networks Crossword Puzzles
ethics terms 2013-01-18
Across
- that piggybacks on other programs; impairs or destroys a computer's ability to function properly
- software installed without your knowledge that is programmed to show you advertisements
- logger program that records every keystroke
- infringement First time offenders can face criminal penalties of as much as 5 years in prison
- horse software programs that claim to do one thing but instead damage your computer
- The computer equivalent of breaking and entering
Down
- emails that attempt to trick people into revealing person information to be used for identity theft
- Malicious software designed to damage or disrupt a system, examples are viruses and Trojan horses
- property Property of the mind
- bullying kids who experience this are 3 times more likely to be depressed.
- protects computers from users on other networks, offensive websites, and potential hackers
11 Clues: property Property of the mind • logger program that records every keystroke • The computer equivalent of breaking and entering • bullying kids who experience this are 3 times more likely to be depressed. • horse software programs that claim to do one thing but instead damage your computer • ...
Cybersecurity Terms 2022-05-13
Across
- The practice of securing systems, networks, and technologies from attacks and unauthorized access
- A type of network security that filters incoming and outgoing traffic
- When a legitimate website’s traffic is redirected to a fake site for malicious purposes
- Disguising data so it’s impossible to decipher without authorization
Down
- Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
- Sending emails with a forged sender address is called email...
- Malicious software designed to disrupt a computer, server, or network
- A chain of Internet-connected devices centrally controlled by a hacker
- Email that you’ve technically solicited but it may serve little to no purpose to you
- A tool that allows you to maintain online anonymity while using the Internet
- DKIM and DMARC are both examples of a standard email authentication...
11 Clues: Sending emails with a forged sender address is called email... • Disguising data so it’s impossible to decipher without authorization • Malicious software designed to disrupt a computer, server, or network • A type of network security that filters incoming and outgoing traffic • A chain of Internet-connected devices centrally controlled by a hacker • ...
Network 2021-06-25
Across
- systematization of wireless communication to minimize wired connections.
- does not use wires or cables to receive and send messages
- limited form of interprocess communication used in Unix and other POSIX-compliant operating systems
- is a device that converts digital signals into analog
- A type of twisted pair cable that can transmit data
- device that allows interconnecting computers that work within the framework of a network.
Down
- a device that transforms electrical energy into electromagnetic waves
- a set of networks that constitute a single logical network of global reach
- a computer network that covers an area confined to a house, an apartment, or a building
- any type of network with high capacity to transport information
- set of computers, nodes and software connected to each other by means of physical or wireless devices
11 Clues: A type of twisted pair cable that can transmit data • is a device that converts digital signals into analog • does not use wires or cables to receive and send messages • any type of network with high capacity to transport information • a device that transforms electrical energy into electromagnetic waves • ...
Common Tech Terms 2020-03-29
Across
- device hardware device capable of holding information
- region of computer memory where frequently accessed data can be stored for rapid access
- group of files that enable one or more hardware devices to communicate with the computer’s operating system
- maximum speed at which data can be transmitted between computers in a network.
- term used to describe the unwritten rules of Internet courtesy
- HTML elements which give web browsers additional information about the web page
Down
- program which gives a view of all running programs, processes and services.
- tool to keep track of changes in code and files during software development
- - The manipulation of data to prevent accurate interpretation by unintended users.
- A pre established format or design for a document.
- destructive software program containing code capable of gaining access to computers or networks
11 Clues: A pre established format or design for a document. • device hardware device capable of holding information • term used to describe the unwritten rules of Internet courtesy • program which gives a view of all running programs, processes and services. • tool to keep track of changes in code and files during software development • ...
5.04 Crossword Puzzle 2023-04-27
Across
- Computer software to mimic a human expert
- A system of computers connected together by telephone wires, cable wires, or other means
- Programs that instruct computers to perform specific operations
- A navigational system that uses satellite technology to determine location and provide direction
- telephony Technology that allows users to communicate over the Internet rather than through traditional public networks
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
Down
- The practical application of science to society and industry
- Working from home or a remote location
- A mobile phone with advanced capabilities, such as accessing the Internet
- An object placed into orbit by humans; most are used for communications purposes
- The use of computer technology to plan, design, test, and alter products
11 Clues: Working from home or a remote location • Computer software to mimic a human expert • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • The use of computer technology to plan, design, test, and alter products • A mobile phone with advanced capabilities, such as accessing the Internet • ...
3/4 vocab crossword 2022-11-04
Across
- A user on social media who has established credibility in a specific industry
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
Down
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- the extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- Electronic/online bullying
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- Displays the most popular news first
- Fake online profile
- Market methods conducted through electronic
- The number of times one’s content is displayed, no matter if it was clicked or not.
20 Clues: Fake online profile • Electronic/online bullying • Displays the most popular news first • Market methods conducted through electronic • A user on social media who has established credibility in a specific industry • The number of times one’s content is displayed, no matter if it was clicked or not. • ...
TECHNOLOGY 2023-10-25
Across
- s a hole in the wall or in a machine where you can put a plug (noun)
- AI-powered technology that responds to voice commands, such as Amazon's Alexa or Apple's Siri (2 words)
- a decentralized, digital ledger technology that records transactions across multiple computers, ensuring transparency and security (noun)
- the measurement and statistical analysis of people's unique physical and behavioral characteristics, such as fingerprints, for authentication (noun)
- a thick wire that carries electricity or digital information (noun)
- the practice of protecting systems, networks, and data from digital attacks, theft, or damage (noun)
- science of developing and producing extremely small tools and machines by controlling the arrangement of atoms and molecules (noun)
- the process of converting analog information into digital format, making it easier to store, transmit, and manipulate (noun)
- a technique that creates three-dimensional images by recording light patterns (noun)
- genetic modification of plants (noun)
- a point where wires, pipes, etc join (noun)
- a mobile phone that can be used as a small computer (noun)
- a region in California known for its concentration of technology companies and innovation (2 words)
Down
- the process of converting data into a code to prevent unauthorized access (noun)
- the design and construction of robots, often used in manufacturing and automation (noun)
- something you speak into to record your voice or make it sound louder (noun)
- a system for connecting electronic devices to the internet without using wires (noun)
- the process of discovering patterns or information in large datasets, often used for business and research purposes (2 words)
- digital or virtual currencies that use cryptography for security, such as Bitcoin or Ethereum (noun)
- the application of nanotechnology in the field of medicine for diagnosis, treatment, and drug delivery (noun)
- the protection of personal information and the right to control how it is collected and used (2 words)
- the use of digital communication tools to harass, threaten, or intimidate others (noun)
- a person who gains unauthorized access to computer systems or networks, often with malicious intent (noun)
- a document you add to an email message (noun)
- unmanned aerial vehicles (UAVs) controlled remotely or autonomously for various purposes, including photography and surveillance (noun)
- the provision of medical services and consultations remotely using telecommunications technology (noun)
- a technology that superimposes computer-generated information, such as images or sound, onto the real world (compound noun)
- a set of rules or instructions for solving a problem or accomplishing a task, often used in computer programming (noun)
- introducing new ideas, methods, or products, especially in the field of technology (adj)
- a group of computers,machines or people which are connected (noun)
30 Clues: genetic modification of plants (noun) • a point where wires, pipes, etc join (noun) • a document you add to an email message (noun) • a mobile phone that can be used as a small computer (noun) • a group of computers,machines or people which are connected (noun) • a thick wire that carries electricity or digital information (noun) • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
• Social Networks & Social Support Theory: Novice to Expert 2023-02-20
Across
- Two areas crucial to social learning are ____ and community
- Level one
- Beginner Level two
- Influenced by the setting learning is taking place
- Level four
- Thinking and learning are structured by the____ available
Down
- Nurses will grow based on _____ available to them
- Gala and____ created the Social Support Theory
- Level three
- A nurse needs to use_____ clinical judgement
- Levels of proficiency
- Novice to Expert Theory
- Expert nurses need to take novice under their
- Social theory____ the Novice to Expert theory
- Level five
- Learning and thinking are _____ activities Thinking and learning need
16 Clues: Level one • Level five • Level four • Level three • Beginner Level two • Levels of proficiency • Novice to Expert Theory • A nurse needs to use_____ clinical judgement • Expert nurses need to take novice under their • Social theory____ the Novice to Expert theory • Gala and____ created the Social Support Theory • Nurses will grow based on _____ available to them • ...
Cybercrime Crossword Puzzle 2021-07-13
Across
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- Intentional or reckless alteration damaging deletion of computer data.
- what comes after terabyte
- is a concept describing a widespread interconnected digital technology.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- Interception made by technical means without right.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- the process of converting encrypted information back into normal, understandable text.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- is pornography that exploits children for sexual stimulation
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • Interception made by technical means without right. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • ...
