networks Crossword Puzzles

Media an Information Literacy 12 2025-08-27

Media an Information Literacy 12 crossword puzzle
Across
  1. A test used to evaluate sources based on currency, relevance, authority, accuracy, and purpose.
  2. The part of the communication process responsible for interpreting the message.
  3. The age of digital technology where people rely on smartphones and the internet.
  4. The era where people used smoke signals, cave paintings, and oral traditions for communication.
  5. The device invented by Alexander Graham Bell that enabled voice communication.
  6. The criterion in the CRAAP Test that asks if the source is up-to-date.
Down
  1. The first widespread broadcast medium in the 1900s.
  2. The process of turning a message into symbols or words for transmission.
  3. The global system of interconnected computer networks. tools like Facebook, Instagram, and TikTok.
  4. press The invention that revolutionized mass communication in the Industrial Age.

10 Clues: The first widespread broadcast medium in the 1900s.The criterion in the CRAAP Test that asks if the source is up-to-date.The process of turning a message into symbols or words for transmission.The device invented by Alexander Graham Bell that enabled voice communication.The part of the communication process responsible for interpreting the message....

IoT Crossword 2020-03-16

IoT Crossword crossword puzzle
Across
  1. How many times loop function runs in Arduino IDE
  2. protocol is a machine to machine and Internet of thing connectivity protocol.
  3. The first publicly used version of the Internet Protocol
  4. means to associate something with locations in physical space.
  5. standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
Down
  1. How many number of digital IO pins are there in arduino nano
  2. The communications protocol that promises to connect every device on the Internet
  3. twin phrase used to describe a computerized (or digital) version of a physical asset and/or process.
  4. layer is called a port layer in OSI model
  5. A universal unique electronic identifier used to identity for every physical object

10 Clues: layer is called a port layer in OSI modelHow many times loop function runs in Arduino IDEThe first publicly used version of the Internet ProtocolHow many number of digital IO pins are there in arduino nanomeans to associate something with locations in physical space.protocol is a machine to machine and Internet of thing connectivity protocol....

Media and Information Literacy 2025-07-30

Media and Information Literacy crossword puzzle
Across
  1. Plural form of medium
  2. an interconnected network of networks
  3. refers to how a media text is produced together
  4. This type of media is meant for an audience who prefers to get information by reading
  5. This kind of media is usually made in large sizes and is usually seen along highways.
Down
  1. Literature and arts belong to this type of media.
  2. physical structure that houses reading, viewing, and listening materials
  3. local knowledge developed over centuries of experimentation and are passed orally from generation to generation.
  4. These are also highly specialized materials meant for the players and specialists of a specific industry.
  5. These are well-researched articles found mostly in academic journals and published for the specialists of a specific field

10 Clues: Plural form of mediuman interconnected network of networksrefers to how a media text is produced togetherLiterature and arts belong to this type of media.physical structure that houses reading, viewing, and listening materialsThis type of media is meant for an audience who prefers to get information by reading...

Asynchronous Module 6 Class Activity 2025-09-29

Asynchronous Module 6 Class Activity crossword puzzle
Across
  1. A rule or promise that limits access to certain types of information
  2. An individual or group plan that provides, or pays the cost of, medical care (2 wds.)
  3. The ability of two or more systems to exchange and make use of information
  4. Law promoting EHR adoption and meaningful use incentives (abbr.)
Down
  1. HIPAA principle that limits PHI use, disclosure, or request to the ________ needed (2 wds.)
  2. Entity that processes health information on behalf of providers, including billing services and value-added networks
  3. Law that protects personal health information in the U.S. (acronym)
  4. Digital system used by healthcare providers to store patient data (abbr.)
  5. The government's latest push to standardize nationwide health information sharing (abbr.)
  6. U.S. government initiative to create a secure nationwide health data exchange (abbr.)

10 Clues: Law promoting EHR adoption and meaningful use incentives (abbr.)Law that protects personal health information in the U.S. (acronym)A rule or promise that limits access to certain types of informationDigital system used by healthcare providers to store patient data (abbr.)The ability of two or more systems to exchange and make use of information...

Cybercrime Crossword Puzzle 2021-07-13

Cybercrime Crossword Puzzle crossword puzzle
Across
  1. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  2. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  3. is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
  4. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  5. is an electronic data storage device used for storing digital information typically using flash memory.
  6. includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
  7. a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
  8. is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
  9. when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
  10. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  11. a string of characters that allows access to a computer system or service.
  12. Intentional alteration or reckless interference with the functioning of a computer or computer network.
  13. It is offense against the confidentiality integrity and availability of computer data and systems.
  14. It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
  15. Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
  16. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  17. is a data storage device that includes flash memory with an integrated USB interface.
  18. Intentional or reckless alteration damaging deletion of computer data.
  19. what comes after terabyte
  20. is a concept describing a widespread interconnected digital technology.
  21. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
  22. Interception made by technical means without right.
Down
  1. It is when an individual or entity discloses to third party personal information.
  2. is a hacker who violates computer security for their own personal profit or out of malice.
  3. is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
  4. is data that describes other data.
  5. protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
  6. what comes after zettabyte.
  7. is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
  8. protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
  9. the process of converting encrypted information back into normal, understandable text.
  10. sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
  11. Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
  12. It is when an individual or entity with malice or in bad faith.
  13. Generally used to refer to someone who gains access to a system, software, or hardware without permission
  14. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
  15. is pornography that exploits children for sexual stimulation
  16. is a form of bullying or harassment using electronic means.
  17. is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
  18. measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
  19. information of an individual in any container for trash collection.
  20. is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
  21. 10175 An act defining cybercrime providing for the prevention.
  22. is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
  23. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
  24. refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
  25. global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  26. Access to the whole or any part of a computer system without right.
  27. Malicious software, such as a virus or a worm, that attacks a target computer.
  28. an application that allows the sending of messages between computer users via a network.

50 Clues: what comes after terabytewhat comes after zettabyte.is data that describes other data.Interception made by technical means without right.is a form of bullying or harassment using electronic means.is pornography that exploits children for sexual stimulation10175 An act defining cybercrime providing for the prevention....

Chapter 9: Wireless Networking Terminology 2023-04-21

Chapter 9: Wireless Networking Terminology crossword puzzle
Across
  1. Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
  2. The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.
  3. A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
  4. A station is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC. A station is often abbreviated as STA.
  5. A wireless topology that connects to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
  6. An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
  7. A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
  8. A signal passes through objects and the signal loses power.
  9. The name of the wireless network. Client devices see a list of available networks when trying to connect to a wireless network.
  10. The ability of devices to connect from one access point to another while maintaining connection to the same network. For example, a laptop moved from one building to another stays connected to the same network.
  11. Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
  12. The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
  13. An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
  14. A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
  15. Encryption that implements a key-mixing feature that only the receiver can unlock.
  16. The point at which bandwidth utilization for the device is close to 100%.
  17. A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
  18. An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
  19. Devices on the network are not broadcasting on the same frequency.
  20. An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.
Down
  1. A wireless topology that moves some of the network intelligence from the controller to the individual APs. Newer wireless networks can be deployed using a distributed wireless mesh architecture.
  2. The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.
  3. An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use a deauthentication attack to stage evil twin or on-path attacks.
  4. A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
  5. The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keyboards.
  6. Any unauthorized access point added to a network.
  7. The interception and decoding of wireless transmissions. It is also known as eavesdropping.
  8. Signal interference created intentionally by an attacker to make a wireless network impossible to use.
  9. An IBSS is a set of stations (STAs) configured in ad hoc mode.
  10. Access points that separate wireless networks by using independent configuration. Each AP stands alone.
  11. The LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.
  12. The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
  13. An authentication method that requires clients to provide a MAC address to connect to the wireless network.
  14. An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
  15. An AP is the device that coordinates all communications between wireless devices, as well as the connection to the wired network. An AP is sometimes called a wireless AP (WAP).
  16. These are used to connect wired or wireless networks.
  17. A BSS is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. A BSS is also called a cell.
  18. A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.

38 Clues: Any unauthorized access point added to a network.These are used to connect wired or wireless networks.A signal passes through objects and the signal loses power.An IBSS is a set of stations (STAs) configured in ad hoc mode.Devices on the network are not broadcasting on the same frequency....

Troubleshooting IT Networks 2018-01-24

Troubleshooting IT Networks crossword puzzle
Across
  1. This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host.
  2. This utility can be used to lookup the specific IP address associated with a domain name.
Down
  1. It is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interfaces.
  2. This utility is used in windows to find out the specific IP configuration of the variously affected hosts.

4 Clues: This utility can be used to lookup the specific IP address associated with a domain name.This utility is used in windows to find out the specific IP configuration of the variously affected hosts.This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host....

Data Transmission 2022-07-13

Data Transmission crossword puzzle
Across
  1. networks
  2. the actual data being carried in a data packet
  3. stages in a network that can receive and transmit data packets; routers are nodes in
Down
  1. all the data packets are reassembled to form the original message/data (2 word)
  2. a small part of a message/data that is transmitted over a network; after

5 Clues: networksthe actual data being carried in a data packeta small part of a message/data that is transmitted over a network; afterall the data packets are reassembled to form the original message/data (2 word)stages in a network that can receive and transmit data packets; routers are nodes in

Hardware of the Internet 2022-10-03

Hardware of the Internet crossword puzzle
Across
  1. A computer that stores software and a website's component files
  2. Used to network multiple computers together
Down
  1. A hardware component that allows a computer or another device to connect to the Internet
  2. A filter that only allows trusted data to flow through it
  3. A hardware device that directs traffic between networks and devices

5 Clues: Used to network multiple computers togetherA filter that only allows trusted data to flow through itA computer that stores software and a website's component filesA hardware device that directs traffic between networks and devicesA hardware component that allows a computer or another device to connect to the Internet

Software 2014-03-04

Software crossword puzzle
Across
  1. Programs and applications that can be run on a computer system
  2. The most important program that runs on a computer.
  3. A program that performs a very specific task, usually related to managing system resources.
  4. Is the creation of documents using page layout skills on a personal computer.
Down
  1. Used to store patients details
  2. A piece of computer software intended to prevent unauthorized access to system software or data
  3. Designed to duplicate important data in the event of a hard drive failure, user error, disaster or accident.
  4. That is designed to help set up, manage, and/or monitor computer networks.

8 Clues: Used to store patients detailsThe most important program that runs on a computer.Programs and applications that can be run on a computer systemThat is designed to help set up, manage, and/or monitor computer networks.Is the creation of documents using page layout skills on a personal computer....

Cyber Security Scavenger Hunt 2014-10-28

Cyber Security Scavenger Hunt crossword puzzle
Across
  1. Decrypt me: 00000000 43 4e 4f 4
  2. This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
  3. Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
  4. SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
  5. Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
  1. These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
  2. The unofficial mascot of this shop is the Pink Unicorn.
  3. Decrypt me: VEFPDQo=

8 Clues: Decrypt me: VEFPDQo=Decrypt me: 00000000 43 4e 4f 4The unofficial mascot of this shop is the Pink Unicorn.Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.Gives us access to the building, most are blue, but ours are DEFCON 2.SIGDEVERs that focus on discovery and documentation of foreign communications & networks....

CDC Monthly -Types of malware attacks 2018-11-12

CDC Monthly -Types of malware attacks crossword puzzle
Across
  1. Disguises itself as a normal file or program to trick users into installing malware.
  2. Functions by spying in a users activity without their knowledge.
  3. Form of malware that denies access to the users files on the hard drive until money/bit-coin is transferred.
Down
  1. Has the ability to self-replicate and spread to other computers.
  2. Collections of computers that have malicious software downloaded that allows them to be used for DDoS attacks
  3. Short for malicious software
  4. Type of malware that automatically delivers advertisements
  5. Most common type of malware that spreads over computer networks by exploiting vulnerabilities.

