networks Crossword Puzzles

FAI unit 5 Crossword puzzle 2025-04-30

FAI unit 5 Crossword puzzle crossword puzzle
Across
  1. – Tech company that created GPT models.
  2. – Network inspired by the human brain.
  3. – A computer's ability to identify objects from images. ExpertSystem – Software that mimics human decision-making.
  4. – The opposite of artificial.
  5. – AI field concerned with giving computers the ability to learn. Chatbot – Simulated conversation with a machine.
  6. – A statistical model often used in AI.
  7. – Machines performing tasks requiring human intelligence.
  8. – AI used to detect fraud or spam.
  9. – The “thinking” part of an AI model.
  10. – Type of AI that imitates human behavior.
  11. – Subfield dealing with human language understanding.
  12. – Tech giant that owns DeepMind.
Down
  1. – Siri is an example of this. Alexa – Popular AI voice assistant by Amazon.
  2. – Common AI metric for success.
  3. – Algorithms learn without labeled data in this method.
  4. – A learning method using reward and punishment.
  5. – AI tool for creating deepfakes (Generative Adversarial Network).
  6. – Self-updating AI model from experience.
  7. – Type of learning using labeled data.
  8. – IBM's AI that competed on Jeopardy!
  9. – Common term for computer-generated opponent
  10. – Collection of structured data for training AI.
  11. – Google’s open-source AI framework.
  12. – Creator of the Turing Test.
  13. – AI-based program that plays chess or Go (like AlphaZero).
  14. – A key component of neural networks.
  15. – Common language used in AI development.

27 Clues: – The opposite of artificial.– Creator of the Turing Test.– Common AI metric for success.– Tech giant that owns DeepMind.– AI used to detect fraud or spam.– Google’s open-source AI framework.– IBM's AI that competed on Jeopardy!– A key component of neural networks.– The “thinking” part of an AI model.– Type of learning using labeled data....

FAI - UNIT 5 - CROSSWORD 2025-04-25

FAI - UNIT 5 - CROSSWORD crossword puzzle
Across
  1. Visual layout of multiple plots
  2. Visualization library based on Matplotlib
  3. Content generator using NLP models
  4. AI model used in creative writing
  5. Jasper helps generate this type of content
  6. AI tool that converts spoken words into text
  7. Cloud platform from Amazon
  8. AI task performed in Google Docs via Jasper
  9. Visual plots made using Seaborn
  10. Mathematical model used in AI training
  11. Google’s multimodal AI model
  12. Google’s data and traffic analysis tool
  13. TensorFlow’s high-level API
  14. an open-source computer vision and image processing library.
Down
  1. Device for deploying edge AI
  2. OpenCV supports this type of tracking
  3. AI in vehicles to detect lanes
  4. Transformer model technique used in ChatGPT
  5. AI used in voice assistants like Siri
  6. Visual tool in TensorFlow to track model training
  7. Domain where AI is used to detect fraud
  8. _____enable deep learning models to analyze big data and make accurate predictions.
  9. OpenCV converts this to grayscale
  10. Used in Google Colab for cloud GPU access
  11. Image format output from Matplotlib
  12. PyTorch feature allowing dynamic graphs
  13. AI tool for conversational response generation
  14. AI platform developed by Facebook AI
  15. Common optimization technique in ML
  16. PyTorch supports these neural networks

30 Clues: Cloud platform from AmazonTensorFlow’s high-level APIDevice for deploying edge AIGoogle’s multimodal AI modelAI in vehicles to detect lanesVisual layout of multiple plotsVisual plots made using SeabornAI model used in creative writingOpenCV converts this to grayscaleContent generator using NLP modelsImage format output from Matplotlib...

INF201 Crossword 2025-05-15

INF201 Crossword crossword puzzle
Across
  1. Understanding the cause and scope of an incident
  2. A memory overwrite caused by excessive data input
  3. Isolating affected systems to prevent spread
  4. Cross-functional groups coordinating governance activities
  5. First phase in incident response: planning and readiness
  6. VPN mode used for host-to-host connections
  7. Risk strategy that reduces impact or likelihood
  8. Identifying potential security incidents promptly
  9. Abbreviation for attack where communication is intercepted and altered
  10. Creates a secure tunnel over public networks
  11. What your business loses when public trust is damaged
Down
  1. Internal secure gateway for accessing internal systems
  2. A hardened public-facing system used for secure remote access
  3. Security device that protects web applications from attacks like XSS and SQLi
  4. Risk strategy that eliminates the source of risk entirely
  5. Risk strategy that shifts responsibility to a third party
  6. Risk strategy that takes no action because the risk is tolerable
  7. Restoring normal operations after an incident
  8. Following laws, standards, and internal policies
  9. Removing the threat and fixing vulnerabilities
  10. Database attack that exploits misconfigured input validation
  11. VPN mode used for site-to-site connections
  12. Governance structure that sets strategic security direction

23 Clues: VPN mode used for host-to-host connectionsVPN mode used for site-to-site connectionsIsolating affected systems to prevent spreadCreates a secure tunnel over public networksRestoring normal operations after an incidentRemoving the threat and fixing vulnerabilitiesRisk strategy that reduces impact or likelihood...

Tech Trails: The Ultimate IT Crossword 2025-07-30

Tech Trails: The Ultimate IT Crossword crossword puzzle
Across
  1. A control structure used for repeating a block of code.
  2. The smallest unit of data in computing.
  3. An open-source operating system kernel.
  4. A small, fast memory located close to the CPU.
  5. Software designed to disrupt or damage a computer system.
  6. A cyber-attack that tricks users into giving up sensitive information.
  7. Address A unique string identifying each device on a network.
  8. The standard markup language for creating web pages.
  9. A device that forwards data packets between networks.
  10. A language used to communicate with and manage databases.
  11. Storing and accessing data over the internet instead of a local drive.
Down
  1. A program that converts source code into executable code.
  2. A widely-used, class-based, object-oriented programming language.
  3. A network security system that monitors and controls incoming and outgoing traffic.
  4. An error in a program that prevents it from running correctly.
  5. The blinking indicator showing where the next character will appear on the screen.
  6. A type of computer memory that is volatile and temporary.
  7. The smallest unit of a digital image or display.
  8. A high-level programming language known for its simplicity.
  9. A version control system used for tracking changes in source code.

20 Clues: The smallest unit of data in computing.An open-source operating system kernel.A small, fast memory located close to the CPU.The smallest unit of a digital image or display.The standard markup language for creating web pages.A device that forwards data packets between networks.A control structure used for repeating a block of code....

1st Semester Reinforcement 2.0 2023-01-06

1st Semester Reinforcement 2.0 crossword puzzle
Across
  1. document we check when we're confused on a project
  2. amount of data that can be transmitted in a fixed time period
  3. another great example of an output device
  4. first step in creating a database
  5. a great example of an output device
  6. process of placing one format into another so that it can be delivered
  7. system formed by links
  8. component over which the message travels
  9. raw bits/pieces of information
  10. time it takes to travel from source to destination
  11. responsible for video output
  12. ________ can be linked by networks to share data
  13. a great example of an input device
  14. another great example of an input device
  15. outer edges of document
Down
  1. also known as extenders, regenerate signal so it can be sent further
  2. page orientation that has more room going left and right
  3. responsible for audio output
  4. 11010101000101
  5. act of discarding redundant data
  6. protects data/devices from unauthorized access
  7. involves a "three-way handshake"
  8. uses analog modem to transmit data over telephone lines
  9. the "brain" of the computer
  10. little overhead, less reliable
  11. houses all the components
  12. little helpers that pitch in
  13. what a VPN is best remembered as

28 Clues: 11010101000101system formed by linksouter edges of documenthouses all the componentsthe "brain" of the computerresponsible for audio outputresponsible for video outputlittle helpers that pitch inraw bits/pieces of informationlittle overhead, less reliableact of discarding redundant datainvolves a "three-way handshake"...

TECHNOLOGY RELATED WORDS 2023-03-22

TECHNOLOGY RELATED WORDS crossword puzzle
Across
  1. external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
  2. effective communicators
  3. a set of instructions, data or programs used to operate computers and execute specific tasks
  4. independent learners and collaborative workers
  5. computer program designed to carry out a specific task other than one relating to the operation of the computer itself
  6. devoted catholics
  7. a set of integrated devices that input, output, process, and store data and information
  8. having or showing intelligence, especially of a high level.
  9. outgoing and socially confident
  10. causing laughter or amusement; humorous.
Down
  1. problem solvers and critical thinkers
  2. unable to concentrate because one's mind is preoccupied.
  3. machine that can be programmed to carry out sequences of arithmetic or logical operations
  4. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  5. electrical circuits that have electrical components
  6. an abbreviated form of the word "application."
  7. the manufacturers of computers considered collectively
  8. responsible citizens
  9. a machine resembling a human being and able to replicate certain human movements and functions automatically.
  10. kind and pleasant.

20 Clues: devoted catholicskind and pleasant.responsible citizenseffective communicatorsoutgoing and socially confidentproblem solvers and critical thinkerscausing laughter or amusement; humorous.independent learners and collaborative workersan abbreviated form of the word "application."electrical circuits that have electrical components...

Data Communication 2025-02-11

Data Communication crossword puzzle
Across
  1. __________ allows data to be transmitted at 10-30 bps.
  2. __________ is an example of a system that only allows data to travel at 10-30bps.
  3. ____________ cables have been used in telephone networks for over 100 yrs
  4. __________ cables are actually a bundle of glass fibres that can transmit light.
  5. Data Communication is the ______ transmission of data from a sender to a receiver
  6. _________ allows data transmission at over 8 Mbps,
  7. ____________ is an example of systems that allow data transmission of up to 64Kbps
  8. __________is another name for a communication channel.
  9. The P in VoIP stands for _______ .
  10. _________ is on method of data communication.
Down
  1. ______________are an example of systems that allow data transmission of over 8 Mbps.
  2. This allows data transmission of up to 64Kbps
  3. ______________ signals are not able to use broadcast communication.
  4. _________ is the maximum amount of data that can travel along a communication channel at any given time.
  5. ________ have a distance that ranges from few meters to millions of Kilometers.
  6. This type of communication channel is very convenient.
  7. __________ signals have a very short distance. Range
  8. This type of communication channel uses wires or cables.
  9. ___________ cables carry electronic currents at radio frequencies.
  10. The V in VoIP stands for _______ .

20 Clues: The V in VoIP stands for _______ .The P in VoIP stands for _______ .This allows data transmission of up to 64Kbps_________ is on method of data communication.__________ signals have a very short distance. Range__________ allows data to be transmitted at 10-30 bps.This type of communication channel is very convenient....

Network and Internet 2021-01-02

Network and Internet crossword puzzle
Across
  1. Connects a computer to a network
  2. Can act as a gateway
  3. Aends the transmitted data to all computers
  4. The name of an organisation maintaining the site
  5. Acts as the mediator in a network
  6. Key device within a client-server network
  7. This server can also act as a data filter
  8. This server checks usernames & passwords
  9. Server which manage files on the network
  10. Used to amplify the signal in a network
  11. A program or hardware device that filters the information coming through the Internet
  12. Modulate and demodulate the signals
Down
  1. Method of scrambling data to ensure security
  2. The global network
  3. Link a web page to another page
  4. To view files on the web, you need this
  5. Method used to track a device on a network
  6. Dynamic address
  7. This allows devices with Wi-Fi connectivity to connect to wired networks
  8. Provides the internet facility
  9. One million bits equals to how many Megabytes
  10. This server is used to keep installed all the programs, software, etc.
  11. Connects two different types of network
  12. This software prevents users from accessing inappropriate information
  13. Changing static address

25 Clues: Dynamic addressThe global networkCan act as a gatewayChanging static addressProvides the internet facilityLink a web page to another pageConnects a computer to a networkActs as the mediator in a networkModulate and demodulate the signalsTo view files on the web, you need thisConnects two different types of network...

Banking Terminologies 2025-09-14

Banking Terminologies crossword puzzle
Across
  1. Official complaint raised by a customer.
  2. ATM card that allows you to pay for goods at stores or businesses, online.
  3. Paying for a product or service
  4. a record of any financial exchange
  5. Government agency insuring deposits up to $250,000.
  6. Moving funds from one account to another.
  7. Banks providing funds to a customer.
  8. Platform used for banking using internet.
  9. Contains info about credit history. Lenders use these reports to make lending decisions.
  10. Money earned on deposits or paid on loans.
  11. A customer repaying a loan.
Down
  1. Criminal act done using computers and networks.
  2. A loan secured by real estate. .
  3. Occurs when you spend more money than you have.
  4. form of automatic payment.
  5. Financial cooperatives that provide traditional banking services to their members.
  6. Charters, regulates, and supervises all national banks and federal savings associations.
  7. secret number that protects the security of an account.
  8. Protects consumers by enforcing federal consumer financial laws and providing education.
  9. Adding money to an account.
  10. Taking money out of an account.
  11. Card that allows you to spend up to a specific limit
  12. Annual rate that is charged for borrowing.
  13. Verification process for a customer.
  14. Charges for specific banking services.

25 Clues: form of automatic payment.Adding money to an account.A customer repaying a loan.Paying for a product or serviceTaking money out of an account.A loan secured by real estate. .a record of any financial exchangeBanks providing funds to a customer.Verification process for a customer.Charges for specific banking services....

