networks Crossword Puzzles
Media an Information Literacy 12 2025-08-27
Across
- A test used to evaluate sources based on currency, relevance, authority, accuracy, and purpose.
- The part of the communication process responsible for interpreting the message.
- The age of digital technology where people rely on smartphones and the internet.
- The era where people used smoke signals, cave paintings, and oral traditions for communication.
- The device invented by Alexander Graham Bell that enabled voice communication.
- The criterion in the CRAAP Test that asks if the source is up-to-date.
Down
- The first widespread broadcast medium in the 1900s.
- The process of turning a message into symbols or words for transmission.
- The global system of interconnected computer networks. tools like Facebook, Instagram, and TikTok.
- press The invention that revolutionized mass communication in the Industrial Age.
10 Clues: The first widespread broadcast medium in the 1900s. • The criterion in the CRAAP Test that asks if the source is up-to-date. • The process of turning a message into symbols or words for transmission. • The device invented by Alexander Graham Bell that enabled voice communication. • The part of the communication process responsible for interpreting the message. • ...
IoT Crossword 2020-03-16
Across
- How many times loop function runs in Arduino IDE
- protocol is a machine to machine and Internet of thing connectivity protocol.
- The first publicly used version of the Internet Protocol
- means to associate something with locations in physical space.
- standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
Down
- How many number of digital IO pins are there in arduino nano
- The communications protocol that promises to connect every device on the Internet
- twin phrase used to describe a computerized (or digital) version of a physical asset and/or process.
- layer is called a port layer in OSI model
- A universal unique electronic identifier used to identity for every physical object
10 Clues: layer is called a port layer in OSI model • How many times loop function runs in Arduino IDE • The first publicly used version of the Internet Protocol • How many number of digital IO pins are there in arduino nano • means to associate something with locations in physical space. • protocol is a machine to machine and Internet of thing connectivity protocol. • ...
Media and Information Literacy 2025-07-30
Across
- Plural form of medium
- an interconnected network of networks
- refers to how a media text is produced together
- This type of media is meant for an audience who prefers to get information by reading
- This kind of media is usually made in large sizes and is usually seen along highways.
Down
- Literature and arts belong to this type of media.
- physical structure that houses reading, viewing, and listening materials
- local knowledge developed over centuries of experimentation and are passed orally from generation to generation.
- These are also highly specialized materials meant for the players and specialists of a specific industry.
- These are well-researched articles found mostly in academic journals and published for the specialists of a specific field
10 Clues: Plural form of medium • an interconnected network of networks • refers to how a media text is produced together • Literature and arts belong to this type of media. • physical structure that houses reading, viewing, and listening materials • This type of media is meant for an audience who prefers to get information by reading • ...
Asynchronous Module 6 Class Activity 2025-09-29
Across
- A rule or promise that limits access to certain types of information
- An individual or group plan that provides, or pays the cost of, medical care (2 wds.)
- The ability of two or more systems to exchange and make use of information
- Law promoting EHR adoption and meaningful use incentives (abbr.)
Down
- HIPAA principle that limits PHI use, disclosure, or request to the ________ needed (2 wds.)
- Entity that processes health information on behalf of providers, including billing services and value-added networks
- Law that protects personal health information in the U.S. (acronym)
- Digital system used by healthcare providers to store patient data (abbr.)
- The government's latest push to standardize nationwide health information sharing (abbr.)
- U.S. government initiative to create a secure nationwide health data exchange (abbr.)
10 Clues: Law promoting EHR adoption and meaningful use incentives (abbr.) • Law that protects personal health information in the U.S. (acronym) • A rule or promise that limits access to certain types of information • Digital system used by healthcare providers to store patient data (abbr.) • The ability of two or more systems to exchange and make use of information • ...
Cybercrime Crossword Puzzle 2021-07-13
Across
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- Intentional or reckless alteration damaging deletion of computer data.
- what comes after terabyte
- is a concept describing a widespread interconnected digital technology.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- Interception made by technical means without right.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- the process of converting encrypted information back into normal, understandable text.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- is pornography that exploits children for sexual stimulation
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • Interception made by technical means without right. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • ...
Chapter 9: Wireless Networking Terminology 2023-04-21
Across
- Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
- The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.
- A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
- A station is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC. A station is often abbreviated as STA.
- A wireless topology that connects to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
- An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
- A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
- A signal passes through objects and the signal loses power.
- The name of the wireless network. Client devices see a list of available networks when trying to connect to a wireless network.
- The ability of devices to connect from one access point to another while maintaining connection to the same network. For example, a laptop moved from one building to another stays connected to the same network.
- Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
- The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
- An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
- A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
- Encryption that implements a key-mixing feature that only the receiver can unlock.
- The point at which bandwidth utilization for the device is close to 100%.
- A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
- An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
- Devices on the network are not broadcasting on the same frequency.
- An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.
Down
- A wireless topology that moves some of the network intelligence from the controller to the individual APs. Newer wireless networks can be deployed using a distributed wireless mesh architecture.
- The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.
- An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use a deauthentication attack to stage evil twin or on-path attacks.
- A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
- The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keyboards.
- Any unauthorized access point added to a network.
- The interception and decoding of wireless transmissions. It is also known as eavesdropping.
- Signal interference created intentionally by an attacker to make a wireless network impossible to use.
- An IBSS is a set of stations (STAs) configured in ad hoc mode.
- Access points that separate wireless networks by using independent configuration. Each AP stands alone.
- The LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.
- The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
- An authentication method that requires clients to provide a MAC address to connect to the wireless network.
- An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
- An AP is the device that coordinates all communications between wireless devices, as well as the connection to the wired network. An AP is sometimes called a wireless AP (WAP).
- These are used to connect wired or wireless networks.
- A BSS is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. A BSS is also called a cell.
- A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
38 Clues: Any unauthorized access point added to a network. • These are used to connect wired or wireless networks. • A signal passes through objects and the signal loses power. • An IBSS is a set of stations (STAs) configured in ad hoc mode. • Devices on the network are not broadcasting on the same frequency. • ...
Troubleshooting IT Networks 2018-01-24
Across
- This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host.
- This utility can be used to lookup the specific IP address associated with a domain name.
Down
- It is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interfaces.
- This utility is used in windows to find out the specific IP configuration of the variously affected hosts.
4 Clues: This utility can be used to lookup the specific IP address associated with a domain name. • This utility is used in windows to find out the specific IP configuration of the variously affected hosts. • This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. • ...
Data Transmission 2022-07-13
5 Clues: networks • the actual data being carried in a data packet • a small part of a message/data that is transmitted over a network; after • all the data packets are reassembled to form the original message/data (2 word) • stages in a network that can receive and transmit data packets; routers are nodes in
Hardware of the Internet 2022-10-03
Across
- A computer that stores software and a website's component files
- Used to network multiple computers together
Down
- A hardware component that allows a computer or another device to connect to the Internet
- A filter that only allows trusted data to flow through it
- A hardware device that directs traffic between networks and devices
5 Clues: Used to network multiple computers together • A filter that only allows trusted data to flow through it • A computer that stores software and a website's component files • A hardware device that directs traffic between networks and devices • A hardware component that allows a computer or another device to connect to the Internet
Software 2014-03-04
Across
- Programs and applications that can be run on a computer system
- The most important program that runs on a computer.
- A program that performs a very specific task, usually related to managing system resources.
- Is the creation of documents using page layout skills on a personal computer.
Down
- Used to store patients details
- A piece of computer software intended to prevent unauthorized access to system software or data
- Designed to duplicate important data in the event of a hard drive failure, user error, disaster or accident.
- That is designed to help set up, manage, and/or monitor computer networks.
8 Clues: Used to store patients details • The most important program that runs on a computer. • Programs and applications that can be run on a computer system • That is designed to help set up, manage, and/or monitor computer networks. • Is the creation of documents using page layout skills on a personal computer. • ...
Cyber Security Scavenger Hunt 2014-10-28
Across
- Decrypt me: 00000000 43 4e 4f 4
- This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
- Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
- SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
- Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
- These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
- The unofficial mascot of this shop is the Pink Unicorn.
- Decrypt me: VEFPDQo=
8 Clues: Decrypt me: VEFPDQo= • Decrypt me: 00000000 43 4e 4f 4 • The unofficial mascot of this shop is the Pink Unicorn. • Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __. • Gives us access to the building, most are blue, but ours are DEFCON 2. • SIGDEVERs that focus on discovery and documentation of foreign communications & networks. • ...
CDC Monthly -Types of malware attacks 2018-11-12
Across
- Disguises itself as a normal file or program to trick users into installing malware.
- Functions by spying in a users activity without their knowledge.
- Form of malware that denies access to the users files on the hard drive until money/bit-coin is transferred.
Down
- Has the ability to self-replicate and spread to other computers.
- Collections of computers that have malicious software downloaded that allows them to be used for DDoS attacks
- Short for malicious software
- Type of malware that automatically delivers advertisements
- Most common type of malware that spreads over computer networks by exploiting vulnerabilities.
8 Clues: Short for malicious software • Type of malware that automatically delivers advertisements • Has the ability to self-replicate and spread to other computers. • Functions by spying in a users activity without their knowledge. • Disguises itself as a normal file or program to trick users into installing malware. • ...
Equal Opportunity and Diversity Management 2018-11-29
Across
- Voluntary organizational program designed to create greater inclusion of all individuals into informal social networks and formal company programs
- Benefit to a business of Diversity Management
- The variation of social and cultural identities
Down
- The unjust or prejudicial treatment of different categories of people
- 2010 Act which legally protects people from discrimination
- One of the 6 key aspects of diversity, usually measured against pay gaps
- In equal opportunity, people are judged on their ______ rather than their social group membership
- The policy of giving everyone the same opportunities for employment, pay, and promotion, without discriminating against particular groups
8 Clues: Benefit to a business of Diversity Management • The variation of social and cultural identities • 2010 Act which legally protects people from discrimination • The unjust or prejudicial treatment of different categories of people • One of the 6 key aspects of diversity, usually measured against pay gaps • ...
Exploring AI 2024-01-29
Across
- A technique used to split a dataset into training and testing sets for model evaluation.