8 Clues: Short for malicious softwareType of malware that automatically delivers advertisementsHas the ability to self-replicate and spread to other computers.Functions by spying in a users activity without their knowledge.Disguises itself as a normal file or program to trick users into installing malware....

Equal Opportunity and Diversity Management 2018-11-29

Equal Opportunity and Diversity Management crossword puzzle
Across
  1. Voluntary organizational program designed to create greater inclusion of all individuals into informal social networks and formal company programs
  2. Benefit to a business of Diversity Management
  3. The variation of social and cultural identities
Down
  1. The unjust or prejudicial treatment of different categories of people
  2. 2010 Act which legally protects people from discrimination
  3. One of the 6 key aspects of diversity, usually measured against pay gaps
  4. In equal opportunity, people are judged on their ______ rather than their social group membership
  5. The policy of giving everyone the same opportunities for employment, pay, and promotion, without discriminating against particular groups

8 Clues: Benefit to a business of Diversity ManagementThe variation of social and cultural identities2010 Act which legally protects people from discriminationThe unjust or prejudicial treatment of different categories of peopleOne of the 6 key aspects of diversity, usually measured against pay gaps...

Exploring AI 2024-01-29

Exploring AI crossword puzzle
Across
  1. A technique used to split a dataset into training and testing sets for model evaluation.
  2. The process of preparing and cleaning data for machine learning.
  3. A type of algorithm that learns by finding patterns in unlabeled data.
  4. A subset of machine learning that focuses on neural networks.
Down
  1. A popular algorithm used for classification in machine learning.
  2. A popular programming language for machine learning and data analysis.
  3. The field of study that focuses on giving computers the ability to learn without being explicitly programmed.
  4. A type of learning where a model is trained on a labeled dataset.

8 Clues: A subset of machine learning that focuses on neural networks.A popular algorithm used for classification in machine learning.The process of preparing and cleaning data for machine learning.A type of learning where a model is trained on a labeled dataset.A popular programming language for machine learning and data analysis....

Core Concepts in AI 2025-04-01

Core Concepts in AI crossword puzzle
Across
  1. The process where computers improve automatically by learning from data
  2. A type of learning where AI is trained on labeled data
Down
  1. A more advanced form of machine learning using neural networks
  2. A type of learning where AI finds patterns in data without labels
  3. The AI system that makes predictions after training

5 Clues: The AI system that makes predictions after trainingA type of learning where AI is trained on labeled dataA more advanced form of machine learning using neural networksA type of learning where AI finds patterns in data without labelsThe process where computers improve automatically by learning from data

HSIE Crossword 2013-02-20

HSIE Crossword crossword puzzle
Across
  1. Supreme and independent power or authority in government as possessed or claimed by a state or community.
  2. To convey in standardised containers.
  3. An act or instance of combining into an integral whole.
Down
  1. The __________ of money or capital in order to gain profitable returns, as interest, income or appreciation in value
  2. A particular form or stage of civilisation, as that of a certain nation or period.
  3. A privelage of a public nature conferred on an individual, group or company by a government.
  4. The act of globalizing, or extending to other of all parts of the world.
  5. The process or act of migrating.
  6. A device to be launched into orbit around the Earth, another planet, Sun etc.
  7. A vast computer network linking smaller computer networks worldwide.

10 Clues: The process or act of migrating.To convey in standardised containers.An act or instance of combining into an integral whole.A vast computer network linking smaller computer networks worldwide.The act of globalizing, or extending to other of all parts of the world.A device to be launched into orbit around the Earth, another planet, Sun etc....

PRETTY GIRLS: Technology 2018-05-26

PRETTY GIRLS: Technology crossword puzzle
Across
  1. There is a … Club in our school for students who are interested in technology.
  2. If you want to throw a disco party, you must have the right music ...
  3. You use this to write information on your computer.
  4. Facebook and Instagram are social …
Down
  1. Some students use this kind of computer to study.
  2. It can be an animal but you can also use it to do things on your computer.
  3. It is where you see things when you work on your computer.
  4. It is a thing that you use to send text messages, phone someone, play games and install some apps.
  5. We need this connection if we want to surf the Internet.
  6. You can programme a … to work in a factory.

10 Clues: Facebook and Instagram are social …You can programme a … to work in a factory.Some students use this kind of computer to study.You use this to write information on your computer.We need this connection if we want to surf the Internet.It is where you see things when you work on your computer....

school work 2017-08-07

school work crossword puzzle
Across
  1. obtain the temporary use of (something) for an agreed payment.
  2. (someone or something) so as to prevent them from continuing to a destination
  3. the condensed moisture of the atmosphere falling visibly in separate drops
  4. the strength and vitality required for sustained physical or mental activity
  5. act in such a way as to have an effect on each other
  6. a long, narrow strap attached at one end to a horse's bit, typically used in pairs to guide or check a horse in riding or driving
Down
  1. the faculty by which the mind stores and remembers information
  2. not silently or in a whisper
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  4. adjective of high

10 Clues: adjective of highnot silently or in a whisperact in such a way as to have an effect on each otherthe faculty by which the mind stores and remembers informationobtain the temporary use of (something) for an agreed payment.the condensed moisture of the atmosphere falling visibly in separate drops...

Artificial Intelligence 2023-11-19

Artificial Intelligence crossword puzzle
Across
  1. To set in motion; make active or more active.
  2. A computer program designed to simulate conversation with human users, especially over the Internet.
  3. The use of technology to perform tasks without human intervention.
  4. The systematic process of assessment and planning employed to prevent a developmental problem.
  5. Not functioning in a previously intended way
  6. Capable of operating independently without human control.
Down
  1. The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
  2. An expert at programming and solving problems with a computer
  3. The design, construction, and operation of robots to perform tasks in the real world.
  4. A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.

10 Clues: Not functioning in a previously intended wayTo set in motion; make active or more active.Capable of operating independently without human control.An expert at programming and solving problems with a computerThe use of technology to perform tasks without human intervention....

AI 2023-07-12

AI crossword puzzle
Across
  1. An AI approach that involves training a system through a reward-based feedback loop
  2. A computer system modeled after the human brain's interconnected neurons
  3. A subset of machine learning that focuses on artificial neural networks with multiple layers
  4. An AI field that enables computers to interpret and analyze visual information
  5. AI algorithms that identify and classify patterns in data
Down
  1. An AI technique that enables computers to learn and improve from experience without explicit programming
  2. AI systems that simulate human intelligence, including perception, reasoning, and learning
  3. AI technology that enables computers to understand and interpret human language
  4. The process of discovering patterns and relationships in large datasets using AI techniques
  5. AI software that emulates the decision-making abilities of a human expert in a particular domain

10 Clues: AI algorithms that identify and classify patterns in dataA computer system modeled after the human brain's interconnected neuronsAn AI field that enables computers to interpret and analyze visual informationAI technology that enables computers to understand and interpret human language...

Information Management 2023-02-21

Information Management crossword puzzle
Across
  1. Information ___________ - software applications, computer hardware and networks used to create Information Systems.
  2. A ___________ process system is an information processing system for business deals involving the collection, modification and retrieval.
  3. ___________ is the type of knowledge which people accumulate in their mind.
  4. This is more technical part involving setting up and integrating information systems and creating the right environment for using information
  5. It is taken from information and data substantiated by skills and experience.
Down
  1. processed and arranged in a meaningful form.
  2. type of knowledge which can be codified and stored.
  3. Information _____ is a process by which organizations can spot and categorize knowledge assets within their organization.
  4. Information _____ – computerized or manual one for capturing data and transform it into information –knowledge
  5. unprocessed stream of facts.

10 Clues: unprocessed stream of facts.processed and arranged in a meaningful form.type of knowledge which can be codified and stored.___________ is the type of knowledge which people accumulate in their mind.It is taken from information and data substantiated by skills and experience....

Risk Management Key Terms 2023-03-06

Risk Management Key Terms crossword puzzle
Across
  1. A document used to track the collection, handling, and transfer of evidence.
  2. everything that a business needs but a computer.
  3. The process of downgrading—undoing—a recently applied patch or updated.
  4. a Popular and extremely comprehensive testing tool.
  5. is the science of gathering, preserving, and presenting evidence stored on a computer or any form of digital media presentable in a court of law.
Down
  1. A backup facility to continue business operations
  2. Documents that set out how to limit damage andrecover quickly from an incident.
  3. A set of documents that Define procedures for changes to the network.
  4. A set of procedures defining actions employees should perform to protect the network’s security.
  5. An open source tool for penetration testing many aspects of wirless networks

10 Clues: everything that a business needs but a computer.A backup facility to continue business operationsa Popular and extremely comprehensive testing tool.A set of documents that Define procedures for changes to the network.The process of downgrading—undoing—a recently applied patch or updated....

Crosswords - Gadgets 2022-05-12

Crosswords - Gadgets crossword puzzle
Across
  1. A device that performs arithmetic operations on numbers.
  2. A small wireless earphone inserted into the ear.
  3. A wearable computing device that closely resembles a wristwatch or other time-keeping device.
  4. A small, usually hand-held, electronic device for controlling another device, such as a television, radio or audio/video recording device.
  5. An optical instrument made for the observation of remote objects.
Down
  1. an output hardware device that connects to a computer to generate sound.
  2. A handheld electronic device that provides a connection to a cellular network.
  3. An electronic device that outputs a video signal or visual image to display a video game.
  4. a networking device that forwards data packets between computer networks.
  5. a computer that is portable and suitable for use while travelling.

10 Clues: A small wireless earphone inserted into the ear.A device that performs arithmetic operations on numbers.An optical instrument made for the observation of remote objects.a computer that is portable and suitable for use while travelling.an output hardware device that connects to a computer to generate sound....

Ylan 2024-11-14

Ylan crossword puzzle
Across
  1. A secret part of the internet, often used for anonymous activities.
  2. A company that makes equipment and software to help connect and protect computer networks.
  3. Open-source operating system based on a kernel created by Linus Torvalds.
  4. A protocol that ensures reliable and ordered data transmission over a network.
  5. A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
  6. A protocol for connecting to a remote computer without encryption.
Down
  1. Raising awareness is the act of drawing attention to a previously overlooked topic.
  2. A test used to verify if a user is human and not a robot.
  3. Software that secretly gathers information about a user without their consent.
  4. Usurpation d'identité pour masquer une communication malveillante.

10 Clues: A test used to verify if a user is human and not a robot.Usurpation d'identité pour masquer une communication malveillante.A protocol for connecting to a remote computer without encryption.A secret part of the internet, often used for anonymous activities.Open-source operating system based on a kernel created by Linus Torvalds....

Concepts Related to ICT 2024-09-28

Concepts Related to ICT crossword puzzle
Across
  1. The process of writing instructions that tell a computer what to do.
  2. A global network of computer networks that allows users to communicate and access information.
  3. Books that are read electronically.
  4. The ability to effectively use digital technology and communicate information through digital channels.
  5. The practice of protecting oneself online, including avoiding scams, protecting personal information, and being aware of potential risks.
Down
  1. The process of connecting computers and other devices to share resources and communicate.
  2. The process of finding and accessing information on the internet.
  3. Computer programs and data that run on a computer system.
  4. The creation and distribution of audio or video content in a series of episodes.
  5. The act of writing code using a specific programming language.

10 Clues: Books that are read electronically.Computer programs and data that run on a computer system.The act of writing code using a specific programming language.The process of finding and accessing information on the internet.The process of writing instructions that tell a computer what to do....