RU ITEC411-Chapter 5 Crime and Security 2025-10-22

RU ITEC411-Chapter 5 Crime and Security crossword puzzle
Across
  1. Published false statement that damages someone's reputation
  2. Self replicating malicious software that spreads through networks automatically
  3. Highly sophisticated computer worm that targeted Iranian facilities
  4. Identity theft technique using text messages to obtain financial information
  5. Security system that monitors and filters network traffic from suspicious sources
  6. Security incident where unauthorized parties access protected systems or data
  7. International organization whose members agree on cross-border trade and service rules
  8. Unauthorized access to computer systems without permission
  9. Legal term describing unauthorized computer system entry
  10. Using computer techniques to promote political causes
  11. Converting data into coded format to protect stolen information from being useful
Down
  1. Authentication method using unique biological characteristics like fingerprints
  2. Scientific process of retrieving digital evidence from computers and storage devices
  3. Fraudulent emails disguised as legitimate communications to steal personal information
  4. Exposing security flaws or wrongdoing within an organization
  5. Verifying the identity of users or the legitimacy
  6. Decoy website set up to attract and study hacker behavior
  7. Cyber attack using false websites planted in domain name servers to collect data
  8. Federal law passed in 1984 making unauthorized computer access illegal
  9. Voice based fraud method where criminals call victims pretending to be legitimate businesses

20 Clues: Verifying the identity of users or the legitimacyUsing computer techniques to promote political causesLegal term describing unauthorized computer system entryDecoy website set up to attract and study hacker behaviorUnauthorized access to computer systems without permissionPublished false statement that damages someone's reputation...

Science Branches 2025-11-15

Science Branches crossword puzzle
Across
  1. Study of adaptive and innate defense networks regulating host protection
  2. Structural analysis of organismal morphology from macroscopic to microstructural levels
  3. Physics branch exploring propagation, refraction, and quantum behavior of photons
  4. Study of fungal evolution, pathogenicity, and ecological roles within ecosystems
  5. Science concerned with biotic–abiotic interactions shaping ecosystem dynamics
  6. Application of physical laws to stellar, galactic, and cosmological phenomena
  7. Field investigating mechanisms of inheritance and molecular transmission of traits
  8. Science assessing biochemical impacts of xenobiotics and exposure-related risk
  9. Science interpreting functional mechanisms of biological systems across scales
  10. Characterization of crystalline structures, mineral genesis, and geochemical properties
Down
  1. Study of lithospheric composition, stratification, and transformative Earth processes
  2. Field specializing in unicellular and acellular organisms and their biochemical pathways
  3. Interdisciplinary exploration of marine systems, including chemical cycles and currents
  4. Biological discipline focused on photosynthetic taxa and plant phylogeny
  5. Reconstruction of prehistoric biodiversity through fossil stratigraphy and morphology
  6. Investigation of molecular reactions sustaining cellular metabolism and regulation
  7. Atmospheric science examining thermodynamic patterns governing climate and weather
  8. Study of multicellular heterotrophs within the animal kingdom and their diversity
  9. Science interpreting crustal stress patterns through seismic wave analysis
  10. Discipline that analyzes extragalactic phenomena and cosmic evolution

20 Clues: Discipline that analyzes extragalactic phenomena and cosmic evolutionBiological discipline focused on photosynthetic taxa and plant phylogenyStudy of adaptive and innate defense networks regulating host protectionScience interpreting crustal stress patterns through seismic wave analysis...

Unit 7 Crossword 2026-04-10

Unit 7 Crossword crossword puzzle
Across
  1. Promoting human wellfare through money donations or good deeds
  2. Legally assigning an adult the role of guardian to care and decide for another
  3. Giving up one thing for anothe
  4. Named in the will and tasked with carrying out its contents
  5. A portion of income set aside for future emergencies or short-term expenses
  6. Buying assets to generate income over time, involving risk
  7. Provides insight for titling wills and other legal documents
  8. A non-legal document that instructs what to do when the writer cannot make decisions
  9. Selfless concern for others' well-being
  10. An organization offering aid and raising money for those in need
Down
  1. Value from personal relationships and social networks
  2. Refers to anything that is required to produce goods and services
  3. Determines net worth and sees tax advantages
  4. The cost of something, often based on money
  5. The will owner, often deceased
  6. Non-government organizations for social purposes rather than profit
  7. Diversifies investments and protects assets
  8. Determines the guardian and money flow that the court would've decided otherwise
  9. A plan to care for some one that cannot care for themself
  10. A broadcast issued by government or non-profit organizations to raise awareness on an issue

20 Clues: Giving up one thing for anotheThe will owner, often deceasedSelfless concern for others' well-beingThe cost of something, often based on moneyDiversifies investments and protects assetsDetermines net worth and sees tax advantagesValue from personal relationships and social networksA plan to care for some one that cannot care for themself...

Computer Networks 2015-01-04

Computer Networks crossword puzzle
Across
  1. Works as signal Amplifier
Down
  1. Responsible for modulation/Demodulation
  2. Which topology routing of datapacket is possible

3 Clues: Works as signal AmplifierResponsible for modulation/DemodulationWhich topology routing of datapacket is possible

The journey of food 2024-03-18

The journey of food crossword puzzle
Across
  1. What factors affect farmers' choices of crops or livestock?
  2. role does marketing play in shaping consumer behaviour when they consume food?
  3. What are some activities involved in food production?
  4. concern What influences consumers' food choices, such as taste, culture, or dietary needs?
  5. need How do consumers make decisions about what foods to buy and eat?
  6. How does the environment impact food production?
Down
  1. What challenges are faced in distributing perishable versus non-perishable foods?
  2. What methods are used to distribute food, and how do they vary by food type?
  3. How does food packaging and presentation affect consumer decisions?
  4. How do farmers ensure the quality and safety of their products during production?
  5. food How do distribution networks ensure efficient and safe delivery of food?
  6. What is the role of transportation and logistics in food distribution?

12 Clues: What are some activities involved in food production?How does the environment impact food production?What factors affect farmers' choices of crops or livestock?How does food packaging and presentation affect consumer decisions?What is the role of transportation and logistics in food distribution?...

Computer Newtwork Puzzle 2023-02-07

Computer Newtwork Puzzle crossword puzzle
Across
  1. two or more devices connected together exchange data
  2. Computer networks that are not connected by and cable.
  3. The maximum amount of data transmitted over an internet connection in a given amount of time
  4. A cable which connects two or more devices to share
  5. Devices that are linked with each other by a cable.
Down
  1. transfer of data from one digital device to another
  2. Broadcasts data to every computer or Ethernet based devices connected with it
  3. A computer program or device that provides a service to another computer program and its user
  4. Rules about transmitting data between different devices on the same network.
  5. Copper cables or fibre optic cable to form the connections between the networked devices
  6. recieves and sends data
  7. exchange of computer-stored messages from one user to one or more recipients via the internet

12 Clues: recieves and sends datatransfer of data from one digital device to anotherA cable which connects two or more devices to shareDevices that are linked with each other by a cable.two or more devices connected together exchange dataComputer networks that are not connected by and cable....

Unit 5 - Interdependence 2025-05-23

Unit 5 - Interdependence crossword puzzle
Across
  1. Term for the world seen as a community connected by technology and communication (2 words)
  2. Relationships influencing power, policy, and governance across nations (2 words)
  3. Relationships between people and natural ecosystems (2 words)
  4. A person who moves to another country to live permanently (1 word)
  5. Bonds formed through shared art, language, traditions, or beliefs (2 words)
Down
  1. Someone forced to flee their country due to conflict or persecution (1 word)
  2. Links between people, places, and economies worldwide (2 words)
  3. A person's perspective shaped by culture, experience, and belief (1 word)
  4. The routes and networks that link global transportation and tourism (2 words)
  5. Links formed through the exchange of goods and services between countries (2 words)
  6. People who see the world as a shared community and take responsibility beyond borders (2 words)
  7. Polluted precipitation that damages forests and waterways (2 words)

12 Clues: Relationships between people and natural ecosystems (2 words)Links between people, places, and economies worldwide (2 words)A person who moves to another country to live permanently (1 word)Polluted precipitation that damages forests and waterways (2 words)A person's perspective shaped by culture, experience, and belief (1 word)...

Azure Core Day of Learning | March 2023-03-14

Azure Core Day of Learning | March crossword puzzle
Across
  1. ----- -------- Reinforcement Learning method was used to transform GPT to chatGPT.
  2. Microsoft and this company have agreed to a 10-year partnership to bring Xbox PC games
  3. Inventor of Paxos Algorithm
  4. Project name for Azure Global Erasure coding support
  5. An open-source package manager, designed to enable developers to share reusable code
  6. A work item logged on partner teams in Microsoft during semester planning
Down
  1. This company is the creator of popular image generation tool Dall-E and the chatbot ChatGPT
  2. Number of ERGs that Microsoft has globally
  3. A venture-backed data center chip startup, recently acquired by Microsoft
  4. ----- language models are computer programs for natural language processing that use deep learning and neural networks, like GPT-3
  5. The, now deprecated, dedicated Azure datacenter for German tenants
  6. Which attention based architecture is used to build GPT?

12 Clues: Inventor of Paxos AlgorithmNumber of ERGs that Microsoft has globallyProject name for Azure Global Erasure coding supportWhich attention based architecture is used to build GPT?The, now deprecated, dedicated Azure datacenter for German tenantsA venture-backed data center chip startup, recently acquired by Microsoft...

2ο Κεφ.10 2024-10-11

2ο  Κεφ.10 crossword puzzle
Across
  1. Οι εφαρμογές παρέχουν την δυνατότητα πληρωμών και .......... μέσω του διαδικτύου
  2. Ποια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις)
  3. Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις)
  4. Με ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή
  5. Ποια είναι η κυριότερη υπηρεσία Διαδικτύου που αφορά στην επικοινωνία μεταξύ χρηστών (2 λέξεις)
  6. Ποια είναι μία κατηγορία υποδίκτυου
Down
  1. Αυτή έχει ενσωματωθεί ως λειτουργία σε εφαρμογές τηλεφωνίας και βιντεοκλήσεων (2 λέξεις)
  2. Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τους
  3. Οι εγγενείς εφαρμογές,οι οποίες εκτελούνται αυτόνομα με την βοήθεια του.....................(2 λέξεις)
  4. Τι έχει αναπτυχθεί για την πιο εύκολη πλοήγηση του διαδικτύου,που εκτελούνται μέσω του προγράμματος πλοήγησης
  5. Πώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένου
  6. Τα P2P-(peer to peer networks) παρέχουν κυρίως υπηρεσίες ανταλλαγής.......

12 Clues: Ποια είναι μία κατηγορία υποδίκτυουΠώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένουΠοια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις)Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις)Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τουςΜε ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή...

U11 - Review Cyber Security Plan, Constraints & Test Plan 2025-11-17

U11 - Review Cyber Security Plan, Constraints & Test Plan crossword puzzle
Across
  1. (6,3,8) A type of testing ensures data can be restored.
  2. (11,7) Simulate attacks to find weaknesses.
  3. (5,3,16) as part of the CSP who manages security, audits, and response.
  4. This part of the CSP ensures confidentiality, integrity, and availability of information.
  5. (6,7) A type of testing that verifies permissions and authentication.
Down
  1. This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
  2. (13,8) Automated tools to detect flaws.
  3. These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
  4. (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
  5. (5,8,4) (CSP) This outlines how to protect systems, data, and networks
  6. Defines which systems, applications, and data are covered in the CSP.
  7. (4,4) This ensures the security measures work as intended.

12 Clues: (13,8) Automated tools to detect flaws.(11,7) Simulate attacks to find weaknesses.(6,3,8) A type of testing ensures data can be restored.(4,4) This ensures the security measures work as intended.Defines which systems, applications, and data are covered in the CSP.(6,7) A type of testing that verifies permissions and authentication....

Kret Tkacik 2021-05-04

Kret Tkacik crossword puzzle
Across
  1. It is hardware or software — that protects your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer
  2. Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment.
  3. Local Area Network – home network
Down
  1. Receives a network signal, cleans and regenerates it.
  2. Wide Area Network – Internet
  3. Creates networks and connects devices.

6 Clues: Wide Area Network – InternetLocal Area Network – home networkCreates networks and connects devices.Receives a network signal, cleans and regenerates it.Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment....

Tic-Tac-Toe Vocabulary 2015-04-27

Tic-Tac-Toe Vocabulary crossword puzzle
Across
  1. a group of connected computers
  2. software used to view the Internet
  3. the unauthorized use, reproduction, distribution, or transmission of copyrighted material
Down
  1. network etiquette; Online manners; following the rules online, being a good digital citizen
  2. a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  3. Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  4. text or graphics that, when clicked, will connect the user to a new web page or another place
  5. a restricted computer network; a private network created using World Wide Web software

8 Clues: a group of connected computerssoftware used to view the Interneta restricted computer network; a private network created using World Wide Web softwarethe unauthorized use, reproduction, distribution, or transmission of copyrighted materialnetwork etiquette; Online manners; following the rules online, being a good digital citizen...

Macie Dyson - Tech Concepts - 4th Period 2016-10-26

Macie Dyson - Tech Concepts - 4th Period crossword puzzle
Across
  1. The study or use of systems (especially computers) for storing, retrieving, and sending information
  2. A networking device that forwards data packets between computer networks
Down
  1. Network is created when two or more computers are connected and share resources without going through a separate computer
  2. Typically networked and more powerful than a personal computer
  3. A networking hardware device that allows a Wi-Fi to connect to a wired network
  4. A computer networking that connects devices together on a computer
  5. A common connection point for devices in a network

7 Clues: A common connection point for devices in a networkTypically networked and more powerful than a personal computerA computer networking that connects devices together on a computerA networking device that forwards data packets between computer networksA networking hardware device that allows a Wi-Fi to connect to a wired network...

Cyber Security 2021-02-12

Cyber Security crossword puzzle
Across
  1. A set of secret characters, that only you know, to keep your private information secure.
  2. A malicious form of self replicating
  3. Someone that tries to gain access to your personal information or devices.
  4. Short for malicious software, that gains access to your computer or device
Down
  1. are able to exploit vulnerabilities in the a computers operating system or a networks hardware
  2. Gathers information about how you use your computer
  3. A word that people use to tell them that no one else knows

7 Clues: A malicious form of self replicatingGathers information about how you use your computerA word that people use to tell them that no one else knowsSomeone that tries to gain access to your personal information or devices.Short for malicious software, that gains access to your computer or device...

