networks Crossword Puzzles
Computer Networks 2019-09-17
Across
- Which network is able to connect to each computer through a common central line?
- A place where there is a field of signal through which you can access WiFi internet is called –
- Which layer is called end to end layer in OSI
- _____ is the error detection & correcting technique.
- OSI Reference Model has _______ layers
- Modulator and demodulator as combinely is known as
Down
- PSTN is an example of,
- Bridge works in which layer,
- I'm an Networking Device,
- Provides reliable communication
10 Clues: PSTN is an example of, • I'm an Networking Device, • Bridge works in which layer, • Provides reliable communication • OSI Reference Model has _______ layers • Which layer is called end to end layer in OSI • Modulator and demodulator as combinely is known as • _____ is the error detection & correcting technique. • ...
Computer Networks 2021-01-18
Across
- A network topology where all computers are connected to a main cable.
- A network topology where each computer is connected to two other computers
- A normal computer in a network
- A network spread over a large area
- A network confined to a small area connected by cables
- A network topology where computers are connected to a main device in the center
Down
- A computer that provides services to client computers
- Two or more devices connected together
- A network confined to a small area connected wirelessly
- Network structure
10 Clues: Network structure • A normal computer in a network • A network spread over a large area • Two or more devices connected together • A computer that provides services to client computers • A network confined to a small area connected by cables • A network confined to a small area connected wirelessly • A network topology where all computers are connected to a main cable. • ...
Networks cece 2022-03-27
Across
- the amount of data that can be transferred at one time.
- uses radio waves to transmit information between your device and a router via frequencies
- Data sent over computer networks*, such as the Internet, is divided
- how promptly corrupted or last packets can be resent.
Down
- the number of collisions in high network traffic.
- series of numbers that identifies any device on a network
- low bandwidth
- the speed that data travels during transfer (or delay in receiving).
- Doman Name System
- low loss of signal over distance
10 Clues: low bandwidth • Doman Name System • low loss of signal over distance • the number of collisions in high network traffic. • how promptly corrupted or last packets can be resent. • the amount of data that can be transferred at one time. • series of numbers that identifies any device on a network • Data sent over computer networks*, such as the Internet, is divided • ...
Cellular Networks 2022-05-14
Across
- Multiple antenna system for improving capacity
- Signal strength prediction model
- Prefix added to cancel out interference
- using same frequency in multiple cells
- gatway GPRS support node
- Equipment identification register
Down
- 4G standard
- operation and maintenance center
- Gains of components in transceiver chain
- bandwidth Characterize multipath channel
10 Clues: 4G standard • gatway GPRS support node • operation and maintenance center • Signal strength prediction model • Equipment identification register • using same frequency in multiple cells • Prefix added to cancel out interference • bandwidth Characterize multipath channel • Gains of components in transceiver chain • Multiple antenna system for improving capacity
Neural Networks 2022-05-14
12 Clues: our topic • inspiration • what we deserve • part of our body • we use every day • used in statistics • A function NN does • something NN track • Related to our topic • related to our topic • something ECE's have • The best doctor-Engineer
Computer Networks 2024-01-25
Across
- a device that allows computers to be joined together in a LAN
- Used for connecting the computer devices of personal use
- a computer networking devise that connects multiple computers together within one local area network
- an intelligent communication device that looks at the destination addresses (IP address) of the packets of data passing through it and decide which route each packet should take.
- a networking device that is used to connect devices connected in the network to the internet
Down
- A computer network covering a large geographical area
- is a device that allows wireless devices, like smartphones or laptops, to connect to a wired network using Wi-Fi
- A network confined to a limited geographical area like a room, a building, a department, school or workplace
- Two or more computers linked together to share resources
- a powerful computer that runs the network operating system and allows resources to be shared over the network by other devices connected to it.
10 Clues: A computer network covering a large geographical area • Used for connecting the computer devices of personal use • Two or more computers linked together to share resources • a device that allows computers to be joined together in a LAN • a networking device that is used to connect devices connected in the network to the internet • ...
Networks 1 2024-01-27
Across
- an electromagnetic wave
- connects electronic devices within a users inmediate area
- devices connected together in one physical location
- the speed at which a CPU can execute instructions
- a computer network that connects computers within a metropolitan area
- the amount of time required to complete certain operation
Down
- technology connecting offices, data centers & spans beyond a building
- two or more computers linked in order to share resources
- the maximum displacement or distance moved by an object or a point
- the distance from one wave to another
10 Clues: an electromagnetic wave • the distance from one wave to another • the speed at which a CPU can execute instructions • devices connected together in one physical location • two or more computers linked in order to share resources • connects electronic devices within a users inmediate area • the amount of time required to complete certain operation • ...
computer networks 2024-06-14
Across
- Device that converts digital data to analog signals and vice versa.
- Unique identifier for a device on a network.
- A smaller network within a larger network.
- Set of rules governing the exchange or transmission of data.
Down
- Maximum data transfer rate of a network or Internet connection.
- Security system that controls incoming and outgoing network traffic.
- Device that forwards data packets between computer networks.
- Secure network connection over the Internet.
- Device that connects devices within a single network segment.
- Common wired network technology for local area networks (LANs).
10 Clues: A smaller network within a larger network. • Secure network connection over the Internet. • Unique identifier for a device on a network. • Device that forwards data packets between computer networks. • Set of rules governing the exchange or transmission of data. • Device that connects devices within a single network segment. • ...
Social networks 2025-09-07
Across
- To subscribe to someone's posts so you can see their updates regularly.
- To stop someone from seeing your posts or contacting you on social media.
- A word or phrase with a special sign in front that helps group posts about the same topic.
- The list of posts and updates you see when you open a social media app.
Down
- A post or headline made to attract attention and clicks, often by being exaggerated or misleading.
- viral When a post or video is seen and shared by many people very quickly.
- A username on social media, often starting with the @ symbol.
- To show a post or content from someone else to your own followers or friends.
- A message, picture, or video you put on social media for others to see.
- A private message sent to someone on social media that only they can see.
10 Clues: A username on social media, often starting with the @ symbol. • To subscribe to someone's posts so you can see their updates regularly. • A message, picture, or video you put on social media for others to see. • The list of posts and updates you see when you open a social media app. • To stop someone from seeing your posts or contacting you on social media. • ...
Computer Networks 2025-11-23
Across
- Type of network with a central hub/switch
- Hardware that stores the addresses of all the computers on a network
- What happens when data is travelling in opposite directions and intercepts each other
- Network spanning one geographical location
- A type of network with very reliable connections
Down
- The biggest WAN
- The term used to describe how a network is laid out
- The type of mesh network where not all nodes are connected
- Hardware that connects two networks with the same base protocols
- A device on a network
10 Clues: The biggest WAN • A device on a network • Type of network with a central hub/switch • Network spanning one geographical location • A type of network with very reliable connections • The term used to describe how a network is laid out • The type of mesh network where not all nodes are connected • Hardware that connects two networks with the same base protocols • ...
Test 2021-01-15
16 Clues: Tuner • Scene • Gender • Verify • Secure • Confirm • Turn on • Latency • Networks • Downtime • Shortcut • Liability • Smart bulb • Hearing aid • Contact Center • Verification email
Wireless, Mobile Computing & Mobile Commerce (Adinda - Tri) 2018-05-09
Across
- A medium range wireless network.
- Wireless sensors that collect data from many points over an extended space.
- Uses frequencies to send data directly.
- Efforts by unauthorized users to access data that are traveling over wireless networks.
- The area of Earth’s surface reached by a satellite’s transmission.
- One of the mobility and broad reach values that has a wide range and is everywhere.
- Satellites stasionary relative to point on earth that orbit 22,300 miles.
- Worldwide Interoperability for Microwave Access.
- LEO satellite is used for.
- A wireless access point that provides service to a number of users.
- Something that changes its location over time.
Down
- A small, portable wireless device that provides users with a permanent Wi-Fi hotspot.
- The act of locating WLANs while driving (or walking) around a city or elsewhere.
- Wireless Networks that have a range of 100 feet or less.
- One of the electronic payments with the internet payment mechanism is done for a relatively small amount of money.
- An industry specification used to create small personal area networks.
- One of disadvantages of Satellite.
- A typical bar code made up of 12 digits that are batched in various groups.
- That users carry a device with them and can initiate a real-time contact with other systems.
- Basic types of RFID rely entirely on readers for their power.
20 Clues: LEO satellite is used for. • A medium range wireless network. • One of disadvantages of Satellite. • Uses frequencies to send data directly. • Something that changes its location over time. • Worldwide Interoperability for Microwave Access. • Wireless Networks that have a range of 100 feet or less. • Basic types of RFID rely entirely on readers for their power. • ...
examples 2018-09-10
Across
- a security protocol used in wi-fi networks
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- A set of interconnected networks that allow computers in different locations to exchange information
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- COMPRESS TO ONE FILE
- CREATED BY ADOBE SYSTEMS INC
- A COMPUTERS MEMORY
- CANNOT BE EDITED
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
- a security protocol used in wi-fi networks
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- to extract and decompress compressed files from it
- A point within a network that interconnects with other networks.
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- REDUCE SIZE OF A FILE
- READ ONLY MEMORY
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- CONNECTED TO A NETWORK OR THE INTERNET
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- TYPE OF EMAIL FRAUD
- SHORT FOR MALICIOUS SOFTWARE
29 Clues: READ ONLY MEMORY • CANNOT BE EDITED • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • CREATED BY ADOBE SYSTEMS INC • SHORT FOR MALICIOUS SOFTWARE • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
Chapter 4: Network 2024-11-08
Across
- – A network that spans a large geographic area, often countrywide or worldwide.
