networks Crossword Puzzles
FAI unit 5 Crossword puzzle 2025-04-30
Across
- – Tech company that created GPT models.
- – Network inspired by the human brain.
- – A computer's ability to identify objects from images. ExpertSystem – Software that mimics human decision-making.
- – The opposite of artificial.
- – AI field concerned with giving computers the ability to learn. Chatbot – Simulated conversation with a machine.
- – A statistical model often used in AI.
- – Machines performing tasks requiring human intelligence.
- – AI used to detect fraud or spam.
- – The “thinking” part of an AI model.
- – Type of AI that imitates human behavior.
- – Subfield dealing with human language understanding.
- – Tech giant that owns DeepMind.
Down
- – Siri is an example of this. Alexa – Popular AI voice assistant by Amazon.
- – Common AI metric for success.
- – Algorithms learn without labeled data in this method.
- – A learning method using reward and punishment.
- – AI tool for creating deepfakes (Generative Adversarial Network).
- – Self-updating AI model from experience.
- – Type of learning using labeled data.
- – IBM's AI that competed on Jeopardy!
- – Common term for computer-generated opponent
- – Collection of structured data for training AI.
- – Google’s open-source AI framework.
- – Creator of the Turing Test.
- – AI-based program that plays chess or Go (like AlphaZero).
- – A key component of neural networks.
- – Common language used in AI development.
27 Clues: – The opposite of artificial. • – Creator of the Turing Test. • – Common AI metric for success. • – Tech giant that owns DeepMind. • – AI used to detect fraud or spam. • – Google’s open-source AI framework. • – IBM's AI that competed on Jeopardy! • – A key component of neural networks. • – The “thinking” part of an AI model. • – Type of learning using labeled data. • ...
FAI - UNIT 5 - CROSSWORD 2025-04-25
Across
- Visual layout of multiple plots
- Visualization library based on Matplotlib
- Content generator using NLP models
- AI model used in creative writing
- Jasper helps generate this type of content
- AI tool that converts spoken words into text
- Cloud platform from Amazon
- AI task performed in Google Docs via Jasper
- Visual plots made using Seaborn
- Mathematical model used in AI training
- Google’s multimodal AI model
- Google’s data and traffic analysis tool
- TensorFlow’s high-level API
- an open-source computer vision and image processing library.
Down
- Device for deploying edge AI
- OpenCV supports this type of tracking
- AI in vehicles to detect lanes
- Transformer model technique used in ChatGPT
- AI used in voice assistants like Siri
- Visual tool in TensorFlow to track model training
- Domain where AI is used to detect fraud
- _____enable deep learning models to analyze big data and make accurate predictions.
- OpenCV converts this to grayscale
- Used in Google Colab for cloud GPU access
- Image format output from Matplotlib
- PyTorch feature allowing dynamic graphs
- AI tool for conversational response generation
- AI platform developed by Facebook AI
- Common optimization technique in ML
- PyTorch supports these neural networks
30 Clues: Cloud platform from Amazon • TensorFlow’s high-level API • Device for deploying edge AI • Google’s multimodal AI model • AI in vehicles to detect lanes • Visual layout of multiple plots • Visual plots made using Seaborn • AI model used in creative writing • OpenCV converts this to grayscale • Content generator using NLP models • Image format output from Matplotlib • ...
INF201 Crossword 2025-05-15
Across
- Understanding the cause and scope of an incident
- A memory overwrite caused by excessive data input
- Isolating affected systems to prevent spread
- Cross-functional groups coordinating governance activities
- First phase in incident response: planning and readiness
- VPN mode used for host-to-host connections
- Risk strategy that reduces impact or likelihood
- Identifying potential security incidents promptly
- Abbreviation for attack where communication is intercepted and altered
- Creates a secure tunnel over public networks
- What your business loses when public trust is damaged
Down
- Internal secure gateway for accessing internal systems
- A hardened public-facing system used for secure remote access
- Security device that protects web applications from attacks like XSS and SQLi
- Risk strategy that eliminates the source of risk entirely
- Risk strategy that shifts responsibility to a third party
- Risk strategy that takes no action because the risk is tolerable
- Restoring normal operations after an incident
- Following laws, standards, and internal policies
- Removing the threat and fixing vulnerabilities
- Database attack that exploits misconfigured input validation
- VPN mode used for site-to-site connections
- Governance structure that sets strategic security direction
23 Clues: VPN mode used for host-to-host connections • VPN mode used for site-to-site connections • Isolating affected systems to prevent spread • Creates a secure tunnel over public networks • Restoring normal operations after an incident • Removing the threat and fixing vulnerabilities • Risk strategy that reduces impact or likelihood • ...
Tech Trails: The Ultimate IT Crossword 2025-07-30
Across
- A control structure used for repeating a block of code.
- The smallest unit of data in computing.
- An open-source operating system kernel.
- A small, fast memory located close to the CPU.
- Software designed to disrupt or damage a computer system.
- A cyber-attack that tricks users into giving up sensitive information.
- Address A unique string identifying each device on a network.
- The standard markup language for creating web pages.
- A device that forwards data packets between networks.
- A language used to communicate with and manage databases.
- Storing and accessing data over the internet instead of a local drive.
Down
- A program that converts source code into executable code.
- A widely-used, class-based, object-oriented programming language.
- A network security system that monitors and controls incoming and outgoing traffic.
- An error in a program that prevents it from running correctly.
- The blinking indicator showing where the next character will appear on the screen.
- A type of computer memory that is volatile and temporary.
- The smallest unit of a digital image or display.
- A high-level programming language known for its simplicity.
- A version control system used for tracking changes in source code.
20 Clues: The smallest unit of data in computing. • An open-source operating system kernel. • A small, fast memory located close to the CPU. • The smallest unit of a digital image or display. • The standard markup language for creating web pages. • A device that forwards data packets between networks. • A control structure used for repeating a block of code. • ...
1st Semester Reinforcement 2.0 2023-01-06
Across
- document we check when we're confused on a project
- amount of data that can be transmitted in a fixed time period
- another great example of an output device
- first step in creating a database
- a great example of an output device
- process of placing one format into another so that it can be delivered
- system formed by links
- component over which the message travels
- raw bits/pieces of information
- time it takes to travel from source to destination
- responsible for video output
- ________ can be linked by networks to share data
- a great example of an input device
- another great example of an input device
- outer edges of document
Down
- also known as extenders, regenerate signal so it can be sent further
- page orientation that has more room going left and right
- responsible for audio output
- 11010101000101
- act of discarding redundant data
- protects data/devices from unauthorized access
- involves a "three-way handshake"
- uses analog modem to transmit data over telephone lines
- the "brain" of the computer
- little overhead, less reliable
- houses all the components
- little helpers that pitch in
- what a VPN is best remembered as
28 Clues: 11010101000101 • system formed by links • outer edges of document • houses all the components • the "brain" of the computer • responsible for audio output • responsible for video output • little helpers that pitch in • raw bits/pieces of information • little overhead, less reliable • act of discarding redundant data • involves a "three-way handshake" • ...
TECHNOLOGY RELATED WORDS 2023-03-22
Across
- external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- effective communicators
- a set of instructions, data or programs used to operate computers and execute specific tasks
- independent learners and collaborative workers
- computer program designed to carry out a specific task other than one relating to the operation of the computer itself
- devoted catholics
- a set of integrated devices that input, output, process, and store data and information
- having or showing intelligence, especially of a high level.
- outgoing and socially confident
- causing laughter or amusement; humorous.
Down
- problem solvers and critical thinkers
- unable to concentrate because one's mind is preoccupied.
- machine that can be programmed to carry out sequences of arithmetic or logical operations
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- electrical circuits that have electrical components
- an abbreviated form of the word "application."
- the manufacturers of computers considered collectively
- responsible citizens
- a machine resembling a human being and able to replicate certain human movements and functions automatically.
- kind and pleasant.
20 Clues: devoted catholics • kind and pleasant. • responsible citizens • effective communicators • outgoing and socially confident • problem solvers and critical thinkers • causing laughter or amusement; humorous. • independent learners and collaborative workers • an abbreviated form of the word "application." • electrical circuits that have electrical components • ...
Data Communication 2025-02-11
Across
- __________ allows data to be transmitted at 10-30 bps.
- __________ is an example of a system that only allows data to travel at 10-30bps.
- ____________ cables have been used in telephone networks for over 100 yrs
- __________ cables are actually a bundle of glass fibres that can transmit light.
- Data Communication is the ______ transmission of data from a sender to a receiver
- _________ allows data transmission at over 8 Mbps,
- ____________ is an example of systems that allow data transmission of up to 64Kbps
- __________is another name for a communication channel.
- The P in VoIP stands for _______ .
- _________ is on method of data communication.
Down
- ______________are an example of systems that allow data transmission of over 8 Mbps.
- This allows data transmission of up to 64Kbps
- ______________ signals are not able to use broadcast communication.
- _________ is the maximum amount of data that can travel along a communication channel at any given time.
- ________ have a distance that ranges from few meters to millions of Kilometers.
- This type of communication channel is very convenient.
- __________ signals have a very short distance. Range
- This type of communication channel uses wires or cables.
- ___________ cables carry electronic currents at radio frequencies.
- The V in VoIP stands for _______ .
20 Clues: The V in VoIP stands for _______ . • The P in VoIP stands for _______ . • This allows data transmission of up to 64Kbps • _________ is on method of data communication. • __________ signals have a very short distance. Range • __________ allows data to be transmitted at 10-30 bps. • This type of communication channel is very convenient. • ...
Network and Internet 2021-01-02
Across
- Connects a computer to a network
- Can act as a gateway
- Aends the transmitted data to all computers
- The name of an organisation maintaining the site
- Acts as the mediator in a network
- Key device within a client-server network
- This server can also act as a data filter
- This server checks usernames & passwords
- Server which manage files on the network
- Used to amplify the signal in a network
- A program or hardware device that filters the information coming through the Internet
- Modulate and demodulate the signals
Down
- Method of scrambling data to ensure security
- The global network
- Link a web page to another page
- To view files on the web, you need this
- Method used to track a device on a network
- Dynamic address
- This allows devices with Wi-Fi connectivity to connect to wired networks
- Provides the internet facility
- One million bits equals to how many Megabytes
- This server is used to keep installed all the programs, software, etc.
- Connects two different types of network
- This software prevents users from accessing inappropriate information
- Changing static address
25 Clues: Dynamic address • The global network • Can act as a gateway • Changing static address • Provides the internet facility • Link a web page to another page • Connects a computer to a network • Acts as the mediator in a network • Modulate and demodulate the signals • To view files on the web, you need this • Connects two different types of network • ...
Banking Terminologies 2025-09-14
Across
- Official complaint raised by a customer.
- ATM card that allows you to pay for goods at stores or businesses, online.
- Paying for a product or service
- a record of any financial exchange
- Government agency insuring deposits up to $250,000.
- Moving funds from one account to another.
- Banks providing funds to a customer.
- Platform used for banking using internet.
- Contains info about credit history. Lenders use these reports to make lending decisions.
- Money earned on deposits or paid on loans.
- A customer repaying a loan.
Down
- Criminal act done using computers and networks.
- A loan secured by real estate. .
- Occurs when you spend more money than you have.
- form of automatic payment.
- Financial cooperatives that provide traditional banking services to their members.
- Charters, regulates, and supervises all national banks and federal savings associations.
- secret number that protects the security of an account.
- Protects consumers by enforcing federal consumer financial laws and providing education.
- Adding money to an account.
- Taking money out of an account.
- Card that allows you to spend up to a specific limit
- Annual rate that is charged for borrowing.
- Verification process for a customer.
- Charges for specific banking services.
25 Clues: form of automatic payment. • Adding money to an account. • A customer repaying a loan. • Paying for a product or service • Taking money out of an account. • A loan secured by real estate. . • a record of any financial exchange • Banks providing funds to a customer. • Verification process for a customer. • Charges for specific banking services. • ...
