
- A person's perspective shaped by culture, experience, and belief (1 word)
- The routes and networks that link global transportation and tourism (2 words)
- Links formed through the exchange of goods and services between countries (2 words)
- People who see the world as a shared community and take responsibility beyond borders (2 words)
- Polluted precipitation that damages forests and waterways (2 words)
12 Clues: Relationships between people and natural ecosystems (2 words) • Links between people, places, and economies worldwide (2 words) • A person who moves to another country to live permanently (1 word) • Polluted precipitation that damages forests and waterways (2 words) • A person's perspective shaped by culture, experience, and belief (1 word) • ...
Azure Core Day of Learning | March 2023-03-14
Across
- ----- -------- Reinforcement Learning method was used to transform GPT to chatGPT.
- Microsoft and this company have agreed to a 10-year partnership to bring Xbox PC games
- Inventor of Paxos Algorithm
- Project name for Azure Global Erasure coding support
- An open-source package manager, designed to enable developers to share reusable code
- A work item logged on partner teams in Microsoft during semester planning
Down
- This company is the creator of popular image generation tool Dall-E and the chatbot ChatGPT
- Number of ERGs that Microsoft has globally
- A venture-backed data center chip startup, recently acquired by Microsoft
- ----- language models are computer programs for natural language processing that use deep learning and neural networks, like GPT-3
- The, now deprecated, dedicated Azure datacenter for German tenants
- Which attention based architecture is used to build GPT?
12 Clues: Inventor of Paxos Algorithm • Number of ERGs that Microsoft has globally • Project name for Azure Global Erasure coding support • Which attention based architecture is used to build GPT? • The, now deprecated, dedicated Azure datacenter for German tenants • A venture-backed data center chip startup, recently acquired by Microsoft • ...
2ο Κεφ.10 2024-10-11
Across
- Οι εφαρμογές παρέχουν την δυνατότητα πληρωμών και .......... μέσω του διαδικτύου
- Ποια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις)
- Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις)
- Με ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή
- Ποια είναι η κυριότερη υπηρεσία Διαδικτύου που αφορά στην επικοινωνία μεταξύ χρηστών (2 λέξεις)
- Ποια είναι μία κατηγορία υποδίκτυου
Down
- Αυτή έχει ενσωματωθεί ως λειτουργία σε εφαρμογές τηλεφωνίας και βιντεοκλήσεων (2 λέξεις)
- Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τους
- Οι εγγενείς εφαρμογές,οι οποίες εκτελούνται αυτόνομα με την βοήθεια του.....................(2 λέξεις)
- Τι έχει αναπτυχθεί για την πιο εύκολη πλοήγηση του διαδικτύου,που εκτελούνται μέσω του προγράμματος πλοήγησης
- Πώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένου
- Τα P2P-(peer to peer networks) παρέχουν κυρίως υπηρεσίες ανταλλαγής.......
12 Clues: Ποια είναι μία κατηγορία υποδίκτυου • Πώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένου • Ποια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις) • Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις) • Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τους • Με ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή • ...
U11 - Review Cyber Security Plan, Constraints & Test Plan 2025-11-17
Across
- (6,3,8) A type of testing ensures data can be restored.
- (11,7) Simulate attacks to find weaknesses.
- (5,3,16) as part of the CSP who manages security, audits, and response.
- This part of the CSP ensures confidentiality, integrity, and availability of information.
- (6,7) A type of testing that verifies permissions and authentication.
Down
- This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
- (13,8) Automated tools to detect flaws.
- These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
- (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
- (5,8,4) (CSP) This outlines how to protect systems, data, and networks
- Defines which systems, applications, and data are covered in the CSP.
- (4,4) This ensures the security measures work as intended.
12 Clues: (13,8) Automated tools to detect flaws. • (11,7) Simulate attacks to find weaknesses. • (6,3,8) A type of testing ensures data can be restored. • (4,4) This ensures the security measures work as intended. • Defines which systems, applications, and data are covered in the CSP. • (6,7) A type of testing that verifies permissions and authentication. • ...
sams networks computer 2018-06-21
4 Clues: what were you eating in the cinema • what were u watching in the cinema • what are we doing in computer science • what did someone call you in the crowd
Computer Networks 2015-01-04
TECT TIMES CROSSWORD 2021-11-01
Across
- allows a computer to send and receive data over A telephone line or a cable or satellite connection
- does ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets.
- electronic device that amplifies the signal it receives.
- connects two subnetworks as a part of the same network
Down
- used to combine, split,switch, boost or direct packets of information along a network
- a physical layer networking device that joins multiple networks together
- used to connect multiple network hosts as well as to do data transfer.
7 Clues: connects two subnetworks as a part of the same network • electronic device that amplifies the signal it receives. • used to connect multiple network hosts as well as to do data transfer. • a physical layer networking device that joins multiple networks together • does ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets. • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- bonds that transfer electrons
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
- bond The bond that can hold atoms together in large networks or small groups.
