networks Crossword Puzzles
Course2 Crossword Puzzle 2022-02-23
Across
- Data packets in Ethernet layer are known as _____
- The least intelligent of the three hardware devices and is used for connecting computers within a single network
- 48 bit address that is a globally unique identifier attached to an individual network interface
- TCP/IP is a _____ layered model
- Twisted pair cable is an example of _____ layer in TCP/IP model
- A protocol most widely used to send data across individual links, belongs to data link layer
Down
- An address that is all F's
- The most intelligent connecting device used to connect two or more networks
- Hardware device that sends traffic to the appropriate computer rather than sending it to all the connected computers
- Radio technology is an example of _____ communication
- _____ duplex means communication in both the directions at the same time
11 Clues: An address that is all F's • TCP/IP is a _____ layered model • Data packets in Ethernet layer are known as _____ • Radio technology is an example of _____ communication • Twisted pair cable is an example of _____ layer in TCP/IP model • _____ duplex means communication in both the directions at the same time • ...
Neuroanatomy of the Spinal Cord 2024-02-03
Across
- The ____ reflex is a negative feedback loop used to maintain muscle at a desired length
- velocity-dependent resistance to movement in a single direction
- An abnormal reflex as a result of damage to the descending pathway or UMN syndrome
- the coordination of body movements to successfully navigate the environment
- loss or absence of stretch reflex
Down
- high resting state of tension accompanied by exaggeration of stretch reflex
- Spinal reflexes modulated by_____ control
- Networks of interneurons located in the thoracic and lumbar spinal cord that act as pattern generators for rhythmic movements associated with walking (abbreviation)
- low resting state of tension accompanied by reduction of stretch reflex
- what we call the neurons giving rise to the descending pathways
- located in spinal cord ventral horns and the motor nuclei of cranial nerves in the brainstem
11 Clues: loss or absence of stretch reflex • Spinal reflexes modulated by_____ control • velocity-dependent resistance to movement in a single direction • what we call the neurons giving rise to the descending pathways • low resting state of tension accompanied by reduction of stretch reflex • high resting state of tension accompanied by exaggeration of stretch reflex • ...
21st Century Skills 2013-03-17
Across
- the use of the imagination or original ideas, esp. in the production of an artistic work.
- the cognitive process of reaching a decision.
- is a mental process that involves discovering, analyzing and solving problems.
Down
- learning in digital networks. Learning through digital means
- To cooperate with, join together and participate; to work with each other to accomplish set goal(s).
- 2 ways of working are communication and......
6 Clues: the cognitive process of reaching a decision. • 2 ways of working are communication and...... • learning in digital networks. Learning through digital means • is a mental process that involves discovering, analyzing and solving problems. • the use of the imagination or original ideas, esp. in the production of an artistic work. • ...
Questions Part 3 2023-02-17
5 Clues: HDMI cables can be used for___ as well. • There are 2 broadcast media, which is audio and__ • __is where you can get more information about the company • There are 4 broadcast networks, which is NBC,CBS,ABC and__ • There are two forms of communication media, which is Analog and__
Cybercrime Crossword Puzzle 2021-07-13
Across
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- interception Interception made by technical means without right.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- the process of converting encrypted information back into normal, understandable text.
- what comes after terabyte
- Intentional or reckless alteration damaging deletion of computer data.
- is a concept describing a widespread interconnected digital technology.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- is pornography that exploits children for sexual stimulation
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • It is when an individual or entity with malice or in bad faith. • ...
Module 11 Chapter 7 Crossword 2020-07-11
Across
- Demilitarized Zone ; Part of a computer network controlled by a firewall that allows computers (such as web servers) to be accessible from the Internet but isolated from the internal network
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Information technology; technology involving the development, maintenance, and use of computer systems, software, and networks or the processing and distribution of data; Formerly called information systems
- Redundant array of independent disks; computer disk configuration that allows one or more disk drives to fail whereas maintaining the integrity of the data they are storing. Failed components may be replaced before they lead to a loss of data
- a complex system of interconnected elements.
- Central processing unit; hardware component that performs the processing in a computer.
- Computer that provides access to a shared file system and/ or increased computing capacity
- Virtual private network; utilizes software that provides an authenticated, encrypted connection
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- Wide area network; Network of computers (as the Internet) in a large area (as a country or the globe) for sharing resources or exchanging data. Contrast with LAN
- Computer or dedicated hardware device that restricts access between a protected network and the internet, or between other sets of networks.
- Structured query language; supports commands to create, update, and delete data. Provides the ability to submit both simple and highly sophisticated requests to the database application
Down
- a structured set of data held in a computer, especially one that is accessible in various ways.
- Uninterruptible power supply; Redundant backup power source used to protect computers in the event of a power surge or temporary power outage
- Random access memory; Hardware component in a computer where data and programs are temporarily stored during processing
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- The process of encoding electronic data, mating it unintelligible to unauthorized parties; typically involves the use of a key to encode the data in such a way that a unique key is required to decode the data. Keys must be securely communicated between the sender and the recipient.
- real-time electronic reporting of anatomic pathology reports
- Local area network; Network that operates only within a local area such as an office; Often used for sharing resources such as a printer and file storage devices
- type of malware that spreads copies of itself from computer to computer
20 Clues: a complex system of interconnected elements. • real-time electronic reporting of anatomic pathology reports • type of malware that spreads copies of itself from computer to computer • Central processing unit; hardware component that performs the processing in a computer. • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
ICT crossword revision CH 1 - 10 2025-05-16
Across
- a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
- a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
- a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
- is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
- LED
- a type of malicious software, or malware, that can infect computers and cause damage
- the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
- observing, interviewing, questionnaire and survey.
Down
- a type of display screen used in older televisions and computer monitors.
- is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
- It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
- Information and Communication Technology.
- a standard communication protocol used for sending short text messages over cellular networks.
- the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
- a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
- a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
- Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
- affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
- is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
- a text-based way to interact with a computer or software, using commands typed into a terminal.
- a fatal electrical injury that occurs when an electric current passes through the body and causes death.
- is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- the correct or acceptable way of using the internet.
25 Clues: LED • Information and Communication Technology. • observing, interviewing, questionnaire and survey. • the correct or acceptable way of using the internet. • a type of display screen used in older televisions and computer monitors. • a type of malicious software, or malware, that can infect computers and cause damage • ...
ITF Vocabulary 2022-03-08
Across
- This hardware provides more memory to the computer to run more programs and run them faster.
- a web file that contains information, website details, and user preferences.
- An OS that interfaces with the user through text only.
- a utility software that shows all running programs. Can be accessed through Ctrl + Alt + Esc
- Any hardware device that displays to the user the computer's results of processing
- This is the hardware that contains all the circuitry of the computer
- a computer language that consists of only 0 and 1
- This is one of the only Freeware OS available.
- This is the numeric address of a computer connected to the internet. It can be changed.
- The most storage heavy optical disk, the blu-ray
- A computer that shares it resources with others on a network
- An OS that interfaces with the user through graphics, icons, and text
- This is software that allows a single computer to run multiple virtual OS simultaneously
- A device that converts digital signals into analog signals
- This is the numeric address of a computer. It cannot be changed.
Down
- The most common Internet Standard that allows for multiple devices, and has speeds of upto 1 Gbps
- An RJ-45 cord that allows computers or modems to connect through a wire to the internet.
- a number language that ranges from 0-9
- A person who tries to exploit weaknesses in code to gain access to information within a program or system.
- This type of authentication uses more than one unique authentication method, such as a password and an SMS code.
- A type of SSD that is usually called a USB drive, USB stick, or thumb drive.
- This hardware takes the dangerous levels of heat away from the GPU & CPU and disperses it safely.
- Any hardware device that sends signal to a computer that the user interacts with
- This hardware helps takes the graphics processing away from the CPU through its own processing core.
- a computer language that ranges from 0-F
- A storage drive that consists of magnetic plates that spin around at certain RPMs
- A storage drive that consists of many microchips linked together
- A device that connects networks to networks
- Store Where you can purchase or download apps for your smartphone, tablet, or computer
- an attack on a computer or network where multiple computers are overwhelming it with packets.
- This is the basic language for creating web pages
- an optical disk that came after the CD but before the blu-ray disc
- This is the brain of the computer.
33 Clues: This is the brain of the computer. • a number language that ranges from 0-9 • a computer language that ranges from 0-F • A device that connects networks to networks • This is one of the only Freeware OS available. • The most storage heavy optical disk, the blu-ray • a computer language that consists of only 0 and 1 • This is the basic language for creating web pages • ...
A Level Chap 2 2023-01-10
Across
- network made up of a combination of other network topologies.
- method of data storage where data is stored on off-site servers.
- network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
- – network that uses separate dedicated servers and specific client workstations. All client computers are connected to the dedicated servers.
- network which is larger than a LAN but smaller than a WAN, which can cover several buildings in a single city, such as a university campus.
- wireless LAN.
- network that is centred around a person or their workspace.
- a server on a network where central files and other data are stored. They can be accessed by a user logged onto the network.
- device that needs access to the internet for it to work and depends on a more powerful computer for processing.
- network covering a very large geographical area.
Down
- cable made up of central copper core, insulation, copper mesh and outer insulation.
- device that connects LANs which use the same protocols.
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to all devices on the network (LAN).
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to a specific destination address only.
- modulator demodulator. A device that converts digital data to analogue data (to be sent down a telephone wire); conversely it also converts analogue data to digital data (which a computer can process).
- type of cable in which two wires of a single circuit are twisted together. Several twisted pairs make up a single cable.
- device used to boost a signal on both wired and wireless networks.
- device connected to a network (it can be a computer, storage device or peripheral device).
- device that connects LANs which use different protocols.
- network covering a small area such as a single building.
- . These cards allow devices to connect to a network/internet (usually associated with a MAC address set at the factory.
- wireless connectivity that uses radio waves, microwaves. Implements IEEE 802.11 protocols.
- device which enables data packets to be routed between different networks (for example, can join LANs to form a WAN).
- situation in which the same data is stored on several servers in case of maintenance or repair.
- wireless connectivity that uses radio waves in the 2.45GHz frequency band.
- client device which can work both off line and on line and is able to do some processing even if not connected to a network/internet.
26 Clues: wireless LAN. • network covering a very large geographical area. • device that connects LANs which use the same protocols. • device that connects LANs which use different protocols. • network covering a small area such as a single building. • network that is centred around a person or their workspace. • network made up of a combination of other network topologies. • ...