RU ITEC411-Chapter 5 Crime and Security 2025-10-22
Across
- Published false statement that damages someone's reputation
- Self replicating malicious software that spreads through networks automatically
- Highly sophisticated computer worm that targeted Iranian facilities
- Identity theft technique using text messages to obtain financial information
- Security system that monitors and filters network traffic from suspicious sources
- Security incident where unauthorized parties access protected systems or data
- International organization whose members agree on cross-border trade and service rules
- Unauthorized access to computer systems without permission
- Legal term describing unauthorized computer system entry
- Using computer techniques to promote political causes
- Converting data into coded format to protect stolen information from being useful
Down
- Authentication method using unique biological characteristics like fingerprints
- Scientific process of retrieving digital evidence from computers and storage devices
- Fraudulent emails disguised as legitimate communications to steal personal information
- Exposing security flaws or wrongdoing within an organization
- Verifying the identity of users or the legitimacy
- Decoy website set up to attract and study hacker behavior
- Cyber attack using false websites planted in domain name servers to collect data
- Federal law passed in 1984 making unauthorized computer access illegal
- Voice based fraud method where criminals call victims pretending to be legitimate businesses
20 Clues: Verifying the identity of users or the legitimacy • Using computer techniques to promote political causes • Legal term describing unauthorized computer system entry • Decoy website set up to attract and study hacker behavior • Unauthorized access to computer systems without permission • Published false statement that damages someone's reputation • ...
Science Branches 2025-11-15
Across
- Study of adaptive and innate defense networks regulating host protection
- Structural analysis of organismal morphology from macroscopic to microstructural levels
- Physics branch exploring propagation, refraction, and quantum behavior of photons
- Study of fungal evolution, pathogenicity, and ecological roles within ecosystems
- Science concerned with biotic–abiotic interactions shaping ecosystem dynamics
- Application of physical laws to stellar, galactic, and cosmological phenomena
- Field investigating mechanisms of inheritance and molecular transmission of traits
- Science assessing biochemical impacts of xenobiotics and exposure-related risk
- Science interpreting functional mechanisms of biological systems across scales
- Characterization of crystalline structures, mineral genesis, and geochemical properties
Down
- Study of lithospheric composition, stratification, and transformative Earth processes
- Field specializing in unicellular and acellular organisms and their biochemical pathways
- Interdisciplinary exploration of marine systems, including chemical cycles and currents
- Biological discipline focused on photosynthetic taxa and plant phylogeny
- Reconstruction of prehistoric biodiversity through fossil stratigraphy and morphology
- Investigation of molecular reactions sustaining cellular metabolism and regulation
- Atmospheric science examining thermodynamic patterns governing climate and weather
- Study of multicellular heterotrophs within the animal kingdom and their diversity
- Science interpreting crustal stress patterns through seismic wave analysis
- Discipline that analyzes extragalactic phenomena and cosmic evolution
20 Clues: Discipline that analyzes extragalactic phenomena and cosmic evolution • Biological discipline focused on photosynthetic taxa and plant phylogeny • Study of adaptive and innate defense networks regulating host protection • Science interpreting crustal stress patterns through seismic wave analysis • ...
Unit 7 Crossword 2026-04-10
Across
- Promoting human wellfare through money donations or good deeds
- Legally assigning an adult the role of guardian to care and decide for another
- Giving up one thing for anothe
- Named in the will and tasked with carrying out its contents
- A portion of income set aside for future emergencies or short-term expenses
- Buying assets to generate income over time, involving risk
- Provides insight for titling wills and other legal documents
- A non-legal document that instructs what to do when the writer cannot make decisions
- Selfless concern for others' well-being
- An organization offering aid and raising money for those in need
Down
- Value from personal relationships and social networks
- Refers to anything that is required to produce goods and services
- Determines net worth and sees tax advantages
- The cost of something, often based on money
- The will owner, often deceased
- Non-government organizations for social purposes rather than profit
- Diversifies investments and protects assets
- Determines the guardian and money flow that the court would've decided otherwise
- A plan to care for some one that cannot care for themself
- A broadcast issued by government or non-profit organizations to raise awareness on an issue
20 Clues: Giving up one thing for anothe • The will owner, often deceased • Selfless concern for others' well-being • The cost of something, often based on money • Diversifies investments and protects assets • Determines net worth and sees tax advantages • Value from personal relationships and social networks • A plan to care for some one that cannot care for themself • ...
Computer Networks 2015-01-04
The journey of food 2024-03-18
Across
- What factors affect farmers' choices of crops or livestock?
- role does marketing play in shaping consumer behaviour when they consume food?
- What are some activities involved in food production?
- concern What influences consumers' food choices, such as taste, culture, or dietary needs?
- need How do consumers make decisions about what foods to buy and eat?
- How does the environment impact food production?
Down
- What challenges are faced in distributing perishable versus non-perishable foods?
- What methods are used to distribute food, and how do they vary by food type?
- How does food packaging and presentation affect consumer decisions?
- How do farmers ensure the quality and safety of their products during production?
- food How do distribution networks ensure efficient and safe delivery of food?
- What is the role of transportation and logistics in food distribution?
12 Clues: What are some activities involved in food production? • How does the environment impact food production? • What factors affect farmers' choices of crops or livestock? • How does food packaging and presentation affect consumer decisions? • What is the role of transportation and logistics in food distribution? • ...
Computer Newtwork Puzzle 2023-02-07
Across
- two or more devices connected together exchange data
- Computer networks that are not connected by and cable.
- The maximum amount of data transmitted over an internet connection in a given amount of time
- A cable which connects two or more devices to share
- Devices that are linked with each other by a cable.
Down
- transfer of data from one digital device to another
- Broadcasts data to every computer or Ethernet based devices connected with it
- A computer program or device that provides a service to another computer program and its user
- Rules about transmitting data between different devices on the same network.
- Copper cables or fibre optic cable to form the connections between the networked devices
- recieves and sends data
- exchange of computer-stored messages from one user to one or more recipients via the internet
12 Clues: recieves and sends data • transfer of data from one digital device to another • A cable which connects two or more devices to share • Devices that are linked with each other by a cable. • two or more devices connected together exchange data • Computer networks that are not connected by and cable. • ...
Unit 5 - Interdependence 2025-05-23
Across
- Term for the world seen as a community connected by technology and communication (2 words)
- Relationships influencing power, policy, and governance across nations (2 words)
- Relationships between people and natural ecosystems (2 words)
- A person who moves to another country to live permanently (1 word)
- Bonds formed through shared art, language, traditions, or beliefs (2 words)
Down
- Someone forced to flee their country due to conflict or persecution (1 word)
- Links between people, places, and economies worldwide (2 words)
- A person's perspective shaped by culture, experience, and belief (1 word)
- The routes and networks that link global transportation and tourism (2 words)
- Links formed through the exchange of goods and services between countries (2 words)
- People who see the world as a shared community and take responsibility beyond borders (2 words)
- Polluted precipitation that damages forests and waterways (2 words)
12 Clues: Relationships between people and natural ecosystems (2 words) • Links between people, places, and economies worldwide (2 words) • A person who moves to another country to live permanently (1 word) • Polluted precipitation that damages forests and waterways (2 words) • A person's perspective shaped by culture, experience, and belief (1 word) • ...
Azure Core Day of Learning | March 2023-03-14
Across
- ----- -------- Reinforcement Learning method was used to transform GPT to chatGPT.
- Microsoft and this company have agreed to a 10-year partnership to bring Xbox PC games
- Inventor of Paxos Algorithm
- Project name for Azure Global Erasure coding support
- An open-source package manager, designed to enable developers to share reusable code
- A work item logged on partner teams in Microsoft during semester planning
Down
- This company is the creator of popular image generation tool Dall-E and the chatbot ChatGPT
- Number of ERGs that Microsoft has globally
- A venture-backed data center chip startup, recently acquired by Microsoft
- ----- language models are computer programs for natural language processing that use deep learning and neural networks, like GPT-3
- The, now deprecated, dedicated Azure datacenter for German tenants
- Which attention based architecture is used to build GPT?
12 Clues: Inventor of Paxos Algorithm • Number of ERGs that Microsoft has globally • Project name for Azure Global Erasure coding support • Which attention based architecture is used to build GPT? • The, now deprecated, dedicated Azure datacenter for German tenants • A venture-backed data center chip startup, recently acquired by Microsoft • ...
2ο Κεφ.10 2024-10-11
Across
- Οι εφαρμογές παρέχουν την δυνατότητα πληρωμών και .......... μέσω του διαδικτύου
- Ποια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις)
- Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις)
- Με ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή
- Ποια είναι η κυριότερη υπηρεσία Διαδικτύου που αφορά στην επικοινωνία μεταξύ χρηστών (2 λέξεις)
- Ποια είναι μία κατηγορία υποδίκτυου
Down
- Αυτή έχει ενσωματωθεί ως λειτουργία σε εφαρμογές τηλεφωνίας και βιντεοκλήσεων (2 λέξεις)
- Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τους
- Οι εγγενείς εφαρμογές,οι οποίες εκτελούνται αυτόνομα με την βοήθεια του.....................(2 λέξεις)
- Τι έχει αναπτυχθεί για την πιο εύκολη πλοήγηση του διαδικτύου,που εκτελούνται μέσω του προγράμματος πλοήγησης
- Πώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένου
- Τα P2P-(peer to peer networks) παρέχουν κυρίως υπηρεσίες ανταλλαγής.......
12 Clues: Ποια είναι μία κατηγορία υποδίκτυου • Πώς γίνεται η μεταφορά αρχείων και περιεχομεχωμένου • Ποια είναι η κυριότερη υπηρεσία του διαδικτύου(2 λέξεις) • Πώς ονομάζεται ο έλεγχος ενός υπολογιστή από έναν άλλο (2λέξεις) • Σε τι συνδέονται οι υπολογιστές για να επικοινωνήσουν μεταξύ τους • Με ποια σύνδεση επιτυγχάνεται η είσοδος και ο χειρισμός ενός υπολογιστή • ...
U11 - Review Cyber Security Plan, Constraints & Test Plan 2025-11-17
Across
- (6,3,8) A type of testing ensures data can be restored.
- (11,7) Simulate attacks to find weaknesses.
- (5,3,16) as part of the CSP who manages security, audits, and response.
- This part of the CSP ensures confidentiality, integrity, and availability of information.
- (6,7) A type of testing that verifies permissions and authentication.
Down
- This part of the CSP ensures the plan meets GDPR, ISO 27001,CyberEssentials or other relevant standards
- (13,8) Automated tools to detect flaws.
- These are limitations that affect implementation of the CSP and can include Budget, Technical, Time, Regulatory and Human Resources.
- (8,8) as part of the CSP these cover: Access Control, Data Protection, Network Security & Incident Response
- (5,8,4) (CSP) This outlines how to protect systems, data, and networks
- Defines which systems, applications, and data are covered in the CSP.
- (4,4) This ensures the security measures work as intended.
12 Clues: (13,8) Automated tools to detect flaws. • (11,7) Simulate attacks to find weaknesses. • (6,3,8) A type of testing ensures data can be restored. • (4,4) This ensures the security measures work as intended. • Defines which systems, applications, and data are covered in the CSP. • (6,7) A type of testing that verifies permissions and authentication. • ...
Kret Tkacik 2021-05-04
Across
- It is hardware or software — that protects your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer
- Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment.
- Local Area Network – home network
Down
- Receives a network signal, cleans and regenerates it.
- Wide Area Network – Internet
- Creates networks and connects devices.
6 Clues: Wide Area Network – Internet • Local Area Network – home network • Creates networks and connects devices. • Receives a network signal, cleans and regenerates it. • Any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment. • ...
Tic-Tac-Toe Vocabulary 2015-04-27
Across
- a group of connected computers
- software used to view the Internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material
Down
- network etiquette; Online manners; following the rules online, being a good digital citizen
- a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- text or graphics that, when clicked, will connect the user to a new web page or another place
- a restricted computer network; a private network created using World Wide Web software
8 Clues: a group of connected computers • software used to view the Internet • a restricted computer network; a private network created using World Wide Web software • the unauthorized use, reproduction, distribution, or transmission of copyrighted material • network etiquette; Online manners; following the rules online, being a good digital citizen • ...
