networks Crossword Puzzles
Computer Networks 2020-06-19
Across
- When a program displays a message and pauses for the user to type some input to the program
- Personal Digital Assistant
- Errors when your program has good syntax but there is a mistake in the order of the statements
- Language Represented all in zeros and ones
- Memory Stores programs and data and retains its information even when the power is turned off
Down
- Execution Perform statements one after another in the order they are encountered in the script
- Programming Language
- Get data from the “outside world”
- A person who writes computer programs
- The meaning of a program
10 Clues: Programming Language • The meaning of a program • Personal Digital Assistant • Get data from the “outside world” • A person who writes computer programs • Language Represented all in zeros and ones • When a program displays a message and pauses for the user to type some input to the program • ...
COMPUTER NETWORKS 2020-08-14
Across
- The type of topology where the hub is centrally connected to nodes
- A computer that facilitates data sharing on the network
- The most common wired network LAN technology
- The type of switching in a telephone network
- Short for WIreless Fidelity
Down
- Joins two networks to each other
- Transmission between direct line of sight using light
- The protocol for sending emails
- The most important protocol for computer networking
- A kind of malware that looks like an original application but spreads throughout system using a hidden code
10 Clues: Short for WIreless Fidelity • The protocol for sending emails • Joins two networks to each other • The most common wired network LAN technology • The type of switching in a telephone network • The most important protocol for computer networking • Transmission between direct line of sight using light • A computer that facilitates data sharing on the network • ...
SOCIAL NETWORKS 2020-11-18
Across
- A space where you write about your personal details (name, age, what you like)
- The opposite of "follow"
- The opposite of upload
Down
- a computer system that permits exchange of information.
- to update a website when it doesn't work
- Verb used on Instagram, when you send someone a request to see their account.
- To write something on a post
- The opposite of download
- Write something online so that other people can see it
- to become a member of a group
10 Clues: The opposite of upload • The opposite of "follow" • The opposite of download • To write something on a post • to become a member of a group • to update a website when it doesn't work • Write something online so that other people can see it • a computer system that permits exchange of information. • ...
SOCIAL NETWORKS 2024-02-21
10 Clues: Answer • Return a call • keep something • Able to be use • Remove something • A tecnology object • Review some message • Something to wake up • Aplication to do something • When you have to wait someone
Networks cece 2022-03-27
Across
- uses radio waves to transmit information between your device and a router via frequencies
- the speed that data travels during transfer (or delay in receiving).
- Data sent over computer networks*, such as the Internet, is divided
- how promptly corrupted or last packets can be resent.
Down
- low loss of signal over distance
- the amount of data that can be transferred at one time.
- the number of collisions in high network traffic.
- series of numbers that identifies any device on a network
- low bandwidth
- Doman Name System
10 Clues: low bandwidth • Doman Name System • low loss of signal over distance • the number of collisions in high network traffic. • how promptly corrupted or last packets can be resent. • the amount of data that can be transferred at one time. • series of numbers that identifies any device on a network • Data sent over computer networks*, such as the Internet, is divided • ...
Networks(Aynur) 2025-01-06
Across
- when data transmitted from one device to another along cable
- name that have the unique domain name
- its the third type of wireless network that uses radio waves to trensmit data
- label made up of numbers
Down
- its a type of wireless network that connects devices over short distances
- its another thing that can cause errors during data transmition
- type of an electromagnetic radiation
- the part that tells you which web page are you in
- is a special kind of server
- it is scrambled into a secret code
10 Clues: label made up of numbers • is a special kind of server • it is scrambled into a secret code • type of an electromagnetic radiation • the part that tells you which web page are you in • name that have the unique domain name • when data transmitted from one device to another along cable • its another thing that can cause errors during data transmition • ...
Networks & Kinship 2025-10-27
Across
- Weak ties are powerful because they serve as ________ for information, connecting separate social cliques.
- The form of marriage exchange practiced by the Ju/'Hoansi, where the groom pays the bride's family with labor instead of wealth.
- The theoretical rule compelling one to marry outside their own kinship or community group, often to form political alliances.
- The delayed, reciprocal gift exchange system used by the Ju/'Hoansi to establish long-term, risk-sharing alliances with distant camps.
- The residence rule where a couple moves to live near the wife's mother's family, often found in societies where women's labor is central to subsistence.
- The universal kinship and social structure found in foraging societies like the Ju/'Hoansi, characterized by equality and resource-sharing.
Down
- What the information you receive from your closest strong ties tends to be, since they share your social network.
- The term for the resource flow in marriage where the bride's family transfers money or goods to the groom or the couple's new household.
- The post-marital residence rule most common in modern industrial societies, requiring the couple to establish a new, independent home.
- The anthropologist who argued marriage is a flexible "bundle of rights" rather than a universal definition.
10 Clues: Weak ties are powerful because they serve as ________ for information, connecting separate social cliques. • The anthropologist who argued marriage is a flexible "bundle of rights" rather than a universal definition. • What the information you receive from your closest strong ties tends to be, since they share your social network. • ...
andy 2024-05-30
Across
- alteration or vibration of space
- is the main card well old the components are conected
- the light is also called
- cadmium toxy material
- is a use of devices connected each other by bluetouth
- a collection of computers,servers,mainframes,network devices peripherals or other devices
- local area networks
- pull aim squezze sweep
- shor or long term loss of the electric power
- you can listen to music privately
Down
- created the bluetooth
- example of pan
- a device used permanetly store and also retrieve information
- all light pass
- a device that detects or meansure a physical property
- total lost of power
- metropolitan area network
- conect a device to a red
- no light passe
- Is a nonvolatile storage device that stores persisten data on solid state
20 Clues: example of pan • all light pass • no light passe • total lost of power • local area networks • created the bluetooth • cadmium toxy material • pull aim squezze sweep • the light is also called • conect a device to a red • metropolitan area network • alteration or vibration of space • you can listen to music privately • shor or long term loss of the electric power • ...
CYBER SECURITY // WENDY 2024-12-05
Across
- fingerprint, retina scan, or voice pattern
- testers who are paid to probe networks
- barrier between a computer OS and the network
- common tool used by many Linux administrators
- barrier between two entities
- series of letters, numbers, and special characters
- what users can do after they are logged on
- rules
- supply two or more types of authentication (abr.)
- create an exact image
Down
- barrier between networks
- username/password
- security enhancement for servers
- control who has access to the network
- specially allocated disk area that holds information
- users identify themselves to gain access to network
- changes since last full back up
- attackers who do not report problems, but instead disseminate
- smart card or key
- framework/other protocol provide encryption(abr.)
20 Clues: rules • username/password • smart card or key • create an exact image • barrier between networks • barrier between two entities • changes since last full back up • security enhancement for servers • control who has access to the network • testers who are paid to probe networks • fingerprint, retina scan, or voice pattern • what users can do after they are logged on • ...
MIS Ch. 7 2011-12-08
Across
- layer of TCP/IP that enables client application programs to access the other layers and defines the protocols that applications use to exchange data (1st word)
- topology in which one station transmits signals which travel in both directions along a single transmition segment (most common topology)
- discrete, binary waveform, rather than a continuous waveform; communicates info as on-off electrical pulses
- connects to the internet; a communications processor used to route packets of data through different networks, ensuring the data gets to the correct address
- bound strands of clear glass fiber; data transformed into pulses of light which are sent through the calbe by a laser device
- collaborative web sites where visitors can add delete or modify content
- transmit high frequency radio signals through the atmosphere; high-volume; long-distance; point-to-point communication
- delivers voice info in digital form using packet switching
- connects personal computers and other digital devices within a half-mile
- continous waveform that passes through a communications medium and has been used for voice communication
- the communications standard used to transfer pages on the web
- converts domain names to IP addresses
- distributive computing model in which some of the processing power is located within small inexpensive client computers, and resides literally on desktops/laptops/handhelds
- topology in which all devices on the network connect to a single hub
- international telephone standards for digital communication
- specifies the physical medium to carry signals
- logging on to one computer system and doing work on another
- simple devices that connect network components, sending a packet of data to all other connected devices
- more intelligence than a hub; can filter & forward data to a specified destination on the network
- commercial organization with a permanent connection to the internet that sells temporary connection to retail subscribers
- modulator-demodulator; connects your computer to the internet using a cable network
- layer of TCP/IP that provides the application layer with communication and packet services (1st word)
Down
- slicing digital messages into parcels called packet, sending the packets along different communication paths as they become available & then reassembling the packets once they arrive at their destination
- two or more connected computers
- layer of TCP/IP responsible for placing packet on and receiving them from the network medium (1st two words)
- set of rules & procedures governing transmission of information between two points of a network
- networks that span broad geographical distances
- transferring files from computer to computer
- thickly insulated copper wire that can transmit a larger volume of data that twisted wire
- treats all processors equally and is used primarily in small networks
- address; domain name + directory + document name, etc
- secure, encrypted, private networks that have been configured within a public network to take advantage of the economies of scale and managemnt facilities of large networks
- networks of connected wireless devices that are embedded into the physical environment to measure many points over large spaces
- networks that span a metropolitan area (geographic scope between WAN and LAN)
- card built into motherboard
- connections provided by telephone & cable tv companies runnin 1 to 15 million bits per second
- telephone & computer networks converged into one digital network using shared Internet-based standards & equipment
- routes & manages communications on the network & coordinates network resources
- responsible for the delivery of packets and includes the disassembling and reassembling of packets durring transmission
- connects computer to the internet using a land line network
- layer of TCP/IP responsible for addressing, routing, and packaging data packets called IP datagrams
- the way a LAN's components are connected
- equal to one cycle of the medium
- the movement of data between computers; establish a connection between computers, sequences the transfer of packets, and acknowledges the packets sent (acronym)
- the range of frequencies that can be accomodated on a particular telecommunication chanel
- topology which connects network components in a closed loop; messages pass in one direction
- technology for tracking the movement of goods throughout the supply chain (acronym)
47 Clues: card built into motherboard • two or more connected computers • equal to one cycle of the medium • converts domain names to IP addresses • the way a LAN's components are connected • transferring files from computer to computer • specifies the physical medium to carry signals • networks that span broad geographical distances • ...
Computer Networks-I 2021-06-04
Across
- Performs the task of a modem as well as other advanced capabilities such as analysing, altering and routing data
- Data in a network is divided into chunks which are transmitted over the network
- A combination of the star and bus topologies
- This acts as a gateway for home Internet connections
- A network within a city
- Connects the organization's network to an external network
- A topology where each device is connected to every other device
- This topology uses a central cable to which other devices are attached
Down
- This type of local area network is less secure
- Structure or shape of a network
- This topology is considered very effective, efficient and fast as each device is directly connected with the central device.
- Converts the digital signal into analog and vice versa
- This address is the unique serial number allotted to the NIC of a device
- Regenerates the weak signals
- This type of network is created using infra-red or bluetooth
- Broadcasts the data it receives to all devices on the network
16 Clues: A network within a city • Regenerates the weak signals • Structure or shape of a network • A combination of the star and bus topologies • This type of local area network is less secure • This acts as a gateway for home Internet connections • Converts the digital signal into analog and vice versa • Connects the organization's network to an external network • ...
