networks Crossword Puzzles
Chapter 18 2015-01-05
Across
- Name for serrate networks of curly, textured hair that have been meshed together
- Light, soft material that does not reflect light
- Brush that collapses under too much resistance
- During consultation, must pay special attention to client's hair ____
- Brush that is used to stimulate scalp and remove dirt and lint from locks
- Brush with widely spaced protective pins
- Hair that has never had a chemical treatment
- Three-strand braid made by overlapping strands of hair on top of each other
- Method of cornrows that look natural, last longer, and place less tension in hairline
Down
- Blowdrying softens textured hair, stretches length, and ___ a wave pattern
- A strong extension material that comes from the domestic ox of Tibet and central Asia
- Synthetic fiber that is soft, durable and tangles less than other synthetics
- Blow-dryer attachment that stretches and softens textured hair
- Braiding originated here
- Comb that is useful for lifting and separating textured hair
- Hair that is best braided slightly damp of lightly coated with wax or pomade
- Single braids, box braids, and individual braids refer to ___ braids
- Imported wool fiber that is matte black or brown
- Braid produced with an underhand technique
19 Clues: Braiding originated here • Brush with widely spaced protective pins • Braid produced with an underhand technique • Hair that has never had a chemical treatment • Brush that collapses under too much resistance • Light, soft material that does not reflect light • Imported wool fiber that is matte black or brown • ...
Computer Science 2016-02-16
Across
- Always make sure your work is ______.
- How many types of cache are there?
- What is the main technology for local networks?
- Human-relatable names for IP addresses, Ex - spiff.cs.washington.edu.
- If there is a legal investigation, they will keep the evidence during the ______.
- Take Parameters, Gather Data, Create HTML, Send HTML to Browser, are the steps to building a _______.
- files can be embedded in web pages and displayed by a browser
- the codes or tags that browsers use to create web pages
- Web _____ are built from HTML
Down
- Do not put _____ information of computers without protecting it.
- Reading on the internet is _______ percent slower from reading on paper.
- Series of four numbers separated by dots.
- This types of writing is used in many commercial websites.
- a group of information on a computer that can be software programs of data
- You request a web page through what?
- no more than ____ seconds of music or lyrics from an individual musical work can be played in your work.
- Whenever feasible, ask the owner of the copyright for _____.
- educational groups (top level domain)
- To create a web page, you have to learn HTML ____.
19 Clues: Web _____ are built from HTML • How many types of cache are there? • You request a web page through what? • Always make sure your work is ______. • educational groups (top level domain) • Series of four numbers separated by dots. • What is the main technology for local networks? • To create a web page, you have to learn HTML ____. • ...
Unit 7 2015-12-16
Across
- factors costs associated with the established transportation networks accessible from a specific place
- quantity that consumers are willing and able to buy
- Sector service industries that cater to the general population and buisnesses
- Power Parity (PPP)cost of living adjustment made to the GNI
- energy relatively minimal impact on the enviroment
- National Income (GNI) value of output goods & services produced in a country annually and money that leaves and enters the country
- reserves supply of energy remaining in deposits that have been discovered
- process of interaction and intergation among the company, and government
- labor force participation rate/ percentage of women holding full-time jobs outside the home
- fuels energy source formed
- manufactures typically borrow the funds needed to establish new factories or expand existing ones
Down
- factors costs resulting from the unique characteristics of a location
- the North Atlantic Free Trade Agreement
- quantity of something that producers have available for sale
- regions Europe, North America, East Asia
- energy ultimately renewable resource supplied by the sun
- ability of women to achieve improvements in status
- reserves a supply of energy that is undiscovered but thought to exist
- most important factor on a global scale
19 Clues: fuels energy source formed • regions Europe, North America, East Asia • most important factor on a global scale • the North Atlantic Free Trade Agreement • ability of women to achieve improvements in status • energy relatively minimal impact on the enviroment • quantity that consumers are willing and able to buy • ...
Business And Management 2020-04-14
Across
- __________ innovation is the use of perception of a product
- Stakeholders will want ti be kept informed of what is happening with the staff, customers and local residents
- Technical debe of products or processes, creation of new ones
- This rate can be calculated using thus equation: total output / total input x 100
- Cost to made FC (VC*Q) Existing transport networks for people and products
- This rate can be calculated using this equation: actual output / productive capacity x 100
- Cost to buy P*Q
- Enables the organization to focus on its core activities
- Protects brands and logos
Down
- Outsourcing outside of the home country
- It protects products or production processes
- It protects artística works
- The amount of time it takes between ordering new stock and receiving it
- Is the space needed
- ____________ creativity is a form of creativity that transfers and applies existing forms of thinking
- unpredictable event that threatens to harm an organization ad its stakeholders
- Wide system of connected organizations, information, resources and operations
- Business had to locate close to their customers
- _________ planning is about being prepared, procedures can be written or rehearsed
19 Clues: Cost to buy P*Q • Is the space needed • Protects brands and logos • It protects artística works • Outsourcing outside of the home country • It protects products or production processes • Business had to locate close to their customers • Enables the organization to focus on its core activities • __________ innovation is the use of perception of a product • ...
Technical crosswords 2020-03-03
Across
- ,malware which misleads users of its true intent
- ,small piece of text stored on a user's computer by a web browser for maintaining the state.
- ,condition created within a database or data storage technology in which the same piece of data is held in two separate places.
- ,arrangement of the elements of a communication network.
- ,Charles Babbage invented the ……………..
- ,People working with computers are called?
- ,is a location in memory where memory may be allocated at random access
- ,is the reduction of the amplitude of a signal, electric current, or other oscillation.
- ,Which IT company's nickname is ' The Big Blue ' ?
- ,Do no evil is the tagline of
- ,circuit that has two stable states and can be used to store state information – a bistable multivibrator.
Down
- ,Human Computer of India
- ,Who developed Java?
- ,firmware used to perform hardware initialization during the booting process, and to provide runtime services for operating systems and programs.
- ,networking device that forwards data packets between computer networks
- ,device which converts a signal in one form of energy to a signal in another.
- ,short form for WiFi is wireless....
- ,device that stores electrical energy in an electric field
- , The first web based email service?
19 Clues: ,Who developed Java? • ,Human Computer of India • ,Do no evil is the tagline of • ,short form for WiFi is wireless.... • , The first web based email service? • ,Charles Babbage invented the …………….. • ,People working with computers are called? • ,malware which misleads users of its true intent • ,Which IT company's nickname is ' The Big Blue ' ? • ...
Technical crosswords 2020-03-03
Across
- short form for WiFi is wireless....
- is the reduction of the amplitude of a signal, electric current, or other oscillation.
- Which IT company's nickname is ' The Big Blue ' ?
- device that stores electrical energy in an electric field
- Charles Babbage invented the ……………..
- networking device that forwards data packets between computer networks
- is a location in memory where memory may be allocated at random access
- firmware used to perform hardware initialization during the booting process, and to provide runtime services for operating systems and programs.
Down
- small piece of text stored on a user's computer by a web browser for maintaining the state.
- condition created within a database or data storage technology in which the same piece of data is held in two separate places.
- circuit that has two stable states and can be used to store state information – a bistable multivibrator.
- Who developed Java?
- The first web based email service?
- People working with computers are called?
- device which converts a signal in one form of energy to a signal in another.
- arrangement of the elements of a communication network.
- Human Computer of India
- malware which misleads users of its true intent
- Do no evil is the tagline of
19 Clues: Who developed Java? • Human Computer of India • Do no evil is the tagline of • The first web based email service? • short form for WiFi is wireless.... • Charles Babbage invented the …………….. • People working with computers are called? • malware which misleads users of its true intent • Which IT company's nickname is ' The Big Blue ' ? • ...
Vocabulary 2021-09-02
Across
- Millions of coputer networks that communicate together.
- To use things like enery, fuel,materials, food, water,etc.
- The leader of a team.
- The order in which organisms in an ecosystem eat one another.
- A game or event in which people compete to win.
- A peson who trains for and competes in a sports.
- A collection of data arranged for ease and speed of search and retrieval.
- An aggregation of data on a storage device, identified by a name.
- The basic rhythmic unit in a piece of music.
Down
- A quadrangular area on which ball games are played, such tennis or basketball.
- To protect ones´s goal rather than attempt to acore against one´s opponents.
- Increase the volumen.
- Dangerous substances that need careful .
- To give someone something as a reward for high achievement.
- The person one competes against in a contest or a game,rival.
- A person who trains and directs an athlete or a sports.
- A piece of land marked out for a sports contest e.g hokey field.
- on To shout encouragement to a team or a player.
- Without musical accompaniment.
19 Clues: Increase the volumen. • The leader of a team. • Without musical accompaniment. • Dangerous substances that need careful . • The basic rhythmic unit in a piece of music. • A game or event in which people compete to win. • on To shout encouragement to a team or a player. • A peson who trains for and competes in a sports. • ...
Chapter 12 2016-10-02
Across
- communication messages sent from lower levels
- Principle states that in an organization people will rise to their level of incompetence
- communication refers to the process of sending and receiving verbal and nonverbal messages that convey the meaning
- communication refers to messages between equals
- is a technique use to secure a job
- harassment is when employment is given because sexual favors
- communication may only concern topic germane to workers and the organization
Down
- rules delicate whether something is appropriate or not
- communications are messages sent from higher levels to lowers
- overload is a condition in which a worker has to deal with excess amount of information
- organized group of people
- principle is when organizations promote incompetent workers where the less amount of damage can be done
- congruence is your agreement with the values of the organization
- networks configurations of channel through which messages pass from one person to another
- harassment is a major problem today in organizations
- communications consists of messages that are sanctioned by the organization itself
- is a relationship between mentor and mentee
- is messages that don't follow any formal hierarchical lines
- environment is anything that makes a worker uncomfortable
19 Clues: organized group of people • is a technique use to secure a job • is a relationship between mentor and mentee • communication messages sent from lower levels • communication refers to messages between equals • harassment is a major problem today in organizations • rules delicate whether something is appropriate or not • ...
AP Comp Sci Review Crossword 2025-12-08
Across
- AI system that competed on a quiz show using natural-language processing.
- Legal protection that gives creators exclusive rights to their work.
- Tiny colored dots that form images on a screen.
- AI Artificial intelligence designed for narrow, specific tasks.
- AI Hypothetical intelligence equal to human reasoning across all domains.
- Small data files websites store in your browser to remember your activity.
- Data-driven baseball strategy popularized for using statistics to pick undervalued players.
- Online credential that verifies a website’s identity using encryption.
- Graphics system where a small on-screen cursor draws shapes by following movement commands.
- Small units of data sent across networks to transmit information.
Down
- Guidelines for creating strong credentials, often involving length and unpredictability.
- Conflicts about who controls digital content or intellectual property.
- Tools that index and retrieve web pages based on user queries.
- Trail of information you leave online through your activities.
- Documents explaining how a website collects and uses personal information.
- Process the College Board uses to evaluate exam performance.
- Field where computers improve performance by training on data instead of explicit rules.
- Large facilities that house servers powering cloud and internet services.
- Programming language that powers dynamic behavior on webpages.
19 Clues: Tiny colored dots that form images on a screen. • Process the College Board uses to evaluate exam performance. • Tools that index and retrieve web pages based on user queries. • Trail of information you leave online through your activities. • Programming language that powers dynamic behavior on webpages. • ...
Neural Networks 2020-11-29
3 Clues: programmed by humans to perform human activitie • uses artificial neural networks inspired by the biological neural network of the human • enables self-learning from data and then applies that learning without the need for human intervention
Computer networks 2025-01-21
3 Clues: connect multiple devices • the gate to global internet • a network that connects with computers all over the world conduct and procedures to be followed in formal situations
TECHNOLOGY VOCABULARY 2021-07-31
4 Clues: a data transmission rate for modems • a worldwide network of computer networks • a compact disk that is used with a computer • having an output that is proportional to the input
Unit 4: Political Patterns and Processes 2021-05-18
CBET CROSSWORD 2025-05-22
Across
- A group of two or more computer systems linked together.
- The physical components of a computer system (e.g. monitor, keyboard, printer).