Macie Dyson - Tech Concepts - 4th Period 2016-10-26
Across
- The study or use of systems (especially computers) for storing, retrieving, and sending information
- A networking device that forwards data packets between computer networks
Down
- Network is created when two or more computers are connected and share resources without going through a separate computer
- Typically networked and more powerful than a personal computer
- A networking hardware device that allows a Wi-Fi to connect to a wired network
- A computer networking that connects devices together on a computer
- A common connection point for devices in a network
7 Clues: A common connection point for devices in a network • Typically networked and more powerful than a personal computer • A computer networking that connects devices together on a computer • A networking device that forwards data packets between computer networks • A networking hardware device that allows a Wi-Fi to connect to a wired network • ...
Cyber Security 2021-02-12
Across
- A set of secret characters, that only you know, to keep your private information secure.
- A malicious form of self replicating
- Someone that tries to gain access to your personal information or devices.
- Short for malicious software, that gains access to your computer or device
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Gathers information about how you use your computer
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Someone that tries to gain access to your personal information or devices. • Short for malicious software, that gains access to your computer or device • ...
CYB 2024-05-07
Across
- the term used for various pop-up advertisements that show up on your computer or mobile device
- malware that holds a victim's data unless the victim pays a ransom to the attacker
- malware, that spreads between computers and causes damage to data and software
- malicious software that spies on the victim
Down
- malware that downloads onto a computer disguised as a legitimate program
- the practice of protecting systems, networks, and programs from digital attacks
- a type of malware that can automatically self-replicate without human interaction
7 Clues: malicious software that spies on the victim • malware that downloads onto a computer disguised as a legitimate program • malware, that spreads between computers and causes damage to data and software • the practice of protecting systems, networks, and programs from digital attacks • ...
Internet 2023-01-16
5 Clues: A single page of the website. • Use to connect different web pages of the website. • A collection of pages of information connected to each other. • A bigger network of many computer networks connected across the world. • The unique address of the website that specified its location on the internet.
Week 4 Vocab 2023-08-25
Across
- land or sea networks for the buying and selling of goods (silk road)
- the condition of being alone (seclude)
- the process of identifying and evaluating a document (evaluating)
Down
- the adoption of idea by one culture from another (spread).
- a person who trades in goods produced by other people (trader)
5 Clues: the condition of being alone (seclude) • the adoption of idea by one culture from another (spread). • a person who trades in goods produced by other people (trader) • the process of identifying and evaluating a document (evaluating) • land or sea networks for the buying and selling of goods (silk road)
TECT TIMES CROSSWORD 2021-11-01
Across
- allows a computer to send and receive data over A telephone line or a cable or satellite connection
- does ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets.
- electronic device that amplifies the signal it receives.
- connects two subnetworks as a part of the same network
Down
- used to combine, split,switch, boost or direct packets of information along a network
- a physical layer networking device that joins multiple networks together
- used to connect multiple network hosts as well as to do data transfer.
7 Clues: connects two subnetworks as a part of the same network • electronic device that amplifies the signal it receives. • used to connect multiple network hosts as well as to do data transfer. • a physical layer networking device that joins multiple networks together • does ‘filter and forwarding’ which is a moreintelligent way of dealing with the data packets. • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- bonds that transfer electrons
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
- bond The bond that can hold atoms together in large networks or small groups.
Down
- Two or more atoms held together by covalent bonds.
- The bond that can hold atoms together in large networks or small groups.
- A substance made of atoms of two or more elements.
- bonds that share electrons
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Tan Su Kyi - 8 Gamma 2023-01-19
Across
- An app where you use to communicate and call with your friend.
- We should _________ our password once a year.
- You have the _________ to find out what information the government & other organisations store about you.
Down
- It is a practice of protecting systems, networks & programs from digital attacks.
- Created when that data has been processed and become meaningful.
- A social media app that you can connect with friends, family and other people you know.
- Any company might hold your ________ information that you have in your account.
7 Clues: We should _________ our password once a year. • An app where you use to communicate and call with your friend. • Created when that data has been processed and become meaningful. • Any company might hold your ________ information that you have in your account. • It is a practice of protecting systems, networks & programs from digital attacks. • ...
Computer Networking 2023-04-02
Across
- a computer or computer program which manages access to a centralized resource or service in a network
- physical element of a computer
- a global computer network providing a variety of information and communicating facilities, consisting of interconnected networks using standardized communication protocols
Down
- string of characters used to verify the identity of a user during the authentication process
- machine that can store and process information
- programs and other operating information used by a computer
- facts and statistics collected together for reference or analysis
7 Clues: physical element of a computer • machine that can store and process information • programs and other operating information used by a computer • facts and statistics collected together for reference or analysis • string of characters used to verify the identity of a user during the authentication process • ...
Network management 2023-08-17
Across
- A security device or software that filters incoming and outgoing network traffic
- The maximum data rate that a network or internet connection can handle
Down
- A security system that monitors network traffic for suspicious activities
- A network monitoring tool
- The delay between sending data from a source and receiving it at the destination, often measured in milliseconds (ms)
- A secure connection between remote networks or devices over a public network
- A system that translates human-readable domain names (like www.example.com) into IP addresses
7 Clues: A network monitoring tool • The maximum data rate that a network or internet connection can handle • A security system that monitors network traffic for suspicious activities • A secure connection between remote networks or devices over a public network • A security device or software that filters incoming and outgoing network traffic • ...
bbb 2023-09-12
Across
- To do something you really wanted to do.
- How you are liked, admired, supported by many people.
- To sing, dance, act, read a poem, etc. in front of people.
- Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
Down
- To organized people or things into a group or body.
- The first public appearance of a new product or show
- media Websites and apps (applications) that that let people create and share things online, or to join social networks.
7 Clues: To do something you really wanted to do. • To organized people or things into a group or body. • The first public appearance of a new product or show • How you are liked, admired, supported by many people. • To sing, dance, act, read a poem, etc. in front of people. • Made a song, movie or recording available for people to buy or listen to, read, watch, etc. • ...
nmm 2023-09-17
Across
- To do something you really wanted to do.
- How you are liked, admired, supported by many people.
- Media websites and apps (applications) that that let people create and share things online, or to join social networks.
- Organized people or things into a group or body.
Down
- Made a song, movie or recording available for people to buy or listen to, read, watch, etc.
- The first public appearance of a new product or show.
- To sing, dance, act, read a poem, etc. in front of people.
7 Clues: To do something you really wanted to do. • Organized people or things into a group or body. • The first public appearance of a new product or show. • How you are liked, admired, supported by many people. • To sing, dance, act, read a poem, etc. in front of people. • Made a song, movie or recording available for people to buy or listen to, read, watch, etc. • ...
Cyber Attack Crossword 2024-09-03
Across
- A standalone malware that spreads over networks without needing to attach to other programs.
- A broad term encompassing any malicious software, including viruses, worms, Trojans, ransomware, spyware, and adware.
- Malware that secretly collects information about the user's activities and sends it to a third party.
Down
- Malware that encrypts files and demands payment to unlock them.
- Self-replicating software that attaches itself to other programs and spreads when those programs are executed.
- Malware disguised as legitimate software to trick users into installing it.
- Malware that displays unwanted advertisements.
7 Clues: Malware that displays unwanted advertisements. • Malware that encrypts files and demands payment to unlock them. • Malware disguised as legitimate software to trick users into installing it. • A standalone malware that spreads over networks without needing to attach to other programs. • ...
sams networks computer 2018-06-21
4 Clues: what were you eating in the cinema • what were u watching in the cinema • what are we doing in computer science • what did someone call you in the crowd
Global Markets - A2 Business 2021-01-24
Across
- Where a business function is contracted to a third party
- The cost of one currency expressed in terms of another
- This could be extended by selling a product in a new economy, such as an emerging or developing economy
Down
- Communication and transport networks
- occurs when a business relocates part of its business operations overseas
- A group of countries that agree to have low or no restrictions on trade, such as tariffs
- this body may give financial incentives to firms to start up in their own country
7 Clues: Communication and transport networks • The cost of one currency expressed in terms of another • Where a business function is contracted to a third party • occurs when a business relocates part of its business operations overseas • this body may give financial incentives to firms to start up in their own country • ...
VOCABULARY 2.01 2018-05-22
Across
- The use of computer technology to plan, design, test, and alter products
- A navigational system that uses satellite technology to determine location and provide directions
- Computerized storage for information and facts
Down
- Computer software designed to mimic the knowledge of a human expert
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- Technology that allows users to communicate over the Internet rather than through traditional public networks
7 Clues: Computerized storage for information and facts • Computer software designed to mimic the knowledge of a human expert • The use of computer technology to plan, design, test, and alter products • A navigational system that uses satellite technology to determine location and provide directions • ...
Tic-Tac-Toe Vocabulary 2015-04-27
Across
- a global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- software used to view the Internet
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material
- Firewall a part of a computer system or network that is designed to block unauthorized access while permitting outward communication
Down
- a group of connected computers
- network etiquette; Online manners; following the rules online, being a good digital citizen
- text or graphics that, when clicked, will connect the user to a new web page or another place
- a restricted computer network; a private network created using World Wide Web software
8 Clues: a group of connected computers • software used to view the Internet • a restricted computer network; a private network created using World Wide Web software • the unauthorized use, reproduction, distribution, or transmission of copyrighted material • network etiquette; Online manners; following the rules online, being a good digital citizen • ...
IT acronyms 2023-10-16
Across
- /A unit of measurement for internet speed or data transfer rate.
- /A domain-specific language used for managing and querying relational databases.
- / Software that manages computer hardware and provides services for computer programs.
- /A system that translates domain names into IP addresses, allowing internet navigation
Down
- /A coding language used for creating web pages and content on the internet.
- /A secure network connection that protects data while using public networks.
- /A type of data storage device that uses flash memory, typically faster and more durable than traditional hard drives
7 Clues: /A unit of measurement for internet speed or data transfer rate. • /A coding language used for creating web pages and content on the internet. • /A secure network connection that protects data while using public networks. • /A domain-specific language used for managing and querying relational databases. • ...
Fortinet: Crack the Code 2024-06-04
Across
- a tool for analyzing and reporting on network events and security logs.
- a network switch that connects and manages data traffic within a network.
- a security token that provides two-factor authentication for securing user access.
- a centralized management system for controlling all your fortigate devices and policies.
Down
- a system that manages user identity and access privileges across a network.
- a security appliance that acts as a firewall to protect networks from external threats.
- a cloud-based service that provides secure access to network resources from anywhere.
7 Clues: a tool for analyzing and reporting on network events and security logs. • a network switch that connects and manages data traffic within a network. • a system that manages user identity and access privileges across a network. • a security token that provides two-factor authentication for securing user access. • ...
7.1 Why Is Clean Water Important to Us? 2021-03-25
Across
- Rain falls on networks of drains, river and canals which will then be channelled here.
- A method used to remove salt from seawater and turns it into drinking water.
- A process which green plants use water, sunlight and carbon dioxide to make food.
- A method to collcet water vapour from seawater in desalination.
- not drinking enough of water may lead to ____.
Down
- Produced by recycling used water and is used mainly for industrial purposes.
- Water is found in our ____ to transport substances in our circulatory system.
- The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
- ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
- One of the Four National Taps are ___ water.
- Supports life processes.
11 Clues: Supports life processes. • One of the Four National Taps are ___ water. • not drinking enough of water may lead to ____. • A method to collcet water vapour from seawater in desalination. • Produced by recycling used water and is used mainly for industrial purposes. • A method used to remove salt from seawater and turns it into drinking water. • ...
Disney concepts on Race and Animation 2024-05-03
Across
- Films fictionalized storyworld of ethnoracial identity
- The drag queen that Ursula in The Little Mermaid is based on
- Princess characters who are passive in their stories by doing chores and waiting for a prince to save them
- The 1997 Cinderella film was made-for-TV cast screen opportunities
- A quality of Disney princesses that enables them the feel "timeless" despite societal changes
- A transitional period for Dinsey Studios after the loss of the Disney brothers
- Description of how black women are a result of "racialized and sexualized violence"
- Princess takes herself an active role in the film as a disruption
Down
- A robust period of innovation in amination
- A better representation of women of color "through the implementation of networks"
- Representation of Asia through a Western construction
11 Clues: A robust period of innovation in amination • Representation of Asia through a Western construction • Films fictionalized storyworld of ethnoracial identity • The drag queen that Ursula in The Little Mermaid is based on • Princess takes herself an active role in the film as a disruption • The 1997 Cinderella film was made-for-TV cast screen opportunities • ...