Matrices and Networks 2025-11-13
Across
- This algorithm can be used to find the minimum spanning tree
- The number of ways to travel from the start in a network diagram to the end is the "Number of ____"
- A matrix with order 4 x 1 is an example of a ___ matrix
- The ____ of a matrix is rows x columns
- If a matrix is _____ by 25% a multiplier of 0.75 can be used
- The quickest way to get from the start to the end in a network diagram is the ____ path
- The shortest ___ can be used to minimise the cost of connecting all the nodes
Down
- This algorithm can be used to find the shortest connection
- If a matrix is increased by 25% a ____ of 1.25 can be used
- In a network diagram these are connected by edges
- If two matrices have the same order you can ___ or subtract them
- A matrix with order 1 x 5 is an example of a ___ matrix
- A ___ tree is a visual representation of the shortest connection
- To be able to find AB the number of columns in A needs to equal the number of ____ in B
- In a network diagram these connect nodes
- For Selling price, S and Cost price, C, ____ = S - C
16 Clues: The ____ of a matrix is rows x columns • In a network diagram these connect nodes • In a network diagram these are connected by edges • For Selling price, S and Cost price, C, ____ = S - C • A matrix with order 4 x 1 is an example of a ___ matrix • A matrix with order 1 x 5 is an example of a ___ matrix • This algorithm can be used to find the shortest connection • ...
Network Fundamentals 2023-12-07
Across
- Connects two separate LAN networks.
- Process of path selection between devices and networks.
- This type of routing requires less CPU resource and generates zero traffic
- Address a unique string of characters that identifies each computer using the Internet Protocol to communicate over a networ
- The time it takes for a bit to get from sender to receiver
- Is a small segment of a larger message.
- A group of 2 or more connection computers.
- stores the mac address of the network devices.
Down
- Enables a computer to connect to the internet via a telephone line.
- This hardware allows a computer to connect to a network.
- Capacity of data transfer in a system
- Number of bits a system can send per second
- This type of routing requires more computing power and maintenance, configuration is easy
- a set of rules outlining how connected devices communicate across a network to exchange information easily and safely.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Broadcasts data to all devices on a network.
16 Clues: Connects two separate LAN networks. • Capacity of data transfer in a system • Is a small segment of a larger message. • A group of 2 or more connection computers. • Number of bits a system can send per second • Broadcasts data to all devices on a network. • stores the mac address of the network devices. • Process of path selection between devices and networks. • ...
✨Zerya✨ 2021-06-24
19 Clues: yol • kemik • ummak • kolon • kurmak • heykel • yardım • okyanus • tavsiye • ticaret • sıkılmak • yolculuk • ikna etmek • çınar ağacı • saçma-gülünç • basamak-merdiven • kültürel değişiklik • networks Küresel ağ • uluslararası sınırlar
Globalisation crossword 2022-11-06
Across
- the integration of networks, internet, etc.
- international transport links such as - roads, train networks and airports.
- the ability to invest in other countries.
- development of common policies and agreements in areas such as trade and environment.
- international cooperation in areas such as space exploration.
- facts, information and skills acquired through experience and education.
Down
- the integration of telecom networks and ability to communicate seamlessly on an international basis.
- the potential to live, work and study in other countries.
- development of people, sports, music.
- commercial exchanges between companies and individuals that cross borders.
10 Clues: development of people, sports, music. • the ability to invest in other countries. • the integration of networks, internet, etc. • the potential to live, work and study in other countries. • international cooperation in areas such as space exploration. • facts, information and skills acquired through experience and education. • ...
PHC Ch 18 2026-03-12
Across
- A means of creating and sending messages from one computer to another, using the internet system of networks. Commonly called e-mail.
- Technology that uses hair-thin cables to transmit data.
- Sophisticated technology that enables machines and/or computers to make decisions traditionally believed to require human intelligence.
- Groups of individuals who use the internet to communicate and share information with each other.
- A collection of related computerized data.
- Systems of computers that are linked so they can communicate and share data.
- A group of related computer records or documents.
- Software that permits the user to apply the computer’s ability to perform high-speed calculations of numerical data.
- The organization of biological data into databases.
Down
- Focused light rays that can cut and remove tissue.
- A vast global system of computer networks linked with other networks that allows instant communication and the sharing of information.
- Having the knowledge and skills to efficiently perform the computer tasks required in one’s work, as well as a basic understanding of how computers work and what types of healthcare applications are currently available.
- The practice of medicine, such as diagnosing and recommending treatment, via electronic communication.
- The organization of computerized information in a structured way that makes it easy to sort and access.
- Storage of digital data on multiple servers and sometimes at multiple locations.
- Basic data categories in a database.
- Entering information about patients into the computer when at the patient’s home or healthcare facility bedside.
- Copying the work of someone else and presenting it as one’s own work.
- Permission granting the installation of software on more than one computer.
- Computer software program capable of searching through and retrieving millions of documents on the internet by using specific key worlds as identifiers.
- An internal computer workspace that stores data only while the computer is on.
21 Clues: Basic data categories in a database. • A collection of related computerized data. • A group of related computer records or documents. • Focused light rays that can cut and remove tissue. • The organization of biological data into databases. • Technology that uses hair-thin cables to transmit data. • ...
INTERNETWORKING AND ROUTING UNIT 3 2015-09-10
10 Clues: Error message • 48 bits address • networks sub division • calculate shortest path • protocol 32 bits address • maps IP into physical address • configuration information to host • Nos of hops the data gram traveled • networking collection of inter networks • responsible Sending and receiving packets
Computer Network 2024-04-04
Across
- The unique address assigned to each device connected to a network
- A unit of data transmitted over a network
- A device that connects two or more computer networks together
- A type of network that covers a large geographical area, such as a city
- The process of converting data into a format that can be transmitted over a network
- A system of interconnected computer networks
- A protocol used for sending emails over a network
- A set of rules for encoding and compressing data for transmission over a network
- A type of network topology where each device is connected to a central point
- A device that forwards data packets between computer networks
- A protocol used for secure communication over a computer network
Down
- A wireless networking technology that uses radio waves
- The process of transferring data between two or more computers
- A software program that acts as an intermediary between a user and a web server
- A method of transmitting data in a computer network
- A system for assigning names to internet resources
- A network that covers a large geographical area, such as a city or country
- A set of rules governing the exchange or transmission of data between devices
- A protocol commonly used for transferring files over a network
19 Clues: A unit of data transmitted over a network • A system of interconnected computer networks • A protocol used for sending emails over a network • A system for assigning names to internet resources • A method of transmitting data in a computer network • A wireless networking technology that uses radio waves • A device that connects two or more computer networks together • ...
MIDTERMS EXAM 2021-03-15
24 Clues: DOG, • EAR, • CAT, • ARE, • CAR, • BRO, • LIT, • EYE, • TAR, • SIS, • TART, • BOAR, • NICE, • CUTE, • CARE, • HEHE, • MOUSE, • GREAT, • AWESOME, • KOREA, MORE, • NETWORK, MOM, • SYSTEM, LATE , • CAPITAL, NOSE, • INVESTMENTS, PIG,
Unit 2 Fr. Vocab 2021-09-26
20 Clues: tool • laptop • iphone • tablet • to save • research • a theory • genetics • password • to clone • to search • to delete • to advance • innovative • technology • to download • an experience • search engine • social networks • cyber-harassment
SOCIAL NETWORKS 2023-07-25
Across
- INFORMATION THAT IS NOT TRUE OR RELIABLE IS... (ADJ.)
- A PERSON WHO CRITICISES SOMEONE ALL THE TIME IS A... (NOUN)
- A TOOL USED BY PARENTS TO PROTECT THEIR CHILDREN ON THE INTERNET (TWO WORDS)
- GROUP OF PEOPLE WHO SUPPORT AND FOLLOW AN INFLUENCER
- A TYPE OF BULLYING THAT HAPPENS ON THE INTERNET (NOUN)
Down
- TO PARTNER WITH A BRAND OR INFLUENCER TO HAVE MORE REPERCUSSION (VERB)
- A KEY WORD YOU USE TO GIVE VISIBILITY TO A POST (NOUN)
- SOMETHING THAT BECOMES POPULAR FOR A PERIOD OF TIME (ADJ.)
- SOMETHING THAT USED TO BE POPULAR BUT IS NOT TRENDY ANYMORE (ADJ.)
- AN ACCOUNT WHOSE OWNER IS UNKNOWN IS... (ADJ.)
10 Clues: AN ACCOUNT WHOSE OWNER IS UNKNOWN IS... (ADJ.) • GROUP OF PEOPLE WHO SUPPORT AND FOLLOW AN INFLUENCER • INFORMATION THAT IS NOT TRUE OR RELIABLE IS... (ADJ.) • A KEY WORD YOU USE TO GIVE VISIBILITY TO A POST (NOUN) • A TYPE OF BULLYING THAT HAPPENS ON THE INTERNET (NOUN) • SOMETHING THAT BECOMES POPULAR FOR A PERIOD OF TIME (ADJ.) • ...
Data networks 2023-10-14
Across
- also known as IEEE802.3
- it describes how all the terminals can access a medium without interfering at all with one another
- data is divided into fixed sized frames or segment
- named after its inventor, Richards W
- it is a technique for sending multiple frames at a time
- data is organized into tables of rows and columns
Down
- device passes a special token between each other to gain the access
- only one bit has been corrupted
- it makes sure that packets are received in the right order and that data is not last as a result of dropped packets
- the sublayer of data link layer
10 Clues: also known as IEEE802.3 • only one bit has been corrupted • the sublayer of data link layer • named after its inventor, Richards W • data is organized into tables of rows and columns • data is divided into fixed sized frames or segment • it is a technique for sending multiple frames at a time • device passes a special token between each other to gain the access • ...
Computer Networks 2024-12-04
Across
- Stands for Local Area Network
- Stands for Wide Area Network
- A device that is controlled by a central computer
- The layout of the computers on a network
- A group of computers connected together that share data
Down
- The address of a computer on a network
- A computer on the network
- A device or computer on a network e.g. printer, computer, phone
- The address of the network on the internet
- A computer that controls or stores data centrally
10 Clues: A computer on the network • Stands for Wide Area Network • Stands for Local Area Network • The address of a computer on a network • The layout of the computers on a network • The address of the network on the internet • A device that is controlled by a central computer • A computer that controls or stores data centrally • ...
networks (Mawada) 2025-01-06
Across
- it is a small hardware device that allows other devices to connect wirelessly using radio waves to a wired network.
- it is when radio waves from one device can disrupt radio waves from another and cause errors in the data.
- it is a server that stores a database of the domain name part of the URLs and their matching IP adresses.
- it is an old technology made by King Harold 'Bluetooth' Gormsson, who was famous for uniting Denmark and Norway in the year 958.
Down
- it is a hardware device that connects a network to the internet.
- it allows the device to communicate over a wireless network.
- it is the last part of the URL.
- it is when the voltage of the electricity supply suddenly increases.