Chapter One Crossword Puzzle 2014-09-10
Across
- Determines the best way to move data and manages device addressing
- Communicates directly with the various types of communication media
- Dialog control between two devices happens at this layer
- Reads each frame as it passes through the network
- Software that maps to another layers' protocols
- Distance from the current network to the remote network
- Ensures messages are delivered to the proper device
- When routers connect two or more networks together and use logical addressing
- Receives a digital signal, reamplifies or regenerates that signal, then forwards it out the other port without looking at any data
Down
- Type of switching routers use
- Quantity of data segments, measured in bytes, that the transmitting machine is allowed to send without receiving and acknowledgement
- Ensures data is transferred from the Application layer
- Identifying and confirming the communication partner's availability
- The time measured from when a frame enters a port to when it exits a port
- Memory section where computers store datagrams
- Segments and reassembles data into a single data stream
- Efficiently breaks up a broadcast domain
17 Clues: Type of switching routers use • Efficiently breaks up a broadcast domain • Memory section where computers store datagrams • Software that maps to another layers' protocols • Reads each frame as it passes through the network • Ensures messages are delivered to the proper device • Ensures data is transferred from the Application layer • ...
CODING 2016-02-10
Across
- A term used to describe junk and unsolicited e-mail.
- an error in a computer program or system
- a wireless method for sending information
- either or both of two stated possibilities
- Another Computer term for “Starting a Computer”.
- systems works an interface between User and the hardware. It is basically the platform on which users work.
- A binary unit of data storage with only 2 digits 0 and 1.
- Used to provide the temporary storage of information function.
- A program that runs on a system against the owner’s or user’s wishes
Down
- a system of symbols and rules for writing programs or algorithms.
- It is a worldwide system of computer networks
- identify and remove errors from
- the quantities, characters, or symbols on which operations are performed by a computer
- It is a program that displays the files and data on internet
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A collection of data into a permanent storage structure stored on the hard drive.
- a place where power or information leaves a system.
17 Clues: identify and remove errors from • an error in a computer program or system • a wireless method for sending information • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer”. • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
CODING 2016-02-09
Across
- A wireless method of sending information
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A term used to describe junk and unsolicited e-mail.
- a symbol or function denoting an operation (e.g., ×, +).
- A binary unit of data storage with only 2 digits 0 and 1.
- an error in a computer program or system.
- a place where power or information leaves a system.
- It is a worldwide system of computer networks
Down
- It is a program that displays the files and data on internet
- A program that runs on a system against the owner’s or user’s wishes
- A collection of data into a permanent storage structure stored on the hard drive.
- Another Computer term for “Starting a Computer”
- the quantities, characters, or symbols on which operations are performed by a computer,
- identify and remove errors from
- a system of symbols and rules for writing programs or algorithms
- either or both of two stated possibilities
- Used to provide the temporary storage of information function.
17 Clues: identify and remove errors from • A wireless method of sending information • an error in a computer program or system. • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer” • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
Communication methods 2024-08-29
Across
- Outreach, Programs designed to engage students, such as internships or special events.
- Printed or digital materials (e.g., catalogs, brochures) that provide information on exhibitions and programs.
- Partnerships, Collaborations between government and private sector for mutual benefit.
- and Galas, Formal or celebratory gatherings, often for fundraising.
- Networks, Online communities (e.g., LinkedIn) where professionals connect and share opportunities.
- Resources, Online tools and content, like virtual tours or educational materials.
- Journals and Research Papers, Scholarly publications presenting original research.
- Programs, Opportunities for artists or professionals to work and develop within an institution.
- Training, Professional development opportunities for educators.
- Projects, Joint efforts between institutions or individuals to achieve common goals.
Down
- Reports, Yearly summaries of an institution's activities and financials.
- Packages, Offers to potential sponsors outlining benefits of financial support.
- Communication, Tailored messages or meetings addressing specific individuals.
- Reports, Documents published to inform the public about institutional activities.
- Regular emails sent to subscribers with updates and news.
- Proposals, Documents requesting funding for specific projects.
- Kits, Packages containing information and resources for journalists.
17 Clues: Regular emails sent to subscribers with updates and news. • Proposals, Documents requesting funding for specific projects. • Training, Professional development opportunities for educators. • and Galas, Formal or celebratory gatherings, often for fundraising. • Kits, Packages containing information and resources for journalists. • ...
7.1 Why Is Clean Water Important to Us? 2021-03-25
Across
- Rain falls on networks of drains, river and canals which will then be channelled here.
- A method used to remove salt from seawater and turns it into drinking water.
- A process which green plants use water, sunlight and carbon dioxide to make food.
- A method to collcet water vapour from seawater in desalination.
- not drinking enough of water may lead to ____.
Down
- Produced by recycling used water and is used mainly for industrial purposes.
- Water is found in our ____ to transport substances in our circulatory system.
- The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
- ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
- One of the Four National Taps is ___ water.
- Supports life processes.
11 Clues: Supports life processes. • One of the Four National Taps is ___ water. • not drinking enough of water may lead to ____. • A method to collcet water vapour from seawater in desalination. • Produced by recycling used water and is used mainly for industrial purposes. • A method used to remove salt from seawater and turns it into drinking water. • ...
Humanities 2023-09-27
Across
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- mindset, A growth mindset means that you thrive on challenge
- lack of success
- It can treat inflammation
- a typical example or pattern of something
Down
- A problem with emotional or behavioral self-control
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- It can cause or strengthen labor contractions during childbirth
- cortex, regulates our thoughts, actions and emotions
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
Teaching in the New Millenia 2023-09-17
Across
- Worldwide system of computer networks
- external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- Applications,set of instructions, data or programs used to operate computers and execute specific tasks
- a product
- Two words,availability and use of digital tools to communicate on the Internet, digital devices, smart devices and other technologies
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- Information is exchanged between individuals through a common system of symbols, signs, or behavior
Down
- Facts provided or learned about something or someone
- Formulating a new method
- Practical application of knowledge
- Diverse set of technological tools and resources used to transmit, store, create, share or exchange information
11 Clues: a product • Formulating a new method • Practical application of knowledge • Worldwide system of computer networks • Facts provided or learned about something or someone • Information is exchanged between individuals through a common system of symbols, signs, or behavior • ...
Redes 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Network 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Englis classwork 2021-06-25
Across
- type of network with a high capacity to transport information that affects the speed of transmission
- is a standard cable for Gigabit Ethernet and others using network protocols that is backward compatible
- aims to supply electricity from suppliers to consumers
- Device used to emit or receive radio waves
- Device that converts digital signals into analog
- a network covering an area reduced to a house, apartment or building
Down
- device enabling the interconnection of devices operating within a network
- is a global network of computer networks whose purpose is to enable the free exchange of information between a
- the connection of nodes by means of electromagnetic waves, without the need for a wired or wired network
- waves generated by some electromagnetic phenomenon. These waves can be analog
- A wireless local area network
11 Clues: A wireless local area network • Device used to emit or receive radio waves • Device that converts digital signals into analog • aims to supply electricity from suppliers to consumers • a network covering an area reduced to a house, apartment or building • device enabling the interconnection of devices operating within a network • ...
ethics terms 2013-01-18
Across
- The computer equivalent of breaking and entering
- program that records every keystroke
- kids who experience this are 3 times more likely to be depressed.
- emails that attempt to trick people into revealing person information to be used for identity theft
- software programs that claim to do one thing but instead damage your computer
- Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
Down
- property Property of the mind
- protects computers from users on other networks, offensive websites, and potential hackers
- that piggybacks on other programs; impairs or destroys a computer's ability to function properly
- infringement First time offenders can face criminal penalties of as much as 5 years in prison
- software installed without your knowledge that is programmed to show you advertisements
11 Clues: property Property of the mind • program that records every keystroke • The computer equivalent of breaking and entering • kids who experience this are 3 times more likely to be depressed. • software programs that claim to do one thing but instead damage your computer • software installed without your knowledge that is programmed to show you advertisements • ...
Services in GCP 2022-06-14
Across
- An open source tool to provision cloud resources with configuration files and code
- GCP service that helps develop and manage your own APIs
- Cloud ____ is a fully managed environment to run Docker containers
- VPC _______ Controls are a way to restrict access and data to trusted networks for multi-tenant services
- How can you run managed Apache Spark and Hadoop in GCP
- This BI tool gives us insight into our costs in multiple cloud environments
Down
- Which GCP service name originates from the the Greek word meaning "pilot"
- This SQL data warehouse allows for 1TB of queries for free every month
- This service allows you to manage GKE clusters and workloads running on VMs across environments
- Cloud ____ helps orchestrate workflows and pipelines using Apache Airflow
- Cloud _____ is Googles CICD platform
11 Clues: Cloud _____ is Googles CICD platform • How can you run managed Apache Spark and Hadoop in GCP • GCP service that helps develop and manage your own APIs • Cloud ____ is a fully managed environment to run Docker containers • This SQL data warehouse allows for 1TB of queries for free every month • ...
Mass media of UK 2024-05-12
Across
- How many home radio stations does the BBC have?
- ...is a very popular channel similar to BBC1 in content but with advertising and rather more “soap operas” and “game shows”.
- ...has been described as the most reliable broadcasting organization in the world.
- People in Britain buy more papers on...then on weekdays.
- ...is a popular weekly celebrity gossip magazine.
- Where the first regular newspapers appeared in the 17th century.
- What is a national musical instrument. It was brought by Romans to England.
Down
- What kind of music does Radio 1 broadcast?
- The satirical fortnightly has a large following among younger people.
- How quality newspapers are called sometimes?
- Which city dominates the media sector in the United Kingdom as national newspapers, tv an radio networks are largely based there.
11 Clues: What kind of music does Radio 1 broadcast? • How quality newspapers are called sometimes? • How many home radio stations does the BBC have? • ...is a popular weekly celebrity gossip magazine. • People in Britain buy more papers on...then on weekdays. • Where the first regular newspapers appeared in the 17th century. • ...
Humanities 2023-09-27
Across
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- mindset, A growth mindset means that you thrive on challenge
- lack of success
- It can treat inflammation
- a typical example or pattern of something
Down
- A problem with emotional or behavioral self-control
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- It can cause or strengthen labor contractions during childbirth
- cortex, regulates our thoughts, actions and emotions
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
Marketplace and Insurance 2024-11-15
Across
- Provides health coverage options and consumer protections and increases access to information
- A state-run insurance program that provides free or low-cost health coverage
- The monthly cost you pay for your insurance plan.
- Insurance plans offered in the Marketplace have networks of hospitals, doctors, specialists, pharmacies, and other health care providers available to treat the plan’s members.
- The percentage of the cost you pay for a covered health care service after you’ve met your deductible.
- Small Business Health Options Program
Down
- Affordable Care Act
- Children’s Health Insurance Program
- The amount you pay for covered health care services per year before your plan starts to pay its share, except free preventive services.
- The insurance holder
- A cost-sharing reduction lowers the amount you have to pay for deductibles, coinsurance, and copayments
11 Clues: Affordable Care Act • The insurance holder • Children’s Health Insurance Program • Small Business Health Options Program • The monthly cost you pay for your insurance plan. • A state-run insurance program that provides free or low-cost health coverage • Provides health coverage options and consumer protections and increases access to information • ...