CYB 2024-05-07

CYB crossword puzzle
Across
  1. the term used for various pop-up advertisements that show up on your computer or mobile device
  2. malware that holds a victim's data unless the victim pays a ransom to the attacker
  3. malware, that spreads between computers and causes damage to data and software
  4. malicious software that spies on the victim
Down
  1. malware that downloads onto a computer disguised as a legitimate program
  2. the practice of protecting systems, networks, and programs from digital attacks
  3. a type of malware that can automatically self-replicate without human interaction

7 Clues: malicious software that spies on the victimmalware that downloads onto a computer disguised as a legitimate programmalware, that spreads between computers and causes damage to data and softwarethe practice of protecting systems, networks, and programs from digital attacks...

Internet 2023-01-16

Internet crossword puzzle
Across
  1. A collection of pages of information connected to each other.
  2. Use to connect different web pages of the website.
Down
  1. A bigger network of many computer networks connected across the world.
  2. A single page of the website.
  3. The unique address of the website that specified its location on the internet.

5 Clues: A single page of the website.Use to connect different web pages of the website.A collection of pages of information connected to each other.A bigger network of many computer networks connected across the world.The unique address of the website that specified its location on the internet.

Week 4 Vocab 2023-08-25

Week 4 Vocab crossword puzzle
Across
  1. land or sea networks for the buying and selling of goods (silk road)
  2. the condition of being alone (seclude)
  3. the process of identifying and evaluating a document (evaluating)
Down
  1. the adoption of idea by one culture from another (spread).
  2. a person who trades in goods produced by other people (trader)

5 Clues: the condition of being alone (seclude)the adoption of idea by one culture from another (spread).a person who trades in goods produced by other people (trader)the process of identifying and evaluating a document (evaluating)land or sea networks for the buying and selling of goods (silk road)

TECT TIMES CROSSWORD 2021-11-01

TECT TIMES CROSSWORD crossword puzzle
Across
  1. allows a computer to send and receive data over A telephone line or a cable or satellite connection
  2. does ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets.
  3. electronic device that amplifies the signal it receives.
  4. connects two subnetworks as a part of the same network
Down
  1. used to combine, split,switch, boost or direct packets of information along a network
  2. a physical layer networking device that joins multiple networks together
  3. used to connect multiple network hosts as well as to do data transfer.

7 Clues: connects two subnetworks as a part of the same networkelectronic device that amplifies the signal it receives.used to connect multiple network hosts as well as to do data transfer.a physical layer networking device that joins multiple networks togetherdoes ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets....

Chemical Bonds Crossword Puzzle 2021-12-02

Chemical Bonds Crossword Puzzle crossword puzzle
Across
  1. bonds that transfer electrons
  2. In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
  3. formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
  4. bond The bond that can hold atoms together in large networks or small groups.
Down
  1. Two or more atoms held together by covalent bonds.
  2. The bond that can hold atoms together in large networks or small groups.
  3. A substance made of atoms of two or more elements.
  4. bonds that share electrons

8 Clues: bonds that share electronsbonds that transfer electronsTwo or more atoms held together by covalent bonds.A substance made of atoms of two or more elements.The bond that can hold atoms together in large networks or small groups.bond The bond that can hold atoms together in large networks or small groups....

Tan Su Kyi - 8 Gamma 2023-01-19

Tan Su Kyi - 8 Gamma crossword puzzle
Across
  1. An app where you use to communicate and call with your friend.
  2. We should _________ our password once a year.
  3. You have the _________ to find out what information the government & other organisations store about you.
Down
  1. It is a practice of protecting systems, networks & programs from digital attacks.
  2. Created when that data has been processed and become meaningful.
  3. A social media app that you can connect with friends, family and other people you know.
  4. Any company might hold your ________ information that you have in your account.

7 Clues: We should _________ our password once a year.An app where you use to communicate and call with your friend.Created when that data has been processed and become meaningful.Any company might hold your ________ information that you have in your account.It is a practice of protecting systems, networks & programs from digital attacks....

Computer Networking 2023-04-02

Computer Networking crossword puzzle
Across
  1. a computer or computer program which manages access to a centralized resource or service in a network
  2. physical element of a computer
  3. a global computer network providing a variety of information and communicating facilities, consisting of interconnected networks using standardized communication protocols
Down
  1. string of characters used to verify the identity of a user during the authentication process
  2. machine that can store and process information
  3. programs and other operating information used by a computer
  4. facts and statistics collected together for reference or analysis

7 Clues: physical element of a computermachine that can store and process informationprograms and other operating information used by a computerfacts and statistics collected together for reference or analysisstring of characters used to verify the identity of a user during the authentication process...

Network management 2023-08-17

Network management crossword puzzle
Across
  1. A security device or software that filters incoming and outgoing network traffic
  2. The maximum data rate that a network or internet connection can handle
Down
  1. A security system that monitors network traffic for suspicious activities
  2. A network monitoring tool
  3. The delay between sending data from a source and receiving it at the destination, often measured in milliseconds (ms)
  4. A secure connection between remote networks or devices over a public network
  5. A system that translates human-readable domain names (like www.example.com) into IP addresses

7 Clues: A network monitoring toolThe maximum data rate that a network or internet connection can handleA security system that monitors network traffic for suspicious activitiesA secure connection between remote networks or devices over a public networkA security device or software that filters incoming and outgoing network traffic...

bbb 2023-09-12

bbb crossword puzzle
Across
  1. To do something you really wanted to do.
  2. How you are liked, admired, supported by many people.
  3. To sing, dance, act, read a poem, etc. in front of people.
  4. Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
Down
  1. To organized people or things into a group or body.
  2. The first public appearance of a new product or show
  3. media Websites and apps (applications) that that let people create and share things online, or to join social networks.

7 Clues: To do something you really wanted to do.To organized people or things into a group or body.The first public appearance of a new product or showHow you are liked, admired, supported by many people.To sing, dance, act, read a poem, etc. in front of people.Made a song, movie or recording available for people to buy or listen to, read, watch, etc....

nmm 2023-09-17

nmm crossword puzzle
Across
  1. To do something you really wanted to do.
  2. How you are liked, admired, supported by many people.
  3. Media websites and apps (applications) that that let people create and share things online, or to join social networks.
  4. Organized people or things into a group or body.
Down
  1. Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
  2. The first public appearance of a new product or show.
  3. To sing, dance, act, read a poem, etc. in front of people.

7 Clues: To do something you really wanted to do.Organized people or things into a group or body.The first public appearance of a new product or show.How you are liked, admired, supported by many people.To sing, dance, act, read a poem, etc. in front of people.Made a song, movie or recording available for people to buy or listen to, read, watch, etc....

Cyber Attack Crossword 2024-09-03

Cyber Attack Crossword crossword puzzle
Across
  1. A standalone malware that spreads over networks without needing to attach to other programs.
  2. A broad term encompassing any malicious software, including viruses, worms, Trojans, ransomware, spyware, and adware.
  3. Malware that secretly collects information about the user's activities and sends it to a third party.
Down
  1. Malware that encrypts files and demands payment to unlock them.
  2. Self-replicating software that attaches itself to other programs and spreads when those programs are executed.
  3. Malware disguised as legitimate software to trick users into installing it.
  4. Malware that displays unwanted advertisements.

7 Clues: Malware that displays unwanted advertisements.Malware that encrypts files and demands payment to unlock them.Malware disguised as legitimate software to trick users into installing it.A standalone malware that spreads over networks without needing to attach to other programs....

sams networks computer 2018-06-21

sams networks computer crossword puzzle
Across
  1. what are we doing in computer science
  2. what were u watching in the cinema
Down
  1. what were you eating in the cinema
  2. what did someone call you in the crowd

4 Clues: what were you eating in the cinemawhat were u watching in the cinemawhat are we doing in computer sciencewhat did someone call you in the crowd

Global Markets - A2 Business 2021-01-24

Global Markets - A2 Business crossword puzzle
Across
  1. Where a business function is contracted to a third party
  2. The cost of one currency expressed in terms of another
  3. This could be extended by selling a product in a new economy, such as an emerging or developing economy
Down
  1. Communication and transport networks
  2. occurs when a business relocates part of its business operations overseas
  3. A group of countries that agree to have low or no restrictions on trade, such as tariffs
  4. this body may give financial incentives to firms to start up in their own country

7 Clues: Communication and transport networksThe cost of one currency expressed in terms of anotherWhere a business function is contracted to a third partyoccurs when a business relocates part of its business operations overseasthis body may give financial incentives to firms to start up in their own country...

VOCABULARY 2.01 2018-05-22

VOCABULARY 2.01 crossword puzzle
Across
  1. The use of computer technology to plan, design, test, and alter products
  2. A navigational system that uses satellite technology to determine location and provide directions
  3. Computerized storage for information and facts
Down
  1. Computer software designed to mimic the knowledge of a human expert
  2. The use of computer software to control machines, tools, and processes involved in manufacturing products
  3. The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
  4. Technology that allows users to communicate over the Internet rather than through traditional public networks

7 Clues: Computerized storage for information and factsComputer software designed to mimic the knowledge of a human expertThe use of computer technology to plan, design, test, and alter productsA navigational system that uses satellite technology to determine location and provide directions...

Tic-Tac-Toe Vocabulary 2015-04-27

Tic-Tac-Toe Vocabulary crossword puzzle
Across
  1. a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  2. software used to view the Internet
  3. the unauthorized use, reproduction, distribution, or transmission of copyrighted material
  4. Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
  1. a group of connected computers
  2. network etiquette; Online manners; following the rules online, being a good digital citizen
  3. text or graphics that, when clicked, will connect the user to a new web page or another place
  4. a restricted computer network; a private network created using World Wide Web software

8 Clues: a group of connected computerssoftware used to view the Interneta restricted computer network; a private network created using World Wide Web softwarethe unauthorized use, reproduction, distribution, or transmission of copyrighted materialnetwork etiquette; Online manners; following the rules online, being a good digital citizen...

IT acronyms 2023-10-16

IT acronyms crossword puzzle
Across
  1. /A unit of measurement for internet speed or data transfer rate.
  2. /A domain-specific language used for managing and querying relational databases.
  3. / Software that manages computer hardware and provides services for computer programs.
  4. /A system that translates domain names into IP addresses, allowing internet navigation
Down
  1. /A coding language used for creating web pages and content on the internet.
  2. /A secure network connection that protects data while using public networks.
  3. /A type of data storage device that uses flash memory, typically faster and more durable than traditional hard drives

7 Clues: /A unit of measurement for internet speed or data transfer rate./A coding language used for creating web pages and content on the internet./A secure network connection that protects data while using public networks./A domain-specific language used for managing and querying relational databases....

Fortinet: Crack the Code 2024-06-04

Fortinet: Crack the Code crossword puzzle
Across
  1. a tool for analyzing and reporting on network events and security logs.
  2. a network switch that connects and manages data traffic within a network.
  3. a security token that provides two-factor authentication for securing user access.
  4. a centralized management system for controlling all your fortigate devices and policies.
Down
  1. a system that manages user identity and access privileges across a network.
  2. a security appliance that acts as a firewall to protect networks from external threats.
  3. a cloud-based service that provides secure access to network resources from anywhere.

7 Clues: a tool for analyzing and reporting on network events and security logs.a network switch that connects and manages data traffic within a network.a system that manages user identity and access privileges across a network.a security token that provides two-factor authentication for securing user access....

7.1 Why Is Clean Water Important to Us? 2021-03-25

7.1 Why Is Clean Water Important to Us? crossword puzzle
Across
  1. Rain falls on networks of drains, river and canals which will then be channelled here.
  2. A method used to remove salt from seawater and turns it into drinking water.
  3. A process which green plants use water, sunlight and carbon dioxide to make food.
  4. A method to collcet water vapour from seawater in desalination.
  5. not drinking enough of water may lead to ____.
Down
  1. Produced by recycling used water and is used mainly for industrial purposes.
  2. Water is found in our ____ to transport substances in our circulatory system.
  3. The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
  4. ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
  5. One of the Four National Taps are ___ water.
  6. Supports life processes.

11 Clues: Supports life processes.One of the Four National Taps are ___ water.not drinking enough of water may lead to ____.A method to collcet water vapour from seawater in desalination.Produced by recycling used water and is used mainly for industrial purposes.A method used to remove salt from seawater and turns it into drinking water....

Disney concepts on Race and Animation 2024-05-03

Disney concepts on Race and Animation crossword puzzle
Across
  1. Films fictionalized storyworld of ethnoracial identity
  2. The drag queen that Ursula in The Little Mermaid is based on
  3. Princess characters who are passive in their stories by doing chores and waiting for a prince to save them
  4. The 1997 Cinderella film was made-for-TV cast screen opportunities
  5. A quality of Disney princesses that enables them the feel "timeless" despite societal changes
  6. A transitional period for Dinsey Studios after the loss of the Disney brothers
  7. Description of how black women are a result of "racialized and sexualized violence"
  8. Princess takes herself an active role in the film as a disruption
Down
  1. A robust period of innovation in amination
  2. A better representation of women of color "through the implementation of networks"
  3. Representation of Asia through a Western construction

11 Clues: A robust period of innovation in aminationRepresentation of Asia through a Western constructionFilms fictionalized storyworld of ethnoracial identityThe drag queen that Ursula in The Little Mermaid is based onPrincess takes herself an active role in the film as a disruptionThe 1997 Cinderella film was made-for-TV cast screen opportunities...

Humanities 2023-09-27

Humanities crossword puzzle
Across
  1. cortex, regulates our thoughts, actions and emotions
  2. system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
  3. lack of success
  4. A problem with emotional or behavioral self-control
  5. It can treat inflammation
Down
  1. mindset, A growth mindset means that you thrive on challenge
  2. Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
  3. stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
  4. a typical example or pattern of something
  5. It can cause or strengthen labor contractions during childbirth
  6. mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature

11 Clues: lack of successIt can treat inflammationa typical example or pattern of somethingA problem with emotional or behavioral self-controlcortex, regulates our thoughts, actions and emotionsmindset, A growth mindset means that you thrive on challengeIt can cause or strengthen labor contractions during childbirth...