- The process of preparing and cleaning data for machine learning.
- A type of algorithm that learns by finding patterns in unlabeled data.
- A subset of machine learning that focuses on neural networks.
Down
- A popular algorithm used for classification in machine learning.
- A popular programming language for machine learning and data analysis.
- The field of study that focuses on giving computers the ability to learn without being explicitly programmed.
- A type of learning where a model is trained on a labeled dataset.
8 Clues: A subset of machine learning that focuses on neural networks. • A popular algorithm used for classification in machine learning. • The process of preparing and cleaning data for machine learning. • A type of learning where a model is trained on a labeled dataset. • A popular programming language for machine learning and data analysis. • ...
Core Concepts in AI 2025-04-01
Across
- The process where computers improve automatically by learning from data
- A type of learning where AI is trained on labeled data
Down
- A more advanced form of machine learning using neural networks
- A type of learning where AI finds patterns in data without labels
- The AI system that makes predictions after training
5 Clues: The AI system that makes predictions after training • A type of learning where AI is trained on labeled data • A more advanced form of machine learning using neural networks • A type of learning where AI finds patterns in data without labels • The process where computers improve automatically by learning from data
HSIE Crossword 2013-02-20
Across
- Supreme and independent power or authority in government as possessed or claimed by a state or community.
- To convey in standardised containers.
- An act or instance of combining into an integral whole.
Down
- The __________ of money or capital in order to gain profitable returns, as interest, income or appreciation in value
- A particular form or stage of civilisation, as that of a certain nation or period.
- A privelage of a public nature conferred on an individual, group or company by a government.
- The act of globalizing, or extending to other of all parts of the world.
- The process or act of migrating.
- A device to be launched into orbit around the Earth, another planet, Sun etc.
- A vast computer network linking smaller computer networks worldwide.
10 Clues: The process or act of migrating. • To convey in standardised containers. • An act or instance of combining into an integral whole. • A vast computer network linking smaller computer networks worldwide. • The act of globalizing, or extending to other of all parts of the world. • A device to be launched into orbit around the Earth, another planet, Sun etc. • ...
PRETTY GIRLS: Technology 2018-05-26
Across
- There is a … Club in our school for students who are interested in technology.
- If you want to throw a disco party, you must have the right music ...
- You use this to write information on your computer.
- Facebook and Instagram are social …
Down
- Some students use this kind of computer to study.
- It can be an animal but you can also use it to do things on your computer.
- It is where you see things when you work on your computer.
- It is a thing that you use to send text messages, phone someone, play games and install some apps.
- We need this connection if we want to surf the Internet.
- You can programme a … to work in a factory.
10 Clues: Facebook and Instagram are social … • You can programme a … to work in a factory. • Some students use this kind of computer to study. • You use this to write information on your computer. • We need this connection if we want to surf the Internet. • It is where you see things when you work on your computer. • ...
school work 2017-08-07
Across
- obtain the temporary use of (something) for an agreed payment.
- (someone or something) so as to prevent them from continuing to a destination
- the condensed moisture of the atmosphere falling visibly in separate drops
- the strength and vitality required for sustained physical or mental activity
- act in such a way as to have an effect on each other
- a long, narrow strap attached at one end to a horse's bit, typically used in pairs to guide or check a horse in riding or driving
Down
- the faculty by which the mind stores and remembers information
- not silently or in a whisper
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- adjective of high
10 Clues: adjective of high • not silently or in a whisper • act in such a way as to have an effect on each other • the faculty by which the mind stores and remembers information • obtain the temporary use of (something) for an agreed payment. • the condensed moisture of the atmosphere falling visibly in separate drops • ...
Artificial Intelligence 2023-11-19
Across
- To set in motion; make active or more active.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The use of technology to perform tasks without human intervention.
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
Down
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- An expert at programming and solving problems with a computer
- The design, construction, and operation of robots to perform tasks in the real world.
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
AI 2023-07-12
Across
- An AI approach that involves training a system through a reward-based feedback loop
- A computer system modeled after the human brain's interconnected neurons
- A subset of machine learning that focuses on artificial neural networks with multiple layers
- An AI field that enables computers to interpret and analyze visual information
- AI algorithms that identify and classify patterns in data
Down
- An AI technique that enables computers to learn and improve from experience without explicit programming
- AI systems that simulate human intelligence, including perception, reasoning, and learning
- AI technology that enables computers to understand and interpret human language
- The process of discovering patterns and relationships in large datasets using AI techniques
- AI software that emulates the decision-making abilities of a human expert in a particular domain
10 Clues: AI algorithms that identify and classify patterns in data • A computer system modeled after the human brain's interconnected neurons • An AI field that enables computers to interpret and analyze visual information • AI technology that enables computers to understand and interpret human language • ...
Information Management 2023-02-21
Across
- Information ___________ - software applications, computer hardware and networks used to create Information Systems.
- A ___________ process system is an information processing system for business deals involving the collection, modification and retrieval.
- ___________ is the type of knowledge which people accumulate in their mind.
- This is more technical part involving setting up and integrating information systems and creating the right environment for using information
- It is taken from information and data substantiated by skills and experience.
Down
- processed and arranged in a meaningful form.
- type of knowledge which can be codified and stored.
- Information _____ is a process by which organizations can spot and categorize knowledge assets within their organization.
- Information _____ – computerized or manual one for capturing data and transform it into information –knowledge
- unprocessed stream of facts.
10 Clues: unprocessed stream of facts. • processed and arranged in a meaningful form. • type of knowledge which can be codified and stored. • ___________ is the type of knowledge which people accumulate in their mind. • It is taken from information and data substantiated by skills and experience. • ...
Risk Management Key Terms 2023-03-06
Across
- A document used to track the collection, handling, and transfer of evidence.
- everything that a business needs but a computer.
- The process of downgrading—undoing—a recently applied patch or updated.
- a Popular and extremely comprehensive testing tool.
- is the science of gathering, preserving, and presenting evidence stored on a computer or any form of digital media presentable in a court of law.
Down
- A backup facility to continue business operations
- Documents that set out how to limit damage andrecover quickly from an incident.
- A set of documents that Define procedures for changes to the network.
- A set of procedures defining actions employees should perform to protect the network’s security.
- An open source tool for penetration testing many aspects of wirless networks
10 Clues: everything that a business needs but a computer. • A backup facility to continue business operations • a Popular and extremely comprehensive testing tool. • A set of documents that Define procedures for changes to the network. • The process of downgrading—undoing—a recently applied patch or updated. • ...
Crosswords - Gadgets 2022-05-12
Across
- A device that performs arithmetic operations on numbers.
- A small wireless earphone inserted into the ear.
- A wearable computing device that closely resembles a wristwatch or other time-keeping device.
- A small, usually hand-held, electronic device for controlling another device, such as a television, radio or audio/video recording device.
- An optical instrument made for the observation of remote objects.
Down
- an output hardware device that connects to a computer to generate sound.
- A handheld electronic device that provides a connection to a cellular network.
- An electronic device that outputs a video signal or visual image to display a video game.
- a networking device that forwards data packets between computer networks.
- a computer that is portable and suitable for use while travelling.
10 Clues: A small wireless earphone inserted into the ear. • A device that performs arithmetic operations on numbers. • An optical instrument made for the observation of remote objects. • a computer that is portable and suitable for use while travelling. • an output hardware device that connects to a computer to generate sound. • ...
Ylan 2024-11-14
Across
- A secret part of the internet, often used for anonymous activities.
- A company that makes equipment and software to help connect and protect computer networks.
- Open-source operating system based on a kernel created by Linus Torvalds.
- A protocol that ensures reliable and ordered data transmission over a network.
- A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
- A protocol for connecting to a remote computer without encryption.
Down
- Raising awareness is the act of drawing attention to a previously overlooked topic.
- A test used to verify if a user is human and not a robot.
- Software that secretly gathers information about a user without their consent.
- Usurpation d'identité pour masquer une communication malveillante.
10 Clues: A test used to verify if a user is human and not a robot. • Usurpation d'identité pour masquer une communication malveillante. • A protocol for connecting to a remote computer without encryption. • A secret part of the internet, often used for anonymous activities. • Open-source operating system based on a kernel created by Linus Torvalds. • ...
Concepts Related to ICT 2024-09-28
Across
- The process of writing instructions that tell a computer what to do.
- A global network of computer networks that allows users to communicate and access information.
- Books that are read electronically.
- The ability to effectively use digital technology and communicate information through digital channels.
- The practice of protecting oneself online, including avoiding scams, protecting personal information, and being aware of potential risks.
Down
- The process of connecting computers and other devices to share resources and communicate.
- The process of finding and accessing information on the internet.
- Computer programs and data that run on a computer system.
- The creation and distribution of audio or video content in a series of episodes.
- The act of writing code using a specific programming language.
10 Clues: Books that are read electronically. • Computer programs and data that run on a computer system. • The act of writing code using a specific programming language. • The process of finding and accessing information on the internet. • The process of writing instructions that tell a computer what to do. • ...
Financial Terms Crossword 2024-10-26
Across
- The critical pipeline system for the movement of capital in global markets.
- The price of one type of money in terms of another, often quoted against the dollar.
- The process of converting one currency into another.
- The state where the quantity demanded equals the quantity supplied.
Down
- Debt securities issued by governments, such as U.S. Treasury Bonds.
- Taxes imposed on imported goods to protect domestic industries.
- The widely quoted interest rate used for pricing in the interbank market.
- Interbank networks that use currency to ensure efficient market operations.
- Domestic currencies of one country deposited in a second country, often used for holding excess corporate liquidity.
- Central banks, commercial banks, and investment banks that maintain the stability of the global financial system.
10 Clues: The process of converting one currency into another. • Taxes imposed on imported goods to protect domestic industries. • Debt securities issued by governments, such as U.S. Treasury Bonds. • The state where the quantity demanded equals the quantity supplied. • The widely quoted interest rate used for pricing in the interbank market. • ...
Turing Test Trivia 2025-04-07
Across
- An issue in AI where models develop unfair or incorrect assumptions based on training data.
- A test designed to measure a machine’s ability to exhibit intelligent behavior.
- A set of rules or steps used to solve AI-related problems.