Designing and Building 2014-05-10
Across
- _________ clocks used sun to determine the time
- ____________ travelled in search of knowledge
- __________ was a famous Muslim architect known for his mosques with enormous domes
- Vast networks of irrigation ________ is needed to water the fields
- Rulers in Muslim lands founded new cities in such as ________ and Cairo
- During Fatimid times, an attempt was made to make a __________ near Cairo
- Arch bridges were built over rivers to let _________ from underneath
- Imam Al-Muizz invented the __________
- Engineers need to determine the number of people and _______ before starting the work
- ___________ is lifted using a system of gear-wheels
Down
- Engineers found a way to __________ mills and bring water
- Engineers use __________ to design and construct different machines and buildings
- ________ was invented by Greeks and improved by Muslim Scientists
- A _______ is a barrier that is built across the path of a river to hold back the water
- ____________has been used for lifting water for over four thousand years
- They designed machines and buildings that were both useful and _____________
- Different types of ________ have been used in different situations
17 Clues: Imam Al-Muizz invented the __________ • ____________ travelled in search of knowledge • _________ clocks used sun to determine the time • ___________ is lifted using a system of gear-wheels • Engineers found a way to __________ mills and bring water • ________ was invented by Greeks and improved by Muslim Scientists • ...
Muscular System Crossword 2022-02-07
Across
- muscle that abducts the thumb
- muscle with an anterior fascicle that adducts, medially rotates and flexesthe thigh, and a posterior fasicle that assists in thigh extension
- production of ATP in the presence of oxygen
- muscle that adducts and medially rotates the thigh
- move away from midline in the sagittal plane
- heart's ability to control its own contractions
- protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
Down
- muscle that adducts, medially rotates, and flexes the thigh
- moves the bone towards the midline
- muscle that abducts the little finger
- broad, tendon-like sheet of connective tissue that attatches a skeletal muscle to another skeletal muscle or to a bone
- enzyme that hydrolyzes ATP to ADP
- formation of blood capillary networks
- loss of structural proteins from muscle fibers
- moves the bone away from the midline
- neurotransmitter that binds at a motor end-plate to trigger depolarization
- change in voltage of a cell membrane in response to a stimulus that results in transmission of an electrical signal
17 Clues: muscle that abducts the thumb • enzyme that hydrolyzes ATP to ADP • moves the bone towards the midline • moves the bone away from the midline • muscle that abducts the little finger • formation of blood capillary networks • production of ATP in the presence of oxygen • move away from midline in the sagittal plane • loss of structural proteins from muscle fibers • ...
Digital Literacy Crossword 2024-10-09
Across
- The exchange of information or ideas between people.
- A group of people who watch, listen to, or engage with a presentation or performance.
- Wrongful deception intended to result in financial or personal gain.
- The ability to enter or use something.
- Individuals or organisations that support an event or activity, usually financially.
- A compulsive dependence on a substance or behaviour, often harmful.
- A state of being comfortable, healthy, or happy.
- The right to keep personal information confidential and free from public scrutiny.
Down
- A particular way of viewing or considering something.
- The size, extent, or importance of something.
- A display or demonstration of information to an audience.
- A dishonest scheme or trick to deceive people, usually for money.
- An approximate calculation or judgment regarding a quantity or value.
- Measures taken to protect computers and networks from digital attacks.
- The act of communicating or engaging with others.
- A list of items to be discussed or acted upon, often in a meeting.
- A software application used to view and navigate the internet.
17 Clues: The ability to enter or use something. • The size, extent, or importance of something. • A state of being comfortable, healthy, or happy. • The act of communicating or engaging with others. • The exchange of information or ideas between people. • A particular way of viewing or considering something. • A display or demonstration of information to an audience. • ...
Logan Rose - Telecomm Crossword 2025-07-09
Across
- Network segmentation tool that doesn’t require new wires
- Network layout, in tech or geometry
- Old-school phone system, in tech lingo
- Primary telecom junction where external lines meet internal networks, briefly
- Wiring hub between workstations and the main frame, briefly
- Wireless device responsible for enabling WiFi connectivity
- California-based network solutions company or a tree with "berries" of the same name
- Telecomm company with a name that’s a rock-solid choice for countertops
- Company known for remote power control and console access gear, briefly
- Acronym for a no-man’s land in both Korea and computing
Down
- Boardwalk’s blue neighbor or the name of a network solution that offers hardware maintenance
- It hides your IP like a digital cloak, like AnyConnect at Smucker for example
- Brains of Aruba’s cloud-based network management system, or someone who assigns parts to a full musical ensemble
- Digital highway’s lane count, metaphorically
- Acronym for virtualized network overlay tech, or an anagram of "wands"
- It sounds like something from space weather, but they’re all about network health
- Networking giant with a bridge in its logo
17 Clues: Network layout, in tech or geometry • Old-school phone system, in tech lingo • Networking giant with a bridge in its logo • Digital highway’s lane count, metaphorically • Acronym for a no-man’s land in both Korea and computing • Network segmentation tool that doesn’t require new wires • Wireless device responsible for enabling WiFi connectivity • ...
Love of Learning Crossword! 2025-11-05
Across
- The scientific study of crime and criminal behavior.
- The profession of reporting, writing, and editing news.
- The study of ancient Greek and Roman literature, language, and culture.
- The study of knowledge, existence, and reason — literally “love of wisdom.”
- The study of religious belief and the nature of the divine.
- The study of human history through excavation and artifacts.
- The application of science and math to design and build structures, machines, and systems.
- The study of human societies, cultures, and their development.
Down
- The field involving the design, construction, and use of machines that can act autonomously.
- The practice of protecting computers, networks, and data from attacks.
- The art and science of designing and constructing buildings.
- The study of society and human relationships within it.
- The process of recording, summarizing, and analyzing financial transactions.
- The branch of biology dealing with organisms and their environments.
- The scientific study of language and its structure.
- The study of how societies use resources and respond to scarcity.
- The science of Earth’s physical structure, history, and processes.
17 Clues: The scientific study of language and its structure. • The scientific study of crime and criminal behavior. • The profession of reporting, writing, and editing news. • The study of society and human relationships within it. • The study of religious belief and the nature of the divine. • The art and science of designing and constructing buildings. • ...
COMPUTING 2022-11-08
Across
- A ... is a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position.
- ... is a part of the internet.
- who discovered the internet
- Two very common types of networks include: Local Area Network (LAN) and .... Area Network.
Down
- ... consists of two or more computers that are linked in order to share resources , exchange files, or allow electronic communications.
- used to create letters, numbers, and symbols, and perform additional functions in computer.
- ... is a powerful computer.
- wireless connection
8 Clues: wireless connection • ... is a powerful computer. • who discovered the internet • ... is a part of the internet. • Two very common types of networks include: Local Area Network (LAN) and .... Area Network. • used to create letters, numbers, and symbols, and perform additional functions in computer. • ...
Communication, the Press 2021-01-05
Across
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- a meeting of people face to face, for consultation or to obtain information for research or a survey.
- a paper that is printed and distributed usually daily or weekly and that contains news and articles
Down
- A set of printed or written questions with a choice of answers, devised for the purposes of a survey or statistical study
- an examination of opinions, behaviour, etc, made through asking people questions.
- Newspapers typically popular in style and dominated by sensational stories
- the global system of interconnected computer networks
- print media
8 Clues: print media • the global system of interconnected computer networks • Newspapers typically popular in style and dominated by sensational stories • an examination of opinions, behaviour, etc, made through asking people questions. • a paper that is printed and distributed usually daily or weekly and that contains news and articles • ...
CYBERSECURITY 2023-03-22
Across
- A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES
- FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA
- A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE
Down
- PROGRAM WHICH GETS YOUR DATA
- DATA THAT DESCRIBES THE FILE
- SEGMENT OF LARGER MESSAGE SENT OVER NETWORKS; YOU CAN SEE ITS CONTENT USING A PROGRAM LIKE WIRESHARK OR Burp Suite ;)
- A PROGRAMMING LANGUAGE IN WHICH A PROGRAM (MALICOUS ONE; USED FOR DoS ATTACK) CALLED slowloris WAS WRITTEN
- THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword}
8 Clues: PROGRAM WHICH GETS YOUR DATA • DATA THAT DESCRIBES THE FILE • FORM OF CRYPTOGRAPHY THAT ENCODES YOUR DATA • A LANGUAGE WHICH ALLOWS YOU TO CODE A WEBSITE • A PROGRAM YOU USE FOR SEARCHING SOMETHING ON THE INTERNET; IT'S A PROGRAM WHICH STORES COOKIES • THE NAME OF HACKING COMPETITION TO FIND SOME FLAG LOOKING FOR EXAMPLE LIKE THAT: flag{easyCrossword} • ...
NGFW 2023-04-10
Across
- Log in to this to get tenant-centric view as Step 1 to activate AIOPS
- Palo Alto Networks Migration Tool
- Need to Calculate and purchase these for software NGFWs like VM-Series and CN-Series - CREDITS
- This provides unified policy management
Down
- This NGFW feature enables you to leverage user information stored in a wide range of repositories
- Process of setting up the certificates required to establish the firewall as a trusted third party (proxy) to the session between the client and the server - Decryption
- Latest Industry leading PAN-OS 11.0
- NGFW Feature that enables you to see the applications on your network
8 Clues: Latest Industry leading PAN-OS 11.0 • Palo Alto Networks Migration Tool • This provides unified policy management • Log in to this to get tenant-centric view as Step 1 to activate AIOPS • NGFW Feature that enables you to see the applications on your network • ...
Network component 2023-05-02
Across
- device for making and breaking the connection in an electric circuit
- connects a terminal computer to the ISDN network
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- Wireless Application Protocol
Down
- a device used to connect multiple LANs together with a larger Local Area Network (LAN)
- a digital-interface device used to connect data terminal equipment
- an electronic device which is a combination of a radio transmitter and a receiver
- a network node used in telecommunications that connects two networks with different transmission protocols together
8 Clues: Wireless Application Protocol • connects a terminal computer to the ISDN network • a digital-interface device used to connect data terminal equipment • device for making and breaking the connection in an electric circuit • an electronic device which is a combination of a radio transmitter and a receiver • ...