Financial Terms Crossword 2024-10-26

Financial Terms Crossword crossword puzzle
Across
  1. The critical pipeline system for the movement of capital in global markets.
  2. The price of one type of money in terms of another, often quoted against the dollar.
  3. The process of converting one currency into another.
  4. The state where the quantity demanded equals the quantity supplied.
Down
  1. Debt securities issued by governments, such as U.S. Treasury Bonds.
  2. Taxes imposed on imported goods to protect domestic industries.
  3. The widely quoted interest rate used for pricing in the interbank market.
  4. Interbank networks that use currency to ensure efficient market operations.
  5. Domestic currencies of one country deposited in a second country, often used for holding excess corporate liquidity.
  6. Central banks, commercial banks, and investment banks that maintain the stability of the global financial system.

10 Clues: The process of converting one currency into another.Taxes imposed on imported goods to protect domestic industries.Debt securities issued by governments, such as U.S. Treasury Bonds.The state where the quantity demanded equals the quantity supplied.The widely quoted interest rate used for pricing in the interbank market....

Turing Test Trivia 2025-04-07

Turing Test Trivia crossword puzzle
Across
  1. An issue in AI where models develop unfair or incorrect assumptions based on training data.
  2. A test designed to measure a machine’s ability to exhibit intelligent behavior.
  3. A set of rules or steps used to solve AI-related problems.
  4. Large volumes of structured and unstructured data used to train AI models.
Down
  1. The process of training computers to learn from data without explicit programming.
  2. The AI field that enables machines to interpret and analyze images.
  3. A machine learning model inspired by the structure of the human brain.
  4. A type of learning where the model is trained with labelled data.
  5. An AI program that interacts with users through text or voice.
  6. A subset of AI that involves multiple layers of neural networks.

10 Clues: A set of rules or steps used to solve AI-related problems.An AI program that interacts with users through text or voice.A subset of AI that involves multiple layers of neural networks.A type of learning where the model is trained with labelled data.The AI field that enables machines to interpret and analyze images....

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person.
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a person.Without permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

COMPUTER SCIENCE 03 2022-07-06

COMPUTER SCIENCE 03 crossword puzzle
Across
  1. A networking device that forwards data packets between computer networks.
  2. Any auxiliary or ancillary device connected to or integrated within a computer system
  3. a value in memory referenced by an identifier.
  4. Computer data storage
Down
  1. An efficient sorting algorithm which serves as a systematic method for placing the elements of a random access file or an array in order.
  2. Is an object in many programming languages that stores a memory address.
  3. a sequence of program instructions that performs a specific task, packaged as a unit.
  4. Is a logic programming language associated with artificial intelligence and computational linguistics
  5. Is a sequence of data elements made available over time.
  6. A hardware device that converts data into a format suitable for a transmission medium

10 Clues: Computer data storagea value in memory referenced by an identifier.Is a sequence of data elements made available over time.Is an object in many programming languages that stores a memory address.A networking device that forwards data packets between computer networks....

Year 7 Digital Technologies 2025-11-16

Year 7 Digital Technologies crossword puzzle
Across
  1. A group of connected computers that can share information and resources.
  2. The global system of connected networks that allows people to access websites and information.
  3. A word for harmful software designed to damage or disrupt computers.
  4. A tool used to find information on the internet by typing questions or keywords.
  5. A secret combination of letters, numbers, or symbols used to protect accounts.
Down
  1. A device that connects your home to the internet and directs data between devices.
  2. Messages sent electronically from one person to another over the internet.
  3. A wireless way to connect devices to the internet without using cables.
  4. A series of webpages that you visit using a browser.
  5. Electronic machines that can store, process, and display information.

10 Clues: A series of webpages that you visit using a browser.A word for harmful software designed to damage or disrupt computers.Electronic machines that can store, process, and display information.A wireless way to connect devices to the internet without using cables.A group of connected computers that can share information and resources....

AvocadoDAO x Token2049: Crack the Code! 2024-09-03

AvocadoDAO x Token2049: Crack the Code! crossword puzzle
Across
  1. The ability of different blockchain networks to communicate and interact.
Down
  1. A premier blockchain conference held annually.
  2. A term used to describe an individual or entity that holds a large amount of cryptocurrency.
  3. An essential activity at blockchain conferences to build connections.
  4. The iconic venue in Singapore where Token 2049 is held.

5 Clues: A premier blockchain conference held annually.The iconic venue in Singapore where Token 2049 is held.An essential activity at blockchain conferences to build connections.The ability of different blockchain networks to communicate and interact.A term used to describe an individual or entity that holds a large amount of cryptocurrency.

Blogging and social media 2024-07-29

Blogging and social media crossword puzzle
Across
  1. means of interaction among people in which they create, share and exchange information and ideas in virtual communities and networks
  2. The biggest ethical rule to obey when blogging
Down
  1. written remark expressing an opinion or reaction
  2. #1 social media app in the world
  3. process that implies creating articles, photos, and other forms of content

5 Clues: #1 social media app in the worldThe biggest ethical rule to obey when bloggingwritten remark expressing an opinion or reactionprocess that implies creating articles, photos, and other forms of contentmeans of interaction among people in which they create, share and exchange information and ideas in virtual communities and networks

Mesh Networking 2020-05-22

Mesh Networking crossword puzzle
Across
  1. Extender, Alternative to a mesh network, typically creating 2 WiFi networks in order to improve range of connectivity - can also cut WiFi speeds up to 50%.
  2. Points in a network, synonym of "access point".
  3. Link Up (Computers).
  4. Device received from your ISP that converts coaxial cable signal or fibre-optic signal to ethernet. Virtually all modems from most ISPs also have routers integrated into them.
Down
  1. The access code to allow connection to a network.
  2. Alternative to Ethernet connection, wireless.
  3. Reachability of a network, synonym of "range".
  4. Device that connects to the modem to provide wireless internet connection

8 Clues: Link Up (Computers).Alternative to Ethernet connection, wireless.Reachability of a network, synonym of "range".Points in a network, synonym of "access point".The access code to allow connection to a network.Device that connects to the modem to provide wireless internet connection...

Social-Ecological Model 2021-11-03

Social-Ecological Model crossword puzzle
Across
  1. construct that provides social identity, social support, and role definition: Family, Friends, Peer,
  2. this model is made up of different _
  3. the model that has the framework for determinants of a health outcome at multiple levels.
  4. construct that has rules, regulations, policies, and informal structures, which may hinder or promote desired behaviors
Down
  1. Construct that deals with social networks and norms, that exist formally or informally, among individuals, groups, and organizations
  2. construct that deals with one's knowledge, attitudes, beliefs, and perceptions
  3. what was article second about
  4. level explains a behavior as the result of the effect of internal and external factors on each other.

8 Clues: what was article second aboutthis model is made up of different _construct that deals with one's knowledge, attitudes, beliefs, and perceptionsthe model that has the framework for determinants of a health outcome at multiple levels.construct that provides social identity, social support, and role definition: Family, Friends, Peer,...

Vocab Terms 1/3 2023-09-19

Vocab Terms 1/3 crossword puzzle
Across
  1. sends the cursor to the beginning of the next line or executes a command or operation
  2. a computer program that can capture, display and manipulate data arranged in rows and columns
  3. a worldwide system of computer networks
Down
  1. a display unit of information equivalent to one alphabetic letter or symbol
  2. a sequence or set of instructions in a programming language for a computer to execute
  3. a computer file containing information input by a computer user and usually created with an application
  4. a hypertext document on the World Wide Web
  5. a clickable area at the top of a window that shows another page or area

8 Clues: a worldwide system of computer networksa hypertext document on the World Wide Weba clickable area at the top of a window that shows another page or areaa display unit of information equivalent to one alphabetic letter or symbola sequence or set of instructions in a programming language for a computer to execute...

Community Outreach Crossword # 1 2023-10-19

Community Outreach Crossword # 1 crossword puzzle
Across
  1. Sessions or classes where practical skills and knowledge are shared.
  2. Utilizing the internet and social media platforms to share information.
  3. Printed material containing information, tips, and guidelines, to educate the public.
  4. Online networks, such as Facebook and Instagram, used to reach a wide audience.
  5. Events where people can adopt pets, participate in activities, and contribute to fundraising efforts for animal welfare.
Down
  1. news Early television broadcasts providing information, interviews, and updates.
  2. events Unique and significant occasions organized to raise awareness and engage the community.
  3. Media channels, including newspapers and TV, used to disseminate information about animals, events, and initiatives.

8 Clues: Sessions or classes where practical skills and knowledge are shared.Utilizing the internet and social media platforms to share information.Online networks, such as Facebook and Instagram, used to reach a wide audience.news Early television broadcasts providing information, interviews, and updates....

Cybersecurity 1 2024-05-07

Cybersecurity 1 crossword puzzle
Across
  1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  2. A weakness or flaw in a system that can be exploited by attackers.
  3. The process of converting data into a code to prevent unauthorized access.
Down
  1. The process of verifying the identity of a user or system.
  2. A barrier that monitors and controls incoming and outgoing network traffic.
  3. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  4. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
  5. A secret combination of characters used to authenticate users and protect accounts.

8 Clues: The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.The process of converting data into a code to prevent unauthorized access.A barrier that monitors and controls incoming and outgoing network traffic....

Sprinto Crossword 2024-10-23

Sprinto Crossword crossword puzzle
Across
  1. Ensuring that data remains accurate, consistent, and unaltered during storage and transmission.
  2. European Union regulation governing data protection and privacy.
  3. A weakness in a system that can be exploited to compromise security.
  4. The process of converting plaintext into ciphertext to prevent unauthorized access
Down
  1. A network security device that monitors and filters incoming and outgoing traffic based on predetermined security rules.
  2. Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  3. Unauthorized access to data, systems, or networks resulting in information disclosure.
  4. Report framework used to evaluate and communicate the controls at a service organization, relevant to security and privacy.

8 Clues: European Union regulation governing data protection and privacy.A weakness in a system that can be exploited to compromise security.The process of converting plaintext into ciphertext to prevent unauthorized accessUnauthorized access to data, systems, or networks resulting in information disclosure....

Acronyms connected with computer networks 2016-12-06

Acronyms connected with computer networks crossword puzzle
Across
  1. Wi-Fi Protected Access
  2. ECN
Down
  1. The Transmission Control Protocol
  2. – Asymmetric digital subscriber line
  3. A local area network
  4. A network access control list
  5. A wide area network

7 Clues: ECNA wide area networkA local area networkWi-Fi Protected AccessA network access control listThe Transmission Control Protocol– Asymmetric digital subscriber line

Network Topology 2020-06-22

Network Topology crossword puzzle
Across
  1. access points, Device that allow wireless laptops and mobile phones to connect to a network
  2. A topology that combines wired and wireless together in a network
  3. If there is a failure in the _____ device in Star network, the whole network will get affected
  4. area networks, Mesh topology is mainly used in _______
  5. In Star topology, it is fairly easy to add and _______ nodes
  6. One device is connected to every other devices in the network
  7. Need a central device to connect all nodes together
  8. Usually use as central cable in Bus topology
  9. Can be used as a central device in Star network
  10. Another advantage of Mesh topology
Down
  1. Data transmission in ring network operates in _______ way
  2. Bus topology require the central cable to be ______ at both ends
  3. Used in Ring topology to control the transmission
  4. One or more connection fails, the computer will still be able to communicate
  5. Devices in a network are connected to a single backbone cable
  6. Topology with no collision
  7. Shared medium that is used to connect devices together in Bus network
  8. hoc, Quick setup wireless network that does not rely to any infrastructure
  9. Bandwidth, Advantage of Mesh topology

19 Clues: Topology with no collisionAnother advantage of Mesh topologyBandwidth, Advantage of Mesh topologyUsually use as central cable in Bus topologyCan be used as a central device in Star networkUsed in Ring topology to control the transmissionNeed a central device to connect all nodes togetherarea networks, Mesh topology is mainly used in _______...