- Large volumes of structured and unstructured data used to train AI models.
Down
- The process of training computers to learn from data without explicit programming.
- The AI field that enables machines to interpret and analyze images.
- A machine learning model inspired by the structure of the human brain.
- A type of learning where the model is trained with labelled data.
- An AI program that interacts with users through text or voice.
- A subset of AI that involves multiple layers of neural networks.
10 Clues: A set of rules or steps used to solve AI-related problems. • An AI program that interacts with users through text or voice. • A subset of AI that involves multiple layers of neural networks. • A type of learning where the model is trained with labelled data. • The AI field that enables machines to interpret and analyze images. • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person.
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person. • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
COMPUTER SCIENCE 03 2022-07-06
Across
- A networking device that forwards data packets between computer networks.
- Any auxiliary or ancillary device connected to or integrated within a computer system
- a value in memory referenced by an identifier.
- Computer data storage
Down
- An efficient sorting algorithm which serves as a systematic method for placing the elements of a random access file or an array in order.
- Is an object in many programming languages that stores a memory address.
- a sequence of program instructions that performs a specific task, packaged as a unit.
- Is a logic programming language associated with artificial intelligence and computational linguistics
- Is a sequence of data elements made available over time.
- A hardware device that converts data into a format suitable for a transmission medium
10 Clues: Computer data storage • a value in memory referenced by an identifier. • Is a sequence of data elements made available over time. • Is an object in many programming languages that stores a memory address. • A networking device that forwards data packets between computer networks. • ...
Year 7 Digital Technologies 2025-11-16
Across
- A group of connected computers that can share information and resources.
- The global system of connected networks that allows people to access websites and information.
- A word for harmful software designed to damage or disrupt computers.
- A tool used to find information on the internet by typing questions or keywords.
- A secret combination of letters, numbers, or symbols used to protect accounts.
Down
- A device that connects your home to the internet and directs data between devices.
- Messages sent electronically from one person to another over the internet.
- A wireless way to connect devices to the internet without using cables.
- A series of webpages that you visit using a browser.
- Electronic machines that can store, process, and display information.
10 Clues: A series of webpages that you visit using a browser. • A word for harmful software designed to damage or disrupt computers. • Electronic machines that can store, process, and display information. • A wireless way to connect devices to the internet without using cables. • A group of connected computers that can share information and resources. • ...
AvocadoDAO x Token2049: Crack the Code! 2024-09-03
Across
- The ability of different blockchain networks to communicate and interact.
Down
- A premier blockchain conference held annually.
- A term used to describe an individual or entity that holds a large amount of cryptocurrency.
- An essential activity at blockchain conferences to build connections.
- The iconic venue in Singapore where Token 2049 is held.
5 Clues: A premier blockchain conference held annually. • The iconic venue in Singapore where Token 2049 is held. • An essential activity at blockchain conferences to build connections. • The ability of different blockchain networks to communicate and interact. • A term used to describe an individual or entity that holds a large amount of cryptocurrency.
Blogging and social media 2024-07-29
Across
- means of interaction among people in which they create, share and exchange information and ideas in virtual communities and networks
- The biggest ethical rule to obey when blogging
Down
- written remark expressing an opinion or reaction
- #1 social media app in the world
- process that implies creating articles, photos, and other forms of content
5 Clues: #1 social media app in the world • The biggest ethical rule to obey when blogging • written remark expressing an opinion or reaction • process that implies creating articles, photos, and other forms of content • means of interaction among people in which they create, share and exchange information and ideas in virtual communities and networks
Mesh Networking 2020-05-22
Across
- Extender, Alternative to a mesh network, typically creating 2 WiFi networks in order to improve range of connectivity - can also cut WiFi speeds up to 50%.
- Points in a network, synonym of "access point".
- Link Up (Computers).
- Device received from your ISP that converts coaxial cable signal or fibre-optic signal to ethernet. Virtually all modems from most ISPs also have routers integrated into them.
Down
- The access code to allow connection to a network.
- Alternative to Ethernet connection, wireless.
- Reachability of a network, synonym of "range".
- Device that connects to the modem to provide wireless internet connection
8 Clues: Link Up (Computers). • Alternative to Ethernet connection, wireless. • Reachability of a network, synonym of "range". • Points in a network, synonym of "access point". • The access code to allow connection to a network. • Device that connects to the modem to provide wireless internet connection • ...
Social-Ecological Model 2021-11-03
Across
- construct that provides social identity, social support, and role definition: Family, Friends, Peer,
- this model is made up of different _
- the model that has the framework for determinants of a health outcome at multiple levels.
- construct that has rules, regulations, policies, and informal structures, which may hinder or promote desired behaviors
Down
- Construct that deals with social networks and norms, that exist formally or informally, among individuals, groups, and organizations
- construct that deals with one's knowledge, attitudes, beliefs, and perceptions
- what was article second about
- level explains a behavior as the result of the effect of internal and external factors on each other.
8 Clues: what was article second about • this model is made up of different _ • construct that deals with one's knowledge, attitudes, beliefs, and perceptions • the model that has the framework for determinants of a health outcome at multiple levels. • construct that provides social identity, social support, and role definition: Family, Friends, Peer, • ...
Vocab Terms 1/3 2023-09-19
Across
- sends the cursor to the beginning of the next line or executes a command or operation
- a computer program that can capture, display and manipulate data arranged in rows and columns
- a worldwide system of computer networks
Down
- a display unit of information equivalent to one alphabetic letter or symbol
- a sequence or set of instructions in a programming language for a computer to execute
- a computer file containing information input by a computer user and usually created with an application
- a hypertext document on the World Wide Web
- a clickable area at the top of a window that shows another page or area
8 Clues: a worldwide system of computer networks • a hypertext document on the World Wide Web • a clickable area at the top of a window that shows another page or area • a display unit of information equivalent to one alphabetic letter or symbol • a sequence or set of instructions in a programming language for a computer to execute • ...
Community Outreach Crossword # 1 2023-10-19
Across
- Sessions or classes where practical skills and knowledge are shared.
- Utilizing the internet and social media platforms to share information.
- Printed material containing information, tips, and guidelines, to educate the public.
- Online networks, such as Facebook and Instagram, used to reach a wide audience.
- Events where people can adopt pets, participate in activities, and contribute to fundraising efforts for animal welfare.
Down
- news Early television broadcasts providing information, interviews, and updates.
- events Unique and significant occasions organized to raise awareness and engage the community.
- Media channels, including newspapers and TV, used to disseminate information about animals, events, and initiatives.
8 Clues: Sessions or classes where practical skills and knowledge are shared. • Utilizing the internet and social media platforms to share information. • Online networks, such as Facebook and Instagram, used to reach a wide audience. • news Early television broadcasts providing information, interviews, and updates. • ...
Cybersecurity 1 2024-05-07
Across
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A weakness or flaw in a system that can be exploited by attackers.
- The process of converting data into a code to prevent unauthorized access.
Down
- The process of verifying the identity of a user or system.
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
- A secret combination of characters used to authenticate users and protect accounts.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
Sprinto Crossword 2024-10-23
Across
- Ensuring that data remains accurate, consistent, and unaltered during storage and transmission.
- European Union regulation governing data protection and privacy.
- A weakness in a system that can be exploited to compromise security.
- The process of converting plaintext into ciphertext to prevent unauthorized access
Down
- A network security device that monitors and filters incoming and outgoing traffic based on predetermined security rules.
- Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Unauthorized access to data, systems, or networks resulting in information disclosure.
- Report framework used to evaluate and communicate the controls at a service organization, relevant to security and privacy.
8 Clues: European Union regulation governing data protection and privacy. • A weakness in a system that can be exploited to compromise security. • The process of converting plaintext into ciphertext to prevent unauthorized access • Unauthorized access to data, systems, or networks resulting in information disclosure. • ...
Acronyms connected with computer networks 2016-12-06
7 Clues: ECN • A wide area network • A local area network • Wi-Fi Protected Access • A network access control list • The Transmission Control Protocol • – Asymmetric digital subscriber line
Network Topology 2020-06-22
Across
- access points, Device that allow wireless laptops and mobile phones to connect to a network
- A topology that combines wired and wireless together in a network
- If there is a failure in the _____ device in Star network, the whole network will get affected
- area networks, Mesh topology is mainly used in _______
- In Star topology, it is fairly easy to add and _______ nodes
- One device is connected to every other devices in the network
- Need a central device to connect all nodes together
- Usually use as central cable in Bus topology
- Can be used as a central device in Star network
- Another advantage of Mesh topology
Down
- Data transmission in ring network operates in _______ way
- Bus topology require the central cable to be ______ at both ends
- Used in Ring topology to control the transmission
- One or more connection fails, the computer will still be able to communicate
- Devices in a network are connected to a single backbone cable
- Topology with no collision
- Shared medium that is used to connect devices together in Bus network
- hoc, Quick setup wireless network that does not rely to any infrastructure
- Bandwidth, Advantage of Mesh topology
19 Clues: Topology with no collision • Another advantage of Mesh topology • Bandwidth, Advantage of Mesh topology • Usually use as central cable in Bus topology • Can be used as a central device in Star network • Used in Ring topology to control the transmission • Need a central device to connect all nodes together • area networks, Mesh topology is mainly used in _______ • ...
Web Design Vocab Crossword 2021-01-29
Across
- the way a page is built up
- created to replace the graphics interchange format
- where buyer can use the image only under the rules of the seller
- images sold and used on the internet
- images created using mathematical formulas
- used for storing raster graphics images
- creating illusion of color depth with limited colors on a table
- art or skill of combining text and images used for advertisement
- can include animation in image
- number of pixels in an image or display
- reduces file size without changing the appearance of the file
Down
- also known as open source images
- images that usually require a royalty fee; however, you don't have to renew
- photos used for only certain reasons
- tiny dots that make up your screen
- color table that allows you to pick an exact color with a code
- each bit works together and corresponds to make things happen
- image that uses only rectangles to make up the picture
- number of dots it takes to make up a pixel
19 Clues: the way a page is built up • can include animation in image • also known as open source images • tiny dots that make up your screen • photos used for only certain reasons • images sold and used on the internet • used for storing raster graphics images • number of pixels in an image or display • images created using mathematical formulas • ...