OCTOBER ESH NEWSLETTER 2016-09-29
Across
- Key to a safe trek to school, especially during dark mornings. (pg. 2)
- Keep flammable items and children a minimum of _____ feet away from heating sources (pg. 4)
- ________ networks and checkouts put you at risk for theft (pg. 3)
Down
- National "holiday" observed on 28 OCT. (pg. 1)
- This costume item should fit securely and not impair vision (pg. 2)
- Do not use this to put out electrical or oil fires (pg. 4)
- Smoke alarms expire after ___ years (pg. 4)
- Put yours in the trunk to reduce the odds of being a car break-in target (pg. 3)
8 Clues: Smoke alarms expire after ___ years (pg. 4) • National "holiday" observed on 28 OCT. (pg. 1) • Do not use this to put out electrical or oil fires (pg. 4) • ________ networks and checkouts put you at risk for theft (pg. 3) • This costume item should fit securely and not impair vision (pg. 2) • Key to a safe trek to school, especially during dark mornings. (pg. 2) • ...
CDC Monthly -Types of malware attacks 2018-11-12
Across
- Disguises itself as a normal file or program to trick users into installing malware.
- Functions by spying in a users activity without their knowledge.
- Form of malware that denies access to the users files on the hard drive until money/bit-coin is transferred.
- Most common type of malware that spreads over computer networks by exploiting vulnerabilities.
Down
- Has the ability to self-replicate and spread to other computers.
- Collections of computers that have malicious software downloaded that allows them to be used for DDoS attacks
- Short for malicious software
- Type of malware that automatically delivers advertisements
8 Clues: Short for malicious software • Type of malware that automatically delivers advertisements • Has the ability to self-replicate and spread to other computers. • Functions by spying in a users activity without their knowledge. • Disguises itself as a normal file or program to trick users into installing malware. • ...
ASSIGNMENT 1 -MACHINE LEARNING 2023-08-08
Across
- Learning Application of Machine Learning that uses complex algorithms and deep neural networks
- ______ is available every where
- learning __________ is the process of inferring underlying hidden patterns from historical data.
- ______ data is a type of categorical data with an order.
- Learning _______ the machine is taught by example or learning with a teacher.
Down
- Height of a person is an example of _______ data
- wrangling _______ is the process of cleaning and converting raw data into a useable format.
- Learning ______ refers to the techniques involved in dealing with vast data in the most intelligent fashion to derive actionable insights
- ______ is a data point that differs significantly from other observations.
9 Clues: ______ is available every where • Height of a person is an example of _______ data • ______ data is a type of categorical data with an order. • ______ is a data point that differs significantly from other observations. • Learning _______ the machine is taught by example or learning with a teacher. • ...
Personal Management Skills 2023-11-21
Across
- Being able to share info. with people within/outside a business, in a professional manner.
- The application of new experiences and skills to impact your current position.
- The process of organizing and planning how to divide your time between different activities.
- To use processes, tools. and skills to find creative and respectful solutions to manage arguments.
Down
- An active disagreement or agreement.
- Techniques to help you make better decisions on how to deal with stress and difficult in your life.
- Working to build or maintain ethical relationships, networks, or contracts.
- Connecting with other professionals with related business interests to further your career.
8 Clues: An active disagreement or agreement. • Working to build or maintain ethical relationships, networks, or contracts. • The application of new experiences and skills to impact your current position. • Being able to share info. with people within/outside a business, in a professional manner. • ...
Cybersecurity 2024-05-07
Across
- A secret combination of characters used to authenticate users and protect accounts.
- A weakness or flaw in a system that can be exploited by attackers.
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- The process of verifying the identity of a user or system.
- The process of converting data into a code to prevent unauthorized access.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
psychedelics 2025-01-05
Across
- a compete loss of subjective self-identity
- the brain’s ability to adapt, modify, and change structure through the growth and reorganization of neural networks in the organ. Psychedelics have been found to promote this
- a class of substances known for their mind-altering effects, including substances like psilocybin, LSD, DMT, and MDMA
- perceiving things through sound or sight that is not really present
Down
- creation of new neural connections, anxiety, fear
- dilated pupils, increased heart rate, changes in sensory perception
- after the primary effects of the drug has subsided, the continued positive physical and mental effects
- another word for psychedelics
8 Clues: another word for psychedelics • a compete loss of subjective self-identity • creation of new neural connections, anxiety, fear • dilated pupils, increased heart rate, changes in sensory perception • perceiving things through sound or sight that is not really present • ...
Week 1 Reveiw 2023-09-21
Across
- Software containing coded instruction that controls a computer
- An application program that interacts with all the information found on the world wide web
Down
- A combined device for modulating and demodulating
- A physical or virtual appliance that passes information between two or more computer networks
- A group of two or more devices that can communicate
5 Clues: A combined device for modulating and demodulating • A group of two or more devices that can communicate • Software containing coded instruction that controls a computer • An application program that interacts with all the information found on the world wide web • A physical or virtual appliance that passes information between two or more computer networks
Digital devices starter crossword 2025-09-10
Across
- A device is digital if it is controlled by a?
- A mobile phone is often referred to as which type of device?
- A common sensor is?
Down
- Devices, vehicles, appliances and physical objects connected to networks, usually the internet?
- They measure a physical quantity and then output a signal to a microprocessor?
5 Clues: A common sensor is? • A device is digital if it is controlled by a? • A mobile phone is often referred to as which type of device? • They measure a physical quantity and then output a signal to a microprocessor? • Devices, vehicles, appliances and physical objects connected to networks, usually the internet?
Data Privacy Knowledge Check #4 2026-01-09
Across
- A secure way to browse on public Wi-Fi is by using a _______.
- Hackers can intercept your _______ when you use unsecured networks.
- Public Wi-Fi can expose your personal _______ to cybercriminals.
Down
- Avoid clicking on suspicious _______ in emails—they can steal your info.
- Changing your passwords regularly is part of good _______ hygiene.
5 Clues: A secure way to browse on public Wi-Fi is by using a _______. • Public Wi-Fi can expose your personal _______ to cybercriminals. • Changing your passwords regularly is part of good _______ hygiene. • Hackers can intercept your _______ when you use unsecured networks. • Avoid clicking on suspicious _______ in emails—they can steal your info.
AvocadoDAO x Token2049: Crack the Code! 2024-09-03
Across
- The ability of different blockchain networks to communicate and interact.
Down
- A premier blockchain conference held annually.
- A term used to describe an individual or entity that holds a large amount of cryptocurrency.
- An essential activity at blockchain conferences to build connections.
- The iconic venue in Singapore where Token 2049 is held.
5 Clues: A premier blockchain conference held annually. • The iconic venue in Singapore where Token 2049 is held. • An essential activity at blockchain conferences to build connections. • The ability of different blockchain networks to communicate and interact. • A term used to describe an individual or entity that holds a large amount of cryptocurrency.
Chapter 9: Wireless Networking Terminology 2023-04-21
Across
- Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission.
- The rate of oscillation of electromagnetic radio waves in the range of 3 kHz to 300 GHz, as well as the alternating currents carrying the radio signals. This is the frequency band that is used for communications transmission and broadcasting.
- A device that displays signal amplitude (strength) as it varies by signal frequency. The frequency appears on the horizontal axis; the amplitude is displayed on the vertical axis.
- A station is a wireless NIC in an end device such as a laptop or wireless PDA. STA often refers to the device itself, not just the NIC. A station is often abbreviated as STA.
- A wireless topology that connects to all APs through wired links. The individual APs contain very little embedded intelligence and are sometimes referred to as lightweight access points (LWAPs).
- An antenna that disperses the radio frequency wave in an equal 360-degree pattern. This provides access to many clients in a radius.
- A signal that corrupts or destroys the wireless signal sent by APs and other wireless devices. Interference affects the availability of a network because normal communications are made impossible.
- A signal passes through objects and the signal loses power.
- The name of the wireless network. Client devices see a list of available networks when trying to connect to a wireless network.
- The ability of devices to connect from one access point to another while maintaining connection to the same network. For example, a laptop moved from one building to another stays connected to the same network.
- Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
- The point at which all the available bandwidth on a connection has achieved maximum capacity and cannot pass any more data through the connection.
- An antenna that creates a narrow, focused signal, which increases the signal strength and transmission distance. It provides a stronger point-to-point connection and is better equipped to handle obstacles.
- A process of planning and designing a wireless network that includes network capacity, coverage, data rates, and quality of service.
- Encryption that implements a key-mixing feature that only the receiver can unlock.
- The point at which bandwidth utilization for the device is close to 100%.
- A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
- An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
- Devices on the network are not broadcasting on the same frequency.
- An ESS consists of multiple BSSs with a distribution system (DS). In an ESS, BSSs that have an overlapping transmission range use different frequencies.
Down
- A wireless topology that moves some of the network intelligence from the controller to the individual APs. Newer wireless networks can be deployed using a distributed wireless mesh architecture.