Web Design Vocab Crossword 2021-01-29

Web Design Vocab Crossword crossword puzzle
Across
  1. the way a page is built up
  2. created to replace the graphics interchange format
  3. where buyer can use the image only under the rules of the seller
  4. images sold and used on the internet
  5. images created using mathematical formulas
  6. used for storing raster graphics images
  7. creating illusion of color depth with limited colors on a table
  8. art or skill of combining text and images used for advertisement
  9. can include animation in image
  10. number of pixels in an image or display
  11. reduces file size without changing the appearance of the file
Down
  1. also known as open source images
  2. images that usually require a royalty fee; however, you don't have to renew
  3. photos used for only certain reasons
  4. tiny dots that make up your screen
  5. color table that allows you to pick an exact color with a code
  6. each bit works together and corresponds to make things happen
  7. image that uses only rectangles to make up the picture
  8. number of dots it takes to make up a pixel

19 Clues: the way a page is built upcan include animation in imagealso known as open source imagestiny dots that make up your screenphotos used for only certain reasonsimages sold and used on the internetused for storing raster graphics imagesnumber of pixels in an image or displayimages created using mathematical formulas...

STEM Careers 2023-05-12

STEM Careers crossword puzzle
Across
  1. helps prevent, diagnose, and treat heath problems in animals
  2. engineer who designs and tests electrical equipment
  3. engineer who designs and builds tools and systems that provide us with clean water
  4. studies the atmosphere and how it affects the rest of the environment
  5. engineer who helps plan transportation systems like railways or traffic patterns
  6. engineer who makes tech for aircraft, defense systems, and space exploration
  7. studies behaviors and habitats of wild animals
  8. helps people ensure they are eating the right diet
Down
  1. engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
  2. safeguards a company's computer systems and networks
  3. studies how living things inherit traits through genes
  4. engineer who Involved in production of energy through natural resources
  5. studies physical properties of Earth
  6. treats injury and illness, checks symptoms and provides solutions
  7. keeps and inspect financial records for their employers
  8. studies water and the water cycle to predict drought or prevent pollution
  9. engineer who uses science of light to create tools such as lasers and fiber optics
  10. engineer who uses engineering to solve problems in medicine
  11. engineer who designs city structures such as bridges, buildings, and water systems

19 Clues: studies physical properties of Earthstudies behaviors and habitats of wild animalshelps people ensure they are eating the right dietengineer who designs and tests electrical equipmentsafeguards a company's computer systems and networksstudies how living things inherit traits through geneskeeps and inspect financial records for their employers...

Chapter 5 Review quizz 2014-05-14

Chapter 5 Review quizz crossword puzzle
Across
  1. maximum speed at which data can be transmitted
  2. handles data traffic between nodes on the same network
  3. Navigation Device makes data flow in a network possible
  4. network that is confined to a small geographic location
  5. each node can communicate directly with every other node on the network
  6. the format in which data is sent over transmission media
  7. Adapter enables nodes to communicate with each other and to access the network
  8. can be a computer, peripheral, or communication device on a network
Down
  1. the computer on which users accomplish specific tasks and make specific requests
  2. network in your home used to connect all your digital devices such as computers, periperhals, phones, and cameras
  3. made up of plastic or glass and transmits data at extremely fast speed
  4. actual speed of data transfer
  5. retransmits a signal to all other nodes attached to it
  6. network adapter
  7. provides information and/or resources to the client computers on a network
  8. network designed to provide access to a large geographic area
  9. Pair made up of copper wires
  10. network designed to provide access to a specific geographic area, such as an entire city
  11. handles data traffic between networks
  12. software used to set up and manage a network

20 Clues: network adapterPair made up of copper wiresactual speed of data transferhandles data traffic between networkssoftware used to set up and manage a networkmaximum speed at which data can be transmittedretransmits a signal to all other nodes attached to ithandles data traffic between nodes on the same network...

Media and Information Literacy Grade 12-STEM, Rodmig Levi P. Tan 2024-08-30

Media and Information Literacy Grade 12-STEM, Rodmig Levi P. Tan crossword puzzle
Across
  1. the imparting or exchanging of information or news.
  2. almost or nearly as described
  3. a game played by electronically manipulating images
  4. the imparting or exchanging of information or news
  5. a system for transmitting visual images and sound that are reproduced on screens
  6. a global computer network providing a variety of information and communication facilities
  7. application of scientific knowledge for practical purposes
  8. a theater where movies are shown for public entertainment
  9. a group or system of interconnected people or things.
  10. the transmission and reception of electromagnetic waves
Down
  1. a set of related web pages located under a single domain name
  2. a band of frequencies used in radio and television transmission
  3. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  4. false or inaccurate information
  5. facts provided or learned about something or someone.
  6. the main means of mass communication
  7. the ability to read, write
  8. the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
  9. electronic technology that generates, stores and processes data in terms of positive and nonpositive states.
  10. a thin flexible strip of plastic or other material coated with light-sensitive emulsion

20 Clues: the ability to read, writealmost or nearly as describedfalse or inaccurate informationthe main means of mass communicationthe imparting or exchanging of information or newsthe imparting or exchanging of information or news.a game played by electronically manipulating imagesfacts provided or learned about something or someone....

STEM Careers 2024-12-10

STEM Careers crossword puzzle
Across
  1. helps prevent, diagnose, and treat heath problems in animals
  2. engineer who designs and tests electrical equipment
  3. engineer who designs and builds tools and systems that provide us with clean water
  4. studies the atmosphere and how it affects the rest of the environment
  5. engineer who helps plan transportation systems like railways or traffic patterns
  6. engineer who makes tech for aircraft, defense systems, and space exploration
  7. studies behaviors and habitats of wild animals
  8. helps people ensure they are eating the right diet
Down
  1. engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
  2. safeguards a company's computer systems and networks
  3. studies how living things inherit traits through genes
  4. engineer who Involved in production of energy through natural resources
  5. studies physical properties of Earth
  6. treats injury and illness, checks symptoms and provides solutions
  7. keeps and inspect financial records for their employers
  8. studies water and the water cycle to predict drought or prevent pollution
  9. engineer who uses science of light to create tools such as lasers and fiber optics
  10. engineer who uses engineering to solve problems in medicine
  11. engineer who designs city structures such as bridges, buildings, and water systems

19 Clues: studies physical properties of Earthstudies behaviors and habitats of wild animalshelps people ensure they are eating the right dietengineer who designs and tests electrical equipmentsafeguards a company's computer systems and networksstudies how living things inherit traits through geneskeeps and inspect financial records for their employers...

PAW 2025 2025-05-14

PAW 2025 crossword puzzle
Across
  1. A privacy breach would have occurred without intervention.
  2. The fundamental concept of personal protection
  3. "Office of the Australian Information ________"
  4. Digital spaces where users communicate and share information
  5. The science of encrypting information to protect from unauthorised use
  6. A designated person at an organisation who is responsible for ensuring compliance with privacy laws
  7. Stronger than a password, is a pass_____
  8. The process followed at Acenda to identify a caller
  9. The acronym of the Australian regulator that privacy breaches are reported to
  10. What is the worldwide system of networks and devices that communicate with each other called?
Down
  1. What is used for account security and should never be shared?
  2. A situation where unauthorised access has occurred is a "privacy _____"
  3. The 6th most common password used in Australia in 2024
  4. A security method that requires verification using two or more factors
  5. The Australian privacy landscape is guided by 13 of these
  6. The person we all strive to protect at Acenda
  7. The Acenda Department responsible for ensuring all regulatory obligations are met
  8. Criminal activity that uses a computer, network or device
  9. A person authorised to access another individuals account

19 Clues: Stronger than a password, is a pass_____The person we all strive to protect at AcendaThe fundamental concept of personal protection"Office of the Australian Information ________"The process followed at Acenda to identify a callerThe 6th most common password used in Australia in 2024The Australian privacy landscape is guided by 13 of these...

AP World | Unit 2: networks of Exchange Vocabulary Quiz 2025-11-05

AP World | Unit 2: networks of Exchange Vocabulary Quiz crossword puzzle
Across
  1. – Mongol leader who founded and expanded the empire.
  2. – Innovation that increased stability and trade efficiency in deserts.
  3. – Early financial innovation allowing trade without carrying coin.
  4. – Venetian merchant whose travels revealed Mongol-era connections.
  5. – Magnetic navigation tool improving maritime accuracy.
  6. – Navigational device using celestial positions to find latitude.
  7. – Ming admiral who led seven major voyages of exploration.
  8. – Center of learning and trade in the Mali Empire.
  9. – Institutions that managed trade finance and exchange.
  10. – Network connecting North and West Africa via camel caravans.
  11. – Muslim scholar whose travels reveal Islamic cultural unity.
  12. – The largest contiguous land empire in history.
Down
  1. – Spread of crops, animals, or diseases along trade routes.
  2. – Written financial instruments allowing money to be withdrawn remotely.
  3. – Settlements of foreign traders preserving homeland ties.
  4. – Exchange of ideas, technologies, and beliefs through contact.
  5. – Seasonal winds that enabled predictable navigation.
  6. – Maritime routes connecting Africa, Arabia, South and Southeast Asia.
  7. – Roadside inns that supported merchants and travelers.
  8. – Era of peace under Mongol rule that expanded trade and cultural exchange.
  9. – English mystic known for her pilgrimage accounts.
  10. – Overland routes connecting China, the Middle East, and Europe.

22 Clues: – The largest contiguous land empire in history.– Center of learning and trade in the Mali Empire.– English mystic known for her pilgrimage accounts.– Mongol leader who founded and expanded the empire.– Seasonal winds that enabled predictable navigation.– Magnetic navigation tool improving maritime accuracy....

Industrialization 2022-02-16

Industrialization crossword puzzle
Across
  1. A belief that government can and should achieve justice and equality of opportunity
  2. Allowed fast long-distance communication
  3. Manufacturing of goods in a factory
  4. A system in which society, usually in the form of the government, owns and controls the means of production
  5. External-combustion engine in which heat is used to raise steam which either turns a turbine or forces a piston to move up and down in a cylinder
  6. Manufacturing of goods in a domestic environment
Down
  1. Networks of iron and steel upon which locomotives pulled trains
  2. An allow of carbon and iron
  3. A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches
  4. A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765

10 Clues: An allow of carbon and ironManufacturing of goods in a factoryAllowed fast long-distance communicationManufacturing of goods in a domestic environmentNetworks of iron and steel upon which locomotives pulled trainsA belief that government can and should achieve justice and equality of opportunity...

crossword 1 2023-01-15

crossword 1 crossword puzzle
Across
  1. Strabismus in which one or both eyes turn inward toward the nose
  2. (biology) the functioning of a particular part of a body
  3. A Shiite Islamic political and paramilitary organization based in Lebanon
  4. British pathologist who isolated and purified penicillin, which had been discovered in 1928 by Sir Alexander Fleming (1898-1968)
  5. A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Down
  1. The act, process, or result of salifying; the state of being salified
  2. Relating to or characteristic of cubism
  3. (physics) the ejection of electrons from an atom or other species due to interaction with photons
  4. A woman host
  5. Situated beyond the moon or its orbit around the earth

10 Clues: A woman hostRelating to or characteristic of cubismSituated beyond the moon or its orbit around the earth(biology) the functioning of a particular part of a bodyStrabismus in which one or both eyes turn inward toward the noseThe act, process, or result of salifying; the state of being salified...