Networking Concepts 2025-05-26
Across
- It refers to a computer network restricted to an organisation
- Commonly used network card
- When mismatched copies of a file are stored on different computers
- A wireless technology used to interconnect mobile phones,computers and printers using short-range wireless connection
- In this topology, all nodes in the network are connected in a circular manner
Down
- These are certain set of rules that determine how data should be transferred over networks, compressed, presented on the screen,and so on
- It refers to a computer network that allows controlled access to an information source available on the internet
- The computers that communicate with each other
- Network created for an individual person
- In this topology, each node is connected to every other node in the network
- Network larger than LAN
11 Clues: Network larger than LAN • Commonly used network card • Network created for an individual person • The computers that communicate with each other • It refers to a computer network restricted to an organisation • When mismatched copies of a file are stored on different computers • In this topology, each node is connected to every other node in the network • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- bonds that transfer electrons
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
- bond The bond that can hold atoms together in large networks or small groups.
Down
- Two or more atoms held together by covalent bonds.
- The bond that can hold atoms together in large networks or small groups.
- A substance made of atoms of two or more elements.
- bonds that share electrons
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Cyber Security 2021-02-12
Across
- A malicious form of self replicating
- Gathers information about how you use your computer
- A set of secret characters, that only you know, to keep your private information secure.
- Someone that tries to gain access to your personal information or devices.
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Short for malicious software, that gains access to your computer or device
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • Someone that tries to gain access to your personal information or devices. • ...
Azure Fundamentals Launchpad Prep 2024-01-24
Across
- ability of a system to automatically scale up or down the amount of resources that a system uses in response to changing demand
- physically separate datacenters within an Azure region
- extend your on-premises networks into the Microsoft cloud
- logically organize resource groups and facilitate billing
Down
- helps you keep track of Azure resource
- shared computing resources accessible over the internet, offering a scalable and on-demand public cloud service
- Scaling that focuses on increasing or decreasing the capabilities of the resources
7 Clues: helps you keep track of Azure resource • physically separate datacenters within an Azure region • extend your on-premises networks into the Microsoft cloud • logically organize resource groups and facilitate billing • Scaling that focuses on increasing or decreasing the capabilities of the resources • ...
Lyrics Soup 2020-07-15
Across
- police United States ( 911 ) / Brazil ( 190 )
- the opposite of sloppy
- he person we hire to animate a party
- The person we call when a fire occurs.
Down
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- profession that develops a diet that establishes the patient's need.
- firmness of spirit to face emotionally or morally difficult situations
7 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • profession that develops a diet that establishes the patient's need. • firmness of spirit to face emotionally or morally difficult situations • ...
Liquid Staked Derivatives 2024-05-07
Across
- The maximum amount of a financial instrument that can be traded in a single order
- The process of converting one currency into another at a predetermined exchange rate
- A digital asset designed to mimic the value of a traditional currency.
- A cryptographic token that represents ownership in a decentralized network.
Down
- A digital currency designed to be secure, decentralized, and censorship-resistant.
- The process of earning rewards by participating in proof-of-stake networks
- This term describes assets that are easily convertible to cash without significant loss of value.
7 Clues: A digital asset designed to mimic the value of a traditional currency. • The process of earning rewards by participating in proof-of-stake networks • A cryptographic token that represents ownership in a decentralized network. • The maximum amount of a financial instrument that can be traded in a single order • ...
neuro-fuzzy 2024-03-06
Across
- Backpropagation is a _________ method
- learning method employed to train the multilayer feedforward networks is called the ___________, or back-propagation
- A way to escape the local minima trap
- A heuristic approach for selecting the number of hidden layers
Down
- A single layer perceptron is unable to implement an elementary function like a ________
- It is essentially a ________ method to minimize the total squared error of the output computed by the net
- The strength of a neural net lies in its tolerance of _____ input pattern
7 Clues: Backpropagation is a _________ method • A way to escape the local minima trap • A heuristic approach for selecting the number of hidden layers • The strength of a neural net lies in its tolerance of _____ input pattern • A single layer perceptron is unable to implement an elementary function like a ________ • ...
cyber security engineer 2024-07-18
Across
- The systematic process of finding and fixing security holes in software or networks.
- The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
- A process to determine and document potential threats to an organization
- The analysis and examination of digital data for evidence or investigation.
Down
- The method used to protect information by transforming it into an unreadable format
- The response to and management of a security breach or attack.
- The practice of securing information systems against unauthorized access and threats.
7 Clues: The response to and management of a security breach or attack. • A process to determine and document potential threats to an organization • The analysis and examination of digital data for evidence or investigation. • The method used to protect information by transforming it into an unreadable format • ...
Fake news 2024-10-02
Across
- kind of hygiene that individuals and organizations use to maintain security resilience of systems, devices, networks, and data.
- kind of war conducted in order to gain informational advantage over the opponent
- the process of establishing the truth,accuracy of information.
Down
- a kind of thinking in which you question,analyse, interpret, evaluate and make a judgementnabout what you read, hear, say, or write.
- A thing that is not genuine, not true, made-up;
- the process of verifying facts
- Information about current event
7 Clues: the process of verifying facts • Information about current event • A thing that is not genuine, not true, made-up; • the process of establishing the truth,accuracy of information. • kind of war conducted in order to gain informational advantage over the opponent • ...
Community Cultural Capital 2025-03-29
Across
- Cultural Wealth Model Founded by Tara Yosso and names six kinds of cultural capital that students bring to school
- Hopes and dreams that students have
- Various language and linguistic skills students bring with them to school
Down
- Peers and other social contacts that help students navigate the world
- Students support system of family, friends, and networks
- Student's ability to navigate institutions, particularly negative and unsupportive
- Founded in the communities of color, securing equal rights and freedom. Students of color are prepared for problem solving.
7 Clues: Hopes and dreams that students have • Students support system of family, friends, and networks • Peers and other social contacts that help students navigate the world • Various language and linguistic skills students bring with them to school • Student's ability to navigate institutions, particularly negative and unsupportive • ...
Cyber/Digital Literacy 2024-11-06
Across
- example of computer virus
- of malware that can make copies of itself and spread automatically across computers in a network.
- has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
- -Refers to the trail of data you leave when using the internet.
- is use protect your personal information
- Who's actively participate in cyberspace and the online community offered through the internet
- Type of crime that uses computers or networks harm.
7 Clues: example of computer virus • is use protect your personal information • Type of crime that uses computers or networks harm. • -Refers to the trail of data you leave when using the internet. • Who's actively participate in cyberspace and the online community offered through the internet • ...
WICASA GOA CROSSWORD JANUARY 2024 2024-01-25
Across
- Return of alteration in the documents filed for registration by a foreign company.
- As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita.
- “Move the way you want” is the slogan of this brand.
- David Warner, who has retired from one-day international (ODI) and Test cricket, is a player from this country.
- India’s equity market capitalization has surpassed this country’s stock market for the first time, making it the fourth largest globally.
- A Payment *(dash)* is a platform provider that aggregates various payment modes such as cards, UPI, net banking, wallets, and alternate credit products by partnering with various processing entities such as acquiring banks, direct banks (in case of net banking) and issuers of wallets and alt credit products on to a single platform.
- "I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful." Name the businessman, co-founder of Berkshire Hathaway who quoted this.
- Pen Holder grip is used in this sport. The sports equipment is held mainly between the thumb and index finger.
Down
- For how many sectors is the Government of India running Performance Linked Incentive (PLI) schemes? These schemes, part of India’s larger strategy for self-reliance and industrial growth, aim to boost manufacturing and exports in key areas like Mobile Manufacturing and Specified Electronic Components, Critical Key Starting Materials, etc.
- Arichalmunai point is located in state. PM Narendra Modi paid homage at the origin point of Ram Setu.
- Word for a small building, especially one in the garden of a house that gives a wide view of the surrounding area.
- MCA form used for Intimation of Director Identification Number by the company to the Registrar DIN services.
- A Payment *(dash)* acts as an intermediary between a merchant and financial institutions, such as acquiring banks, networks, etc. It is a technology that securely transfers payment data from the merchant to the issuing bank through acquiring banks and networks.
- Last name of the author of the book “The 48 Laws of Power”.
- This Excel function returns a specific number of characters from a text string, starting at the position you specify, based on the number of characters you specify.
15 Clues: “Move the way you want” is the slogan of this brand. • Last name of the author of the book “The 48 Laws of Power”. • Return of alteration in the documents filed for registration by a foreign company. • As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita. • ...
TLE 2022-10-10
Across
- combining multiple pieces of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- reducing detailed data to its main points
- any storage media that holds content in digital format and is read using a laser assembly
- not directly accessible by the CPU
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- the collection, organization, analysis, interpretation and presentation of data
- list detail or summary data or computed
- ensuring that supplied data is correct and relevant
- also known as main memory
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- are small pictures that are linked to actual program
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- separation of data into various categories
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- software programs that allows a user to locate, access, and display web pages
- the common storage unit in a computer
Down
- coated strip of plastic on which data can be encoded
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- a software or a device that allows users to create, edit, and print documents
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- hardware data storage device developed by lomega that functions like a standard 1.44
- can be accessed just as fast as any other data
- is the main, and usually the largest, data storage device in a computer
- arranging items in some sequence and/or in different sets
- is used in the computers to store the data
- a soft magnetic disk
- refers to where the typist positions his/her fingers
- used as the computer begins to boot up
- is a high-speed access area that can be either a reserved section of main memory or a storage device
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • is used in the computers to store the data • ...
Cyber Crossword | Easy 2 2023-07-06
Across
- The assurance that information is disclosed only to authorised entities.
- The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
- A feature or defect of a computer system that allows access to data by bypassing normal security measures.
- An event that is not part of normal operations that disrupts operational processes.
- A defect, fault or imperfection, especially one that is hidden or unknown.
- The methods used to manipulate people into carrying out specific actions, or divulging information.
- Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
- A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
- A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
- The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
- A software program or group of software programs designed for end users.
- A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
- Measurable physical characteristics used to identify or verify an individual.
- The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
- A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
- A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
- The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
- A collection of data or instructions that tell a computer how to work.
- Malicious software that makes data or systems unusable until the victim makes a payment.
- Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.
20 Clues: A collection of data or instructions that tell a computer how to work. • A software program or group of software programs designed for end users. • The assurance that information is disclosed only to authorised entities. • A defect, fault or imperfection, especially one that is hidden or unknown. • ...
BOOOOOOOOOOOOOOOOdhism inspired crossword 2023-10-31
Across
- the seasonal wind of the Indian Ocean and southern Asia, blowing from the southwest in summer and from the northeast in winter.
- a yearly tax imposed by Islamic states on certain non-Muslim subjects
- Though historians have been unable to find evidence of long-distance trading networks in the Western Hemisphere before 1492, they assert that some long-distance trading networks existed by pointing to the spread of
- The world's largest sea-based system of communication and exchange . Centered on India, it stretched from southern China to eastern Africa.