- The BSSID is a 48-bit value that identifies an AP in an infrastructure network or an STA in an ad hoc network. The BSSID allows devices to find a specific AP within an ESS that has multiple access points, and STAs use it to keep track of APs as they roam between BSSs. The BSSID is the MAC address of the AP and is set automatically.
- An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use a deauthentication attack to stage evil twin or on-path attacks.
- A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
- The standard for short-range wireless interconnection. It is designed to allow devices to communicate within a personal area network (PAN) of close proximity. PAN devices include cell phones, personal digital assistants (PDAs), printers, mouses, and keyboards.
- Any unauthorized access point added to a network.
- The interception and decoding of wireless transmissions. It is also known as eavesdropping.
- Signal interference created intentionally by an attacker to make a wireless network impossible to use.
- An IBSS is a set of stations (STAs) configured in ad hoc mode.
- Access points that separate wireless networks by using independent configuration. Each AP stands alone.
- The LAN that connects multiple APs (and BSSs) together. The DS allows wireless clients to communicate with the wired network and with wireless clients in other cells.
- The electromagnetic field generated by a network cable or network device (such as wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
- An authentication method that requires clients to provide a MAC address to connect to the wireless network.
- An authentication method that uses usernames and passwords, certificates, or devices such as smart cards to authenticate wireless clients.
- An AP is the device that coordinates all communications between wireless devices, as well as the connection to the wired network. An AP is sometimes called a wireless AP (WAP).
- These are used to connect wired or wireless networks.
- A BSS is the smallest unit of a wireless network. All devices in the BSS can communicate with each other. A BSS is also called a cell.
- A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
38 Clues: Any unauthorized access point added to a network. • These are used to connect wired or wireless networks. • A signal passes through objects and the signal loses power. • An IBSS is a set of stations (STAs) configured in ad hoc mode. • Devices on the network are not broadcasting on the same frequency. • ...
Tech Terms 2022-04-13
IT 2017-03-02
Across
- a peripheral device, that provides the output of information from the computer system(represent the graphic information or text on paper)
- a mobile phone with advanced system that combines features of personal computers and mobile phones
- a digital optical disc storage format
- main unit of the computer, it controls all processes of the computer
- an expert in the sphere of breaking the computer systems with the help of bugs and exploits
Down
- an operating environmet developed and sold by Microsoft Corparation
- a typewriter-style device that help us to input the information in the computer
- a small portable computer
- a global system that consist of connected computer networks
- a device that translate the motion of user`s finger in the operating system of PC
10 Clues: a small portable computer • a digital optical disc storage format • a global system that consist of connected computer networks • an operating environmet developed and sold by Microsoft Corparation • main unit of the computer, it controls all processes of the computer • a typewriter-style device that help us to input the information in the computer • ...
Profession and Feelings 2020-07-15
Across
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- profession that develops a diet that establishes the patient's need.
- the opposite of sloppy
- The person who researches, writes, conducts interviews
- people who do not eat animal protein or any food of animal origin
Down
- People who try to see everything on the positive side, who do not give up in the face of major problems.
- The person we call when a fire occurs.
- firmness of spirit to face emotionally or morally difficult situations
- he person we hire to animate a party
- police United States ( 911 ) / Brazil ( 190 )
10 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • The person who researches, writes, conducts interviews • people who do not eat animal protein or any food of animal origin • profession that develops a diet that establishes the patient's need. • ...
Profession and Feelings 2020-07-15
Across
- firmness of spirit to face emotionally or morally difficult situations
- people who do not eat animal protein or any food of animal origin
- he person we hire to animate a party
- profession that develops a diet that establishes the patient's need.
Down
- The person we call when a fire occurs.
- The person who researches, writes, conducts interviews
- the opposite of sloppy
- The person who designs, manages and executes works such as houses, buildings, bridges, viaducts, roads and dams. It monitors all stages of a construction or renovation and also specifies the building's electrical, plumbing and sanitation networks.
- police United States ( 911 ) / Brazil ( 190 )
- People who try to see everything on the positive side, who do not give up in the face of major problems.
10 Clues: the opposite of sloppy • he person we hire to animate a party • The person we call when a fire occurs. • police United States ( 911 ) / Brazil ( 190 ) • The person who researches, writes, conducts interviews • people who do not eat animal protein or any food of animal origin • profession that develops a diet that establishes the patient's need. • ...
Globalization :( 2021-02-07
Across
- improvements in technology has made communication amongst people more __________ .
- economic networks consists of _________ , producers and consumers.
- a process where ideas and activities of people in different parts of the world becomes interconnected.
- the _______ of travelling and transportation goods reduces due to the improvements made to the different modes of transport.
- advancements in technology ___________ the exchange of ideas and knowledge between across different parts of the world.
Down
- the driving forces of globalization encourages economic __________________ .
- by getting cheaper resources and utilise a cheaper labour pool, this helps MNCs ________ their profits
- developments in transportation refers to a more efficient and __________ transportation infrastructure.
- an example of a multinational company.
- by building airports, seaports, railways and highways this will increase the ________ of goods and people.
10 Clues: an example of a multinational company. • economic networks consists of _________ , producers and consumers. • the driving forces of globalization encourages economic __________________ . • improvements in technology has made communication amongst people more __________ . • ...
The internet 2023-01-31
Across
- relating to the government or the public affairs of a country.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a system for transmitting visual images and sound that are reproduced on screens, chiefly used to broadcast programs for entertainment, information, and education.
- the application of scientific knowledge for practical purposes, especially in industry.
Down
- facts provided or learned about something or someone.
- relating to society or its organization.
- false or inaccurate information, especially that which is deliberately intended to deceive.
- relating to economics or the economy.
- a system for transmitting voices over a distance using wire or radio, by converting acoustic vibrations to electrical signals.
- relating to the whole world; worldwide.
10 Clues: relating to economics or the economy. • relating to the whole world; worldwide. • relating to society or its organization. • facts provided or learned about something or someone. • relating to the government or the public affairs of a country. • the application of scientific knowledge for practical purposes, especially in industry. • ...
2022-23 English Club Crossword Puzzle - SMART CITIES 2023-02-01
Across
- of or relating to radio communications without physical support
- not physically existing as such but made by software to appear to do so
- the notional environment in which communication over computer networks occurs
- (of a natural resource or source of energy) not depleted when used.
- a structured set of data held in a computer, especially one that is accessible in various ways
- the introduction of machines or automatic devices into a process, activity, or place
Down
- commercial transactions conducted electronically on the internet
- an activity or plan of action, often in business, that involves risk or uncertainty
- the production of a computer model of something, especially for the purpose of study
- converting gravitational potential or kinetic energy of a water source to produce power
10 Clues: of or relating to radio communications without physical support • commercial transactions conducted electronically on the internet • (of a natural resource or source of energy) not depleted when used. • not physically existing as such but made by software to appear to do so • the notional environment in which communication over computer networks occurs • ...
Fer Romo 2013-05-01
Across
- is a file or program other then a virus that is potentially harmful
- software is software designed specifically to detect, disable, and remove viruses, worms, and Trojans
- form of attack that prevents users from accessing normal services, such as e-mail and a web server
- engineer person who is able to gain access to equipment or a network by tricking people into providing the necessary access information
Down
- is technically a worm.
- is a self-replicating program that is harmful to networks.
- The most damaging type of virus is used to record
- Programming language that allows applets to run within a web browser.
- It is attached to small pieces of computer code, software, or documents
- also known as junk mail
10 Clues: is technically a worm. • also known as junk mail • The most damaging type of virus is used to record • is a self-replicating program that is harmful to networks. • is a file or program other then a virus that is potentially harmful • Programming language that allows applets to run within a web browser. • ...
yeah 2013-01-09
Across
- The Internet can be considered a ___
- A software delivery model in which software and associated data are centrally hosted on the cloud.
- A computer used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
- Chief and _____
- Device that forwards data packets between computer networks.
Down
- The US state that CA World 2013 is being held in.
- A physical computer dedicated to run one or more services as a host.
- The city where CA Technologies headquarters is based.
- A collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.
- A type of computing delivered as a service over a network (typically the Internet).
10 Clues: Chief and _____ • The Internet can be considered a ___ • The US state that CA World 2013 is being held in. • The city where CA Technologies headquarters is based. • Device that forwards data packets between computer networks. • A physical computer dedicated to run one or more services as a host. • ...
AA 2021-12-26
Across
- Reasons for downloading a travel __________________ over using mobile website.
- __________________ involves the awareness of the individual and is important in the face of the era of information technology sophistication
- __________________ replacing role of traditional photo album
- __________________ one of the most engaging forms of outreach and it has now reached the masses.
- People competing each other to be the first to share something on __________________
Down
- __________________ used by people to create networks, communities, and collectives to share information, ideas, messages, and other content, such as videos.
- __________________ an attitude factor relating to violating the E-content regulation.
- __________________ It also known as Electronic Tourism industry.
- __________________ use technology because do not want to be labeled outdated.
- __________________ jurisdiction fall under the Communications and Multimedia Act 1998 (Act 588)
10 Clues: __________________ replacing role of traditional photo album • __________________ It also known as Electronic Tourism industry. • __________________ use technology because do not want to be labeled outdated. • Reasons for downloading a travel __________________ over using mobile website. • ...
Artificial Intelligence 2023-11-20
Across
- The use of technology to perform tasks without human intervention.
- An expert at programming and solving problems with a computer
- To set in motion; make active or more active.