- this word means 'made up of two things'. In computing it refers to the language of 1s and 0s.
- it is the first part of URL.
10 Clues: it is the first part of URL. • it is the last part of the URL. • it allows the device to communicate over a wireless network. • it is a hardware device that connects a network to the internet. • it is when the voltage of the electricity supply suddenly increases. • this word means 'made up of two things'. In computing it refers to the language of 1s and 0s. • ...
The Internet and the World Wide Web 2015-08-26
10 Clues: Type of malware • Best web browser • Communication app • Third best web browser • Second best web browser • Internet use to be known as • Protocol for many local networks • Recorded first social media interaction • General name for accessing the Internet • Massive interconnection of computer networks
LIFT 3 UNIT 3 2024-12-03
17 Clues: sad • show • pain • news • lost • years • group • larger • weather • worried • going in • not alone • discussion • money person • not in person • space for trash • concerned about surroundings
MTCO Cross Communication 2025-12-23
Across
- The endpoint that actually uses the bits.
- Orbital relay platform for TV/internet.
- provider→customer directions.
- Displays the signal; not the lizard.
- Home/office device that forwards packets between networks.
- Electronic mail—you’ve got it.
- Legacy voice service device and line.
- Primary input for typing—qwerty, anyone?
- Voice calls carried over IP (abbr.).
Down
- Customer→provider directions.
- Core high‑capacity paths of the internet.
- Available data rate; often confused with speed.
- The business of connecting people—voice, data, video.
- Pointer device that loves to click.
- Television service delivered via IP networks (abbr.).
- Wired LAN technology using frames and MAC addresses.
16 Clues: Customer→provider directions. • provider→customer directions. • Electronic mail—you’ve got it. • Pointer device that loves to click. • Displays the signal; not the lizard. • Voice calls carried over IP (abbr.). • Legacy voice service device and line. • Orbital relay platform for TV/internet. • Primary input for typing—qwerty, anyone? • ...
IT Net Chap 5_7 2024-04-11
Across
- type of address from one to whoever signs up
- always up interface
- route that you manage/configure
- 2wrds..router on the other end of link.your via
- table full of networks
- location for alternate OSPF configuration
- 2wrds..when the router cant find a route
- 2wrds..secure telnet for example
Down
- allows remote unsecure access
- inverse mask
- used to test local connectivity
- protocol allows the router to issue IP info
- uses wildcards for subnet mask
- timer used in OSPF protocol to "check on " neigh
- type of statement used to advertise your networks
15 Clues: inverse mask • always up interface • table full of networks • allows remote unsecure access • uses wildcards for subnet mask • used to test local connectivity • route that you manage/configure • 2wrds..secure telnet for example • 2wrds..when the router cant find a route • location for alternate OSPF configuration • protocol allows the router to issue IP info • ...
Nodes and Networks 2025-09-17
Across
- devices and programs working together
- maximum data sent per second
- global network of routers, servers, and cables
- a graph with mutual edges
- a device in a network
- a connection between nodes
Down
- hardware that shows data from a computer
- connected devices that share data
- unencrypted data that anyone can read
- system keeps working when parts fail
- a machine that runs programs and processes data
- scrambling data into secret code
- hardware that sends data to a computer
- a graph with directed edges
- finding a path from sender to receiver
15 Clues: a device in a network • a graph with mutual edges • a connection between nodes • a graph with directed edges • maximum data sent per second • scrambling data into secret code • connected devices that share data • system keeps working when parts fail • devices and programs working together • unencrypted data that anyone can read • hardware that sends data to a computer • ...
Next Gen Networks 2025-09-03
Across
- Conjunto de herramientas y políticas para proteger la integridad de una red y sus datos.
- Medio de transmisión que utiliza hilos de vidrio o plástico para enviar datos con luz.
- Tipo de conexión a internet que utiliza como enlace comunicaciones con órbit alrededor de la Tierra.
- Dispositivo que dirige el tráfico entre redes diferentes.
- Creación de una versión virtual de un recurso, como un servidor o una red.
- Dispositivo que emite y recibe señales de radiofrecuencia para las comunicaciones inalámbricas.
- Modelo que permite el acceso bajo demanda a recursos informáticos a través de la red.
Down
- Estándar de red móvil de quinta generación que promete latencia ultra baja.
- Tecnología inalámbrica para conectar dispositivos a una red de área local.
- Arquitectura de red donde el cable de fibra óptica llega directamente al hogar
- Tiempo de demora en la transmisión de datos dentro de una red. Se mide en milisegundos.
- Dirección numérica única asignada a cada dispositivo conectado a una red.
- Red de objetos físicos interconectados con sensores y software
- Paradigma que acerca el procesamiento de datos al dispositivo o fuente de información.
- Capacidad máxima de transmisión de una conexión de red.
15 Clues: Capacidad máxima de transmisión de una conexión de red. • Dispositivo que dirige el tráfico entre redes diferentes. • Red de objetos físicos interconectados con sensores y software • Dirección numérica única asignada a cada dispositivo conectado a una red. • Tecnología inalámbrica para conectar dispositivos a una red de área local. • ...
Managing Network Basics 2013-03-26
Across
- connects multiple smaller networks
- connects multiple ethernet devices
- device joins multiple computers in one local network area
- Represents other clients
- Replaced LAN wired alternatives
- Represents consumed data expressed in bit
- Connects computers in a small network area
- two or more data lines connecting network
- each computer can act as a client or server for other computers
Down
- network that connects between small and large networks
- Exchange data through radio waves
- transfers data between components
- Controls incoming and outgoing network traffic
- a piece of computer software offered by server
- offers wireless internet access
15 Clues: Represents other clients • Replaced LAN wired alternatives • offers wireless internet access • Exchange data through radio waves • transfers data between components • connects multiple smaller networks • connects multiple ethernet devices • Represents consumed data expressed in bit • two or more data lines connecting network • Connects computers in a small network area • ...
Managing Network Basics 2013-03-26
Across
- transfers data between components
- connects multiple smaller networks
- offers wireless internet access
- a piece of computer software offered by server
- Represents other clients
- two or more data lines connecting network
- Represents consumed data expressed in bit
Down
- network that connects between small and large networks
- device joins multiple computers in one local network area
- Replaced LAN wired alternatives
- Connects computers in a small network area
- Controls incoming and outgoing network traffic
- each computer can act as a client or server for other computers
- Exchange data through radio waves
- connects multiple ethernet devices
15 Clues: Represents other clients • Replaced LAN wired alternatives • offers wireless internet access • transfers data between components • Exchange data through radio waves • connects multiple smaller networks • connects multiple ethernet devices • two or more data lines connecting network • Represents consumed data expressed in bit • Connects computers in a small network area • ...
Managing Network Basics 2013-03-26
Across
- connects multiple smaller networks
- device joins multiple computers in one local network area
- two or more data lines connecting network
- connects multiple ethernet devices
- Controls incoming and outgoing network traffic
- Replaced LAN wired alternatives
Down
- network that connects between small and large networks
- Exchange data through radio waves
- transfers data between components
- a piece of computer software offered by server
- each computer can act as a client or server for other computers
- Represents other clients
- Represents consumed data expressed in bit
- offers wireless internet access
- Connects computers in a small network area
15 Clues: Represents other clients • offers wireless internet access • Replaced LAN wired alternatives • Exchange data through radio waves • transfers data between components • connects multiple smaller networks • connects multiple ethernet devices • Represents consumed data expressed in bit • two or more data lines connecting network • Connects computers in a small network area • ...
Ai Crash Course 2024-02-22
Across
- The number of hidden layers in a neural network can influence its ability to find more complex patterns.
- An algorithm used in linear regression to adjust parameters to minimize the difference between observed and predicted values.
- The specific mathematical operation performed by each neuron in a neural network to combine input values.
- The mathematical function used to measure the difference between the predicted output and the actual output in a neural network.
- The part of a neural network that receives input data represented as numbers.
- A large-scale dataset used for training and testing various machine learning algorithms, including neural networks.
- A program that imitates one neuron.
- The type of data used to train a neural network, consisting of input-output pairs.
Down
- A danger in training neural networks where the model fits too closely to the training data, resulting in poor performance with new data.
- An algorithm used in optimization to adjust the weights of a neural network in order to minimize error.
- An architecture in neural networks responsible for combining input data in more complex ways to solve complicated problems.
- A method used to prevent overfitting by simplifying the neural network architecture.
- Method used to adjust neuron weights in neural networks to minimize error during training.
- A type of learning where a neural network adjusts its internal parameters based on input-output pairs.
- the process of finding the best combination of weights for a neural network architecture.
- popular large-scale dataset used for training and testing image recognition algorithms.
16 Clues: A program that imitates one neuron. • The part of a neural network that receives input data represented as numbers. • The type of data used to train a neural network, consisting of input-output pairs. • A method used to prevent overfitting by simplifying the neural network architecture. • ...
Syniverse Crossword 2025-12-03
Across
- Control and manage communication processes, enabling the establishment, maintenance, and termination of connections
- Using mobile service outside your home network
- Protecting networks and data from cyber threats
- Application to person messaging for OTPs, alerts, and notifications
- Network of connected devices and sensors that exchange data; machines communicating over mobile networks for monitoring and automation
Down
- Delivery of texts and rich communications
- Final money movement between carriers after clearing
- Continuous advancement that keeps networks and businesses competitive
- Illicit or abusive use of telecom services
- Reconciling usage records between operators for billing
10 Clues: Delivery of texts and rich communications • Illicit or abusive use of telecom services • Using mobile service outside your home network • Protecting networks and data from cyber threats • Final money movement between carriers after clearing • Reconciling usage records between operators for billing • Application to person messaging for OTPs, alerts, and notifications • ...
FAI UNIT 5 ASSIGNMENT 2025-04-15
Across
- A structured collection of data used to train AI models –
- A process where a pre-trained model is adapted to a specific task.
- Which framework does TensorFlow use as its backend for declaring layers ?
- The process of converting audio into text using AI.
- It is a Python data visualization library built on Matplotlib, designed for statistical graphics.
- A leading top platform in providing the web services of various domains.
- AI-generated video manipulations often used in misinformation.
- A way of reducing overfitting in neural networks by skipping neurons.
- An AI-powered tool by Microsoft for generating code from natural language –
- It is a popular Python data visualization library used for creating static, animated, and interactive visualizations.
- AI method used to identify objects in photos or videos.
- A network architecture designed to handle sequential data like text –
- AI technique that enables machines to make decisions based on reward feedback –
- Meta’s open-source large language model.
- A subset of machine learning using neural networks with many layers –
- An AI algorithm used for grouping similar data points.
- AI model that can generate realistic images from textual prompts –
- A field of AI focused on understanding and generating human language.
Down
- A vision model that uses patches of images as tokens.
- A file format commonly used to store trained machine learning models.
- An AI technique where multiple models are combined to improve accuracy.
- Software that mimics conversation with human users.
- Technique to make AI models explain their decisions –
- A popular platform for hosting and deploying machine learning models.
- A layer in neural networks that reduces the spatial size of feature maps.