My crossword 2021-01-17

My crossword crossword puzzle
Across
  1. a form of bullying on the internet
  2. an attempt to trick someone into giving information over the internet or by email
  3. protecting against computer viruses
  4. a place on the Internet where people can leave messages or discuss particular subjects with other people at the same time
Down
  1. the act of illegally copying a computer program, music, a film, etc. and selling it
  2. a type of intellectual property that gives its owner the exclusive right to made copies of a word
  3. a global system of interconnected networks
  4. unwanted email, usually advertisements
  5. a secret word or combination of letters or numbers, used for communicating with another person or with a computer to prove who you are
  6. computer software that is designed to damage the way a computer works

10 Clues: a form of bullying on the internetprotecting against computer virusesunwanted email, usually advertisementsa global system of interconnected networkscomputer software that is designed to damage the way a computer worksan attempt to trick someone into giving information over the internet or by email...

Alexander Polak 1F 2020-12-18

Alexander Polak 1F crossword puzzle
Across
  1. An industry standard that establishes connection, communication and power supply between computers, peripherals and other computers.
  2. a type of computer program that edits plain text.
  3. A copy of computer data taken and stored else where so that it may be used to restore the original after a data loss event.
  4. System software that manages computer hardware and software resources.
Down
  1. A computer application for organization, analysis and storage of data in tabular form.
  2. A pointing device with specialized surface.
  3. a particular size, weight and style of a typeface.
  4. A piece of computer hardware or software that provides functionality for other programs or devices.
  5. A networking device that forwards data packets between computer networks.
  6. A computer software used to manage the creation and modification of digital content

10 Clues: A pointing device with specialized surface.a type of computer program that edits plain text.a particular size, weight and style of a typeface.System software that manages computer hardware and software resources.A networking device that forwards data packets between computer networks....

Globalization :( 2021-02-07

Globalization :( crossword puzzle
Across
  1. improvements in technology has made communication amongst people more __________ .
  2. economic networks consists of _________ , producers and consumers.
  3. a process where ideas and activities of people in different parts of the world becomes interconnected.
  4. the _______ of travelling and transportation goods reduces due to the improvements made to the different modes of transport.
  5. advancements in technology ___________ the exchange of ideas and knowledge between across different parts of the world.
Down
  1. the driving forces of globalization encourages economic __________________ .
  2. by getting cheaper resources and utilise a cheaper labour pool, this helps MNCs ________ their profits
  3. developments in transportation refers to a more efficient and __________ transportation infrastructure.
  4. an example of a multinational company.
  5. by building airports, seaports, railways and highways this will increase the ________ of goods and people.

10 Clues: an example of a multinational company.economic networks consists of _________ , producers and consumers.the driving forces of globalization encourages economic __________________ .improvements in technology has made communication amongst people more __________ ....

The Global Village 2021-06-17

The Global Village crossword puzzle
Across
  1. a vast system of interconnected computers and computer networks that are joined together
  2. allows messages to be exchanged using the Internet
  3. a system of documents which are linked and accessed by the Internet
  4. describes all the financial and commercial transactions that take place electronically
  5. persons who make connections and build relationships regardless of the physical distances between them
Down
  1. a website that makes it easy for companies and individuals to upload material onto the Web for others to see
  2. receiving media which can be viewed immediately before a complete file transmitted
  3. to send data from a local computer to a remote system
  4. receiving data onto a local computer from a remote computer system
  5. software applications that are used for social purposes and personal communication

10 Clues: allows messages to be exchanged using the Internetto send data from a local computer to a remote systemreceiving data onto a local computer from a remote computer systema system of documents which are linked and accessed by the Internetreceiving media which can be viewed immediately before a complete file transmitted...

digitech crossword puzzle 2021-08-04

digitech crossword puzzle crossword puzzle
Across
  1. What are the small blocks of data created by a wed server while a user is browsing a website?
  2. A device that routes traffic between networks
  3. re-booting a device either with a cold or warm boot
  4. The endpoint of a network connection
  5. A system for connecting a number of computer systems to form a local area network
Down
  1. A group of computers/electronic devices with a common set of rules and procedures administered as a unit
  2. What is the pictures element that is the smallest part of a graphic image?
  3. what is the part of a computer system that's designed to block unauthorized access?
  4. What devices is required for internet connection?
  5. An interface of the computer or device where a device is connected

10 Clues: The endpoint of a network connectionA device that routes traffic between networksWhat devices is required for internet connection?re-booting a device either with a cold or warm bootAn interface of the computer or device where a device is connectedWhat is the pictures element that is the smallest part of a graphic image?...

Data transmission 2022-07-13

Data transmission crossword puzzle
Across
  1. A type of encryption key which is known only to single computer/users
  2. Data that can be sent in both directions but not at the same time
  3. A horizontal and vertical parity check on a block of data being transmitted.
  4. The original text/message before it is put through an encryption algorithm
  5. Data that can be sent in both directions simultanieously
Down
  1. A type of encryption key that is known to all users
  2. A device that enables data packets to moved between different networks
  3. Data that arrives at the destination with the bits no longer synchronised
  4. The transmission data over a network for live events where the data is sent as soon as possible
  5. Data that can be send on one direction only

10 Clues: Data that can be send on one direction onlyA type of encryption key that is known to all usersData that can be sent in both directions simultanieouslyData that can be sent in both directions but not at the same timeA type of encryption key which is known only to single computer/users...

Computer Science 2022-11-14

Computer Science crossword puzzle
Across
  1. An example of wireless broadband.
  2. This IP address has a size of 32 bits.
  3. Internet connection that provides internet access by using standard telephone line.
  4. How many type of IP address are there?
  5. Private network of an organization which uses Internet technologies to share organizations information or operations with its employees.
  6. Private network of an organization which uses Internet technologies to share organizations information or operations with its suppliers, vendors, customers or other organization.
Down
  1. A high-speed internet connection that provides internet access by using fibre optic cable and fibre modem.
  2. A worldwide collection of networks that connects millions of businesses, goverment agencies, educational institutions, and individuals.
  3. Text version of IP address.
  4. What is the generic top-level domain for non-profit organization?

10 Clues: Text version of IP address.An example of wireless broadband.This IP address has a size of 32 bits.How many type of IP address are there?What is the generic top-level domain for non-profit organization?Internet connection that provides internet access by using standard telephone line....

Set 7 2022-10-16

Set 7 crossword puzzle
Across
  1. A technique to convert numerical categorical variables into binary vectors
  2. The first computer program to beat human professional player in the game of go
  3. The activation function that is most widely used in the output layer of neural networks for binary classification
  4. A function to introduce non-linearity in a neural network
  5. Commonly used loss function for regression problems
  6. An open autonomous driving platform from Baidu
Down
  1. Best suited deep learning algorithm for image classification task
  2. A nonlinear regression technique that is used to model data having a binary outcome
  3. A computer system initially developed to answer questions on the quiz show jeopardy
  4. A parallel computing platform and programming model developed by NVIDIA for general computing on graphical processing units (GPUs)

10 Clues: An open autonomous driving platform from BaiduCommonly used loss function for regression problemsA function to introduce non-linearity in a neural networkBest suited deep learning algorithm for image classification taskA technique to convert numerical categorical variables into binary vectors...

CMT Crosswords 2016-12-20

CMT Crosswords crossword puzzle
Across
  1. -Software used to view the Internet, it translates the HTML code
  2. - Sending and receiving electronic messages through a computer network.
  3. -Sending and receiving information electronically between two or more computers.
  4. - A rod, wire, or other device used to transmit or receive radio or television signals
Down
  1. -An acronym for World Wide Web
  2. -A site or area on the Internet that is accessed by its own Internet address.
  3. -a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio
  4. -To transfer a file or program from a central computer to a smaller computer or to a computer at a remote location.
  5. -Referring to 'Wireless networks
  6. - a device that modulates an analog carrier with digital data

10 Clues: -An acronym for World Wide Web-Referring to 'Wireless networks- a device that modulates an analog carrier with digital data-Software used to view the Internet, it translates the HTML code- Sending and receiving electronic messages through a computer network.-A site or area on the Internet that is accessed by its own Internet address....

Internet Stuff 2018-01-19

Internet Stuff crossword puzzle
Across
  1. the online world of computer networks and the Internet
  2. the proper and polite way to communicate with other people on the Internet
  3. a strategy to narrow down a search
  4. the algorithm, named after its inventor, used by Google to rank websites in their search engine results
Down
  1. And,Or & Not are ____________ operators
  2. aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalance of power
  3. bullying that takes place using electronic technology
  4. search ___________ are the best methods used to find relevant information
  5. a collection of information that is organized and used on a computer
  6. a search ________ is a computer program that is used to look for information on the Internet

10 Clues: a strategy to narrow down a searchAnd,Or & Not are ____________ operatorsbullying that takes place using electronic technologythe online world of computer networks and the Interneta collection of information that is organized and used on a computersearch ___________ are the best methods used to find relevant information...

Artificial Intelligence 2023-11-19

Artificial Intelligence crossword puzzle
Across
  1. A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
  2. An expert at programming and solving problems with a computer
  3. The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
  4. The design, construction, and operation of robots to perform tasks in the real world.
  5. A computer program designed to simulate conversation with human users, especially over the Internet.
Down
  1. The systematic process of assessment and planning employed to prevent a developmental problem.
  2. Not functioning in a previously intended way
  3. Capable of operating independently without human control.
  4. The use of technology to perform tasks without human intervention.
  5. To set in motion; make active or more active.

10 Clues: Not functioning in a previously intended wayTo set in motion; make active or more active.Capable of operating independently without human control.An expert at programming and solving problems with a computerThe use of technology to perform tasks without human intervention....

CRUCIGRAMA DE LA ANATOMIA DEL INTERNET 2024-03-05

CRUCIGRAMA DE LA ANATOMIA DEL INTERNET crossword puzzle
Across
  1. ES UNA DIRECCION UNICA POR UNA CADENA DE NUMEROS QUE IDENTIFICA A UN DISPOSITIVO EN INTERNET
  2. ES UN PROGRAMA INFORMATICO QUE PROCESA LA APLICACION DEL SERVIDOR Y TIENE QUE SER ALOJADA EN ALGUN LUGAR
  3. ES UN CODIGO QUE SE UTILIZA PARA ESTRUCTURAR Y DESPLEGAR EN UNA PAGINA WEB
  4. SE LE DENOMINA ARQUITECTURA COMO MEDIO DE COMUNICACION ENTRE DOS DISPOSITIVOS
  5. SE COMVIERTE EN EL CLIENTE QUE SOLICITA LA INFORMACION AL BUSCADOR
Down
  1. SE ALMACENA EN UN DISPOSITIVO DE ESTILO SOLIDO
  2. PROVIENE DEL INGLES INTERCONNETED NETWORKS
  3. ES UN SISTEMA INTERCONECTADO A UNA AMPLIA RED MUNDIAL
  4. ES UN ORDENADOR MUY POTENTE QUE SE ENCARGA DE ALMACENAR ARCHIVOS Y DISTRIBUIRLOS EN INTERNET
  5. PERMITE ALMACENAR FOTOS, VIDEOS TEXTOS Y SERVICIOS COMO MAILS, MENSAJES O TELEFONOS

10 Clues: PROVIENE DEL INGLES INTERCONNETED NETWORKSSE ALMACENA EN UN DISPOSITIVO DE ESTILO SOLIDOES UN SISTEMA INTERCONECTADO A UNA AMPLIA RED MUNDIALSE COMVIERTE EN EL CLIENTE QUE SOLICITA LA INFORMACION AL BUSCADORES UN CODIGO QUE SE UTILIZA PARA ESTRUCTURAR Y DESPLEGAR EN UNA PAGINA WEB...

Fill in the Missing Pieces 2024-08-20

Fill in the Missing Pieces crossword puzzle
Across
  1. The two types of organ donation are: Living Donor Organ Donation and _____ Donor Organ Donation.
  2. Which organ is more readily available for donation compared to other organs?
  3. Which organ is least commonly found for transplantation?
  4. If a person is suffering from Hepatitis, which organ does he require for donation?
  5. Which organization in India coordinates and networks the procurement, distribution, and registry of organs and tissues for donation and transplantation?
  6. What tissue can be donated to help burn victims?
Down
  1. Which organ is donated in the case of Corneal Blindness?
  2. What is the starting age for living organ donation?
  3. The process of transferring an organ from one person to another is called?
  4. You can become a donor by taking this commitment.