- Capable of operating independently without human control.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The systematic process of assessment and planning employed to prevent a developmental problem.
Down
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- Not functioning in a previously intended way
- The design, construction, and operation of robots to perform tasks in the real world.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
Security Crossword | TCS InfoSecurity Fest 2023-12-04
Across
- is used to dispose of paper-based information
- I am allowing employees to securely access a corporate intranet while located outside the office.
- It is the fraudulent practice of sending emails purporting to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers.
- is a hardware/software that controls incoming traffic and acts as barrier between trusted and untrusted networks
- EDR used in TCS
Down
- It is software you can use without paying
- You should make me complicated. You should not forget me. You cannot access it without me
- An automated access management and security compliance requirement tracking tool in Ultimatix
- Bitlocker is used for
- One of the three cornerstone principles of information security
10 Clues: EDR used in TCS • Bitlocker is used for • It is software you can use without paying • is used to dispose of paper-based information • One of the three cornerstone principles of information security • You should make me complicated. You should not forget me. You cannot access it without me • ...
Asynchronous Module 6 Class Activity 2025-09-29
Across
- A rule or promise that limits access to certain types of information
- An individual or group plan that provides, or pays the cost of, medical care (2 wds.)
- The ability of two or more systems to exchange and make use of information
- Law promoting EHR adoption and meaningful use incentives (abbr.)
Down
- HIPAA principle that limits PHI use, disclosure, or request to the ________ needed (2 wds.)
- Entity that processes health information on behalf of providers, including billing services and value-added networks
- Law that protects personal health information in the U.S. (acronym)
- Digital system used by healthcare providers to store patient data (abbr.)
- The government's latest push to standardize nationwide health information sharing (abbr.)
- U.S. government initiative to create a secure nationwide health data exchange (abbr.)
10 Clues: Law promoting EHR adoption and meaningful use incentives (abbr.) • Law that protects personal health information in the U.S. (acronym) • A rule or promise that limits access to certain types of information • Digital system used by healthcare providers to store patient data (abbr.) • The ability of two or more systems to exchange and make use of information • ...
IoT Crossword 2020-03-16
Across
- How many times loop function runs in Arduino IDE
- protocol is a machine to machine and Internet of thing connectivity protocol.
- The first publicly used version of the Internet Protocol
- means to associate something with locations in physical space.
- standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
Down
- How many number of digital IO pins are there in arduino nano
- The communications protocol that promises to connect every device on the Internet
- twin phrase used to describe a computerized (or digital) version of a physical asset and/or process.
- layer is called a port layer in OSI model
- A universal unique electronic identifier used to identity for every physical object
10 Clues: layer is called a port layer in OSI model • How many times loop function runs in Arduino IDE • The first publicly used version of the Internet Protocol • How many number of digital IO pins are there in arduino nano • means to associate something with locations in physical space. • protocol is a machine to machine and Internet of thing connectivity protocol. • ...
Media and Information Literacy 2025-07-30
Across
- Plural form of medium
- an interconnected network of networks
- refers to how a media text is produced together
- This type of media is meant for an audience who prefers to get information by reading
- This kind of media is usually made in large sizes and is usually seen along highways.
Down
- Literature and arts belong to this type of media.
- physical structure that houses reading, viewing, and listening materials
- local knowledge developed over centuries of experimentation and are passed orally from generation to generation.
- These are also highly specialized materials meant for the players and specialists of a specific industry.
- These are well-researched articles found mostly in academic journals and published for the specialists of a specific field
10 Clues: Plural form of medium • an interconnected network of networks • refers to how a media text is produced together • Literature and arts belong to this type of media. • physical structure that houses reading, viewing, and listening materials • This type of media is meant for an audience who prefers to get information by reading • ...
Board Game Geek Cross Word 2024-12-09
Across
- Strike from your hidden base as the Rebels—or find and destroy it as the Empire.
- Mutating diseases are spreading around the world - can your team save humanity?
- Build an intergalactic empire through trade, research, conquest and grand politics.
- Island Spirits join forces using elemental powers to defend their home from invaders.
Down
- Influence, intrigue, and combat in the universe of D...
- The Fellowship and the Free Peoples clash with Sauron over the fate of Middle-earth.
- Compete with rival CEOs to make Mars habitable and build your corporate empire.
- Build networks, grow industries, and navigate the world of the Industrial Revolution.
- Vanquish monsters with strategic cardplay. Fulfill your quest to leave your legacy!
- Plan and build a modern, scientifically managed zoo to support conservation projects.
10 Clues: Influence, intrigue, and combat in the universe of D... • Compete with rival CEOs to make Mars habitable and build your corporate empire. • Mutating diseases are spreading around the world - can your team save humanity? • Strike from your hidden base as the Rebels—or find and destroy it as the Empire. • ...
Нанотехнологии, Роботы и Искусственный интеллект 2025-02-24
Across
- A key component of a robot or AI system, responsible for executing instructions.
- The process of mimicking real-world processes using a computer model, common in AI research.
- The simulation of human intelligence in machines.
- Describes robots or machines capable of performing tasks without human intervention.
Down
- A device that performs programmed actions.
- A system of electrical components that control the flow of current, used in robotics and AI systems.
- A set of rules or instructions for solving a problem or completing a task, often used in AI.
- The main component of neural networks that mimics human brain functions.
- A field of physics that plays a crucial role in nanotechnology.
- A cylindrical nanostructure with remarkable strength and electrical properties.
10 Clues: A device that performs programmed actions. • The simulation of human intelligence in machines. • A field of physics that plays a crucial role in nanotechnology. • The main component of neural networks that mimics human brain functions. • A cylindrical nanostructure with remarkable strength and electrical properties. • ...
Unit 3 2025-04-03
Across
- A mechanism that allows multiple devices to share a single public IP address (3 letters)
- The process of combining multiple networks into a larger one (11 letters)
- The process of determining the best path for data packets (9 letters)
- A newer version of the Internet Protocol with 128-bit addresses (4 letters)
- A classful addressing system used before CIDR (4 letters)
Down
- A technique used to divide a network into smaller subnetworks (10 letters)
- A routing protocol that uses link-state information to determine the best path (4 letters)
- The protocol used for mapping IP addresses to MAC addresses (3 letters)
- The protocol responsible for delivering error messages and operational information (5 letters)
- A dynamic protocol that provides IP addresses to devices automatically (4 letters)
10 Clues: A classful addressing system used before CIDR (4 letters) • The process of determining the best path for data packets (9 letters) • The protocol used for mapping IP addresses to MAC addresses (3 letters) • The process of combining multiple networks into a larger one (11 letters) • A technique used to divide a network into smaller subnetworks (10 letters) • ...
drugs 2024-10-24
Across
- The misuse of substances that affect both physical and mental health (4 letters).
- A fatal consequence of drug use, often from excessive consumption (8 letters).
- The illegal act of transporting or selling drugs (10 letters).
- Illegal networks that distribute drugs internationally (10 letters).
Down
- The crime of cleaning illegally obtained money, often linked to drug trafficking (10 letters).
- Drug addiction often leads to losing this, impacting economic productivity (4 letters).
- Many drug Many drug users experience this mental condition, causing sadness and hopelessness (10 letters).
- Mental health disorder caused by drug use, involving extreme fear and nervousness (7 letters)
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs (6 letters).
- Drugs lower the overall for users (4 letters).
10 Clues: Drugs lower the overall for users (4 letters). • The illegal act of transporting or selling drugs (10 letters). • Illegal networks that distribute drugs internationally (10 letters). • A fatal consequence of drug use, often from excessive consumption (8 letters). • The misuse of substances that affect both physical and mental health (4 letters). • ...
THE IMPACT OF AI 2025-10-10
Across
- The ongoing progress in building smarter AI, better software, and advanced digital tools.
- The digital fuel that AI systems learn from and make decisions with.
- The human skill that helps design innovative AI tools and solve new problems.
Down
- When humans and AI — or people around the world — work together through technology.
- The protection of computer systems and networks from hacking or cyber threats.
- Moral principles guiding how AI should be created and used responsibly.
- Finding fairness between technology’s benefits and the risks it brings.
- The right to keep users’ personal data safe from tracking or misuse by technology.
- A kind of thinking needed to question AI decisions and detect misinformation.
- Describes technology that processes information using computers or code.
10 Clues: The digital fuel that AI systems learn from and make decisions with. • Moral principles guiding how AI should be created and used responsibly. • Finding fairness between technology’s benefits and the risks it brings. • Describes technology that processes information using computers or code. • ...
Media an Information Literacy 12 2025-08-27
Across
- A test used to evaluate sources based on currency, relevance, authority, accuracy, and purpose.
- The part of the communication process responsible for interpreting the message.
- The age of digital technology where people rely on smartphones and the internet.
- The era where people used smoke signals, cave paintings, and oral traditions for communication.
- The device invented by Alexander Graham Bell that enabled voice communication.
- The criterion in the CRAAP Test that asks if the source is up-to-date.
Down
- The first widespread broadcast medium in the 1900s.
- The process of turning a message into symbols or words for transmission.
- The global system of interconnected computer networks. tools like Facebook, Instagram, and TikTok.
- press The invention that revolutionized mass communication in the Industrial Age.