- A mathematical function used in neural networks to introduce non-linearity –
- TensorFlow is an open-source machine learning framework developed by:
- A model type used in transformers, famous for attention mechanism.
- The branch of AI that deals with teaching machines to learn from data –
- A method for finding the optimal weights in neural networks.
- An open-source computer vision and image processing library is:
- Google’s tool for building AI pipelines visually.
- The metric used to evaluate classification accuracy.
- The numerical representation of words in vector space.
- Open-source deep learning framework developed by Meta also used for AI, deep learning, and machine learning applications.
- A platform to track machine learning experiments and models.
- A common dataset used for handwritten digit recognition –
37 Clues: Meta’s open-source large language model. • Google’s tool for building AI pipelines visually. • The process of converting audio into text using AI. • Software that mimics conversation with human users. • The metric used to evaluate classification accuracy. • A vision model that uses patches of images as tokens. • Technique to make AI models explain their decisions – • ...
Computer Networks 2022-08-27
Across
- multiplexing is used ___
- required simple n/w management system.
- which responsible for data translating.
- what is a HUB?
- more devices share a link
- connect two dis-similar types of networks
Down
- which layer determines the system user
- faster type of computer.
- 10base5,10base2,10baseT are type
- data link layer takes the packets from
10 Clues: what is a HUB? • multiplexing is used ___ • faster type of computer. • more devices share a link • 10base5,10base2,10baseT are type • which layer determines the system user • required simple n/w management system. • data link layer takes the packets from • which responsible for data translating. • connect two dis-similar types of networks
Social Networks 2020-06-19
10 Clues: It is used to post memes • It is used to get a taxi • It is used to text people • It is used to see pictures • It is used to watch movies • It is used to buy products • It is used tolisten to music • It is used to share short videos • It is used to give driving directions • It is used to watch and upload videos
Computer Networks 2019-09-17
Across
- Which network is able to connect to each computer through a common central line?
- A place where there is a field of signal through which you can access WiFi internet is called –
- Which layer is called end to end layer in OSI
- _____ is the error detection & correcting technique.
- OSI Reference Model has _______ layers
- Modulator and demodulator as combinely is known as
Down
- PSTN is an example of,
- Bridge works in which layer,
- I'm an Networking Device,
- Provides reliable communication
10 Clues: PSTN is an example of, • I'm an Networking Device, • Bridge works in which layer, • Provides reliable communication • OSI Reference Model has _______ layers • Which layer is called end to end layer in OSI • Modulator and demodulator as combinely is known as • _____ is the error detection & correcting technique. • ...
Computer Networks 2021-01-18
Across
- A network topology where all computers are connected to a main cable.
- A network topology where each computer is connected to two other computers
- A normal computer in a network
- A network spread over a large area
- A network confined to a small area connected by cables
- A network topology where computers are connected to a main device in the center
Down
- A computer that provides services to client computers
- Two or more devices connected together
- A network confined to a small area connected wirelessly
- Network structure
10 Clues: Network structure • A normal computer in a network • A network spread over a large area • Two or more devices connected together • A computer that provides services to client computers • A network confined to a small area connected by cables • A network confined to a small area connected wirelessly • A network topology where all computers are connected to a main cable. • ...
Networks cece 2022-03-27
Across
- the amount of data that can be transferred at one time.
- uses radio waves to transmit information between your device and a router via frequencies
- Data sent over computer networks*, such as the Internet, is divided
- how promptly corrupted or last packets can be resent.
Down
- the number of collisions in high network traffic.
- series of numbers that identifies any device on a network
- low bandwidth
- the speed that data travels during transfer (or delay in receiving).
- Doman Name System
- low loss of signal over distance
10 Clues: low bandwidth • Doman Name System • low loss of signal over distance • the number of collisions in high network traffic. • how promptly corrupted or last packets can be resent. • the amount of data that can be transferred at one time. • series of numbers that identifies any device on a network • Data sent over computer networks*, such as the Internet, is divided • ...
Cellular Networks 2022-05-14
Across
- Multiple antenna system for improving capacity
- Signal strength prediction model
- Prefix added to cancel out interference
- using same frequency in multiple cells
- gatway GPRS support node
- Equipment identification register
Down
- 4G standard
- operation and maintenance center
- Gains of components in transceiver chain
- bandwidth Characterize multipath channel
10 Clues: 4G standard • gatway GPRS support node • operation and maintenance center • Signal strength prediction model • Equipment identification register • using same frequency in multiple cells • Prefix added to cancel out interference • bandwidth Characterize multipath channel • Gains of components in transceiver chain • Multiple antenna system for improving capacity
Neural Networks 2022-05-14
12 Clues: our topic • inspiration • what we deserve • part of our body • we use every day • used in statistics • A function NN does • something NN track • Related to our topic • related to our topic • something ECE's have • The best doctor-Engineer
Computer Networks 2024-01-25
Across
- a device that allows computers to be joined together in a LAN
- Used for connecting the computer devices of personal use
- a computer networking devise that connects multiple computers together within one local area network
- an intelligent communication device that looks at the destination addresses (IP address) of the packets of data passing through it and decide which route each packet should take.
- a networking device that is used to connect devices connected in the network to the internet
Down
- A computer network covering a large geographical area
- is a device that allows wireless devices, like smartphones or laptops, to connect to a wired network using Wi-Fi
- A network confined to a limited geographical area like a room, a building, a department, school or workplace
- Two or more computers linked together to share resources
- a powerful computer that runs the network operating system and allows resources to be shared over the network by other devices connected to it.
10 Clues: A computer network covering a large geographical area • Used for connecting the computer devices of personal use • Two or more computers linked together to share resources • a device that allows computers to be joined together in a LAN • a networking device that is used to connect devices connected in the network to the internet • ...
Networks 1 2024-01-27
Across
- an electromagnetic wave
- connects electronic devices within a users inmediate area
- devices connected together in one physical location
- the speed at which a CPU can execute instructions
- a computer network that connects computers within a metropolitan area
- the amount of time required to complete certain operation
Down
- technology connecting offices, data centers & spans beyond a building
- two or more computers linked in order to share resources
- the maximum displacement or distance moved by an object or a point
- the distance from one wave to another
10 Clues: an electromagnetic wave • the distance from one wave to another • the speed at which a CPU can execute instructions • devices connected together in one physical location • two or more computers linked in order to share resources • connects electronic devices within a users inmediate area • the amount of time required to complete certain operation • ...
computer networks 2024-06-14
Across
- Device that converts digital data to analog signals and vice versa.
- Unique identifier for a device on a network.
- A smaller network within a larger network.
- Set of rules governing the exchange or transmission of data.
Down
- Maximum data transfer rate of a network or Internet connection.
- Security system that controls incoming and outgoing network traffic.
- Device that forwards data packets between computer networks.
- Secure network connection over the Internet.
- Device that connects devices within a single network segment.
- Common wired network technology for local area networks (LANs).
10 Clues: A smaller network within a larger network. • Secure network connection over the Internet. • Unique identifier for a device on a network. • Device that forwards data packets between computer networks. • Set of rules governing the exchange or transmission of data. • Device that connects devices within a single network segment. • ...
Social networks 2025-09-07
Across
- To subscribe to someone's posts so you can see their updates regularly.
- To stop someone from seeing your posts or contacting you on social media.
- A word or phrase with a special sign in front that helps group posts about the same topic.
- The list of posts and updates you see when you open a social media app.
Down
- A post or headline made to attract attention and clicks, often by being exaggerated or misleading.
- viral When a post or video is seen and shared by many people very quickly.
- A username on social media, often starting with the @ symbol.
- To show a post or content from someone else to your own followers or friends.
- A message, picture, or video you put on social media for others to see.
- A private message sent to someone on social media that only they can see.
10 Clues: A username on social media, often starting with the @ symbol. • To subscribe to someone's posts so you can see their updates regularly. • A message, picture, or video you put on social media for others to see. • The list of posts and updates you see when you open a social media app. • To stop someone from seeing your posts or contacting you on social media. • ...
Computer Networks 2025-11-23
Across
- Type of network with a central hub/switch
- Hardware that stores the addresses of all the computers on a network
- What happens when data is travelling in opposite directions and intercepts each other
- Network spanning one geographical location
- A type of network with very reliable connections
Down
- The biggest WAN
- The term used to describe how a network is laid out
- The type of mesh network where not all nodes are connected
- Hardware that connects two networks with the same base protocols
- A device on a network
10 Clues: The biggest WAN • A device on a network • Type of network with a central hub/switch • Network spanning one geographical location • A type of network with very reliable connections • The term used to describe how a network is laid out • The type of mesh network where not all nodes are connected • Hardware that connects two networks with the same base protocols • ...
deep networks 2026-01-20
Across
- – Popular activation that outputs zero for negatives
- – Algorithm used to update neural network weights
- – Measures prediction error
- – Model memorizes training data
- – Activation function with S-shaped curve
Down
- – Optimization method using gradients
- – Direction of steepest increase
- – Mathematical mapping used in networks
- – Core operation in CNNs
- – Function applied to a neuron’s output
10 Clues: – Core operation in CNNs • – Measures prediction error • – Model memorizes training data • – Direction of steepest increase • – Optimization method using gradients • – Mathematical mapping used in networks • – Function applied to a neuron’s output • – Activation function with S-shaped curve • – Algorithm used to update neural network weights • ...
Test 2021-01-15
16 Clues: Tuner • Scene • Gender • Verify • Secure • Confirm • Turn on • Latency • Networks • Downtime • Shortcut • Liability • Smart bulb • Hearing aid • Contact Center • Verification email
Wireless, Mobile Computing & Mobile Commerce (Adinda - Tri) 2018-05-09
Across
- A medium range wireless network.
- Wireless sensors that collect data from many points over an extended space.
- Uses frequencies to send data directly.
- Efforts by unauthorized users to access data that are traveling over wireless networks.
- The area of Earth’s surface reached by a satellite’s transmission.
- One of the mobility and broad reach values that has a wide range and is everywhere.
- Satellites stasionary relative to point on earth that orbit 22,300 miles.
- Worldwide Interoperability for Microwave Access.
- LEO satellite is used for.
- A wireless access point that provides service to a number of users.
- Something that changes its location over time.
Down
- A small, portable wireless device that provides users with a permanent Wi-Fi hotspot.
- The act of locating WLANs while driving (or walking) around a city or elsewhere.
- Wireless Networks that have a range of 100 feet or less.
- One of the electronic payments with the internet payment mechanism is done for a relatively small amount of money.
- An industry specification used to create small personal area networks.
- One of disadvantages of Satellite.
- A typical bar code made up of 12 digits that are batched in various groups.
- That users carry a device with them and can initiate a real-time contact with other systems.
- Basic types of RFID rely entirely on readers for their power.