Down
- Two or more atoms held together by covalent bonds.
- The bond that can hold atoms together in large networks or small groups.
- A substance made of atoms of two or more elements.
- bonds that share electrons
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Tan Su Kyi - 8 Gamma 2023-01-19
Across
- An app where you use to communicate and call with your friend.
- We should _________ our password once a year.
- You have the _________ to find out what information the government & other organisations store about you.
Down
- It is a practice of protecting systems, networks & programs from digital attacks.
- Created when that data has been processed and become meaningful.
- A social media app that you can connect with friends, family and other people you know.
- Any company might hold your ________ information that you have in your account.
7 Clues: We should _________ our password once a year. • An app where you use to communicate and call with your friend. • Created when that data has been processed and become meaningful. • Any company might hold your ________ information that you have in your account. • It is a practice of protecting systems, networks & programs from digital attacks. • ...
Computer Networking 2023-04-02
Across
- a computer or computer program which manages access to a centralized resource or service in a network
- physical element of a computer
- a global computer network providing a variety of information and communicating facilities, consisting of interconnected networks using standardized communication protocols
Down
- string of characters used to verify the identity of a user during the authentication process
- machine that can store and process information
- programs and other operating information used by a computer
- facts and statistics collected together for reference or analysis
7 Clues: physical element of a computer • machine that can store and process information • programs and other operating information used by a computer • facts and statistics collected together for reference or analysis • string of characters used to verify the identity of a user during the authentication process • ...
Network management 2023-08-17
Across
- A security device or software that filters incoming and outgoing network traffic
- The maximum data rate that a network or internet connection can handle
Down
- A security system that monitors network traffic for suspicious activities
- A network monitoring tool
- The delay between sending data from a source and receiving it at the destination, often measured in milliseconds (ms)
- A secure connection between remote networks or devices over a public network
- A system that translates human-readable domain names (like www.example.com) into IP addresses
7 Clues: A network monitoring tool • The maximum data rate that a network or internet connection can handle • A security system that monitors network traffic for suspicious activities • A secure connection between remote networks or devices over a public network • A security device or software that filters incoming and outgoing network traffic • ...
bbb 2023-09-12
Across
- To do something you really wanted to do.
- How you are liked, admired, supported by many people.
- To sing, dance, act, read a poem, etc. in front of people.
- Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
Down
- To organized people or things into a group or body.
- The first public appearance of a new product or show
- media Websites and apps (applications) that that let people create and share things online, or to join social networks.
7 Clues: To do something you really wanted to do. • To organized people or things into a group or body. • The first public appearance of a new product or show • How you are liked, admired, supported by many people. • To sing, dance, act, read a poem, etc. in front of people. • Made a song, movie or recording available for people to buy or listen to, read, watch, etc. • ...
nmm 2023-09-17
Across
- To do something you really wanted to do.
- How you are liked, admired, supported by many people.
- Media websites and apps (applications) that that let people create and share things online, or to join social networks.
- Organized people or things into a group or body.
Down
- Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
- The first public appearance of a new product or show.
- To sing, dance, act, read a poem, etc. in front of people.
7 Clues: To do something you really wanted to do. • Organized people or things into a group or body. • The first public appearance of a new product or show. • How you are liked, admired, supported by many people. • To sing, dance, act, read a poem, etc. in front of people. • Made a song, movie or recording available for people to buy or listen to, read, watch, etc. • ...
Cyber Attack Crossword 2024-09-03
Across
- A standalone malware that spreads over networks without needing to attach to other programs.
- A broad term encompassing any malicious software, including viruses, worms, Trojans, ransomware, spyware, and adware.
- Malware that secretly collects information about the user's activities and sends it to a third party.
Down
- Malware that encrypts files and demands payment to unlock them.
- Self-replicating software that attaches itself to other programs and spreads when those programs are executed.
- Malware disguised as legitimate software to trick users into installing it.
- Malware that displays unwanted advertisements.
7 Clues: Malware that displays unwanted advertisements. • Malware that encrypts files and demands payment to unlock them. • Malware disguised as legitimate software to trick users into installing it. • A standalone malware that spreads over networks without needing to attach to other programs. • ...
Global Markets - A2 Business 2021-01-24
Across
- Where a business function is contracted to a third party
- The cost of one currency expressed in terms of another
- This could be extended by selling a product in a new economy, such as an emerging or developing economy
Down
- Communication and transport networks
- occurs when a business relocates part of its business operations overseas
- A group of countries that agree to have low or no restrictions on trade, such as tariffs
- this body may give financial incentives to firms to start up in their own country
7 Clues: Communication and transport networks • The cost of one currency expressed in terms of another • Where a business function is contracted to a third party • occurs when a business relocates part of its business operations overseas • this body may give financial incentives to firms to start up in their own country • ...