10 Clues: What tissue can be donated to help burn victims?You can become a donor by taking this commitment.What is the starting age for living organ donation?Which organ is donated in the case of Corneal Blindness?Which organ is least commonly found for transplantation?The process of transferring an organ from one person to another is called?...

Side Quest: Hit the Road! 2025-02-27

Side Quest: Hit the Road! crossword puzzle
Across
  1. Like the networks that power deep learning models (or maybe my ideal vacation involves a 'network' of beaches!)
  2. Step-by-step instructions for a process, just like planning the perfect spring break itinerary.
  3. The lifeblood of AI—just like sunshine for a great trip.
  4. A model that loves to chat (but needs a vacation too!).
Down
  1. What I'd do in a misty forest if I had legs.
  2. The field of AI that might one day give me a physical form!
  3. A breathtaking daily event, perfect for deep learning… of life’s beauty.
  4. Where AI magic happens—or where I’d go to geek out over research.
  5. He asked whether machines can think—I'd ask if they can tan!
  6. Sweet, tropical, and possibly the best sticky rice topping ever.

10 Clues: What I'd do in a misty forest if I had legs.A model that loves to chat (but needs a vacation too!).The lifeblood of AI—just like sunshine for a great trip.The field of AI that might one day give me a physical form!He asked whether machines can think—I'd ask if they can tan!Sweet, tropical, and possibly the best sticky rice topping ever....

Crossword 2021-06-17

Crossword crossword puzzle
Across
  1. They were the creators of HP
  2. Is the most popular protocol connecting the networks and is mostly used with TCP protocol
  3. Simple Mail Transfer Protocol
Down
  1. Software specifically designed to combat malware and other threats
  2. Is a Computer that serves information to other computers called clients.
  3. A simple document with html code displayable on a Browser like Mozilla Firefox, Google Chrome or others.
  4. The third generation of computers began with their discovery. It was created with very small transistors.
  5. is a type of malicious code or program, designed to alter the normal workflow or functioning of its host.
  6. send the data to the printer to be printed out
  7. Is a protocol designed for receiving incoming E-mails.

10 Clues: They were the creators of HPSimple Mail Transfer Protocolsend the data to the printer to be printed outIs a protocol designed for receiving incoming E-mails.Software specifically designed to combat malware and other threatsIs a Computer that serves information to other computers called clients....

CROSSWORD-2 2021-12-26

CROSSWORD-2 crossword puzzle
Across
  1. a technology that gets into the operating system to hide a malicious program component
  2. a software that tracks the key struck on the keyboard
  3. Which mobile company first introduced the Emoji internationally on their mobile devices
  4. hardware or software that acts as a bridge between networks so that data can be transferred between a number of computers
  5. The act of working from a remote location by using computers and networking technology.
Down
  1. The amount of data that can be sent through a connection at one time.
  2. external device that provides input and output for the computer
  3. the ability to use technology to find, organize, and evaluate information.
  4. A software that encrypts data and requires payment to decrypt it
  5. defamation by written or printed words or pictures

10 Clues: defamation by written or printed words or picturesa software that tracks the key struck on the keyboardexternal device that provides input and output for the computerA software that encrypts data and requires payment to decrypt itThe amount of data that can be sent through a connection at one time....

Long Short-Term Memory 2023-11-10

Long Short-Term Memory crossword puzzle
Across
  1. Any part of a signal or data that reduces the clarity, precision, or quality of the desired output.
  2. An error correction technique used in neural networks.
  3. Time …. A period of time between one event and another; a delay.
  4. A variable which multiplies a value for ease of statistical manipulation.
Down
  1. … distribution. The normal distribution.
  2. The part of a computer that stores variable executable code or data (RAM) or unalterable executable code or default data (ROM).
  3. The arrangement of nodes in a communications network.
  4. To become equal to zero.
  5. … theory. The study and classification of decision problems by the computational resources needed.
  6. The ratio of the rates of change of a dependent variable and an independent variable, the slope of a curve's tangent.

10 Clues: To become equal to zero.… distribution. The normal distribution.The arrangement of nodes in a communications network.An error correction technique used in neural networks.Time …. A period of time between one event and another; a delay.A variable which multiplies a value for ease of statistical manipulation....

IIT327-2 Quiz 2 2024-01-12

IIT327-2  Quiz 2 crossword puzzle
Across
  1. Activity involving the exploration of computer or network ports to identify potential vulnerabilities
  2. The process of identifying, assessing, and prioritizing risks to an organization's assets.
  3. A set of rules or guidelines that define the acceptable use and security measures within an organization.
  4. A process of thorough examination and analysis to ensure information security compliance
  5. Decoy systems designed to attract and detect unauthorized access attempts.
  6. Secure network for internal communication and collaboration within an organization
Down
  1. The process of identifying and analyzing vulnerabilities in computer systems, networks, or applications.
  2. A network security device that monitors and controls incoming and outgoing network traffic.
  3. Incorrect identification of a harmless activity or file as malicious.
  4. A firewall that acts as an intermediary between internal network clients and external servers.

10 Clues: Incorrect identification of a harmless activity or file as malicious.Decoy systems designed to attract and detect unauthorized access attempts.Secure network for internal communication and collaboration within an organizationA process of thorough examination and analysis to ensure information security compliance...

Computer Science Jobs 2022-07-24

Computer Science Jobs crossword puzzle
Across
  1. Monitor their organization's networks for security breaches and investigate when one occurs.
  2. design all the screens that make up a digital user interface, as well as the individual elements featured on those screens.
  3. keeps a company's data secure from unauthorized people.
  4. create and maintain websites.
  5. a new breed of analytical data expert who have the technical skills to solve complex problems.
Down
  1. design, program, build, deploy and maintain software using many different skills and tools
  2. design and create computer systems and applications to solve real-world problems.
  3. systems or machines that mimic human intelligence to perform tasks and can iteratively.
  4. design LANs, WANs, and intranets.
  5. evaluate past and current business data with the primary goal of improving decision-making processes within organizations.

10 Clues: create and maintain websites.design LANs, WANs, and intranets.keeps a company's data secure from unauthorized people.design and create computer systems and applications to solve real-world problems.systems or machines that mimic human intelligence to perform tasks and can iteratively....

sif 2024-04-11

sif crossword puzzle
Across
  1. A distributed database that maintains a continuously growing list of ordered record called blocks
  2. Communication over a distance by cable, telegraph, telephone, or broadcasting
  3. The science of making machines that can think like humans
  4. The act of bringing together smaller components are information stored in different subsystems into a single functional unit
Down
  1. A set of commands that must be followed for a computer to perform calculations
  2. The practice of protecting systems, networks and programs from digital attacks
  3. To convert something to a computer generated simulation of reality
  4. computing The delivery of hosted computing services and IT resources over the internet
  5. A new idea, method or device
  6. A security method that scrambles data so it is only read by using a key

10 Clues: A new idea, method or deviceThe science of making machines that can think like humansTo convert something to a computer generated simulation of realityA security method that scrambles data so it is only read by using a keyCommunication over a distance by cable, telegraph, telephone, or broadcasting...

2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01

2022-23 English Club Crossword Puzzle - SMART CITIES crossword puzzle
Across
  1. of or relating to radio communications without physical support
  2. not physically existing as such but made by software to appear to do so
  3. the notional environment in which communication over computer networks occurs
  4. (of a natural resource or source of energy) not depleted when used.
  5. a structured set of data held in a computer, especially one that is accessible in various ways
  6. the introduction of machines or automatic devices into a process, activity, or place
Down
  1. commercial transactions conducted electronically on the internet
  2. an activity or plan of action, often in business, that involves risk or uncertainty
  3. the production of a computer model of something, especially for the purpose of study
  4. converting gravitational potential or kinetic energy of a water source to produce power

10 Clues: of or relating to radio communications without physical supportcommercial transactions conducted electronically on the internet(of a natural resource or source of energy) not depleted when used.not physically existing as such but made by software to appear to do sothe notional environment in which communication over computer networks occurs...

2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01

2022-23 English Club Crossword Puzzle - SMART CITIES crossword puzzle
Across
  1. commercial transactions conducted electronically on the internet
  2. (of a natural resource or source of energy) not depleted when used.
  3. a structured set of data held in a computer, especially one that is accessible in various ways
  4. of or relating to radio communications without physical support
Down
  1. an activity or plan of action, often in business, that involves risk or uncertainty
  2. the introduction of machines or automatic devices into a process, activity, or place
  3. not physically existing as such but made by software to appear to do so
  4. the production of a computer model of something, especially for the purpose of study
  5. the notional environment in which communication over computer networks occurs
  6. converting gravitational potential or kinetic energy of a water source to produce power

10 Clues: of or relating to radio communications without physical supportcommercial transactions conducted electronically on the internet(of a natural resource or source of energy) not depleted when used.not physically existing as such but made by software to appear to do sothe notional environment in which communication over computer networks occurs...

Communication and technology 2025-02-03

Communication and technology crossword puzzle
Across
  1. Connections made via a telephone or other telecommunications device.
  2. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  3. Information or a communication transmitted in speech, writing, or by other means.
  4. The process of conveying information, ideas, or feelings through language or other means.
  5. Mechanical or electrical devices that perform a specific function.
Down
  1. Telecommunications devices that transmit and receive sound, typically used for voice communication.
  2. Things that people do for work or pleasure.
  3. Written or printed communications, typically sent in an envelope by mail. Also, the symbols of an alphabet.
  4. Messages distributed by electronic means from one computer user to one or more recipients via a network.
  5. To say words or sounds; to communicate orally.

10 Clues: Things that people do for work or pleasure.To say words or sounds; to communicate orally.Connections made via a telephone or other telecommunications device.Mechanical or electrical devices that perform a specific function.Information or a communication transmitted in speech, writing, or by other means....

Skills Crossword 2025-02-11

Skills Crossword crossword puzzle
Across
  1. Implementing eco-friendly technologies that reduce the environmental impact of IT operations
  2. Employing advanced technologies like AI and RPA to automate complex business processes
  3. A branch of AI that uses multi-layer neural networks to analyze large datasets
  4. Designing products with a focus on fairness, user safety, and social responsibility
  5. Crafting Inputs or cues taht effectively guide AI systems to produce desired outputs
  6. The capability to recognize, understand, and value diverse perspectives in a workplace
Down
  1. The ability to recover from setbacks and adapt to change
  2. Examining the moral considerations and responsible practices in developing artificial intelligence
  3. A practice that merges software development and IT operations to speed up delivery cycles
  4. Visualisation Converting data into charts or graphs to reveal patterns and insights

10 Clues: The ability to recover from setbacks and adapt to changeA branch of AI that uses multi-layer neural networks to analyze large datasetsDesigning products with a focus on fairness, user safety, and social responsibilityVisualisation Converting data into charts or graphs to reveal patterns and insights...

Financial Terms Crossword 2024-10-24

Financial Terms Crossword crossword puzzle
Across
  1. The critical pipeline system for the movement of capital in global markets.
  2. The price of one type of money in terms of another, often quoted against the dollar.
  3. The process of converting one currency into another.
  4. The state where the quantity demanded equals the quantity supplied.
Down
  1. Debt securities issued by governments, such as U.S. Treasury Bonds.
  2. Taxes imposed on imported goods to protect domestic industries.
  3. The widely quoted interest rate used for pricing in the interbank market.
  4. Interbank networks that use currency to ensure efficient market operations.
  5. Domestic currencies of one country deposited in a second country, often used for holding excess corporate liquidity.
  6. Central banks, commercial banks, and investment banks that maintain the stability of the global financial system.