- – Network that connects devices wirelessly within a local area.
- – String of characters used for authenticating access to a system.
- – Personal network connecting devices like phones, tablets, or laptops.
- – Protocol that controls access to the network medium.
- – Network devices that send data to all connected devices.
- – Devices that route data between networks, directing packets to destinations.
- – Newer IP version that uses 128-bit addresses.
- – Online meeting technology using web browsers for audio, video, and sharing.
- – Cloud model offering shared resources to the public via the internet.
- – Set of rules for routing and addressing data packets.
- – Wireless personal network for short-range communication.
Down
- – Event of losing or corrupting stored information.
- – Network devices that forward data only to intended computers.
- – Cloud model that combines private and public cloud services.
- – Units of data formatted for transmission across networks.
- – Communication system that allows real-time video and audio interaction.
- – Hardware component that allows a device to connect to a network.
- – Security method using unique physical traits for identification.
- – Card with an embedded chip for data storage and authentication.
- – Fourth version of the Internet Protocol, using 32-bit addresses.
- – Device that connects two local networks, making them function as one.
- – Network connecting devices within a limited area, like a home or office.
23 Clues: – Newer IP version that uses 128-bit addresses. • – Event of losing or corrupting stored information. • – Protocol that controls access to the network medium. • – Set of rules for routing and addressing data packets. • – Network devices that send data to all connected devices. • – Wireless personal network for short-range communication. • ...
Programming-Coding Crosswords 2025-01-11
Across
- - Protects networks from unauthorized access.
- System - Manages hardware and software resources.
- - Fixing errors in code.
- - Point of interaction between systems.
- - Saves data permanently or temporarily.
- - The computer's main processing unit.
- - Harmful software designed to damage systems.
- - Organized collection of data.
- - Connects devices to share data.
- - Data entered into a computer.
- - Physical components of a computer.
- - Software for accessing the internet.
Down
- - Secures data by converting it to code.
- - Instructions written for computers.
- - Pathway for electrical signals.
- - Temporary data storage for quick access.
- - Data produced by a computer.
- - Programs that run on a computer.
- - Temporary memory for active tasks.
- - Online storage and computing services.
- - Executes instructions in a computer.
- - Provides resources to other computers.
- - A set of steps to solve a problem.
- - Rules for data exchange in networks.
24 Clues: - Fixing errors in code. • - Data produced by a computer. • - Organized collection of data. • - Data entered into a computer. • - Pathway for electrical signals. • - Connects devices to share data. • - Programs that run on a computer. • - Temporary memory for active tasks. • - A set of steps to solve a problem. • - Physical components of a computer. • ...
Programming-Coding Crosswords 2025-01-11
Across
- - Protects networks from unauthorized access.
- System - Manages hardware and software resources.
- - Fixing errors in code.
- - Point of interaction between systems.
- - Saves data permanently or temporarily.
- - The computer's main processing unit.
- - Harmful software designed to damage systems.
- - Organized collection of data.
- - Connects devices to share data.
- - Data entered into a computer.
- - Physical components of a computer.
- - Software for accessing the internet.
Down
- - Secures data by converting it to code.
- - Instructions written for computers.
- - Pathway for electrical signals.
- - Temporary data storage for quick access.
- - Data produced by a computer.
- - Programs that run on a computer.
- - Temporary memory for active tasks.
- - Online storage and computing services.
- - Executes instructions in a computer.
- - Provides resources to other computers.
- - A set of steps to solve a problem.
- - Rules for data exchange in networks.
24 Clues: - Fixing errors in code. • - Data produced by a computer. • - Organized collection of data. • - Data entered into a computer. • - Pathway for electrical signals. • - Connects devices to share data. • - Programs that run on a computer. • - Temporary memory for active tasks. • - A set of steps to solve a problem. • - Physical components of a computer. • ...
M3 2024-11-04
Across
- Physical or virtual barrier that controls network traffic
- Process of verifying a user's identity
- Security weakness in a system
- A malicious program that replicates itself and spreads to other computers
- Required information to solve a problem
- Process of gathering necessary information about a problem
- Unwanted bulk messages
- Steps taken to prevent attacks
- Testing a solution's effectiveness
- Device for accessing computer networks
Down
- Community-wide computer network
- Malicious software
- To find and fix problems
- Physical components of a computer system
- Final step in problem-solving process
- The practice of protecting systems, networks, and programs from digital attacks
- Make data unreadable to unauthorized users
- A type of social engineering attack using fake emails
- Tools used to detect and remove malware
- Security copy of data
- A common first step in problem-solving
21 Clues: Malicious software • Security copy of data • Unwanted bulk messages • To find and fix problems • Security weakness in a system • Steps taken to prevent attacks • Community-wide computer network • Testing a solution's effectiveness • Final step in problem-solving process • Process of verifying a user's identity • A common first step in problem-solving • ...
Wireless, Mobile Computing & Mobile Commerce (axel & adi) 2018-05-09
Across
- in remote parts of the world it is the only option available for Internet connections because installing cables is either too expensive or physically impossible.
- the area of Earth’s surface reached by a satellite’s transmission overcomes the limitations of microwave data relay stations. The higher a satellite orbits, the larger its footprint.
- a medium-range WLAN.
- virtually every object has processing power with either wireless or wired connections to a global network.
- has the smallest range of any short-range wireless networks, and is designed to be embedded in mobile devices such as cell phones and credit cards.
- One major limitation of GEO satellites is that their transmissions take a quarter of a second to send and return from the earth's surface.
- is red light that is not commonly visible to human eyes and common applications of infrared light are found in remote control units for televisions and DVD and CD players.
- have a range of 100 feet or less (e.g., Bluetooth, ultra-wideband (UWB), and near-field communications (NFC)).
- networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.
- a wireless access point that provides service to a number of users within a small geographical perimeter (up to approximately 300 feet).
Down
- networks that connect users to the Internet over a geographically dispersed territory, they typically operate over the licensed spectrum (government regulation).that is, they use portions of the wireless spectrum that are regulated by the government.
- the familiar wireless local area networks (WLANs) and the most common type of Medium-Range network is wireless fidelity (Wi-Fi).
- a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps which makes UWB a good choice for applications such as streaming multimedia from a personal computer to a television.
- a computer network used for communication among computer devices (e.g., telephones, personal digital assistants, and smartphones) located close to one person
- a real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet
- something that changes its location over time
- a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.
- uses radio-wave frequencies to send data directly between transmitters and receivers
- an industry specification used to create small personal area networks.
- without wires
20 Clues: without wires • a medium-range WLAN. • something that changes its location over time • an industry specification used to create small personal area networks. • uses radio-wave frequencies to send data directly between transmitters and receivers • virtually every object has processing power with either wireless or wired connections to a global network. • ...
Operating Systems & Networking 2020-11-27
Across
- variation of the Unix operating system
- physical and mechanical components of a computer such as the monitor, mouse, chips, keyboard, etc.
- serves as a security device between a computer and internet sites or between multiple computer networks
- network which provides connections between computers in multiple locations
- designed to be a small, flexible system for use by computer programmers
- worldwide, publicly accessed network
- extremely fast computer; can perform hundreds of millions of instructions every second
- powerful, single-user computer; more powerful microprocessor than PCs
- hardware device connected to multiple channels for different networks through an interface
Down
- programs which direct the operation of computers; instructions for a computer
- tags and instructions developed by the creator which tell the foundation of the system and how it was created
- program which acts as a boundary between a computer user and the computer itself
- chip which is the master control circuit of a computer
- local,privately owned networks
- machine which can be programmed to control symbols
- allows equipment such as fax machines, printers and files to be "served" to multiple computers
- system for communication between two or more computers
17 Clues: local,privately owned networks • worldwide, publicly accessed network • variation of the Unix operating system • machine which can be programmed to control symbols • chip which is the master control circuit of a computer • system for communication between two or more computers • powerful, single-user computer; more powerful microprocessor than PCs • ...
examples 2018-09-09
Across
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- REDUCE SIZE OF A FILE
- A point within a network that interconnects with other networks.
- CONNECTED TO A NETWORK OR THE INTERNET
- to extract and decompress compressed files from it
- A set of interconnected networks that allow computers in different locations to exchange information
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
- SHORT FOR MALICIOUS SOFTWARE
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- a security protocol used in wi-fi networks
- CANNOT BE EDITED
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- READ ONLY MEMORY
Down
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- A COMPUTERS MEMORY
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- TYPE OF EMAIL FRAUD
- CREATED BY ADOBE SYSTEMS INC
- a security protocol used in wi-fi networks
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- COMPRESS TO ONE FILE
29 Clues: CANNOT BE EDITED • READ ONLY MEMORY • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • CREATED BY ADOBE SYSTEMS INC • SHORT FOR MALICIOUS SOFTWARE • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
Computer Networks 2014-07-20
Across
- This usually connects a LAN together
- This keeps your user area secure
- A largest WAN in existence
- A machine that stores your files and data
- A software that keeps the network safe from hackers and viruses
Down
- A largest topology which has server in the middle
- This tells server who you are and which files present to you
- A hardware that can be connected to a network and shared
- Another name for a computer on the network
- A network topology which sends data in one direction only
10 Clues: A largest WAN in existence • This keeps your user area secure • This usually connects a LAN together • A machine that stores your files and data • Another name for a computer on the network • A largest topology which has server in the middle • A hardware that can be connected to a network and shared • A network topology which sends data in one direction only • ...