10 Clues: The first widespread broadcast medium in the 1900s. • The criterion in the CRAAP Test that asks if the source is up-to-date. • The process of turning a message into symbols or words for transmission. • The device invented by Alexander Graham Bell that enabled voice communication. • The part of the communication process responsible for interpreting the message. • ...
Troubleshooting IT Networks 2018-01-24
Across
- This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host.
- This utility can be used to lookup the specific IP address associated with a domain name.
Down
- It is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interfaces.
- This utility is used in windows to find out the specific IP configuration of the variously affected hosts.
4 Clues: This utility can be used to lookup the specific IP address associated with a domain name. • This utility is used in windows to find out the specific IP configuration of the variously affected hosts. • This utility uses ICMP which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. • ...
AP World | Unit 2: networks of Exchange Vocabulary Quiz 2025-11-05
Across
- – Mongol leader who founded and expanded the empire.
- – Innovation that increased stability and trade efficiency in deserts.
- – Early financial innovation allowing trade without carrying coin.
- – Venetian merchant whose travels revealed Mongol-era connections.
- – Magnetic navigation tool improving maritime accuracy.
- – Navigational device using celestial positions to find latitude.
- – Ming admiral who led seven major voyages of exploration.
- – Center of learning and trade in the Mali Empire.
- – Institutions that managed trade finance and exchange.
- – Network connecting North and West Africa via camel caravans.
- – Muslim scholar whose travels reveal Islamic cultural unity.
- – The largest contiguous land empire in history.
Down
- – Spread of crops, animals, or diseases along trade routes.
- – Written financial instruments allowing money to be withdrawn remotely.
- – Settlements of foreign traders preserving homeland ties.
- – Exchange of ideas, technologies, and beliefs through contact.
- – Seasonal winds that enabled predictable navigation.
- – Maritime routes connecting Africa, Arabia, South and Southeast Asia.
- – Roadside inns that supported merchants and travelers.
- – Era of peace under Mongol rule that expanded trade and cultural exchange.
- – English mystic known for her pilgrimage accounts.
- – Overland routes connecting China, the Middle East, and Europe.
22 Clues: – The largest contiguous land empire in history. • – Center of learning and trade in the Mali Empire. • – English mystic known for her pilgrimage accounts. • – Mongol leader who founded and expanded the empire. • – Seasonal winds that enabled predictable navigation. • – Magnetic navigation tool improving maritime accuracy. • ...
Acronyms connected with computer networks 2016-12-06
7 Clues: ECN • A wide area network • A local area network • Wi-Fi Protected Access • A network access control list • The Transmission Control Protocol • – Asymmetric digital subscriber line
Software 2014-03-04
Across
- Programs and applications that can be run on a computer system
- The most important program that runs on a computer.
- A program that performs a very specific task, usually related to managing system resources.
- Is the creation of documents using page layout skills on a personal computer.
Down
- Used to store patients details
- A piece of computer software intended to prevent unauthorized access to system software or data
- Designed to duplicate important data in the event of a hard drive failure, user error, disaster or accident.
- That is designed to help set up, manage, and/or monitor computer networks.
8 Clues: Used to store patients details • The most important program that runs on a computer. • Programs and applications that can be run on a computer system • That is designed to help set up, manage, and/or monitor computer networks. • Is the creation of documents using page layout skills on a personal computer. • ...
Cyber Security Scavenger Hunt 2014-10-28
Across
- Decrypt me: 00000000 43 4e 4f 4
- This shop develops and maintains a formal IS security program, implements and enforces IS security policies, reviews and endorses all IS accreditation/certification support documentation packages.
- Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __.
- SIGDEVERs that focus on discovery and documentation of foreign communications & networks.
- Gives us access to the building, most are blue, but ours are DEFCON 2.
Down
- These are the hacker hunters broken up into 3 sections within the shop: Cyber persuit & Exploration, Sustained Analysis, and Technical Support Services.
- The unofficial mascot of this shop is the Pink Unicorn.
- Decrypt me: VEFPDQo=
8 Clues: Decrypt me: VEFPDQo= • Decrypt me: 00000000 43 4e 4f 4 • The unofficial mascot of this shop is the Pink Unicorn. • Pumpkin spice and saying boo! Travel upsatairs and visit the __ __ __. • Gives us access to the building, most are blue, but ours are DEFCON 2. • SIGDEVERs that focus on discovery and documentation of foreign communications & networks. • ...
CDC Monthly -Types of malware attacks 2018-11-12
Across
- Disguises itself as a normal file or program to trick users into installing malware.
- Functions by spying in a users activity without their knowledge.
- Form of malware that denies access to the users files on the hard drive until money/bit-coin is transferred.
Down
- Has the ability to self-replicate and spread to other computers.
- Collections of computers that have malicious software downloaded that allows them to be used for DDoS attacks
- Short for malicious software
- Type of malware that automatically delivers advertisements
- Most common type of malware that spreads over computer networks by exploiting vulnerabilities.
8 Clues: Short for malicious software • Type of malware that automatically delivers advertisements • Has the ability to self-replicate and spread to other computers. • Functions by spying in a users activity without their knowledge. • Disguises itself as a normal file or program to trick users into installing malware. • ...
Equal Opportunity and Diversity Management 2018-11-29
Across
- Voluntary organizational program designed to create greater inclusion of all individuals into informal social networks and formal company programs
- Benefit to a business of Diversity Management
- The variation of social and cultural identities
Down
- The unjust or prejudicial treatment of different categories of people
- 2010 Act which legally protects people from discrimination
- One of the 6 key aspects of diversity, usually measured against pay gaps
- In equal opportunity, people are judged on their ______ rather than their social group membership
- The policy of giving everyone the same opportunities for employment, pay, and promotion, without discriminating against particular groups
8 Clues: Benefit to a business of Diversity Management • The variation of social and cultural identities • 2010 Act which legally protects people from discrimination • The unjust or prejudicial treatment of different categories of people • One of the 6 key aspects of diversity, usually measured against pay gaps • ...
Exploring AI 2024-01-29
Across
- A technique used to split a dataset into training and testing sets for model evaluation.
- The process of preparing and cleaning data for machine learning.
- A type of algorithm that learns by finding patterns in unlabeled data.
- A subset of machine learning that focuses on neural networks.
Down
- A popular algorithm used for classification in machine learning.
- A popular programming language for machine learning and data analysis.
- The field of study that focuses on giving computers the ability to learn without being explicitly programmed.
- A type of learning where a model is trained on a labeled dataset.
8 Clues: A subset of machine learning that focuses on neural networks. • A popular algorithm used for classification in machine learning. • The process of preparing and cleaning data for machine learning. • A type of learning where a model is trained on a labeled dataset. • A popular programming language for machine learning and data analysis. • ...
Data Transmission 2022-07-13
5 Clues: networks • the actual data being carried in a data packet • a small part of a message/data that is transmitted over a network; after • all the data packets are reassembled to form the original message/data (2 word) • stages in a network that can receive and transmit data packets; routers are nodes in
Hardware of the Internet 2022-10-03
Across
- A computer that stores software and a website's component files
- Used to network multiple computers together
Down
- A hardware component that allows a computer or another device to connect to the Internet
- A filter that only allows trusted data to flow through it
- A hardware device that directs traffic between networks and devices
5 Clues: Used to network multiple computers together • A filter that only allows trusted data to flow through it • A computer that stores software and a website's component files • A hardware device that directs traffic between networks and devices • A hardware component that allows a computer or another device to connect to the Internet
Mesh Networking 2020-05-22
Across
- Extender, Alternative to a mesh network, typically creating 2 WiFi networks in order to improve range of connectivity - can also cut WiFi speeds up to 50%.
- Points in a network, synonym of "access point".
- Link Up (Computers).
- Device received from your ISP that converts coaxial cable signal or fibre-optic signal to ethernet. Virtually all modems from most ISPs also have routers integrated into them.
Down
- The access code to allow connection to a network.
- Alternative to Ethernet connection, wireless.
- Reachability of a network, synonym of "range".
- Device that connects to the modem to provide wireless internet connection
8 Clues: Link Up (Computers). • Alternative to Ethernet connection, wireless. • Reachability of a network, synonym of "range". • Points in a network, synonym of "access point". • The access code to allow connection to a network. • Device that connects to the modem to provide wireless internet connection • ...
Social-Ecological Model 2021-11-03
Across
- construct that provides social identity, social support, and role definition: Family, Friends, Peer,
- this model is made up of different _
- the model that has the framework for determinants of a health outcome at multiple levels.
- construct that has rules, regulations, policies, and informal structures, which may hinder or promote desired behaviors
Down
- Construct that deals with social networks and norms, that exist formally or informally, among individuals, groups, and organizations
- construct that deals with one's knowledge, attitudes, beliefs, and perceptions
- what was article second about
- level explains a behavior as the result of the effect of internal and external factors on each other.
8 Clues: what was article second about • this model is made up of different _ • construct that deals with one's knowledge, attitudes, beliefs, and perceptions • the model that has the framework for determinants of a health outcome at multiple levels. • construct that provides social identity, social support, and role definition: Family, Friends, Peer, • ...