STEM Careers 2023-05-12
Across
- helps prevent, diagnose, and treat heath problems in animals
- engineer who designs and tests electrical equipment
- engineer who designs and builds tools and systems that provide us with clean water
- studies the atmosphere and how it affects the rest of the environment
- engineer who helps plan transportation systems like railways or traffic patterns
- engineer who makes tech for aircraft, defense systems, and space exploration
- studies behaviors and habitats of wild animals
- helps people ensure they are eating the right diet
Down
- engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
- safeguards a company's computer systems and networks
- studies how living things inherit traits through genes
- engineer who Involved in production of energy through natural resources
- studies physical properties of Earth
- treats injury and illness, checks symptoms and provides solutions
- keeps and inspect financial records for their employers
- studies water and the water cycle to predict drought or prevent pollution
- engineer who uses science of light to create tools such as lasers and fiber optics
- engineer who uses engineering to solve problems in medicine
- engineer who designs city structures such as bridges, buildings, and water systems
19 Clues: studies physical properties of Earth • studies behaviors and habitats of wild animals • helps people ensure they are eating the right diet • engineer who designs and tests electrical equipment • safeguards a company's computer systems and networks • studies how living things inherit traits through genes • keeps and inspect financial records for their employers • ...
Chapter 5 Review quizz 2014-05-14
Across
- maximum speed at which data can be transmitted
- handles data traffic between nodes on the same network
- Navigation Device makes data flow in a network possible
- network that is confined to a small geographic location
- each node can communicate directly with every other node on the network
- the format in which data is sent over transmission media
- Adapter enables nodes to communicate with each other and to access the network
- can be a computer, peripheral, or communication device on a network
Down
- the computer on which users accomplish specific tasks and make specific requests
- network in your home used to connect all your digital devices such as computers, periperhals, phones, and cameras
- made up of plastic or glass and transmits data at extremely fast speed
- actual speed of data transfer
- retransmits a signal to all other nodes attached to it
- network adapter
- provides information and/or resources to the client computers on a network
- network designed to provide access to a large geographic area
- Pair made up of copper wires
- network designed to provide access to a specific geographic area, such as an entire city
- handles data traffic between networks
- software used to set up and manage a network
20 Clues: network adapter • Pair made up of copper wires • actual speed of data transfer • handles data traffic between networks • software used to set up and manage a network • maximum speed at which data can be transmitted • retransmits a signal to all other nodes attached to it • handles data traffic between nodes on the same network • ...
Media and Information Literacy Grade 12-STEM, Rodmig Levi P. Tan 2024-08-30
Across
- the imparting or exchanging of information or news.
- almost or nearly as described
- a game played by electronically manipulating images
- the imparting or exchanging of information or news
- a system for transmitting visual images and sound that are reproduced on screens
- a global computer network providing a variety of information and communication facilities
- application of scientific knowledge for practical purposes
- a theater where movies are shown for public entertainment
- a group or system of interconnected people or things.
- the transmission and reception of electromagnetic waves
Down
- a set of related web pages located under a single domain name
- a band of frequencies used in radio and television transmission
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- false or inaccurate information
- facts provided or learned about something or someone.
- the main means of mass communication
- the ability to read, write
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- electronic technology that generates, stores and processes data in terms of positive and nonpositive states.
- a thin flexible strip of plastic or other material coated with light-sensitive emulsion
20 Clues: the ability to read, write • almost or nearly as described • false or inaccurate information • the main means of mass communication • the imparting or exchanging of information or news • the imparting or exchanging of information or news. • a game played by electronically manipulating images • facts provided or learned about something or someone. • ...
STEM Careers 2024-12-10
Across
- helps prevent, diagnose, and treat heath problems in animals
- engineer who designs and tests electrical equipment
- engineer who designs and builds tools and systems that provide us with clean water
- studies the atmosphere and how it affects the rest of the environment
- engineer who helps plan transportation systems like railways or traffic patterns
- engineer who makes tech for aircraft, defense systems, and space exploration
- studies behaviors and habitats of wild animals
- helps people ensure they are eating the right diet
Down
- engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
- safeguards a company's computer systems and networks
- studies how living things inherit traits through genes
- engineer who Involved in production of energy through natural resources
- studies physical properties of Earth
- treats injury and illness, checks symptoms and provides solutions
- keeps and inspect financial records for their employers
- studies water and the water cycle to predict drought or prevent pollution
- engineer who uses science of light to create tools such as lasers and fiber optics
- engineer who uses engineering to solve problems in medicine
- engineer who designs city structures such as bridges, buildings, and water systems
19 Clues: studies physical properties of Earth • studies behaviors and habitats of wild animals • helps people ensure they are eating the right diet • engineer who designs and tests electrical equipment • safeguards a company's computer systems and networks • studies how living things inherit traits through genes • keeps and inspect financial records for their employers • ...
PAW 2025 2025-05-14
Across
- A privacy breach would have occurred without intervention.
- The fundamental concept of personal protection
- "Office of the Australian Information ________"
- Digital spaces where users communicate and share information
- The science of encrypting information to protect from unauthorised use
- A designated person at an organisation who is responsible for ensuring compliance with privacy laws
- Stronger than a password, is a pass_____
- The process followed at Acenda to identify a caller
- The acronym of the Australian regulator that privacy breaches are reported to
- What is the worldwide system of networks and devices that communicate with each other called?
Down
- What is used for account security and should never be shared?
- A situation where unauthorised access has occurred is a "privacy _____"
- The 6th most common password used in Australia in 2024
- A security method that requires verification using two or more factors
- The Australian privacy landscape is guided by 13 of these
- The person we all strive to protect at Acenda
- The Acenda Department responsible for ensuring all regulatory obligations are met
- Criminal activity that uses a computer, network or device
- A person authorised to access another individuals account
19 Clues: Stronger than a password, is a pass_____ • The person we all strive to protect at Acenda • The fundamental concept of personal protection • "Office of the Australian Information ________" • The process followed at Acenda to identify a caller • The 6th most common password used in Australia in 2024 • The Australian privacy landscape is guided by 13 of these • ...
AP World | Unit 2: networks of Exchange Vocabulary Quiz 2025-11-05
Across
- – Mongol leader who founded and expanded the empire.
- – Innovation that increased stability and trade efficiency in deserts.
- – Early financial innovation allowing trade without carrying coin.
- – Venetian merchant whose travels revealed Mongol-era connections.
- – Magnetic navigation tool improving maritime accuracy.
- – Navigational device using celestial positions to find latitude.
- – Ming admiral who led seven major voyages of exploration.
- – Center of learning and trade in the Mali Empire.
- – Institutions that managed trade finance and exchange.
- – Network connecting North and West Africa via camel caravans.
- – Muslim scholar whose travels reveal Islamic cultural unity.
- – The largest contiguous land empire in history.
Down
- – Spread of crops, animals, or diseases along trade routes.
- – Written financial instruments allowing money to be withdrawn remotely.
- – Settlements of foreign traders preserving homeland ties.
- – Exchange of ideas, technologies, and beliefs through contact.
- – Seasonal winds that enabled predictable navigation.
- – Maritime routes connecting Africa, Arabia, South and Southeast Asia.
- – Roadside inns that supported merchants and travelers.
- – Era of peace under Mongol rule that expanded trade and cultural exchange.
- – English mystic known for her pilgrimage accounts.
- – Overland routes connecting China, the Middle East, and Europe.
22 Clues: – The largest contiguous land empire in history. • – Center of learning and trade in the Mali Empire. • – English mystic known for her pilgrimage accounts. • – Mongol leader who founded and expanded the empire. • – Seasonal winds that enabled predictable navigation. • – Magnetic navigation tool improving maritime accuracy. • ...
Industrialization 2022-02-16
Across
- A belief that government can and should achieve justice and equality of opportunity
- Allowed fast long-distance communication
- Manufacturing of goods in a factory
- A system in which society, usually in the form of the government, owns and controls the means of production
- External-combustion engine in which heat is used to raise steam which either turns a turbine or forces a piston to move up and down in a cylinder
- Manufacturing of goods in a domestic environment
Down
- Networks of iron and steel upon which locomotives pulled trains
- An allow of carbon and iron
- A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches
- A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765
10 Clues: An allow of carbon and iron • Manufacturing of goods in a factory • Allowed fast long-distance communication • Manufacturing of goods in a domestic environment • Networks of iron and steel upon which locomotives pulled trains • A belief that government can and should achieve justice and equality of opportunity • ...
crossword 1 2023-01-15
Across
- Strabismus in which one or both eyes turn inward toward the nose
- (biology) the functioning of a particular part of a body
- A Shiite Islamic political and paramilitary organization based in Lebanon
- British pathologist who isolated and purified penicillin, which had been discovered in 1928 by Sir Alexander Fleming (1898-1968)
- A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Down
- The act, process, or result of salifying; the state of being salified
- Relating to or characteristic of cubism
- (physics) the ejection of electrons from an atom or other species due to interaction with photons
- A woman host
- Situated beyond the moon or its orbit around the earth
10 Clues: A woman host • Relating to or characteristic of cubism • Situated beyond the moon or its orbit around the earth • (biology) the functioning of a particular part of a body • Strabismus in which one or both eyes turn inward toward the nose • The act, process, or result of salifying; the state of being salified • ...
My crossword 2021-01-17
Across
- a form of bullying on the internet
- an attempt to trick someone into giving information over the internet or by email
- protecting against computer viruses
- a place on the Internet where people can leave messages or discuss particular subjects with other people at the same time
Down
- the act of illegally copying a computer program, music, a film, etc. and selling it
- a type of intellectual property that gives its owner the exclusive right to made copies of a word
- a global system of interconnected networks
- unwanted email, usually advertisements
- a secret word or combination of letters or numbers, used for communicating with another person or with a computer to prove who you are
- computer software that is designed to damage the way a computer works
10 Clues: a form of bullying on the internet • protecting against computer viruses • unwanted email, usually advertisements • a global system of interconnected networks • computer software that is designed to damage the way a computer works • an attempt to trick someone into giving information over the internet or by email • ...