Networks keywords 2022-05-03
Across
- how protocols are sequenced and organized to handle different parts of communication
- the system that identifies every device on a network locally.
- Turns domain names into an ip address
- the piece of network hardware that directs data packets to the right place on a network
- network topology where all parts off the network are connected to each other
- a network topology where all parts are connected to one node
Down
- a network model where all computers are connected
- a network model with a central server
- the system that identifies every device on the internet
- The set of rules that define how data is transmitted on a network
10 Clues: a network model with a central server • Turns domain names into an ip address • a network model where all computers are connected • the system that identifies every device on the internet • a network topology where all parts are connected to one node • the system that identifies every device on a network locally. • ...
Networks ABM 2019-03-03
Across
- the delay before a transfer of data begins following an instruction for its transfer.
- Information is divided into
- What does IP Address stand for
- what does wi in wifi stand for
- What do you connect to the Internet with
- two or more devices connected together so that they can exchange data.
Down
- what does DNS stand for
- transmitting data between electronic devices
- A server is a networked computer that is providing a specific service to other computers on the network.
- technology that is most commonly used in wired local area networks
10 Clues: what does DNS stand for • Information is divided into • What does IP Address stand for • what does wi in wifi stand for • What do you connect to the Internet with • transmitting data between electronic devices • technology that is most commonly used in wired local area networks • two or more devices connected together so that they can exchange data. • ...
Understanding Networks 2020-04-01
Across
- networking device to connect devices
- forwards data to ultimate destination
- a small amount of data sent over a network
- uses light pulses over glass fibres
- information processed or stored by computer
- identifies the correct destination or computer
Down
- unique addresses assigned to computers
- wired protocol for linking computers, sending data and checking for collissions
- devices connected to share data
- a set of rules and standards
10 Clues: a set of rules and standards • devices connected to share data • uses light pulses over glass fibres • networking device to connect devices • forwards data to ultimate destination • unique addresses assigned to computers • a small amount of data sent over a network • information processed or stored by computer • identifies the correct destination or computer • ...
networks (marwa) 2025-01-06
Across
- to unscramble a word
- the steps of a method for encrypting data
- when people try to break into computer systems they are not supposed to acces
- sometimes radio waves from one device can disrupt radio waves from another and cause errors in the data
- made up of two things
- when the voltage of the electricity supply suddenly increases
Down
- it lets two devices swap information with each other so they can communicate
- how many cycles there are per second
- the whole of a wave from one top of one wave to the top of the next wave
- a hardware device that connects a network to the internet
10 Clues: to unscramble a word • made up of two things • how many cycles there are per second • the steps of a method for encrypting data • a hardware device that connects a network to the internet • when the voltage of the electricity supply suddenly increases • the whole of a wave from one top of one wave to the top of the next wave • ...
Neural Networks 2025-11-18
Across
- Link between neurons or between nodes
- Gap where one neuron passes a signal to another
- Process of adjusting weights to improve performance
- Structure or regularity learned by brains and neural nets
Down
- Activation function allowing outputs between 0 and 1
- Basic brain cell that sends and receives signals
- Early artificial neuron limited to binary output
- Biological brain model that inspired neural networks
- Values fed into a neural network node
- Simple processing unit in a neural network
10 Clues: Link between neurons or between nodes • Values fed into a neural network node • Simple processing unit in a neural network • Gap where one neuron passes a signal to another • Basic brain cell that sends and receives signals • Early artificial neuron limited to binary output • Process of adjusting weights to improve performance • ...
Networks 1 2025-10-21
Across
- Two or more connected devices
- Connecting a network using radio waves
- The unique address that every computer on a network has to have
- The server that provides access to a printer
- A set of rules for communication between devices
Down
- The amount of data that can be transferred in one second
- A powerful computer that provides a service to other computers on a network, like storing files for everyone.
- A computer that requests data from a server
- The fastest type of connection that uses light to send data
- A piece of hardware for routing data between networks
10 Clues: Two or more connected devices • Connecting a network using radio waves • A computer that requests data from a server • The server that provides access to a printer • A set of rules for communication between devices • A piece of hardware for routing data between networks • The amount of data that can be transferred in one second • ...
Road Security Crosswords 2023-05-09
Across
- Technique or code that takes advantage of a vulnerability.
- Who uses skills to exploit systems or networks.
- Is a technique used to assess the security of web applications by simulating attacks in real-time.
- A potential harm or negative consequences that arise from vulnerabilities and threats.
- Weakness or flaw that can be exploited.
- The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
- Malicious software that aims to damage or compromise systems.
- A disruptive event that compromises the security or integrity.
- A structured approach to developing software with a focus on security.
- A type of security testing that analyzes application source code for vulnerabilities.
Down
- A non-profit organization dedicated to improving software security through open resources and information.
- The process of evaluating and analyzing potential risks and vulnerabilities.
- Condition or circumstance that can cause harm or damage.
- Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
- Confidential or hidden information that is not widely known or shared
- A security assessment that identifies vulnerabilities in computer systems and networks.
- The process of reducing or minimizing the impact or severity.
17 Clues: Weakness or flaw that can be exploited. • Who uses skills to exploit systems or networks. • Condition or circumstance that can cause harm or damage. • Technique or code that takes advantage of a vulnerability. • Malicious software that aims to damage or compromise systems. • The process of reducing or minimizing the impact or severity. • ...
CN Unit I 2020-06-05
Across
- unit used in Data Link Layer
- when telephone calls between employees are carried out using the computer network
- refers to the collection of routers and communication lines owned by the network operator
- overloaded network
- another name for IEEE 802.11
- formed when distinct networks are interconnected
- is passed between the sender and the receiver
- an agreement between the communicating parties on how communication is to proceed
- spans a large geographical area, often a country or continent
- when devices communicate over the range of a person
Down
- transmission to a subset of the machines
- It allows a packet to be addressed to all destinations by using a special code in the address field
- specified by a set of primitives (operations) available to a user process to access the service
- Doing business with consumers over the Internet
- It allows companies to track users' activities in cyberspace
- defines which primitive operations and services the lower layer makes available to the upper one
- wires up an entire city
- another name for IEEE 802.16
- another name for IEEE 802.3
- Point-to-point transmission with one sender and one receiver
- used to join the individual networks at different sites into one extended network
- They are privately-owned networks within a single building or campus of up to a few kilometers in size
22 Clues: overloaded network • wires up an entire city • another name for IEEE 802.3 • unit used in Data Link Layer • another name for IEEE 802.11 • another name for IEEE 802.16 • transmission to a subset of the machines • is passed between the sender and the receiver • Doing business with consumers over the Internet • formed when distinct networks are interconnected • ...
examples 2018-09-04
Across
- A COMPUTERS MEMORY
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- CONNECTED TO A NETWORK OR THE INTERNET
- SHORT FOR MALICIOUS SOFTWARE
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
- a security protocol used in wi-fi networks
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- A set of interconnected networks that allow computers in different locations to exchange information
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
Down
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- READ ONLY MEMORY
- to extract and decompress compressed files from it
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- CANNOT BE EDITED
- REDUCE SIZE OF A FILE
- A point within a network that interconnects with other networks.
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- COMPRESS TO ONE FILE
- a security protocol used in wi-fi networks
- CREATED BY ADOBE SYSTEMS INC
- TYPE OF EMAIL FRAUD
29 Clues: READ ONLY MEMORY • CANNOT BE EDITED • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • SHORT FOR MALICIOUS SOFTWARE • CREATED BY ADOBE SYSTEMS INC • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
Expanding Interactions Review 2022-10-13
Across
- Christian campaigns to retake the holy lands
- ________________ structures fell, new ones took their place
- Region of Africa, Europe, and Asia
- First dynasty to fall
- The black death is also called the ________________ plague
- ___________ interaction among cultures expanded
- A period of a 1,000 years
- A spiritual and political leader of the Muslims
- World __________________ practiced in various parts of the world
- Vikings had trade networks here
Down
- The world became more ___________________ through trade and ideas
- Spread of ________________ caused world population to fluctuate
- ____________________ structures relied on agriculture and trade
- Lands under Muslim rule
- The majority branch of Islam
- ________ Mongolia was a time of peace in the Mongol Empire
- Ideas and __________________ moved through exchange networks
- Revolution in which we went from hunting to farming
- Mongol Tribe Leader
19 Clues: Mongol Tribe Leader • First dynasty to fall • Lands under Muslim rule • A period of a 1,000 years • The majority branch of Islam • Vikings had trade networks here • Region of Africa, Europe, and Asia • Christian campaigns to retake the holy lands • ___________ interaction among cultures expanded • A spiritual and political leader of the Muslims • ...
Jargon + 2023-08-20
Across
- Networks that allowed public networks to be used as private networks.
- interface for building web applications
- devices used to connect personal devices to internet
- software made specifically for certain OS.
- Stored recurring website assets
- computers used to store data and accessed through internet
Down
- types of software mostly referred to mobile device software
- coding mistakes or unwanted pieces of code that prevent software from working correctly
- systems designed to protect and secure a network
9 Clues: Stored recurring website assets • interface for building web applications • software made specifically for certain OS. • systems designed to protect and secure a network • devices used to connect personal devices to internet • computers used to store data and accessed through internet • types of software mostly referred to mobile device software • ...