- Information and Communication Technology – refers to technologies that provide access to information through telecommunications, including the internet, wireless networks, computers, and mobile phones.
Down
- Programs and operating information used by a computer (e.g. MS Word, Windows).
- Processed data that is meaningful and useful.
- Raw facts and figures without context (e.g. numbers, text).
6 Clues: Processed data that is meaningful and useful. • A group of two or more computer systems linked together. • Raw facts and figures without context (e.g. numbers, text). • Programs and operating information used by a computer (e.g. MS Word, Windows). • The physical components of a computer system (e.g. monitor, keyboard, printer). • ...
compute 2021-05-13
4 Clues: what has 1,024 bytes? • what device routes traffic between networks? • what is the smallest part of a graphic image? • what is the interface part of a device where another device is connected?
compute 2021-05-28
4 Clues: what has 1,024 bytes? • what device routes traffic between networks? • what is the smallest part of a graphic image? • what is the interface part of a device where another device is connected?
Networking - Mystery Student 2024-06-14
Across
- Hardware for WANs. It connects the Internet and provides a firewall.
- The Department of Defense network that the Internet was based on.
- The most common category of network cable being used right now.
- The computers in this room send data using this.
- Obsolete network hardware, used for LANS. Very slow.
- A search engine robot that checks every link on the web.
- One single piece of data (either a 1 or 0).
- Wireless networking device.
- The type of connector at the end of your network cable.
- Software that helps you find things on the internet is called a search ____.
Down
- A network that exists in only one physical location.
- The amount of time it takes a communication to get from one computer to another.
- Wireless devices send data using this.
- Fiber optic networks send data using this.
- Your computer has a network _____ to connect you with the network.
- A network that spans more than one geographical area.
- The amount of info that can be sent at one time.
- Eight single pieces of data (1's and 0's).
- Hardware for LANs that sends the info only to the correct computer.
19 Clues: Wireless networking device. • Wireless devices send data using this. • Fiber optic networks send data using this. • Eight single pieces of data (1's and 0's). • One single piece of data (either a 1 or 0). • The computers in this room send data using this. • The amount of info that can be sent at one time. • A network that exists in only one physical location. • ...
Crosswords 2019-02-28
Across
- is a free multilingual machine translation service developed
- is a Web-based service that provides detailed information about geographical regions and sites around the world.
- the programs and other operating information used by a computer.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- is a free Web-based e-mail service currently being tested at Google
- a system for connecting a number of computer systems to form a local area network
- computer screen
Down
- tools, machinery, and other durable equipment.
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- is a file storage and synchronization service developed by Google.
- is a file storage and synchronization service developed by Google.
- minute area of illumination on a display screen, one of many from which an image is composed.
- is a popular Internet search engine.
- is a type of connector commonly used for Ethernet networking.
- another word for laptop
15 Clues: computer screen • another word for laptop • is a popular Internet search engine. • tools, machinery, and other durable equipment. • is a free multilingual machine translation service developed • is a type of connector commonly used for Ethernet networking. • the programs and other operating information used by a computer. • ...
Unit 3 puzzle 2021-04-02
Across
- Uncertainty can be dealt with probability theory, truth maintenance and _______ logic.
- is saying true if the propositional formula is valid for all possible cases.
- a statement P intersection ~P is an example for _______.
- ______network is key technology for dealing with probabilistic events and to solve a problem which has uncertainty.
- A frame carries with it a set of _____ that can represent objects which are normally associated with a subject of the frame.
- knowledge is data oriented and is also termed as functional knowledge.
- A premise that is derived from a known axiom and some observations is called as _______.
Down
- is a pattern matching procedure
- Semantic networks can show aggregation and ______.
- combines all fuzzy conclusions obtained by inference into single conclusion.
- In ________ reasoning we combine probability theory wit logic to handle the uncertainty.
- _____ calculus is called as first order logic.
- is a collection of prepositions and logical expressions relating those prepositions.
- Perceptual inputs in the wumpus world environment include stench, ________, glitter bump and scream.
14 Clues: is a pattern matching procedure • _____ calculus is called as first order logic. • Semantic networks can show aggregation and ______. • a statement P intersection ~P is an example for _______. • knowledge is data oriented and is also termed as functional knowledge. • combines all fuzzy conclusions obtained by inference into single conclusion. • ...
=Families and Households 2023-03-07
Across
- An unmarried couple, in a sexual relationship living together, with or without children
- Family structure is long & thin
- Contains relatives in addition to the nuclear family, e.g. grandparents, aunts, cousins etc
- One or both partners have been previously married, with children from a previous relationship
- A single parent with dependent children, most commonly formed from divorce.
- Gay male and lesbian female couples living together in an intimate relationship.
- Authority in the family is held by females
Down
- Either one person living alone, or a group of people who live at the same address
- An extended family living apart, but keeping in regular contact by phone, email, social networks
- Authority in the family is shared between male and female partners
- One husband, one wife.
- Two generations—parents and children living together living in the same household.
- Authority within the family is held by males
- Term used to describe parents whose grown up children have left home.
14 Clues: One husband, one wife. • Family structure is long & thin • Authority in the family is held by females • Authority within the family is held by males • Authority in the family is shared between male and female partners • Term used to describe parents whose grown up children have left home. • A single parent with dependent children, most commonly formed from divorce. • ...
Elias crossword 2023-03-22
Across
- The I of the Anglo pride stands for someone who learns things all by himself
- The E of the Anglo pride stands for someone who produces the result that is wanted
- The R of the Anglo pride stands for a citizen who always does his part
- Someone that always tells the truth
- A extension that is mainly to type words, sentences, etc.
- When someone has no enemies and has a lot of friends
- A extension of a computer that helps you move around, click, and interact with things
Down
- A worldwide system of computer networks
- Someone that has no copy of itself
- The D of the Anglo pride stands for someone who is loyal and lovely
- The P of the Anglo pride that also stands for Critical Thinkers
- When someone helps you a lot he is...
- A field which combines computer science and robust datasets, to enable problem-solving
- Someone that has a lot of knowledge and is intelligent
14 Clues: Someone that has no copy of itself • Someone that always tells the truth • When someone helps you a lot he is... • A worldwide system of computer networks • When someone has no enemies and has a lot of friends • Someone that has a lot of knowledge and is intelligent • A extension that is mainly to type words, sentences, etc. • ...
Internet 2015-09-21
Across
- Standard way of indicating the location of a web site (it’s the site’s address)
- Structure that handles the major traffic in a networked system
- Gap between those who have Internet access and those who don’t
- Total collection of hypertext documents stored in computers connected to the Internet
- Collection of millions of hypertext documents
Down
- Connection divice that converts digital data on a computer to analog signals for travel on the Internet along telephone lines
- Ethernet or USB cable and a DSL or cable modem
- Lead to another website/place within same document
- Technology that allows two or more devices (eg. Computers and peripherals, cell phones, PDAs) to communicate without cables or wires
- Companies that proved users with access to the Internet, usually for a fee
- Allows more data to be sent over traditional copper telephone lines
- Collection of networks of computers
- A location on the WWW
- Total collection of hypertext documents stored in computers connected to the Internet
- where you can keep URLs that you would like to consult frequently
15 Clues: A location on the WWW • Collection of networks of computers • Collection of millions of hypertext documents • Ethernet or USB cable and a DSL or cable modem • Lead to another website/place within same document • Structure that handles the major traffic in a networked system • Gap between those who have Internet access and those who don’t • ...
Chapter 16: TRICARE 2016-03-06
Across
- Commanders of selected military treatment facilities for TRICARE regions
- A healthcare program for active duty members, CHAMPUS-eligible retirees, and eligible survivors of members
- Former name for TRICARE Standard
- Are responsible for both military readiness and peacetime healthcare
- Nurses and physicians who assists primary care providers with preauthorization's and referrals
- Provider option in areas with established TRICARE networks with no enrollment and available overseas
- Protects TRICARE beneficiaries from devastating financial loss due to serious illness or long-term treatment
- Are uniformed service personnel who are either active duty, retired or decreased
- Term used to describe the Army, Air Force, Marines, and Coast Guard
Down
- The name for the entire healthcare system for the US uniformed services
- Who is assigned to a TRICARE Prime sponsor and is part of the TRICARE provider network
- The region defined by code boundaries within a 40-mile radius of military treatment facility
- Employees that provide information about using TRICARE
- Defense Enrollment Eligibility Reporting Systems
14 Clues: Former name for TRICARE Standard • Defense Enrollment Eligibility Reporting Systems • Employees that provide information about using TRICARE • Term used to describe the Army, Air Force, Marines, and Coast Guard • Are responsible for both military readiness and peacetime healthcare • The name for the entire healthcare system for the US uniformed services • ...
Networking 2017-10-16
Across
- A network setup where each computer and network device is interconnected with one another.
- A connection that does not need wires and transmits data through radio signals.
- A central device, usually in a star topology local-area network.
- Each device on the network has its own cable that connects to a switch or hub.
- A high-bandwidth transmission technology that uses light to carry digital information.
- The bit sequences that runs on backbone to manege trasmission in a particolar network topology.
- Describes the physical and logical relationship of nodes in a network.
Down
- A network setup in which each computer and network device are connected to a single cable.
- Device connects two or more networks.
- Transmission of signal in both directions but not simultenously.
- A networked PC that takes resources from a server .
- A computer connected to a network.
- A computer that holds data to be shared with other computers.
- A networked PC that takes resources from a server .
- A network that spans across a building, buildings or even countries
15 Clues: A computer connected to a network. • Device connects two or more networks. • A networked PC that takes resources from a server . • A networked PC that takes resources from a server . • A computer that holds data to be shared with other computers. • Transmission of signal in both directions but not simultenously. • ...
2-7-22 2022-02-07
Across
- an area is known as territory for a ruler or government.
- A data area shared by hardware devices.
- A small electronic device containing flash memory
- A device that hooks up to your phone and that device is wireless.
- A router receives and sends data on computer networks
- a group system.
- a movable item used to mark a position.
- in full universal serial bus, technology is used to connect computers with peripheral devices.
Down
- one that folds. 2:a folded printed circular. 3:a folded cover or large envelope for holding or filing loose papers.
- deep and enduring emotional bond between two people in which each seeks closeness.
- desk that suits a computer.
- A router receives and sends data on computer networks
- software that allows a computer user to find and view information on the Internet.
- a small handheld input device that controls a computer screen's cursor or pointer in conjunction with the way it is moved on a flat surface.
- a central processing unit.
15 Clues: a group system. • a central processing unit. • desk that suits a computer. • A data area shared by hardware devices. • a movable item used to mark a position. • A small electronic device containing flash memory • A router receives and sends data on computer networks • A router receives and sends data on computer networks • ...
Computer Science 1 2023-11-03
Across
- 8 bits
- A process for creating a digital representation of analog data by measuring the analog data at regular intervals called samples
- a chunk of data sent over a network
- a Binary digit
- The unique number assigned to each device on the internet
- a technique that attempts to trick a user into providing personal information
- is a type of computer that forwards data across a network
- the use of a program to record every keystroke made by a system
Down
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
- software intended to damage a computing system
- the inclusion of extra components so that a system can continue to work even if individual components fail
- A way of representing information using only two options
- is a computer network consisting of interconnected networks that use standardized, open communication protocols
- the series of connections between computing devices on a network starting with a sender and endingreceiverreciever
14 Clues: 8 bits • a Binary digit • a chunk of data sent over a network • software intended to damage a computing system • A way of representing information using only two options • The unique number assigned to each device on the internet • is a type of computer that forwards data across a network • the use of a program to record every keystroke made by a system • ...
AZ104 day 2 review 2025-01-08
Across
- The billing and access container for your Azure resources.
- (5,3) A service to host and manage DNS records for custom domains.
- (7, 8) Provides private IP connectivity to Azure PaaS services from a VNet.
- A cloud service model providing a platform for building, testing, and deploying applications.
- A logical container that holds related Azure resources for management.
- (7,7)A secure and isolated environment to host your Azure resources.
- Used to authenticate and authorize users and resources in Azure.