Course2 Crossword Puzzle 2022-02-23

Course2 Crossword Puzzle crossword puzzle
Across
  1. Data packets in Ethernet layer are known as _____
  2. The least intelligent of the three hardware devices and is used for connecting computers within a single network
  3. 48 bit address that is a globally unique identifier attached to an individual network interface
  4. TCP/IP is a _____ layered model
  5. Twisted pair cable is an example of _____ layer in TCP/IP model
  6. A protocol most widely used to send data across individual links, belongs to data link layer
Down
  1. An address that is all F's
  2. The most intelligent connecting device used to connect two or more networks
  3. Hardware device that sends traffic to the appropriate computer rather than sending it to all the connected computers
  4. Radio technology is an example of _____ communication
  5. _____ duplex means communication in both the directions at the same time

11 Clues: An address that is all F'sTCP/IP is a _____ layered modelData packets in Ethernet layer are known as _____Radio technology is an example of _____ communicationTwisted pair cable is an example of _____ layer in TCP/IP model_____ duplex means communication in both the directions at the same time...

Neuroanatomy of the Spinal Cord 2024-02-03

Neuroanatomy of the Spinal Cord crossword puzzle
Across
  1. The ____ reflex is a negative feedback loop used to maintain muscle at a desired length
  2. velocity-dependent resistance to movement in a single direction
  3. An abnormal reflex as a result of damage to the descending pathway or UMN syndrome
  4. the coordination of body movements to successfully navigate the environment
  5. loss or absence of stretch reflex
Down
  1. high resting state of tension accompanied by exaggeration of stretch reflex
  2. Spinal reflexes modulated by_____ control
  3. Networks of interneurons located in the thoracic and lumbar spinal cord that act as pattern generators for rhythmic movements associated with walking (abbreviation)
  4. low resting state of tension accompanied by reduction of stretch reflex
  5. what we call the neurons giving rise to the descending pathways
  6. located in spinal cord ventral horns and the motor nuclei of cranial nerves in the brainstem

11 Clues: loss or absence of stretch reflexSpinal reflexes modulated by_____ controlvelocity-dependent resistance to movement in a single directionwhat we call the neurons giving rise to the descending pathwayslow resting state of tension accompanied by reduction of stretch reflexhigh resting state of tension accompanied by exaggeration of stretch reflex...

Cybercrime Crossword Puzzle 2021-07-13

Cybercrime Crossword Puzzle crossword puzzle
Across
  1. Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
  2. interception Interception made by technical means without right.
  3. is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
  4. Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
  5. is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
  6. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  7. is an electronic data storage device used for storing digital information typically using flash memory.
  8. includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
  9. is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
  10. when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
  11. a string of characters that allows access to a computer system or service.
  12. Intentional alteration or reckless interference with the functioning of a computer or computer network.
  13. It is offense against the confidentiality integrity and availability of computer data and systems.
  14. It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
  15. Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
  16. A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
  17. is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
  18. is a data storage device that includes flash memory with an integrated USB interface.
  19. the process of converting encrypted information back into normal, understandable text.
  20. what comes after terabyte
  21. Intentional or reckless alteration damaging deletion of computer data.
  22. is a concept describing a widespread interconnected digital technology.
  23. refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
Down
  1. It is when an individual or entity discloses to third party personal information.
  2. is a hacker who violates computer security for their own personal profit or out of malice.
  3. is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
  4. is data that describes other data.
  5. protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
  6. what comes after zettabyte.
  7. is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
  8. protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
  9. Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
  10. It is when an individual or entity with malice or in bad faith.
  11. sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
  12. is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
  13. is a form of bullying or harassment using electronic means.
  14. is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
  15. measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
  16. information of an individual in any container for trash collection.
  17. is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
  18. 10175 An act defining cybercrime providing for the prevention.
  19. is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
  20. is pornography that exploits children for sexual stimulation
  21. a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
  22. global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  23. Generally used to refer to someone who gains access to a system, software, or hardware without permission
  24. Access to the whole or any part of a computer system without right.
  25. Malicious software, such as a virus or a worm, that attacks a target computer.
  26. is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
  27. an application that allows the sending of messages between computer users via a network.

50 Clues: what comes after terabytewhat comes after zettabyte.is data that describes other data.is a form of bullying or harassment using electronic means.is pornography that exploits children for sexual stimulation10175 An act defining cybercrime providing for the prevention.It is when an individual or entity with malice or in bad faith....

7.1 Why Is Clean Water Important to Us? 2021-03-25

7.1 Why Is Clean Water Important to Us? crossword puzzle
Across
  1. Rain falls on networks of drains, river and canals which will then be channelled here.
  2. A method used to remove salt from seawater and turns it into drinking water.
  3. A process which green plants use water, sunlight and carbon dioxide to make food.
  4. A method to collcet water vapour from seawater in desalination.
  5. not drinking enough of water may lead to ____.
Down
  1. Produced by recycling used water and is used mainly for industrial purposes.
  2. Water is found in our ____ to transport substances in our circulatory system.
  3. The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
  4. ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
  5. One of the Four National Taps is ___ water.
  6. Supports life processes.

11 Clues: Supports life processes.One of the Four National Taps is ___ water.not drinking enough of water may lead to ____.A method to collcet water vapour from seawater in desalination.Produced by recycling used water and is used mainly for industrial purposes.A method used to remove salt from seawater and turns it into drinking water....

Humanities 2023-09-27

Humanities crossword puzzle
Across
  1. system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
  2. Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
  3. mindset, A growth mindset means that you thrive on challenge
  4. lack of success
  5. It can treat inflammation
  6. a typical example or pattern of something
Down
  1. A problem with emotional or behavioral self-control
  2. mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
  3. stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
  4. It can cause or strengthen labor contractions during childbirth
  5. cortex, regulates our thoughts, actions and emotions

11 Clues: lack of successIt can treat inflammationa typical example or pattern of somethingA problem with emotional or behavioral self-controlcortex, regulates our thoughts, actions and emotionsmindset, A growth mindset means that you thrive on challengeIt can cause or strengthen labor contractions during childbirth...

Teaching in the New Millenia 2023-09-17

Teaching in the New Millenia crossword puzzle
Across
  1. Worldwide system of computer networks
  2. external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
  3. Applications,set of instructions, data or programs used to operate computers and execute specific tasks
  4. a product
  5. Two words,availability and use of digital tools to communicate on the Internet, digital devices, smart devices and other technologies
  6. Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
  7. Information is exchanged between individuals through a common system of symbols, signs, or behavior
Down
  1. Facts provided or learned about something or someone
  2. Formulating a new method
  3. Practical application of knowledge
  4. Diverse set of technological tools and resources used to transmit, store, create, share or exchange information

11 Clues: a productFormulating a new methodPractical application of knowledgeWorldwide system of computer networksFacts provided or learned about something or someoneInformation is exchanged between individuals through a common system of symbols, signs, or behavior...

21st Century Skills 2013-03-17

21st Century Skills crossword puzzle
Across
  1. the use of the imagination or original ideas, esp. in the production of an artistic work.
  2. the cognitive process of reaching a decision.
  3. is a mental process that involves discovering, analyzing and solving problems.
Down
  1. learning in digital networks. Learning through digital means
  2. To cooperate with, join together and participate; to work with each other to accomplish set goal(s).
  3. 2 ways of working are communication and......

6 Clues: the cognitive process of reaching a decision.2 ways of working are communication and......learning in digital networks. Learning through digital meansis a mental process that involves discovering, analyzing and solving problems.the use of the imagination or original ideas, esp. in the production of an artistic work....

Module 11 Chapter 7 Crossword 2020-07-11

Module 11 Chapter 7 Crossword crossword puzzle
Across
  1. Demilitarized Zone ; Part of a computer network controlled by a firewall that allows computers (such as web servers) to be accessible from the Internet but isolated from the internal network
  2. software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
  3. Information technology; technology involving the development, maintenance, and use of computer systems, software, and networks or the processing and distribution of data; Formerly called information systems
  4. Redundant array of independent disks; computer disk configuration that allows one or more disk drives to fail whereas maintaining the integrity of the data they are storing. Failed components may be replaced before they lead to a loss of data
  5. a complex system of interconnected elements.
  6. Central processing unit; hardware component that performs the processing in a computer.
  7. Computer that provides access to a shared file system and/ or increased computing capacity
  8. Virtual private network; utilizes software that provides an authenticated, encrypted connection
  9. a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
  10. Wide area network; Network of computers (as the Internet) in a large area (as a country or the globe) for sharing resources or exchanging data. Contrast with LAN
  11. Computer or dedicated hardware device that restricts access between a protected network and the internet, or between other sets of networks.
  12. Structured query language; supports commands to create, update, and delete data. Provides the ability to submit both simple and highly sophisticated requests to the database application
Down
  1. a structured set of data held in a computer, especially one that is accessible in various ways.
  2. Uninterruptible power supply; Redundant backup power source used to protect computers in the event of a power surge or temporary power outage
  3. Random access memory; Hardware component in a computer where data and programs are temporarily stored during processing
  4. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  5. The process of encoding electronic data, mating it unintelligible to unauthorized parties; typically involves the use of a key to encode the data in such a way that a unique key is required to decode the data. Keys must be securely communicated between the sender and the recipient.
  6. real-time electronic reporting of anatomic pathology reports
  7. Local area network; Network that operates only within a local area such as an office; Often used for sharing resources such as a printer and file storage devices
  8. type of malware that spreads copies of itself from computer to computer

20 Clues: a complex system of interconnected elements.real-time electronic reporting of anatomic pathology reportstype of malware that spreads copies of itself from computer to computerCentral processing unit; hardware component that performs the processing in a computer....

Tech Terms and Acronyms 2023-05-19

Tech Terms and Acronyms crossword puzzle
Across
  1. To load and initialise the operating system of a computer or other device
  2. Short-range wireless communication technology
  3. A communications technology whereby a single wire can carry more than one type of signal at once
  4. A microprocessor that performs many functions and calculations that make a computer function
  5. The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
  6. Measures designed to protect a computer, device, or network from Cybercrime
  7. A computer that handles requests for data, email, file transfers, and other network services from other computers
  8. Can't stop laughing
  9. Hyper-text markup language
  10. A technology that allows computers and other devices to communicate via a wireless signal
  11. A device that allows computers to transmit information to each other
  12. Today I learnt
  13. A conventional method of transmitting data
  14. A type of digital subscriber line broadband technology that is used to connect to the Internet
  15. A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
  1. The "brains" of a computer, responsible for performing tasks and calculations
  2. A link to a particular web page that is saved in the browser
  3. A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
  4. Portable document format
  5. A software programme that allows you to surf the web
  6. A type of software that allows users to create 2D and 3D design modelling
  7. A set of interconnected networks that allow computers in different locations to exchange information
  8. Uniform resource locator
  9. A document or other file that is sent along with an email
  10. Any type of illegal activity that is undertaken on a computer
  11. A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
  12. A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
  13. To compress and archive files into a (one) smaller size
  14. Direct message
  15. Unsolicited email messages sent for marketing purposes
  16. General term for a software programme that has been designed to harm other computers
  17. A way of sending messages over the Internet
  18. Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
  19. Random access memory

34 Clues: Direct messageToday I learntCan't stop laughingRandom access memoryPortable document formatUniform resource locatorHyper-text markup languageA conventional method of transmitting dataA way of sending messages over the InternetShort-range wireless communication technologyA software programme that allows you to surf the web...

ICT crossword revision CH 1 - 10 2025-05-16

ICT crossword revision CH 1 - 10 crossword puzzle
Across
  1. a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
  2. a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
  3. a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
  4. is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
  5. LED
  6. a type of malicious software, or malware, that can infect computers and cause damage
  7. the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
  8. observing, interviewing, questionnaire and survey.
Down
  1. a type of display screen used in older televisions and computer monitors.
  2. is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
  3. It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
  4. Information and Communication Technology.
  5. a standard communication protocol used for sending short text messages over cellular networks.
  6. the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
  7. a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
  8. a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
  9. Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
  10. affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
  11. is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
  12. a text-based way to interact with a computer or software, using commands typed into a terminal.
  13. a fatal electrical injury that occurs when an electric current passes through the body and causes death.
  14. is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
  15. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
  16. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  17. the correct or acceptable way of using the internet.

25 Clues: LEDInformation and Communication Technology.observing, interviewing, questionnaire and survey.the correct or acceptable way of using the internet.a type of display screen used in older televisions and computer monitors.a type of malicious software, or malware, that can infect computers and cause damage...

ITF Vocabulary 2022-03-08

ITF Vocabulary crossword puzzle
Across
  1. This hardware provides more memory to the computer to run more programs and run them faster.
  2. a web file that contains information, website details, and user preferences.
  3. An OS that interfaces with the user through text only.
  4. a utility software that shows all running programs. Can be accessed through Ctrl + Alt + Esc
  5. Any hardware device that displays to the user the computer's results of processing
  6. This is the hardware that contains all the circuitry of the computer
  7. a computer language that consists of only 0 and 1
  8. This is one of the only Freeware OS available.
  9. This is the numeric address of a computer connected to the internet. It can be changed.
  10. The most storage heavy optical disk, the blu-ray
  11. A computer that shares it resources with others on a network
  12. An OS that interfaces with the user through graphics, icons, and text
  13. This is software that allows a single computer to run multiple virtual OS simultaneously
  14. A device that converts digital signals into analog signals
  15. This is the numeric address of a computer. It cannot be changed.
Down
  1. The most common Internet Standard that allows for multiple devices, and has speeds of upto 1 Gbps
  2. An RJ-45 cord that allows computers or modems to connect through a wire to the internet.
  3. a number language that ranges from 0-9
  4. A person who tries to exploit weaknesses in code to gain access to information within a program or system.
  5. This type of authentication uses more than one unique authentication method, such as a password and an SMS code.
  6. A type of SSD that is usually called a USB drive, USB stick, or thumb drive.
  7. This hardware takes the dangerous levels of heat away from the GPU & CPU and disperses it safely.
  8. Any hardware device that sends signal to a computer that the user interacts with
  9. This hardware helps takes the graphics processing away from the CPU through its own processing core.
  10. a computer language that ranges from 0-F
  11. A storage drive that consists of magnetic plates that spin around at certain RPMs
  12. A storage drive that consists of many microchips linked together
  13. A device that connects networks to networks
  14. Store Where you can purchase or download apps for your smartphone, tablet, or computer
  15. an attack on a computer or network where multiple computers are overwhelming it with packets.
  16. This is the basic language for creating web pages
  17. an optical disk that came after the CD but before the blu-ray disc
  18. This is the brain of the computer.