3G Shutdown 2022 2022-01-03
Across
- The major mobile carriers have each set up webpages with more information on their plans to ____ out their 3G networks.
- This means users will not be able to make or receive calls and ___, even to 911.
- In addition, some older 4G phones that do not support HD _____
- Once the 3G network is shut down, 3G cell phones will not ______.
- Data ____ will also be unavailable
- Cricket, Boost, Straight Talk and some Lifeline mobile service ___ use the networks of AT&T, T-Mobile and Verizon.
Down
- Verizon said more than 99% of its _____ are on the 4G LTE or 5G network
- Major mobile carriers will be shutting down their 3G ____ in 2022,
- ________ said it will completely shut down its 3G network by Dec. 31, 2022.
- The retirement of the 3G network is to make room for more _____ networks
10 Clues: Data ____ will also be unavailable • In addition, some older 4G phones that do not support HD _____ • Once the 3G network is shut down, 3G cell phones will not ______. • Major mobile carriers will be shutting down their 3G ____ in 2022, • Verizon said more than 99% of its _____ are on the 4G LTE or 5G network • ...
Globalization and Illegal Flows 2025-12-18
La Familia y las comunidades 2021-09-24
20 Clues: hostile • baptism • coherent • educated • to spread • resources • consisten • the parade • to instill • principles • the wedding • to approach • consumerism • to influence • unemployment • to strengthen • social networks • direction, sense • to be worthwhile • to track or to follow
examples 2018-09-07
Across
- TYPE OF EMAIL FRAUD
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- SHORT FOR MALICIOUS SOFTWARE
- to extract and decompress compressed files from it
- REDUCE SIZE OF A FILE
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- READ ONLY MEMORY
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- CONNECTED TO A NETWORK OR THE INTERNET
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- A point within a network that interconnects with other networks.
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- a security protocol used in wi-fi networks
- A set of interconnected networks that allow computers in different locations to exchange information
- A COMPUTERS MEMORY
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- CREATED BY ADOBE SYSTEMS INC
- a security protocol used in wi-fi networks
- CANNOT BE EDITED
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
28 Clues: CANNOT BE EDITED • READ ONLY MEMORY • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • REDUCE SIZE OF A FILE • SHORT FOR MALICIOUS SOFTWARE • CREATED BY ADOBE SYSTEMS INC • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • A BARRIER THAT ACTS AS A COMPUTERS SECURITY • ...
it 2024-10-07
Across
- / Provides tech support to end-users.
- / Manages and processes health data through technology.
- / Designs and develops computer hardware.
- / Creates animations for various media formats.
- / Writes and tests code for software applications.
- / Manages cloud computing services.
- / Provides hardware and software support.
- / Protects systems and data from cyber threats.
- / Leads and oversees an organization’s IT strategy.
- / Assesses the security and reliability of IT systems.
- / Finds and hires IT professionals for companies.
- / Interprets data to help businesses make decisions.
- / Conducts investigations to advance IT knowledge.
- / Designs and manages complex database systems.
- / Manages and maintains websites.
- / Tests software for bugs and performance issues.
Down
- / Tests systems for vulnerabilities, ethically.
- / Designs the user interface of digital products.
- / Creates apps for various platforms.
- / Manages and maintains computer networks.
- / Builds and develops software programs.
- / Designs and builds communication networks.
- / Improves user experience in products or services.
- / Analyzes and resolves tech issues for companies.
- / Handles and processes large datasets.
- / Manages and coordinates IT services.
- / Studies the theoretical foundations of computing.
- / Designs and creates websites.
- / Plans and implements computer networks.
- / Analyzes complex data to gain insights.
- / Develops, tests, and maintains software.
- / Examines and improves information systems.
- / Designs and implements systems for business operations.
- / Specializes in securing communications through encryption.
34 Clues: / Designs and creates websites. • / Manages and maintains websites. • / Manages cloud computing services. • / Provides tech support to end-users. • / Creates apps for various platforms. • / Manages and coordinates IT services. • / Handles and processes large datasets. • / Builds and develops software programs. • / Designs and develops computer hardware. • ...
Network Requirements Crossword 2023-08-29
Across
- Holding place for instructions and data a computer needs to reach quickly.
- The performance driven by the need of the parties involved in data communication.
- Instructions that tell a computer what to do.
- Parameters that capture the characteristics of the network.
- Enables a computer to transfer data to and from devices with less CPU overhead.
- Rules that govern how data is transmitted, received and processed across computer networks.
- Actions and operations that take place within a networking device to handle communication.
- Amount of data that moves across a network during a given time.
- Transmission of digital data between two or more computer networks.
- Caused maily by networking congestion, transmission errors and network system failures.
Down
- A hardware component that enables a computer to connect to a network and communicate.
- A worldwide system of computer networks.
- Physical components of a computer.
- Required for end-to-end service provisioning.
- Measurement of how many units of information a system can process in a given amount of time.
- Time delay over your network connection.
- Process of removing the header and trailer information from a packet, as it moves to its destination.
- Handles framing, addressing, flow control and error detection.
- What is connected to a workstation as a LAN topology?
- Seven layers that computer systems use to communicate over a network.
20 Clues: Physical components of a computer. • A worldwide system of computer networks. • Time delay over your network connection. • Required for end-to-end service provisioning. • Instructions that tell a computer what to do. • What is connected to a workstation as a LAN topology? • Parameters that capture the characteristics of the network. • ...
cyber security 2025-10-09
Across
- when somebody creates a wifi that is unsecure
- a email to get you to put in your personal details
- a cheaper version of wiring networks
- an early version of the internet
- created by Tim beeriness lee
- another way to name a website
Down
- a way to protect you personal information
- diferent to a search engine
- network of networks
- a new way where data is sent via light
- conect to the internet using this
- mobile______
- part of a message
13 Clues: mobile______ • part of a message • network of networks • diferent to a search engine • created by Tim beeriness lee • another way to name a website • an early version of the internet • conect to the internet using this • a cheaper version of wiring networks • a new way where data is sent via light • a way to protect you personal information • ...
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Cybersecurity Awareness Month 2024-09-16
Across
- Function that converts data into a fixed size
- Measures taken to protect data
- Impersonating someone or something to deceive
- Securing data by converting it into code
- Software that records keystrokes
- Software that shows unwanted ads
- Malware that encrypts files demanding ransom
- Attack using trial and error to guess passwords)
- Investment scam involving fake accounts
- Vulnerabilities exploited before being patched
- Fraudulent attempts to steal sensitive information)
Down
- Malicious software designed to damage systems
- Hidden way of bypassing security controls
- Virtual Private Network for secure connections
- Software that collects data secretly
- Online harassment or bullying
- Multi-Factor Authentication
- Self-replicating malware that spreads across networks)
- Image, video or audio generated by AI
- A system that protects networks
- Network of compromised computers under attacker control)
- Software update to fix security vulnerabilities
22 Clues: Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Image, video or audio generated by AI • Investment scam involving fake accounts • Securing data by converting it into code • ...
network requirements 2024-10-02
Across
- – Process to determine the path of packets in a network.
- – Wireless communication standard for small networks.
- Rate – Frequency of transmission errors.
- (Dynamic Host Configuration Protocol) – Protocol for dynamic IP allocation.
- (Denial of Service) – Attack that overwhelms a network.
- – Resending data due to errors.
- Delay in packet transmission.
- – Layer in the OSI model for reliable transmission.
- Ensuring network resources are up and running.
Down
- – Temporary storage for managing data flow.
- – Maximum data transmission capacity.
- (Transmission Control Protocol) – Guarantees packet delivery.
- (Quality of Service) – Mechanism to prioritize traffic.
- – Securing communications through cryptography.
- – Device connecting and forwarding between networks.
- – Sending packets based on destination addresses.
- (Simple Network Management Protocol) – Used for network management.
- (Carrier Sense Multiple Access with Collision Detection) – Collision management mechanism.
- – Network topology with a central hub.
- (Open Systems Interconnection) – Network model.
20 Clues: Delay in packet transmission. • – Resending data due to errors. • – Maximum data transmission capacity. • – Network topology with a central hub. • Rate – Frequency of transmission errors. • – Temporary storage for managing data flow. • Ensuring network resources are up and running. • – Securing communications through cryptography. • ...
IT 2025-12-02
Across
- Tool used to secure data by converting it to code
- Extracting useful patterns from large datasets
- Software that manages computer hardware
- The visual part of software users interact with
- Rules for data communication over networks
- Checking a system for malicious software
- Online space to save and access files
- A software-based emulation of a computer
- Machines simulating human intelligence
Down
- Keeping servers running smoothly and securely
- Organizing and handling structured data
- Find and fix errors in software
- A set of rules for writing computer code
- Algorithms that learn from data automatically
- Protecting computers and networks from attacks
- New version of a program to improve it
- Measures to protect systems from digital threats
- Blocks unauthorized access to a network
- Copy of data saved for recovery purposes
- Write instructions for a computer program
20 Clues: Find and fix errors in software • Online space to save and access files • New version of a program to improve it • Machines simulating human intelligence • Organizing and handling structured data • Software that manages computer hardware • Blocks unauthorized access to a network • A set of rules for writing computer code • Checking a system for malicious software • ...