- (5, 5) Contains user-defined routes to direct network traffic within or outside a VNet.
- (7,3,4)Provides internal DNS name resolution for Azure resources within a VNet.
- A dedicated instance of Azure Active Directory for your organization.
Down
- The private Microsoft network where VNet peering traffic flows.
- (4, 7) Allows seamless communication between two Azure Virtual Networks.
- (7, 8) Connects VNets to Azure services using public IPs while keeping traffic on the Microsoft network.
- (4, 7, 5) A custom route added to a route table for controlling traffic flow.
14 Clues: The billing and access container for your Azure resources. • The private Microsoft network where VNet peering traffic flows. • Used to authenticate and authorize users and resources in Azure. • (5,3) A service to host and manage DNS records for custom domains. • (7,7)A secure and isolated environment to host your Azure resources. • ...
AI Algorithms 2015-10-07
Across
- It is a prediction-based machine learning method.
- It is a mathematical model of plan execution.
Down
- It consists of states, inputs and outputs.
- It is a search heuristic that mimics the process of natural selection and/or evolution.
- It is generally presented as systems of interconnected which exchange messages between each other.
- Seach It is a method for making optimal decisions.
6 Clues: It consists of states, inputs and outputs. • It is a mathematical model of plan execution. • It is a prediction-based machine learning method. • Seach It is a method for making optimal decisions. • It is a search heuristic that mimics the process of natural selection and/or evolution. • ...
CROSSWORD ON - AI - DEEP LEARNING 2024-01-06
Across
- It is a virtual assistant which uses deep learning and is made by Amazon.
- deep learning algorithms learn from ______________.
- Wimbledon 2018 used _________ to analyse player emotions and expressions through hundreds of hours of footage telecast.
Down
- It is often made possible by artificial neural networks, which imitate neurons.
- Deep learning is a subset of ______________.
- ___________and service bots provide customer service and are able to respond in an intelligent and helpful way.
6 Clues: Deep learning is a subset of ______________. • deep learning algorithms learn from ______________. • It is a virtual assistant which uses deep learning and is made by Amazon. • It is often made possible by artificial neural networks, which imitate neurons. • ...
TASK TODAY 2024-07-03
Across
- act of compromising digital devices and networks through unauthorized access to an account or computer system
- Material fragmented into short and autonomous sections
- Program that allows access to information on the Internet on a certain topic.
Down
- An orderly and finite set of operations that allows us to find the solution to a problem
- Technology that allows computers to simulate human intelligence
- programming sequence of instructions that are executed on a computer
6 Clues: Material fragmented into short and autonomous sections • Technology that allows computers to simulate human intelligence • programming sequence of instructions that are executed on a computer • Program that allows access to information on the Internet on a certain topic. • ...
Network Devices - Layth I 2022-11-07
Across
- provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
- A transceiver is a combination transmitter/receiver in a single package. While the term typically applies to wireless communications devices, it can also be used for transmitter/receiver devices in cable or optical fiber systems.
- A hardware firewall is a physical appliance that is deployed to enforce a network boundary. All network links crossing this boundary pass through this firewall, which enables it to perform inspection of both inbound and outbound network traffic and enforce access controls and other security policies.
- hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
Down
- It works at the data link layer of the Open System Interconnect (OSI) model, connecting two different networks together and providing communication between them. Bridges are similar to repeaters and hubs in that they broadcast data to every node.
- Piece of networking hardware or software used in telecommunications networks that allows data to flow from one discrete network to another.
- wired network device that emits signals for wireless devices to connect and access the internet. Not the song :(
- device in a computer network that connects other devices together. Multiple data cables are plugged into a switch to enable communication between different networked devices.
8 Clues: wired network device that emits signals for wireless devices to connect and access the internet. Not the song :( • Piece of networking hardware or software used in telecommunications networks that allows data to flow from one discrete network to another. • ...
infotech 2017-06-22
Across
- data information processed by a computer.
- Tags are used to determine what and how something is displayed on a Web Page. Tags are the foundation of HTML code and are used for design and content structuring.
- firewall is a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- cache When you download (read) a web page, the data is "cached," meaning it is temporarily stored on your computer.
- Pixel The short form for ‘Picture Element’, a Pixel is what makes up displays and images on a computer screen.
- browser software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- online If a computer (or computer user) is online, it is currently connected to a network or to the Internet. Online also refers to resources and services available on the Internet - e.g. online banking, online dictionary.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- Downloading is the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet.
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment
- boot (or re-boot) is to load and initialise the operating system on a computer. Think of it as starting up your computer. In Windows you can use the key combination CTRL and ALT and DEL as a "soft" boot. This means restarting the computer rather than turning it completely off and on again, which could cause damage to your computer's hard disk under some circumstances.
- Analogue is a conventional method of transmitting data. Standard landline telephones use analogue technology. It is distinct from digital technology, which provides for greater quality and speed of data transmission.
- bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as "favourites."
- Compression is the reduction of the size of a file. Compressed files take up less memory and can be downloaded or sent over the Internet more quickly.
- freeze a system error which causes the cursor to lock in place.
- bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
- Spam refers to unsolicited email messages sent for marketing purposes.
- partition a subdivision of a hard drives surface that is defined and used as a separate drive.
- gateway point within a network that interconnects with other networks.
- zip files is to archive and compress them into one file of smaller size using a program such as WinZip. It's a handy way to make files smaller before sending them via email.
- processor is the brains of your computer. It is responsible for performing calculations and tasks that make programs work. The faster the processor, the faster the computer works.
- a programming error that causes a program to behave in an unexpected way.
- attachment is a document sent with an email message. Many types of files can be sent this way (e.g. Word documents, PDFs, Excel files, JPEGs). Be wary of attaching large files because these can take a lot of time for the recipient to download. If you have a large file, it is considered good practice to compress the file using software such as Winzip before attaching it.
- modem is a device that allows computers to transmit information to each other via ordinary telephone lines.
- drag to move the mouse while its button is being depressed.
Down
- Email or electronic mail is a way of sending messages over the internet. Popular email programs include Outlook, Mozilla Thunderbird, Gmail and Yahoo Mail.
- viral If an online video, photo or article "goes viral", it experiences a sudden spike in popularity in a short period of time.
- Java is a programming language that is commonly used in the development of client-server web applications.
- Malware" is short for malicious software. It refers to a software program that has been developed to do harm to other computers. Types of malware include viruses, worms and spyware.
- URL is short for ‘Uniform Resource Locator’ and is the web address of a specific Website or file location.
- server is a computer that handles requests for data, email, file transfers, and other network services from other computers.
- JPEG stands for Joint Photographic Experts Group, which was the committee that created the file format known as JPEG. The format is commonlyl used for photos displayed on the world wide web.
- Ethernet is the most common way of connecting computers on a network with a wired connection. It is a type of local area network (LAN) technology, providing a simple interface for connecting multiple devices
- internet set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers.
- protocol is a standard or set of rules that computers and other devices use when communicating with one another.
- hyperlink Is a link embedded within a photo, word, or document that allows you to navigate around a webpage and/or to an external page or file.
- Content refers to a website's text and information, as opposed to its design and structure.
- Broadband is a type of communications technology whereby a single wire can carry more than one type of signal at once; for example, audio and video. Cable TV is one technology that uses broadband data transmission.
- Encryption is the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- domain is a set of computers on a network that are managed as a unit.
- megabyte measure of computer processor storage and real and virtual memory. A megabyte (Mb) is 2 to the 20th power bytes, or 1,048,576 bytes in decimal notation.
- virus is a piece of programming code inserted into other programming to cause damage.
- Software Software is essentially a computer program. Photoshop and Word are examples of Software and were created by computer programmers using lines of code.
- Cybercrime is any type of illegal activity that is undertaken (or relies heavily) on a computer. There are thousands of types of cybercrime, including network intrusions, identity theft and the spreading of computer viruses.
- Megahertz is the unit used to measure the speed of a computer's processor (e.g. 2.8Ghz)
- Phishing is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider.
- unzip a zip file is to extract and decompress compressed files from it. If you are sent a zip file via email, you will need to unzip it before you can access the files inside it.
- backup a copy of a file or disk you make for archiving purposes.
- cookie A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences.
- cloud Often represented by the shape of a Cloud, Cloud Computing is the delivery of applications and services over the internet
50 Clues: data information processed by a computer. • drag to move the mouse while its button is being depressed. • freeze a system error which causes the cursor to lock in place. • backup a copy of a file or disk you make for archiving purposes. • domain is a set of computers on a network that are managed as a unit. • ...
Network Applications and services 2021-03-17
Across
- packet that has been sent but never received
- A parameter that measures completion rates of fundamental data units and has been used in a wide range of measurements for various systems
- captures the characteristics of the network overall rather than network systems themselves(Requirement)
- The slow down of transmission
- networks require dedicated point-to-point connections during calls
- The acceptance of connections or packets in the network
- is a time delay between the cause and the effect of some physical change in the system being observed, but, known within gaming circles as "lag"
Down
- The functions of delay
- can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users
9 Clues: The functions of delay • The slow down of transmission • packet that has been sent but never received • The acceptance of connections or packets in the network • networks require dedicated point-to-point connections during calls • captures the characteristics of the network overall rather than network systems themselves(Requirement) • ...
I.T 2023-02-03
Across
- use to send a message
- a computer or computer program which manages access to a centralized resource or service in a network.
- A wireless network is a network that allows for users to connect without being hardwired in.
- connects two or more packet-switched networks or subnetworks.
Down
- two or more computers joined together
- Network hardware is a set of physical or network devices that are essential for interaction and communication between hardware units operational on a computer network.
- the transfer of data from one digital device to another.
- a block of data transmitted across a network.
- The maximum amount of data transmitted over an internet connection in a given amount of time.
9 Clues: use to send a message • two or more computers joined together • a block of data transmitted across a network. • the transfer of data from one digital device to another. • connects two or more packet-switched networks or subnetworks. • A wireless network is a network that allows for users to connect without being hardwired in. • ...
Tan Bowie 8 Lyra 2023-01-19
Across
- the company that owns Facebook, Instagram, and WhatsApp.
- protection from, or resilience against, potential harm caused by others, by restraining the freedom of others to act.
- a wearable computer in the form of a watch.
- a computer-based technology that facilitates the sharing of ideas, thoughts, and information through virtual networks and communities.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
Down
- an input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- mall loudspeaker held or worn close to the listener's ear or within the outer ear.
- one of the world's largest producers of electronic devices.
- world's leading destination for short-form mobile video
9 Clues: a wearable computer in the form of a watch. • world's leading destination for short-form mobile video • the company that owns Facebook, Instagram, and WhatsApp. • one of the world's largest producers of electronic devices. • mall loudspeaker held or worn close to the listener's ear or within the outer ear. • ...
Office Equipment 2 2016-06-19
Across
- a small electronic machine that can add, multiply etc
- a tool for cutting paper, cloth etc, made of two sharp blades fastened together in the middle, with holes for your finger and thumb
- an electronic communications network that connects computer networks and organizational computer facilities around the world
Down
- a system that allows you to send and receive messages by computer
- abbreviation of computer
- (... book) a book with separate spaces for each day of the year, in which you write down the meetings, events etc that are planned for each day
- (paper ...) a small metal or plastic object that holds paper together
- machine to destroy paper containing confidential information
- (... mail) in-company answering device (similar to an answering machine)
9 Clues: abbreviation of computer • a small electronic machine that can add, multiply etc • machine to destroy paper containing confidential information • a system that allows you to send and receive messages by computer • (paper ...) a small metal or plastic object that holds paper together • (... mail) in-company answering device (similar to an answering machine) • ...
Safer internet 2023-12-04
Across
- programs for directing a computer or processing electronic data
- large compyter network linking smailer computer networks wordwide.
- any similar act of threatening someone into doing something unersirable
- the state of being safe
Down
- a computer program designed specifically to damage or disrupt a system such as a virus
- the practice of using fraudulent e-mails and copies of legitimate websites to extract finacial data from computer users for puposes ofidentiy theft.
- a group of connected pages on the Worid Wibe Web containing information on a particular subject.