- religious ideology that adopted the high moral standards of Buddhism while also returning to the classical texts of Confucianism?
- An East African civilization that emerged in the eighth century c.e. as a set of commercial city-states linked into the Indian Ocean trading network. Combining African Bantu and Islamic cultural patterns, these competing city-states accumulated goods from the interior and exchanged them for the products of distant civilizations.
- Primary interpreters of Islamic law and the social core of Muslim Urban Societies (islamic scholars)
- Chinese empire that was established by Zhu Yuanzhang following the fall of the Yuan dynasty.
Down
- military operation involving the surrounding and blockading of a town, castle or fortress by an army in the attempt to capture it.
- Huge temple built by the javanese...has religious ties with both hinduism and buddhism
- Mongol dynasty initiated by Khubilai Khan that ruled China
- A term used to describe the routes of the trans-Saharan trade, which linked interior West Africa to the Mediterranean and North African world.
- A Malay kingdom that dominated the critical choke point in Indian Ocean trade at the Straits of Malacca. Like other places in Southeast Asia, Srivijaya absorbed various cultural influences from India.
- Branch of Mahayana Buddhism that the Japanese adopted (based highly on disiplined meditation)
- Birth name of the Mongol leader better known as Chinggis Khan, or "universal ruler," a name he acquired after unifying the Mongols.
- A prominent state within West African civilization;it flourished for several centuries. It monopolized the import of horses and metals as part of the trans-Saharan trade; it was a largescale producer of gold; and its most famous ruler, Mansa Musa, led a large group of Muslims on the pilgrimage to Mecca.
- Office established in sucession to the Prophet Muhammad, to rule the Islamic empire
- Branch of Islam that believed Muslims should choose their own leaders (followed by majority)
- Introduced to North Africa and the Sahara in the early centuries of the Common Era, this animal made trans-Saharan commerce possible.
- Land-based trade routes that linked many regions of Eurasia. They were named after the most famous product traded along these routes.
20 Clues: Mongol dynasty initiated by Khubilai Khan that ruled China • a yearly tax imposed by Islamic states on certain non-Muslim subjects • Office established in sucession to the Prophet Muhammad, to rule the Islamic empire • Huge temple built by the javanese...has religious ties with both hinduism and buddhism • ...
CYBER AND DIGITAL LITERACY 2024-05-02
Across
- systematic investigation into and study of materials and sources
- action or omission that constitutes an offense that may be prosecuted
- any program or utility that helps programmers or users
- the fact of being who or what a person or thing is
- having special and usually practical knowledge
- he act of posting or reposting content on your social media
- a file or code, typically delivered over a network
- the imparting or exchanging of information or news
- the condition of being safe from undergoing
- he protection of computer systems and information
- complex configuration composed of hardware
- system that connects two or more computing devices
- the process by which topic ideas that appeal
- personal information
- spreads between computers and causes damage
- a computer or system that provides resources, data, services, or programs
- a set of instructions, data or programs used to operate computers
- organized or classified data, which has some meaningful values for the receiver
- the recording, reproducing, or broadcasting of moving visual images
- action of working with someone to produce or create something
- control the functioning of a system
Down
- available on or performed using the internet or other computer network
- a microcomputer designed for use by one person at a time
- acquisition of knowledge or skills through experience
- the innovative use of digital tools and technologies during teaching and learning
- anything you share on social media
- to make additions, deletions, or other changes
- a media type displayed as visual information
- knowledge and ability to use computers
- create, share, and/or exchange information and ideas in virtual communities
- information that can be interpreted and used by computers
- To store data on and retrieve data from a disk or other peripheral device
- the act of compromising digital devices and networks
- the protection of computer systems
- any electronic or online account
- a secret word or expression used by authorized persons
- he main means of mass communication
- creating globalized accounts on each relevant platform
- to deliver messages across computer networks
- the application of scientific knowledge to the practical aims of human life
- relating to or characteristic of the culture of computers
- a global network of billions of computers and other electronic devices
- a digitally replicated version of something real
- a detailed examination of anything complex
- a person who utilizes a computer or network service
- potential negative action
- electronic technology that generates
- device that accepts information
- online journal or information website
- relating to the present or recent times
50 Clues: personal information • potential negative action • device that accepts information • any electronic or online account • anything you share on social media • the protection of computer systems • he main means of mass communication • control the functioning of a system • electronic technology that generates • online journal or information website • ...
ICT crossword revision CH 1 - 10 2025-05-16
Across
- a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
- a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
- a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
- is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
- LED
- a type of malicious software, or malware, that can infect computers and cause damage
- the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
- observing, interviewing, questionnaire and survey.
Down
- a type of display screen used in older televisions and computer monitors.
- is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
- It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
- Information and Communication Technology.
- a standard communication protocol used for sending short text messages over cellular networks.
- the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
- a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
- a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
- Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
- affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
- is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
- a text-based way to interact with a computer or software, using commands typed into a terminal.
- a fatal electrical injury that occurs when an electric current passes through the body and causes death.
- is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- the correct or acceptable way of using the internet.
25 Clues: LED • Information and Communication Technology. • observing, interviewing, questionnaire and survey. • the correct or acceptable way of using the internet. • a type of display screen used in older televisions and computer monitors. • a type of malicious software, or malware, that can infect computers and cause damage • ...
Personal Digital Device Crossword. Ishmam Siddiquey 9R 2012-11-06
Across
- Part of a computer that carries out input and output tasks
- A portable computer that comes with a keyboard
- These are programs that can be used for work or entertainment
- A feature that enables a devuce to do more thand one thing
- A feature in a device that can guide you on your travels
- A type of interface that is touch sensitice
- Old style screen with no colour
- you can connect to other networks such as the internet. Or you can connect with bluetooth
- A type of PC that is portable and can be touchscreen
Down
- A device that displays, Projects Data
- A software that supports applications
- A function that allows you to connect and browse the internet on the move
- Enables someone to interact with a digital device
- You can save data
- A feature which is small and light. You can carry it around wherever you go
- This is a type of device that allows you to phone and use other functions. E.g Social Networking, E-mail etc
- A device that enables you to enter data
17 Clues: You can save data • Old style screen with no colour • A device that displays, Projects Data • A software that supports applications • A device that enables you to enter data • A type of interface that is touch sensitice • A portable computer that comes with a keyboard • Enables someone to interact with a digital device • ...
PDS 12/14: Feedback and Emotional Intelligence 2020-12-14
Across
- When admitting a mistake, apologize in a _____ manner.
- Recognizing and understanding other people's emotions.
- What begins on December 23rd?
- Attempting to soften the feedback or make excuses for the negative behavior is called a _____.
- A movement required to hang ornaments on the top of your Christmas tree (2 words, think kinesiology!).
- Offering a _____ sends the message that you are learning from your mistakes.
- _____ bells.
Down
- Feedback should be based on _____.
- Ms. Zhu's favorite holiday.
- Feedback is most effective when it is delivered in a _____ manner.
- _____ grip is required to wrap (and unwrap!) presents.
- Admitting your mistake or mishandling demonstrates a high level of _____.
- The ability to find common ground and build rapport with people to build networks and relationships (2 words).
- Ms. Zhu's favorite Christmas scent (2 words).
- The ability to control or redirect disruptive impulses and moods so that you suspend judgment and can think before acting (2 words).
- How many reindeer does Santa have in the most famous song about a certain Christmas reindeer?
- Direct language helps make it clear that you aren't complaining or making _____.
17 Clues: _____ bells. • Ms. Zhu's favorite holiday. • What begins on December 23rd? • Feedback should be based on _____. • Ms. Zhu's favorite Christmas scent (2 words). • When admitting a mistake, apologize in a _____ manner. • Recognizing and understanding other people's emotions. • _____ grip is required to wrap (and unwrap!) presents. • ...
Research Research and more Research! 2021-09-09
Across
- Title used for the list of books and other sources used in a research project.
- arranged by letters in order of the alphabet.
- Practice of writing pieces of information from a source in an informal manner to use later.
- The address of a resource (document or website on the internet.
- The exclusive right to reproduce, publish or sell a piece of work.
- materials to sell.
- To glance/read through a text quickly, looking for important ideas or information.
Down
- Publishes books and other
- Putting words or ideas into a logical format to assist in the organization of information.
- A set of books giving information about people, places events or things.
- A careful hunting for facts about a subject.
- Putting words or ideas from a source into your own words.
- An electronic communications network that connects computer networks around the world.
- Taking someone's own words or ideas as your own and not giving proper credit to the author.
- Another name for a source written in a specific format. (MLA, APA, etc.)
- A person who writes books, articles, internet sites and literature.
- Library Media Center
17 Clues: materials to sell. • Library Media Center • Publishes books and other • A careful hunting for facts about a subject. • arranged by letters in order of the alphabet. • Putting words or ideas from a source into your own words. • The address of a resource (document or website on the internet. • The exclusive right to reproduce, publish or sell a piece of work. • ...
BLAST from the Past! Opposites 2024-10-14
Across
- a failure to hit, catch, or reach something.
- be unable to think of or recall
- reach a place at the end of a journey or a stage in a journey.
- exert force on (someone or something) in order to move them away from oneself.
- to copy (data) from one computer system to another
- start the flow or operation of something by means of a tap, switch, or button.
- a communication method that uses electronic devices to deliver messages across computer networks.
- go somewhere to collect someone, typically in one's car.
Down
- another word for begin
- a great interest and pleasure in something (like cooking)
- impart knowledge to or instruct (someone) as to how to do something
- discover after a deliberate search.
- obtain in exchange for payment.
- a success in an examination, test, or course
- the use of (something) on the understanding that it will be returned
- be successful or victorious in (a contest or conflict).
- separate or cause to separate into pieces as a result of a blow, shock, or strain.
17 Clues: another word for begin • be unable to think of or recall • obtain in exchange for payment. • discover after a deliberate search. • a failure to hit, catch, or reach something. • a success in an examination, test, or course • to copy (data) from one computer system to another • be successful or victorious in (a contest or conflict). • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Love of Learning Crossword! 2025-11-05
Across
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The art and science of designing and constructing buildings.
- The study of how societies use resources and respond to scarcity.
- The study of religious belief and the nature of the divine.
- The study of ancient Greek and Roman literature, language, and culture.
- The scientific study of crime and criminal behavior.
- The study of society and human relationships within it.
- The application of science and math to design and build structures, machines, and systems.
- The branch of biology dealing with organisms and their environments.
Down
- The study of human societies, cultures, and their development.
- The profession of reporting, writing, and editing news.
- The scientific study of language and its structure.
- The field involving the design, construction, and use of machines that can act autonomously.
- The process of recording, summarizing, and analyzing financial transactions.
- The science of Earth’s physical structure, history, and processes.