Humanities 2023-09-27
Across
- cortex, regulates our thoughts, actions and emotions
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- lack of success
- A problem with emotional or behavioral self-control
- It can treat inflammation
Down
- mindset, A growth mindset means that you thrive on challenge
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- a typical example or pattern of something
- It can cause or strengthen labor contractions during childbirth
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
Course2 Crossword Puzzle 2022-02-23
Across
- Data packets in Ethernet layer are known as _____
- The least intelligent of the three hardware devices and is used for connecting computers within a single network
- 48 bit address that is a globally unique identifier attached to an individual network interface
- TCP/IP is a _____ layered model
- Twisted pair cable is an example of _____ layer in TCP/IP model
- A protocol most widely used to send data across individual links, belongs to data link layer
Down
- An address that is all F's
- The most intelligent connecting device used to connect two or more networks
- Hardware device that sends traffic to the appropriate computer rather than sending it to all the connected computers
- Radio technology is an example of _____ communication
- _____ duplex means communication in both the directions at the same time
11 Clues: An address that is all F's • TCP/IP is a _____ layered model • Data packets in Ethernet layer are known as _____ • Radio technology is an example of _____ communication • Twisted pair cable is an example of _____ layer in TCP/IP model • _____ duplex means communication in both the directions at the same time • ...
Neuroanatomy of the Spinal Cord 2024-02-03
Across
- The ____ reflex is a negative feedback loop used to maintain muscle at a desired length
- velocity-dependent resistance to movement in a single direction
- An abnormal reflex as a result of damage to the descending pathway or UMN syndrome
- the coordination of body movements to successfully navigate the environment
- loss or absence of stretch reflex
Down
- high resting state of tension accompanied by exaggeration of stretch reflex
- Spinal reflexes modulated by_____ control
- Networks of interneurons located in the thoracic and lumbar spinal cord that act as pattern generators for rhythmic movements associated with walking (abbreviation)
- low resting state of tension accompanied by reduction of stretch reflex
- what we call the neurons giving rise to the descending pathways
- located in spinal cord ventral horns and the motor nuclei of cranial nerves in the brainstem
11 Clues: loss or absence of stretch reflex • Spinal reflexes modulated by_____ control • velocity-dependent resistance to movement in a single direction • what we call the neurons giving rise to the descending pathways • low resting state of tension accompanied by reduction of stretch reflex • high resting state of tension accompanied by exaggeration of stretch reflex • ...
Cybercrime Crossword Puzzle 2021-07-13
Across
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- interception Interception made by technical means without right.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- the process of converting encrypted information back into normal, understandable text.
- what comes after terabyte
- Intentional or reckless alteration damaging deletion of computer data.
- is a concept describing a widespread interconnected digital technology.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- is pornography that exploits children for sexual stimulation
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • It is when an individual or entity with malice or in bad faith. • ...
7.1 Why Is Clean Water Important to Us? 2021-03-25
Across
- Rain falls on networks of drains, river and canals which will then be channelled here.
- A method used to remove salt from seawater and turns it into drinking water.
- A process which green plants use water, sunlight and carbon dioxide to make food.
- A method to collcet water vapour from seawater in desalination.
- not drinking enough of water may lead to ____.
Down
- Produced by recycling used water and is used mainly for industrial purposes.
- Water is found in our ____ to transport substances in our circulatory system.
- The method in which treated water is passed through membranes with small holes to filter out larger solids and bacteria.
- ___ may reduce our supply of drinking water and increase the cost of producing drinking water.
- One of the Four National Taps is ___ water.
- Supports life processes.
11 Clues: Supports life processes. • One of the Four National Taps is ___ water. • not drinking enough of water may lead to ____. • A method to collcet water vapour from seawater in desalination. • Produced by recycling used water and is used mainly for industrial purposes. • A method used to remove salt from seawater and turns it into drinking water. • ...
Humanities 2023-09-27
Across
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- mindset, A growth mindset means that you thrive on challenge
- lack of success
- It can treat inflammation
- a typical example or pattern of something
Down
- A problem with emotional or behavioral self-control
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- It can cause or strengthen labor contractions during childbirth
- cortex, regulates our thoughts, actions and emotions
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
Teaching in the New Millenia 2023-09-17
Across
- Worldwide system of computer networks
- external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more
- Applications,set of instructions, data or programs used to operate computers and execute specific tasks
- a product
- Two words,availability and use of digital tools to communicate on the Internet, digital devices, smart devices and other technologies
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- Information is exchanged between individuals through a common system of symbols, signs, or behavior
Down
- Facts provided or learned about something or someone
- Formulating a new method
- Practical application of knowledge
- Diverse set of technological tools and resources used to transmit, store, create, share or exchange information
11 Clues: a product • Formulating a new method • Practical application of knowledge • Worldwide system of computer networks • Facts provided or learned about something or someone • Information is exchanged between individuals through a common system of symbols, signs, or behavior • ...
21st Century Skills 2013-03-17
Across
- the use of the imagination or original ideas, esp. in the production of an artistic work.
- the cognitive process of reaching a decision.
- is a mental process that involves discovering, analyzing and solving problems.
Down
- learning in digital networks. Learning through digital means
- To cooperate with, join together and participate; to work with each other to accomplish set goal(s).
- 2 ways of working are communication and......
6 Clues: the cognitive process of reaching a decision. • 2 ways of working are communication and...... • learning in digital networks. Learning through digital means • is a mental process that involves discovering, analyzing and solving problems. • the use of the imagination or original ideas, esp. in the production of an artistic work. • ...
Module 11 Chapter 7 Crossword 2020-07-11
Across
- Demilitarized Zone ; Part of a computer network controlled by a firewall that allows computers (such as web servers) to be accessible from the Internet but isolated from the internal network
- software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- Information technology; technology involving the development, maintenance, and use of computer systems, software, and networks or the processing and distribution of data; Formerly called information systems
- Redundant array of independent disks; computer disk configuration that allows one or more disk drives to fail whereas maintaining the integrity of the data they are storing. Failed components may be replaced before they lead to a loss of data
- a complex system of interconnected elements.
- Central processing unit; hardware component that performs the processing in a computer.
- Computer that provides access to a shared file system and/ or increased computing capacity
- Virtual private network; utilizes software that provides an authenticated, encrypted connection
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- Wide area network; Network of computers (as the Internet) in a large area (as a country or the globe) for sharing resources or exchanging data. Contrast with LAN
- Computer or dedicated hardware device that restricts access between a protected network and the internet, or between other sets of networks.
- Structured query language; supports commands to create, update, and delete data. Provides the ability to submit both simple and highly sophisticated requests to the database application
Down
- a structured set of data held in a computer, especially one that is accessible in various ways.
- Uninterruptible power supply; Redundant backup power source used to protect computers in the event of a power surge or temporary power outage
- Random access memory; Hardware component in a computer where data and programs are temporarily stored during processing
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- The process of encoding electronic data, mating it unintelligible to unauthorized parties; typically involves the use of a key to encode the data in such a way that a unique key is required to decode the data. Keys must be securely communicated between the sender and the recipient.
- real-time electronic reporting of anatomic pathology reports
- Local area network; Network that operates only within a local area such as an office; Often used for sharing resources such as a printer and file storage devices
- type of malware that spreads copies of itself from computer to computer
20 Clues: a complex system of interconnected elements. • real-time electronic reporting of anatomic pathology reports • type of malware that spreads copies of itself from computer to computer • Central processing unit; hardware component that performs the processing in a computer. • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
ICT crossword revision CH 1 - 10 2025-05-16
Across
- a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
- a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
- a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
- is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
- LED
- a type of malicious software, or malware, that can infect computers and cause damage
- the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
- observing, interviewing, questionnaire and survey.
Down
- a type of display screen used in older televisions and computer monitors.
- is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
- It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
- Information and Communication Technology.
- a standard communication protocol used for sending short text messages over cellular networks.
- the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
- a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
- a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
- Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
- affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
- is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
- a text-based way to interact with a computer or software, using commands typed into a terminal.
- a fatal electrical injury that occurs when an electric current passes through the body and causes death.
- is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- the correct or acceptable way of using the internet.
25 Clues: LED • Information and Communication Technology. • observing, interviewing, questionnaire and survey. • the correct or acceptable way of using the internet. • a type of display screen used in older televisions and computer monitors. • a type of malicious software, or malware, that can infect computers and cause damage • ...
ITF Vocabulary 2022-03-08
Across
- This hardware provides more memory to the computer to run more programs and run them faster.
- a web file that contains information, website details, and user preferences.
- An OS that interfaces with the user through text only.
- a utility software that shows all running programs. Can be accessed through Ctrl + Alt + Esc
- Any hardware device that displays to the user the computer's results of processing
- This is the hardware that contains all the circuitry of the computer
- a computer language that consists of only 0 and 1
- This is one of the only Freeware OS available.
- This is the numeric address of a computer connected to the internet. It can be changed.
- The most storage heavy optical disk, the blu-ray
- A computer that shares it resources with others on a network
- An OS that interfaces with the user through graphics, icons, and text
- This is software that allows a single computer to run multiple virtual OS simultaneously
- A device that converts digital signals into analog signals
- This is the numeric address of a computer. It cannot be changed.
Down
- The most common Internet Standard that allows for multiple devices, and has speeds of upto 1 Gbps
- An RJ-45 cord that allows computers or modems to connect through a wire to the internet.
- a number language that ranges from 0-9
- A person who tries to exploit weaknesses in code to gain access to information within a program or system.
- This type of authentication uses more than one unique authentication method, such as a password and an SMS code.
- A type of SSD that is usually called a USB drive, USB stick, or thumb drive.
- This hardware takes the dangerous levels of heat away from the GPU & CPU and disperses it safely.
- Any hardware device that sends signal to a computer that the user interacts with
- This hardware helps takes the graphics processing away from the CPU through its own processing core.
- a computer language that ranges from 0-F
- A storage drive that consists of magnetic plates that spin around at certain RPMs
- A storage drive that consists of many microchips linked together
- A device that connects networks to networks
- Store Where you can purchase or download apps for your smartphone, tablet, or computer
- an attack on a computer or network where multiple computers are overwhelming it with packets.
- This is the basic language for creating web pages
- an optical disk that came after the CD but before the blu-ray disc
- This is the brain of the computer.
33 Clues: This is the brain of the computer. • a number language that ranges from 0-9 • a computer language that ranges from 0-F • A device that connects networks to networks • This is one of the only Freeware OS available. • The most storage heavy optical disk, the blu-ray • a computer language that consists of only 0 and 1 • This is the basic language for creating web pages • ...
A Level Chap 2 2023-01-10
Across
- network made up of a combination of other network topologies.
- method of data storage where data is stored on off-site servers.
- network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
- – network that uses separate dedicated servers and specific client workstations. All client computers are connected to the dedicated servers.
- network which is larger than a LAN but smaller than a WAN, which can cover several buildings in a single city, such as a university campus.
- wireless LAN.
- network that is centred around a person or their workspace.
- a server on a network where central files and other data are stored. They can be accessed by a user logged onto the network.
- device that needs access to the internet for it to work and depends on a more powerful computer for processing.
- network covering a very large geographical area.
Down
- cable made up of central copper core, insulation, copper mesh and outer insulation.
- device that connects LANs which use the same protocols.
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to all devices on the network (LAN).
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to a specific destination address only.
- modulator demodulator. A device that converts digital data to analogue data (to be sent down a telephone wire); conversely it also converts analogue data to digital data (which a computer can process).
- type of cable in which two wires of a single circuit are twisted together. Several twisted pairs make up a single cable.
- device used to boost a signal on both wired and wireless networks.
- device connected to a network (it can be a computer, storage device or peripheral device).
- device that connects LANs which use different protocols.
- network covering a small area such as a single building.
- . These cards allow devices to connect to a network/internet (usually associated with a MAC address set at the factory.