20 Clues: LEO satellite is used for. • A medium range wireless network. • One of disadvantages of Satellite. • Uses frequencies to send data directly. • Something that changes its location over time. • Worldwide Interoperability for Microwave Access. • Wireless Networks that have a range of 100 feet or less. • Basic types of RFID rely entirely on readers for their power. • ...
examples 2018-09-10
Across
- a security protocol used in wi-fi networks
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- A set of interconnected networks that allow computers in different locations to exchange information
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- COMPRESS TO ONE FILE
- CREATED BY ADOBE SYSTEMS INC
- A COMPUTERS MEMORY
- CANNOT BE EDITED
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
- a security protocol used in wi-fi networks
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- to extract and decompress compressed files from it
- A point within a network that interconnects with other networks.
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- REDUCE SIZE OF A FILE
- READ ONLY MEMORY
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- CONNECTED TO A NETWORK OR THE INTERNET
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- TYPE OF EMAIL FRAUD
- SHORT FOR MALICIOUS SOFTWARE
29 Clues: READ ONLY MEMORY • CANNOT BE EDITED • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • CREATED BY ADOBE SYSTEMS INC • SHORT FOR MALICIOUS SOFTWARE • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
Chapter 4: Network 2024-11-08
Across
- – A network that spans a large geographic area, often countrywide or worldwide.
- – Network that connects devices wirelessly within a local area.
- – String of characters used for authenticating access to a system.
- – Personal network connecting devices like phones, tablets, or laptops.
- – Protocol that controls access to the network medium.
- – Network devices that send data to all connected devices.
- – Devices that route data between networks, directing packets to destinations.
- – Newer IP version that uses 128-bit addresses.
- – Online meeting technology using web browsers for audio, video, and sharing.
- – Cloud model offering shared resources to the public via the internet.
- – Set of rules for routing and addressing data packets.
- – Wireless personal network for short-range communication.
Down
- – Event of losing or corrupting stored information.
- – Network devices that forward data only to intended computers.
- – Cloud model that combines private and public cloud services.
- – Units of data formatted for transmission across networks.
- – Communication system that allows real-time video and audio interaction.
- – Hardware component that allows a device to connect to a network.
- – Security method using unique physical traits for identification.
- – Card with an embedded chip for data storage and authentication.
- – Fourth version of the Internet Protocol, using 32-bit addresses.
- – Device that connects two local networks, making them function as one.
- – Network connecting devices within a limited area, like a home or office.
23 Clues: – Newer IP version that uses 128-bit addresses. • – Event of losing or corrupting stored information. • – Protocol that controls access to the network medium. • – Set of rules for routing and addressing data packets. • – Network devices that send data to all connected devices. • – Wireless personal network for short-range communication. • ...
Wireless, Mobile Computing & Mobile Commerce (axel & adi) 2018-05-09
Across
- in remote parts of the world it is the only option available for Internet connections because installing cables is either too expensive or physically impossible.
- the area of Earth’s surface reached by a satellite’s transmission overcomes the limitations of microwave data relay stations. The higher a satellite orbits, the larger its footprint.
- a medium-range WLAN.
- virtually every object has processing power with either wireless or wired connections to a global network.
- has the smallest range of any short-range wireless networks, and is designed to be embedded in mobile devices such as cell phones and credit cards.
- One major limitation of GEO satellites is that their transmissions take a quarter of a second to send and return from the earth's surface.
- is red light that is not commonly visible to human eyes and common applications of infrared light are found in remote control units for televisions and DVD and CD players.
- have a range of 100 feet or less (e.g., Bluetooth, ultra-wideband (UWB), and near-field communications (NFC)).
- networks using multiple Wi-Fi access points to create a wide area network that can be quite large and are essentially a series of interconnected local area networks.
- a wireless access point that provides service to a number of users within a small geographical perimeter (up to approximately 300 feet).
Down
- networks that connect users to the Internet over a geographically dispersed territory, they typically operate over the licensed spectrum (government regulation).that is, they use portions of the wireless spectrum that are regulated by the government.
- the familiar wireless local area networks (WLANs) and the most common type of Medium-Range network is wireless fidelity (Wi-Fi).
- a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps which makes UWB a good choice for applications such as streaming multimedia from a personal computer to a television.
- a computer network used for communication among computer devices (e.g., telephones, personal digital assistants, and smartphones) located close to one person
- a real-time, wireless connection between a mobile device and other computing environments, such as the Internet or an intranet
- something that changes its location over time
- a phenomenon that occurs when the functions of many physical devices are included in one other physical device. Consider that your smartphone includes the functions of digital cameras for images and video, radios, televisions, Internet access via Web browsers, recording studios, editing suites, movie theaters, GPS navigators, word processors, spreadsheets, stereos, flashlights, board games, card games, video games, an entire range of medical devices, maps, atlases, encyclopedias, dictionaries, translators, textbooks, watches, alarm clocks, books, calculators, address books, credit card swipers, magnifying glasses, money and credit cards, car keys, hotel keys, cellular telephony, Wi-Fi, e-mail access, text messaging, a full QWERTY keyboard, and many, many others.
- uses radio-wave frequencies to send data directly between transmitters and receivers
- an industry specification used to create small personal area networks.
- without wires
20 Clues: without wires • a medium-range WLAN. • something that changes its location over time • an industry specification used to create small personal area networks. • uses radio-wave frequencies to send data directly between transmitters and receivers • virtually every object has processing power with either wireless or wired connections to a global network. • ...
Programming-Coding Crosswords 2025-01-11
Across
- - Protects networks from unauthorized access.
- System - Manages hardware and software resources.
- - Fixing errors in code.
- - Point of interaction between systems.
- - Saves data permanently or temporarily.
- - The computer's main processing unit.
- - Harmful software designed to damage systems.
- - Organized collection of data.
- - Connects devices to share data.
- - Data entered into a computer.
- - Physical components of a computer.
- - Software for accessing the internet.
Down
- - Secures data by converting it to code.
- - Instructions written for computers.
- - Pathway for electrical signals.
- - Temporary data storage for quick access.
- - Data produced by a computer.
- - Programs that run on a computer.
- - Temporary memory for active tasks.
- - Online storage and computing services.
- - Executes instructions in a computer.
- - Provides resources to other computers.
- - A set of steps to solve a problem.
- - Rules for data exchange in networks.
24 Clues: - Fixing errors in code. • - Data produced by a computer. • - Organized collection of data. • - Data entered into a computer. • - Pathway for electrical signals. • - Connects devices to share data. • - Programs that run on a computer. • - Temporary memory for active tasks. • - A set of steps to solve a problem. • - Physical components of a computer. • ...
Programming-Coding Crosswords 2025-01-11
Across
- - Protects networks from unauthorized access.
- System - Manages hardware and software resources.
- - Fixing errors in code.
- - Point of interaction between systems.
- - Saves data permanently or temporarily.
- - The computer's main processing unit.
- - Harmful software designed to damage systems.
- - Organized collection of data.
- - Connects devices to share data.
- - Data entered into a computer.
- - Physical components of a computer.
- - Software for accessing the internet.
Down
- - Secures data by converting it to code.
- - Instructions written for computers.
- - Pathway for electrical signals.
- - Temporary data storage for quick access.
- - Data produced by a computer.
- - Programs that run on a computer.
- - Temporary memory for active tasks.
- - Online storage and computing services.
- - Executes instructions in a computer.
- - Provides resources to other computers.
- - A set of steps to solve a problem.
- - Rules for data exchange in networks.
24 Clues: - Fixing errors in code. • - Data produced by a computer. • - Organized collection of data. • - Data entered into a computer. • - Pathway for electrical signals. • - Connects devices to share data. • - Programs that run on a computer. • - Temporary memory for active tasks. • - A set of steps to solve a problem. • - Physical components of a computer. • ...
M3 2024-11-04
Across
- Physical or virtual barrier that controls network traffic
- Process of verifying a user's identity
- Security weakness in a system
- A malicious program that replicates itself and spreads to other computers
- Required information to solve a problem
- Process of gathering necessary information about a problem
- Unwanted bulk messages
- Steps taken to prevent attacks
- Testing a solution's effectiveness
- Device for accessing computer networks
Down
- Community-wide computer network
- Malicious software
- To find and fix problems
- Physical components of a computer system
- Final step in problem-solving process
- The practice of protecting systems, networks, and programs from digital attacks
- Make data unreadable to unauthorized users
- A type of social engineering attack using fake emails
- Tools used to detect and remove malware
- Security copy of data
- A common first step in problem-solving
21 Clues: Malicious software • Security copy of data • Unwanted bulk messages • To find and fix problems • Security weakness in a system • Steps taken to prevent attacks • Community-wide computer network • Testing a solution's effectiveness • Final step in problem-solving process • Process of verifying a user's identity • A common first step in problem-solving • ...
Operating Systems & Networking 2020-11-27
Across
- variation of the Unix operating system
- physical and mechanical components of a computer such as the monitor, mouse, chips, keyboard, etc.
- serves as a security device between a computer and internet sites or between multiple computer networks
- network which provides connections between computers in multiple locations
- designed to be a small, flexible system for use by computer programmers
- worldwide, publicly accessed network
- extremely fast computer; can perform hundreds of millions of instructions every second
- powerful, single-user computer; more powerful microprocessor than PCs
- hardware device connected to multiple channels for different networks through an interface
Down
- programs which direct the operation of computers; instructions for a computer
- tags and instructions developed by the creator which tell the foundation of the system and how it was created
- program which acts as a boundary between a computer user and the computer itself
- chip which is the master control circuit of a computer
- local,privately owned networks
- machine which can be programmed to control symbols
- allows equipment such as fax machines, printers and files to be "served" to multiple computers
- system for communication between two or more computers
17 Clues: local,privately owned networks • worldwide, publicly accessed network • variation of the Unix operating system • machine which can be programmed to control symbols • chip which is the master control circuit of a computer • system for communication between two or more computers • powerful, single-user computer; more powerful microprocessor than PCs • ...
Road Security Crosswords 2023-05-09
Across
- Technique or code that takes advantage of a vulnerability.
- Who uses skills to exploit systems or networks.
- Is a technique used to assess the security of web applications by simulating attacks in real-time.
- A potential harm or negative consequences that arise from vulnerabilities and threats.
- Weakness or flaw that can be exploited.
- The practice of protecting computer systems, networks, and data from digital threats or unauthorized access.
- Malicious software that aims to damage or compromise systems.
- A disruptive event that compromises the security or integrity.
- A structured approach to developing software with a focus on security.
- A type of security testing that analyzes application source code for vulnerabilities.
Down
- A non-profit organization dedicated to improving software security through open resources and information.
- The process of evaluating and analyzing potential risks and vulnerabilities.
- Condition or circumstance that can cause harm or damage.
- Individuals within an organization who promote and advocate for security practices and help drive a culture of security awareness.
- Confidential or hidden information that is not widely known or shared
- A security assessment that identifies vulnerabilities in computer systems and networks.
- The process of reducing or minimizing the impact or severity.
17 Clues: Weakness or flaw that can be exploited. • Who uses skills to exploit systems or networks. • Condition or circumstance that can cause harm or damage. • Technique or code that takes advantage of a vulnerability. • Malicious software that aims to damage or compromise systems. • The process of reducing or minimizing the impact or severity. • ...
examples 2018-09-09
Across
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- REDUCE SIZE OF A FILE
- A point within a network that interconnects with other networks.