- The practice of protecting computers, networks, and data from attacks.
- The study of human history through excavation and artefacts.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
TLE 2022-10-10
Across
- combining multiple pieces of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- reducing detailed data to its main points
- any storage media that holds content in digital format and is read using a laser assembly
- not directly accessible by the CPU
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- the collection, organization, analysis, interpretation and presentation of data
- list detail or summary data or computed
- ensuring that supplied data is correct and relevant
- also known as main memory
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- are small pictures that are linked to actual program
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- separation of data into various categories
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- software programs that allows a user to locate, access, and display web pages
- the common storage unit in a computer
Down
- coated strip of plastic on which data can be encoded
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- a software or a device that allows users to create, edit, and print documents
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- hardware data storage device developed by lomega that functions like a standard 1.44
- can be accessed just as fast as any other data
- is the main, and usually the largest, data storage device in a computer
- arranging items in some sequence and/or in different sets
- is used in the computers to store the data
- a soft magnetic disk
- refers to where the typist positions his/her fingers
- used as the computer begins to boot up
- is a high-speed access area that can be either a reserved section of main memory or a storage device
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • is used in the computers to store the data • ...
TLE 2022-10-10
Across
- a software or a device that allows users to create, edit, and print documents
- coated strip of plastic on which data can be encoded
- the collection, organization, analysis, interpretation and presentation of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- arranging items in some sequence and/or in different sets
- list detail or summary data or computed
- is used in the computers to store the data
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- hardware data storage device developed by lomega that functions like a standard 1.44
- is a high-speed access area that can be either a reserved section of main memory or a storage device
Down
- separation of data into various categories
- also known as main memory
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- are small pictures that are linked to actual program
- combining multiple pieces of data
- is the main, and usually the largest, data storage device in a computer
- a soft magnetic disk
- can be accessed just as fast as any other data
- not directly accessible by the CPU
- reducing detailed data to its main points
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- software programs that allows a user to locate, access, and display web pages
- any storage media that holds content in digital format and is read using a laser assembly
- used as the computer begins to boot up
- ensuring that supplied data is correct and relevant
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- refers to where the typist positions his/her fingers
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- the common storage unit in a computer
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • separation of data into various categories • ...
Tech Terms and Acronyms 2023-05-18
Across
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Portable document format
- A document or other file that is sent along with an email
- a device that allows computers to transmit information to each other
- The method by which uses access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- General term for a software programme that has been designed to harm other computers
- Can't stop laughing
- A software program that allows you to surf the web
- Referring to the storing and accessing of date and programmes over the Internet instead of another type of hard drive
- Short-range wireless communication technology
- A way of sending messages over the Internet
- Today I learnt
- A type of software that allows users to create 2D and 3D design modelling
- A technology that allows computers and other devices to communicate via a wireless signal
- A set of interconnected networks that allow computers in different locations to exchange information
Down
- is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
- Universal resource locator
- Unsolicited email messages sent for marketing purposes
- Random access memory
- Measures designed to protect a computer, device, or network from Cybercrime
- The "brains" of a computer, responsible for performing tasks and calculations
- Hyper-text markup language
- A link to a particular web page that is saved in the browser
- Direct message
- Conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- To load and initialise the operating system on a computer or other device
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Any type of illegal activity that is undertaken on a computer
- A microprocessor that performs many functions and calculations that make a computer function
- Communications technology whereby a single can carry more than one type of signal at once
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- To compress and archive files into a smaller size
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Universal resource locator • Hyper-text markup language • Conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • To compress and archive files into a smaller size • ...
Technology Influencing Business Decisions 2024-11-18
Across
- The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
- The state of being free from danger, risk, or anxiety, or something that protects or guarantees something else.
- The quality of working well in an organised way, without wasting time or energy.
- A live audio or audiovisual meeting with two or more participants. With the ability to teleconference, remote teams in an organisation can collaborate and communicate, even when geographically dispersed.
- Any of the different kinds of transport facilities used for moving goods and people from one location to the other.
- The application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
- Digital technology that allows the sharing of ideas and information, including text and visuals, through virtual networks and communities.
- Fitness or suitability for performing an action or fulfilling a requirement.
- An occasion or situation that makes it possible to do something that you want to do or have to do, or the possibility of doing something.
Down
- A situation in which an employer allows people to choose the times that they work so that they can do other things, for example spend time with their children.
- The sending and receiving of information can be one-on-one or between groups of people, and can be face-to-face or through communication devices.
- A business strategy that leverages the internet and uses online platforms to generate awareness by connecting with customers and promoting sales for products or services.
- When personal information is accessed, disclosed without authorisation, or is lost.
- Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- The state of needing something or someone, especially in order to continue existing or operating.
- A worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
- When a company has a disparity between the money they are bringing in, and the money going out, leaving them in a net deficit.
- A measure of economic performance that compares the goods and services produced (output) with the inputs used to produce those goods and services.
- When an employer involuntarily and permanently removes a position that is currently being held by an employee or separated from a job.
- The process by which businesses or other organisations develop international influence or start operating on an international scale
20 Clues: Fitness or suitability for performing an action or fulfilling a requirement. • The quality of working well in an organised way, without wasting time or energy. • When personal information is accessed, disclosed without authorisation, or is lost. • The state of needing something or someone, especially in order to continue existing or operating. • ...
Designing and Building 2014-05-10
Across
- Engineers use __________ to design and construct different machines and buildings
- ___________ hoop was successful in its second try
- A dam is a barrier that is built across the path of a _________ to hold back the water
- People travelled a great deal for business or __________
- Rulers in _________ lands founded new cities in such as Cairo and Baghdad
- Well-water is lifted using a system of ____________
- Engineers found a way to power mills and bring __________
- Engineering tool used in war can cause great __________
- Engineers need to determine the number of ___________ and cost before beginning the task
Down
- Underground __________ conduct water directly from an underground source to where it is needed.
- Mowlana Hazir Imam guides us to think carefully about the way we shape our __________
- Vast networks of ________ canals is needed to water the fields
- ________ bridges allowed boats to pass underneath
- _________ uses power of running water to make it turn
- __________ was a famous Muslim architect known for his mosques with enormous domes
- Suspension bridges use cables attached to strong supports to hold up the __________
- Imam Al-Muizz invented the fountain __________
17 Clues: Imam Al-Muizz invented the fountain __________ • ___________ hoop was successful in its second try • ________ bridges allowed boats to pass underneath • Well-water is lifted using a system of ____________ • _________ uses power of running water to make it turn • People travelled a great deal for business or __________ • ...
CODING 2016-02-09
Across
- A program that runs on a system against the owner’s or user’s wishes
- Used to provide the temporary storage of information function.
- A collection of data into a permanent storage structure stored on the hard drive.
- A term used to describe junk and unsolicited e-mail.
- the quantities, characters, or symbols on which operations are performed by a computer,
- It is a worldwide system of computer networks
- a symbol or function denoting an operation (e.g., ×, +).
- an error in a computer program or system.
Down
- A wireless method of sending information
- It is a program that displays the files and data on internet
- a place where power or information leaves a system.
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A binary unit of data storage with only 2 digits 0 and 1.
- a system of symbols and rules for writing programs or algorithms
- either or both of two stated possibilities
- identify and remove errors from
- Another Computer term for “Starting a Computer”
17 Clues: identify and remove errors from • A wireless method of sending information • an error in a computer program or system. • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer” • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
Transport 2025-07-12
Across
- Transport systems are vital to the functioning of ________ activities
- ease of movement within and across transport nodes
- number of occurrence of a service
- a location with high _____________ is one where many different destinations can be reached with relative ease
- Availability and reach of transport infrastructure
- a type of non-motorised transport mode
- goods and services are bought and sold over the internet
- Transport networks are needed to fulfill the demand for ________
Down
- a scale of transport network that allows for travel between cities
- a path for travel between nodes
- a type of acitivity found within the CBD, where major transport nodes are found
- number of people and amount of goods that can be moved
- major transport nodes are also found in popular _______ destinations
- short travel time and low travel ____ indicates high accessibility
- an opportunity that is more readily available in the central area to earn an income
- a transport network's performance and r__________ is dependent on the quality of its infrastructure
- An entry point into the transport network
17 Clues: a path for travel between nodes • number of occurrence of a service • a type of non-motorised transport mode • An entry point into the transport network • ease of movement within and across transport nodes • Availability and reach of transport infrastructure • number of people and amount of goods that can be moved • ...
ethics terms 2013-01-18
Across
- that piggybacks on other programs; impairs or destroys a computer's ability to function properly
- software installed without your knowledge that is programmed to show you advertisements
- logger program that records every keystroke
- infringement First time offenders can face criminal penalties of as much as 5 years in prison
- horse software programs that claim to do one thing but instead damage your computer
- The computer equivalent of breaking and entering
Down
- emails that attempt to trick people into revealing person information to be used for identity theft
- Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
- property Property of the mind
- bullying kids who experience this are 3 times more likely to be depressed.
- protects computers from users on other networks, offensive websites, and potential hackers
11 Clues: property Property of the mind • logger program that records every keystroke • The computer equivalent of breaking and entering • bullying kids who experience this are 3 times more likely to be depressed. • horse software programs that claim to do one thing but instead damage your computer • ...
Cybersecurity Terms 2022-05-13
Across
- The practice of securing systems, networks, and technologies from attacks and unauthorized access
- A type of network security that filters incoming and outgoing traffic
- When a legitimate website’s traffic is redirected to a fake site for malicious purposes
- Disguising data so it’s impossible to decipher without authorization
Down
- Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
- Sending emails with a forged sender address is called email...
- Malicious software designed to disrupt a computer, server, or network
- A chain of Internet-connected devices centrally controlled by a hacker
- Email that you’ve technically solicited but it may serve little to no purpose to you
- A tool that allows you to maintain online anonymity while using the Internet
- DKIM and DMARC are both examples of a standard email authentication...
11 Clues: Sending emails with a forged sender address is called email... • Disguising data so it’s impossible to decipher without authorization • Malicious software designed to disrupt a computer, server, or network • A type of network security that filters incoming and outgoing traffic • A chain of Internet-connected devices centrally controlled by a hacker • ...
Network 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Common Tech Terms 2020-03-29
Across
- device hardware device capable of holding information
- region of computer memory where frequently accessed data can be stored for rapid access
- group of files that enable one or more hardware devices to communicate with the computer’s operating system
- maximum speed at which data can be transmitted between computers in a network.
- term used to describe the unwritten rules of Internet courtesy
- HTML elements which give web browsers additional information about the web page
Down
- program which gives a view of all running programs, processes and services.
- tool to keep track of changes in code and files during software development
- - The manipulation of data to prevent accurate interpretation by unintended users.
- A pre established format or design for a document.
- destructive software program containing code capable of gaining access to computers or networks
11 Clues: A pre established format or design for a document. • device hardware device capable of holding information • term used to describe the unwritten rules of Internet courtesy • program which gives a view of all running programs, processes and services. • tool to keep track of changes in code and files during software development • ...