- wireless connectivity that uses radio waves, microwaves. Implements IEEE 802.11 protocols.
- device which enables data packets to be routed between different networks (for example, can join LANs to form a WAN).
- situation in which the same data is stored on several servers in case of maintenance or repair.
- wireless connectivity that uses radio waves in the 2.45GHz frequency band.
- client device which can work both off line and on line and is able to do some processing even if not connected to a network/internet.
26 Clues: wireless LAN. • network covering a very large geographical area. • device that connects LANs which use the same protocols. • device that connects LANs which use different protocols. • network covering a small area such as a single building. • network that is centred around a person or their workspace. • network made up of a combination of other network topologies. • ...
WICASA GOA CROSSWORD JANUARY 2024 2024-01-25
Across
- Return of alteration in the documents filed for registration by a foreign company.
- As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita.
- “Move the way you want” is the slogan of this brand.
- David Warner, who has retired from one-day international (ODI) and Test cricket, is a player from this country.
- India’s equity market capitalization has surpassed this country’s stock market for the first time, making it the fourth largest globally.
- A Payment *(dash)* is a platform provider that aggregates various payment modes such as cards, UPI, net banking, wallets, and alternate credit products by partnering with various processing entities such as acquiring banks, direct banks (in case of net banking) and issuers of wallets and alt credit products on to a single platform.
- "I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful." Name the businessman, co-founder of Berkshire Hathaway who quoted this.
- Pen Holder grip is used in this sport. The sports equipment is held mainly between the thumb and index finger.
Down
- For how many sectors is the Government of India running Performance Linked Incentive (PLI) schemes? These schemes, part of India’s larger strategy for self-reliance and industrial growth, aim to boost manufacturing and exports in key areas like Mobile Manufacturing and Specified Electronic Components, Critical Key Starting Materials, etc.
- Arichalmunai point is located in state. PM Narendra Modi paid homage at the origin point of Ram Setu.
- Word for a small building, especially one in the garden of a house that gives a wide view of the surrounding area.
- MCA form used for Intimation of Director Identification Number by the company to the Registrar DIN services.
- A Payment *(dash)* acts as an intermediary between a merchant and financial institutions, such as acquiring banks, networks, etc. It is a technology that securely transfers payment data from the merchant to the issuing bank through acquiring banks and networks.
- Last name of the author of the book “The 48 Laws of Power”.
- This Excel function returns a specific number of characters from a text string, starting at the position you specify, based on the number of characters you specify.
15 Clues: “Move the way you want” is the slogan of this brand. • Last name of the author of the book “The 48 Laws of Power”. • Return of alteration in the documents filed for registration by a foreign company. • As of December 2023, the Indian Evidence Act was replaced by Bhartiya *(dash)* Sanhita. • ...
Questions Part 3 2023-02-17
5 Clues: HDMI cables can be used for___ as well. • There are 2 broadcast media, which is audio and__ • __is where you can get more information about the company • There are 4 broadcast networks, which is NBC,CBS,ABC and__ • There are two forms of communication media, which is Analog and__
TLE 2022-10-10
Across
- combining multiple pieces of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- reducing detailed data to its main points
- any storage media that holds content in digital format and is read using a laser assembly
- not directly accessible by the CPU
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- the collection, organization, analysis, interpretation and presentation of data
- list detail or summary data or computed
- ensuring that supplied data is correct and relevant
- also known as main memory
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- are small pictures that are linked to actual program
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- separation of data into various categories
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- software programs that allows a user to locate, access, and display web pages
- the common storage unit in a computer
Down
- coated strip of plastic on which data can be encoded
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- a software or a device that allows users to create, edit, and print documents
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- hardware data storage device developed by lomega that functions like a standard 1.44
- can be accessed just as fast as any other data
- is the main, and usually the largest, data storage device in a computer
- arranging items in some sequence and/or in different sets
- is used in the computers to store the data
- a soft magnetic disk
- refers to where the typist positions his/her fingers
- used as the computer begins to boot up
- is a high-speed access area that can be either a reserved section of main memory or a storage device
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • is used in the computers to store the data • ...
Cyber Crossword | Easy 2 2023-07-06
Across
- The assurance that information is disclosed only to authorised entities.
- The disclosure of information to unauthorised persons, or a violation of the security policy of a system in which unauthorised intentional or unintentional disclosure, modification, destruction or loss of an object may have occurred.
- A feature or defect of a computer system that allows access to data by bypassing normal security measures.
- An event that is not part of normal operations that disrupts operational processes.
- A defect, fault or imperfection, especially one that is hidden or unknown.
- The methods used to manipulate people into carrying out specific actions, or divulging information.
- Self-replicating malware that uses a network to distribute copies of itself to other computer devices, often without user intervention.
- A virtual space in which new, untrusted or untested software or coding can be run safely without risking harm to the hosting computer.
- A deliberate act through cyberspace to manipulate, disrupt, deny, degrade or destroy computers or networks, or the information resident on them, with the effect of seriously compromising national security, stability or economic prosperity.
- The use of online advertising to spread malware. Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Down
- A software program or group of software programs designed for end users.
- A type of attack where a message is made to look like it comes from a trusted source. For example, an email that looks like it comes from a legitimate business, but is actually trying to spread malware.
- Measurable physical characteristics used to identify or verify an individual.
- The principle of restricting an individual’s access to only the information they require to fulfil the duties of their role.
- A control system architecture comprising computers, networked data communications and graphical user interfaces for high-level process supervisory management. It also comprises other peripheral devices like programmable logic controllers and discrete proportional-integral-derivative controllers used to interface with process plant or machinery.
- A form of false advertisement which uses links that are designed to attract attention and entice users to follow that link and read, view or listen to the linked content, with a defining characteristic of being deceptive, typically sensationalised or misleading.
- The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
- A collection of data or instructions that tell a computer how to work.
- Malicious software that makes data or systems unusable until the victim makes a payment.
- Setting up a fake website (or compromising a real one) in order to infect and exploit visiting users.
20 Clues: A collection of data or instructions that tell a computer how to work. • A software program or group of software programs designed for end users. • The assurance that information is disclosed only to authorised entities. • A defect, fault or imperfection, especially one that is hidden or unknown. • ...
BOOOOOOOOOOOOOOOOdhism inspired crossword 2023-10-31
Across
- the seasonal wind of the Indian Ocean and southern Asia, blowing from the southwest in summer and from the northeast in winter.
- a yearly tax imposed by Islamic states on certain non-Muslim subjects
- Though historians have been unable to find evidence of long-distance trading networks in the Western Hemisphere before 1492, they assert that some long-distance trading networks existed by pointing to the spread of
- The world's largest sea-based system of communication and exchange . Centered on India, it stretched from southern China to eastern Africa.
- religious ideology that adopted the high moral standards of Buddhism while also returning to the classical texts of Confucianism?
- An East African civilization that emerged in the eighth century c.e. as a set of commercial city-states linked into the Indian Ocean trading network. Combining African Bantu and Islamic cultural patterns, these competing city-states accumulated goods from the interior and exchanged them for the products of distant civilizations.
- Primary interpreters of Islamic law and the social core of Muslim Urban Societies (islamic scholars)
- Chinese empire that was established by Zhu Yuanzhang following the fall of the Yuan dynasty.
Down
- military operation involving the surrounding and blockading of a town, castle or fortress by an army in the attempt to capture it.
- Huge temple built by the javanese...has religious ties with both hinduism and buddhism
- Mongol dynasty initiated by Khubilai Khan that ruled China
- A term used to describe the routes of the trans-Saharan trade, which linked interior West Africa to the Mediterranean and North African world.
- A Malay kingdom that dominated the critical choke point in Indian Ocean trade at the Straits of Malacca. Like other places in Southeast Asia, Srivijaya absorbed various cultural influences from India.
- Branch of Mahayana Buddhism that the Japanese adopted (based highly on disiplined meditation)
- Birth name of the Mongol leader better known as Chinggis Khan, or "universal ruler," a name he acquired after unifying the Mongols.
- A prominent state within West African civilization;it flourished for several centuries. It monopolized the import of horses and metals as part of the trans-Saharan trade; it was a largescale producer of gold; and its most famous ruler, Mansa Musa, led a large group of Muslims on the pilgrimage to Mecca.
- Office established in sucession to the Prophet Muhammad, to rule the Islamic empire
- Branch of Islam that believed Muslims should choose their own leaders (followed by majority)
- Introduced to North Africa and the Sahara in the early centuries of the Common Era, this animal made trans-Saharan commerce possible.
- Land-based trade routes that linked many regions of Eurasia. They were named after the most famous product traded along these routes.
20 Clues: Mongol dynasty initiated by Khubilai Khan that ruled China • a yearly tax imposed by Islamic states on certain non-Muslim subjects • Office established in sucession to the Prophet Muhammad, to rule the Islamic empire • Huge temple built by the javanese...has religious ties with both hinduism and buddhism • ...
CYBER AND DIGITAL LITERACY 2024-05-02
Across
- systematic investigation into and study of materials and sources
- action or omission that constitutes an offense that may be prosecuted
- any program or utility that helps programmers or users
- the fact of being who or what a person or thing is
- having special and usually practical knowledge
- he act of posting or reposting content on your social media
- a file or code, typically delivered over a network
- the imparting or exchanging of information or news
- the condition of being safe from undergoing
- he protection of computer systems and information
- complex configuration composed of hardware
- system that connects two or more computing devices
- the process by which topic ideas that appeal
- personal information
- spreads between computers and causes damage
- a computer or system that provides resources, data, services, or programs
- a set of instructions, data or programs used to operate computers
- organized or classified data, which has some meaningful values for the receiver
- the recording, reproducing, or broadcasting of moving visual images
- action of working with someone to produce or create something
- control the functioning of a system
Down
- available on or performed using the internet or other computer network
- a microcomputer designed for use by one person at a time
- acquisition of knowledge or skills through experience
- the innovative use of digital tools and technologies during teaching and learning
- anything you share on social media
- to make additions, deletions, or other changes
- a media type displayed as visual information
- knowledge and ability to use computers
- create, share, and/or exchange information and ideas in virtual communities
- information that can be interpreted and used by computers
- To store data on and retrieve data from a disk or other peripheral device
- the act of compromising digital devices and networks
- the protection of computer systems
- any electronic or online account
- a secret word or expression used by authorized persons
- he main means of mass communication
- creating globalized accounts on each relevant platform
- to deliver messages across computer networks
- the application of scientific knowledge to the practical aims of human life
- relating to or characteristic of the culture of computers
- a global network of billions of computers and other electronic devices
- a digitally replicated version of something real
- a detailed examination of anything complex
- a person who utilizes a computer or network service
- potential negative action
- electronic technology that generates
- device that accepts information
- online journal or information website
- relating to the present or recent times
50 Clues: personal information • potential negative action • device that accepts information • any electronic or online account • anything you share on social media • the protection of computer systems • he main means of mass communication • control the functioning of a system • electronic technology that generates • online journal or information website • ...
ICT crossword revision CH 1 - 10 2025-05-16
Across
- a process that transforms data into an unreadable format (ciphertext) using a key, making it secure and only accessible to authorized parties with the decryption key.
- a private, internal network within an organization used for secure communication, information sharing, and collaboration among employees.
- a type of artificial intelligence (AI) program designed to mimic the decision-making abilities of a human expert in a specific domain.
- is a technology that converts images of text (typed, handwritten, or printed) into a machine-readable text format.
- LED
- a type of malicious software, or malware, that can infect computers and cause damage
- the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
- observing, interviewing, questionnaire and survey.
Down
- a type of display screen used in older televisions and computer monitors.
- is a visual way for users to interact with a computer, using icons, buttons, menus, and other graphical elements instead of text-based commands.
- It is a technology used to capture and process data from documents that contain pre-defined fields or checkboxes.
- Information and Communication Technology.
- a standard communication protocol used for sending short text messages over cellular networks.
- the set of instructions, data, or computer programs that control a computer's operations and enable it to perform specific tasks.
- a global network of interconnected computer networks and devices that use the internet protocol suite (TCP/IP) to communicate.