- CONNECTED TO A NETWORK OR THE INTERNET
- to extract and decompress compressed files from it
- A set of interconnected networks that allow computers in different locations to exchange information
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
- SHORT FOR MALICIOUS SOFTWARE
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- a security protocol used in wi-fi networks
- CANNOT BE EDITED
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- READ ONLY MEMORY
Down
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- A COMPUTERS MEMORY
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- TYPE OF EMAIL FRAUD
- CREATED BY ADOBE SYSTEMS INC
- a security protocol used in wi-fi networks
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- COMPRESS TO ONE FILE
29 Clues: CANNOT BE EDITED • READ ONLY MEMORY • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • CREATED BY ADOBE SYSTEMS INC • SHORT FOR MALICIOUS SOFTWARE • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
CN Unit I 2020-06-05
Across
- unit used in Data Link Layer
- when telephone calls between employees are carried out using the computer network
- refers to the collection of routers and communication lines owned by the network operator
- overloaded network
- another name for IEEE 802.11
- formed when distinct networks are interconnected
- is passed between the sender and the receiver
- an agreement between the communicating parties on how communication is to proceed
- spans a large geographical area, often a country or continent
- when devices communicate over the range of a person
Down
- transmission to a subset of the machines
- It allows a packet to be addressed to all destinations by using a special code in the address field
- specified by a set of primitives (operations) available to a user process to access the service
- Doing business with consumers over the Internet
- It allows companies to track users' activities in cyberspace
- defines which primitive operations and services the lower layer makes available to the upper one
- wires up an entire city
- another name for IEEE 802.16
- another name for IEEE 802.3
- Point-to-point transmission with one sender and one receiver
- used to join the individual networks at different sites into one extended network
- They are privately-owned networks within a single building or campus of up to a few kilometers in size
22 Clues: overloaded network • wires up an entire city • another name for IEEE 802.3 • unit used in Data Link Layer • another name for IEEE 802.11 • another name for IEEE 802.16 • transmission to a subset of the machines • is passed between the sender and the receiver • Doing business with consumers over the Internet • formed when distinct networks are interconnected • ...
examples 2018-09-04
Across
- A COMPUTERS MEMORY
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- CONNECTED TO A NETWORK OR THE INTERNET
- SHORT FOR MALICIOUS SOFTWARE
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
- a security protocol used in wi-fi networks
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- A set of interconnected networks that allow computers in different locations to exchange information
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
Down
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- READ ONLY MEMORY
- to extract and decompress compressed files from it
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- CANNOT BE EDITED
- REDUCE SIZE OF A FILE
- A point within a network that interconnects with other networks.
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- COMPRESS TO ONE FILE
- a security protocol used in wi-fi networks
- CREATED BY ADOBE SYSTEMS INC
- TYPE OF EMAIL FRAUD
29 Clues: READ ONLY MEMORY • CANNOT BE EDITED • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • COMPRESS TO ONE FILE • REDUCE SIZE OF A FILE • SHORT FOR MALICIOUS SOFTWARE • CREATED BY ADOBE SYSTEMS INC • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • ...
Expanding Interactions Review 2022-10-13
Across
- Christian campaigns to retake the holy lands
- ________________ structures fell, new ones took their place
- Region of Africa, Europe, and Asia
- First dynasty to fall
- The black death is also called the ________________ plague
- ___________ interaction among cultures expanded
- A period of a 1,000 years
- A spiritual and political leader of the Muslims
- World __________________ practiced in various parts of the world
- Vikings had trade networks here
Down
- The world became more ___________________ through trade and ideas
- Spread of ________________ caused world population to fluctuate
- ____________________ structures relied on agriculture and trade
- Lands under Muslim rule
- The majority branch of Islam
- ________ Mongolia was a time of peace in the Mongol Empire
- Ideas and __________________ moved through exchange networks
- Revolution in which we went from hunting to farming
- Mongol Tribe Leader
19 Clues: Mongol Tribe Leader • First dynasty to fall • Lands under Muslim rule • A period of a 1,000 years • The majority branch of Islam • Vikings had trade networks here • Region of Africa, Europe, and Asia • Christian campaigns to retake the holy lands • ___________ interaction among cultures expanded • A spiritual and political leader of the Muslims • ...
Computer Networks 2014-07-20
Across
- This usually connects a LAN together
- This keeps your user area secure
- A largest WAN in existence
- A machine that stores your files and data
- A software that keeps the network safe from hackers and viruses
Down
- A largest topology which has server in the middle
- This tells server who you are and which files present to you
- A hardware that can be connected to a network and shared
- Another name for a computer on the network
- A network topology which sends data in one direction only
10 Clues: A largest WAN in existence • This keeps your user area secure • This usually connects a LAN together • A machine that stores your files and data • Another name for a computer on the network • A largest topology which has server in the middle • A hardware that can be connected to a network and shared • A network topology which sends data in one direction only • ...
Networks keywords 2022-05-03
Across
- how protocols are sequenced and organized to handle different parts of communication
- the system that identifies every device on a network locally.
- Turns domain names into an ip address
- the piece of network hardware that directs data packets to the right place on a network
- network topology where all parts off the network are connected to each other
- a network topology where all parts are connected to one node
Down
- a network model where all computers are connected
- a network model with a central server
- the system that identifies every device on the internet
- The set of rules that define how data is transmitted on a network
10 Clues: a network model with a central server • Turns domain names into an ip address • a network model where all computers are connected • the system that identifies every device on the internet • a network topology where all parts are connected to one node • the system that identifies every device on a network locally. • ...
Networks ABM 2019-03-03
Across
- the delay before a transfer of data begins following an instruction for its transfer.
- Information is divided into
- What does IP Address stand for
- what does wi in wifi stand for
- What do you connect to the Internet with
- two or more devices connected together so that they can exchange data.
Down
- what does DNS stand for
- transmitting data between electronic devices
- A server is a networked computer that is providing a specific service to other computers on the network.
- technology that is most commonly used in wired local area networks
10 Clues: what does DNS stand for • Information is divided into • What does IP Address stand for • what does wi in wifi stand for • What do you connect to the Internet with • transmitting data between electronic devices • technology that is most commonly used in wired local area networks • two or more devices connected together so that they can exchange data. • ...
Understanding Networks 2020-04-01
Across
- networking device to connect devices
- forwards data to ultimate destination
- a small amount of data sent over a network
- uses light pulses over glass fibres
- information processed or stored by computer
- identifies the correct destination or computer
Down
- unique addresses assigned to computers
- wired protocol for linking computers, sending data and checking for collissions
- devices connected to share data
- a set of rules and standards
10 Clues: a set of rules and standards • devices connected to share data • uses light pulses over glass fibres • networking device to connect devices • forwards data to ultimate destination • unique addresses assigned to computers • a small amount of data sent over a network • information processed or stored by computer • identifies the correct destination or computer • ...
networks (marwa) 2025-01-06
Across
- to unscramble a word
- the steps of a method for encrypting data
- when people try to break into computer systems they are not supposed to acces
- sometimes radio waves from one device can disrupt radio waves from another and cause errors in the data
- made up of two things
- when the voltage of the electricity supply suddenly increases
Down
- it lets two devices swap information with each other so they can communicate
- how many cycles there are per second
- the whole of a wave from one top of one wave to the top of the next wave
- a hardware device that connects a network to the internet
10 Clues: to unscramble a word • made up of two things • how many cycles there are per second • the steps of a method for encrypting data • a hardware device that connects a network to the internet • when the voltage of the electricity supply suddenly increases • the whole of a wave from one top of one wave to the top of the next wave • ...
Neural Networks 2025-11-18
Across
- Link between neurons or between nodes
- Gap where one neuron passes a signal to another
- Process of adjusting weights to improve performance
- Structure or regularity learned by brains and neural nets
Down
- Activation function allowing outputs between 0 and 1
- Basic brain cell that sends and receives signals
- Early artificial neuron limited to binary output
- Biological brain model that inspired neural networks
- Values fed into a neural network node
- Simple processing unit in a neural network
10 Clues: Link between neurons or between nodes • Values fed into a neural network node • Simple processing unit in a neural network • Gap where one neuron passes a signal to another • Basic brain cell that sends and receives signals • Early artificial neuron limited to binary output • Process of adjusting weights to improve performance • ...
Networks 1 2025-10-21
Across
- Two or more connected devices
- Connecting a network using radio waves
- The unique address that every computer on a network has to have
- The server that provides access to a printer
- A set of rules for communication between devices
Down
- The amount of data that can be transferred in one second
- A powerful computer that provides a service to other computers on a network, like storing files for everyone.
- A computer that requests data from a server
- The fastest type of connection that uses light to send data
- A piece of hardware for routing data between networks
10 Clues: Two or more connected devices • Connecting a network using radio waves • A computer that requests data from a server • The server that provides access to a printer • A set of rules for communication between devices • A piece of hardware for routing data between networks • The amount of data that can be transferred in one second • ...
3G Shutdown 2022 2022-01-03
Across
- The major mobile carriers have each set up webpages with more information on their plans to ____ out their 3G networks.
- This means users will not be able to make or receive calls and ___, even to 911.
- In addition, some older 4G phones that do not support HD _____
- Once the 3G network is shut down, 3G cell phones will not ______.
- Data ____ will also be unavailable
- Cricket, Boost, Straight Talk and some Lifeline mobile service ___ use the networks of AT&T, T-Mobile and Verizon.
Down
- Verizon said more than 99% of its _____ are on the 4G LTE or 5G network
- Major mobile carriers will be shutting down their 3G ____ in 2022,
- ________ said it will completely shut down its 3G network by Dec. 31, 2022.
- The retirement of the 3G network is to make room for more _____ networks
10 Clues: Data ____ will also be unavailable • In addition, some older 4G phones that do not support HD _____ • Once the 3G network is shut down, 3G cell phones will not ______. • Major mobile carriers will be shutting down their 3G ____ in 2022, • Verizon said more than 99% of its _____ are on the 4G LTE or 5G network • ...
Jargon + 2023-08-20
Across
- Networks that allowed public networks to be used as private networks.
- interface for building web applications
- devices used to connect personal devices to internet
- software made specifically for certain OS.