Social Media 2025-01-21
16 Clues: écran • abonné • réseaux • contenu • publier • anxiété • partager • commenter • problèmes • numérique • dépendance • ordinateur • exposition • estime de soi • cyberharcèlement • le bouton le plus utilisé sur Facebook
Networks 2022-01-17
Across
- the time it takes for data to be transported from its original source to its destination
- test for latency
- your best friend
Down
- a function that allows a streamed video or media file to be loaded while the user is watching or listening
- wireless Internet access
- refers to the speed which data or content travels from the World Wide Web to your device
6 Clues: test for latency • your best friend • wireless Internet access • the time it takes for data to be transported from its original source to its destination • refers to the speed which data or content travels from the World Wide Web to your device • a function that allows a streamed video or media file to be loaded while the user is watching or listening
Networks 2019-05-17
Across
- A set of rules for how messages are turned into data packets and sent across networks.
- A unique identifier issued to each device connected to a network. For example: 198.162.001.002
- A network of personal devices, not necessarily on the internet.
Down
- each unique piece of hardware on a network has a MAC address.
- A network of computers that covers a small area, eg a school or college.
- A network that spans across a building, buildings or even countries, eg the internet.
6 Clues: each unique piece of hardware on a network has a MAC address. • A network of personal devices, not necessarily on the internet. • A network of computers that covers a small area, eg a school or college. • A network that spans across a building, buildings or even countries, eg the internet. • ...
Networks 2024-12-05
Across
- A unique identifier for each device on a network.
- The physical components of a computer or electronic system.
- Information in a structured form, such as numbers, words, images, video, or sound, that can be processed and transmitted by a computer.
Down
- A networking device that connects devices together on a local area network.
- A personal area network; a small network that connects personal devices, such as computers, printers, and smartphones, within a small area.
- A networking device that forwards data packets between computer networks.
6 Clues: A unique identifier for each device on a network. • The physical components of a computer or electronic system. • A networking device that forwards data packets between computer networks. • A networking device that connects devices together on a local area network. • ...
Lessons 1-9 2015-09-29
Across
- Hypertext Mark Up Language
- Used to view webpages and navigate them via hyperlinks.
- Group of information on a computer that can be software programming or data.
- Example:.htm .htm .xml .gif
- The typer of communication in which the sending and receiving occur at different times. Example: email.
- Free service offered to UT students that basically serves as an online library and is very useful in this class.
- What percent of users simply scan a page when searching the web?
- Any type of picture, movies, or graphics.
- Wide area networks that are geographically not close together.
Down
- In "scannable" web pages, the key words are typically?
- A neutral language that avoids boastful and subjective talk.
- Person who falsifies data to pretend to be someone else.
- basic terminology for describing the world wide web.
- The type of communication in which both the sender and receiver are active at the same time.
- A search engine that uses popularity to rank the order of its hits.
- Locan area networks that are geographically close to each other.
- Fair Use: The permissible amount of illustrations or photographs that can be taken from another artist.
- Main technology for local area networks, it connects all of the computers in that facility.
18 Clues: Hypertext Mark Up Language • Example:.htm .htm .xml .gif • Any type of picture, movies, or graphics. • basic terminology for describing the world wide web. • In "scannable" web pages, the key words are typically? • Used to view webpages and navigate them via hyperlinks. • Person who falsifies data to pretend to be someone else. • ...
Block 1 Unit 6 IP Addressing Fundamentals 2023-08-03
Across
- The language of computers, uses 2 characters: 0 or 1
- Number that identifies the specific host or node on the network
- Addresses that are auto-assigned by the host to itself if not configured with a static IP.
- Class used for large networks as it supports the largest number of hosts.
- Designated IP addresses within each network class reserved for private/internal use only
- Subscript; Identifies the number system and quantity of Arabic numerals or symbols in the numbering system
- Class used for intermediate-sized networks.
- IPv4 uses 4 of them separated by dots/periods; each contains 8 binary bits
- Class used for small networks because it supports the smallest number of hosts
- Class reserved for research and development
Down
- Class reserved for multicast addressing
- IP Addresses in the range of 127.0.0.0 to 127.255.255.255 used for testing the hosts Network Interface Card (NIC).
- Number that identifies the network the host is on
- Used in IPv4 addresses, uses 10 characters: 0-9
- Used in IPv6 addresses, uses 16 characters: 0-9 and A-F
- Organization that assigns the network prefix on an IPv6 address
- Type of IPv6 addressing that eliminates long strings of zeroes.
- Each IPv4 address belongs to one of five of these depending on the number in the first octet.
18 Clues: Class reserved for multicast addressing • Class used for intermediate-sized networks. • Class reserved for research and development • Used in IPv4 addresses, uses 10 characters: 0-9 • Number that identifies the network the host is on • The language of computers, uses 2 characters: 0 or 1 • Used in IPv6 addresses, uses 16 characters: 0-9 and A-F • ...
vocab 24 2016-04-18
Across
- people who break into computers to get information
- software program
- one way networks are divided
- describes software architectural model relationship
- a device on a network
- supports phone service and other voice systems.
Down
- highend programs for network control
- hardware
- variation of LAN but doesn't use wires
- another way networks are divided
- device that directs traffic on network
11 Clues: hardware • software program • a device on a network • one way networks are divided • another way networks are divided • highend programs for network control • variation of LAN but doesn't use wires • device that directs traffic on network • supports phone service and other voice systems. • people who break into computers to get information • ...
networks 2019-05-17
Across
- guys in garages who take over peoples computers are.. (verb)
- lawyers have loads of these starts with a c ends in a t
- crisps come in these
Down
- you can use this to connect to speakers, a function on your mobile phone.
- the amount of data that can transfer through communications
- if you have a sandwich subtract the 'and' 6 letters
6 Clues: crisps come in these • if you have a sandwich subtract the 'and' 6 letters • lawyers have loads of these starts with a c ends in a t • the amount of data that can transfer through communications • guys in garages who take over peoples computers are.. (verb) • you can use this to connect to speakers, a function on your mobile phone.
Networks 2019-05-17
6 Clues: A multiplayer game • a computer network which spans a wide area • protects a network from unauthorized access • a computer network which spans a small area • Technology for connecting wired local area networks • A set of rules or standards for communicating devices
Networks 2019-05-17
6 Clues: a network cable • is a commutation network • something that connect a pc to a network • a global system that connects computers to each other • a famous car game played on a network only xbox and pc • something that connects that connects pcs in a limited area
Networks 2018-01-24
Across
- / Less vulnerable type of network because if a connection is removed nothing happens across the network, the downside is that if it is damaged or hub is removed no longer work at all.
- / This topology provides high availability, but requires that each end system is interconnected with all other systems.
- / Topology in which all computers are connected on the same transmission line via a cable, making the network highly vulnerable.
- / In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created.
Down
- / Network topology in which the nodes are arranged in a tree, facilitating the growth of network and share the same communications channel.
- / In this topology two or more topologies are combined to form a complete network design.
6 Clues: / In this topology two or more topologies are combined to form a complete network design. • / This topology provides high availability, but requires that each end system is interconnected with all other systems. • / In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created. • ...
Networks 2018-01-24
Across
- Network topology in which the nodes are arranged in a tree, facilitating the growth of network and share the same communications channel.
- In this topology two or more topologies are combined to form a complete network design.
Down
- Less vulnerable type of network because if a connection is removed nothing happens across the network, the downside is that if it is damaged or hub is removed no longer work at all.
- This topology provides high availability, but requires that each end system is interconnected with all other systems.
- In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created.
- Topology in which all computers are connected on the same transmission line via a cable, making the network highly vulnerable.
6 Clues: In this topology two or more topologies are combined to form a complete network design. • This topology provides high availability, but requires that each end system is interconnected with all other systems. • In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created. • ...
networks 2020-09-23
Networks 2022-03-28
Networks grade 12 2022-01-19
Across
- smart device for connection of computers
- physical arrangement of computers in network
- several webpages connected via hyperlink
- firstpage of website
- device to amplify signal in the network
- address of webpage
- organization provides network
Down
- maps web address to IP address
- device to decide path of data transmission
- topology in which if the link fails whole connection fails
- dumb device
- topology in which the central cable acts as backbone of network
- converts analog to digital, vice versa
- text/image to help navigate to other part or page
- Rules governing communication over internet
15 Clues: dumb device • address of webpage • firstpage of website • organization provides network • maps web address to IP address • converts analog to digital, vice versa • device to amplify signal in the network • smart device for connection of computers • several webpages connected via hyperlink • device to decide path of data transmission • Rules governing communication over internet • ...
Crossword of Networks 2015-04-01
Across
- A local area network
- The distributor of internet signal
- Width of your internet reach
- Twisted pair network cable capable of 100 mhz
- Directs internet signals
- IEEE 802.11x.
- Four core network cable
Down
- Anatomy of a server
- Changes from one network to the next
- A 8 wire connector to a computer network
- Blocks intruders from outside
- Underpins of the internet
- Type of network designs
- End user of internet network
- A no strings attached network
15 Clues: IEEE 802.11x. • Anatomy of a server • A local area network • Type of network designs • Four core network cable • Directs internet signals • Underpins of the internet • Width of your internet reach • End user of internet network • Blocks intruders from outside • A no strings attached network • The distributor of internet signal • Changes from one network to the next • ...