5.04 Crossword Puzzle 2023-04-27
Across
- Computer software to mimic a human expert
- A system of computers connected together by telephone wires, cable wires, or other means
- Programs that instruct computers to perform specific operations
- A navigational system that uses satellite technology to determine location and provide direction
- telephony Technology that allows users to communicate over the Internet rather than through traditional public networks
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
Down
- The practical application of science to society and industry
- Working from home or a remote location
- A mobile phone with advanced capabilities, such as accessing the Internet
- An object placed into orbit by humans; most are used for communications purposes
- The use of computer technology to plan, design, test, and alter products
11 Clues: Working from home or a remote location • Computer software to mimic a human expert • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • The use of computer technology to plan, design, test, and alter products • A mobile phone with advanced capabilities, such as accessing the Internet • ...
Week 1 Reveiw 2023-09-21
Across
- Software containing coded instruction that controls a computer
- An application program that interacts with all the information found on the world wide web
Down
- A combined device for modulating and demodulating
- A physical or virtual appliance that passes information between two or more computer networks
- A group of two or more devices that can communicate
5 Clues: A combined device for modulating and demodulating • A group of two or more devices that can communicate • Software containing coded instruction that controls a computer • An application program that interacts with all the information found on the world wide web • A physical or virtual appliance that passes information between two or more computer networks
AvocadoDAO x Token2049: Crack the Code! 2024-09-03
Across
- The ability of different blockchain networks to communicate and interact.
Down
- A premier blockchain conference held annually.
- A term used to describe an individual or entity that holds a large amount of cryptocurrency.
- An essential activity at blockchain conferences to build connections.
- The iconic venue in Singapore where Token 2049 is held.
5 Clues: A premier blockchain conference held annually. • The iconic venue in Singapore where Token 2049 is held. • An essential activity at blockchain conferences to build connections. • The ability of different blockchain networks to communicate and interact. • A term used to describe an individual or entity that holds a large amount of cryptocurrency.
Digital devices starter crossword 2025-09-10
Across
- A device is digital if it is controlled by a?
- A mobile phone is often referred to as which type of device?
- A common sensor is?
Down
- Devices, vehicles, appliances and physical objects connected to networks, usually the internet?
- They measure a physical quantity and then output a signal to a microprocessor?
5 Clues: A common sensor is? • A device is digital if it is controlled by a? • A mobile phone is often referred to as which type of device? • They measure a physical quantity and then output a signal to a microprocessor? • Devices, vehicles, appliances and physical objects connected to networks, usually the internet?
Tech Terms 2022-04-13
COMPUTING 2022-11-08
Across
- A ... is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
- ... is a part of the internet.
- who discovered the internet
- Two very common types of networks include: Local Area Network (LAN) and .... Area Network.
Down
- ... consists of two or more computers that are linked in order to share resources , exchange files, or allow electronic communications.
- used to create letters, numbers, and symbols, and perform additional functions in computer.
- ... is a powerful computer.
- wireless connection
8 Clues: wireless connection • ... is a powerful computer. • who discovered the internet • ... is a part of the internet. • Two very common types of networks include: Local Area Network (LAN) and .... Area Network. • used to create letters, numbers, and symbols, and perform additional functions in computer. • ...
Communication, the Press 2021-01-05
Across
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- a meeting of people face to face, for consultation or to obtain information for research or a survey.
- a paper that is printed and distributed usually daily or weekly and that contains news and articles
Down
- A set of printed or written questions with a choice of answers, devised for the purposes of a survey or statistical study
- an examination of opinions, behaviour, etc, made through asking people questions.
- Newspapers typically popular in style and dominated by sensational stories
- the global system of interconnected computer networks
- print media
8 Clues: print media • the global system of interconnected computer networks • Newspapers typically popular in style and dominated by sensational stories • an examination of opinions, behaviour, etc, made through asking people questions. • a paper that is printed and distributed usually daily or weekly and that contains news and articles • ...
CYBERSECURITY 2023-03-22
Across
- A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES
- FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA
- A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE
Down
- PROGRAM WHICH GETS YOUR DATA
- DATA THAT DESCRIBES THE FILE
- SEGMENT OF LARGER MESSAGE SENT OVER NETWORKS; YOU CAN SEE ITS CONTENT USING A PROGRAM LIKE WIRESHARK OR Burp Suite ;)
- A PROGRAMMING LANGUAGE IN WHICH A PROGRAM (MALICOUS ONE; USED FOR DoS ATTACK) CALLED slowloris WAS WRITTEN
- THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}
8 Clues: PROGRAM WHICH GETS YOUR DATA • DATA THAT DESCRIBES THE FILE • FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA • A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE • A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES • THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword} • ...
NGFW 2023-04-10
Across
- Log in to this to get tenant-centric view as Step 1 to activate AIOPS
- Palo Alto Networks Migration Tool
- Need to Calculate and purchase these for software NGFWs like VM-Series and CN-Series - CREDITS
- This provides unified policy management
Down
- This NGFW feature enables you to leverage user information stored in a wide range of repositories
- Process of setting up the certificates required to establish the firewall as a trusted third party (proxy) to the session between the client and the server - Decryption
- Latest Industry leading PAN-OS 11.0
- NGFW Feature that enables you to see the applications on your network
8 Clues: Latest Industry leading PAN-OS 11.0 • Palo Alto Networks Migration Tool • This provides unified policy management • Log in to this to get tenant-centric view as Step 1 to activate AIOPS • NGFW Feature that enables you to see the applications on your network • ...
Network component 2023-05-02
Across
- device for making and breaking the connection in an electric circuit
- connects a terminal computer to the ISDN network
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- Wireless Application Protocol
Down
- a device used to connect multiple LANs together with a larger Local Area Network (LAN)
- a digital-interface device used to connect data terminal equipment
- an electronic device which is a combination of a radio transmitter and a receiver
- a network node used in telecommunications that connects two networks with different transmission protocols together
8 Clues: Wireless Application Protocol • connects a terminal computer to the ISDN network • a digital-interface device used to connect data terminal equipment • device for making and breaking the connection in an electric circuit • an electronic device which is a combination of a radio transmitter and a receiver • ...
OCTOBER ESH NEWSLETTER 2016-09-29
Across
- Key to a safe trek to school, especially during dark mornings. (pg. 2)
- Keep flammable items and children a minimum of _____ feet away from heating sources (pg. 4)
- ________ networks and checkouts put you at risk for theft (pg. 3)
Down
- National "holiday" observed on 28 OCT. (pg. 1)
- This costume item should fit securely and not impair vision (pg. 2)
- Do not use this to put out electrical or oil fires (pg. 4)
- Smoke alarms expire after ___ years (pg. 4)
- Put yours in the trunk to reduce the odds of being a car break-in target (pg. 3)
8 Clues: Smoke alarms expire after ___ years (pg. 4) • National "holiday" observed on 28 OCT. (pg. 1) • Do not use this to put out electrical or oil fires (pg. 4) • ________ networks and checkouts put you at risk for theft (pg. 3) • This costume item should fit securely and not impair vision (pg. 2) • Key to a safe trek to school, especially during dark mornings. (pg. 2) • ...
CDC Monthly -Types of malware attacks 2018-11-12
Across
- Disguises itself as a normal file or program to trick users into installing malware.
- Functions by spying in a users activity without their knowledge.
- Form of malware that denies access to the users files on the hard drive until money/bit-coin is transferred.
- Most common type of malware that spreads over computer networks by exploiting vulnerabilities.
Down
- Has the ability to self-replicate and spread to other computers.
- Collections of computers that have malicious software downloaded that allows them to be used for DDoS attacks
- Short for malicious software
- Type of malware that automatically delivers advertisements
8 Clues: Short for malicious software • Type of malware that automatically delivers advertisements • Has the ability to self-replicate and spread to other computers. • Functions by spying in a users activity without their knowledge. • Disguises itself as a normal file or program to trick users into installing malware. • ...
ASSIGNMENT 1 -MACHINE LEARNING 2023-08-08
Across
- Learning Application of Machine Learning that uses complex algorithms and deep neural networks
- ______ is available every where
- learning __________ is the process of inferring underlying hidden patterns from historical data.
- ______ data is a type of categorical data with an order.
- Learning _______ the machine is taught by example or learning with a teacher.
Down
- Height of a person is an example of _______ data
- wrangling _______ is the process of cleaning and converting raw data into a useable format.
- Learning ______ refers to the techniques involved in dealing with vast data in the most intelligent fashion to derive actionable insights
- ______ is a data point that differs significantly from other observations.
9 Clues: ______ is available every where • Height of a person is an example of _______ data • ______ data is a type of categorical data with an order. • ______ is a data point that differs significantly from other observations. • Learning _______ the machine is taught by example or learning with a teacher. • ...
Personal Management Skills 2023-11-21
Across
- Being able to share info. with people within/outside a business, in a professional manner.
- The application of new experiences and skills to impact your current position.
- The process of organizing and planning how to divide your time between different activities.
- To use processes, tools. and skills to find creative and respectful solutions to manage arguments.
Down
- An active disagreement or agreement.
- Techniques to help you make better decisions on how to deal with stress and difficult in your life.
- Working to build or maintain ethical relationships, networks, or contracts.
- Connecting with other professionals with related business interests to further your career.
8 Clues: An active disagreement or agreement. • Working to build or maintain ethical relationships, networks, or contracts. • The application of new experiences and skills to impact your current position. • Being able to share info. with people within/outside a business, in a professional manner. • ...
Cybersecurity 2024-05-07
Across
- A secret combination of characters used to authenticate users and protect accounts.
- A weakness or flaw in a system that can be exploited by attackers.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- The process of verifying the identity of a user or system.
- The process of converting data into a code to prevent unauthorized access.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
psychedelics 2025-01-05
Across
- a compete loss of subjective self-identity
- the brain’s ability to adapt, modify, and change structure through the growth and reorganization of neural networks in the organ. Psychedelics have been found to promote this
- a class of substances known for their mind-altering effects, including substances like psilocybin, LSD, DMT, and MDMA
- perceiving things through sound or sight that is not really present
Down
- creation of new neural connections, anxiety, fear
- dilated pupils, increased heart rate, changes in sensory perception
- after the primary effects of the drug has subsided, the continued positive physical and mental effects
- another word for psychedelics
8 Clues: another word for psychedelics • a compete loss of subjective self-identity • creation of new neural connections, anxiety, fear • dilated pupils, increased heart rate, changes in sensory perception • perceiving things through sound or sight that is not really present • ...
3/4 vocab crossword 2022-11-04
Across
- A user on social media who has established credibility in a specific industry
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
Down
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- the extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- Electronic/online bullying
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- Displays the most popular news first
- Fake online profile
- Market methods conducted through electronic
- The number of times one’s content is displayed, no matter if it was clicked or not.