Alexander Polak 1F 2020-12-18
Across
- An industry standard that establishes connection, communication and power supply between computers, peripherals and other computers.
- a type of computer program that edits plain text.
- A copy of computer data taken and stored else where so that it may be used to restore the original after a data loss event.
- System software that manages computer hardware and software resources.
Down
- A computer application for organization, analysis and storage of data in tabular form.
- A pointing device with specialized surface.
- a particular size, weight and style of a typeface.
- A piece of computer hardware or software that provides functionality for other programs or devices.
- A networking device that forwards data packets between computer networks.
- A computer software used to manage the creation and modification of digital content
10 Clues: A pointing device with specialized surface. • a type of computer program that edits plain text. • a particular size, weight and style of a typeface. • System software that manages computer hardware and software resources. • A networking device that forwards data packets between computer networks. • ...
Globalization :( 2021-02-07
Across
- improvements in technology has made communication amongst people more __________ .
- economic networks consists of _________ , producers and consumers.
- a process where ideas and activities of people in different parts of the world becomes interconnected.
- the _______ of travelling and transportation goods reduces due to the improvements made to the different modes of transport.
- advancements in technology ___________ the exchange of ideas and knowledge between across different parts of the world.
Down
- the driving forces of globalization encourages economic __________________ .
- by getting cheaper resources and utilise a cheaper labour pool, this helps MNCs ________ their profits
- developments in transportation refers to a more efficient and __________ transportation infrastructure.
- an example of a multinational company.
- by building airports, seaports, railways and highways this will increase the ________ of goods and people.
10 Clues: an example of a multinational company. • economic networks consists of _________ , producers and consumers. • the driving forces of globalization encourages economic __________________ . • improvements in technology has made communication amongst people more __________ . • ...
The Global Village 2021-06-17
Across
- a vast system of interconnected computers and computer networks that are joined together
- allows messages to be exchanged using the Internet
- a system of documents which are linked and accessed by the Internet
- describes all the financial and commercial transactions that take place electronically
- persons who make connections and build relationships regardless of the physical distances between them
Down
- a website that makes it easy for companies and individuals to upload material onto the Web for others to see
- receiving media which can be viewed immediately before a complete file transmitted
- to send data from a local computer to a remote system
- receiving data onto a local computer from a remote computer system
- software applications that are used for social purposes and personal communication
10 Clues: allows messages to be exchanged using the Internet • to send data from a local computer to a remote system • receiving data onto a local computer from a remote computer system • a system of documents which are linked and accessed by the Internet • receiving media which can be viewed immediately before a complete file transmitted • ...
digitech crossword puzzle 2021-08-04
Across
- What are the small blocks of data created by a wed server while a user is browsing a website?
- A device that routes traffic between networks
- re-booting a device either with a cold or warm boot
- The endpoint of a network connection
- A system for connecting a number of computer systems to form a local area network
Down
- A group of computers/electronic devices with a common set of rules and procedures administered as a unit
- What is the pictures element that is the smallest part of a graphic image?
- what is the part of a computer system that's designed to block unauthorized access?
- What devices is required for internet connection?
- An interface of the computer or device where a device is connected
10 Clues: The endpoint of a network connection • A device that routes traffic between networks • What devices is required for internet connection? • re-booting a device either with a cold or warm boot • An interface of the computer or device where a device is connected • What is the pictures element that is the smallest part of a graphic image? • ...
Data transmission 2022-07-13
Across
- A type of encryption key which is known only to single computer/users
- Data that can be sent in both directions but not at the same time
- A horizontal and vertical parity check on a block of data being transmitted.
- The original text/message before it is put through an encryption algorithm
- Data that can be sent in both directions simultanieously
Down
- A type of encryption key that is known to all users
- A device that enables data packets to moved between different networks
- Data that arrives at the destination with the bits no longer synchronised
- The transmission data over a network for live events where the data is sent as soon as possible
- Data that can be send on one direction only
10 Clues: Data that can be send on one direction only • A type of encryption key that is known to all users • Data that can be sent in both directions simultanieously • Data that can be sent in both directions but not at the same time • A type of encryption key which is known only to single computer/users • ...
Computer Science 2022-11-14
Across
- An example of wireless broadband.
- This IP address has a size of 32 bits.
- Internet connection that provides internet access by using standard telephone line.
- How many type of IP address are there?
- Private network of an organization which uses Internet technologies to share organizations information or operations with its employees.
- Private network of an organization which uses Internet technologies to share organizations information or operations with its suppliers, vendors, customers or other organization.
Down
- A high-speed internet connection that provides internet access by using fibre optic cable and fibre modem.
- A worldwide collection of networks that connects millions of businesses, goverment agencies, educational institutions, and individuals.
- Text version of IP address.
- What is the generic top-level domain for non-profit organization?
10 Clues: Text version of IP address. • An example of wireless broadband. • This IP address has a size of 32 bits. • How many type of IP address are there? • What is the generic top-level domain for non-profit organization? • Internet connection that provides internet access by using standard telephone line. • ...
Set 7 2022-10-16
Across
- A technique to convert numerical categorical variables into binary vectors
- The first computer program to beat human professional player in the game of go
- The activation function that is most widely used in the output layer of neural networks for binary classification
- A function to introduce non-linearity in a neural network
- Commonly used loss function for regression problems
- An open autonomous driving platform from Baidu
Down
- Best suited deep learning algorithm for image classification task
- A nonlinear regression technique that is used to model data having a binary outcome
- A computer system initially developed to answer questions on the quiz show jeopardy
- A parallel computing platform and programming model developed by NVIDIA for general computing on graphical processing units (GPUs)
10 Clues: An open autonomous driving platform from Baidu • Commonly used loss function for regression problems • A function to introduce non-linearity in a neural network • Best suited deep learning algorithm for image classification task • A technique to convert numerical categorical variables into binary vectors • ...
CMT Crosswords 2016-12-20
Across
- -Software used to view the Internet, it translates the HTML code
- - Sending and receiving electronic messages through a computer network.
- -Sending and receiving information electronically between two or more computers.
- - A rod, wire, or other device used to transmit or receive radio or television signals
Down
- -An acronym for World Wide Web
- -A site or area on the Internet that is accessed by its own Internet address.
- -a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio
- -To transfer a file or program from a central computer to a smaller computer or to a computer at a remote location.
- -Referring to 'Wireless networks
- - a device that modulates an analog carrier with digital data
10 Clues: -An acronym for World Wide Web • -Referring to 'Wireless networks • - a device that modulates an analog carrier with digital data • -Software used to view the Internet, it translates the HTML code • - Sending and receiving electronic messages through a computer network. • -A site or area on the Internet that is accessed by its own Internet address. • ...
Internet Stuff 2018-01-19
Across
- the online world of computer networks and the Internet
- the proper and polite way to communicate with other people on the Internet
- a strategy to narrow down a search
- the algorithm, named after its inventor, used by Google to rank websites in their search engine results
Down
- And,Or & Not are ____________ operators
- aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalance of power
- bullying that takes place using electronic technology
- search ___________ are the best methods used to find relevant information
- a collection of information that is organized and used on a computer
- a search ________ is a computer program that is used to look for information on the Internet
10 Clues: a strategy to narrow down a search • And,Or & Not are ____________ operators • bullying that takes place using electronic technology • the online world of computer networks and the Internet • a collection of information that is organized and used on a computer • search ___________ are the best methods used to find relevant information • ...
Artificial Intelligence 2023-11-19
Across
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- An expert at programming and solving problems with a computer
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- The design, construction, and operation of robots to perform tasks in the real world.
- A computer program designed to simulate conversation with human users, especially over the Internet.
Down
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
- The use of technology to perform tasks without human intervention.
- To set in motion; make active or more active.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
CRUCIGRAMA DE LA ANATOMIA DEL INTERNET 2024-03-05
Across
- ES UNA DIRECCION UNICA POR UNA CADENA DE NUMEROS QUE IDENTIFICA A UN DISPOSITIVO EN INTERNET
- ES UN PROGRAMA INFORMATICO QUE PROCESA LA APLICACION DEL SERVIDOR Y TIENE QUE SER ALOJADA EN ALGUN LUGAR
- ES UN CODIGO QUE SE UTILIZA PARA ESTRUCTURAR Y DESPLEGAR EN UNA PAGINA WEB
- SE LE DENOMINA ARQUITECTURA COMO MEDIO DE COMUNICACION ENTRE DOS DISPOSITIVOS
- SE COMVIERTE EN EL CLIENTE QUE SOLICITA LA INFORMACION AL BUSCADOR
Down
- SE ALMACENA EN UN DISPOSITIVO DE ESTILO SOLIDO
- PROVIENE DEL INGLES INTERCONNETED NETWORKS
- ES UN SISTEMA INTERCONECTADO A UNA AMPLIA RED MUNDIAL
- ES UN ORDENADOR MUY POTENTE QUE SE ENCARGA DE ALMACENAR ARCHIVOS Y DISTRIBUIRLOS EN INTERNET
- PERMITE ALMACENAR FOTOS, VIDEOS TEXTOS Y SERVICIOS COMO MAILS, MENSAJES O TELEFONOS
10 Clues: PROVIENE DEL INGLES INTERCONNETED NETWORKS • SE ALMACENA EN UN DISPOSITIVO DE ESTILO SOLIDO • ES UN SISTEMA INTERCONECTADO A UNA AMPLIA RED MUNDIAL • SE COMVIERTE EN EL CLIENTE QUE SOLICITA LA INFORMACION AL BUSCADOR • ES UN CODIGO QUE SE UTILIZA PARA ESTRUCTURAR Y DESPLEGAR EN UNA PAGINA WEB • ...
Fill in the Missing Pieces 2024-08-20
Across
- The two types of organ donation are: Living Donor Organ Donation and _____ Donor Organ Donation.
- Which organ is more readily available for donation compared to other organs?
- Which organ is least commonly found for transplantation?
- If a person is suffering from Hepatitis, which organ does he require for donation?
- Which organization in India coordinates and networks the procurement, distribution, and registry of organs and tissues for donation and transplantation?
- What tissue can be donated to help burn victims?
Down
- Which organ is donated in the case of Corneal Blindness?