- Stored recurring website assets
- computers used to store data and accessed through internet
Down
- types of software mostly referred to mobile device software
- coding mistakes or unwanted pieces of code that prevent software from working correctly
- systems designed to protect and secure a network
9 Clues: Stored recurring website assets • interface for building web applications • software made specifically for certain OS. • systems designed to protect and secure a network • devices used to connect personal devices to internet • computers used to store data and accessed through internet • types of software mostly referred to mobile device software • ...
examples 2018-09-07
Across
- TYPE OF EMAIL FRAUD
- A PIECE OF PROGRAMMING CODE INSERTED TO OTHER PROGRAMMING TO CAUSE DAMAGE
- ANY TYPE OF AN ILLEGAL ACTIVITY THAT IS DONE ON A COMPUTER
- SHORT FOR MALICIOUS SOFTWARE
- to extract and decompress compressed files from it
- REDUCE SIZE OF A FILE
- A WAY OF SENDING MESSAGES OVER THE INTERNET
- THE FASTER THE.... THE FASTER THE COMPUTER WORKS
- ANY PHYSICAL DEVICE ON YOUR COMPUTER
- READ ONLY MEMORY
- A PIECE OF CODE OR DATA THAT IS CREATED BY A WEB SERVER
- CONNECTED TO A NETWORK OR THE INTERNET
- ALLOWS COMPUTERS TO CONNECT OVER A WIRELESS CONNECTION
Down
- SOFTWARE THAT MANAGES ALL OF A COMPUTER'S PROCESSES
- A BARRIER THAT ACTS AS A COMPUTERS SECURITY
- SET OF RULES THAT A COMPUTER OR OTHER DEVICES USE WHEN COMMUNICATING WITH EACH OTHER
- A point within a network that interconnects with other networks.
- UNSOLICITED EMAIL MESSAGES SENT FOR MARKETING PURPOSES
- RESPONSIBLE FOR PERFORMING CALCULATIONS AND TASKS THAT MAKES PROGRAMS WORK
- a security protocol used in wi-fi networks
- A set of interconnected networks that allow computers in different locations to exchange information
- A COMPUTERS MEMORY
- COLLECTION OF CODES INSTALLED ONTO YOUR HARD DRIVE
- CREATED BY ADOBE SYSTEMS INC
- a security protocol used in wi-fi networks
- CANNOT BE EDITED
- DEVICE THAT ALLOWS COMPUTERS TO TRANSMIT INFORMATION VIA TELEPHONE LINES
- MICROPROCESSOR THAT PERFORMS MANY FUNCTIONS
28 Clues: CANNOT BE EDITED • READ ONLY MEMORY • A COMPUTERS MEMORY • TYPE OF EMAIL FRAUD • REDUCE SIZE OF A FILE • SHORT FOR MALICIOUS SOFTWARE • CREATED BY ADOBE SYSTEMS INC • ANY PHYSICAL DEVICE ON YOUR COMPUTER • CONNECTED TO A NETWORK OR THE INTERNET • a security protocol used in wi-fi networks • a security protocol used in wi-fi networks • A BARRIER THAT ACTS AS A COMPUTERS SECURITY • ...
it 2024-10-07
Across
- / Provides tech support to end-users.
- / Manages and processes health data through technology.
- / Designs and develops computer hardware.
- / Creates animations for various media formats.
- / Writes and tests code for software applications.
- / Manages cloud computing services.
- / Provides hardware and software support.
- / Protects systems and data from cyber threats.
- / Leads and oversees an organization’s IT strategy.
- / Assesses the security and reliability of IT systems.
- / Finds and hires IT professionals for companies.
- / Interprets data to help businesses make decisions.
- / Conducts investigations to advance IT knowledge.
- / Designs and manages complex database systems.
- / Manages and maintains websites.
- / Tests software for bugs and performance issues.
Down
- / Tests systems for vulnerabilities, ethically.
- / Designs the user interface of digital products.
- / Creates apps for various platforms.
- / Manages and maintains computer networks.
- / Builds and develops software programs.
- / Designs and builds communication networks.
- / Improves user experience in products or services.
- / Analyzes and resolves tech issues for companies.
- / Handles and processes large datasets.
- / Manages and coordinates IT services.
- / Studies the theoretical foundations of computing.
- / Designs and creates websites.
- / Plans and implements computer networks.
- / Analyzes complex data to gain insights.
- / Develops, tests, and maintains software.
- / Examines and improves information systems.
- / Designs and implements systems for business operations.
- / Specializes in securing communications through encryption.
34 Clues: / Designs and creates websites. • / Manages and maintains websites. • / Manages cloud computing services. • / Provides tech support to end-users. • / Creates apps for various platforms. • / Manages and coordinates IT services. • / Handles and processes large datasets. • / Builds and develops software programs. • / Designs and develops computer hardware. • ...
Network Requirements Crossword 2023-08-29
Across
- Holding place for instructions and data a computer needs to reach quickly.
- The performance driven by the need of the parties involved in data communication.
- Instructions that tell a computer what to do.
- Parameters that capture the characteristics of the network.
- Enables a computer to transfer data to and from devices with less CPU overhead.
- Rules that govern how data is transmitted, received and processed across computer networks.
- Actions and operations that take place within a networking device to handle communication.
- Amount of data that moves across a network during a given time.
- Transmission of digital data between two or more computer networks.
- Caused maily by networking congestion, transmission errors and network system failures.
Down
- A hardware component that enables a computer to connect to a network and communicate.
- A worldwide system of computer networks.
- Physical components of a computer.
- Required for end-to-end service provisioning.
- Measurement of how many units of information a system can process in a given amount of time.
- Time delay over your network connection.
- Process of removing the header and trailer information from a packet, as it moves to its destination.
- Handles framing, addressing, flow control and error detection.
- What is connected to a workstation as a LAN topology?
- Seven layers that computer systems use to communicate over a network.
20 Clues: Physical components of a computer. • A worldwide system of computer networks. • Time delay over your network connection. • Required for end-to-end service provisioning. • Instructions that tell a computer what to do. • What is connected to a workstation as a LAN topology? • Parameters that capture the characteristics of the network. • ...
Globalization and Illegal Flows 2025-12-18
La Familia y las comunidades 2021-09-24
20 Clues: hostile • baptism • coherent • educated • to spread • resources • consisten • the parade • to instill • principles • the wedding • to approach • consumerism • to influence • unemployment • to strengthen • social networks • direction, sense • to be worthwhile • to track or to follow
cyber security 2025-10-09
Across
- when somebody creates a wifi that is unsecure
- a email to get you to put in your personal details
- a cheaper version of wiring networks
- an early version of the internet
- created by Tim beeriness lee
- another way to name a website
Down
- a way to protect you personal information
- diferent to a search engine
- network of networks
- a new way where data is sent via light
- conect to the internet using this
- mobile______
- part of a message
13 Clues: mobile______ • part of a message • network of networks • diferent to a search engine • created by Tim beeriness lee • another way to name a website • an early version of the internet • conect to the internet using this • a cheaper version of wiring networks • a new way where data is sent via light • a way to protect you personal information • ...
CIS 178 Participation 3 Security 2023-07-17
Across
- computers or devices infected with malicious software
- collects and transmits sensitive information
- form of bullying that occurs online
- spreads from one computer to another
- virtual private network, secure online service
- "advertising-supported software" designed to display unwanted advertisements
- malicious software
- intrudes on a device remotely
- protecting digital assets
- development/use of computer systems/networks to store information.
- tricks users into clicking a disguised link
Down
- application designed to monitor network traffic
- disguises itself as a legitimate program or software
- uses bait to lure unsuspecting victims
- uses fingerprints, facial recognition, etc. to log into a device
- encrypts user's files or locks computer until a ransom is paid
- media manipulation, alter images/video for fake perception
- actions aimed to infiltrate computer networks.
- method of scrambling data for authorized users
- fake, disguised, bogus
20 Clues: malicious software • fake, disguised, bogus • protecting digital assets • intrudes on a device remotely • form of bullying that occurs online • spreads from one computer to another • uses bait to lure unsuspecting victims • tricks users into clicking a disguised link • collects and transmits sensitive information • virtual private network, secure online service • ...
Cybersecurity Awareness Month 2024-09-16
Across
- Function that converts data into a fixed size
- Measures taken to protect data
- Impersonating someone or something to deceive
- Securing data by converting it into code
- Software that records keystrokes
- Software that shows unwanted ads
- Malware that encrypts files demanding ransom
- Attack using trial and error to guess passwords)
- Investment scam involving fake accounts
- Vulnerabilities exploited before being patched
- Fraudulent attempts to steal sensitive information)
Down
- Malicious software designed to damage systems
- Hidden way of bypassing security controls
- Virtual Private Network for secure connections
- Software that collects data secretly
- Online harassment or bullying
- Multi-Factor Authentication
- Self-replicating malware that spreads across networks)
- Image, video or audio generated by AI
- A system that protects networks
- Network of compromised computers under attacker control)
- Software update to fix security vulnerabilities
22 Clues: Multi-Factor Authentication • Online harassment or bullying • Measures taken to protect data • A system that protects networks • Software that records keystrokes • Software that shows unwanted ads • Software that collects data secretly • Image, video or audio generated by AI • Investment scam involving fake accounts • Securing data by converting it into code • ...
network requirements 2024-10-02
Across
- – Process to determine the path of packets in a network.
- – Wireless communication standard for small networks.
- Rate – Frequency of transmission errors.
- (Dynamic Host Configuration Protocol) – Protocol for dynamic IP allocation.
- (Denial of Service) – Attack that overwhelms a network.
- – Resending data due to errors.
- Delay in packet transmission.
- – Layer in the OSI model for reliable transmission.
- Ensuring network resources are up and running.
Down
- – Temporary storage for managing data flow.
- – Maximum data transmission capacity.
- (Transmission Control Protocol) – Guarantees packet delivery.
- (Quality of Service) – Mechanism to prioritize traffic.
- – Securing communications through cryptography.
- – Device connecting and forwarding between networks.
- – Sending packets based on destination addresses.
- (Simple Network Management Protocol) – Used for network management.
- (Carrier Sense Multiple Access with Collision Detection) – Collision management mechanism.
- – Network topology with a central hub.
- (Open Systems Interconnection) – Network model.
20 Clues: Delay in packet transmission. • – Resending data due to errors. • – Maximum data transmission capacity. • – Network topology with a central hub. • Rate – Frequency of transmission errors. • – Temporary storage for managing data flow. • Ensuring network resources are up and running. • – Securing communications through cryptography. • ...
IT 2025-12-02
Across
- Tool used to secure data by converting it to code
- Extracting useful patterns from large datasets
- Software that manages computer hardware
- The visual part of software users interact with
- Rules for data communication over networks
- Checking a system for malicious software
- Online space to save and access files
- A software-based emulation of a computer
- Machines simulating human intelligence
Down
- Keeping servers running smoothly and securely
- Organizing and handling structured data
- Find and fix errors in software
- A set of rules for writing computer code
- Algorithms that learn from data automatically
- Protecting computers and networks from attacks
- New version of a program to improve it
- Measures to protect systems from digital threats
- Blocks unauthorized access to a network
- Copy of data saved for recovery purposes
- Write instructions for a computer program
20 Clues: Find and fix errors in software • Online space to save and access files • New version of a program to improve it • Machines simulating human intelligence • Organizing and handling structured data • Software that manages computer hardware • Blocks unauthorized access to a network • A set of rules for writing computer code • Checking a system for malicious software • ...