33 Clues: This is the brain of the computer.a number language that ranges from 0-9a computer language that ranges from 0-FA device that connects networks to networksThis is one of the only Freeware OS available.The most storage heavy optical disk, the blu-raya computer language that consists of only 0 and 1This is the basic language for creating web pages...

A Level Chap 2 2023-01-10

A Level Chap 2 crossword puzzle
Across
  1. network made up of a combination of other network topologies.
  2. method of data storage where data is stored on off-site servers.
  3. network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
  4. – network that uses separate dedicated servers and specific client workstations. All client computers are connected to the dedicated servers.
  5. network which is larger than a LAN but smaller than a WAN, which can cover several buildings in a single city, such as a university campus.
  6. wireless LAN.
  7. network that is centred around a person or their workspace.
  8. a server on a network where central files and other data are stored. They can be accessed by a user logged onto the network.
  9. device that needs access to the internet for it to work and depends on a more powerful computer for processing.
  10. network covering a very large geographical area.
Down
  1. cable made up of central copper core, insulation, copper mesh and outer insulation.
  2. device that connects LANs which use the same protocols.
  3. hardware used to connect together a number of devices to form a LAN that directs incoming data packets to all devices on the network (LAN).
  4. hardware used to connect together a number of devices to form a LAN that directs incoming data packets to a specific destination address only.
  5. modulator demodulator. A device that converts digital data to analogue data (to be sent down a telephone wire); conversely it also converts analogue data to digital data (which a computer can process).
  6. type of cable in which two wires of a single circuit are twisted together. Several twisted pairs make up a single cable.
  7. device used to boost a signal on both wired and wireless networks.
  8. device connected to a network (it can be a computer, storage device or peripheral device).
  9. device that connects LANs which use different protocols.
  10. network covering a small area such as a single building.
  11. . These cards allow devices to connect to a network/internet (usually associated with a MAC address set at the factory.
  12. wireless connectivity that uses radio waves, microwaves. Implements IEEE 802.11 protocols.
  13. device which enables data packets to be routed between different networks (for example, can join LANs to form a WAN).
  14. situation in which the same data is stored on several servers in case of maintenance or repair.
  15. wireless connectivity that uses radio waves in the 2.45GHz frequency band.
  16. client device which can work both off line and on line and is able to do some processing even if not connected to a network/internet.

26 Clues: wireless LAN.network covering a very large geographical area.device that connects LANs which use the same protocols.device that connects LANs which use different protocols.network covering a small area such as a single building.network that is centred around a person or their workspace.network made up of a combination of other network topologies....

WICASA GOA CROSSWORD JANUARY 2024 2024-01-25

WICASA GOA CROSSWORD JANUARY 2024 crossword puzzle
Across
  1. Return of alteration in the documents filed for registration by a foreign company.
  2. As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita.
  3. “Move the way you want” is the slogan of this brand.
  4. David Warner, who has retired from one-day international (ODI) and Test cricket, is a player from this country.
  5. India’s equity market capitalization has surpassed this country’s stock market for the first time, making it the fourth largest globally.
  6. A Payment *(dash)* is a platform provider that aggregates various payment modes such as cards, UPI, net banking, wallets, and alternate credit products by partnering with various processing entities such as acquiring banks, direct banks (in case of net banking) and issuers of wallets and alt credit products on to a single platform.
  7. "I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful." Name the businessman, co-founder of Berkshire Hathaway who quoted this.
  8. Pen Holder grip is used in this sport. The sports equipment is held mainly between the thumb and index finger.
Down
  1. For how many sectors is the Government of India running Performance Linked Incentive (PLI) schemes? These schemes, part of India’s larger strategy for self-reliance and industrial growth, aim to boost manufacturing and exports in key areas like Mobile Manufacturing and Specified Electronic Components, Critical Key Starting Materials, etc.
  2. Arichalmunai point is located in state. PM Narendra Modi paid homage at the origin point of Ram Setu.
  3. Word for a small building, especially one in the garden of a house that gives a wide view of the surrounding area.
  4. MCA form used for Intimation of Director Identification Number by the company to the Registrar DIN services.
  5. A Payment *(dash)* acts as an intermediary between a merchant and financial institutions, such as acquiring banks, networks, etc. It is a technology that securely transfers payment data from the merchant to the issuing bank through acquiring banks and networks.
  6. Last name of the author of the book “The 48 Laws of Power”.
  7. This Excel function returns a specific number of characters from a text string, starting at the position you specify, based on the number of characters you specify.

15 Clues: “Move the way you want” is the slogan of this brand.Last name of the author of the book “The 48 Laws of Power”.Return of alteration in the documents filed for registration by a foreign company.As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita....

Questions Part 3 2023-02-17

Questions Part 3 crossword puzzle
Across
  1. HDMI cables can be used for___ as well.
  2. There are two forms of communication media, which is Analog and__
  3. There are 4 broadcast networks, which is NBC,CBS,ABC and__
Down
  1. __is where you can get more information about the company
  2. There are 2 broadcast media, which is audio and__

5 Clues: HDMI cables can be used for___ as well.There are 2 broadcast media, which is audio and____is where you can get more information about the companyThere are 4 broadcast networks, which is NBC,CBS,ABC and__There are two forms of communication media, which is Analog and__

TLE 2022-10-10

TLE crossword puzzle
Across
  1. combining multiple pieces of data
  2. a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
  3. reducing detailed data to its main points
  4. any storage media that holds content in digital format and is read using a laser assembly
  5. not directly accessible by the CPU
  6. typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
  7. the collection, organization, analysis, interpretation and presentation of data
  8. list detail or summary data or computed
  9. ensuring that supplied data is correct and relevant
  10. also known as main memory
  11. includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
  12. are small pictures that are linked to actual program
  13. define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
  14. a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
  15. separation of data into various categories
  16. is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
  17. software programs that allows a user to locate, access, and display web pages
  18. the common storage unit in a computer
Down
  1. coated strip of plastic on which data can be encoded
  2. an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
  3. a software or a device that allows users to create, edit, and print documents
  4. often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
  5. hardware data storage device developed by lomega that functions like a standard 1.44
  6. can be accessed just as fast as any other data
  7. is the main, and usually the largest, data storage device in a computer
  8. arranging items in some sequence and/or in different sets
  9. is used in the computers to store the data
  10. a soft magnetic disk
  11. refers to where the typist positions his/her fingers
  12. used as the computer begins to boot up
  13. is a high-speed access area that can be either a reserved section of main memory or a storage device

31 Clues: a soft magnetic diskalso known as main memorycombining multiple pieces of datanot directly accessible by the CPUthe common storage unit in a computerused as the computer begins to boot uplist detail or summary data or computedreducing detailed data to its main pointsis used in the computers to store the data...

Cyber Crossword | Easy 2 2023-07-06

Cyber Crossword | Easy 2 crossword puzzle
Across
  1. The assurance that information is disclosed only to authorised entities.
  2. The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
  3. A feature or defect of a computer system that allows access to data by bypassing normal security measures.
  4. An event that is not part of normal operations that disrupts operational processes.
  5. A defect, fault or imperfection, especially one that is hidden or unknown.
  6. The methods used to manipulate people into carrying out specific actions, or divulging information.
  7. Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
  8. A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
  9. A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
  10. The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
  1. A software program or group of software programs designed for end users.
  2. A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
  3. Measurable physical characteristics used to identify or verify an individual.
  4. The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
  5. A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
  6. A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
  7. The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
  8. A collection of data or instructions that tell a computer how to work.
  9. Malicious software that makes data or systems unusable until the victim makes a payment.
  10. Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.

20 Clues: A collection of data or instructions that tell a computer how to work.A software program or group of software programs designed for end users.The assurance that information is disclosed only to authorised entities.A defect, fault or imperfection, especially one that is hidden or unknown....

BOOOOOOOOOOOOOOOOdhism inspired crossword 2023-10-31

BOOOOOOOOOOOOOOOOdhism inspired crossword crossword puzzle
Across
  1. the seasonal wind of the Indian Ocean and southern Asia, blowing from the southwest in summer and from the northeast in winter.
  2. a yearly tax imposed by Islamic states on certain non-Muslim subjects
  3. Though historians have been unable to find evidence of long-distance trading networks in the Western Hemisphere before 1492, they assert that some long-distance trading networks existed by pointing to the spread of
  4. The world's largest sea-based system of communication and exchange . Centered on India, it stretched from southern China to eastern Africa.
  5. religious ideology that adopted the high moral standards of Buddhism while also returning to the classical texts of Confucianism?
  6. An East African civilization that emerged in the eighth century c.e. as a set of commercial city-states linked into the Indian Ocean trading network. Combining African Bantu and Islamic cultural patterns, these competing city-states accumulated goods from the interior and exchanged them for the products of distant civilizations.
  7. Primary interpreters of Islamic law and the social core of Muslim Urban Societies (islamic scholars)
  8. Chinese empire that was established by Zhu Yuanzhang following the fall of the Yuan dynasty.
Down
  1. military operation involving the surrounding and blockading of a town, castle or fortress by an army in the attempt to capture it.
  2. Huge temple built by the javanese...has religious ties with both hinduism and buddhism
  3. Mongol dynasty initiated by Khubilai Khan that ruled China
  4. A term used to describe the routes of the trans-Saharan trade, which linked interior West Africa to the Mediterranean and North African world.
  5. A Malay kingdom that dominated the critical choke point in Indian Ocean trade at the Straits of Malacca. Like other places in Southeast Asia, Srivijaya absorbed various cultural influences from India.
  6. Branch of Mahayana Buddhism that the Japanese adopted (based highly on disiplined meditation)
  7. Birth name of the Mongol leader better known as Chinggis Khan, or "universal ruler," a name he acquired after unifying the Mongols.
  8. A prominent state within West African civilization;it flourished for several centuries. It monopolized the import of horses and metals as part of the trans-Saharan trade; it was a largescale producer of gold; and its most famous ruler, Mansa Musa, led a large group of Muslims on the pilgrimage to Mecca.
  9. Office established in sucession to the Prophet Muhammad, to rule the Islamic empire
  10. Branch of Islam that believed Muslims should choose their own leaders (followed by majority)
  11. Introduced to North Africa and the Sahara in the early centuries of the Common Era, this animal made trans-Saharan commerce possible.
  12. Land-based trade routes that linked many regions of Eurasia. They were named after the most famous product traded along these routes.

20 Clues: Mongol dynasty initiated by Khubilai Khan that ruled Chinaa yearly tax imposed by Islamic states on certain non-Muslim subjectsOffice established in sucession to the Prophet Muhammad, to rule the Islamic empireHuge temple built by the javanese...has religious ties with both hinduism and buddhism...

CYBER AND DIGITAL LITERACY 2024-05-02

CYBER AND DIGITAL LITERACY crossword puzzle
Across
  1. systematic investigation into and study of materials and sources
  2. action or omission that constitutes an offense that may be prosecuted
  3. any program or utility that helps programmers or users
  4. the fact of being who or what a person or thing is
  5. having special and usually practical knowledge
  6. he act of posting or reposting content on your social media
  7. a file or code, typically delivered over a network
  8. the imparting or exchanging of information or news
  9. the condition of being safe from undergoing
  10. he protection of computer systems and information
  11. complex configuration composed of hardware
  12. system that connects two or more computing devices
  13. the process by which topic ideas that appeal
  14. personal information
  15. spreads between computers and causes damage
  16. a computer or system that provides resources, data, services, or programs
  17. a set of instructions, data or programs used to operate computers
  18. organized or classified data, which has some meaningful values for the receiver
  19. the recording, reproducing, or broadcasting of moving visual images
  20. action of working with someone to produce or create something
  21. control the functioning of a system
Down
  1. available on or performed using the internet or other computer network
  2. a microcomputer designed for use by one person at a time
  3. acquisition of knowledge or skills through experience
  4. the innovative use of digital tools and technologies during teaching and learning
  5. anything you share on social media
  6. to make additions, deletions, or other changes
  7. a media type displayed as visual information
  8. knowledge and ability to use computers
  9. create, share, and/or exchange information and ideas in virtual communities
  10. information that can be interpreted and used by computers
  11. To store data on and retrieve data from a disk or other peripheral device
  12. the act of compromising digital devices and networks
  13. the protection of computer systems
  14. any electronic or online account
  15. a secret word or expression used by authorized persons
  16. he main means of mass communication
  17. creating globalized accounts on each relevant platform
  18. to deliver messages across computer networks
  19. the application of scientific knowledge to the practical aims of human life
  20. relating to or characteristic of the culture of computers
  21. a global network of billions of computers and other electronic devices
  22. a digitally replicated version of something real
  23. a detailed examination of anything complex
  24. a person who utilizes a computer or network service
  25. potential negative action
  26. electronic technology that generates
  27. device that accepts information
  28. online journal or information website
  29. relating to the present or recent times

50 Clues: personal informationpotential negative actiondevice that accepts informationany electronic or online accountanything you share on social mediathe protection of computer systemshe main means of mass communicationcontrol the functioning of a systemelectronic technology that generatesonline journal or information website...

ICT crossword revision CH 1 - 10 2025-05-16

ICT crossword revision CH 1 - 10 crossword puzzle
Across
  1. a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
  2. a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
  3. a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
  4. is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
  5. LED
  6. a type of malicious software, or malware, that can infect computers and cause damage
  7. the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
  8. observing, interviewing, questionnaire and survey.
Down
  1. a type of display screen used in older televisions and computer monitors.
  2. is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
  3. It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
  4. Information and Communication Technology.
  5. a standard communication protocol used for sending short text messages over cellular networks.
  6. the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
  7. a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
  8. a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
  9. Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
  10. affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
  11. is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
  12. a text-based way to interact with a computer or software, using commands typed into a terminal.
  13. a fatal electrical injury that occurs when an electric current passes through the body and causes death.
  14. is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
  15. the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
  16. a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
  17. the correct or acceptable way of using the internet.