- a part of computer program that is pianted illegally in another program often to damage or shut down a systam or network
- the key component of a computer system
9 Clues: the state of being safe • the key component of a computer system • programs for directing a computer or processing electronic data • large compyter network linking smailer computer networks wordwide. • any similar act of threatening someone into doing something unersirable • a computer program designed specifically to damage or disrupt a system such as a virus • ...
Issues in LE 2024-02-07
Across
- trafficking that includes the trade of humans, commonly for forced labor, sexual slavery or sexual exploitation
- A drug from a poppy plant used to relieve pain
- Profiling by detaining someone solely for their race
- Using more than reasonable force for a situation
Down
- Is the number one city in the United States for human trafficking
- Form of mass shooting or armed attack on a educational institution
- Shooter who is actively engaged in killing or attempting to kill people in a populated area
- Force that intended or known that is capable to cause serious bodily injury or death
- Crimes Causes physical or mental harm using modern telecom networks like the internet or cellphones
9 Clues: A drug from a poppy plant used to relieve pain • Using more than reasonable force for a situation • Profiling by detaining someone solely for their race • Is the number one city in the United States for human trafficking • Form of mass shooting or armed attack on a educational institution • ...
computer science 2025-10-22
Across
- a computer network where devices are connected using physical cables, such as Ethernet or fiber-optic cables, to transmit data
- a basic networking device that connects multiple Ethernet devices, like computers and printers, to form a single network segment
- a physical wire used to connect devices in a wired network, enabling them to communicate and share data
- A system of connected devices that can comunicate
- An official system of rules
Down
- hardware The physical equipment that enables communtication
- a networking device that connects multiple computer networks, such as your home network to the internet
- Messages distributed by electronics
- a computer or a system that provides resources, data, services, or programs to other computers, known as clients, over a network
9 Clues: An official system of rules • Messages distributed by electronics • A system of connected devices that can comunicate • hardware The physical equipment that enables communtication • a networking device that connects multiple computer networks, such as your home network to the internet • ...
AI Algorithms 2015-10-07
Across
- It is generally presented as systems of interconnected which exchange messages between each other.
- It consists of states, inputs and outputs.
- It is a search heuristic that mimics the process of natural selection and/or evolution.
Down
- It is a prediction-based machine learning method.
- It is a mathematical model of plan execution.
- Seach It is a method for making optimal decisions.
6 Clues: It consists of states, inputs and outputs. • It is a mathematical model of plan execution. • It is a prediction-based machine learning method. • Seach It is a method for making optimal decisions. • It is a search heuristic that mimics the process of natural selection and/or evolution. • ...
Computer network quiz 2023-02-06
Across
- the result of joining two or more computers
- A computer network that uses a wireless data connection between network codes
Down
- a computer network providing a variety of information and communication facilities
- a device that connects two or more packet-switched networks or subnetworks.
- A computer program or device that provides a service to another computer program and its user, also known as the client.
- a message sent from one computer to another
6 Clues: the result of joining two or more computers • a message sent from one computer to another • a device that connects two or more packet-switched networks or subnetworks. • A computer network that uses a wireless data connection between network codes • a computer network providing a variety of information and communication facilities • ...
Technology HW 2016-10-03
Across
- The act of avoiding security and breaking into an authorized location usually with malicious intent.
- An app that allows users to share pictures and videos with friends which can only be viewed for 1 to 10 seconds.
- ethics The practice of using morals and values online
- Acceptable Use Policy. A legal document outlining acceptable and prohibited activities on computers and networks.
- taking credit for someone else's writing or ideas
- The unofficial rules of accepted, proper online social conduct
- The illegal copying and distribution of software.
Down
- Sending angry, rude, or obscene messages directed at a person
- Citizen codes of conduct we all must adopt be safe, responsible, and respectful online.
- protection A copyright protects the publication, production or sale of the rights to a work of art
- Media Online services that bring together people by organizing them around a common interest
- Deliberately posting information to entice or provoke others.
- Bullying that takes place online
- Use using someone's original work for educational purposes, literary criticism, and news reporting
14 Clues: Bullying that takes place online • taking credit for someone else's writing or ideas • The illegal copying and distribution of software. • ethics The practice of using morals and values online • Sending angry, rude, or obscene messages directed at a person • Deliberately posting information to entice or provoke others. • ...
Before We travel 2021-03-19
Across
- Did you _______ the iron?
- ___________ is a service that arranges one-time shared rides on very short notice, usually arranged through a mobile app
- ATM usage ______ are the fees that many banks and interbank networks charge for the use of their automated teller machines (ATMs).
- She had a beautiful apartment, a wardrobe, a ______________ that magically restocked itself every time she left the place.
- What is the best way to identity your luggage so it is easy to ______ on the baggage carousel?
- ________ travel insurance, if you haven’t already.
- The company's success is reflected in its healthy bank ____________.
Down
- I always ____-_____ to make sure I locked the door.
- Each traveler can use only one, quart-size, ___-___, clear plastic bag
- There's one small, but crucial step that people often forget before traveling abroad: _____________ the bank.
- I have to _________ some money from an ATM machine.
- ____________ leftovers and perishables.
- ________ the length, height, and depth of your bag, including handles and wheels.
- Alibaba.com offers 2153 ________ bag products.
14 Clues: Did you _______ the iron? • ____________ leftovers and perishables. • Alibaba.com offers 2153 ________ bag products. • ________ travel insurance, if you haven’t already. • I always ____-_____ to make sure I locked the door. • I have to _________ some money from an ATM machine. • The company's success is reflected in its healthy bank ____________. • ...
TRAN 2024-05-08
Across
- Launched in 2021 by the European Commission as part of its Long-Term Vision for EU's rural areas.
- A community where drivers are volunteers, located in Germany.
- Network dedicated to advancing sustainable development and enhancing the quality of life in mountainous regions.
- A project tackling transportation poverty.
- Residential places created to test new solutions and innovations while providing sustainable and quality transportation for its' citizens
- Non-profit organisation dedicated to reducing the numbers of deaths and injuries in transport in Europe.
- Modes of moving people and goods that minimise environmental impact, promote social equity and ensure economic viability.
Down
- International cooperation aiming to eliminate barriers resulting from national borders.
- Responsible for the development of transportation and programs that financially support trans-European networks.
- Transportation systems and services designed for transportation in rural regions.
- Hitchhiking service developed in France.
- Network or a graph which portrays an infrastructure.
- Responsible for the superior infrastructure in urban regions.
- Focused on shared mobility and public transportation in Europe and beyond.
14 Clues: Hitchhiking service developed in France. • A project tackling transportation poverty. • Network or a graph which portrays an infrastructure. • A community where drivers are volunteers, located in Germany. • Responsible for the superior infrastructure in urban regions. • Focused on shared mobility and public transportation in Europe and beyond. • ...
Connectivity, Media Support, Expansion capability & Security features 2021-10-07
Across
- - hardware used to capture the biometric for verification of identity.
- - A type of security to prevent unauthorized access to data.
- - the memory in the computer system which is used for running software.
- - a way of identifying or confirming an individual’s identity using their face.(2 words)
- - A string of characters used for authentication on a digital device
Down
- – one or more Central Processing Units that carry out software instructions
- - A computer security system
- - a device’s ability to connect to networks and other devices.
- - capture an individual’s fingerprint images and translate the images into a digital code.(2 words)
- - this interface is controlled by the user by swiping their fingers on the screen or across the screen.
- - used to make a device inactive so that it requires a password or PIN to reactive it
- - this interface is controlled by the user giving spoken commands to the device.
- – a user interface controlled by entering text instructions
- - a user interface controlled by a pointer on the screen
14 Clues: - A computer security system • - a user interface controlled by a pointer on the screen • – a user interface controlled by entering text instructions • - A type of security to prevent unauthorized access to data. • - a device’s ability to connect to networks and other devices. • - A string of characters used for authentication on a digital device • ...
ITE Chapter 5 2023-01-17
Across
- provides the channel over which the message travels from source to destination.
- forwards traffic between networks.
- connects multiple devices to the network.
- (wireless mesh network) – Connects multiple wireless access points together to expand the wireless network.
- A network that spans a city.
- Connects multiple wireless devices and uses an access point. A WLAN uses radio waves to transmit data between wireless devices
- Commonly uses Bluetooth to connect mice, keyboards, phones, and tablets.
- A wired network consisting of a switch and network devices in a limited small geographical area.
Down
- connects a home or small office to the Internet
- Devices between the host devices, ensure that data flows from one host device to another host device
- devices that people use typically with applications
- A network that spans a large geographical area.
- Extends beyond a traditional LAN and groups users based on administratively defined boundaries such as department or floor.
- A method of connecting to a network such as a company network across an un-secure network
14 Clues: A network that spans a city. • forwards traffic between networks. • connects multiple devices to the network. • connects a home or small office to the Internet • A network that spans a large geographical area. • devices that people use typically with applications • Commonly uses Bluetooth to connect mice, keyboards, phones, and tablets. • ...
LCaravelli-Network Devices 2023-01-04
Across
- does not allow packets to enter the target system without first being analyzed
- a generic name for an all in one network appliance
- uses various techniques for determining what is and what is not permitted in a network segment
- introduced to divide LANs into segments
- networking systems that are no longer supported but are still in operation in today’s networks
- its main purpose is to regenerating weak signals
- typically responsible for monitoring all you end devices on your network
Down
- a device in the cloud that allows network administrators to manage network devices
- passively monitors traffic on the network
- a more common term for power over ethernet
- security should be top of mind when the technician recommends and installs this type of system
- receives data from one port and sends it to all other ports
- a method for powering devices that do not have a battery or access to a power outlet
- commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility
14 Clues: introduced to divide LANs into segments • passively monitors traffic on the network • a more common term for power over ethernet • its main purpose is to regenerating weak signals • a generic name for an all in one network appliance • receives data from one port and sends it to all other ports • ...
computer Vocabulary 2025-09-18
Across
- A unit of digital information that most commonly consists of eight bits.
- Read-only memory, a type of memory that stores permanent data and instructions.
- Data entered into a computer.
- Data produced by a computer.
- drive: A data storage device that stores and retrieves digital information using rapidly rotating disks.
- Random-access memory, a type of computer memory that can be accessed randomly and quickly.
- A network of remote servers that store and manage data.
- Programs and other operating information used by a computer.
Down
- A panel of keys that operates as a set of levers to input text and characters.
- The central processing unit, the "brain" of a computer.
- A display screen used to show computer images and data.
- A device that forwards data packets between computer networks.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
14 Clues: Data produced by a computer. • Data entered into a computer. • The central processing unit, the "brain" of a computer. • A display screen used to show computer images and data. • A network of remote servers that store and manage data. • Programs and other operating information used by a computer. • A device that forwards data packets between computer networks. • ...
Units 13 andn 14 Vocab 2013-07-11
Across
- The person who is in charge of selecting artwork for a publication.
- The person who writes news about famous people.
- The person who puts in hardware and software for computer networks.
- "My husband came home smelling like perfume. I think he might be cheating on me."
- The person who does the dangerous actions in a film.
- The person who helps with software questions and problems.
- "You have to give me your homework right now!"
Down
- The person who goes to a different country or region to report on events.
- The person who chooses and adjusts pictures for a publication.
- "I was late today because the traffic was terrible!"
- "Nancy isn't at work today. She must have died."
- The person who chooses, arranges and edits the scenes in a movie.
- "By 2050, scientists will have found a cure for cancer."
- "You should eat more vegetables and less KFC."
- "If you don't clean your room, you won't be allowed to watch television for a week."
- "You are not a very hard-worker."
16 Clues: "You are not a very hard-worker." • "You should eat more vegetables and less KFC." • "You have to give me your homework right now!" • The person who writes news about famous people. • "Nancy isn't at work today. She must have died." • "I was late today because the traffic was terrible!" • The person who does the dangerous actions in a film. • ...