- a controlled private computer network that allows communication with business partners, vendors and suppliers or an authorized set of customers.
- Any actions, materials, or conditions that might increase the size or severity of a fire or that might cause a fire to start
- affects muscles, tendons and nerves that undergo repetitive motion or prolonged overuse.
- is an information system that enables content sharing over the Internet through user-friendly ways meant to appeal to users beyond IT specialists and hobbyists.
- a text-based way to interact with a computer or software, using commands typed into a terminal.
- a fatal electrical injury that occurs when an electric current passes through the body and causes death.
- is a type of flat-panel display technology that uses liquid crystals to modulate light and display information.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- the correct or acceptable way of using the internet.
25 Clues: LED • Information and Communication Technology. • observing, interviewing, questionnaire and survey. • the correct or acceptable way of using the internet. • a type of display screen used in older televisions and computer monitors. • a type of malicious software, or malware, that can infect computers and cause damage • ...
networking unit 2026-01-26
Across
- a unique, globally visible identifier assigned by your Internet Service Provider (ISP) to your network (usually your router) that allows it to communicate with other devices and networks across the internet
- a collection of LANs
- a logical identifier (0-65535) that specifies a particular application or service on a device, directing incoming network data to the correct software
- a unique numerical label assigned to every device on a computer network
- the arrangement of devices (nodes) and connections (links) in a computer network, defining how data flows between them
- the latest standard for assigning unique addresses to internet-connected devices, developed to solve the shortage of addresses in the older IPv4 system
- a unique, internal number assigned to devices (like computers, phones, printers) on a local network (home, office) that isn't directly accessible from the public internet
- a restricted, private network that limits access to authorized users or devices, preventing external connections, often using firewalls and proprietary tech, to maintain control
- a network setup where devices connect in a circular loop, with each device linked to exactly two neighbors
- the internet's phonebook, translating human-friendly domain names into machine-readable IP addresses
- a virtual communication endpoint on a device, identified by a number (0-65535), that directs incoming and outgoing network traffic to specific software applications or services, allowing multiple programs (like web browsers and email clients) to use a single network connection simultaneously
Down
- the process of forwarding data packets between different networks, acting like a postal service for the internet, where routers read a packet's destination IP address and use routing tables to find the most efficient path (or "hop") to send it closer to its final destination, enabling communication across the global network
- a standardized set of rules and conventions that dictate how data is formatted, transmitted, and received between devices
- a conceptual, seven-layer framework standardizing network communication, allowing diverse systems to talk by breaking down data flow into distinct functions
- a system of two or more interconnected computing devices that communicate and share data, resources, and services
- a network setup where every device (node) connects individually to a single central point
- the foundational system that assigns unique numerical addresses to devices on the internet, allowing them to communicate, using a 32-bit system
- uses open standards, APIs, and commoditized hardware/software**, allowing different vendors' components to interoperate
- a company that gives individuals and organizations access to the internet
- a collection of computers and devices connected within a small, specific area like a home, office, or campus, allowing them to share resources such as printers, files, and a single internet connection via technologies like Ethernet or Wi-Fi, and enabling high-speed, local communication.
20 Clues: a collection of LANs • a unique numerical label assigned to every device on a computer network • a company that gives individuals and organizations access to the internet • a network setup where every device (node) connects individually to a single central point • ...
Chapter One Crossword Puzzle 2014-09-10
Across
- Determines the best way to move data and manages device addressing
- Communicates directly with the various types of communication media
- Dialog control between two devices happens at this layer
- Reads each frame as it passes through the network
- Software that maps to another layers' protocols
- Distance from the current network to the remote network
- Ensures messages are delivered to the proper device
- When routers connect two or more networks together and use logical addressing
- Receives a digital signal, reamplifies or regenerates that signal, then forwards it out the other port without looking at any data
Down
- Type of switching routers use
- Quantity of data segments, measured in bytes, that the transmitting machine is allowed to send without receiving and acknowledgement
- Ensures data is transferred from the Application layer
- Identifying and confirming the communication partner's availability
- The time measured from when a frame enters a port to when it exits a port
- Memory section where computers store datagrams
- Segments and reassembles data into a single data stream
- Efficiently breaks up a broadcast domain
17 Clues: Type of switching routers use • Efficiently breaks up a broadcast domain • Memory section where computers store datagrams • Software that maps to another layers' protocols • Reads each frame as it passes through the network • Ensures messages are delivered to the proper device • Ensures data is transferred from the Application layer • ...
CODING 2016-02-10
Across
- A term used to describe junk and unsolicited e-mail.
- an error in a computer program or system
- a wireless method for sending information
- either or both of two stated possibilities
- Another Computer term for “Starting a Computer”.
- systems works an interface between User and the hardware. It is basically the platform on which users work.
- A binary unit of data storage with only 2 digits 0 and 1.
- Used to provide the temporary storage of information function.
- A program that runs on a system against the owner’s or user’s wishes
Down
- a system of symbols and rules for writing programs or algorithms.
- It is a worldwide system of computer networks
- identify and remove errors from
- the quantities, characters, or symbols on which operations are performed by a computer
- It is a program that displays the files and data on internet
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A collection of data into a permanent storage structure stored on the hard drive.
- a place where power or information leaves a system.
17 Clues: identify and remove errors from • an error in a computer program or system • a wireless method for sending information • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer”. • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
CODING 2016-02-09
Across
- A wireless method of sending information
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A term used to describe junk and unsolicited e-mail.
- a symbol or function denoting an operation (e.g., ×, +).
- A binary unit of data storage with only 2 digits 0 and 1.
- an error in a computer program or system.
- a place where power or information leaves a system.
- It is a worldwide system of computer networks
Down
- It is a program that displays the files and data on internet
- A program that runs on a system against the owner’s or user’s wishes
- A collection of data into a permanent storage structure stored on the hard drive.
- Another Computer term for “Starting a Computer”
- the quantities, characters, or symbols on which operations are performed by a computer,
- identify and remove errors from
- a system of symbols and rules for writing programs or algorithms
- either or both of two stated possibilities
- Used to provide the temporary storage of information function.
17 Clues: identify and remove errors from • A wireless method of sending information • an error in a computer program or system. • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer” • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
Communication methods 2024-08-29
Across
- Outreach, Programs designed to engage students, such as internships or special events.
- Printed or digital materials (e.g., catalogs, brochures) that provide information on exhibitions and programs.
- Partnerships, Collaborations between government and private sector for mutual benefit.
- and Galas, Formal or celebratory gatherings, often for fundraising.
- Networks, Online communities (e.g., LinkedIn) where professionals connect and share opportunities.
- Resources, Online tools and content, like virtual tours or educational materials.
- Journals and Research Papers, Scholarly publications presenting original research.
- Programs, Opportunities for artists or professionals to work and develop within an institution.
- Training, Professional development opportunities for educators.
- Projects, Joint efforts between institutions or individuals to achieve common goals.
Down
- Reports, Yearly summaries of an institution's activities and financials.
- Packages, Offers to potential sponsors outlining benefits of financial support.
- Communication, Tailored messages or meetings addressing specific individuals.
- Reports, Documents published to inform the public about institutional activities.
- Regular emails sent to subscribers with updates and news.
- Proposals, Documents requesting funding for specific projects.
- Kits, Packages containing information and resources for journalists.
17 Clues: Regular emails sent to subscribers with updates and news. • Proposals, Documents requesting funding for specific projects. • Training, Professional development opportunities for educators. • and Galas, Formal or celebratory gatherings, often for fundraising. • Kits, Packages containing information and resources for journalists. • ...
Redes 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Network 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Englis classwork 2021-06-25
Across
- type of network with a high capacity to transport information that affects the speed of transmission
- is a standard cable for Gigabit Ethernet and others using network protocols that is backward compatible
- aims to supply electricity from suppliers to consumers
- Device used to emit or receive radio waves
- Device that converts digital signals into analog
- a network covering an area reduced to a house, apartment or building
Down
- device enabling the interconnection of devices operating within a network
- is a global network of computer networks whose purpose is to enable the free exchange of information between a
- the connection of nodes by means of electromagnetic waves, without the need for a wired or wired network
- waves generated by some electromagnetic phenomenon. These waves can be analog
- A wireless local area network
11 Clues: A wireless local area network • Device used to emit or receive radio waves • Device that converts digital signals into analog • aims to supply electricity from suppliers to consumers • a network covering an area reduced to a house, apartment or building • device enabling the interconnection of devices operating within a network • ...
ethics terms 2013-01-18
Across
- The computer equivalent of breaking and entering
- program that records every keystroke
- kids who experience this are 3 times more likely to be depressed.
- emails that attempt to trick people into revealing person information to be used for identity theft
- software programs that claim to do one thing but instead damage your computer
- Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
Down
- property Property of the mind
- protects computers from users on other networks, offensive websites, and potential hackers
- that piggybacks on other programs; impairs or destroys a computer's ability to function properly
- infringement First time offenders can face criminal penalties of as much as 5 years in prison
- software installed without your knowledge that is programmed to show you advertisements
11 Clues: property Property of the mind • program that records every keystroke • The computer equivalent of breaking and entering • kids who experience this are 3 times more likely to be depressed. • software programs that claim to do one thing but instead damage your computer • software installed without your knowledge that is programmed to show you advertisements • ...
Services in GCP 2022-06-14
Across
- An open source tool to provision cloud resources with configuration files and code
- GCP service that helps develop and manage your own APIs
- Cloud ____ is a fully managed environment to run Docker containers
- VPC _______ Controls are a way to restrict access and data to trusted networks for multi-tenant services
- How can you run managed Apache Spark and Hadoop in GCP
- This BI tool gives us insight into our costs in multiple cloud environments
Down
- Which GCP service name originates from the the Greek word meaning "pilot"
- This SQL data warehouse allows for 1TB of queries for free every month
- This service allows you to manage GKE clusters and workloads running on VMs across environments
- Cloud ____ helps orchestrate workflows and pipelines using Apache Airflow
- Cloud _____ is Googles CICD platform
11 Clues: Cloud _____ is Googles CICD platform • How can you run managed Apache Spark and Hadoop in GCP • GCP service that helps develop and manage your own APIs • Cloud ____ is a fully managed environment to run Docker containers • This SQL data warehouse allows for 1TB of queries for free every month • ...
Mass media of UK 2024-05-12
Across
- How many home radio stations does the BBC have?
- ...is a very popular channel similar to BBC1 in content but with advertising and rather more “soap operas” and “game shows”.
- ...has been described as the most reliable broadcasting organization in the world.
- People in Britain buy more papers on...then on weekdays.
- ...is a popular weekly celebrity gossip magazine.
- Where the first regular newspapers appeared in the 17th century.
- What is a national musical instrument. It was brought by Romans to England.
Down
- What kind of music does Radio 1 broadcast?
- The satirical fortnightly has a large following among younger people.
- How quality newspapers are called sometimes?
- Which city dominates the media sector in the United Kingdom as national newspapers, tv an radio networks are largely based there.
11 Clues: What kind of music does Radio 1 broadcast? • How quality newspapers are called sometimes? • How many home radio stations does the BBC have? • ...is a popular weekly celebrity gossip magazine. • People in Britain buy more papers on...then on weekdays. • Where the first regular newspapers appeared in the 17th century. • ...
Humanities 2023-09-27
Across
- system, a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- Serotonin is a chemical that carries messages between nerve cells in the brain and throughout your body.
- mindset, A growth mindset means that you thrive on challenge
- lack of success
- It can treat inflammation
- a typical example or pattern of something
Down
- A problem with emotional or behavioral self-control
- mindset, Those who hold a fixed mindset believe that they are either good or bad at something based on their inherent nature
- stem, The brainstem is the structure that connects the cerebrum of the brain to the spinal cord and cerebellum
- It can cause or strengthen labor contractions during childbirth
- cortex, regulates our thoughts, actions and emotions
11 Clues: lack of success • It can treat inflammation • a typical example or pattern of something • A problem with emotional or behavioral self-control • cortex, regulates our thoughts, actions and emotions • mindset, A growth mindset means that you thrive on challenge • It can cause or strengthen labor contractions during childbirth • ...