25 Clues: LEDInformation and Communication Technology.observing, interviewing, questionnaire and survey.the correct or acceptable way of using the internet.a type of display screen used in older televisions and computer monitors.a type of malicious software, or malware, that can infect computers and cause damage...

networking unit 2026-01-26

networking unit crossword puzzle
Across
  1. a unique, globally visible identifier assigned by your Internet Service Provider (ISP) to your network (usually your router) that allows it to communicate with other devices and networks across the internet
  2. a collection of LANs
  3. a logical identifier (0-65535) that specifies a particular application or service on a device, directing incoming network data to the correct software
  4. a unique numerical label assigned to every device on a computer network
  5. the arrangement of devices (nodes) and connections (links) in a computer network, defining how data flows between them
  6. the latest standard for assigning unique addresses to internet-connected devices, developed to solve the shortage of addresses in the older IPv4 system
  7. a unique, internal number assigned to devices (like computers, phones, printers) on a local network (home, office) that isn't directly accessible from the public internet
  8. a restricted, private network that limits access to authorized users or devices, preventing external connections, often using firewalls and proprietary tech, to maintain control
  9. a network setup where devices connect in a circular loop, with each device linked to exactly two neighbors
  10. the internet's phonebook, translating human-friendly domain names into machine-readable IP addresses
  11. a virtual communication endpoint on a device, identified by a number (0-65535), that directs incoming and outgoing network traffic to specific software applications or services, allowing multiple programs (like web browsers and email clients) to use a single network connection simultaneously
Down
  1. the process of forwarding data packets between different networks, acting like a postal service for the internet, where routers read a packet's destination IP address and use routing tables to find the most efficient path (or "hop") to send it closer to its final destination, enabling communication across the global network
  2. a standardized set of rules and conventions that dictate how data is formatted, transmitted, and received between devices
  3. a conceptual, seven-layer framework standardizing network communication, allowing diverse systems to talk by breaking down data flow into distinct functions
  4. a system of two or more interconnected computing devices that communicate and share data, resources, and services
  5. a network setup where every device (node) connects individually to a single central point
  6. the foundational system that assigns unique numerical addresses to devices on the internet, allowing them to communicate, using a 32-bit system
  7. uses open standards, APIs, and commoditized hardware/software**, allowing different vendors' components to interoperate
  8. a company that gives individuals and organizations access to the internet
  9. a collection of computers and devices connected within a small, specific area like a home, office, or campus, allowing them to share resources such as printers, files, and a single internet connection via technologies like Ethernet or Wi-Fi, and enabling high-speed, local communication.

20 Clues: a collection of LANsa unique numerical label assigned to every device on a computer networka company that gives individuals and organizations access to the interneta network setup where every device (node) connects individually to a single central point...

Chapter One Crossword Puzzle 2014-09-10

Chapter One Crossword Puzzle crossword puzzle
Across
  1. Determines the best way to move data and manages device addressing
  2. Communicates directly with the various types of communication media
  3. Dialog control between two devices happens at this layer
  4. Reads each frame as it passes through the network
  5. Software that maps to another layers' protocols
  6. Distance from the current network to the remote network
  7. Ensures messages are delivered to the proper device
  8. When routers connect two or more networks together and use logical addressing
  9. Receives a digital signal, reamplifies or regenerates that signal, then forwards it out the other port without looking at any data
Down
  1. Type of switching routers use
  2. Quantity of data segments, measured in bytes, that the transmitting machine is allowed to send without receiving and acknowledgement
  3. Ensures data is transferred from the Application layer
  4. Identifying and confirming the communication partner's availability
  5. The time measured from when a frame enters a port to when it exits a port
  6. Memory section where computers store datagrams
  7. Segments and reassembles data into a single data stream
  8. Efficiently breaks up a broadcast domain

17 Clues: Type of switching routers useEfficiently breaks up a broadcast domainMemory section where computers store datagramsSoftware that maps to another layers' protocolsReads each frame as it passes through the networkEnsures messages are delivered to the proper deviceEnsures data is transferred from the Application layer...

CODING 2016-02-10

CODING crossword puzzle
Across
  1. A term used to describe junk and unsolicited e-mail.
  2. an error in a computer program or system
  3. a wireless method for sending information
  4. either or both of two stated possibilities
  5. Another Computer term for “Starting a Computer”.
  6. systems works an interface between User and the hardware. It is basically the platform on which users work.
  7. A binary unit of data storage with only 2 digits 0 and 1.
  8. Used to provide the temporary storage of information function.
  9. A program that runs on a system against the owner’s or user’s wishes
Down
  1. a system of symbols and rules for writing programs or algorithms.
  2. It is a worldwide system of computer networks
  3. identify and remove errors from
  4. the quantities, characters, or symbols on which operations are performed by a computer
  5. It is a program that displays the files and data on internet
  6. A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
  7. A collection of data into a permanent storage structure stored on the hard drive.
  8. a place where power or information leaves a system.

17 Clues: identify and remove errors froman error in a computer program or systema wireless method for sending informationeither or both of two stated possibilitiesIt is a worldwide system of computer networksAnother Computer term for “Starting a Computer”.a place where power or information leaves a system.A term used to describe junk and unsolicited e-mail....

CODING 2016-02-09

CODING crossword puzzle
Across
  1. A wireless method of sending information
  2. A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
  3. A term used to describe junk and unsolicited e-mail.
  4. a symbol or function denoting an operation (e.g., ×, +).
  5. A binary unit of data storage with only 2 digits 0 and 1.
  6. an error in a computer program or system.
  7. a place where power or information leaves a system.
  8. It is a worldwide system of computer networks
Down
  1. It is a program that displays the files and data on internet
  2. A program that runs on a system against the owner’s or user’s wishes
  3. A collection of data into a permanent storage structure stored on the hard drive.
  4. Another Computer term for “Starting a Computer”
  5. the quantities, characters, or symbols on which operations are performed by a computer,
  6. identify and remove errors from
  7. a system of symbols and rules for writing programs or algorithms
  8. either or both of two stated possibilities
  9. Used to provide the temporary storage of information function.

17 Clues: identify and remove errors fromA wireless method of sending informationan error in a computer program or system.either or both of two stated possibilitiesIt is a worldwide system of computer networksAnother Computer term for “Starting a Computer”a place where power or information leaves a system.A term used to describe junk and unsolicited e-mail....

Communication methods 2024-08-29

Communication methods crossword puzzle
Across
  1. Outreach, Programs designed to engage students, such as internships or special events.
  2. Printed or digital materials (e.g., catalogs, brochures) that provide information on exhibitions and programs.
  3. Partnerships, Collaborations between government and private sector for mutual benefit.
  4. and Galas, Formal or celebratory gatherings, often for fundraising.
  5. Networks, Online communities (e.g., LinkedIn) where professionals connect and share opportunities.
  6. Resources, Online tools and content, like virtual tours or educational materials.
  7. Journals and Research Papers, Scholarly publications presenting original research.
  8. Programs, Opportunities for artists or professionals to work and develop within an institution.
  9. Training, Professional development opportunities for educators.
  10. Projects, Joint efforts between institutions or individuals to achieve common goals.
Down
  1. Reports, Yearly summaries of an institution's activities and financials.
  2. Packages, Offers to potential sponsors outlining benefits of financial support.
  3. Communication, Tailored messages or meetings addressing specific individuals.
  4. Reports, Documents published to inform the public about institutional activities.
  5. Regular emails sent to subscribers with updates and news.
  6. Proposals, Documents requesting funding for specific projects.
  7. Kits, Packages containing information and resources for journalists.

17 Clues: Regular emails sent to subscribers with updates and news.Proposals, Documents requesting funding for specific projects.Training, Professional development opportunities for educators.and Galas, Formal or celebratory gatherings, often for fundraising.Kits, Packages containing information and resources for journalists....

Redes 2021-06-25

Redes crossword puzzle
Across
  1. systematization of wireless communication to minimize wired connections.
  2. does not use wires or cables to receive and send messages
  3. limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
  4. is a device that converts digital signals into analog
  5. A type of twisted pair cable that can transmit data
  6. device that allows interconnecting computers that work within the framework of a network.
Down
  1. a device that transforms electrical energy into electromagnetic waves
  2. a set of networks that constitute a single logical network of global reach
  3. a computer network that covers an area confined to a house, an apartment, or a building
  4. any type of network with high capacity to transport information
  5. set of computers, nodes and software connected to each other by means of physical or wireless devices

11 Clues: A type of twisted pair cable that can transmit datais a device that converts digital signals into analogdoes not use wires or cables to receive and send messagesany type of network with high capacity to transport informationa device that transforms electrical energy into electromagnetic waves...

Network 2021-06-25

Network crossword puzzle
Across
  1. systematization of wireless communication to minimize wired connections.
  2. does not use wires or cables to receive and send messages
  3. limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
  4. is a device that converts digital signals into analog
  5. A type of twisted pair cable that can transmit data
  6. device that allows interconnecting computers that work within the framework of a network.
Down
  1. a device that transforms electrical energy into electromagnetic waves
  2. a set of networks that constitute a single logical network of global reach
  3. a computer network that covers an area confined to a house, an apartment, or a building
  4. any type of network with high capacity to transport information
  5. set of computers, nodes and software connected to each other by means of physical or wireless devices

11 Clues: A type of twisted pair cable that can transmit datais a device that converts digital signals into analogdoes not use wires or cables to receive and send messagesany type of network with high capacity to transport informationa device that transforms electrical energy into electromagnetic waves...

Englis classwork 2021-06-25

Englis classwork crossword puzzle
Across
  1. type of network with a high capacity to transport information that affects the speed of transmission
  2. is a standard cable for Gigabit Ethernet and others using network protocols that is backward compatible
  3. aims to supply electricity from suppliers to consumers
  4. Device used to emit or receive radio waves
  5. Device that converts digital signals into analog
  6. a network covering an area reduced to a house, apartment or building
Down
  1. device enabling the interconnection of devices operating within a network
  2. is a global network of computer networks whose purpose is to enable the free exchange of information between a
  3. the connection of nodes by means of electromagnetic waves, without the need for a wired or wired network
  4. waves generated by some electromagnetic phenomenon. These waves can be analog
  5. A wireless local area network

11 Clues: A wireless local area networkDevice used to emit or receive radio wavesDevice that converts digital signals into analogaims to supply electricity from suppliers to consumersa network covering an area reduced to a house, apartment or buildingdevice enabling the interconnection of devices operating within a network...

ethics terms 2013-01-18

ethics terms crossword puzzle
Across
  1. The computer equivalent of breaking and entering
  2. program that records every keystroke
  3. kids who experience this are 3 times more likely to be depressed.
  4. emails that attempt to trick people into revealing person information to be used for identity theft
  5. software programs that claim to do one thing but instead damage your computer
  6. Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
Down
  1. property Property of the mind
  2. protects computers from users on other networks, offensive websites, and potential hackers
  3. that piggybacks on other programs; impairs or destroys a computer's ability to function properly
  4. infringement First time offenders can face criminal penalties of as much as 5 years in prison
  5. software installed without your knowledge that is programmed to show you advertisements

11 Clues: property Property of the mindprogram that records every keystrokeThe computer equivalent of breaking and enteringkids who experience this are 3 times more likely to be depressed.software programs that claim to do one thing but instead damage your computersoftware installed without your knowledge that is programmed to show you advertisements...

Services in GCP 2022-06-14

Services in GCP crossword puzzle
Across
  1. An open source tool to provision cloud resources with configuration files and code
  2. GCP service that helps develop and manage your own APIs
  3. Cloud ____ is a fully managed environment to run Docker containers
  4. VPC _______ Controls are a way to restrict access and data to trusted networks for multi-tenant services
  5. How can you run managed Apache Spark and Hadoop in GCP
  6. This BI tool gives us insight into our costs in multiple cloud environments
Down
  1. Which GCP service name originates from the the Greek word meaning "pilot"
  2. This SQL data warehouse allows for 1TB of queries for free every month
  3. This service allows you to manage GKE clusters and workloads running on VMs across environments
  4. Cloud ____ helps orchestrate workflows and pipelines using Apache Airflow
  5. Cloud _____ is Googles CICD platform

11 Clues: Cloud _____ is Googles CICD platformHow can you run managed Apache Spark and Hadoop in GCPGCP service that helps develop and manage your own APIsCloud ____ is a fully managed environment to run Docker containersThis SQL data warehouse allows for 1TB of queries for free every month...

Mass media of UK 2024-05-12

Mass media of UK crossword puzzle
Across
  1. How many home radio stations does the BBC have?
  2. ...is a very popular channel similar to BBC1 in content but with advertising and rather more “soap operas” and “game shows”.
  3. ...has been described as the most reliable broadcasting organization in the world.
  4. People in Britain buy more papers on...then on weekdays.
  5. ...is a popular weekly celebrity gossip magazine.
  6. Where the first regular newspapers appeared in the 17th century.
  7. What is a national musical instrument. It was brought by Romans to England.
Down
  1. What kind of music does Radio 1 broadcast?
  2. The satirical fortnightly has a large following among younger people.
  3. How quality newspapers are called sometimes?
  4. Which city dominates the media sector in the United Kingdom as national newspapers, tv an radio networks are largely based there.

11 Clues: What kind of music does Radio 1 broadcast?How quality newspapers are called sometimes?How many home radio stations does the BBC have?...is a popular weekly celebrity gossip magazine.People in Britain buy more papers on...then on weekdays.Where the first regular newspapers appeared in the 17th century....

Humanities 2023-09-27

Humanities crossword puzzle
Across
  1. system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
  2. Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
  3. mindset, A growth mindset means that you thrive on challenge
  4. lack of success
  5. It can treat inflammation
  6. a typical example or pattern of something
Down
  1. A problem with emotional or behavioral self-control
  2. mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
  3. stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
  4. It can cause or strengthen labor contractions during childbirth
  5. cortex, regulates our thoughts, actions and emotions

11 Clues: lack of successIt can treat inflammationa typical example or pattern of somethingA problem with emotional or behavioral self-controlcortex, regulates our thoughts, actions and emotionsmindset, A growth mindset means that you thrive on challengeIt can cause or strengthen labor contractions during childbirth...