Social Media 2025-01-21
16 Clues: écran • abonné • réseaux • contenu • publier • anxiété • partager • commenter • problèmes • numérique • dépendance • ordinateur • exposition • estime de soi • cyberharcèlement • le bouton le plus utilisé sur Facebook
Networks 2022-01-17
Across
- the time it takes for data to be transported from its original source to its destination
- test for latency
- your best friend
Down
- a function that allows a streamed video or media file to be loaded while the user is watching or listening
- wireless Internet access
- refers to the speed which data or content travels from the World Wide Web to your device
6 Clues: test for latency • your best friend • wireless Internet access • the time it takes for data to be transported from its original source to its destination • refers to the speed which data or content travels from the World Wide Web to your device • a function that allows a streamed video or media file to be loaded while the user is watching or listening
Networks 2019-05-17
Across
- A set of rules for how messages are turned into data packets and sent across networks.
- A unique identifier issued to each device connected to a network. For example: 198.162.001.002
- A network of personal devices, not necessarily on the internet.
Down
- each unique piece of hardware on a network has a MAC address.
- A network of computers that covers a small area, eg a school or college.
- A network that spans across a building, buildings or even countries, eg the internet.
6 Clues: each unique piece of hardware on a network has a MAC address. • A network of personal devices, not necessarily on the internet. • A network of computers that covers a small area, eg a school or college. • A network that spans across a building, buildings or even countries, eg the internet. • ...
Networks 2024-12-05
Across
- A unique identifier for each device on a network.
- The physical components of a computer or electronic system.
- Information in a structured form, such as numbers, words, images, video, or sound, that can be processed and transmitted by a computer.
Down
- A networking device that connects devices together on a local area network.
- A personal area network; a small network that connects personal devices, such as computers, printers, and smartphones, within a small area.
- A networking device that forwards data packets between computer networks.
6 Clues: A unique identifier for each device on a network. • The physical components of a computer or electronic system. • A networking device that forwards data packets between computer networks. • A networking device that connects devices together on a local area network. • ...
Networks grade 12 2022-01-19
Across
- smart device for connection of computers
- physical arrangement of computers in network
- several webpages connected via hyperlink
- firstpage of website
- device to amplify signal in the network
- address of webpage
- organization provides network
Down
- maps web address to IP address
- device to decide path of data transmission
- topology in which if the link fails whole connection fails
- dumb device
- topology in which the central cable acts as backbone of network
- converts analog to digital, vice versa
- text/image to help navigate to other part or page
- Rules governing communication over internet
15 Clues: dumb device • address of webpage • firstpage of website • organization provides network • maps web address to IP address • converts analog to digital, vice versa • device to amplify signal in the network • smart device for connection of computers • several webpages connected via hyperlink • device to decide path of data transmission • Rules governing communication over internet • ...
Crossword of Networks 2015-04-01
Across
- A local area network
- The distributor of internet signal
- Width of your internet reach
- Twisted pair network cable capable of 100 mhz
- Directs internet signals
- IEEE 802.11x.
- Four core network cable
Down
- Anatomy of a server
- Changes from one network to the next
- A 8 wire connector to a computer network
- Blocks intruders from outside
- Underpins of the internet
- Type of network designs
- End user of internet network
- A no strings attached network
15 Clues: IEEE 802.11x. • Anatomy of a server • A local area network • Type of network designs • Four core network cable • Directs internet signals • Underpins of the internet • Width of your internet reach • End user of internet network • Blocks intruders from outside • A no strings attached network • The distributor of internet signal • Changes from one network to the next • ...
4th form Networks 2023-03-20
Across
- The largest WAN in the world
- Sending data from your computer to another one far away
- A link to another webpage
- A device that was used to connect to the internet years ago
- A collection of web pages
- This cable has several layers of insulation to prevent EMI
- A program used to browse the world wide web
- A public area that offers free internet access
Down
- A private network only accessible by the people inside
- A group the devices linked together to share resources
- A collection of websites and webpages
- Data can travel in only one direction
- Allows the transfer of data between two devices wirelessly over short distances
- A document made using HTML
- message sent across a computer network
15 Clues: A link to another webpage • A collection of web pages • A document made using HTML • The largest WAN in the world • A collection of websites and webpages • Data can travel in only one direction • message sent across a computer network • A public area that offers free internet access • A private network only accessible by the people inside • ...
Computer networks vocab 2025-03-19
Across
- Deprecated protocol for encrypted web communication (abbr.).
- Secure tunnel for remote access, often used by telecommuters (abbr.).
- Automates IP assignments, leases addresses, and avoids conflicts (abbr.).
- Short-range, high-bandwidth wireless tech for precise tracking (abbr.).
- A storage pool accessed by multiple devices simultaneously.
- Old-school LAN tech where a 'token' controls data flow.
Down
- Self-healing web of interconnected nodes, great for IoT.
- Outdated VPN protocol with known security flaws (abbr.).
- Hardware linking hosts to storage networks, often in SANs (abbr.).
- Software managing network resources and user permissions (abbr.).
- VPN tunneling protocol often paired with IPsec (abbr.).
- High-speed network for block-level storage access (abbr.).
- Wireless tech for tracking objects using radio waves (abbr.).
- SSL's successor, securing web traffic with encryption (abbr.).
- Private network connecting a company's multiple sites (abbr.).
15 Clues: VPN tunneling protocol often paired with IPsec (abbr.). • Old-school LAN tech where a 'token' controls data flow. • Self-healing web of interconnected nodes, great for IoT. • Outdated VPN protocol with known security flaws (abbr.). • High-speed network for block-level storage access (abbr.). • A storage pool accessed by multiple devices simultaneously. • ...
Lessons 1-9 2015-09-29
Across
- Hypertext Mark Up Language
- Used to view webpages and navigate them via hyperlinks.
- Group of information on a computer that can be software programming or data.
- Example:.htm .htm .xml .gif
- The typer of communication in which the sending and receiving occur at different times. Example: email.
- Free service offered to UT students that basically serves as an online library and is very useful in this class.
- What percent of users simply scan a page when searching the web?
- Any type of picture, movies, or graphics.
- Wide area networks that are geographically not close together.
Down
- In "scannable" web pages, the key words are typically?
- A neutral language that avoids boastful and subjective talk.
- Person who falsifies data to pretend to be someone else.
- basic terminology for describing the world wide web.
- The type of communication in which both the sender and receiver are active at the same time.
- A search engine that uses popularity to rank the order of its hits.
- Locan area networks that are geographically close to each other.
- Fair Use: The permissible amount of illustrations or photographs that can be taken from another artist.
- Main technology for local area networks, it connects all of the computers in that facility.
18 Clues: Hypertext Mark Up Language • Example:.htm .htm .xml .gif • Any type of picture, movies, or graphics. • basic terminology for describing the world wide web. • In "scannable" web pages, the key words are typically? • Used to view webpages and navigate them via hyperlinks. • Person who falsifies data to pretend to be someone else. • ...
Block 1 Unit 6 IP Addressing Fundamentals 2023-08-03
Across
- The language of computers, uses 2 characters: 0 or 1
- Number that identifies the specific host or node on the network
- Addresses that are auto-assigned by the host to itself if not configured with a static IP.
- Class used for large networks as it supports the largest number of hosts.
- Designated IP addresses within each network class reserved for private/internal use only
- Subscript; Identifies the number system and quantity of Arabic numerals or symbols in the numbering system
- Class used for intermediate-sized networks.
- IPv4 uses 4 of them separated by dots/periods; each contains 8 binary bits
- Class used for small networks because it supports the smallest number of hosts
- Class reserved for research and development
Down
- Class reserved for multicast addressing
- IP Addresses in the range of 127.0.0.0 to 127.255.255.255 used for testing the hosts Network Interface Card (NIC).
- Number that identifies the network the host is on
- Used in IPv4 addresses, uses 10 characters: 0-9
- Used in IPv6 addresses, uses 16 characters: 0-9 and A-F
- Organization that assigns the network prefix on an IPv6 address
- Type of IPv6 addressing that eliminates long strings of zeroes.
- Each IPv4 address belongs to one of five of these depending on the number in the first octet.
18 Clues: Class reserved for multicast addressing • Class used for intermediate-sized networks. • Class reserved for research and development • Used in IPv4 addresses, uses 10 characters: 0-9 • Number that identifies the network the host is on • The language of computers, uses 2 characters: 0 or 1 • Used in IPv6 addresses, uses 16 characters: 0-9 and A-F • ...
vocab 24 2016-04-18
Across
- people who break into computers to get information
- software program
- one way networks are divided
- describes software architectural model relationship
- a device on a network
- supports phone service and other voice systems.
Down
- highend programs for network control
- hardware
- variation of LAN but doesn't use wires
- another way networks are divided
- device that directs traffic on network
11 Clues: hardware • software program • a device on a network • one way networks are divided • another way networks are divided • highend programs for network control • variation of LAN but doesn't use wires • device that directs traffic on network • supports phone service and other voice systems. • people who break into computers to get information • ...
networks 2019-05-17
Across
- guys in garages who take over peoples computers are.. (verb)
- lawyers have loads of these starts with a c ends in a t
- crisps come in these
Down
- you can use this to connect to speakers, a function on your mobile phone.
- the amount of data that can transfer through communications
- if you have a sandwich subtract the 'and' 6 letters
6 Clues: crisps come in these • if you have a sandwich subtract the 'and' 6 letters • lawyers have loads of these starts with a c ends in a t • the amount of data that can transfer through communications • guys in garages who take over peoples computers are.. (verb) • you can use this to connect to speakers, a function on your mobile phone.
Networks 2019-05-17
6 Clues: A multiplayer game • a computer network which spans a wide area • protects a network from unauthorized access • a computer network which spans a small area • Technology for connecting wired local area networks • A set of rules or standards for communicating devices
Networks 2019-05-17
6 Clues: a network cable • is a commutation network • something that connect a pc to a network • a global system that connects computers to each other • a famous car game played on a network only xbox and pc • something that connects that connects pcs in a limited area
Networks 2018-01-24
Across
- / Less vulnerable type of network because if a connection is removed nothing happens across the network, the downside is that if it is damaged or hub is removed no longer work at all.
- / This topology provides high availability, but requires that each end system is interconnected with all other systems.
- / Topology in which all computers are connected on the same transmission line via a cable, making the network highly vulnerable.
- / In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created.
Down
- / Network topology in which the nodes are arranged in a tree, facilitating the growth of network and share the same communications channel.
- / In this topology two or more topologies are combined to form a complete network design.
6 Clues: / In this topology two or more topologies are combined to form a complete network design. • / This topology provides high availability, but requires that each end system is interconnected with all other systems. • / In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created. • ...
Networks 2018-01-24
Across
- Network topology in which the nodes are arranged in a tree, facilitating the growth of network and share the same communications channel.
- In this topology two or more topologies are combined to form a complete network design.
Down
- Less vulnerable type of network because if a connection is removed nothing happens across the network, the downside is that if it is damaged or hub is removed no longer work at all.
- This topology provides high availability, but requires that each end system is interconnected with all other systems.
- In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created.
- Topology in which all computers are connected on the same transmission line via a cable, making the network highly vulnerable.
6 Clues: In this topology two or more topologies are combined to form a complete network design. • This topology provides high availability, but requires that each end system is interconnected with all other systems. • In this topology computers communicate in turns and a cycle where each team has its turn to work or interact is created. • ...