Technology 2016-07-29
Across
- piece of programming code inserted into other programming to cause damage
- smallest unit of measurement in
- the process of converting electronic data to an encrypted form
- a piece of code created by a web server and stored on a user's computer
- a set of symbols inserted into files intended for display on the world wide web
- the brains of your computer
- of characters you type into a browser to access a website
- a device that allows computers to transmit information to each other via ordinary telephone
- read-only memory
- unsolicited email messages sent for marketing purposes
Down
- a technology that allows computers and other devices to communicate via a wireless signal
- set of interconnected networks that allow computers in different locations to exchange info
- a barrier that acts as a security system to protect trusted computer systems
- many functions and calculations that make your computer run
- software program that allows you to surf the web
- a programming language that is commonly used in the development of client-server web applications
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- the brains of your computer
- many functions and calculations that make your computer run
- unsolicited email messages sent for marketing purposes
- set of interconnected networks that allow computers in different locations to exchange info
- read-only memory
- piece of programming code inserted into other programming to cause damage
- a set of symbols inserted into files intended for display on the world wide web
- a piece of code created by a web server and stored on a user's computer
Down
- a barrier that acts as a security system to protect trusted computer systems
- of characters you type into a browser to access a website
- the process of converting electronic data to an encrypted form
- software program that allows you to surf the web
- a device that allows computers to transmit information to each other via ordinary telephone
- smallest unit of measurement in
- a programming language that is commonly used in the development of client-server web applications
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Computer Concepts 2 2018-09-19
Across
- A test to determine processor speed
- Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently
- Bus width is measured in these
- example of a First Generation computer
- Type of malware that collects bits of data, like your surfing habits
- This device connects two or more networks and directs the flow of information along the network.
- The number of these in a CPU help determine processor performance
- A slowed down Wi-Fi connection can be the result of this
Down
- Type of malware that is spread when you distribute infected files, especially as e-mail attachments
- Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
- device that draws power even when they are turned off or in standby mode
- Electronic devices such as card readers use ___________ operating systems.
- High-speed, easily accessible storage space used by the CPU
- The first graphical Web browser released in 1993
- enables real-time conversations
- Head-mounted displays often use organic light emitting diode, or _____, technology.
16 Clues: Bus width is measured in these • enables real-time conversations • A test to determine processor speed • example of a First Generation computer • The first graphical Web browser released in 1993 • A slowed down Wi-Fi connection can be the result of this • High-speed, easily accessible storage space used by the CPU • ...
AI 2025-11-08
Across
- A program designed to simulate human conversation.
- A branch of AI that enables systems to learn from data and improve over time.
- Elon Musk’s AI chatbot integrated into X (formerly Twitter).
- A subset of machine learning using neural networks to process complex patterns.
- A step-by-step set of rules or instructions for solving a problem.
- Google’s advanced AI model integrated across its apps.
- An AI platform that generates talking avatars and video presentations.
- A productivity and note-taking app enhanced with AI for writing and summarizing.
- AI that creates new content such as text, images, or videos.
- An AI search engine that provides conversational answers from the web.
Down
- The use of AI tools to create realistic videos from text or images.
- The craft of designing effective prompts to get the best results from AI models.
- Anthropic’s conversational AI model known for reasoning and safety.
- The ability of machines to perform tasks that require human-like intelligence.
- An AI tool used for video creation, editing, and special effects.
- Microsoft’s AI assistant built into Word, Excel, and other Office apps.
16 Clues: A program designed to simulate human conversation. • Google’s advanced AI model integrated across its apps. • Elon Musk’s AI chatbot integrated into X (formerly Twitter). • AI that creates new content such as text, images, or videos. • An AI tool used for video creation, editing, and special effects. • ...
TA_NNA 2025-10-28
Across
- Neural network where connections move only in one direction—from input to output.
- Type of neural network with feedback connections allowing memory of previous inputs.
- Trade-off that determines a model’s ability to generalize beyond training data.
- Adaptive optimization algorithm combining momentum and RMSProp for faster convergence.
- Simplest type of artificial neuron that performs binary classification.
- Optimization algorithm that minimizes error by updating weights in the opposite direction of the gradient.
- Algorithm used to train multilayer neural networks by propagating errors backward.
- Type of learning where models find hidden patterns in unlabeled data.
Down
- Problem where a model learns the training data too well but fails on new data.
- A machine learning task where inputs are assigned to discrete categories.
- Technique that accelerates gradient descent by considering previous updates.
- Technique used to prevent overfitting by adding a penalty to model complexity.
- Learning paradigm where the model is trained using labeled data.
- Regularization method that halts training when validation error begins to increase.
- Abbreviation for Multilayer Perceptron, a type of feedforward neural network.
- The basic biological and computational unit that processes and transmits information.
16 Clues: Learning paradigm where the model is trained using labeled data. • Type of learning where models find hidden patterns in unlabeled data. • Simplest type of artificial neuron that performs binary classification. • A machine learning task where inputs are assigned to discrete categories. • ...
TECHNICAL ADMIN 2025-07-07
Across
- Induction plans, Branch allocation of Officers & Sailors & Cadre reviews articulated in Human Capital Strategy 2012-27 is responsibility of-
- Responsible for Code, Guidelines & Standards for safety regulations during operation of MPP.
- Issue policy directives pertaining to all Electrical machinery, equipment & systems & weapons.
- UNCLOS defined Maritime Area.
- Instructions & other than communication having general application to Ships, Establishment or personnel are promulgated through.
- Locate & Assist people in Distress at Sea, in Air or on Land.
- Entry with Green Ink for performance evaluation is done by.
- Responsible for Foreign Corporation & Policy matter concerning IN.
- Responsible for matters pertaining to Special operations & diving in IN.
Down
- Authority for laying down policy for maintenance & repair of Aircraft/Aero systems.
- One Man Inquiry (OMI) is also known as.
- Govt. owned company, Ex. Oil India, HAL, ONGC, SAIL, etc.
- 3 Chiefs - CNS, COAS, CAS form a committee called.
- GIS based system for Strategic monitoring.
- Handles capital dredging in Mumbai & Vizag Naval projects. Oversees Naval policy & planning for Naval Dockyard.
- A class Authority that formulate , promulgate standards/specifications of Information Security & Networks.
16 Clues: UNCLOS defined Maritime Area. • One Man Inquiry (OMI) is also known as. • GIS based system for Strategic monitoring. • 3 Chiefs - CNS, COAS, CAS form a committee called. • Govt. owned company, Ex. Oil India, HAL, ONGC, SAIL, etc. • Entry with Green Ink for performance evaluation is done by. • Locate & Assist people in Distress at Sea, in Air or on Land. • ...
The utility of synthetic data 2024-07-11
4 Clues: artificially generated data that mimics real‑world data. • Probabilistic models simulating complex dependencies in data. • is the process of determining causal relationships from data. • Neural networks learning latent representations to generate data.
Crossword 18 2024-09-26
4 Clues: A document saved on a computer. • A diode that emits light when current passes through. • The difference in electric potential between two points. • A wired networking technology used in local area networks.
Magazine Crossword 2019-11-04
Across
- The process of converting data into a secret code for transmission over a public network
- A page or collection of web pages that can be viewed and modified by anybody with a web browser and access to the internet
- A computer language used to create web pages
- The opening page of a website
- A temporary storage place for quick retrieval of frequently used data
Down
- The protocol for mail transmission
- A security system that protects a network
- A small text file stored in a computer's hard drive by a website
- An unit memory( 8 binary digits represent a character )
- The action of writing CODE or instructions for the computer to follow
- The global system of interconnected computer networks that link billions of devices
- A programming methodology that uses a number of existing technologies together and enables web applications to make incremental updates to the user interface without the need to reload the browser page
12 Clues: The opening page of a website • The protocol for mail transmission • A security system that protects a network • A computer language used to create web pages • An unit memory( 8 binary digits represent a character ) • A small text file stored in a computer's hard drive by a website • The action of writing CODE or instructions for the computer to follow • ...
Careers using ICT 2021-01-08
Across
- Designs and teaches computer courses (1,1,7).
- Creates visual branding, adverts, brochures, magazines, website designs, product packaging and displays (7,8).
- Makes games that can be played online, and on mobile phones, PCs and games consoles (8,5,9).
- Designs, builds and tests computer programs for business, education and leisure services (8,9).
- Diagnoses and solves software and hardware problems for computer users (1,1,9,7).
- Supervises the design, installation and running of IT, data and telephony systems in an organisation (7,7).
Down
- Creates course materials that can be studied on a computer network or online (1,8,9).
- Identifies trends, creates models, collects numerical information and presents results (4,7,12).
- Designs, implements and maintains the way data is transferred across digital and telecommunications networks (7,8).
- Helps plan, design and build IT systems for clients (9,9).
- Uses their creative and technical skills to design new websites and redesign existing ones (3,8).
- Looks at a company's IT infrastructure and work out where to make improvements (7,7).
12 Clues: Designs and teaches computer courses (1,1,7). • Helps plan, design and build IT systems for clients (9,9). • Diagnoses and solves software and hardware problems for computer users (1,1,9,7). • Creates course materials that can be studied on a computer network or online (1,8,9). • ...
Chapter 10: Family 2021-05-14
Across
- the notion that true womanhood centers on domestic responsibility and child-rearing
- a woman having several husbands
- people have more than one partner at a time
- a man having several wives
- kin networks that extend outside or beyond the nuclear family
- women’s responsibility for housework and child care – everything from cooking to doing laundry, bathing children, reading bedtime stories, and sewing Halloween costumes
- marriage to someone outside ones’ social group
Down
- consists of a mother, father and their children
- a person partners with only one other person
- living together in an intimate relationship without formal legal or religious sanctioning
- legal or normative sanctions against marrying outside one’s own race, class, or other social group; marriage from within.
- the technical term for interracial marriage, literally meaning “a mixing of kinds”; it is politically and historically charged – sociologists typically use exogamy or outmarriage as neutral terms
12 Clues: a man having several wives • a woman having several husbands • people have more than one partner at a time • a person partners with only one other person • marriage to someone outside ones’ social group • consists of a mother, father and their children • kin networks that extend outside or beyond the nuclear family • ...
Language and Language Use (*words/names are separated by _ ) 2021-11-14
Across
- ______ hypothesis is the hypothesis that the human brain has evolved, so that humans can maintain larger ingroups.
- A mental representation of an event, object, or situation constructed at the time of comprehending a linguistic description.
- Group to which a person belongs.
- Networks of social relationships among individuals through which information can travel.
Down
- Words and expressions.
- ___ bias is a tendency for people to characterize positive things about their ingroup using more abstract expressions, but negative things about their outgroups using more abstract expressions.
- A stimulus presented to a person reminds him or her about other ideas associated with the stimulus.
- Rules by which words are strung together to form sentences.
- Constructing utterances to suit the audience’s knowledge.
- Group to which a person does not belong.
- ______ Hypothesis is the hypothesis that the language that people use determines their
- Information that is shared by people who engage in a conversation.
12 Clues: Words and expressions. • Group to which a person belongs. • Group to which a person does not belong. • Constructing utterances to suit the audience’s knowledge. • Rules by which words are strung together to form sentences. • Information that is shared by people who engage in a conversation. • ...
PUPPETS 2013-05-29
Across
- customary beliefs, social forms, and material traits of a racial, religious, or social group
- a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users
- the faculty of imagining, is the ability to form new images and sensations that are not perceived through sight, hearing, or other senses
- a thin, transparent sheet made of regenerated cellulose
- a place where two things or parts are joined
- motion of hands or body to emphasize or help to express a thought or feeling
Down
- a group of people who participate in a show
- a puppet controlled from above using wires or strings depending on regional variations
- partly or totally unlike in nature, form, or quality
- people who make puppets come to life
- a garment covering the whole hand
- to hold up or serve as a foundation or prop for
12 Clues: a garment covering the whole hand • people who make puppets come to life • a group of people who participate in a show • a place where two things or parts are joined • to hold up or serve as a foundation or prop for • partly or totally unlike in nature, form, or quality • a thin, transparent sheet made of regenerated cellulose • ...