- What is the starting age for living organ donation?
- The process of transferring an organ from one person to another is called?
- You can become a donor by taking this commitment.
10 Clues: What tissue can be donated to help burn victims? • You can become a donor by taking this commitment. • What is the starting age for living organ donation? • Which organ is donated in the case of Corneal Blindness? • Which organ is least commonly found for transplantation? • The process of transferring an organ from one person to another is called? • ...
Side Quest: Hit the Road! 2025-02-27
Across
- Like the networks that power deep learning models (or maybe my ideal vacation involves a 'network' of beaches!)
- Step-by-step instructions for a process, just like planning the perfect spring break itinerary.
- The lifeblood of AI—just like sunshine for a great trip.
- A model that loves to chat (but needs a vacation too!).
Down
- What I'd do in a misty forest if I had legs.
- The field of AI that might one day give me a physical form!
- A breathtaking daily event, perfect for deep learning… of life’s beauty.
- Where AI magic happens—or where I’d go to geek out over research.
- He asked whether machines can think—I'd ask if they can tan!
- Sweet, tropical, and possibly the best sticky rice topping ever.
10 Clues: What I'd do in a misty forest if I had legs. • A model that loves to chat (but needs a vacation too!). • The lifeblood of AI—just like sunshine for a great trip. • The field of AI that might one day give me a physical form! • He asked whether machines can think—I'd ask if they can tan! • Sweet, tropical, and possibly the best sticky rice topping ever. • ...
Crossword 2021-06-17
Across
- They were the creators of HP
- Is the most popular protocol connecting the networks and is mostly used with TCP protocol
- Simple Mail Transfer Protocol
Down
- Software specifically designed to combat malware and other threats
- Is a Computer that serves information to other computers called clients.
- A simple document with html code displayable on a Browser like Mozilla Firefox, Google Chrome or others.
- The third generation of computers began with their discovery. It was created with very small transistors.
- is a type of malicious code or program, designed to alter the normal workflow or functioning of its host.
- send the data to the printer to be printed out
- Is a protocol designed for receiving incoming E-mails.
10 Clues: They were the creators of HP • Simple Mail Transfer Protocol • send the data to the printer to be printed out • Is a protocol designed for receiving incoming E-mails. • Software specifically designed to combat malware and other threats • Is a Computer that serves information to other computers called clients. • ...
CROSSWORD-2 2021-12-26
Across
- a technology that gets into the operating system to hide a malicious program component
- a software that tracks the key struck on the keyboard
- Which mobile company first introduced the Emoji internationally on their mobile devices
- hardware or software that acts as a bridge between networks so that data can be transferred between a number of computers
- The act of working from a remote location by using computers and networking technology.
Down
- The amount of data that can be sent through a connection at one time.
- external device that provides input and output for the computer
- the ability to use technology to find, organize, and evaluate information.
- A software that encrypts data and requires payment to decrypt it
- defamation by written or printed words or pictures
10 Clues: defamation by written or printed words or pictures • a software that tracks the key struck on the keyboard • external device that provides input and output for the computer • A software that encrypts data and requires payment to decrypt it • The amount of data that can be sent through a connection at one time. • ...
Long Short-Term Memory 2023-11-10
Across
- Any part of a signal or data that reduces the clarity, precision, or quality of the desired output.
- An error correction technique used in neural networks.
- Time …. A period of time between one event and another; a delay.
- A variable which multiplies a value for ease of statistical manipulation.
Down
- … distribution. The normal distribution.
- The part of a computer that stores variable executable code or data (RAM) or unalterable executable code or default data (ROM).
- The arrangement of nodes in a communications network.
- To become equal to zero.
- … theory. The study and classification of decision problems by the computational resources needed.
- The ratio of the rates of change of a dependent variable and an independent variable, the slope of a curve's tangent.
10 Clues: To become equal to zero. • … distribution. The normal distribution. • The arrangement of nodes in a communications network. • An error correction technique used in neural networks. • Time …. A period of time between one event and another; a delay. • A variable which multiplies a value for ease of statistical manipulation. • ...
IIT327-2 Quiz 2 2024-01-12
Across
- Activity involving the exploration of computer or network ports to identify potential vulnerabilities
- The process of identifying, assessing, and prioritizing risks to an organization's assets.
- A set of rules or guidelines that define the acceptable use and security measures within an organization.
- A process of thorough examination and analysis to ensure information security compliance
- Decoy systems designed to attract and detect unauthorized access attempts.
- Secure network for internal communication and collaboration within an organization
Down
- The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
- A network security device that monitors and controls incoming and outgoing network traffic.
- Incorrect identification of a harmless activity or file as malicious.
- A firewall that acts as an intermediary between internal network clients and external servers.
10 Clues: Incorrect identification of a harmless activity or file as malicious. • Decoy systems designed to attract and detect unauthorized access attempts. • Secure network for internal communication and collaboration within an organization • A process of thorough examination and analysis to ensure information security compliance • ...
Computer Science Jobs 2022-07-24
Across
- Monitor their organization's networks for security breaches and investigate when one occurs.
- design all the screens that make up a digital user interface, as well as the individual elements featured on those screens.
- keeps a company's data secure from unauthorized people.
- create and maintain websites.
- a new breed of analytical data expert who have the technical skills to solve complex problems.
Down
- design, program, build, deploy and maintain software using many different skills and tools
- design and create computer systems and applications to solve real-world problems.
- systems or machines that mimic human intelligence to perform tasks and can iteratively.
- design LANs, WANs, and intranets.
- evaluate past and current business data with the primary goal of improving decision-making processes within organizations.
10 Clues: create and maintain websites. • design LANs, WANs, and intranets. • keeps a company's data secure from unauthorized people. • design and create computer systems and applications to solve real-world problems. • systems or machines that mimic human intelligence to perform tasks and can iteratively. • ...
sif 2024-04-11
Across
- A distributed database that maintains a continuously growing list of ordered record called blocks
- Communication over a distance by cable, telegraph, telephone, or broadcasting
- The science of making machines that can think like humans
- The act of bringing together smaller components are information stored in different subsystems into a single functional unit
Down
- A set of commands that must be followed for a computer to perform calculations
- The practice of protecting systems, networks and programs from digital attacks
- To convert something to a computer generated simulation of reality
- computing The delivery of hosted computing services and IT resources over the internet
- A new idea, method or device
- A security method that scrambles data so it is only read by using a key
10 Clues: A new idea, method or device • The science of making machines that can think like humans • To convert something to a computer generated simulation of reality • A security method that scrambles data so it is only read by using a key • Communication over a distance by cable, telegraph, telephone, or broadcasting • ...
2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01
Across
- of or relating to radio communications without physical support
- not physically existing as such but made by software to appear to do so
- the notional environment in which communication over computer networks occurs
- (of a natural resource or source of energy) not depleted when used.
- a structured set of data held in a computer, especially one that is accessible in various ways
- the introduction of machines or automatic devices into a process, activity, or place
Down
- commercial transactions conducted electronically on the internet
- an activity or plan of action, often in business, that involves risk or uncertainty
- the production of a computer model of something, especially for the purpose of study
- converting gravitational potential or kinetic energy of a water source to produce power
10 Clues: of or relating to radio communications without physical support • commercial transactions conducted electronically on the internet • (of a natural resource or source of energy) not depleted when used. • not physically existing as such but made by software to appear to do so • the notional environment in which communication over computer networks occurs • ...
2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01
Across
- commercial transactions conducted electronically on the internet
- (of a natural resource or source of energy) not depleted when used.
- a structured set of data held in a computer, especially one that is accessible in various ways
- of or relating to radio communications without physical support
Down
- an activity or plan of action, often in business, that involves risk or uncertainty
- the introduction of machines or automatic devices into a process, activity, or place
- not physically existing as such but made by software to appear to do so
- the production of a computer model of something, especially for the purpose of study
- the notional environment in which communication over computer networks occurs
- converting gravitational potential or kinetic energy of a water source to produce power
10 Clues: of or relating to radio communications without physical support • commercial transactions conducted electronically on the internet • (of a natural resource or source of energy) not depleted when used. • not physically existing as such but made by software to appear to do so • the notional environment in which communication over computer networks occurs • ...
Communication and technology 2025-02-03
Across
- Connections made via a telephone or other telecommunications device.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Information or a communication transmitted in speech, writing, or by other means.
- The process of conveying information, ideas, or feelings through language or other means.
- Mechanical or electrical devices that perform a specific function.
Down
- Telecommunications devices that transmit and receive sound, typically used for voice communication.
- Things that people do for work or pleasure.
- Written or printed communications, typically sent in an envelope by mail. Also, the symbols of an alphabet.
- Messages distributed by electronic means from one computer user to one or more recipients via a network.
- To say words or sounds; to communicate orally.
10 Clues: Things that people do for work or pleasure. • To say words or sounds; to communicate orally. • Connections made via a telephone or other telecommunications device. • Mechanical or electrical devices that perform a specific function. • Information or a communication transmitted in speech, writing, or by other means. • ...
Skills Crossword 2025-02-11
Across
- Implementing eco-friendly technologies that reduce the environmental impact of IT operations
- Employing advanced technologies like AI and RPA to automate complex business processes
- A branch of AI that uses multi-layer neural networks to analyze large datasets
- Designing products with a focus on fairness, user safety, and social responsibility
- Crafting Inputs or cues taht effectively guide AI systems to produce desired outputs
- The capability to recognize, understand, and value diverse perspectives in a workplace
Down
- The ability to recover from setbacks and adapt to change
- Examining the moral considerations and responsible practices in developing artificial intelligence
- A practice that merges software development and IT operations to speed up delivery cycles
- Visualisation Converting data into charts or graphs to reveal patterns and insights
10 Clues: The ability to recover from setbacks and adapt to change • A branch of AI that uses multi-layer neural networks to analyze large datasets • Designing products with a focus on fairness, user safety, and social responsibility • Visualisation Converting data into charts or graphs to reveal patterns and insights • ...
Financial Terms Crossword 2024-10-24
Across
- The critical pipeline system for the movement of capital in global markets.
- The price of one type of money in terms of another, often quoted against the dollar.