20 Clues: Fake online profile • Electronic/online bullying • Displays the most popular news first • Market methods conducted through electronic • A user on social media who has established credibility in a specific industry • The number of times one’s content is displayed, no matter if it was clicked or not. • ...
TECHNOLOGY 2023-10-25
Across
- s a hole in the wall or in a machine where you can put a plug (noun)
- AI-powered technology that responds to voice commands, such as Amazon's Alexa or Apple's Siri (2 words)
- a decentralized, digital ledger technology that records transactions across multiple computers, ensuring transparency and security (noun)
- the measurement and statistical analysis of people's unique physical and behavioral characteristics, such as fingerprints, for authentication (noun)
- a thick wire that carries electricity or digital information (noun)
- the practice of protecting systems, networks, and data from digital attacks, theft, or damage (noun)
- science of developing and producing extremely small tools and machines by controlling the arrangement of atoms and molecules (noun)
- the process of converting analog information into digital format, making it easier to store, transmit, and manipulate (noun)
- a technique that creates three-dimensional images by recording light patterns (noun)
- genetic modification of plants (noun)
- a point where wires, pipes, etc join (noun)
- a mobile phone that can be used as a small computer (noun)
- a region in California known for its concentration of technology companies and innovation (2 words)
Down
- the process of converting data into a code to prevent unauthorized access (noun)
- the design and construction of robots, often used in manufacturing and automation (noun)
- something you speak into to record your voice or make it sound louder (noun)
- a system for connecting electronic devices to the internet without using wires (noun)
- the process of discovering patterns or information in large datasets, often used for business and research purposes (2 words)
- digital or virtual currencies that use cryptography for security, such as Bitcoin or Ethereum (noun)
- the application of nanotechnology in the field of medicine for diagnosis, treatment, and drug delivery (noun)
- the protection of personal information and the right to control how it is collected and used (2 words)
- the use of digital communication tools to harass, threaten, or intimidate others (noun)
- a person who gains unauthorized access to computer systems or networks, often with malicious intent (noun)
- a document you add to an email message (noun)
- unmanned aerial vehicles (UAVs) controlled remotely or autonomously for various purposes, including photography and surveillance (noun)
- the provision of medical services and consultations remotely using telecommunications technology (noun)
- a technology that superimposes computer-generated information, such as images or sound, onto the real world (compound noun)
- a set of rules or instructions for solving a problem or accomplishing a task, often used in computer programming (noun)
- introducing new ideas, methods, or products, especially in the field of technology (adj)
- a group of computers,machines or people which are connected (noun)
30 Clues: genetic modification of plants (noun) • a point where wires, pipes, etc join (noun) • a document you add to an email message (noun) • a mobile phone that can be used as a small computer (noun) • a group of computers,machines or people which are connected (noun) • a thick wire that carries electricity or digital information (noun) • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
Designing and Building 2014-05-10
Across
- _________ clocks used sun to determine the time
- ____________ travelled in search of knowledge
- __________ was a famous Muslim architect known for his mosques with enormous domes
- Vast networks of irrigation ________ is needed to water the fields
- Rulers in Muslim lands founded new cities in such as ________ and Cairo
- During Fatimid times, an attempt was made to make a __________ near Cairo
- Arch bridges were built over rivers to let _________ from underneath
- Imam Al-Muizz invented the __________
- Engineers need to determine the number of people and _______ before starting the work
- ___________ is lifted using a system of gear-wheels
Down
- Engineers found a way to __________ mills and bring water
- Engineers use __________ to design and construct different machines and buildings
- ________ was invented by Greeks and improved by Muslim Scientists
- A _______ is a barrier that is built across the path of a river to hold back the water
- ____________has been used for lifting water for over four thousand years
- They designed machines and buildings that were both useful and _____________
- Different types of ________ have been used in different situations
17 Clues: Imam Al-Muizz invented the __________ • ____________ travelled in search of knowledge • _________ clocks used sun to determine the time • ___________ is lifted using a system of gear-wheels • Engineers found a way to __________ mills and bring water • ________ was invented by Greeks and improved by Muslim Scientists • ...
Muscular System Crossword 2022-02-07
Across
- muscle that abducts the thumb
- muscle with an anterior fascicle that adducts, medially rotates and flexesthe thigh, and a posterior fasicle that assists in thigh extension
- production of ATP in the presence of oxygen
- muscle that adducts and medially rotates the thigh
- move away from midline in the sagittal plane
- heart's ability to control its own contractions
- protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
Down
- muscle that adducts, medially rotates, and flexes the thigh
- moves the bone towards the midline
- muscle that abducts the little finger
- broad, tendon-like sheet of connective tissue that attatches a skeletal muscle to another skeletal muscle or to a bone
- enzyme that hydrolyzes ATP to ADP
- formation of blood capillary networks
- loss of structural proteins from muscle fibers
- moves the bone away from the midline
- neurotransmitter that binds at a motor end-plate to trigger depolarization
- change in voltage of a cell membrane in response to a stimulus that results in transmission of an electrical signal
17 Clues: muscle that abducts the thumb • enzyme that hydrolyzes ATP to ADP • moves the bone towards the midline • moves the bone away from the midline • muscle that abducts the little finger • formation of blood capillary networks • production of ATP in the presence of oxygen • move away from midline in the sagittal plane • loss of structural proteins from muscle fibers • ...
Digital Literacy Crossword 2024-10-09
Across
- The exchange of information or ideas between people.
- A group of people who watch, listen to, or engage with a presentation or performance.
- Wrongful deception intended to result in financial or personal gain.
- The ability to enter or use something.
- Individuals or organisations that support an event or activity, usually financially.
- A compulsive dependence on a substance or behaviour, often harmful.
- A state of being comfortable, healthy, or happy.
- The right to keep personal information confidential and free from public scrutiny.
Down
- A particular way of viewing or considering something.
- The size, extent, or importance of something.
- A display or demonstration of information to an audience.
- A dishonest scheme or trick to deceive people, usually for money.
- An approximate calculation or judgment regarding a quantity or value.
- Measures taken to protect computers and networks from digital attacks.
- The act of communicating or engaging with others.
- A list of items to be discussed or acted upon, often in a meeting.
- A software application used to view and navigate the internet.
17 Clues: The ability to enter or use something. • The size, extent, or importance of something. • A state of being comfortable, healthy, or happy. • The act of communicating or engaging with others. • The exchange of information or ideas between people. • A particular way of viewing or considering something. • A display or demonstration of information to an audience. • ...
Logan Rose - Telecomm Crossword 2025-07-09
Across
- Network segmentation tool that doesn’t require new wires
- Network layout, in tech or geometry
- Old-school phone system, in tech lingo
- Primary telecom junction where external lines meet internal networks, briefly
- Wiring hub between workstations and the main frame, briefly
- Wireless device responsible for enabling WiFi connectivity
- California-based network solutions company or a tree with "berries" of the same name
- Telecomm company with a name that’s a rock-solid choice for countertops
- Company known for remote power control and console access gear, briefly
- Acronym for a no-man’s land in both Korea and computing
Down
- Boardwalk’s blue neighbor or the name of a network solution that offers hardware maintenance
- It hides your IP like a digital cloak, like AnyConnect at Smucker for example
- Brains of Aruba’s cloud-based network management system, or someone who assigns parts to a full musical ensemble
- Digital highway’s lane count, metaphorically
- Acronym for virtualized network overlay tech, or an anagram of "wands"
- It sounds like something from space weather, but they’re all about network health
- Networking giant with a bridge in its logo
17 Clues: Network layout, in tech or geometry • Old-school phone system, in tech lingo • Networking giant with a bridge in its logo • Digital highway’s lane count, metaphorically • Acronym for a no-man’s land in both Korea and computing • Network segmentation tool that doesn’t require new wires • Wireless device responsible for enabling WiFi connectivity • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
• Social Networks & Social Support Theory: Novice to Expert 2023-02-20
Across
- Two areas crucial to social learning are ____ and community
- Level one
- Beginner Level two
- Influenced by the setting learning is taking place
- Level four
- Thinking and learning are structured by the____ available
Down
- Nurses will grow based on _____ available to them
- Gala and____ created the Social Support Theory
- Level three
- A nurse needs to use_____ clinical judgement
- Levels of proficiency
- Novice to Expert Theory
- Expert nurses need to take novice under their
- Social theory____ the Novice to Expert theory
- Level five
- Learning and thinking are _____ activities Thinking and learning need
16 Clues: Level one • Level five • Level four • Level three • Beginner Level two • Levels of proficiency • Novice to Expert Theory • A nurse needs to use_____ clinical judgement • Expert nurses need to take novice under their • Social theory____ the Novice to Expert theory • Gala and____ created the Social Support Theory • Nurses will grow based on _____ available to them • ...
IT 2017-03-02
Across
- a peripheral device, that provides the output of information from the computer system(represent the graphic information or text on paper)
- a mobile phone with advanced system that combines features of personal computers and mobile phones
- a digital optical disc storage format
- main unit of the computer, it controls all processes of the computer
- an expert in the sphere of breaking the computer systems with the help of bugs and exploits
Down
- an operating environmet developed and sold by Microsoft Corparation
- a typewriter-style device that help us to input the information in the computer
- a small portable computer
- a global system that consist of connected computer networks
- a device that translate the motion of user`s finger in the operating system of PC
10 Clues: a small portable computer • a digital optical disc storage format • a global system that consist of connected computer networks • an operating environmet developed and sold by Microsoft Corparation • main unit of the computer, it controls all processes of the computer • a typewriter-style device that help us to input the information in the computer • ...
Profession and Feelings 2020-07-15
Across
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- profession that develops a diet that establishes the patient's need.
- the opposite of sloppy
- The person who researches, writes, conducts interviews
- people who do not eat animal protein or any food of animal origin
Down
- People who try to see everything on the positive side, who do not give up in the face of major problems.
- The person we call when a fire occurs.
- firmness of spirit to face emotionally or morally difficult situations
- he person we hire to animate a party
- police United States ( 911 ) / Brazil ( 190 )
10 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • The person who researches, writes, conducts interviews • people who do not eat animal protein or any food of animal origin • profession that develops a diet that establishes the patient's need. • ...
Profession and Feelings 2020-07-15
Across
- firmness of spirit to face emotionally or morally difficult situations
- people who do not eat animal protein or any food of animal origin
- he person we hire to animate a party
- profession that develops a diet that establishes the patient's need.
Down
- The person we call when a fire occurs.
- The person who researches, writes, conducts interviews
- the opposite of sloppy
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- police United States ( 911 ) / Brazil ( 190 )
- People who try to see everything on the positive side, who do not give up in the face of major problems.
10 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • The person who researches, writes, conducts interviews • people who do not eat animal protein or any food of animal origin • profession that develops a diet that establishes the patient's need. • ...