Cisco Crossword 2013-09-06
Across
- Transfer of information between two or more points that are not connected by an electrical conductor
- Defines net bit rate
- Links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider Internet
- Solution that help you build more effective teams across corporate boundaries, companies, and continents
Down
- Software that provides self-service automated provisioning for private, public, or hybrid clouds
- An intelligent network optimized for rich media
- Utilizes public telecommunications networks to conduct private data communications
- Back up and protect your business data
- Provides extensive, reliable, and scalable element management capabilities to help you rapidly deploy and manage services
- Computer Network technologies for Local Area Network
- Enabling the deployment of multiple advanced services
- The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server
12 Clues: Defines net bit rate • Back up and protect your business data • An intelligent network optimized for rich media • Computer Network technologies for Local Area Network • Enabling the deployment of multiple advanced services • Utilizes public telecommunications networks to conduct private data communications • ...
Mobile Communication Services and Social Networking 2015-02-09
Across
- A range from a cell tower where access to the internet is possible
- A definition meaning a persons general reputation , can be both online and in the real world
- (2 words as 1) The use of someone else's social networking profile and pretending to be them
- A type of Internet service
- When people are informed of current events
- A definition meaning Where something suddenly turns popular on the internet because of people sharing the content
- The fourth generation of mobile internet technology
Down
- (2 words as 1) The freedom to be able to voice an opinion online
- (2 words as 1) Any platform where an online profile can be made or where topics may be discussed)
- Calls A verbal form of communication available thanks to mobile communication
- Messages A form of messaging available thanks to mobile communication
- Businesses may use social networks for this
12 Clues: A type of Internet service • When people are informed of current events • Businesses may use social networks for this • The fourth generation of mobile internet technology • (2 words as 1) The freedom to be able to voice an opinion online • A range from a cell tower where access to the internet is possible • ...
Ashly Cordova 2015-05-01
Across
- a reference to a published or unpublished source
- A system of connected computers that allows the sharing of files and equipment
- software used to view various kinds of Internet resources found on the Web
- the name for a way to display information on websites.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- A collaborative website which can be directly edited by anyone with access to it
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A bully who operates online, in cyberspace; To bully online
Down
- To renew or revitalize; To reload a webpage on the internet
- Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- a list of citations that appear at the end of a paper, article, chapter or book
- Originally known as Web Log.
12 Clues: Originally known as Web Log. • a reference to a published or unpublished source • the name for a way to display information on websites. • To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • software used to view various kinds of Internet resources found on the Web • ...
Paulina's Crossword 2016-08-30
Across
- A format for compressing image files.
- A system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
- A person who uses computers to gain unauthorized access to data.
- A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
- A system designed to prevent unauthorized access to or from a private network.
- One type of Uniform Resource Identifier
Down
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- The act of creating a virtual
- A device that forwards data packets along networks.
- A local area network
- Using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- Domain Name System
12 Clues: Domain Name System • A local area network • The act of creating a virtual • A format for compressing image files. • One type of Uniform Resource Identifier • A device that forwards data packets along networks. • A person who uses computers to gain unauthorized access to data. • A system designed to prevent unauthorized access to or from a private network. • ...
Multimedia 2023-10-23
Across
- Type of Video Conferencing
- is a type of online meeting where two or more people engage in a live audio-visual call.
- A widely used document format for multimedia presentations
- learning is defined as the need and ability to learn through virtual media, such as personal electronic gadgets, social interactions, and content.
Down
- is a form of communication that uses a combination of different content forms such as writing, audio, images, animations, or video into a single interactive presentation
- type of MOOC Asynchronous
- A common file format for storing and transmitting multimedia presentations
- The most important MOOC platforms is
- is a simple and convenient service that integrates information on a single online page, posted on a variety of social networks.
- Device that can be used for mLearning
- A popular multimedia software developed by Adobe for creating and editing graphics and videos
- An online platform where users can upload, share, and view multimedia content
12 Clues: Type of Video Conferencing • type of MOOC Asynchronous • The most important MOOC platforms is • Device that can be used for mLearning • A widely used document format for multimedia presentations • A common file format for storing and transmitting multimedia presentations • An online platform where users can upload, share, and view multimedia content • ...
Word List 5 2024-11-22
Across
- the way you earn money in order to live
- to protect something, especially something of environmental or cultural importance, from harm or destruction
- to put several things, problems, etc., in order of importance so that you can deal with the most important ones first
- to make a judgment about a situation after thinking carefully about it
- to make a situation or the effects of something less unpleasant, harmful, or serious
Down
- the basic systems and structures that a country or organization needs in order to work properly, for example, roads, electricity stations, computer networks, etc.
- to think or know that something is going to happen in the future
- the action of using up a resource
- intended to stop something you do not want to happen, such as illness, from happening
- to have something bad happen to you, or to experience something bad
- careful to avoid danger or risks
- an effect or influence
12 Clues: an effect or influence • careful to avoid danger or risks • the action of using up a resource • the way you earn money in order to live • to think or know that something is going to happen in the future • to have something bad happen to you, or to experience something bad • to make a judgment about a situation after thinking carefully about it • ...
Verbal and Nonverbal Communication 2024-10-02
Across
- using hand gestures, facial expressions, or body language to convey information and share ideas
- looking at someone to show you are listening
- using words to convey information and share ideas
- interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- if you _____ your voice, people will be able to hear you
Down
- while part of communication is speaking, it is also _______
- slouching, standing up straight- these are examples of your
- using hand _____ can show someone you are engaged or passionate about a topic of conversation
- the ____ in which you speak can make it easier, or more difficult, for someone to follow your conversation
- your posture, facial expressions, and hand gestures
- a quick and easy way to send message to friends with your phone
- ordering food to be delivered to your house is an example of communicating through the:
12 Clues: looking at someone to show you are listening • using words to convey information and share ideas • your posture, facial expressions, and hand gestures • if you _____ your voice, people will be able to hear you • while part of communication is speaking, it is also _______ • slouching, standing up straight- these are examples of your • ...
Hack Your Brain 2024-09-18
Across
- A specific type of phishing that targets high-profile individuals, such as executives.
- A technology used to create a secure, encrypted tunnel between two networks.
- A malicious attempt to disrupt a network by overwhelming it with traffic.
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- A technique where attackers attempt to guess passwords by trying all possible combinations.
- The unauthorized exploitation of a network to access confidential data or systems.
Down
- An individual who uses hacking skills for ethical purposes.
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- A cybersecurity practice where teams work against each other, with attackers and defenders.
- ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- A widely used asymmetric encryption algorithm named after its inventors.
- ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.
12 Clues: An individual who uses hacking skills for ethical purposes. • A widely used asymmetric encryption algorithm named after its inventors. • A malicious attempt to disrupt a network by overwhelming it with traffic. • A technology used to create a secure, encrypted tunnel between two networks. • ...
BMA 4103: Group 2 2024-10-27
Across
- Dodd-Frank Act are to enhance regulation and promoting _________ .
- this is what usually happens when companies face pressure to adopt internationally recognized standards.
- enables board to address complex issue effectively and uphold accountability and transparency.
- disguising the origins of illegally obtained money to be legitimate
- practice of protecting systems, networks and programs from digital attack.
- SOX Act helps protect investors from _________ financial reporting by corporation.
- the board should focus on creating sustainable value and be accountable to shareholders for its performance.
- ongoing assessment of organization’s performance and adherence to government standards.
Down
- the process through which shareholders exercise through voting rights on ESG.
- refers to the process of having an independent party review to verify the info reported by the company.
- it imposes governance standards that influence local companies seeking to attract foreign investment or list in abroad.
- this particularly focused on preventing the excessive risk taking that contributed to the financial crisis.
12 Clues: Dodd-Frank Act are to enhance regulation and promoting _________ . • disguising the origins of illegally obtained money to be legitimate • practice of protecting systems, networks and programs from digital attack. • the process through which shareholders exercise through voting rights on ESG. • ...
Cliste.ie Crossword 2025-02-17
Across
- A famous beverage made from roasted beans, taught in barista training workshops.
- A type of farming that focuses on sustainability and reducing environmental impact.
- A subject that explores how businesses and industries like farming operate financially.
- A form of textile created using knotting techniques, often taught in craft workshops.
- A method of recycling organic waste into nutrient-rich soil.
- A hands-on experience where students learn about network security and IP addresses.
Down
- A famous Irish dish that consists of mashed potatoes and cabbage or kale.
- A material made from tree pulp, often used in decoupage craft projects.
- This small insect plays a central role in worldwide food production and biodiversity.
- A course where students learn about making this popular Italian dish and managing food waste.
- This fast and affordable meal option is often criticized for its environmental and health impact.
- A natural sweetener produced by bees, often harvested in biodiversity workshops.
12 Clues: A method of recycling organic waste into nutrient-rich soil. • A material made from tree pulp, often used in decoupage craft projects. • A famous Irish dish that consists of mashed potatoes and cabbage or kale. • A famous beverage made from roasted beans, taught in barista training workshops. • ...
INA ASSESSMENT 2020-08-26
Across
- more amplifiers
- an acrylic textile fibre.
- the brother of a saw
- short for amplifier
- a tool or machine with a rotating cutting tip or reciprocating hammer or chisel, used for making holes. procedure an established or official way of doing something
- the study of people's efficiency in their working environment
- The aesthetic object is an object of sensory experience and enjoyed as such: it is heard, seen, or (in the limiting case) imagined in sensory form.
Down
- (of a substance or material) capable of polishing or cleaning a hard surface by rubbing or grinding.
- slowly going up
- its something which pushes a object
- a stable subatomic particle with a charge of negative electricity, found in all atoms and acting as the primary carrier of electricity in solids.
- a basic filter network with specified cut-off frequencies, from which other networks may be derived to obtain sharper cut-offs, constancy of characteristic impedance with frequency
- convert (waste) into reusable material.
- something you wear when filing
14 Clues: more amplifiers • slowly going up • short for amplifier • the brother of a saw • an acrylic textile fibre. • something you wear when filing • its something which pushes a object • convert (waste) into reusable material. • the study of people's efficiency in their working environment • ...
IT and Business 2011-11-10
Across
- High Performance multi-user computer
- an optical instrument that projects an enlarged image on wall
- A system connecting computers around the world
- Software to make Conference Calls and Video Conferencing
- technology of communication at a distance by electronic transmission of impulses, as by telegraph, cable, telephone, radio, or television
- output device to print paper documents
- is a computer that provides services used by other computers. For example a web server serves up web pages
Down
- Web-based application for the secure transfer of funds between member accounts
- act of trying to achieve marketing objectives through electronic or digital means
- a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
- An agreement between a buyer and a seller to exchange an asset for payment
- a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
- collection of information that is organized so that it can easily be accessed, managed, and updated
- Junk e-mail
14 Clues: Junk e-mail • High Performance multi-user computer • output device to print paper documents • A system connecting computers around the world • Software to make Conference Calls and Video Conferencing • an optical instrument that projects an enlarged image on wall • An agreement between a buyer and a seller to exchange an asset for payment • ...
INTERNAL TRADE 2023-01-29
Across
- retail outlets that sell their merchandise through mail
- type of transaction in which payment for goods or services are made at the time of delivery
- stores networks of retail shops that are owned by and operated by manafacturers
- buying and selling of goods within the boundaries of a nation
- these retail stores specialise in the sale of a specific line of products
- stores most commonly found in a local market and residential areas
- small retailers who open their shops at different places on fixed days
- purchase and sale of goods in small quantities, generally to ultimate consumers
Down
- small retailers who are commonly found at places where huge floating population gathers
- petty retailers who have independent shops of temporary nature
- purchase and sale of goods in large quantities for the purpose of resale
- small producers who carry the products on a bicycle, hand cart
- traders who do not have a fixed place to operate from
- large establishment offering a wide variety of products
14 Clues: traders who do not have a fixed place to operate from • retail outlets that sell their merchandise through mail • large establishment offering a wide variety of products • buying and selling of goods within the boundaries of a nation • petty retailers who have independent shops of temporary nature • small producers who carry the products on a bicycle, hand cart • ...
Soft tissue injury healing 2023-04-15
Across
- What type of collagen replaces type three collagen in the remodelling stage?
- What is the second stage of soft tissue healing?
- What type of receptor stimulates pain?