Marketplace and Insurance 2024-11-15

Marketplace and Insurance crossword puzzle
Across
  1. Provides health coverage options and consumer protections and increases access to information
  2. A state-run insurance program that provides free or low-cost health coverage
  3. The monthly cost you pay for your insurance plan.
  4. Insurance plans offered in the Marketplace have networks of hospitals, doctors, specialists, pharmacies, and other health care providers available to treat the plan’s members.
  5. The percentage of the cost you pay for a covered health care service after you’ve met your deductible.
  6. Small Business Health Options Program
Down
  1. Affordable Care Act
  2. Children’s Health Insurance Program
  3. The amount you pay for covered health care services per year before your plan starts to pay its share, except free preventive services.
  4. The insurance holder
  5. A cost-sharing reduction lowers the amount you have to pay for deductibles, coinsurance, and copayments

11 Clues: Affordable Care ActThe insurance holderChildren’s Health Insurance ProgramSmall Business Health Options ProgramThe monthly cost you pay for your insurance plan.A state-run insurance program that provides free or low-cost health coverageProvides health coverage options and consumer protections and increases access to information...

Networking Concepts 2025-05-26

Networking Concepts crossword puzzle
Across
  1. It refers to a computer network restricted to an organisation
  2. Commonly used network card
  3. When mismatched copies of a file are stored on different computers
  4. A wireless technology used to interconnect mobile phones,computers and printers using short-range wireless connection
  5. In this topology, all nodes in the network are connected in a circular manner
Down
  1. These are certain set of rules that determine how data should be transferred over networks, compressed, presented on the screen,and so on
  2. It refers to a computer network that allows controlled access to an information source available on the internet
  3. The computers that communicate with each other
  4. Network created for an individual person
  5. In this topology, each node is connected to every other node in the network
  6. Network larger than LAN

11 Clues: Network larger than LANCommonly used network cardNetwork created for an individual personThe computers that communicate with each otherIt refers to a computer network restricted to an organisationWhen mismatched copies of a file are stored on different computersIn this topology, each node is connected to every other node in the network...

Personal Digital Device Crossword. Ishmam Siddiquey 9R 2012-11-06

Personal Digital Device Crossword. Ishmam Siddiquey 9R crossword puzzle
Across
  1. Part of a computer that carries out input and output tasks
  2. A portable computer that comes with a keyboard
  3. These are programs that can be used for work or entertainment
  4. A feature that enables a devuce to do more thand one thing
  5. A feature in a device that can guide you on your travels
  6. A type of interface that is touch sensitice
  7. Old style screen with no colour
  8. you can connect to other networks such as the internet. Or you can connect with bluetooth
  9. A type of PC that is portable and can be touchscreen
Down
  1. A device that displays, Projects Data
  2. A software that supports applications
  3. A function that allows you to connect and browse the internet on the move
  4. Enables someone to interact with a digital device
  5. You can save data
  6. A feature which is small and light. You can carry it around wherever you go
  7. This is a type of device that allows you to phone and use other functions. E.g Social Networking, E-mail etc
  8. A device that enables you to enter data

17 Clues: You can save dataOld style screen with no colourA device that displays, Projects DataA software that supports applicationsA device that enables you to enter dataA type of interface that is touch sensiticeA portable computer that comes with a keyboardEnables someone to interact with a digital device...

PDS 12/14: Feedback and Emotional Intelligence 2020-12-14

PDS 12/14: Feedback and Emotional Intelligence crossword puzzle
Across
  1. When admitting a mistake, apologize in a _____ manner.
  2. Recognizing and understanding other people's emotions.
  3. What begins on December 23rd?
  4. Attempting to soften the feedback or make excuses for the negative behavior is called a _____.
  5. A movement required to hang ornaments on the top of your Christmas tree (2 words, think kinesiology!).
  6. Offering a _____ sends the message that you are learning from your mistakes.
  7. _____ bells.
Down
  1. Feedback should be based on _____.
  2. Ms. Zhu's favorite holiday.
  3. Feedback is most effective when it is delivered in a _____ manner.
  4. _____ grip is required to wrap (and unwrap!) presents.
  5. Admitting your mistake or mishandling demonstrates a high level of _____.
  6. The ability to find common ground and build rapport with people to build networks and relationships (2 words).
  7. Ms. Zhu's favorite Christmas scent (2 words).
  8. The ability to control or redirect disruptive impulses and moods so that you suspend judgment and can think before acting (2 words).
  9. How many reindeer does Santa have in the most famous song about a certain Christmas reindeer?
  10. Direct language helps make it clear that you aren't complaining or making _____.

17 Clues: _____ bells.Ms. Zhu's favorite holiday.What begins on December 23rd?Feedback should be based on _____.Ms. Zhu's favorite Christmas scent (2 words).When admitting a mistake, apologize in a _____ manner.Recognizing and understanding other people's emotions._____ grip is required to wrap (and unwrap!) presents....

Research Research and more Research! 2021-09-09

Research Research and more Research! crossword puzzle
Across
  1. Title used for the list of books and other sources used in a research project.
  2. arranged by letters in order of the alphabet.
  3. Practice of writing pieces of information from a source in an informal manner to use later.
  4. The address of a resource (document or website on the internet.
  5. The exclusive right to reproduce, publish or sell a piece of work.
  6. materials to sell.
  7. To glance/read through a text quickly, looking for important ideas or information.
Down
  1. Publishes books and other
  2. Putting words or ideas into a logical format to assist in the organization of information.
  3. A set of books giving information about people, places events or things.
  4. A careful hunting for facts about a subject.
  5. Putting words or ideas from a source into your own words.
  6. An electronic communications network that connects computer networks around the world.
  7. Taking someone's own words or ideas as your own and not giving proper credit to the author.
  8. Another name for a source written in a specific format. (MLA, APA, etc.)
  9. A person who writes books, articles, internet sites and literature.
  10. Library Media Center

17 Clues: materials to sell.Library Media CenterPublishes books and otherA careful hunting for facts about a subject.arranged by letters in order of the alphabet.Putting words or ideas from a source into your own words.The address of a resource (document or website on the internet.The exclusive right to reproduce, publish or sell a piece of work....

BLAST from the Past! Opposites 2024-10-14

BLAST from the Past! Opposites crossword puzzle
Across
  1. a failure to hit, catch, or reach something.
  2. be unable to think of or recall
  3. reach a place at the end of a journey or a stage in a journey.
  4. exert force on (someone or something) in order to move them away from oneself.
  5. to copy (data) from one computer system to another
  6. start the flow or operation of something by means of a tap, switch, or button.
  7. a communication method that uses electronic devices to deliver messages across computer networks.
  8. go somewhere to collect someone, typically in one's car.
Down
  1. another word for begin
  2. a great interest and pleasure in something (like cooking)
  3. impart knowledge to or instruct (someone) as to how to do something
  4. discover after a deliberate search.
  5. obtain in exchange for payment.
  6. a success in an examination, test, or course
  7. the use of (something) on the understanding that it will be returned
  8. be successful or victorious in (a contest or conflict).
  9. separate or cause to separate into pieces as a result of a blow, shock, or strain.

17 Clues: another word for beginbe unable to think of or recallobtain in exchange for payment.discover after a deliberate search.a failure to hit, catch, or reach something.a success in an examination, test, or courseto copy (data) from one computer system to anotherbe successful or victorious in (a contest or conflict)....

Love of Learning Crossword! 2025-11-05

Love of Learning Crossword! crossword puzzle
Across
  1. The scientific study of crime and criminal behavior.
  2. The profession of reporting, writing, and editing news.
  3. The study of ancient Greek and Roman literature, language, and culture.
  4. The study of knowledge, existence, and reason — literally “love of wisdom.”
  5. The study of religious belief and the nature of the divine.
  6. The study of human history through excavation and artifacts.
  7. The application of science and math to design and build structures, machines, and systems.
  8. The study of human societies, cultures, and their development.
Down
  1. The field involving the design, construction, and use of machines that can act autonomously.
  2. The practice of protecting computers, networks, and data from attacks.
  3. The art and science of designing and constructing buildings.
  4. The study of society and human relationships within it.
  5. The process of recording, summarizing, and analyzing financial transactions.
  6. The branch of biology dealing with organisms and their environments.
  7. The scientific study of language and its structure.
  8. The study of how societies use resources and respond to scarcity.
  9. The science of Earth’s physical structure, history, and processes.

17 Clues: The scientific study of language and its structure.The scientific study of crime and criminal behavior.The profession of reporting, writing, and editing news.The study of society and human relationships within it.The study of religious belief and the nature of the divine.The art and science of designing and constructing buildings....

Love of Learning Crossword! 2025-11-05

Love of Learning Crossword! crossword puzzle
Across
  1. The study of knowledge, existence, and reason — literally “love of wisdom.”
  2. The art and science of designing and constructing buildings.
  3. The study of how societies use resources and respond to scarcity.
  4. The study of religious belief and the nature of the divine.
  5. The study of ancient Greek and Roman literature, language, and culture.
  6. The scientific study of crime and criminal behavior.
  7. The study of society and human relationships within it.
  8. The application of science and math to design and build structures, machines, and systems.
  9. The branch of biology dealing with organisms and their environments.
Down
  1. The study of human societies, cultures, and their development.
  2. The profession of reporting, writing, and editing news.
  3. The scientific study of language and its structure.
  4. The field involving the design, construction, and use of machines that can act autonomously.
  5. The process of recording, summarizing, and analyzing financial transactions.
  6. The science of Earth’s physical structure, history, and processes.
  7. The practice of protecting computers, networks, and data from attacks.
  8. The study of human history through excavation and artefacts.

17 Clues: The scientific study of language and its structure.The scientific study of crime and criminal behavior.The profession of reporting, writing, and editing news.The study of society and human relationships within it.The study of religious belief and the nature of the divine.The art and science of designing and constructing buildings....

TLE 2022-10-10

TLE crossword puzzle
Across
  1. combining multiple pieces of data
  2. a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
  3. reducing detailed data to its main points
  4. any storage media that holds content in digital format and is read using a laser assembly
  5. not directly accessible by the CPU
  6. typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
  7. the collection, organization, analysis, interpretation and presentation of data
  8. list detail or summary data or computed
  9. ensuring that supplied data is correct and relevant
  10. also known as main memory
  11. includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
  12. are small pictures that are linked to actual program
  13. define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
  14. a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
  15. separation of data into various categories
  16. is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
  17. software programs that allows a user to locate, access, and display web pages
  18. the common storage unit in a computer
Down
  1. coated strip of plastic on which data can be encoded
  2. an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
  3. a software or a device that allows users to create, edit, and print documents
  4. often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
  5. hardware data storage device developed by lomega that functions like a standard 1.44
  6. can be accessed just as fast as any other data
  7. is the main, and usually the largest, data storage device in a computer
  8. arranging items in some sequence and/or in different sets
  9. is used in the computers to store the data
  10. a soft magnetic disk
  11. refers to where the typist positions his/her fingers
  12. used as the computer begins to boot up
  13. is a high-speed access area that can be either a reserved section of main memory or a storage device

31 Clues: a soft magnetic diskalso known as main memorycombining multiple pieces of datanot directly accessible by the CPUthe common storage unit in a computerused as the computer begins to boot uplist detail or summary data or computedreducing detailed data to its main pointsis used in the computers to store the data...

TLE 2022-10-10

TLE crossword puzzle
Across
  1. a software or a device that allows users to create, edit, and print documents
  2. coated strip of plastic on which data can be encoded
  3. the collection, organization, analysis, interpretation and presentation of data
  4. a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
  5. includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
  6. define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
  7. arranging items in some sequence and/or in different sets
  8. list detail or summary data or computed
  9. is used in the computers to store the data
  10. a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
  11. hardware data storage device developed by lomega that functions like a standard 1.44
  12. is a high-speed access area that can be either a reserved section of main memory or a storage device
Down
  1. separation of data into various categories
  2. also known as main memory
  3. often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
  4. are small pictures that are linked to actual program
  5. combining multiple pieces of data
  6. is the main, and usually the largest, data storage device in a computer
  7. a soft magnetic disk
  8. can be accessed just as fast as any other data
  9. not directly accessible by the CPU
  10. reducing detailed data to its main points
  11. typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
  12. software programs that allows a user to locate, access, and display web pages
  13. any storage media that holds content in digital format and is read using a laser assembly
  14. used as the computer begins to boot up
  15. ensuring that supplied data is correct and relevant
  16. an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
  17. refers to where the typist positions his/her fingers
  18. is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
  19. the common storage unit in a computer

31 Clues: a soft magnetic diskalso known as main memorycombining multiple pieces of datanot directly accessible by the CPUthe common storage unit in a computerused as the computer begins to boot uplist detail or summary data or computedreducing detailed data to its main pointsseparation of data into various categories...

Tech Terms and Acronyms 2023-05-18

Tech Terms and Acronyms crossword puzzle
Across
  1. A computer that handles requests for data, email, file transfers, and other network services from other computers
  2. Portable document format
  3. A document or other file that is sent along with an email
  4. a device that allows computers to transmit information to each other
  5. The method by which uses access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
  6. General term for a software programme that has been designed to harm other computers
  7. Can't stop laughing
  8. A software program that allows you to surf the web
  9. Referring to the storing and accessing of date and programmes over the Internet instead of another type of hard drive
  10. Short-range wireless communication technology
  11. A way of sending messages over the Internet
  12. Today I learnt
  13. A type of software that allows users to create 2D and 3D design modelling
  14. A technology that allows computers and other devices to communicate via a wireless signal
  15. A set of interconnected networks that allow computers in different locations to exchange information
Down
  1. is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
  2. A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
  3. Universal resource locator
  4. Unsolicited email messages sent for marketing purposes
  5. Random access memory
  6. Measures designed to protect a computer, device, or network from Cybercrime
  7. The "brains" of a computer, responsible for performing tasks and calculations
  8. Hyper-text markup language
  9. A link to a particular web page that is saved in the browser
  10. Direct message
  11. Conventional method of transmitting data
  12. A type of digital subscriber line broadband technology that is used to connect to the Internet
  13. To load and initialise the operating system on a computer or other device
  14. A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
  15. Any type of illegal activity that is undertaken on a computer
  16. A microprocessor that performs many functions and calculations that make a computer function
  17. Communications technology whereby a single can carry more than one type of signal at once
  18. A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
  19. To compress and archive files into a smaller size

34 Clues: Direct messageToday I learntCan't stop laughingRandom access memoryPortable document formatUniversal resource locatorHyper-text markup languageConventional method of transmitting dataA way of sending messages over the InternetShort-range wireless communication technologyTo compress and archive files into a smaller size...