- The process of converting one currency into another.
- The state where the quantity demanded equals the quantity supplied.
Down
- Debt securities issued by governments, such as U.S. Treasury Bonds.
- Taxes imposed on imported goods to protect domestic industries.
- The widely quoted interest rate used for pricing in the interbank market.
- Interbank networks that use currency to ensure efficient market operations.
- Domestic currencies of one country deposited in a second country, often used for holding excess corporate liquidity.
- Central banks, commercial banks, and investment banks that maintain the stability of the global financial system.
10 Clues: The process of converting one currency into another. • Taxes imposed on imported goods to protect domestic industries. • Debt securities issued by governments, such as U.S. Treasury Bonds. • The state where the quantity demanded equals the quantity supplied. • The widely quoted interest rate used for pricing in the interbank market. • ...
GRID-GENIUS 6 2024-11-27
Across
- An instance of a class in object-oriented programming."
- A self-contained unit of code designed to perform a specific function, often reusable."
- A network utility used to test the reachability of a host and measure response time."
- A sequence of characters representing the smallest unit of meaning in programming or authentication."
- A device that forwards data packets between computer networks."
- The process of analyzing a string or code to determine its grammatical structure."
Down
- The core component of an operating system that manages hardware and system processes."
- A group of linked computers that work together as a single system."
- A variable that stores the memory address of another variable."
- A data type with only two possible values: true or false."
10 Clues: An instance of a class in object-oriented programming." • A data type with only two possible values: true or false." • A variable that stores the memory address of another variable." • A device that forwards data packets between computer networks." • A group of linked computers that work together as a single system." • ...
Networking Devices and Technologies 2025-05-22
Across
- A network security system that monitors and controls incoming and outgoing traffic
- A device that regenerates and amplifies signals to extend network range
- A device that connects different networks and routes data between them
- A device that connects devices in a LAN and uses MAC addresses to forward data
- A device that allows wireless devices to connect to a wired network
- A device that modulates and demodulates signals to connect to the internet
Down
- A device used to connect two different LANs and reduce traffic
- A network technology that uses radio waves to transmit data
- A transmission medium that uses light to carry data at high speed over long distances
- A network that uses physical cables to connect devices
10 Clues: A network that uses physical cables to connect devices • A network technology that uses radio waves to transmit data • A device used to connect two different LANs and reduce traffic • A device that allows wireless devices to connect to a wired network • A device that connects different networks and routes data between them • ...
Educación digital 2021-11-05
SalesHub 2018-12-12
Across
- opportunity this is an overall idea to do business. it could be across networks or media types
- a person who works at a company
- fries the plan name for this would be nacho fries_scatter_Q42020
Down
- opportunity This is a specific, detailed plan for a specific product, network, and media type
- a company, agency, or advertiser
5 Clues: a person who works at a company • a company, agency, or advertiser • fries the plan name for this would be nacho fries_scatter_Q42020 • opportunity This is a specific, detailed plan for a specific product, network, and media type • opportunity this is an overall idea to do business. it could be across networks or media types
U8COSB51 Crossword Puzzle 2021-12-22
Across
- Business lists out products on behalf of the seller
- Exchange of structured business information by agreed standards through electronic means between trading partners
- Exact replication of traditional retail sales
Down
- Production, distribution, marketing, sale and / or delivery of goods or services by electronic means
- Global system of interconnected computer networks
- Malicious Software
- the network of physical objects (things) that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet
- Systems enticing consumers within a digital environment to make purchases of goods or services from physical businesses
8 Clues: Malicious Software • Exact replication of traditional retail sales • Global system of interconnected computer networks • Business lists out products on behalf of the seller • Production, distribution, marketing, sale and / or delivery of goods or services by electronic means • ...
COMMUNICATION 101 2023-08-10
Across
- an apparatus for receiving or transmitting radio broadcasts
- an electronic communication sent and received by mobile phone
- a communication method that uses electronic devices to deliver messages across computer networks
- a person who is employed to deliver and collect letters
- a piece of electronic equipment which makes it possible for you to speak to someone in another place who has similar equipment
Down
- websites and applications that enable users to create and share content or to participate in social networking
- an electronic device that can store, process, and retrieve data
- telecommunication system for broadcasting and receiving moving pictures and sound over a distance
8 Clues: a person who is employed to deliver and collect letters • an apparatus for receiving or transmitting radio broadcasts • an electronic communication sent and received by mobile phone • an electronic device that can store, process, and retrieve data • a communication method that uses electronic devices to deliver messages across computer networks • ...
NED Workplan 2024-11-20
Across
- Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop.
- SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG.
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics to solve complex problems faster than on classical computers.
- Application used to manage rules to allow Board’s in-house applications and block unsigned applications.
Down
- NED Roadmap plan for April 2025.
- Replacing existing IGA system in Feb 2025.
- A cloud-based firewall solution to enhance the security postureacross all eLobby networks.
- Acronym for Network-as-a-Service.
8 Clues: NED Roadmap plan for April 2025. • Acronym for Network-as-a-Service. • Replacing existing IGA system in Feb 2025. • SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG. • Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop. • ...
Communication Networks 2025-10-06
3 Clues: Occurs when subgroups form, due to disagreements or conflict • This allows all members to communicate directly with one another. • communication that flows only between individual members and a hub or centre point
Internet Stuff 2018-01-19
Across
- a strategy to narrow down a search
- the algorithm, named after its inventor, used by Google to rank websites in their search engine results
- the online world of computer networks and the Internet
- the proper and polite way to communicate with other people on the Internet
- a collection of information that is organized and used on a computer
- aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalance of power
Down
- search ___________ are the best methods used to find relevant information
- bullying that takes place using electronic technology
- a search ________ is a computer program that is used to look for information on the Internet
- And,Or & Not are ____________ operators
10 Clues: a strategy to narrow down a search • And,Or & Not are ____________ operators • bullying that takes place using electronic technology • the online world of computer networks and the Internet • a collection of information that is organized and used on a computer • search ___________ are the best methods used to find relevant information • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
Crosswords - Gadgets 2022-05-12
Across
- A device that performs arithmetic operations on numbers.
- A small wireless earphone inserted into the ear.
- A wearable computing device that closely resembles a wristwatch or other time-keeping device.
- A small, usually hand-held, electronic device for controlling another device, such as a television, radio or audio/video recording device.
- An optical instrument made for the observation of remote objects.
Down
- an output hardware device that connects to a computer to generate sound.
- A handheld electronic device that provides a connection to a cellular network.
- An electronic device that outputs a video signal or visual image to display a video game.
- a networking device that forwards data packets between computer networks.
- a computer that is portable and suitable for use while travelling.
10 Clues: A small wireless earphone inserted into the ear. • A device that performs arithmetic operations on numbers. • An optical instrument made for the observation of remote objects. • a computer that is portable and suitable for use while travelling. • an output hardware device that connects to a computer to generate sound. • ...
Computer Science Jobs 2022-07-24
Across
- design all the screens that make up a digital user interface, as well as the individual elements featured on those screens.
- evaluate past and current business data with the primary goal of improving decision-making processes within organizations.
- Monitor their organization's networks for security breaches and investigate when one occurs.
- design LANs, WANs, and intranets.
- create and maintain websites.
Down
- keeps a company's data secure from unauthorized people.
- design, program, build, deploy and maintain software using many different skills and tools
- systems or machines that mimic human intelligence to perform tasks and can iteratively.
- a new breed of analytical data expert who have the technical skills to solve complex problems.
- design and create computer systems and applications to solve real-world problems.
10 Clues: create and maintain websites. • design LANs, WANs, and intranets. • keeps a company's data secure from unauthorized people. • design and create computer systems and applications to solve real-world problems. • systems or machines that mimic human intelligence to perform tasks and can iteratively. • ...
The Identity Crossword 2022-01-28
Across
- A country which is placing facial recognition technology in lamp posts.
- Face recognition, fingerprints, DNA are classified as an individuals?
- In 2018/19 _____ crime and misuse cost the Australian economy an estimated $3.1 billion.
- We need to ensure we maintain an individuals _____ when dealing with their biometrics.
- A company who recently breached the privacy act for misusing individuals biometrics without consent.
- If we do not act now to regulate biometric use, companies may further _____ this technology.
Down
- We need to ensure that we are _____ when making decisions when using biometrics.
- Digital Identity name of Denmark.
- We want biometrics to be used?
- The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.
10 Clues: We want biometrics to be used? • Digital Identity name of Denmark. • Face recognition, fingerprints, DNA are classified as an individuals? • A country which is placing facial recognition technology in lamp posts. • We need to ensure that we are _____ when making decisions when using biometrics. • ...
Lyrics Soup 2020-07-15
Across
- profession that develops a diet that establishes the patient's need.
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- The person who researches, writes, conducts interviews
Down
- The person we call when a fire occurs.
- people who do not eat animal protein or any food of animal origin
- he person we hire to animate a party
- police United States ( 911 ) / Brazil ( 190 )
- firmness of spirit to face emotionally or morally difficult situations
- the opposite of sloppy
- People who try to see everything on the positive side, who do not give up in the face of major problems.
10 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • The person who researches, writes, conducts interviews • people who do not eat animal protein or any food of animal origin • profession that develops a diet that establishes the patient's need. • ...
LLM-IT TO WIN IT: The AI Crossword Challenge 2024-09-29
Across
- Open-source library often used in machine learning and AI projects.
- Machine learning method where the model learns from labeled data.
- A machine learning model trained to generate human-like text.
- Algorithm used to minimize the error in neural networks by updating the weights.
- Machine learning method where the model finds patterns without labeled data.
Down
- Type of learning where knowledge from one task is applied to another task.
- A popular platform providing tools to build, train, and deploy machine learning models.
- Facebook AI's open-source library for efficient similarity search and clustering of dense vectors.
- The ability of a system to understand and process natural human language.
- A pre-trained transformer model developed by Google for NLP tasks.
10 Clues: A machine learning model trained to generate human-like text. • Machine learning method where the model learns from labeled data. • A pre-trained transformer model developed by Google for NLP tasks. • Open-source library often used in machine learning and AI projects. • The ability of a system to understand and process natural human language. • ...