- What is the third stage of soft tissue healing?
- What does vasoconstriction, therefore a decrease in oxygen to the cells cause?
- What is the first stage of soft tissue healing?
- During inflammation, there is an increase in ____________ of small vessels during interaction of endothelial cells
- In inflammation, what type of pressure is created due to the increase in protein concentration (Causes fluids to be forced into the tissues, causing swelling)
Down
- What is the last stage of the remodelling process?
- The release of _______ results in the breakdown of cells and stimulates inflammation
- What is the name for new capillary budding which migrates and joins to existing capillary networks in the proliferation stage
- What is fibrinogen released and converted into to create a meshwork barrier?
- What is the fourth stage of soft tissue healing?
- what type of cells gradually disappear in the proliferation stage?
14 Clues: What type of receptor stimulates pain? • What is the third stage of soft tissue healing? • What is the first stage of soft tissue healing? • What is the second stage of soft tissue healing? • What is the fourth stage of soft tissue healing? • What is the last stage of the remodelling process? • what type of cells gradually disappear in the proliferation stage? • ...
Chapter 9 Internal and External Communication 2020-03-31
Across
- To conduct a meeting between two or more participants at different sites by using computer networks to transmit audio and video data.
- This is communication that consists of email, fax and text messaging.
- This type of communication provides a permanent record of a message.
- This is a written record of what was discussed at a meeting.
- This type of communication is between the receiver and the sender where each can respond and listen.
- The methods used to communicate a message.
- Messages distributed by electronic means from one computer user to one or more recipients via a network
- The receivers response to a message.
Down
- This is an official form sent to customers requesting payment.
- This is only used for communication within the business.
- This is the order for the conduct of a meeting.
- This is a official document which is sent to suppliers to request the supply and delivery of materials.
- This is communication that consists of graphs, charts, bar charts, diagrams
- This type of communication uses the spoken word.
14 Clues: The receivers response to a message. • The methods used to communicate a message. • This is the order for the conduct of a meeting. • This type of communication uses the spoken word. • This is only used for communication within the business. • This is a written record of what was discussed at a meeting. • ...
CSP Vocab Review 2022-04-27
Across
- An access point that provides an attacker unauthorized access to secure networks
- A type of computing that splits a program into multiple tasks that can be executed at the same time
- The capacity of a system to change in size and scale to meet new demands
- A type of protocol used for sending via packets
- An algorithm with an exponential efficiency runs in __________ time
- ___ images use lossy compression
Down
- Every algorithm can be constructed using combinations of sequencing, iteration, and __________
- A type of protocol that provides a mechanism to detect corrupt data in packages
- A type of error that occurs when the number of bits isn't enough to represent the number
- The process of encoding data to prevent unauthorized data
- An acronym for the library of procedures and the descriptions of how to call each procedure
- An error checking mechanism that is a part of the UDP protocol
- A type of data that changes smoothly
- A byte is a sequence of ______ bits
14 Clues: ___ images use lossy compression • A byte is a sequence of ______ bits • A type of data that changes smoothly • A type of protocol used for sending via packets • The process of encoding data to prevent unauthorized data • An error checking mechanism that is a part of the UDP protocol • An algorithm with an exponential efficiency runs in __________ time • ...
Business Technology 2024-02-27
Across
- The conduct of business activities electronically, typically through the internet
- Information system: A system that provides managers with the information they need to make informed decisions
- communication Technology: The use of technology to store, retrieve, transmit, and manipulate information
- The buying and selling of goods and services online
- Banking Machine: Where you can transfer cash to someone's account
- Technology: The use of computers and digital tool that enhances business operations
- Networks: Systems that allow computers and other devices to connect and communicate with each other
Down
- Banking: Where you can do transactions electronically
- Programs and applications that run of a computer system
- Teller Machine: This type of machine is where you can do withdrawal
- The use of technology to conduct meeting or conference
- Storage: The process of storing and organizing data in a computer or other storage devices
- The physical components of a computer system that can be touched and seen
- Aided Design: The use of computers software to create, modify and analyze designs for various purposes
14 Clues: The buying and selling of goods and services online • Banking: Where you can do transactions electronically • The use of technology to conduct meeting or conference • Programs and applications that run of a computer system • Banking Machine: Where you can transfer cash to someone's account • Teller Machine: This type of machine is where you can do withdrawal • ...
1-8 Vocab 2025-10-21
Across
- How a person would like to be seen.
- A business model that allows companies to buy and sell products over the internet.
- Purchases that are made after a good amount of thinking, consideration, and logic.
- How a person sees themselves.
- Uses social media networks to promote and sell products and services.
- Paying content creators, or influencers, to promote companies’ brands, products, and services to their (the influencer’s) large audience of fans and followers using social media.
Down
- Products that are easy for consumers to find and buy.
- The reasons people make certain purchases.
- Purchases made based on psychological factors, including feeling, emotion, and attitude.
- Unique items that consumers will spend a lot of time looking for.
- Items that usually cost more and are only purchased occasionally.
- The use of mobile technologies to sell products and services on cellular devices and tablets.
- A group of people who have the same social, economic, and/or educational status.
- Items that people don’t plan on wanting or needing.
14 Clues: How a person sees themselves. • How a person would like to be seen. • The reasons people make certain purchases. • Items that people don’t plan on wanting or needing. • Products that are easy for consumers to find and buy. • Unique items that consumers will spend a lot of time looking for. • Items that usually cost more and are only purchased occasionally. • ...
Networks and the internet Crossword 2023-01-28
7 Clues: A wide network • a local network • a global computer network • a central point in a network • something that can connect to the internet • something that can be shared through a network • Multiple cables connecting to one cable to the server
Networks and the internet Crossword 2023-01-28
7 Clues: A wide network • a local network • a global computer network • a central point in a network • something that can connect to the internet • something that can be shared through a network • Multiple cables connecting to one cable to the server
Acronyms connected with computer networks 2016-12-06
Across
- What is acronym of Wi-Fi Protected Access?
- What is acronym of Asymmetric digital subscriber line?
- What LAN definition stands for?
- What is acronym of The Transmission Control Protocol?
Down
- What WAN definition stands for?
- What ECN definition stands for?
- What is acronym of A network access control list?
7 Clues: What WAN definition stands for? • What ECN definition stands for? • What LAN definition stands for? • What is acronym of Wi-Fi Protected Access? • What is acronym of A network access control list? • What is acronym of The Transmission Control Protocol? • What is acronym of Asymmetric digital subscriber line?
Unit 3 puzzle 2021-04-02
Across
- --------- is saying true if the propositional formula is valid for all the possible cases
- In …………reasoning we combine probability theory with logic to handle the uncertainty.
- ………….network is key technology for dealing with probabilistic events and to solve a problem which has uncertainty
- A -------is a collection of prepositions and logical expressions relating those prepositions
- --------- is a pattern matching procedure.
- A premise that is derived from a known axiom and some observations is called as …………….
Down
- Semantic networks can show aggregation and ---------------
- A frame carries with it a set of .....that can represent objects which are normally associated with a subject of the frame.
- Perceptual inputs in the Wumpus World environment include Stench, ……….., Glitter, Bump and Scream
- ………combines all fuzzy conclusions obtained by inference into single conclusion.
- --------- knowledge is data-oriented and is also termed as functional knowledge
- -------------calculus is also known as “First Order Logic”
- A statement statement p ∧∼p is an example for …….
- Uncertainty can be dealt with probability theory , truth maintenance and ______ Logic.
14 Clues: --------- is a pattern matching procedure. • A statement statement p ∧∼p is an example for ……. • Semantic networks can show aggregation and --------------- • -------------calculus is also known as “First Order Logic” • ………combines all fuzzy conclusions obtained by inference into single conclusion. • ...
TECHNOLOGY VOCABULARY 2021-06-16
Across
- a worldwide network of computer networks
- a compact disk that is used with a computer
- an organized body of related information
- a sequence of data processed as a single unit of information
- of or pertaining to a number system having 2 as its base
- a unit of measurement of information
- adjusting the parts of something in relation to each other
Down
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- art ready-made pieces of computerized graphic art that can be used to decorate a document
- the amount of information that can be stored on a disk drive
- the symbolic arrangement of data in a computer program configure set up for a particular purpose
- RAM memory that is set aside as a specialized buffer storage
- any computer that is hooked up to a computer network
- locate and correct errors in a computer program code
14 Clues: a unit of measurement of information • a worldwide network of computer networks • an organized body of related information • a compact disk that is used with a computer • any computer that is hooked up to a computer network • locate and correct errors in a computer program code • of or pertaining to a number system having 2 as its base • ...
Elias crossword 2023-03-22
Across
- The I of the Anglo pride stands for someone who learns things all by himself
- The E of the Anglo pride stands for someone who produces the result that is wanted
- The R of the Anglo pride stands for a citizen who always does his part
- Someone that always tells the truth
- A extension that is mainly to type words, sentences, etc.
- When someone has no enemies and has a lot of friends
- A extension of a computer that helps you move around, click, and interact with things
Down
- A worldwide system of computer networks
- Someone that has no copy of itself
- The D of the Anglo pride stands for someone who is loyal and lovely
- The P of the Anglo pride that also stands for Critical Thinkers
- When someone helps you a lot he is...
- A field which combines computer science and robust datasets, to enable problem-solving
- Someone that has a lot of knowledge and is intelligent
14 Clues: Someone that has no copy of itself • Someone that always tells the truth • When someone helps you a lot he is... • A worldwide system of computer networks • When someone has no enemies and has a lot of friends • Someone that has a lot of knowledge and is intelligent • A extension that is mainly to type words, sentences, etc. • ...
Lost Soul, Be At Peace 2022-11-23
Across
- Giving little to no attention to someone, almost like abandoning someone
- A carnivorous animal that is closely related to the wolf and is known for its distinctive vocalization (barks or yips)
- A government building that directs the punishment to criminals/law breakers
- The terrifying hallucinations during sleep
- A worldwide system on computer networks and you can search up anything
- Homosexuality in women
- An event where a group of people mourn for the dead
- A common household pet that doesn't need to be taken out on walks
Down
- the state/act of giving approval and welcoming something in open arms
- A spirit that is see-through and can go through walls and can fly
- A person related or involved in crime
- The fully development of a persons brain in knowledge like an adult
- A moment in life, common during teenage years, that is sad and you feel like doing nothing in life
- A form of art that is performed with a smooth dance while using music
14 Clues: Homosexuality in women • A person related or involved in crime • The terrifying hallucinations during sleep • An event where a group of people mourn for the dead • A spirit that is see-through and can go through walls and can fly • A common household pet that doesn't need to be taken out on walks • The fully development of a persons brain in knowledge like an adult • ...
Cs Review Puzzle - Reid 2025-05-02
Across
- To reduce file size
- Naming
- An error where the number of bits is not large enough to handle the math.
- hiding the details of the code
- a wireless access point that gives unauthorized access to secure networks
- Pitch and volume of music, temperature, and the amount of light in the room are all examples of _______ data.
- A tool used as part of the DESIGN phase of the SDLC
Down
- the keyword needed to refer to instance variables or functions within a class
- using one function to combine the features of another.
- A ________ is an agreed-upon set of rules that specify the behavior of a system.
- software that is made freely available and may be redistributed, sold and/or modified .
- _______ is the process of finding a path from sender to receiver.
- The ________ of a computer network is the maximum amount of data that can be sent in a fixed amount of time.
- the study of encryption techniques
14 Clues: Naming • To reduce file size • hiding the details of the code • the study of encryption techniques • A tool used as part of the DESIGN phase of the SDLC • using one function to combine the features of another. • _______ is the process of finding a path from sender to receiver. • An error where the number of bits is not large enough to handle the math. • ...
Media Literacy Review 2025-04-08
Across
- Refers to the speaker's attitude toward the subject, conveyed through word choice, diction, and emotional appeal.
- information.
- Allowing personal opinions to influence your judgment
- One of the purposes of media- primary source of information for individuals, providing news, current affairs, and
- Known as “the appeal to emotion.”
- A person relies on their credibility or character when making an appeal or an argument.