Vocab Terms 1/3 2023-09-19
Across
- sends the cursor to the beginning of the next line or executes a command or operation
- a computer program that can capture, display and manipulate data arranged in rows and columns
- a worldwide system of computer networks
Down
- a display unit of information equivalent to one alphabetic letter or symbol
- a sequence or set of instructions in a programming language for a computer to execute
- a computer file containing information input by a computer user and usually created with an application
- a hypertext document on the World Wide Web
- a clickable area at the top of a window that shows another page or area
8 Clues: a worldwide system of computer networks • a hypertext document on the World Wide Web • a clickable area at the top of a window that shows another page or area • a display unit of information equivalent to one alphabetic letter or symbol • a sequence or set of instructions in a programming language for a computer to execute • ...
Community Outreach Crossword # 1 2023-10-19
Across
- Sessions or classes where practical skills and knowledge are shared.
- Utilizing the internet and social media platforms to share information.
- Printed material containing information, tips, and guidelines, to educate the public.
- Online networks, such as Facebook and Instagram, used to reach a wide audience.
- Events where people can adopt pets, participate in activities, and contribute to fundraising efforts for animal welfare.
Down
- news Early television broadcasts providing information, interviews, and updates.
- events Unique and significant occasions organized to raise awareness and engage the community.
- Media channels, including newspapers and TV, used to disseminate information about animals, events, and initiatives.
8 Clues: Sessions or classes where practical skills and knowledge are shared. • Utilizing the internet and social media platforms to share information. • Online networks, such as Facebook and Instagram, used to reach a wide audience. • news Early television broadcasts providing information, interviews, and updates. • ...
Cybersecurity 1 2024-05-07
Across
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- A weakness or flaw in a system that can be exploited by attackers.
- The process of converting data into a code to prevent unauthorized access.
Down
- The process of verifying the identity of a user or system.
- A barrier that monitors and controls incoming and outgoing network traffic.
- A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
- A secret combination of characters used to authenticate users and protect accounts.
8 Clues: The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • The process of converting data into a code to prevent unauthorized access. • A barrier that monitors and controls incoming and outgoing network traffic. • ...
Core Concepts in AI 2025-04-01
Across
- The process where computers improve automatically by learning from data
- A type of learning where AI is trained on labeled data
Down
- A more advanced form of machine learning using neural networks
- A type of learning where AI finds patterns in data without labels
- The AI system that makes predictions after training
5 Clues: The AI system that makes predictions after training • A type of learning where AI is trained on labeled data • A more advanced form of machine learning using neural networks • A type of learning where AI finds patterns in data without labels • The process where computers improve automatically by learning from data
HSIE Crossword 2013-02-20
Across
- Supreme and independent power or authority in government as possessed or claimed by a state or community.
- To convey in standardised containers.
- An act or instance of combining into an integral whole.
Down
- The __________ of money or capital in order to gain profitable returns, as interest, income or appreciation in value
- A particular form or stage of civilisation, as that of a certain nation or period.
- A privelage of a public nature conferred on an individual, group or company by a government.
- The act of globalizing, or extending to other of all parts of the world.
- The process or act of migrating.
- A device to be launched into orbit around the Earth, another planet, Sun etc.
- A vast computer network linking smaller computer networks worldwide.
10 Clues: The process or act of migrating. • To convey in standardised containers. • An act or instance of combining into an integral whole. • A vast computer network linking smaller computer networks worldwide. • The act of globalizing, or extending to other of all parts of the world. • A device to be launched into orbit around the Earth, another planet, Sun etc. • ...
PRETTY GIRLS: Technology 2018-05-26
Across
- There is a … Club in our school for students who are interested in technology.
- If you want to throw a disco party, you must have the right music ...
- You use this to write information on your computer.
- Facebook and Instagram are social …
Down
- Some students use this kind of computer to study.
- It can be an animal but you can also use it to do things on your computer.
- It is where you see things when you work on your computer.
- It is a thing that you use to send text messages, phone someone, play games and install some apps.
- We need this connection if we want to surf the Internet.
- You can programme a … to work in a factory.
10 Clues: Facebook and Instagram are social … • You can programme a … to work in a factory. • Some students use this kind of computer to study. • You use this to write information on your computer. • We need this connection if we want to surf the Internet. • It is where you see things when you work on your computer. • ...
school work 2017-08-07
Across
- obtain the temporary use of (something) for an agreed payment.
- (someone or something) so as to prevent them from continuing to a destination
- the condensed moisture of the atmosphere falling visibly in separate drops
- the strength and vitality required for sustained physical or mental activity
- act in such a way as to have an effect on each other
- a long, narrow strap attached at one end to a horse's bit, typically used in pairs to guide or check a horse in riding or driving
Down
- the faculty by which the mind stores and remembers information
- not silently or in a whisper
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- adjective of high
10 Clues: adjective of high • not silently or in a whisper • act in such a way as to have an effect on each other • the faculty by which the mind stores and remembers information • obtain the temporary use of (something) for an agreed payment. • the condensed moisture of the atmosphere falling visibly in separate drops • ...
Artificial Intelligence 2023-11-19
Across
- To set in motion; make active or more active.
- A computer program designed to simulate conversation with human users, especially over the Internet.
- The use of technology to perform tasks without human intervention.
- The systematic process of assessment and planning employed to prevent a developmental problem.
- Not functioning in a previously intended way
- Capable of operating independently without human control.
Down
- The practice of protecting computer systems, networks, and programs from digital attacks and unauthorized access.
- An expert at programming and solving problems with a computer
- The design, construction, and operation of robots to perform tasks in the real world.
- A step-by-step set of instructions or rules to perform a specific task or solve a particular problem.
10 Clues: Not functioning in a previously intended way • To set in motion; make active or more active. • Capable of operating independently without human control. • An expert at programming and solving problems with a computer • The use of technology to perform tasks without human intervention. • ...
AI 2023-07-12
Across
- An AI approach that involves training a system through a reward-based feedback loop
- A computer system modeled after the human brain's interconnected neurons
- A subset of machine learning that focuses on artificial neural networks with multiple layers
- An AI field that enables computers to interpret and analyze visual information
- AI algorithms that identify and classify patterns in data
Down
- An AI technique that enables computers to learn and improve from experience without explicit programming
- AI systems that simulate human intelligence, including perception, reasoning, and learning
- AI technology that enables computers to understand and interpret human language
- The process of discovering patterns and relationships in large datasets using AI techniques
- AI software that emulates the decision-making abilities of a human expert in a particular domain
10 Clues: AI algorithms that identify and classify patterns in data • A computer system modeled after the human brain's interconnected neurons • An AI field that enables computers to interpret and analyze visual information • AI technology that enables computers to understand and interpret human language • ...
Information Management 2023-02-21
Across
- Information ___________ - software applications, computer hardware and networks used to create Information Systems.
- A ___________ process system is an information processing system for business deals involving the collection, modification and retrieval.
- ___________ is the type of knowledge which people accumulate in their mind.
- This is more technical part involving setting up and integrating information systems and creating the right environment for using information
- It is taken from information and data substantiated by skills and experience.
Down
- processed and arranged in a meaningful form.
- type of knowledge which can be codified and stored.
- Information _____ is a process by which organizations can spot and categorize knowledge assets within their organization.
- Information _____ – computerized or manual one for capturing data and transform it into information –knowledge
- unprocessed stream of facts.
10 Clues: unprocessed stream of facts. • processed and arranged in a meaningful form. • type of knowledge which can be codified and stored. • ___________ is the type of knowledge which people accumulate in their mind. • It is taken from information and data substantiated by skills and experience. • ...
Risk Management Key Terms 2023-03-06
Across
- A document used to track the collection, handling, and transfer of evidence.
- everything that a business needs but a computer.
- The process of downgrading—undoing—a recently applied patch or updated.
- a Popular and extremely comprehensive testing tool.
- is the science of gathering, preserving, and presenting evidence stored on a computer or any form of digital media presentable in a court of law.
Down
- A backup facility to continue business operations
- Documents that set out how to limit damage andrecover quickly from an incident.
- A set of documents that Define procedures for changes to the network.
- A set of procedures defining actions employees should perform to protect the network’s security.
- An open source tool for penetration testing many aspects of wirless networks
10 Clues: everything that a business needs but a computer. • A backup facility to continue business operations • a Popular and extremely comprehensive testing tool. • A set of documents that Define procedures for changes to the network. • The process of downgrading—undoing—a recently applied patch or updated. • ...
Crosswords - Gadgets 2022-05-12
Across
- A device that performs arithmetic operations on numbers.
- A small wireless earphone inserted into the ear.
- A wearable computing device that closely resembles a wristwatch or other time-keeping device.
- A small, usually hand-held, electronic device for controlling another device, such as a television, radio or audio/video recording device.
- An optical instrument made for the observation of remote objects.
Down
- an output hardware device that connects to a computer to generate sound.
- A handheld electronic device that provides a connection to a cellular network.
- An electronic device that outputs a video signal or visual image to display a video game.
- a networking device that forwards data packets between computer networks.
- a computer that is portable and suitable for use while travelling.
10 Clues: A small wireless earphone inserted into the ear. • A device that performs arithmetic operations on numbers. • An optical instrument made for the observation of remote objects. • a computer that is portable and suitable for use while travelling. • an output hardware device that connects to a computer to generate sound. • ...
Ylan 2024-11-14
Across
- A secret part of the internet, often used for anonymous activities.
- A company that makes equipment and software to help connect and protect computer networks.
- Open-source operating system based on a kernel created by Linus Torvalds.
- A protocol that ensures reliable and ordered data transmission over a network.