VOCABULARY 2.01 2018-05-22
Across
- The use of computer technology to plan, design, test, and alter products
- A navigational system that uses satellite technology to determine location and provide directions
- Computerized storage for information and facts
Down
- Computer software designed to mimic the knowledge of a human expert
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- Technology that allows users to communicate over the Internet rather than through traditional public networks
7 Clues: Computerized storage for information and facts • Computer software designed to mimic the knowledge of a human expert • The use of computer technology to plan, design, test, and alter products • A navigational system that uses satellite technology to determine location and provide directions • ...
Tic-Tac-Toe Vocabulary 2015-04-27
Across
- a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- software used to view the Internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material
- Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- a group of connected computers
- network etiquette; Online manners; following the rules online, being a good digital citizen
- text or graphics that, when clicked, will connect the user to a new web page or another place
- a restricted computer network; a private network created using World Wide Web software
8 Clues: a group of connected computers • software used to view the Internet • a restricted computer network; a private network created using World Wide Web software • the unauthorized use, reproduction, distribution, or transmission of copyrighted material • network etiquette; Online manners; following the rules online, being a good digital citizen • ...
IT acronyms 2023-10-16
Across
- /A unit of measurement for internet speed or data transfer rate.
- /A domain-specific language used for managing and querying relational databases.
- / Software that manages computer hardware and provides services for computer programs.
- /A system that translates domain names into IP addresses, allowing internet navigation
Down
- /A coding language used for creating web pages and content on the internet.
- /A secure network connection that protects data while using public networks.
- /A type of data storage device that uses flash memory, typically faster and more durable than traditional hard drives
7 Clues: /A unit of measurement for internet speed or data transfer rate. • /A coding language used for creating web pages and content on the internet. • /A secure network connection that protects data while using public networks. • /A domain-specific language used for managing and querying relational databases. • ...
Fortinet: Crack the Code 2024-06-04
Across
- a tool for analyzing and reporting on network events and security logs.
- a network switch that connects and manages data traffic within a network.
- a security token that provides two-factor authentication for securing user access.
- a centralized management system for controlling all your fortigate devices and policies.
Down
- a system that manages user identity and access privileges across a network.
- a security appliance that acts as a firewall to protect networks from external threats.
- a cloud-based service that provides secure access to network resources from anywhere.
7 Clues: a tool for analyzing and reporting on network events and security logs. • a network switch that connects and manages data traffic within a network. • a system that manages user identity and access privileges across a network. • a security token that provides two-factor authentication for securing user access. • ...
7.1 Why Is Clean Water Important to Us? 2021-03-25
Across
- Rain falls on networks of drains, river and canals which will then be channelled here.
- A method used to remove salt from seawater and turns it into drinking water.
- A process which green plants use water, sunlight and carbon dioxide to make food.
- A method to collcet water vapour from seawater in desalination.
- not drinking enough of water may lead to ____.
Down
- Produced by recycling used water and is used mainly for industrial purposes.
- Water is found in our ____ to transport substances in our circulatory system.
- The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
- ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
- One of the Four National Taps are ___ water.
- Supports life processes.
11 Clues: Supports life processes. • One of the Four National Taps are ___ water. • not drinking enough of water may lead to ____. • A method to collcet water vapour from seawater in desalination. • Produced by recycling used water and is used mainly for industrial purposes. • A method used to remove salt from seawater and turns it into drinking water. • ...
Disney concepts on Race and Animation 2024-05-03
Across
- Films fictionalized storyworld of ethnoracial identity
- The drag queen that Ursula in The Little Mermaid is based on
- Princess characters who are passive in their stories by doing chores and waiting for a prince to save them
- The 1997 Cinderella film was made-for-TV cast screen opportunities
- A quality of Disney princesses that enables them the feel "timeless" despite societal changes
- A transitional period for Dinsey Studios after the loss of the Disney brothers
- Description of how black women are a result of "racialized and sexualized violence"
- Princess takes herself an active role in the film as a disruption
Down
- A robust period of innovation in amination
- A better representation of women of color "through the implementation of networks"
- Representation of Asia through a Western construction
11 Clues: A robust period of innovation in amination • Representation of Asia through a Western construction • Films fictionalized storyworld of ethnoracial identity • The drag queen that Ursula in The Little Mermaid is based on • Princess takes herself an active role in the film as a disruption • The 1997 Cinderella film was made-for-TV cast screen opportunities • ...
Humanities 2023-09-27
Across
- cortex, regulates our thoughts, actions and emotions
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- lack of success
- A problem with emotional or behavioral self-control
- It can treat inflammation
Down
- mindset, A growth mindset means that you thrive on challenge
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- a typical example or pattern of something
- It can cause or strengthen labor contractions during childbirth
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