4th form Networks 2023-03-20
Across
- The largest WAN in the world
- Sending data from your computer to another one far away
- A link to another webpage
- A device that was used to connect to the internet years ago
- A collection of web pages
- This cable has several layers of insulation to prevent EMI
- A program used to browse the world wide web
- A public area that offers free internet access
Down
- A private network only accessible by the people inside
- A group the devices linked together to share resources
- A collection of websites and webpages
- Data can travel in only one direction
- Allows the transfer of data between two devices wirelessly over short distances
- A document made using HTML
- message sent across a computer network
15 Clues: A link to another webpage • A collection of web pages • A document made using HTML • The largest WAN in the world • A collection of websites and webpages • Data can travel in only one direction • message sent across a computer network • A public area that offers free internet access • A private network only accessible by the people inside • ...
Computer networks vocab 2025-03-19
Across
- Deprecated protocol for encrypted web communication (abbr.).
- Secure tunnel for remote access, often used by telecommuters (abbr.).
- Automates IP assignments, leases addresses, and avoids conflicts (abbr.).
- Short-range, high-bandwidth wireless tech for precise tracking (abbr.).
- A storage pool accessed by multiple devices simultaneously.
- Old-school LAN tech where a 'token' controls data flow.
Down
- Self-healing web of interconnected nodes, great for IoT.
- Outdated VPN protocol with known security flaws (abbr.).
- Hardware linking hosts to storage networks, often in SANs (abbr.).
- Software managing network resources and user permissions (abbr.).
- VPN tunneling protocol often paired with IPsec (abbr.).
- High-speed network for block-level storage access (abbr.).
- Wireless tech for tracking objects using radio waves (abbr.).
- SSL's successor, securing web traffic with encryption (abbr.).
- Private network connecting a company's multiple sites (abbr.).
15 Clues: VPN tunneling protocol often paired with IPsec (abbr.). • Old-school LAN tech where a 'token' controls data flow. • Self-healing web of interconnected nodes, great for IoT. • Outdated VPN protocol with known security flaws (abbr.). • High-speed network for block-level storage access (abbr.). • A storage pool accessed by multiple devices simultaneously. • ...
Spanish 25 words 2021-04-30
25 Clues: If • Tap • Else • List • Loop • Cyber • Float • Array • Print • Sprite • Commit • Uptime • Python • Integer • If else • Settings • Function • For loop • Variable • Autonomous • While loop • cybersecurity • Binary numbers • nueral networks • Machine learning
Terminologie II 2017-05-17
25 Clues: Link • Maps • Slash • Reset • Retry • Unlock • Router • Laptop • Updates • To scan • To scam • Privacy • Passcode • Networks • Settings • Download • Phishing • Software • Reminders • To set up • To update • To restore • Up to date • Remote control • Troubleshooting
Unit 7 2022-03-21
Across
- an obsolete term for a system of packet-switched communication networks interconnected via gateways
- situated at an angle or moving in a sloping direction
- an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection
- a family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks
- a track or set of tracks made of steel rails along which passenger and freight trains run
- transmit (a programme or some information) by radio or television
- In the direction of a stream
Down
- a user of the internet, especially a habitual or keen one
- a form of communication that combines different content forms such as text, audio, images, animations, or video into a single interactive presentation
- an electronic device in a communication channel that increases the power of a signal and retransmits it, allowing it to travel further
10 Clues: In the direction of a stream • situated at an angle or moving in a sloping direction • a user of the internet, especially a habitual or keen one • transmit (a programme or some information) by radio or television • a track or set of tracks made of steel rails along which passenger and freight trains run • ...
Crossword (epic) 2023-01-20
Across
- IP addresses used to send information over public networks
- is a network protocol that is used to configure network devices to communicate on an IP network
- sample rate x bit depth
- base 2
- a worldwide system of computer networks
Down
- a process or set of rules to be followed in calculations by a computer.
- American Standard Code for Information Interchange
- a system for connecting a number of computer systems to form a local area network
- s a network security device that monitors and filters incoming and outgoing network traffic
- IP addresses allow computers to communicate with each other on private networks
10 Clues: base 2 • sample rate x bit depth • a worldwide system of computer networks • American Standard Code for Information Interchange • IP addresses used to send information over public networks • a process or set of rules to be followed in calculations by a computer. • IP addresses allow computers to communicate with each other on private networks • ...
Tech Terms 2015-03-31
Across
- A computer network that covers a large geographical area, consisting of two or more LAN networks.
- Connects a computer to a computer network, can also be called a LAN adapter.
- A device that sends data between different connected computer networks.
- Communication between two or more connections that do not require a cable.
- Transfers data within a computer.
- This type of network allows for data transmission between smart phones.
- When you are not connected to WiFi you need to use this type of cord.
- Uses network media to interconnect computers in a limited area.
Down
- Uses network media to interconnect computers in a larger city area.
- A type of wireless connection that allows data transmission between multiple devices.
- A type of communication network.
- Usually uses WiFi to connect devices to the internet through wireless LAN.
- A device that connects multiple ethernet networks together to create a single network.
- A secure system to protect an internal network from incoming network traffic.
- Can run on any computer and accepts requests from the client, intern giving responses.
15 Clues: A type of communication network. • Transfers data within a computer. • Uses network media to interconnect computers in a limited area. • Uses network media to interconnect computers in a larger city area. • When you are not connected to WiFi you need to use this type of cord. • A device that sends data between different connected computer networks. • ...
Course Name: Internet Of Things(CSDLO 5013) 2024-09-28
Across
- protocol is used to link all the devices in the IoT?
- Which one of the following protocols is lightweight?
- Which layer handles the communication and transport of data between IoT devices and the cloud in the IoT World Forum Architecture?
- type of short-range high-frequency wireless communication technology
- APIs allow bi- directional, full duplex communication between clients and servers.
- How many layers does the IoT World Forum (IWF) Reference Model have?
- name of the “credit card-sized computer board
- Which protocol is primarily used for wide-area IoT networks with low bandwidth requirements?
Down
- Which Application Layer Protocol for M2M applications?
- can be considered as a version of MQTT
- allows devices communicates directly with each other using wired or wireless
- IoT devices which have unique identities
- Which IoT protocol is known for device discovery and management and is a key standard for home automation?
- Which of the following is a key feature of LoRaWAN in IoT networks?
- Which IoT protocol is known for low power consumption and is commonly used for sensor networks?
15 Clues: can be considered as a version of MQTT • IoT devices which have unique identities • name of the “credit card-sized computer board • protocol is used to link all the devices in the IoT? • Which one of the following protocols is lightweight? • Which Application Layer Protocol for M2M applications? • Which of the following is a key feature of LoRaWAN in IoT networks? • ...
Basic Network Configuration 2025-11-13
Across
- A secure connection that allows safe access to private networks over the internet.
- A network that covers a small area such as a home, office, or school.
- The system that translates domain names into IP addresses.
- A unique physical address embedded in each device’s network card.
- A smaller section of a larger network separated for efficiency and security.
- A network security system that monitors and controls data traffic to protect against threats.
- A manually assigned IP address that does not change.
- A physical cable (such as Cat5e or Cat6) used for wired network connections.
Down
- The numeric code that separates the network part and host part of an IP address.
- A unique numeric address used to identify a device within a network.
- The main protocol suite used for communication on the internet.
- The exit point or bridge between a local network and external networks.
- The device that directs data traffic between networks.
- A device that connects multiple computers within a network and sends data only to the correct destination.
- The command used to test network connectivity between devices.
15 Clues: A manually assigned IP address that does not change. • The device that directs data traffic between networks. • The system that translates domain names into IP addresses. • The command used to test network connectivity between devices. • A unique physical address embedded in each device’s network card. • ...
Topic 4 Networks 2024-01-29
Across
- network device used to block malicious requests
- computer in a computer network
- ensures reliable delivery of data
- network confined to a small area
- device which connects multiple network devices
- a piece of data sent over a network
- process of converting data to prevent unauthorized acess
Down
- amount of data that can be transferred at a given time
- type of compression in which some of the data is lost
- private network used by businesses to share information with customers,employees etc.
- one of the TCP/IP layers
- group of multiple devices connected together
- technology that allows to make voice calls over a broadband internet connection
- device which requests services from a server
- connects computer networks and routes traffic
15 Clues: one of the TCP/IP layers • computer in a computer network • network confined to a small area • ensures reliable delivery of data • a piece of data sent over a network • group of multiple devices connected together • device which requests services from a server • connects computer networks and routes traffic • device which connects multiple network devices • ...
Türkçe kelimelerin İngilizce anlamlarını bulunuz. 2022-01-24
14 Clues: zeka • bilgi • sanal • etkili • duymak • yetenek • oyunlar • iletişim • hissetmek • arkadaşlık • haber verici • iletişimsizlik • language vücut dili • networks sosyal ağlar
reda hajji crossword lab 2019-11-12
27 Clues: xat • CPU • ROM • RAM • DVD • Xarxa • Torre • Teclat • Inglès • optica • Teclat • Ratolí • Escaner • gràfica • Mini Pc • Altaveu • magnetic • Pantalla • Micròfon • Servidors • Ventilador • Auriculars • Placa Base • Impressora • assignatura • informatica • Ratolí de bola
Los medios de comunicacion 2012-12-12
16 Clues: soaps • press • message • computer • audience • chat show • magazines • game show • mp3 player • to download • advertising • tv listings • to be online • mobile phone • search engine • social networks
dasd 2021-04-30
25 Clues: If • Tap • Else • List • Loop • Cyber • Float • Array • Print • Sprite • Commit • Uptime • Python • Integer • If else • Settings • Function • For loop • Variable • Autonomous • While loop • cybersecurity • Binary numbers • nueral networks • Machine learning
Introduction to Networks 2020-12-09
Across
- Your excellent computing teacher's last name.