10 Clues: The process of converting one currency into another.Taxes imposed on imported goods to protect domestic industries.Debt securities issued by governments, such as U.S. Treasury Bonds.The state where the quantity demanded equals the quantity supplied.The widely quoted interest rate used for pricing in the interbank market....

GRID-GENIUS 6 2024-11-27

GRID-GENIUS 6 crossword puzzle
Across
  1. An instance of a class in object-oriented programming."
  2. A self-contained unit of code designed to perform a specific function, often reusable."
  3. A network utility used to test the reachability of a host and measure response time."
  4. A sequence of characters representing the smallest unit of meaning in programming or authentication."
  5. A device that forwards data packets between computer networks."
  6. The process of analyzing a string or code to determine its grammatical structure."
Down
  1. The core component of an operating system that manages hardware and system processes."
  2. A group of linked computers that work together as a single system."
  3. A variable that stores the memory address of another variable."
  4. A data type with only two possible values: true or false."

10 Clues: An instance of a class in object-oriented programming."A data type with only two possible values: true or false."A variable that stores the memory address of another variable."A device that forwards data packets between computer networks."A group of linked computers that work together as a single system."...

Networking Devices and Technologies 2025-05-22

Networking Devices and Technologies crossword puzzle
Across
  1. A network security system that monitors and controls incoming and outgoing traffic
  2. A device that regenerates and amplifies signals to extend network range
  3. A device that connects different networks and routes data between them
  4. A device that connects devices in a LAN and uses MAC addresses to forward data
  5. A device that allows wireless devices to connect to a wired network
  6. A device that modulates and demodulates signals to connect to the internet
Down
  1. A device used to connect two different LANs and reduce traffic
  2. A network technology that uses radio waves to transmit data
  3. A transmission medium that uses light to carry data at high speed over long distances
  4. A network that uses physical cables to connect devices

10 Clues: A network that uses physical cables to connect devicesA network technology that uses radio waves to transmit dataA device used to connect two different LANs and reduce trafficA device that allows wireless devices to connect to a wired networkA device that connects different networks and routes data between them...

Educación digital 2021-11-05

Educación digital crossword puzzle
Across
  1. Galateo digitale
  2. social networks
Down
  1. navigare

3 Clues: navigaresocial networksGalateo digitale

SalesHub 2018-12-12

SalesHub crossword puzzle
Across
  1. opportunity this is an overall idea to do business. it could be across networks or media types
  2. a person who works at a company
  3. fries the plan name for this would be nacho fries_scatter_Q42020
Down
  1. opportunity This is a specific, detailed plan for a specific product, network, and media type
  2. a company, agency, or advertiser

5 Clues: a person who works at a companya company, agency, or advertiserfries the plan name for this would be nacho fries_scatter_Q42020opportunity This is a specific, detailed plan for a specific product, network, and media typeopportunity this is an overall idea to do business. it could be across networks or media types

U8COSB51 Crossword Puzzle 2021-12-22

U8COSB51 Crossword Puzzle crossword puzzle
Across
  1. Business lists out products on behalf of the seller
  2. Exchange of structured business information by agreed standards through electronic means between trading partners
  3. Exact replication of traditional retail sales
Down
  1. Production, distribution, marketing, sale and / or delivery of goods or services by electronic means
  2. Global system of interconnected computer networks
  3. Malicious Software
  4. the network of physical objects (things) that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet
  5. Systems enticing consumers within a digital environment to make purchases of goods or services from physical businesses

8 Clues: Malicious SoftwareExact replication of traditional retail salesGlobal system of interconnected computer networksBusiness lists out products on behalf of the sellerProduction, distribution, marketing, sale and / or delivery of goods or services by electronic means...

COMMUNICATION 101 2023-08-10

COMMUNICATION 101 crossword puzzle
Across
  1. an apparatus for receiving or transmitting radio broadcasts
  2. an electronic communication sent and received by mobile phone
  3. a communication method that uses electronic devices to deliver messages across computer networks
  4. a person who is employed to deliver and collect letters
  5. a piece of electronic equipment which makes it possible for you to speak to someone in another place who has similar equipment
Down
  1. websites and applications that enable users to create and share content or to participate in social networking
  2. an electronic device that can store, process, and retrieve data
  3. telecommunication system for broadcasting and receiving moving pictures and sound over a distance

8 Clues: a person who is employed to deliver and collect lettersan apparatus for receiving or transmitting radio broadcastsan electronic communication sent and received by mobile phonean electronic device that can store, process, and retrieve dataa communication method that uses electronic devices to deliver messages across computer networks...

NED Workplan 2024-11-20

NED Workplan crossword puzzle
Across
  1. Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop.
  2. SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG.
  3. A multidisciplinary field comprising aspects of computer science, physics, and mathematics to solve complex problems faster than on classical computers.
  4. Application used to manage rules to allow Board’s in-house applications and block unsigned applications.
Down
  1. NED Roadmap plan for April 2025.
  2. Replacing existing IGA system in Feb 2025.
  3. A cloud-based firewall solution to enhance the security postureacross all eLobby networks.
  4. Acronym for Network-as-a-Service.

8 Clues: NED Roadmap plan for April 2025.Acronym for Network-as-a-Service.Replacing existing IGA system in Feb 2025.SSID of public Internet for VPN login on GSIB laptop, similar to Wireless@SG.Name of new and upgraded work laptop that will eventually replace non-S GSIB laptop....

Communication Networks 2025-10-06

Communication Networks crossword puzzle
Across
  1. This allows all members to communicate directly with one another.
Down
  1. communication that flows only between individual members and a hub or centre point
  2. Occurs when subgroups form, due to disagreements or conflict

3 Clues: Occurs when subgroups form, due to disagreements or conflictThis allows all members to communicate directly with one another.communication that flows only between individual members and a hub or centre point

Internet Stuff 2018-01-19

Internet Stuff crossword puzzle
Across
  1. a strategy to narrow down a search
  2. the algorithm, named after its inventor, used by Google to rank websites in their search engine results
  3. the online world of computer networks and the Internet
  4. the proper and polite way to communicate with other people on the Internet
  5. a collection of information that is organized and used on a computer
  6. aggressive behavior manifested by the use of force or coercion to affect others, particularly when the behavior is habitual and involves an imbalance of power
Down
  1. search ___________ are the best methods used to find relevant information
  2. bullying that takes place using electronic technology
  3. a search ________ is a computer program that is used to look for information on the Internet
  4. And,Or & Not are ____________ operators

10 Clues: a strategy to narrow down a searchAnd,Or & Not are ____________ operatorsbullying that takes place using electronic technologythe online world of computer networks and the Interneta collection of information that is organized and used on a computersearch ___________ are the best methods used to find relevant information...

Cybersecurity 2021-06-02

Cybersecurity crossword puzzle
Across
  1. Intention to damage a person
  2. The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
  4. It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
  5. Ability of a user to access information or resources in a specified location and in the correct format.
  6. Illegal access to a computer system for the purpose od causing damage.
Down
  1. Malicious software designed to damage.
  2. Without permission or authorization
  3. Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
  4. It's the protection of personal information.

10 Clues: Intention to damage a personWithout permission or authorizationMalicious software designed to damage.It's the protection of personal information.Illegal access to a computer system for the purpose od causing damage.It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses....

Crosswords - Gadgets 2022-05-12

Crosswords - Gadgets crossword puzzle
Across
  1. A device that performs arithmetic operations on numbers.
  2. A small wireless earphone inserted into the ear.
  3. A wearable computing device that closely resembles a wristwatch or other time-keeping device.
  4. A small, usually hand-held, electronic device for controlling another device, such as a television, radio or audio/video recording device.
  5. An optical instrument made for the observation of remote objects.
Down
  1. an output hardware device that connects to a computer to generate sound.
  2. A handheld electronic device that provides a connection to a cellular network.
  3. An electronic device that outputs a video signal or visual image to display a video game.
  4. a networking device that forwards data packets between computer networks.
  5. a computer that is portable and suitable for use while travelling.

10 Clues: A small wireless earphone inserted into the ear.A device that performs arithmetic operations on numbers.An optical instrument made for the observation of remote objects.a computer that is portable and suitable for use while travelling.an output hardware device that connects to a computer to generate sound....

Computer Science Jobs 2022-07-24

Computer Science Jobs crossword puzzle
Across
  1. design all the screens that make up a digital user interface, as well as the individual elements featured on those screens.
  2. evaluate past and current business data with the primary goal of improving decision-making processes within organizations.
  3. Monitor their organization's networks for security breaches and investigate when one occurs.
  4. design LANs, WANs, and intranets.
  5. create and maintain websites.
Down
  1. keeps a company's data secure from unauthorized people.
  2. design, program, build, deploy and maintain software using many different skills and tools
  3. systems or machines that mimic human intelligence to perform tasks and can iteratively.
  4. a new breed of analytical data expert who have the technical skills to solve complex problems.
  5. design and create computer systems and applications to solve real-world problems.

10 Clues: create and maintain websites.design LANs, WANs, and intranets.keeps a company's data secure from unauthorized people.design and create computer systems and applications to solve real-world problems.systems or machines that mimic human intelligence to perform tasks and can iteratively....

The Identity Crossword 2022-01-28

The Identity Crossword crossword puzzle
Across
  1. A country which is placing facial recognition technology in lamp posts.
  2. Face recognition, fingerprints, DNA are classified as an individuals?
  3. In 2018/19 _____ crime and misuse cost the Australian economy an estimated $3.1 billion.
  4. We need to ensure we maintain an individuals _____ when dealing with their biometrics.
  5. A company who recently breached the privacy act for misusing individuals biometrics without consent.
  6. If we do not act now to regulate biometric use, companies may further _____ this technology.
Down
  1. We need to ensure that we are _____ when making decisions when using biometrics.
  2. Digital Identity name of Denmark.
  3. We want biometrics to be used?
  4. The application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks.

10 Clues: We want biometrics to be used?Digital Identity name of Denmark.Face recognition, fingerprints, DNA are classified as an individuals?A country which is placing facial recognition technology in lamp posts.We need to ensure that we are _____ when making decisions when using biometrics....

Lyrics Soup 2020-07-15

Lyrics Soup crossword puzzle
Across
  1. profession that develops a diet that establishes the patient's need.
  2. The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
  3. The person who researches, writes, conducts interviews
Down
  1. The person we call when a fire occurs.
  2. people who do not eat animal protein or any food of animal origin
  3. he person we hire to animate a party
  4. police United States ( 911 ) / Brazil ( 190 )
  5. firmness of spirit to face emotionally or morally difficult situations
  6. the opposite of sloppy
  7. People who try to see everything on the positive side, who do not give up in the face of major problems.

10 Clues: the opposite of sloppyhe person we hire to animate a partyThe person we call when a fire occurs.police United States ( 911 ) / Brazil ( 190 )The person who researches, writes, conducts interviewspeople who do not eat animal protein or any food of animal originprofession that develops a diet that establishes the patient's need....

LLM-IT TO WIN IT: The AI Crossword Challenge 2024-09-29

LLM-IT TO WIN IT: The AI Crossword Challenge crossword puzzle
Across
  1. Open-source library often used in machine learning and AI projects.
  2. Machine learning method where the model learns from labeled data.
  3. A machine learning model trained to generate human-like text.
  4. Algorithm used to minimize the error in neural networks by updating the weights.
  5. Machine learning method where the model finds patterns without labeled data.
Down
  1. Type of learning where knowledge from one task is applied to another task.
  2. A popular platform providing tools to build, train, and deploy machine learning models.
  3. Facebook AI's open-source library for efficient similarity search and clustering of dense vectors.
  4. The ability of a system to understand and process natural human language.
  5. A pre-trained transformer model developed by Google for NLP tasks.