Marketplace and Insurance 2024-11-15
Across
- Provides health coverage options and consumer protections and increases access to information
- A state-run insurance program that provides free or low-cost health coverage
- The monthly cost you pay for your insurance plan.
- Insurance plans offered in the Marketplace have networks of hospitals, doctors, specialists, pharmacies, and other health care providers available to treat the plan’s members.
- The percentage of the cost you pay for a covered health care service after you’ve met your deductible.
- Small Business Health Options Program
Down
- Affordable Care Act
- Children’s Health Insurance Program
- The amount you pay for covered health care services per year before your plan starts to pay its share, except free preventive services.
- The insurance holder
- A cost-sharing reduction lowers the amount you have to pay for deductibles, coinsurance, and copayments
11 Clues: Affordable Care Act • The insurance holder • Children’s Health Insurance Program • Small Business Health Options Program • The monthly cost you pay for your insurance plan. • A state-run insurance program that provides free or low-cost health coverage • Provides health coverage options and consumer protections and increases access to information • ...
Networking Concepts 2025-05-26
Across
- It refers to a computer network restricted to an organisation
- Commonly used network card
- When mismatched copies of a file are stored on different computers
- A wireless technology used to interconnect mobile phones,computers and printers using short-range wireless connection
- In this topology, all nodes in the network are connected in a circular manner
Down
- These are certain set of rules that determine how data should be transferred over networks, compressed, presented on the screen,and so on
- It refers to a computer network that allows controlled access to an information source available on the internet
- The computers that communicate with each other
- Network created for an individual person
- In this topology, each node is connected to every other node in the network
- Network larger than LAN
11 Clues: Network larger than LAN • Commonly used network card • Network created for an individual person • The computers that communicate with each other • It refers to a computer network restricted to an organisation • When mismatched copies of a file are stored on different computers • In this topology, each node is connected to every other node in the network • ...
Personal Digital Device Crossword. Ishmam Siddiquey 9R 2012-11-06
Across
- Part of a computer that carries out input and output tasks
- A portable computer that comes with a keyboard
- These are programs that can be used for work or entertainment
- A feature that enables a devuce to do more thand one thing
- A feature in a device that can guide you on your travels
- A type of interface that is touch sensitice
- Old style screen with no colour
- you can connect to other networks such as the internet. Or you can connect with bluetooth
- A type of PC that is portable and can be touchscreen
Down
- A device that displays, Projects Data
- A software that supports applications
- A function that allows you to connect and browse the internet on the move
- Enables someone to interact with a digital device
- You can save data
- A feature which is small and light. You can carry it around wherever you go
- This is a type of device that allows you to phone and use other functions. E.g Social Networking, E-mail etc
- A device that enables you to enter data
17 Clues: You can save data • Old style screen with no colour • A device that displays, Projects Data • A software that supports applications • A device that enables you to enter data • A type of interface that is touch sensitice • A portable computer that comes with a keyboard • Enables someone to interact with a digital device • ...
PDS 12/14: Feedback and Emotional Intelligence 2020-12-14
Across
- When admitting a mistake, apologize in a _____ manner.
- Recognizing and understanding other people's emotions.
- What begins on December 23rd?
- Attempting to soften the feedback or make excuses for the negative behavior is called a _____.
- A movement required to hang ornaments on the top of your Christmas tree (2 words, think kinesiology!).
- Offering a _____ sends the message that you are learning from your mistakes.
- _____ bells.
Down
- Feedback should be based on _____.
- Ms. Zhu's favorite holiday.
- Feedback is most effective when it is delivered in a _____ manner.
- _____ grip is required to wrap (and unwrap!) presents.
- Admitting your mistake or mishandling demonstrates a high level of _____.
- The ability to find common ground and build rapport with people to build networks and relationships (2 words).
- Ms. Zhu's favorite Christmas scent (2 words).
- The ability to control or redirect disruptive impulses and moods so that you suspend judgment and can think before acting (2 words).
- How many reindeer does Santa have in the most famous song about a certain Christmas reindeer?
- Direct language helps make it clear that you aren't complaining or making _____.
17 Clues: _____ bells. • Ms. Zhu's favorite holiday. • What begins on December 23rd? • Feedback should be based on _____. • Ms. Zhu's favorite Christmas scent (2 words). • When admitting a mistake, apologize in a _____ manner. • Recognizing and understanding other people's emotions. • _____ grip is required to wrap (and unwrap!) presents. • ...
Research Research and more Research! 2021-09-09
Across
- Title used for the list of books and other sources used in a research project.
- arranged by letters in order of the alphabet.
- Practice of writing pieces of information from a source in an informal manner to use later.
- The address of a resource (document or website on the internet.
- The exclusive right to reproduce, publish or sell a piece of work.
- materials to sell.
- To glance/read through a text quickly, looking for important ideas or information.
Down
- Publishes books and other
- Putting words or ideas into a logical format to assist in the organization of information.
- A set of books giving information about people, places events or things.
- A careful hunting for facts about a subject.
- Putting words or ideas from a source into your own words.
- An electronic communications network that connects computer networks around the world.
- Taking someone's own words or ideas as your own and not giving proper credit to the author.
- Another name for a source written in a specific format. (MLA, APA, etc.)
- A person who writes books, articles, internet sites and literature.
- Library Media Center
17 Clues: materials to sell. • Library Media Center • Publishes books and other • A careful hunting for facts about a subject. • arranged by letters in order of the alphabet. • Putting words or ideas from a source into your own words. • The address of a resource (document or website on the internet. • The exclusive right to reproduce, publish or sell a piece of work. • ...
BLAST from the Past! Opposites 2024-10-14
Across
- a failure to hit, catch, or reach something.
- be unable to think of or recall
- reach a place at the end of a journey or a stage in a journey.
- exert force on (someone or something) in order to move them away from oneself.
- to copy (data) from one computer system to another
- start the flow or operation of something by means of a tap, switch, or button.
- a communication method that uses electronic devices to deliver messages across computer networks.
- go somewhere to collect someone, typically in one's car.
Down
- another word for begin
- a great interest and pleasure in something (like cooking)
- impart knowledge to or instruct (someone) as to how to do something
- discover after a deliberate search.
- obtain in exchange for payment.
- a success in an examination, test, or course
- the use of (something) on the understanding that it will be returned
- be successful or victorious in (a contest or conflict).
- separate or cause to separate into pieces as a result of a blow, shock, or strain.
17 Clues: another word for begin • be unable to think of or recall • obtain in exchange for payment. • discover after a deliberate search. • a failure to hit, catch, or reach something. • a success in an examination, test, or course • to copy (data) from one computer system to another • be successful or victorious in (a contest or conflict). • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
Love of Learning Crossword! 2025-11-05
Across
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The art and science of designing and constructing buildings.
- The study of how societies use resources and respond to scarcity.
- The study of religious belief and the nature of the divine.
- The study of ancient Greek and Roman literature, language, and culture.
- The scientific study of crime and criminal behavior.
- The study of society and human relationships within it.
- The application of science and math to design and build structures, machines, and systems.
- The branch of biology dealing with organisms and their environments.
Down
- The study of human societies, cultures, and their development.
- The profession of reporting, writing, and editing news.
- The scientific study of language and its structure.
- The field involving the design, construction, and use of machines that can act autonomously.
- The process of recording, summarizing, and analyzing financial transactions.
- The science of Earth’s physical structure, history, and processes.
- The practice of protecting computers, networks, and data from attacks.
- The study of human history through excavation and artefacts.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
TLE 2022-10-10
Across
- combining multiple pieces of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- reducing detailed data to its main points
- any storage media that holds content in digital format and is read using a laser assembly
- not directly accessible by the CPU
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- the collection, organization, analysis, interpretation and presentation of data
- list detail or summary data or computed
- ensuring that supplied data is correct and relevant
- also known as main memory
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- are small pictures that are linked to actual program
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- separation of data into various categories
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- software programs that allows a user to locate, access, and display web pages
- the common storage unit in a computer
Down
- coated strip of plastic on which data can be encoded
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- a software or a device that allows users to create, edit, and print documents
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- hardware data storage device developed by lomega that functions like a standard 1.44
- can be accessed just as fast as any other data
- is the main, and usually the largest, data storage device in a computer
- arranging items in some sequence and/or in different sets
- is used in the computers to store the data
- a soft magnetic disk
- refers to where the typist positions his/her fingers
- used as the computer begins to boot up
- is a high-speed access area that can be either a reserved section of main memory or a storage device
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • is used in the computers to store the data • ...
TLE 2022-10-10
Across
- a software or a device that allows users to create, edit, and print documents
- coated strip of plastic on which data can be encoded
- the collection, organization, analysis, interpretation and presentation of data
- a small, portable flash memory card that plugs into a computer's USB port and functions as a portable hard drive
- includes the conversion of raw data to machine-readable from, flow of data through the CPU and memory to output devices, and formatting or transformation of output.
- define as an organizational unit, or container, used to organize folders and files into a hierarchical structure
- arranging items in some sequence and/or in different sets
- list detail or summary data or computed
- is used in the computers to store the data
- a location where deleted files or folders are temporarily stored in every version of Microsoft Windows since Windows 95
- hardware data storage device developed by lomega that functions like a standard 1.44
- is a high-speed access area that can be either a reserved section of main memory or a storage device
Down
- separation of data into various categories
- also known as main memory
- often called productivity programs because they enable the user to complete tasks, such as creating documents, spreadsheets, databases and publications, doing online research, sending email, designing graphics, running businesses, and even playing games
- are small pictures that are linked to actual program
- combining multiple pieces of data
- is the main, and usually the largest, data storage device in a computer
- a soft magnetic disk
- can be accessed just as fast as any other data
- not directly accessible by the CPU
- reducing detailed data to its main points
- typically it involves a robotic mechanism which will mount(insert) and dismount removable mass storage media into a storage device
- software programs that allows a user to locate, access, and display web pages
- any storage media that holds content in digital format and is read using a laser assembly
- used as the computer begins to boot up
- ensuring that supplied data is correct and relevant
- an electronic flash memory storage disk commonly used in consumer electronic devices such as digital cameras, mp3 players, mobile phones, and other small portable devices
- refers to where the typist positions his/her fingers
- is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices
- the common storage unit in a computer
31 Clues: a soft magnetic disk • also known as main memory • combining multiple pieces of data • not directly accessible by the CPU • the common storage unit in a computer • used as the computer begins to boot up • list detail or summary data or computed • reducing detailed data to its main points • separation of data into various categories • ...
Tech Terms and Acronyms 2023-05-18
Across
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Portable document format
- A document or other file that is sent along with an email
- a device that allows computers to transmit information to each other
- The method by which uses access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- General term for a software programme that has been designed to harm other computers
- Can't stop laughing
- A software program that allows you to surf the web
- Referring to the storing and accessing of date and programmes over the Internet instead of another type of hard drive
- Short-range wireless communication technology
- A way of sending messages over the Internet
- Today I learnt
- A type of software that allows users to create 2D and 3D design modelling
- A technology that allows computers and other devices to communicate via a wireless signal
- A set of interconnected networks that allow computers in different locations to exchange information
Down
- is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
- Universal resource locator
- Unsolicited email messages sent for marketing purposes
- Random access memory
- Measures designed to protect a computer, device, or network from Cybercrime
- The "brains" of a computer, responsible for performing tasks and calculations
- Hyper-text markup language
- A link to a particular web page that is saved in the browser
- Direct message
- Conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- To load and initialise the operating system on a computer or other device
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Any type of illegal activity that is undertaken on a computer
- A microprocessor that performs many functions and calculations that make a computer function
- Communications technology whereby a single can carry more than one type of signal at once
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- To compress and archive files into a smaller size
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Universal resource locator • Hyper-text markup language • Conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • To compress and archive files into a smaller size • ...
Technology Influencing Business Decisions 2024-11-18
Across
- The theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
- The state of being free from danger, risk, or anxiety, or something that protects or guarantees something else.
- The quality of working well in an organised way, without wasting time or energy.
- A live audio or audiovisual meeting with two or more participants. With the ability to teleconference, remote teams in an organisation can collaborate and communicate, even when geographically dispersed.
- Any of the different kinds of transport facilities used for moving goods and people from one location to the other.