- Connects to a wired network and provides wireless network radio signal for wireless devices to connect to.
- Performs a similar function to the network interface card but uses radio signals to connect to the network (abbreviation).
- Responsible for moving data from one network to another, e.g. from your home network to the internet.
- Two or more computers which are linked together so that they can share resources and data.
- A physical connection that often links together computers in a LAN.
- The opposite of software. Used in networking.
Down
- Small networks which are contained in a single building or small area. Not a dictionary word.
- Two of these connected together can form the smallest LAN.
- Wireless fidelity (abbreviation).
- Converts data from analogue to digital signals so that it can be transmitted across different media — traditionally, telephone cables.
- Larger networks over a wider geographical area. Also a term meaning pallid/sickly.
- The largest WAN.
- Enables multiple wired devices to connect, and uses packet switching to direct data to the correct device.
- Enables a wired network connection between a computer and another networked device (abbreviation).
15 Clues: The largest WAN. • Wireless fidelity (abbreviation). • Your excellent computing teacher's last name. • The opposite of software. Used in networking. • Two of these connected together can form the smallest LAN. • A physical connection that often links together computers in a LAN. • Larger networks over a wider geographical area. Also a term meaning pallid/sickly. • ...
Tech Terms 2015-03-31
Across
- A computer network that covers a large geographical area, consisting of two or more LAN networks.
- Connects a computer to a computer network, can also be called a LAN adapter.
- A device that sends data between different connected computer networks.
- Communication between two or more connections that do not require a cable.
- Transfers data within a computer.
- This type of network allows for data transmission between smart phones.
- When you are not connected to WiFi you need to use this type of cord.
- Uses network media to interconnect computers in a limited area.
Down
- Uses network media to interconnect computers in a larger city area.
- A type of wireless connection that allows data transmission between multiple devices.
- A type of communication network.
- Usually uses WiFi to connect devices to the internet through wireless LAN.
- A device that connects multiple ethernet networks together to create a single network.
- A secure system to protect an internal network from incoming network traffic.
- Can run on any computer and accepts requests from the client, intern giving responses.
15 Clues: A type of communication network. • Transfers data within a computer. • Uses network media to interconnect computers in a limited area. • Uses network media to interconnect computers in a larger city area. • When you are not connected to WiFi you need to use this type of cord. • A device that sends data between different connected computer networks. • ...
Internet Hardware 2018-02-13
Across
- when a signal strength is reduced by distance / rain / other solid objects
- wireless signa lused by satellites
- a device that connects 2 different networks
- provides services to other computers
- a collection of computers that can communicate with each other
- one wire inside another wire
- connects local computers and only sends data to computers necessay
Down
- when 1 electrical signal gets in the way of another
- changes the physical nature of a data signal
- small wires twisted together
- a network of networks
- forwards internet traffic
- wireless optical signal
- wireless service that uses 2.4 Ghz radio wave range
- connects local computers
15 Clues: a network of networks • wireless optical signal • connects local computers • forwards internet traffic • small wires twisted together • one wire inside another wire • wireless signa lused by satellites • provides services to other computers • a device that connects 2 different networks • changes the physical nature of a data signal • ...
Vocabulary Exercise 4 2020-09-24
25 Clues: hilo • útil • redes • éxito • grado • suave • ganar • taller • lograr • consejo • medalla • amenaza • permitir • regatear • absurdo/a • empoderar • descubrir • invertido • explicación • orgulloso/a • herramientas • preocupado/a • carencia o falta • emprendedores/as • objetivos o metas
Faculty meeting Nov 2 Attendees 2022-11-08
19 Clues: R* • Yeast • Frogs • Birds • Theory? • Primates • Crickets • Crickets • Cave fish • Oak trees • Cephalopods • Prairie plants • Disease networks • Tropical forests • Nutrient cycling • Fungal endophytes • Ecosystem ecology • Lichen and Bryophytes • Butterflies (and more)
NETWORKING PARTS 2019-02-28
Across
- to search for information about (someone or something) on the Internet using the search engine
- what does USB means.
- a group or system of interconnected people or things.
- a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).
- a panel of keys that operate a computer or typewriter.
- a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions.
- includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, etc.
- is any hardware device that sends data to a computer.
- the cretor of the company google.
Down
- a computer that is optimized for high multimedia performance.
- is the significant of HDMI
- it means RJ
- is a file storage and synchronization service developed.
- a computer network that spans a relatively small area.
- a type of connector commonly used for Ethernet networking.
- a power tool with a shaped cutter, used in carpentry for making grooves for joints, decorative moldings, etc.
16 Clues: it means RJ • what does USB means. • is the significant of HDMI • the cretor of the company google. • a group or system of interconnected people or things. • is any hardware device that sends data to a computer. • a computer network that spans a relatively small area. • a panel of keys that operate a computer or typewriter. • ...
Joseph Vocab 2014-11-12
Across
- dots that make up an image
- appears on the display screen and gives you information
- Main page of a website
- short for internet etiquette
- A connection of networks
- quality of an picture
Down
- the act of transferring a file from the internet to a local computer
- made of 8 bits, and is a unit of memory
- A high speed internet
- Worldwide connection of networks
- the software that you play on your phone
- tells what program was used to open a file
- an internet service provider
- Short for hyper-text markup language
- state of being connected to the internet
15 Clues: A high speed internet • quality of an picture • Main page of a website • A connection of networks • dots that make up an image • an internet service provider • short for internet etiquette • Worldwide connection of networks • Short for hyper-text markup language • made of 8 bits, and is a unit of memory • the software that you play on your phone • ...
Mesh Networking 2020-05-12
Across
- Most Mesh Wi-Fi Networks offered by Apple include _____ integration
- Device _____ lets you select devices that need the most speed
- ______ or internet speed can impact the amount of nodes required.
- Customers with many wireless products around the home may require additional _____.
- Mesh Wi-Fi Networks are flexible and _____.
- _______ broadcast the internet signal from the modem to the wireless devices.
Down
- _____ from nearby wireless signals and devices can degrade the strength of a network
- If the router in a Mesh Wi-Fi Network does not include a _____, customers may need to contact their ISP
- Mesh Wi-Fi Networks update encryption protocols _____.
- Wi-Fi _____ is a node that duplicates the available wireless signal from a router across a wider range.
- Mesh Wi-Fi _____ includes a main router that connects to a modem
- With a home _____, customers can control HomeKit accessories remotely.
12 Clues: Mesh Wi-Fi Networks are flexible and _____. • Mesh Wi-Fi Networks update encryption protocols _____. • Device _____ lets you select devices that need the most speed • Mesh Wi-Fi _____ includes a main router that connects to a modem • ______ or internet speed can impact the amount of nodes required. • ...
Computer Quiz 2021-10-27
Across
- What's the network connection or junction common to two or more line of networks.
- what do you use to click on with google.
- What's a piece of data along with a destination address used in packets switching of a graphic image.
- What does D mean for a file that organises other files.
- What do you type on to search.
- What is on your computer that is a storage system.
- What is the web address.
Down
- What is the networking hardware that allows Wi-Fi to connect to wined networks.
- What starts with a G that means a device has routed traffic between networks.
- What's the smallest picture element part.
- What does C mean when your computer browser contains various information regards to the specific web.
- When turning off the computer by holding the power button what's it called.
12 Clues: What is the web address. • What do you type on to search. • what do you use to click on with google. • What's the smallest picture element part. • What is on your computer that is a storage system. • What does D mean for a file that organises other files. • When turning off the computer by holding the power button what's it called. • ...
networks 2018-06-21
6 Clues: the unchanging address of a computer • what is the modern form of encryption • what cipher shifts the alphabet by +n • transfer of data across a short distance • transfer of data across a large distance • the data that must be put together when recieved
networks 2019-05-17
6 Clues: rhymes with tub • rhymes with witch • a wall made of flames • what you find crisps in • you use it to search up stuff • you can use it to connect your device to a wireless speaker
Chapter 3 2012-09-05
Across
- allows users who are online to key text messages
- people who access computers or networks without permission
- a computer crime
- the buying & selling of products online
- a destructive program
- are moral standards & values
- the electronic transfer of messages
Down
- is a term used to describe rules for proper online behavior
- when one computer links to another
- the main lists of results
- A web of computer networks that spans the Earth
- includes any unsolicited or unwanted message
- a program that lets you find & view web pages
- allows you to post messages for others to read
- can be a text, a button, or a graphic
15 Clues: a computer crime • a destructive program • the main lists of results • are moral standards & values • when one computer links to another • the electronic transfer of messages • can be a text, a button, or a graphic • the buying & selling of products online • includes any unsolicited or unwanted message • a program that lets you find & view web pages • ...
Ciara's cross word puzzle. 2022-03-19
Across
- In which transaction are conducted online.
- Recording media or to retain data.
- Electronic banking outlet.
- conducts over a computer mediated network.
- Refers to all technologies the internet wireless networks.
- Telephone communication.
- The buying and selling of goods.
Down
- An online technology.
- Analyzes the information and report data.
- The programs and routines for a computer.
- A way to digitally create 2D and 3D.
- A live audio or audiovisual meeting.
- Banking machine.
- Tools machinery, other durable equipment.
- networks A system of interconnected electronic components or circuits.