Technology Influencing Business Decisions 2024-11-18

Technology Influencing Business Decisions crossword puzzle
Across
  1. The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
  2. The state of being free from danger, risk, or anxiety, or something that protects or guarantees something else.
  3. The quality of working well in an organised way, without wasting time or energy.
  4. A live audio or audiovisual meeting with two or more participants. With the ability to teleconference, remote teams in an organisation can collaborate and communicate, even when geographically dispersed.
  5. Any of the different kinds of transport facilities used for moving goods and people from one location to the other.
  6. The application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
  7. Digital technology that allows the sharing of ideas and information, including text and visuals, through virtual networks and communities.
  8. Fitness or suitability for performing an action or fulfilling a requirement.
  9. An occasion or situation that makes it possible to do something that you want to do or have to do, or the possibility of doing something.
Down
  1. A situation in which an employer allows people to choose the times that they work so that they can do other things, for example spend time with their children.
  2. The sending and receiving of information can be one-on-one or between groups of people, and can be face-to-face or through communication devices.
  3. A business strategy that leverages the internet and uses online platforms to generate awareness by connecting with customers and promoting sales for products or services.
  4. When personal information is accessed, disclosed without authorisation, or is lost.
  5. Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
  6. The state of needing something or someone, especially in order to continue existing or operating.
  7. A worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
  8. When a company has a disparity between the money they are bringing in, and the money going out, leaving them in a net deficit.
  9. A measure of economic performance that compares the goods and services produced (output) with the inputs used to produce those goods and services.
  10. When an employer involuntarily and permanently removes a position that is currently being held by an employee or separated from a job.
  11. The process by which businesses or other organisations develop international influence or start operating on an international scale

20 Clues: Fitness or suitability for performing an action or fulfilling a requirement.The quality of working well in an organised way, without wasting time or energy.When personal information is accessed, disclosed without authorisation, or is lost.The state of needing something or someone, especially in order to continue existing or operating....

Chemical Bonds Crossword Puzzle 2021-12-02

Chemical Bonds Crossword Puzzle crossword puzzle
Across
  1. bonds that transfer electrons
  2. In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
  3. formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
  4. bond The bond that can hold atoms together in large networks or small groups.
Down
  1. Two or more atoms held together by covalent bonds.
  2. The bond that can hold atoms together in large networks or small groups.
  3. A substance made of atoms of two or more elements.
  4. bonds that share electrons

8 Clues: bonds that share electronsbonds that transfer electronsTwo or more atoms held together by covalent bonds.A substance made of atoms of two or more elements.The bond that can hold atoms together in large networks or small groups.bond The bond that can hold atoms together in large networks or small groups....

Cyber Security 2021-02-12

Cyber Security crossword puzzle
Across
  1. A malicious form of self replicating
  2. Gathers information about how you use your computer
  3. A set of secret characters, that only you know, to keep your private information secure.
  4. Someone that tries to gain access to your personal information or devices.
Down
  1. are able to exploit vulnerabilities in the a computers operating system or a networks hardware
  2. Short for malicious software, that gains access to your computer or device
  3. A word that people use to tell them that no one else knows

7 Clues: A malicious form of self replicatingGathers information about how you use your computerA word that people use to tell them that no one else knowsShort for malicious software, that gains access to your computer or deviceSomeone that tries to gain access to your personal information or devices....

Azure Fundamentals Launchpad Prep 2024-01-24

Azure Fundamentals Launchpad Prep crossword puzzle
Across
  1. ability of a system to automatically scale up or down the amount of resources that a system uses in response to changing demand
  2. physically separate datacenters within an Azure region
  3. extend your on-premises networks into the Microsoft cloud
  4. logically organize resource groups and facilitate billing
Down
  1. helps you keep track of Azure resource
  2. shared computing resources accessible over the internet, offering a scalable and on-demand public cloud service
  3. Scaling that focuses on increasing or decreasing the capabilities of the resources

7 Clues: helps you keep track of Azure resourcephysically separate datacenters within an Azure regionextend your on-premises networks into the Microsoft cloudlogically organize resource groups and facilitate billingScaling that focuses on increasing or decreasing the capabilities of the resources...

Lyrics Soup 2020-07-15

Lyrics Soup crossword puzzle
Across
  1. police United States ( 911 ) / Brazil ( 190 )
  2. the opposite of sloppy
  3. he person we hire to animate a party
  4. The person we call when a fire occurs.
Down
  1. The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
  2. profession that develops a diet that establishes the patient's need.
  3. firmness of spirit to face emotionally or morally difficult situations

7 Clues: the opposite of sloppyhe person we hire to animate a partyThe person we call when a fire occurs.police United States ( 911 ) / Brazil ( 190 )profession that develops a diet that establishes the patient's need.firmness of spirit to face emotionally or morally difficult situations...

Liquid Staked Derivatives 2024-05-07

Liquid Staked Derivatives crossword puzzle
Across
  1. The maximum amount of a financial instrument that can be traded in a single order
  2. The process of converting one currency into another at a predetermined exchange rate
  3. A digital asset designed to mimic the value of a traditional currency.
  4. A cryptographic token that represents ownership in a decentralized network.
Down
  1. A digital currency designed to be secure, decentralized, and censorship-resistant.
  2. The process of earning rewards by participating in proof-of-stake networks
  3. This term describes assets that are easily convertible to cash without significant loss of value.

7 Clues: A digital asset designed to mimic the value of a traditional currency.The process of earning rewards by participating in proof-of-stake networksA cryptographic token that represents ownership in a decentralized network.The maximum amount of a financial instrument that can be traded in a single order...

neuro-fuzzy 2024-03-06

neuro-fuzzy crossword puzzle
Across
  1. Backpropagation is a _________ method
  2. learning method employed to train the multilayer feedforward networks is called the ___________, or back-propagation
  3. A way to escape the local minima trap
  4. A heuristic approach for selecting the number of hidden layers
Down
  1. A single layer perceptron is unable to implement an elementary function like a ________
  2. It is essentially a ________ method to minimize the total squared error of the output computed by the net
  3. The strength of a neural net lies in its tolerance of _____ input pattern

7 Clues: Backpropagation is a _________ methodA way to escape the local minima trapA heuristic approach for selecting the number of hidden layersThe strength of a neural net lies in its tolerance of _____ input patternA single layer perceptron is unable to implement an elementary function like a ________...

cyber security engineer 2024-07-18

cyber security engineer crossword puzzle
Across
  1. The systematic process of finding and fixing security holes in software or networks.
  2. The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
  3. A process to determine and document potential threats to an organization
  4. The analysis and examination of digital data for evidence or investigation.
Down
  1. The method used to protect information by transforming it into an unreadable format
  2. The response to and management of a security breach or attack.
  3. The practice of securing information systems against unauthorized access and threats.

7 Clues: The response to and management of a security breach or attack.A process to determine and document potential threats to an organizationThe analysis and examination of digital data for evidence or investigation.The method used to protect information by transforming it into an unreadable format...

Fake news 2024-10-02

Fake news crossword puzzle
Across
  1. kind of hygiene that individuals and organizations use to maintain security resilience of systems, devices, networks, and data.
  2. kind of war conducted in order to gain informational advantage over the opponent
  3. the process of establishing the truth,accuracy of information.
Down
  1. a kind of thinking in which you question,analyse, interpret, evaluate and make a judgementnabout what you read, hear, say, or write.
  2. A thing that is not genuine, not true, made-up;
  3. the process of verifying facts
  4. Information about current event

7 Clues: the process of verifying factsInformation about current eventA thing that is not genuine, not true, made-up;the process of establishing the truth,accuracy of information.kind of war conducted in order to gain informational advantage over the opponent...

Community Cultural Capital 2025-03-29

Community Cultural Capital crossword puzzle
Across
  1. Cultural Wealth Model Founded by Tara Yosso and names six kinds of cultural capital that students bring to school
  2. Hopes and dreams that students have
  3. Various language and linguistic skills students bring with them to school
Down
  1. Peers and other social contacts that help students navigate the world
  2. Students support system of family, friends, and networks
  3. Student's ability to navigate institutions, particularly negative and unsupportive
  4. Founded in the communities of color, securing equal rights and freedom. Students of color are prepared for problem solving.

7 Clues: Hopes and dreams that students haveStudents support system of family, friends, and networksPeers and other social contacts that help students navigate the worldVarious language and linguistic skills students bring with them to schoolStudent's ability to navigate institutions, particularly negative and unsupportive...

Cyber/Digital Literacy 2024-11-06

Cyber/Digital Literacy crossword puzzle
Across
  1. example of computer virus
  2. of malware that can make copies of itself and spread automatically across computers in a network.
  3. has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
  1. -Refers to the trail of data you leave when using the internet.
  2. is use protect your personal information
  3. Who's actively participate in cyberspace and the online community offered through the internet
  4. Type of crime that uses computers or networks harm.

7 Clues: example of computer virusis use protect your personal informationType of crime that uses computers or networks harm.-Refers to the trail of data you leave when using the internet.Who's actively participate in cyberspace and the online community offered through the internet...

round-3-set-5 2026-01-31

round-3-set-5 crossword puzzle
Across
  1. The leader of the Autobots who can transform into a truck.
  2. A component in neural networks that converts input data into a usable format.
  3. The "M" in the common AI acronym ML.
Down
  1. A "rule of thumb" or shortcut used to help an AI solve problems faster.
  2. The AI companion to Master Chief in the Halo video game series.
  3. The interactive AI system that assists the heroes in The Flash.
  4. The famous test used to determine if a machine can exhibit human-like intelligence.

7 Clues: The "M" in the common AI acronym ML.The leader of the Autobots who can transform into a truck.The AI companion to Master Chief in the Halo video game series.The interactive AI system that assists the heroes in The Flash.A "rule of thumb" or shortcut used to help an AI solve problems faster....

Designing and Building 2014-05-10

Designing and Building crossword puzzle
Across
  1. Engineers use __________ to design and construct different machines and buildings
  2. ___________ hoop was successful in its second try
  3. A dam is a barrier that is built across the path of a _________ to hold back the water
  4. People travelled a great deal for business or __________
  5. Rulers in _________ lands founded new cities in such as Cairo and Baghdad
  6. Well-water is lifted using a system of ____________
  7. Engineers found a way to power mills and bring __________
  8. Engineering tool used in war can cause great __________
  9. Engineers need to determine the number of ___________ and cost before beginning the task
Down
  1. Underground __________ conduct water directly from an underground source to where it is needed.
  2. Mowlana Hazir Imam guides us to think carefully about the way we shape our __________
  3. Vast networks of ________ canals is needed to water the fields
  4. ________ bridges allowed boats to pass underneath
  5. _________ uses power of running water to make it turn
  6. __________ was a famous Muslim architect known for his mosques with enormous domes
  7. Suspension bridges use cables attached to strong supports to hold up the __________
  8. Imam Al-Muizz invented the fountain __________

17 Clues: Imam Al-Muizz invented the fountain _____________________ hoop was successful in its second try________ bridges allowed boats to pass underneathWell-water is lifted using a system of _____________________ uses power of running water to make it turnPeople travelled a great deal for business or __________...

CODING 2016-02-09

CODING crossword puzzle
Across
  1. A program that runs on a system against the owner’s or user’s wishes
  2. Used to provide the temporary storage of information function.
  3. A collection of data into a permanent storage structure stored on the hard drive.
  4. A term used to describe junk and unsolicited e-mail.
  5. the quantities, characters, or symbols on which operations are performed by a computer,
  6. It is a worldwide system of computer networks
  7. a symbol or function denoting an operation (e.g., ×, +).
  8. an error in a computer program or system.
Down
  1. A wireless method of sending information
  2. It is a program that displays the files and data on internet
  3. a place where power or information leaves a system.
  4. A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
  5. A binary unit of data storage with only 2 digits 0 and 1.
  6. a system of symbols and rules for writing programs or algorithms
  7. either or both of two stated possibilities
  8. identify and remove errors from
  9. Another Computer term for “Starting a Computer”

17 Clues: identify and remove errors fromA wireless method of sending informationan error in a computer program or system.either or both of two stated possibilitiesIt is a worldwide system of computer networksAnother Computer term for “Starting a Computer”a place where power or information leaves a system.A term used to describe junk and unsolicited e-mail....

Transport 2025-07-12

Transport crossword puzzle
Across
  1. Transport systems are vital to the functioning of ________ activities
  2. ease of movement within and across transport nodes
  3. number of occurrence of a service
  4. a location with high _____________ is one where many different destinations can be reached with relative ease
  5. Availability and reach of transport infrastructure
  6. a type of non-motorised transport mode
  7. goods and services are bought and sold over the internet
  8. Transport networks are needed to fulfill the demand for ________
Down
  1. a scale of transport network that allows for travel between cities
  2. a path for travel between nodes
  3. a type of acitivity found within the CBD, where major transport nodes are found
  4. number of people and amount of goods that can be moved
  5. major transport nodes are also found in popular _______ destinations
  6. short travel time and low travel ____ indicates high accessibility
  7. an opportunity that is more readily available in the central area to earn an income
  8. a transport network's performance and r__________ is dependent on the quality of its infrastructure
  9. An entry point into the transport network

17 Clues: a path for travel between nodesnumber of occurrence of a servicea type of non-motorised transport modeAn entry point into the transport networkease of movement within and across transport nodesAvailability and reach of transport infrastructurenumber of people and amount of goods that can be moved...