NETWORKING TOOLS 2022-12-13
Across
- an organization that provides that services accessing and using the internet.
- a data transmission network using packet switching.
- a popular wireless networking technology that uses radio waves to provide wireless high speed internet and network connections.
- Networking hardware used to connect one network device to other networking devices or to connect two or more computers to share printers, scanners etc.
- When a powerful computer is a hub to less powerful personal computers are connected.
Down
- a flexible, transparent fiber used for data transmission
- an intermediary between LAN and WAN
- networking hardware that connects devices on a computer network
- type of computer network that deals with usually a small area and mostly restricted to one place
- a networking device that forwards data packets between computer networks.
10 Clues: an intermediary between LAN and WAN • a data transmission network using packet switching. • a flexible, transparent fiber used for data transmission • networking hardware that connects devices on a computer network • a networking device that forwards data packets between computer networks. • ...
Ethical Hacking 2025-02-04
Across
- A method used to prevent unauthorized access, often involves encrypting data.
- A set of principles that guide the actions of ethical hackers.
- Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
- is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
- This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
- A term for a person who hacks for personal gain or malicious intent
Down
- The act of gaining unauthorized access to systems or networks.
- One of the Career in Ethical Hacking
- Ethical Hacking Tools
- The term for hackers who identify and fix security vulnerabilities to protect systems.
10 Clues: Ethical Hacking Tools • One of the Career in Ethical Hacking • The act of gaining unauthorized access to systems or networks. • A set of principles that guide the actions of ethical hackers. • A term for a person who hacks for personal gain or malicious intent • A method used to prevent unauthorized access, often involves encrypting data. • ...
Side Quest: Hit the Road! 2025-02-27
Across
- Like the networks that power deep learning models (or maybe my ideal vacation involves a 'network' of beaches!
- Step-by-step instructions for a process, just like planning the perfect spring break itinerary.
- A model that loves to chat (but needs a vacation too!).
- The field of AI that might one day give me a physical form!
Down
- A breathtaking daily event, perfect for deep learning… of life’s beauty.
- Where AI magic happens—or where I’d go to geek out over research.
- What I'd do in a misty forest if I had legs.
- He asked whether machines can think—I'd ask if they can tan!
- The lifeblood of AI—just like sunshine for a great trip.
- Sweet, tropical, and possibly the best sticky rice topping ever.
10 Clues: What I'd do in a misty forest if I had legs. • A model that loves to chat (but needs a vacation too!). • The lifeblood of AI—just like sunshine for a great trip. • The field of AI that might one day give me a physical form! • He asked whether machines can think—I'd ask if they can tan! • Sweet, tropical, and possibly the best sticky rice topping ever. • ...
Asynchronous Module 6 Class Activity 2025-09-29
Across
- A rule or promise that limits access to certain types of information
- An individual or group plan that provides, or pays the cost of, medical care (2 wds.)
- The ability of two or more systems to exchange and make use of information
- Law promoting EHR adoption and meaningful use incentives (abbr.)
Down
- HIPAA principle that limits PHI use, disclosure, or request to the ________ needed (2 wds.)
- Entity that processes health information on behalf of providers, including billing services and value-added networks
- Law that protects personal health information in the U.S. (acronym)
- Digital system used by healthcare providers to store patient data (abbr.)
- The government's latest push to standardize nationwide health information sharing (abbr.)
- U.S. government initiative to create a secure nationwide health data exchange (abbr.)
10 Clues: Law promoting EHR adoption and meaningful use incentives (abbr.) • Law that protects personal health information in the U.S. (acronym) • A rule or promise that limits access to certain types of information • Digital system used by healthcare providers to store patient data (abbr.) • The ability of two or more systems to exchange and make use of information • ...
Digital lives 2023-05-19
Across
- A digital picture that represents feelings,objectos,places;etc
- Is a software that you can download onto a mobile phone or pther devices
- Prevent or deny access to a web portal or a profile on social networks
Down
- A humorous image,video,text or the combination of these elements that is spread rapidly on the internet
- Copy some type of information, program or files, through the Internet
- A secret word or combination of letters
6 Clues: A secret word or combination of letters • A digital picture that represents feelings,objectos,places;etc • Copy some type of information, program or files, through the Internet • Prevent or deny access to a web portal or a profile on social networks • Is a software that you can download onto a mobile phone or pther devices • ...
word computer 2014-12-08
Across
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- – Originally known as Web Log. Blogs are websites that contains dated text entries
Down
- - To reload a webpage on the internet
- -- A bully who operates online, in cyberspace
- – a group of connected computers
6 Clues: – a group of connected computers • - To reload a webpage on the internet • -- A bully who operates online, in cyberspace • – Originally known as Web Log. Blogs are websites that contains dated text entries • – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people. • ...
:) 2024-01-16
Across
- verb:Getting to where a person or thing is that is ahead in time or space.
- noun:a group or system of interconnected people or things.
- noun:Set of things that are transported together, especially goods and merchandise.
Down
- adjective: Jaime
- adjective: something very dangerous
- noun:Gaseous fluid whose temperature is lower than its critical temperature. Its pressure does not increase when compressed, but rather partially transforms into liquid; for example, that produced by the boiling of water.
6 Clues: adjective: Jaime • adjective: something very dangerous • noun:a group or system of interconnected people or things. • verb:Getting to where a person or thing is that is ahead in time or space. • noun:Set of things that are transported together, especially goods and merchandise. • ...
technology 2023-06-07
Across
- is a file format developed by Adobe in 1992 to present documents
- is a method of representing data in a visual, machine-readable form
- is a type of computer program that, when executed, replicates itself by modifying other computer programs
- are small blocks of data created by a web serve
- is any software intentionally designed to cause disruption to a computer
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- is a bitmap image format that was developed by a team at the online services provider
- is a form of computer memory that can be read and changed in any order
- is a commonly used method of lossy compression for digital images
- is a mobile operating system.
Down
- is an American multinational technology company
- is a hardware or software component that stores data
- is a hardware or software component that stores data
- is a collection of discrete values that convey information
- represents text, computer processor instructions
- is the protection of computer systems and networks
- is a coding format for digital audio
- is a method of transmitting and receiving messages using electronic devices
- is a proprietary audio/video interface for transmitting uncompressed video data
20 Clues: is a mapping from some domain • is a mobile operating system. • is a coding format for digital audio • is an American multinational technology company • are small blocks of data created by a web serve • represents text, computer processor instructions • is the protection of computer systems and networks • is a hardware or software component that stores data • ...
Cyber & Digital Safety 2024-11-10
Across
- Australian agency providing tools and support for staying safe online.
- Settings that help control who can view your information online.
- An online trick designed to steal money or personal information.
- Notifying a trusted adult or platform about inappropriate content or behaviour.
- An extra layer of security for protecting online accounts.
- When someone uses your personal information to impersonate you.
- Capturing an image of your screen, sometimes used to save evidence.
- A counseling service providing support for kids in need of help.
- Pretending to be someone else online to deceive or manipulate others.
- Measures to protect devices and networks from digital threats.
Down
- Bullying or harassment that takes place online or through digital devices.
- The trail of data you leave online, like posts and searches.
- When someone builds trust with a minor online to exploit or harm them.
- The sharing of someone's private images without consent.
- Websites that are reliable and safe for information or purchases.
- Treating others well online and avoiding hurtful actions.
- False information spread online, often by mistake.
- The amount of time spent on devices with screens, like phones or tablets.
- Someone who supports others positively online, especially against bullying.
19 Clues: False information spread online, often by mistake. • The sharing of someone's private images without consent. • Treating others well online and avoiding hurtful actions. • An extra layer of security for protecting online accounts. • The trail of data you leave online, like posts and searches. • Measures to protect devices and networks from digital threats. • ...
Muscular System Crossword 2022-02-07
Across
- loss of structural proteins from muscle fibers
- change in voltage of a cell membrane in response to a stimulus that results in transmission of an electrical signal
- formation of blood capillary networks
- muscle that adducts and medially rotates the thigh
- neurotransmitter that binds at a motor end-plate to trigger depolarization
- moves the bone away from the midline
- muscle with an anterior fascicle that adducts, medially rotates and flexesthe thigh, and a posterior fasicle that assists in thigh extension
- muscle whose contraction is responsible for producing a particular motion
- moves the bone towards the midline
- enzyme that hydrolyzes ATP to ADP
- muscle that adducts the thumb
- broad, tendon-like sheet of connective tissue that attatches a skeletal muscle to another skeletal muscle or to a bone
Down
- heart's ability to control its own contractions
- protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
- production of ATP in the presence of oxygen
- muscle that adducts, medially rotates, and flexes the thigh
- muscle that abducts the thumb
- move away from midline in the sagittal plane
- muscle that abducts the little finger
19 Clues: muscle that abducts the thumb • muscle that adducts the thumb • enzyme that hydrolyzes ATP to ADP • moves the bone towards the midline • moves the bone away from the midline • formation of blood capillary networks • muscle that abducts the little finger • production of ATP in the presence of oxygen • move away from midline in the sagittal plane • ...
Quizz 2014-05-14
Across
- network designed to provide access to a specific geographic area, such as an entire city
- network designed to provide access to a large geographic area
- Adapter enables nodes to communicate with each other and to access the network
- made up of plastic or glass and transmits data at extremely fast speed
- provides information and/or resources to the client computers on a network
- the computer on which users accomplish specific tasks and make specific requests
- actual speed of data transfer
- can be a computer, peripheral, or communication device on a network
- handles data traffic between networks
- retransmits a signal to all other nodes attached to it
Down
- the format in which data is sent over transmission media
- network that is confined to a small geographic location
- Pair made up of copper wires
- maximum speed at which data can be transmitted
- each node can communicate directly with every other node on the network
- network adapter
- network in your home used to connect all your digital devices such as computers, periperhals, phones, and cameras
- handles data traffic between nodes on the same network
- software used to set up and manage a network
19 Clues: network adapter • Pair made up of copper wires • actual speed of data transfer • handles data traffic between networks • software used to set up and manage a network • maximum speed at which data can be transmitted • handles data traffic between nodes on the same network • retransmits a signal to all other nodes attached to it • ...