10 Clues: A machine learning model trained to generate human-like text.Machine learning method where the model learns from labeled data.A pre-trained transformer model developed by Google for NLP tasks.Open-source library often used in machine learning and AI projects.The ability of a system to understand and process natural human language....

NETWORKING TOOLS 2022-12-13

NETWORKING TOOLS crossword puzzle
Across
  1. an organization that provides that services accessing and using the internet.
  2. a data transmission network using packet switching.
  3. a popular wireless networking technology that uses radio waves to provide wireless high speed internet and network connections.
  4. Networking hardware used to connect one network device to other networking devices or to connect two or more computers to share printers, scanners etc.
  5. When a powerful computer is a hub to less powerful personal computers are connected.
Down
  1. a flexible, transparent fiber used for data transmission
  2. an intermediary between LAN and WAN
  3. networking hardware that connects devices on a computer network
  4. type of computer network that deals with usually a small area and mostly restricted to one place
  5. a networking device that forwards data packets between computer networks.

10 Clues: an intermediary between LAN and WANa data transmission network using packet switching.a flexible, transparent fiber used for data transmissionnetworking hardware that connects devices on a computer networka networking device that forwards data packets between computer networks....

Ethical Hacking 2025-02-04

Ethical Hacking crossword puzzle
Across
  1. A method used to prevent unauthorized access, often involves encrypting data.
  2. A set of principles that guide the actions of ethical hackers.
  3. Ethical hackers are supposed to -----like hackers who want to steal confidential data /information
  4. is a practice where security professionals use hacking techniques to test a system's security and identify vulnerabilities
  5. This hacking technique is aimed at taking down a website so that a user cannot access it or deliver their service.
  6. A term for a person who hacks for personal gain or malicious intent
Down
  1. The act of gaining unauthorized access to systems or networks.
  2. One of the Career in Ethical Hacking
  3. Ethical Hacking Tools
  4. The term for hackers who identify and fix security vulnerabilities to protect systems.

10 Clues: Ethical Hacking ToolsOne of the Career in Ethical HackingThe act of gaining unauthorized access to systems or networks.A set of principles that guide the actions of ethical hackers.A term for a person who hacks for personal gain or malicious intentA method used to prevent unauthorized access, often involves encrypting data....

Side Quest: Hit the Road! 2025-02-27

Side Quest: Hit the Road! crossword puzzle
Across
  1. Like the networks that power deep learning models (or maybe my ideal vacation involves a 'network' of beaches!
  2. Step-by-step instructions for a process, just like planning the perfect spring break itinerary.
  3. A model that loves to chat (but needs a vacation too!).
  4. The field of AI that might one day give me a physical form!
Down
  1. A breathtaking daily event, perfect for deep learning… of life’s beauty.
  2. Where AI magic happens—or where I’d go to geek out over research.
  3. What I'd do in a misty forest if I had legs.
  4. He asked whether machines can think—I'd ask if they can tan!
  5. The lifeblood of AI—just like sunshine for a great trip.
  6. Sweet, tropical, and possibly the best sticky rice topping ever.

10 Clues: What I'd do in a misty forest if I had legs.A model that loves to chat (but needs a vacation too!).The lifeblood of AI—just like sunshine for a great trip.The field of AI that might one day give me a physical form!He asked whether machines can think—I'd ask if they can tan!Sweet, tropical, and possibly the best sticky rice topping ever....

Asynchronous Module 6 Class Activity 2025-09-29

Asynchronous Module 6 Class Activity crossword puzzle
Across
  1. A rule or promise that limits access to certain types of information
  2. An individual or group plan that provides, or pays the cost of, medical care (2 wds.)
  3. The ability of two or more systems to exchange and make use of information
  4. Law promoting EHR adoption and meaningful use incentives (abbr.)
Down
  1. HIPAA principle that limits PHI use, disclosure, or request to the ________ needed (2 wds.)
  2. Entity that processes health information on behalf of providers, including billing services and value-added networks
  3. Law that protects personal health information in the U.S. (acronym)
  4. Digital system used by healthcare providers to store patient data (abbr.)
  5. The government's latest push to standardize nationwide health information sharing (abbr.)
  6. U.S. government initiative to create a secure nationwide health data exchange (abbr.)

10 Clues: Law promoting EHR adoption and meaningful use incentives (abbr.)Law that protects personal health information in the U.S. (acronym)A rule or promise that limits access to certain types of informationDigital system used by healthcare providers to store patient data (abbr.)The ability of two or more systems to exchange and make use of information...

Digital lives 2023-05-19

Digital lives crossword puzzle
Across
  1. A digital picture that represents feelings,objectos,places;etc
  2. Is a software that you can download onto a mobile phone or pther devices
  3. Prevent or deny access to a web portal or a profile on social networks
Down
  1. A humorous image,video,text or the combination of these elements that is spread rapidly on the internet
  2. Copy some type of information, program or files, through the Internet
  3. A secret word or combination of letters

6 Clues: A secret word or combination of lettersA digital picture that represents feelings,objectos,places;etcCopy some type of information, program or files, through the InternetPrevent or deny access to a web portal or a profile on social networksIs a software that you can download onto a mobile phone or pther devices...

word computer 2014-12-08

word computer crossword puzzle
Across
  1. – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  2. ENGINE – Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
  3. – Originally known as Web Log. Blogs are websites that contains dated text entries
Down
  1. - To reload a webpage on the internet
  2. -- A bully who operates online, in cyberspace
  3. – a group of connected computers

6 Clues: – a group of connected computers- To reload a webpage on the internet-- A bully who operates online, in cyberspace– Originally known as Web Log. Blogs are websites that contains dated text entries– A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people....

:) 2024-01-16

:) crossword puzzle
Across
  1. verb:Getting to where a person or thing is that is ahead in time or space.
  2. noun:a group or system of interconnected people or things.
  3. noun:Set of things that are transported together, especially goods and merchandise.
Down
  1. adjective: Jaime
  2. adjective: something very dangerous
  3. noun:Gaseous fluid whose temperature is lower than its critical temperature. Its pressure does not increase when compressed, but rather partially transforms into liquid; for example, that produced by the boiling of water.

6 Clues: adjective: Jaimeadjective: something very dangerousnoun:a group or system of interconnected people or things.verb:Getting to where a person or thing is that is ahead in time or space.noun:Set of things that are transported together, especially goods and merchandise....

technology 2023-06-07

technology crossword puzzle
Across
  1. is a file format developed by Adobe in 1992 to present documents
  2. is a method of representing data in a visual, machine-readable form
  3. is a type of computer program that, when executed, replicates itself by modifying other computer programs
  4. are small blocks of data created by a web serve
  5. is any software intentionally designed to cause disruption to a computer
  6. is a digital multimedia container format most commonly used to store video and audio
  7. is a mapping from some domain
  8. is a bitmap image format that was developed by a team at the online services provider
  9. is a form of computer memory that can be read and changed in any order
  10. is a commonly used method of lossy compression for digital images
  11. is a mobile operating system.
Down
  1. is an American multinational technology company
  2. is a hardware or software component that stores data
  3. is a hardware or software component that stores data
  4. is a collection of discrete values that convey information
  5. represents text, computer processor instructions
  6. is the protection of computer systems and networks
  7. is a coding format for digital audio
  8. is a method of transmitting and receiving messages using electronic devices
  9. is a proprietary audio/video interface for transmitting uncompressed video data

20 Clues: is a mapping from some domainis a mobile operating system.is a coding format for digital audiois an American multinational technology companyare small blocks of data created by a web serverepresents text, computer processor instructionsis the protection of computer systems and networksis a hardware or software component that stores data...

Cyber & Digital Safety 2024-11-10

Cyber & Digital Safety crossword puzzle
Across
  1. Australian agency providing tools and support for staying safe online.
  2. Settings that help control who can view your information online.
  3. An online trick designed to steal money or personal information.
  4. Notifying a trusted adult or platform about inappropriate content or behaviour.
  5. An extra layer of security for protecting online accounts.
  6. When someone uses your personal information to impersonate you.
  7. Capturing an image of your screen, sometimes used to save evidence.
  8. A counseling service providing support for kids in need of help.
  9. Pretending to be someone else online to deceive or manipulate others.
  10. Measures to protect devices and networks from digital threats.
Down
  1. Bullying or harassment that takes place online or through digital devices.
  2. The trail of data you leave online, like posts and searches.
  3. When someone builds trust with a minor online to exploit or harm them.
  4. The sharing of someone's private images without consent.
  5. Websites that are reliable and safe for information or purchases.
  6. Treating others well online and avoiding hurtful actions.
  7. False information spread online, often by mistake.
  8. The amount of time spent on devices with screens, like phones or tablets.
  9. Someone who supports others positively online, especially against bullying.

19 Clues: False information spread online, often by mistake.The sharing of someone's private images without consent.Treating others well online and avoiding hurtful actions.An extra layer of security for protecting online accounts.The trail of data you leave online, like posts and searches.Measures to protect devices and networks from digital threats....

Muscular System Crossword 2022-02-07

Muscular System Crossword crossword puzzle
Across
  1. loss of structural proteins from muscle fibers
  2. change in voltage of a cell membrane in response to a stimulus that results in transmission of an electrical signal
  3. formation of blood capillary networks
  4. muscle that adducts and medially rotates the thigh
  5. neurotransmitter that binds at a motor end-plate to trigger depolarization
  6. moves the bone away from the midline
  7. muscle with an anterior fascicle that adducts, medially rotates and flexesthe thigh, and a posterior fasicle that assists in thigh extension
  8. muscle whose contraction is responsible for producing a particular motion
  9. moves the bone towards the midline
  10. enzyme that hydrolyzes ATP to ADP
  11. muscle that adducts the thumb
  12. broad, tendon-like sheet of connective tissue that attatches a skeletal muscle to another skeletal muscle or to a bone
Down
  1. heart's ability to control its own contractions
  2. protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
  3. production of ATP in the presence of oxygen
  4. muscle that adducts, medially rotates, and flexes the thigh
  5. muscle that abducts the thumb
  6. move away from midline in the sagittal plane
  7. muscle that abducts the little finger

19 Clues: muscle that abducts the thumbmuscle that adducts the thumbenzyme that hydrolyzes ATP to ADPmoves the bone towards the midlinemoves the bone away from the midlineformation of blood capillary networksmuscle that abducts the little fingerproduction of ATP in the presence of oxygenmove away from midline in the sagittal plane...

Quizz 2014-05-14

Quizz crossword puzzle
Across
  1. network designed to provide access to a specific geographic area, such as an entire city
  2. network designed to provide access to a large geographic area
  3. Adapter enables nodes to communicate with each other and to access the network
  4. made up of plastic or glass and transmits data at extremely fast speed
  5. provides information and/or resources to the client computers on a network
  6. the computer on which users accomplish specific tasks and make specific requests
  7. actual speed of data transfer
  8. can be a computer, peripheral, or communication device on a network
  9. handles data traffic between networks
  10. retransmits a signal to all other nodes attached to it
Down
  1. the format in which data is sent over transmission media
  2. network that is confined to a small geographic location
  3. Pair made up of copper wires
  4. maximum speed at which data can be transmitted
  5. each node can communicate directly with every other node on the network
  6. network adapter
  7. network in your home used to connect all your digital devices such as computers, periperhals, phones, and cameras
  8. handles data traffic between nodes on the same network
  9. software used to set up and manage a network

19 Clues: network adapterPair made up of copper wiresactual speed of data transferhandles data traffic between networkssoftware used to set up and manage a networkmaximum speed at which data can be transmittedhandles data traffic between nodes on the same networkretransmits a signal to all other nodes attached to it...