15 Clues: Banking machine. • An online technology. • Telephone communication. • Electronic banking outlet. • The buying and selling of goods. • Recording media or to retain data. • A way to digitally create 2D and 3D. • A live audio or audiovisual meeting. • Analyzes the information and report data. • The programs and routines for a computer. • Tools machinery, other durable equipment. • ...
Internet and network 2025-12-16
Across
- – A set of rules for data communication
- – A device that requests data from a server
- – A computer that provides data or services to others
- – The language used to create web pages
- – Software used to access websites
- – A language used to style web pages
- – A unique number that identifies a device on a network
- – Clickable text or image that opens another page
- – A complete HTML structure with tags and content
- – A wired networking technology
- – The readable name of a website
- – The amount of data that can be sent at one time
Down
- – Network communication without cables
- – Security system that blocks unauthorized access
- – A keyword used in HTML code
- – A device that directs data between networks
- – Extra information inside an HTML tag
- – A group of connected devices that share data
- – A collection of related web pages
- – A global system of connected computer networks
20 Clues: – A keyword used in HTML code • – A wired networking technology • – The readable name of a website • – Software used to access websites • – A collection of related web pages • – A language used to style web pages • – Network communication without cables • – Extra information inside an HTML tag • – A set of rules for data communication • ...
AI Can't be ethical 2024-09-28
Across
- perhaps we shouldn't be asking ....questions
- the perpetration of negative....against women
- it uses layers of something called .....networks
- once again we are choosing..... over what is good for us as individuals
- to....huge rewards from
- after finding a .......
- is there a ......ground we can work towards
Down
- the ability for machines to carry out.....
- to reflect on our ....relationship with technology
- AI is a ....to our humanity
- the tip of the......
- the ....size of these networks
- the problem of humanity is we have.....emotions
- let's take a step back and talk about this....technology
14 Clues: the tip of the...... • to....huge rewards from • after finding a ....... • AI is a ....to our humanity • the ....size of these networks • the ability for machines to carry out..... • is there a ......ground we can work towards • perhaps we shouldn't be asking ....questions • the perpetration of negative....against women • the problem of humanity is we have.....emotions • ...
La Tecnologia 2020-04-26
19 Clues: link • screen • to post • browser • profile • to copy • to chat • keyboard • to paste • username • password • to search • to google • smart phone • to turn off • to be careful • social networks • to upload photos • to send messages
Internet of Things 2024-08-06
Across
- A technology that uses electromagnetic fields to automatically identify and track tags attached to objects.
- A cloud service provider with services for IoT.
- A standard defining the operation of lowrate wireless personal area networks (LRWPANs).
- A highlevel programming language used for IoT logical design on Raspberry Pi.
- A protocol that allows IPv6 packets to be sent and received over IEEE 802.15.4 based networks.
- A small, affordable computer used to learn programming and build hardware projects.
Down
- An opensource electronics platform based on easytouse hardware and software.
- A specification for a suite of highlevel communication protocols using lowpower digital radios.
- A specialized web transfer protocol for use with constrained nodes and constrained networks.
- A network management protocol developed and standardized by the IETF.
- MachinetoMachine communication, which is a key aspect of IoT.
- A communication protocol developed for industrial applications.
12 Clues: A cloud service provider with services for IoT. • MachinetoMachine communication, which is a key aspect of IoT. • A communication protocol developed for industrial applications. • A network management protocol developed and standardized by the IETF. • An opensource electronics platform based on easytouse hardware and software. • ...
NETWORKS 2020-06-02
Networks 2019-05-17
Across
- A set of rules for how messages are turned into data packets and sent across networks.
- A network that spans across a building, buildings or even countries, eg the internet.
- A unique identifier issued to each device connected to a network. For example: 198.162.001.002
Down
- each unique piece of hardware on a network has a MAC address.
- A network of personal devices, not necessarily on the internet.
- A network of computers that covers a small area, eg a school or college.
6 Clues: each unique piece of hardware on a network has a MAC address. • A network of personal devices, not necessarily on the internet. • A network of computers that covers a small area, eg a school or college. • A network that spans across a building, buildings or even countries, eg the internet. • ...
Networks 2023-03-21
Across
- - Bringing together those who have a faith or similar beliefs.
- - Empowering and celebrating FDMers of all genders.
- - Creating an open and inclusive environment for LGBTQ+ employees through education and representation.
Down
- - Supporting FDMers with visible and non-visible disabilities, including mental health conditions.
- - Providing a supportive network for those with parental and/or caring responsibilities
- - Leading, Educating and Aspiring Diversity network – representing and celebrating FDM’s BAME community.
6 Clues: - Empowering and celebrating FDMers of all genders. • - Bringing together those who have a faith or similar beliefs. • - Providing a supportive network for those with parental and/or caring responsibilities • - Supporting FDMers with visible and non-visible disabilities, including mental health conditions. • ...
Networks 2014-04-23
Across
- A network interface controller is a computer hardware component that connects a computer to a computer network
- a device which forwards data packets to the appropriate parts of a computer network.
- a block of data transmitted across a network.
Down
- Devices on your network to which multiple Ethernet connections (called nodes) are made. The main difference between a hub and a switch is a matter of performance
- a group or system of interconnected people or things.
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analogue signal of a telephone line.
6 Clues: a block of data transmitted across a network. • a group or system of interconnected people or things. • a device which forwards data packets to the appropriate parts of a computer network. • A network interface controller is a computer hardware component that connects a computer to a computer network • ...
CyberNewspaper 2024-09-16
Across
- Online harassment or bullying
- Impersonating someone or something to deceive
- Software update to fix security vulnerabilities
- Measures taken to protect data
- Function that converts data into a fixed size
- Network of compromised computers under attacker control)
- Securing data by converting it into code
- Distributed Denial of Service attack to overwhelm a network)
- Investment scam involving fake accounts
- Self-replicating malware that spreads across networks)
- Software that shows unwanted ads
- A system that protects networks
Down
- Fraudulent attempts to steal sensitive information)
- Malware that encrypts files demanding ransom
- Zero Trust Architecture
- Hidden way of bypassing security controls
- Malware disguised as legitimate software
- Attack using trial and error to guess passwords)
- Software that records keystrokes
- Virtual Private Network for secure connections
- Vulnerabilities exploited before being patched
- Software that collects data secretly
- Multi-Factor Authentication
23 Clues: Zero Trust Architecture • Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Investment scam involving fake accounts • Malware disguised as legitimate software • ...
Security Cross Word 2025-10-14
Across
- Virtual private connection over public networks
- Restricting distribution based on sensitivity
- Detects, blocks, and responds on endpoints (abbr.)
- Legal framework protecting personal information
- Network barrier enforcing traffic rules
- Targeted, well-researched phishing attack
- Manipulating people to bypass security
- Program that demands payment to restore data
- Authentication standard for phishing resistance
- Application for generating/storing credentials
- Principle: assume breach and verify explicitly
Down
- Backups that enable restoration after attacks
- Small software flaw exploited by attackers
- Process of reporting an event to Security
- Transforming data to unreadable form
- Attack where criminals pose as executives
- Practice of updating systems to fix flaws
- Limiting access to only what’s needed
- Protects data in transit on untrusted networks
- Malicious software
- Deceptive emails designed to steal information
- Policy prohibiting unapproved tools
- Security model emphasizing continuous verification
- Second factor for identity verification
- Preventing unauthorized data exfiltration (abbr.)
25 Clues: Malicious software • Policy prohibiting unapproved tools • Transforming data to unreadable form • Manipulating people to bypass security • Limiting access to only what‚Äôs needed • Network barrier enforcing traffic rules • Second factor for identity verification • Process of reporting an event to Security • Attack where criminals pose as executives • ...
Networks 2014-10-14
Networks 2021-09-17
Across
- collection of interconnected computers Server- manages access to shared resources of a network EthernetCables- a cable used to connect to network devices directly.
- of a central copper wire
- path of communication that join 2 components.
Down
- Any computer connected to the server.
- strand of light conducting glass wire.
- Uses a low power radio wave
6 Clues: of a central copper wire • Uses a low power radio wave • Any computer connected to the server. • strand of light conducting glass wire. • path of communication that join 2 components. • collection of interconnected computers Server- manages access to shared resources of a network EthernetCables- a cable used to connect to network devices directly.
Networks 2022-06-09
Across
- ____ occurs when two or more computers are attempting to transfer data across a network at a time.
- which type of topology is best suited for large businesses which must carefully control and coordinate the operation of distributed branch outlets?
- OSI has ___ layers
- ___ bits is used error detection
Down
- Which of the following cannot be used as a medium for 802.3 ethernet?
- At what speed does tele-computed refer?
6 Clues: OSI has ___ layers • ___ bits is used error detection • At what speed does tele-computed refer? • Which of the following cannot be used as a medium for 802.3 ethernet? • ____ occurs when two or more computers are attempting to transfer data across a network at a time. • ...
Networks 2019-05-17
Across
- a computer that hold others computers data (6 letters)
- used to protect computer's from viruses (8 letters)
Down
- a person who gains unauthorized access to a computer (6 letters)
- a system that uses a computers data to copy or scan an item (7 letters)
- a web address (3 letters)
- network of computers that covers a small area (3 letters)
6 Clues: a web address (3 letters) • used to protect computer's from viruses (8 letters) • a computer that hold others computers data (6 letters) • network of computers that covers a small area (3 letters) • a person who gains unauthorized access to a computer (6 letters) • a system that uses a computers data to copy or scan an item (7 letters)