- _______ Media is based on information technology exchange or networks
Down
- The main means of mass communication (broadcasting, publishing, and the internet)
- Culture and evolution have made certain _______ be perceived differently
- Headlines that are used to grab a reader’s attention, usually by using emotion-provoking language, exaggeration or curiosity.
- Convincing someone by using statistics
- The practice of taking someone else's work or ideas and passing them off as one's own.
- An experiment that found our choice of words affects perception
- is about what’s good and bad, what’s right and wrong, and what people should and shouldn’t do
14 Clues: information. • Known as “the appeal to emotion.” • Convincing someone by using statistics • Allowing personal opinions to influence your judgment • An experiment that found our choice of words affects perception • _______ Media is based on information technology exchange or networks • Culture and evolution have made certain _______ be perceived differently • ...
Digital Sales Graduation Crossword Puzzle 2022-03-30
Across
- We utilize this app to share educational information about our partners and solutions to their networks
- You need to _____ a lead in order for he/she to become a SQL.
- What Kali, Michele, Jacob, Sebastian, and Dylan have in common.
- The future of sales is ____ and buyer-centric
- The total number of certifications earned by the analysts
Down
- You learned how to think differently in sales with the ____ Sales Training
- _____ first to understand, solution later.
- ____ Avanade: One of the five growth pillars that will enable us to be more collaborative, focused on client outcomes, and reward shared success.
- As you create and work opportunities, you will need to ____ them to get paid when they close.
9 Clues: _____ first to understand, solution later. • The future of sales is ____ and buyer-centric • The total number of certifications earned by the analysts • You need to _____ a lead in order for he/she to become a SQL. • What Kali, Michele, Jacob, Sebastian, and Dylan have in common. • You learned how to think differently in sales with the ____ Sales Training • ...
Volcanic Hazards 2022-12-15
Across
- occur at volcanos that lack real-time ground based sensor networks
- A mixture of water and particles of all sizes that can range from small balls to giant boulders
- any potential loss or damage as a result of volcanic hazard
- larger rock fragments that land close to the volcano from an eruption
- molten rock flowing directly from a volcanic vent or fissure
- tiny particles which can travel up to hundreds of miles and contaminate air, water and more
Down
- any potentially dangerous volcanic process
- gravity driven rapidly moving mixtures of rockfragments and hot gas
- masses of rock and soil that slide rapidly down a slope due to failure of a slope of a volcano
9 Clues: any potentially dangerous volcanic process • any potential loss or damage as a result of volcanic hazard • molten rock flowing directly from a volcanic vent or fissure • occur at volcanos that lack real-time ground based sensor networks • gravity driven rapidly moving mixtures of rockfragments and hot gas • ...
telemedicine 2017-03-08
Across
- a procedure or policy statement for determining a course action
- measures a communacation channels information carrying capacity
- is a kind of date compression which allows users to reconstruct images without losinf information from the original copies
- that has the capability to carry a wide range of various frequencies
Down
- this is where the patient and physician are located during the time of consultation
- method that is use for reducing the volume of date
- is the use of telecommunication technology to provide clinical health care from a distance
- is a device which provides connection to at least two networks on an organization
- is a process of compressing date with high ratio
9 Clues: is a process of compressing date with high ratio • method that is use for reducing the volume of date • a procedure or policy statement for determining a course action • measures a communacation channels information carrying capacity • that has the capability to carry a wide range of various frequencies • ...
CPF 2017-03-21
Across
- Central Processing Unit (the brain of the computer). Executes data and instructions.
- Storage.
- Connects your computer to another computer over a wide area network.
- Local-Area network. Covers a small geographical area like at home, office or building.
- How much space to store data? Measured in bytes.
- Devices that you can carry with you and allows you to communicate with other devices.
- Wide-Area network. Covers a broad geographical area like a country or across countries.
- Read Only Memory. Non-Volatile.
- Allows many computers to connect to a network.
- Device where data are stored permanently.
Down
- Connects the computer to external networks or devices such as monitor, printers, thumb-drives or external hard disks.
- Describe the computer settings such CPU speed, RAM size, Hard-disk space etc
- A private network accessible only by authorised people who are usually employees or occupants of the same organisation or place.
- A public network accessible by everybody.
- Random Access Memory. Primary Storage. Volatile.
- Receives data and determines 'where to route' or which computer to send the data to.
16 Clues: Storage. • Read Only Memory. Non-Volatile. • A public network accessible by everybody. • Device where data are stored permanently. • Allows many computers to connect to a network. • How much space to store data? Measured in bytes. • Random Access Memory. Primary Storage. Volatile. • Connects your computer to another computer over a wide area network. • ...
Computer Concepts 2 2018-09-19
Across
- A test to determine processor speed
- example of a First Generation computer
- A slowed down Wi-Fi connection can be the result of this
- Bus width is measured in these
- Type of malware that collects bits of data, like your surfing habits
- This device connects two or more networks and directs the flow of information along the network.
- The number of these in a CPU help determine processor performance
- Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently
Down
- Type of malware that is spread when you distribute infected files, especially as e-mail attachments
- Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
- device that draws power even when they are turned off or in standby mode
- Electronic devices such as card readers use ___________ operating systems.
- High-speed, easily accessible storage space used by the CPU
- Head-mounted displays often use organic light emitting diode, or _____, technology.
- The first graphical Web browser released in 1993
- enables real-time conversations
16 Clues: Bus width is measured in these • enables real-time conversations • A test to determine processor speed • example of a First Generation computer • The first graphical Web browser released in 1993 • A slowed down Wi-Fi connection can be the result of this • High-speed, easily accessible storage space used by the CPU • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- of characters you type into a browser to access a website
- software program that allows you to surf the web
- a piece of code created by a web server and stored on a user's computer
- set of interconnected networks that allow computers in different locations to exchange info
- the process of converting electronic data to an encrypted form
- unsolicited email messages sent for marketing purposes
- a set of symbols inserted into files intended for display on the world wide web
- piece of programming code inserted into other programming to cause damage
Down
- smallest unit of measurement in
- many functions and calculations that make your computer run
- a device that allows computers to transmit information to each other via ordinary telephone
- a barrier that acts as a security system to protect trusted computer systems
- the brains of your computer
- a programming language that is commonly used in the development of client-server web applications
- read-only memory
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Smart Cities 2018-04-07
Across
- / an event where computer programmers, developers and others gather to collaborate intensively on software projects for a very short time
- / the art of skilful persuasion
- / this group’s needs are at the heart of smart city design
- / obtaining input by enlisting the services of a large number of people
- / algorithm that facilitates the secure and authentic registering of transactions
- / Big Brother is watching you
- / this may be a concern when citizens’ personal data are collected by governments and businesses
- / the largest smart city project in South Korea
Down
- / Michel Foucault views this as a prison symbol of the disciplinary society of surveillance
- / metaphorical understanding of the optimization of cities
- / learn how to prepare for terrorist threats with this app
- / the imaginary of what a smart city wants to be
- / a device which detects or measures a physical property and records, indicates, or otherwise responds to it.
- / the assemblage of people and things that feed data for decision making
- / the technically skilled elite in charge of running the country
- / top ranked country in Juniper Networks’ Smart City Index 2017
16 Clues: / Big Brother is watching you • / the art of skilful persuasion • / the largest smart city project in South Korea • / the imaginary of what a smart city wants to be • / learn how to prepare for terrorist threats with this app • / this group’s needs are at the heart of smart city design • / metaphorical understanding of the optimization of cities • ...
Digital Literacy-Aishani 2024-06-13
Across
- You should regularly do this for your data/photos.
- Tries to open security holes in your computer so a hacker can gain access.
- Keeps track of every key you type and sends it to the hacker.
- When someone gets your personal information.
- Tries to trick you into telling them your passwords or financial information. Usually in an email or through phone calls.
- Blocks you from accessing your files until you pay a ransom
- Computer activities often leave digital...
Down
- Spies on you and steals information.
- Displays ads on your computer.
- Reads everyone’s data that is passing through a network Usually on public WiFi
- A group of computers all being controlled by a remote hacker to perform illegal activity.
- Where your data is housed online, keeping it safe from hard drive failures.
- Protects your computer from malware
- Malicious software that spreads between files on your computer, ruining them or your computer. Replicates itself
- When people steal intellectual property such as movies, music andsoftware.
- Spreads through networks and emails infecting as many computers as possible.
16 Clues: Displays ads on your computer. • Protects your computer from malware • Spies on you and steals information. • Computer activities often leave digital... • When someone gets your personal information. • You should regularly do this for your data/photos. • Blocks you from accessing your files until you pay a ransom • ...
Crossword AMJ'24 2024-08-03
Across
- The type of network configuration that divides a physical network into multiple logical networks.
- The method of subdividing an IP network into smaller segments.
- A screen that appears in Windows to indicate a serious system error.
- A table that lists the MAC addresses associated with each port on a network switch.
- A cloud computing service offered by Microsoft for building and managing applications.
- A protocol used for voice over IP (VoIP) communications.
- A technology used for remote access to applications and desktops.
- A protocol used for multimedia communication, particularly in video conferencing.
- A virtual private network, used for secure communication over the internet.
Down
- A mode in Windows used for troubleshooting by only loading essential drivers.
- The acronym for a protocol that maintains the quality of service in network traffic.
- A protocol used for identity federation and single sign-on.
- The hardware address used to uniquely identify devices on a network.
- A technology used to remotely access applications and desktops from various devices.
- A directory service protocol commonly used with Active Directory.
- A port number typically associated with sending emails via SMTP.
- A tool for managing mobile devices and applications in a corporate environment.
17 Clues: A protocol used for voice over IP (VoIP) communications. • A protocol used for identity federation and single sign-on. • The method of subdividing an IP network into smaller segments. • A port number typically associated with sending emails via SMTP. • A directory service protocol commonly used with Active Directory. • ...
IT Fundamentals Chapter 1 2023-04-10
Across
- creations of the mind that one can own
- the satisfaction of the computer needs that businesses, schools, governments, and other organizations have
- the study of computers and computing concepts
- light emitted from electronic devices
- the use of a company's internet connection for personal use on company time by employees
- the requirement of Internet Service Providers to allow equal access to all web content
- the use of malicious attacks on networks and websites for the purpose of promoting social change
- energy-efficiency in computing devices
- the publishing of another person’s phone number, address, and other personal information on the internet
Down
- machines achieving a level of superintelligence that surpasses our own
- the reduction of potential health problems by transforming employee workspaces
- a network of encrypted content that allows users to engage in untraceable activity
- personal behaviors that build responsibility and trust
- the use of traffic cameras, surveillance footage, and social media postings by law enforcement agencies to prevent crimes before they're actually committed
- the collection and utilization of data
- the use of digital tools to track work, employee performance, and work by companies
16 Clues: light emitted from electronic devices • creations of the mind that one can own • the collection and utilization of data • energy-efficiency in computing devices • the study of computers and computing concepts • personal behaviors that build responsibility and trust • machines achieving a level of superintelligence that surpasses our own • ...
IT_ Deák Lili 2023-12-27
Across
- A person who breaks into computers or computer networks
- A small application designed to run within another application.
- "Shopping ..." is a software used in online shopping.
- A type of malicious software that can self-replicate and spread to other computers.
- A person responsible for maintaining one or more websites.
- ... bank is a financial institution, which offers online banking services.
- Personal Identification Number, used to authenticate the identity of a user.
Down
- An online conversation between two or more people in real time.
- The address of a web page on the world wide web.
- A piece of written, printed, or electronic matter
- Software that is installed on a computer without the user's knowledge.
- Using a mobile phone outside of the range of your own service provider's area.
- A point within a network that acts as an entrance to another network.
- Written or printed material in the form of words or characters.
- A harmful or corrupting program that is designed to damage or disrupt a computer system.
- A word, phrase, or image in a webpage that you can click on to go to another page.
16 Clues: The address of a web page on the world wide web. • A piece of written, printed, or electronic matter • "Shopping ..." is a software used in online shopping. • A person who breaks into computers or computer networks • A person responsible for maintaining one or more websites. • An online conversation between two or more people in real time. • ...