Globalization :( 2021-02-07
Across
- improvements in technology has made communication amongst people more __________ .
- economic networks consists of _________ , producers and consumers.
- a process where ideas and activities of people in different parts of the world becomes interconnected.
- the _______ of travelling and transportation goods reduces due to the improvements made to the different modes of transport.
- advancements in technology ___________ the exchange of ideas and knowledge between across different parts of the world.
Down
- the driving forces of globalization encourages economic __________________ .
- by getting cheaper resources and utilise a cheaper labour pool, this helps MNCs ________ their profits
- developments in transportation refers to a more efficient and __________ transportation infrastructure.
- an example of a multinational company.
- by building airports, seaports, railways and highways this will increase the ________ of goods and people.
10 Clues: an example of a multinational company. • economic networks consists of _________ , producers and consumers. • the driving forces of globalization encourages economic __________________ . • improvements in technology has made communication amongst people more __________ . • ...
The internet 2023-01-31
Across
- relating to the government or the public affairs of a country.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a system for transmitting visual images and sound that are reproduced on screens, chiefly used to broadcast programs for entertainment, information, and education.
- the application of scientific knowledge for practical purposes, especially in industry.
Down
- facts provided or learned about something or someone.
- relating to society or its organization.
- false or inaccurate information, especially that which is deliberately intended to deceive.
- relating to economics or the economy.
- a system for transmitting voices over a distance using wire or radio, by converting acoustic vibrations to electrical signals.
- relating to the whole world; worldwide.
10 Clues: relating to economics or the economy. • relating to the whole world; worldwide. • relating to society or its organization. • facts provided or learned about something or someone. • relating to the government or the public affairs of a country. • the application of scientific knowledge for practical purposes, especially in industry. • ...
2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01
Across
- of or relating to radio communications without physical support
- not physically existing as such but made by software to appear to do so
- the notional environment in which communication over computer networks occurs
- (of a natural resource or source of energy) not depleted when used.
- a structured set of data held in a computer, especially one that is accessible in various ways
- the introduction of machines or automatic devices into a process, activity, or place
Down
- commercial transactions conducted electronically on the internet
- an activity or plan of action, often in business, that involves risk or uncertainty
- the production of a computer model of something, especially for the purpose of study
- converting gravitational potential or kinetic energy of a water source to produce power
10 Clues: of or relating to radio communications without physical support • commercial transactions conducted electronically on the internet • (of a natural resource or source of energy) not depleted when used. • not physically existing as such but made by software to appear to do so • the notional environment in which communication over computer networks occurs • ...
Fer Romo 2013-05-01
Across
- is a file or program other then a virus that is potentially harmful
- software is software designed specifically to detect, disable, and remove viruses, worms, and Trojans
- form of attack that prevents users from accessing normal services, such as e-mail and a web server
- engineer person who is able to gain access to equipment or a network by tricking people into providing the necessary access information
Down
- is technically a worm.
- is a self-replicating program that is harmful to networks.
- The most damaging type of virus is used to record
- Programming language that allows applets to run within a web browser.
- It is attached to small pieces of computer code, software, or documents
- also known as junk mail
10 Clues: is technically a worm. • also known as junk mail • The most damaging type of virus is used to record • is a self-replicating program that is harmful to networks. • is a file or program other then a virus that is potentially harmful • Programming language that allows applets to run within a web browser. • ...
yeah 2013-01-09
Across
- The Internet can be considered a ___
- A software delivery model in which software and associated data are centrally hosted on the cloud.
- A computer used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
- Chief and _____
- Device that forwards data packets between computer networks.
Down
- The US state that CA World 2013 is being held in.
- A physical computer dedicated to run one or more services as a host.
- The city where CA Technologies headquarters is based.
- A collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.
- A type of computing delivered as a service over a network (typically the Internet).
10 Clues: Chief and _____ • The Internet can be considered a ___ • The US state that CA World 2013 is being held in. • The city where CA Technologies headquarters is based. • Device that forwards data packets between computer networks. • A physical computer dedicated to run one or more services as a host. • ...
AA 2021-12-26
Across
- Reasons for downloading a travel __________________ over using mobile website.
- __________________ involves the awareness of the individual and is important in the face of the era of information technology sophistication
- __________________ replacing role of traditional photo album
- __________________ one of the most engaging forms of outreach and it has now reached the masses.
- People competing each other to be the first to share something on __________________
Down
- __________________ used by people to create networks, communities, and collectives to share information, ideas, messages, and other content, such as videos.
- __________________ an attitude factor relating to violating the E-content regulation.
- __________________ It also known as Electronic Tourism industry.
- __________________ use technology because do not want to be labeled outdated.
- __________________ jurisdiction fall under the Communications and Multimedia Act 1998 (Act 588)
10 Clues: __________________ replacing role of traditional photo album • __________________ It also known as Electronic Tourism industry. • __________________ use technology because do not want to be labeled outdated. • Reasons for downloading a travel __________________ over using mobile website. • ...
Artificial Intelligence 2023-11-20
Across
- The use of technology to perform tasks without human intervention.
- An expert at programming and solving problems with a computer
- To set in motion; make active or more active.
- Capable of operating independently without human control.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The systematic process of assessment and planning employed to prevent a developmental problem.
Down
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- Not functioning in a previously intended way
- The design, construction, and operation of robots to perform tasks in the real world.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
Security Crossword | TCS InfoSecurity Fest 2023-12-04
Across
- is used to dispose of paper-based information
- I am allowing employees to securely access a corporate intranet while located outside the office.
- It is the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- is a hardware/software that controls incoming traffic and acts as barrier between trusted and untrusted networks
- EDR used in TCS
Down
- It is software you can use without paying
- You should make me complicated. You should not forget me. You cannot access it without me
- An automated access management and security compliance requirement tracking tool in Ultimatix
- Bitlocker is used for
- One of the three cornerstone principles of information security
10 Clues: EDR used in TCS • Bitlocker is used for • It is software you can use without paying • is used to dispose of paper-based information • One of the three cornerstone principles of information security • You should make me complicated. You should not forget me. You cannot access it without me • ...
Board Game Geek Cross Word 2024-12-09
Across
- Strike from your hidden base as the Rebels—or find and destroy it as the Empire.
- Mutating diseases are spreading around the world - can your team save humanity?
- Build an intergalactic empire through trade, research, conquest and grand politics.
- Island Spirits join forces using elemental powers to defend their home from invaders.
Down
- Influence, intrigue, and combat in the universe of D...
- The Fellowship and the Free Peoples clash with Sauron over the fate of Middle-earth.
- Compete with rival CEOs to make Mars habitable and build your corporate empire.
- Build networks, grow industries, and navigate the world of the Industrial Revolution.
- Vanquish monsters with strategic cardplay. Fulfill your quest to leave your legacy!
- Plan and build a modern, scientifically managed zoo to support conservation projects.
10 Clues: Influence, intrigue, and combat in the universe of D... • Compete with rival CEOs to make Mars habitable and build your corporate empire. • Mutating diseases are spreading around the world - can your team save humanity? • Strike from your hidden base as the Rebels—or find and destroy it as the Empire. • ...
Нанотехнологии, Роботы и Искусственный интеллект 2025-02-24
Across
- A key component of a robot or AI system, responsible for executing instructions.
- The process of mimicking real-world processes using a computer model, common in AI research.
- The simulation of human intelligence in machines.
- Describes robots or machines capable of performing tasks without human intervention.
Down
- A device that performs programmed actions.
- A system of electrical components that control the flow of current, used in robotics and AI systems.
- A set of rules or instructions for solving a problem or completing a task, often used in AI.
- The main component of neural networks that mimics human brain functions.
- A field of physics that plays a crucial role in nanotechnology.
- A cylindrical nanostructure with remarkable strength and electrical properties.
10 Clues: A device that performs programmed actions. • The simulation of human intelligence in machines. • A field of physics that plays a crucial role in nanotechnology. • The main component of neural networks that mimics human brain functions. • A cylindrical nanostructure with remarkable strength and electrical properties. • ...
Unit 3 2025-04-03
Across
- A mechanism that allows multiple devices to share a single public IP address (3 letters)
- The process of combining multiple networks into a larger one (11 letters)
- The process of determining the best path for data packets (9 letters)
- A newer version of the Internet Protocol with 128-bit addresses (4 letters)
- A classful addressing system used before CIDR (4 letters)
Down
- A technique used to divide a network into smaller subnetworks (10 letters)
- A routing protocol that uses link-state information to determine the best path (4 letters)
- The protocol used for mapping IP addresses to MAC addresses (3 letters)
- The protocol responsible for delivering error messages and operational information (5 letters)
- A dynamic protocol that provides IP addresses to devices automatically (4 letters)
10 Clues: A classful addressing system used before CIDR (4 letters) • The process of determining the best path for data packets (9 letters) • The protocol used for mapping IP addresses to MAC addresses (3 letters) • The process of combining multiple networks into a larger one (11 letters) • A technique used to divide a network into smaller subnetworks (10 letters) • ...
drugs 2024-10-24
Across
- The misuse of substances that affect both physical and mental health (4 letters).
- A fatal consequence of drug use, often from excessive consumption (8 letters).
- The illegal act of transporting or selling drugs (10 letters).
- Illegal networks that distribute drugs internationally (10 letters).
Down
- The crime of cleaning illegally obtained money, often linked to drug trafficking (10 letters).
- Drug addiction often leads to losing this, impacting economic productivity (4 letters).
- Many drug Many drug users experience this mental condition, causing sadness and hopelessness (10 letters).
- Mental health disorder caused by drug use, involving extreme fear and nervousness (7 letters)
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs (6 letters).
- Drugs lower the overall for users (4 letters).
10 Clues: Drugs lower the overall for users (4 letters). • The illegal act of transporting or selling drugs (10 letters). • Illegal networks that distribute drugs internationally (10 letters). • A fatal consequence of drug use, often from excessive consumption (8 letters). • The misuse of substances that affect both physical and mental health (4 letters). • ...
THE IMPACT OF AI 2025-10-10
Across
- The ongoing progress in building smarter AI, better software, and advanced digital tools.
- The digital fuel that AI systems learn from and make decisions with.
- The human skill that helps design innovative AI tools and solve new problems.
Down
- When humans and AI — or people around the world — work together through technology.
- The protection of computer systems and networks from hacking or cyber threats.
- Moral principles guiding how AI should be created and used responsibly.
- Finding fairness between technology’s benefits and the risks it brings.
- The right to keep users’ personal data safe from tracking or misuse by technology.
- A kind of thinking needed to question AI decisions and detect misinformation.
- Describes technology that processes information using computers or code.
10 Clues: The digital fuel that AI systems learn from and make decisions with. • Moral principles guiding how AI should be created and used responsibly. • Finding fairness between technology’s benefits and the risks it brings. • Describes technology that processes information using computers or code. • ...