- The application of scientific knowledge to the practical aims of human life or, as it is sometimes phrased, to the change and manipulation of the human environment.
- Digital technology that allows the sharing of ideas and information, including text and visuals, through virtual networks and communities.
- Fitness or suitability for performing an action or fulfilling a requirement.
- An occasion or situation that makes it possible to do something that you want to do or have to do, or the possibility of doing something.
Down
- A situation in which an employer allows people to choose the times that they work so that they can do other things, for example spend time with their children.
- The sending and receiving of information can be one-on-one or between groups of people, and can be face-to-face or through communication devices.
- A business strategy that leverages the internet and uses online platforms to generate awareness by connecting with customers and promoting sales for products or services.
- When personal information is accessed, disclosed without authorisation, or is lost.
- Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- The state of needing something or someone, especially in order to continue existing or operating.
- A worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols.
- When a company has a disparity between the money they are bringing in, and the money going out, leaving them in a net deficit.
- A measure of economic performance that compares the goods and services produced (output) with the inputs used to produce those goods and services.
- When an employer involuntarily and permanently removes a position that is currently being held by an employee or separated from a job.
- The process by which businesses or other organisations develop international influence or start operating on an international scale
20 Clues: Fitness or suitability for performing an action or fulfilling a requirement. • The quality of working well in an organised way, without wasting time or energy. • When personal information is accessed, disclosed without authorisation, or is lost. • The state of needing something or someone, especially in order to continue existing or operating. • ...
Chemical Bonds Crossword Puzzle 2021-12-02
Across
- bonds that transfer electrons
- In a chemical formula, the number written to the right of chemical symbol and slightly below it. Tells you the number of atoms of that element in the compound.
- formula Chemical symbols that represent the atoms of the elements and their ratios in a chemical compound
- bond The bond that can hold atoms together in large networks or small groups.
Down
- Two or more atoms held together by covalent bonds.
- The bond that can hold atoms together in large networks or small groups.
- A substance made of atoms of two or more elements.
- bonds that share electrons
8 Clues: bonds that share electrons • bonds that transfer electrons • Two or more atoms held together by covalent bonds. • A substance made of atoms of two or more elements. • The bond that can hold atoms together in large networks or small groups. • bond The bond that can hold atoms together in large networks or small groups. • ...
Cyber Security 2021-02-12
Across
- A malicious form of self replicating
- Gathers information about how you use your computer
- A set of secret characters, that only you know, to keep your private information secure.
- Someone that tries to gain access to your personal information or devices.
Down
- are able to exploit vulnerabilities in the a computers operating system or a networks hardware
- Short for malicious software, that gains access to your computer or device
- A word that people use to tell them that no one else knows
7 Clues: A malicious form of self replicating • Gathers information about how you use your computer • A word that people use to tell them that no one else knows • Short for malicious software, that gains access to your computer or device • Someone that tries to gain access to your personal information or devices. • ...
Azure Fundamentals Launchpad Prep 2024-01-24
Across
- ability of a system to automatically scale up or down the amount of resources that a system uses in response to changing demand
- physically separate datacenters within an Azure region
- extend your on-premises networks into the Microsoft cloud
- logically organize resource groups and facilitate billing
Down
- helps you keep track of Azure resource
- shared computing resources accessible over the internet, offering a scalable and on-demand public cloud service
- Scaling that focuses on increasing or decreasing the capabilities of the resources
7 Clues: helps you keep track of Azure resource • physically separate datacenters within an Azure region • extend your on-premises networks into the Microsoft cloud • logically organize resource groups and facilitate billing • Scaling that focuses on increasing or decreasing the capabilities of the resources • ...
Lyrics Soup 2020-07-15
Across
- police United States ( 911 ) / Brazil ( 190 )
- the opposite of sloppy
- he person we hire to animate a party
- The person we call when a fire occurs.
Down
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- profession that develops a diet that establishes the patient's need.
- firmness of spirit to face emotionally or morally difficult situations
7 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • profession that develops a diet that establishes the patient's need. • firmness of spirit to face emotionally or morally difficult situations • ...
Liquid Staked Derivatives 2024-05-07
Across
- The maximum amount of a financial instrument that can be traded in a single order
- The process of converting one currency into another at a predetermined exchange rate
- A digital asset designed to mimic the value of a traditional currency.
- A cryptographic token that represents ownership in a decentralized network.
Down
- A digital currency designed to be secure, decentralized, and censorship-resistant.
- The process of earning rewards by participating in proof-of-stake networks
- This term describes assets that are easily convertible to cash without significant loss of value.
7 Clues: A digital asset designed to mimic the value of a traditional currency. • The process of earning rewards by participating in proof-of-stake networks • A cryptographic token that represents ownership in a decentralized network. • The maximum amount of a financial instrument that can be traded in a single order • ...
neuro-fuzzy 2024-03-06
Across
- Backpropagation is a _________ method
- learning method employed to train the multilayer feedforward networks is called the ___________, or back-propagation
- A way to escape the local minima trap
- A heuristic approach for selecting the number of hidden layers
Down
- A single layer perceptron is unable to implement an elementary function like a ________
- It is essentially a ________ method to minimize the total squared error of the output computed by the net
- The strength of a neural net lies in its tolerance of _____ input pattern
7 Clues: Backpropagation is a _________ method • A way to escape the local minima trap • A heuristic approach for selecting the number of hidden layers • The strength of a neural net lies in its tolerance of _____ input pattern • A single layer perceptron is unable to implement an elementary function like a ________ • ...
cyber security engineer 2024-07-18
Across
- The systematic process of finding and fixing security holes in software or networks.
- The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
- A process to determine and document potential threats to an organization
- The analysis and examination of digital data for evidence or investigation.
Down
- The method used to protect information by transforming it into an unreadable format
- The response to and management of a security breach or attack.
- The practice of securing information systems against unauthorized access and threats.
7 Clues: The response to and management of a security breach or attack. • A process to determine and document potential threats to an organization • The analysis and examination of digital data for evidence or investigation. • The method used to protect information by transforming it into an unreadable format • ...
Fake news 2024-10-02
Across
- kind of hygiene that individuals and organizations use to maintain security resilience of systems, devices, networks, and data.
- kind of war conducted in order to gain informational advantage over the opponent
- the process of establishing the truth,accuracy of information.
Down
- a kind of thinking in which you question,analyse, interpret, evaluate and make a judgementnabout what you read, hear, say, or write.
- A thing that is not genuine, not true, made-up;
- the process of verifying facts
- Information about current event
7 Clues: the process of verifying facts • Information about current event • A thing that is not genuine, not true, made-up; • the process of establishing the truth,accuracy of information. • kind of war conducted in order to gain informational advantage over the opponent • ...
Community Cultural Capital 2025-03-29
Across
- Cultural Wealth Model Founded by Tara Yosso and names six kinds of cultural capital that students bring to school
- Hopes and dreams that students have
- Various language and linguistic skills students bring with them to school
Down
- Peers and other social contacts that help students navigate the world
- Students support system of family, friends, and networks
- Student's ability to navigate institutions, particularly negative and unsupportive
- Founded in the communities of color, securing equal rights and freedom. Students of color are prepared for problem solving.
7 Clues: Hopes and dreams that students have • Students support system of family, friends, and networks • Peers and other social contacts that help students navigate the world • Various language and linguistic skills students bring with them to school • Student's ability to navigate institutions, particularly negative and unsupportive • ...
Cyber/Digital Literacy 2024-11-06
Across
- example of computer virus
- of malware that can make copies of itself and spread automatically across computers in a network.
- has some essential skills for effective and responsible digital navigation, including critical thinking, media literacy, and cybersecurity awareness.
Down
- -Refers to the trail of data you leave when using the internet.
- is use protect your personal information
- Who's actively participate in cyberspace and the online community offered through the internet
- Type of crime that uses computers or networks harm.
7 Clues: example of computer virus • is use protect your personal information • Type of crime that uses computers or networks harm. • -Refers to the trail of data you leave when using the internet. • Who's actively participate in cyberspace and the online community offered through the internet • ...
round-3-set-5 2026-01-31
Across
- The leader of the Autobots who can transform into a truck.
- A component in neural networks that converts input data into a usable format.
- The "M" in the common AI acronym ML.
Down
- A "rule of thumb" or shortcut used to help an AI solve problems faster.
- The AI companion to Master Chief in the Halo video game series.
- The interactive AI system that assists the heroes in The Flash.
- The famous test used to determine if a machine can exhibit human-like intelligence.
7 Clues: The "M" in the common AI acronym ML. • The leader of the Autobots who can transform into a truck. • The AI companion to Master Chief in the Halo video game series. • The interactive AI system that assists the heroes in The Flash. • A "rule of thumb" or shortcut used to help an AI solve problems faster. • ...
Designing and Building 2014-05-10
Across
- Engineers use __________ to design and construct different machines and buildings
- ___________ hoop was successful in its second try
- A dam is a barrier that is built across the path of a _________ to hold back the water
- People travelled a great deal for business or __________
- Rulers in _________ lands founded new cities in such as Cairo and Baghdad
- Well-water is lifted using a system of ____________
- Engineers found a way to power mills and bring __________
- Engineering tool used in war can cause great __________
- Engineers need to determine the number of ___________ and cost before beginning the task
Down
- Underground __________ conduct water directly from an underground source to where it is needed.
- Mowlana Hazir Imam guides us to think carefully about the way we shape our __________
- Vast networks of ________ canals is needed to water the fields
- ________ bridges allowed boats to pass underneath
- _________ uses power of running water to make it turn
- __________ was a famous Muslim architect known for his mosques with enormous domes
- Suspension bridges use cables attached to strong supports to hold up the __________
- Imam Al-Muizz invented the fountain __________
17 Clues: Imam Al-Muizz invented the fountain __________ • ___________ hoop was successful in its second try • ________ bridges allowed boats to pass underneath • Well-water is lifted using a system of ____________ • _________ uses power of running water to make it turn • People travelled a great deal for business or __________ • ...
CODING 2016-02-09
Across
- A program that runs on a system against the owner’s or user’s wishes
- Used to provide the temporary storage of information function.
- A collection of data into a permanent storage structure stored on the hard drive.
- A term used to describe junk and unsolicited e-mail.
- the quantities, characters, or symbols on which operations are performed by a computer,
- It is a worldwide system of computer networks
- a symbol or function denoting an operation (e.g., ×, +).
- an error in a computer program or system.
Down
- A wireless method of sending information
- It is a program that displays the files and data on internet
- a place where power or information leaves a system.
- A term used to describe an unwanted program that uses system or application vulnerabilities to infect a computer
- A binary unit of data storage with only 2 digits 0 and 1.
- a system of symbols and rules for writing programs or algorithms
- either or both of two stated possibilities
- identify and remove errors from
- Another Computer term for “Starting a Computer”
17 Clues: identify and remove errors from • A wireless method of sending information • an error in a computer program or system. • either or both of two stated possibilities • It is a worldwide system of computer networks • Another Computer term for “Starting a Computer” • a place where power or information leaves a system. • A term used to describe junk and unsolicited e-mail. • ...
Transport 2025-07-12
Across
- Transport systems are vital to the functioning of ________ activities
- ease of movement within and across transport nodes
- number of occurrence of a service
- a location with high _____________ is one where many different destinations can be reached with relative ease
- Availability and reach of transport infrastructure
- a type of non-motorised transport mode
- goods and services are bought and sold over the internet
- Transport networks are needed to fulfill the demand for ________
Down
- a scale of transport network that allows for travel between cities
- a path for travel between nodes
- a type of acitivity found within the CBD, where major transport nodes are found
- number of people and amount of goods that can be moved
- major transport nodes are also found in popular _______ destinations
- short travel time and low travel ____ indicates high accessibility
- an opportunity that is more readily available in the central area to earn an income
- a transport network's performance and r__________ is dependent on the quality of its infrastructure
- An entry point into the transport network
17 Clues: a path for travel between nodes • number of occurrence of a service • a type of non-motorised transport mode • An entry point into the transport network • ease of movement within and across transport nodes • Availability and reach of transport infrastructure • number of people and amount of goods that can be moved • ...