- A type of cyberattack where attackers impersonate legitimate organizations to steal sensitive information, like passwords or credit card details.
- A protocol for connecting to a remote computer without encryption.
Down
- Raising awareness is the act of drawing attention to a previously overlooked topic.
- A test used to verify if a user is human and not a robot.
- Software that secretly gathers information about a user without their consent.
- Usurpation d'identité pour masquer une communication malveillante.
10 Clues: A test used to verify if a user is human and not a robot. • Usurpation d'identité pour masquer une communication malveillante. • A protocol for connecting to a remote computer without encryption. • A secret part of the internet, often used for anonymous activities. • Open-source operating system based on a kernel created by Linus Torvalds. • ...
Concepts Related to ICT 2024-09-28
Across
- The process of writing instructions that tell a computer what to do.
- A global network of computer networks that allows users to communicate and access information.
- Books that are read electronically.
- The ability to effectively use digital technology and communicate information through digital channels.
- The practice of protecting oneself online, including avoiding scams, protecting personal information, and being aware of potential risks.
Down
- The process of connecting computers and other devices to share resources and communicate.
- The process of finding and accessing information on the internet.
- Computer programs and data that run on a computer system.
- The creation and distribution of audio or video content in a series of episodes.
- The act of writing code using a specific programming language.
10 Clues: Books that are read electronically. • Computer programs and data that run on a computer system. • The act of writing code using a specific programming language. • The process of finding and accessing information on the internet. • The process of writing instructions that tell a computer what to do. • ...
Financial Terms Crossword 2024-10-26
Across
- The critical pipeline system for the movement of capital in global markets.
- The price of one type of money in terms of another, often quoted against the dollar.
- The process of converting one currency into another.
- The state where the quantity demanded equals the quantity supplied.
Down
- Debt securities issued by governments, such as U.S. Treasury Bonds.
- Taxes imposed on imported goods to protect domestic industries.
- The widely quoted interest rate used for pricing in the interbank market.
- Interbank networks that use currency to ensure efficient market operations.
- Domestic currencies of one country deposited in a second country, often used for holding excess corporate liquidity.
- Central banks, commercial banks, and investment banks that maintain the stability of the global financial system.
10 Clues: The process of converting one currency into another. • Taxes imposed on imported goods to protect domestic industries. • Debt securities issued by governments, such as U.S. Treasury Bonds. • The state where the quantity demanded equals the quantity supplied. • The widely quoted interest rate used for pricing in the interbank market. • ...
Turing Test Trivia 2025-04-07
Across
- An issue in AI where models develop unfair or incorrect assumptions based on training data.
- A test designed to measure a machine’s ability to exhibit intelligent behavior.
- A set of rules or steps used to solve AI-related problems.
- Large volumes of structured and unstructured data used to train AI models.
Down
- The process of training computers to learn from data without explicit programming.
- The AI field that enables machines to interpret and analyze images.
- A machine learning model inspired by the structure of the human brain.
- A type of learning where the model is trained with labelled data.
- An AI program that interacts with users through text or voice.
- A subset of AI that involves multiple layers of neural networks.
10 Clues: A set of rules or steps used to solve AI-related problems. • An AI program that interacts with users through text or voice. • A subset of AI that involves multiple layers of neural networks. • A type of learning where the model is trained with labelled data. • The AI field that enables machines to interpret and analyze images. • ...
Cybersecurity 2021-06-02
Across
- Intention to damage a person.
- The fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Techniques to protect integrity of networks, programs and data from attack, damage or unauthorized access.
- It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses.
- Ability of a user to access information or resources in a specified location and in the correct format.
- Illegal access to a computer system for the purpose od causing damage.
Down
- Malicious software designed to damage.
- Without permission or authorization
- Refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification.
- It's the protection of personal information.
10 Clues: Intention to damage a person. • Without permission or authorization • Malicious software designed to damage. • It's the protection of personal information. • Illegal access to a computer system for the purpose od causing damage. • It is a cyber-attack where the perpetrator uses several, often thousands of, unique IP addresses. • ...
COMPUTER SCIENCE 03 2022-07-06
Across
- A networking device that forwards data packets between computer networks.
- Any auxiliary or ancillary device connected to or integrated within a computer system
- a value in memory referenced by an identifier.
- Computer data storage
Down
- An efficient sorting algorithm which serves as a systematic method for placing the elements of a random access file or an array in order.
- Is an object in many programming languages that stores a memory address.
- a sequence of program instructions that performs a specific task, packaged as a unit.
- Is a logic programming language associated with artificial intelligence and computational linguistics
- Is a sequence of data elements made available over time.
- A hardware device that converts data into a format suitable for a transmission medium
10 Clues: Computer data storage • a value in memory referenced by an identifier. • Is a sequence of data elements made available over time. • Is an object in many programming languages that stores a memory address. • A networking device that forwards data packets between computer networks. • ...
Year 7 Digital Technologies 2025-11-16
Across
- A group of connected computers that can share information and resources.
- The global system of connected networks that allows people to access websites and information.
- A word for harmful software designed to damage or disrupt computers.
- A tool used to find information on the internet by typing questions or keywords.
- A secret combination of letters, numbers, or symbols used to protect accounts.
Down
- A device that connects your home to the internet and directs data between devices.
- Messages sent electronically from one person to another over the internet.
- A wireless way to connect devices to the internet without using cables.
- A series of webpages that you visit using a browser.
- Electronic machines that can store, process, and display information.
10 Clues: A series of webpages that you visit using a browser. • A word for harmful software designed to damage or disrupt computers. • Electronic machines that can store, process, and display information. • A wireless way to connect devices to the internet without using cables. • A group of connected computers that can share information and resources. • ...
Network Topology 2020-06-22
Across
- access points, Device that allow wireless laptops and mobile phones to connect to a network
- A topology that combines wired and wireless together in a network
- If there is a failure in the _____ device in Star network, the whole network will get affected
- area networks, Mesh topology is mainly used in _______
- In Star topology, it is fairly easy to add and _______ nodes
- One device is connected to every other devices in the network
- Need a central device to connect all nodes together
- Usually use as central cable in Bus topology
- Can be used as a central device in Star network
- Another advantage of Mesh topology
Down
- Data transmission in ring network operates in _______ way
- Bus topology require the central cable to be ______ at both ends
- Used in Ring topology to control the transmission
- One or more connection fails, the computer will still be able to communicate
- Devices in a network are connected to a single backbone cable
- Topology with no collision
- Shared medium that is used to connect devices together in Bus network
- hoc, Quick setup wireless network that does not rely to any infrastructure
- Bandwidth, Advantage of Mesh topology
19 Clues: Topology with no collision • Another advantage of Mesh topology • Bandwidth, Advantage of Mesh topology • Usually use as central cable in Bus topology • Can be used as a central device in Star network • Used in Ring topology to control the transmission • Need a central device to connect all nodes together • area networks, Mesh topology is mainly used in _______ • ...
Web Design Vocab Crossword 2021-01-29
Across
- the way a page is built up
- created to replace the graphics interchange format
- where buyer can use the image only under the rules of the seller
- images sold and used on the internet
- images created using mathematical formulas
- used for storing raster graphics images
- creating illusion of color depth with limited colors on a table
- art or skill of combining text and images used for advertisement
- can include animation in image
- number of pixels in an image or display
- reduces file size without changing the appearance of the file
Down
- also known as open source images
- images that usually require a royalty fee; however, you don't have to renew
- photos used for only certain reasons
- tiny dots that make up your screen
- color table that allows you to pick an exact color with a code
- each bit works together and corresponds to make things happen
- image that uses only rectangles to make up the picture
- number of dots it takes to make up a pixel
19 Clues: the way a page is built up • can include animation in image • also known as open source images • tiny dots that make up your screen • photos used for only certain reasons • images sold and used on the internet • used for storing raster graphics images • number of pixels in an image or display • images created using mathematical formulas • ...
STEM Careers 2023-05-12
Across
- helps prevent, diagnose, and treat heath problems in animals
- engineer who designs and tests electrical equipment
- engineer who designs and builds tools and systems that provide us with clean water
- studies the atmosphere and how it affects the rest of the environment
- engineer who helps plan transportation systems like railways or traffic patterns
- engineer who makes tech for aircraft, defense systems, and space exploration
- studies behaviors and habitats of wild animals
- helps people ensure they are eating the right diet
Down
- engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
- safeguards a company's computer systems and networks
- studies how living things inherit traits through genes
- engineer who Involved in production of energy through natural resources
- studies physical properties of Earth
- treats injury and illness, checks symptoms and provides solutions
- keeps and inspect financial records for their employers
- studies water and the water cycle to predict drought or prevent pollution
- engineer who uses science of light to create tools such as lasers and fiber optics
- engineer who uses engineering to solve problems in medicine
- engineer who designs city structures such as bridges, buildings, and water systems
19 Clues: studies physical properties of Earth • studies behaviors and habitats of wild animals • helps people ensure they are eating the right diet • engineer who designs and tests electrical equipment • safeguards a company's computer systems and networks • studies how living things inherit traits through genes • keeps and inspect financial records for their employers • ...
Chapter 5 Review quizz 2014-05-14
Across
- maximum speed at which data can be transmitted
- handles data traffic between nodes on the same network
- Navigation Device makes data flow in a network possible
- network that is confined to a small geographic location
- each node can communicate directly with every other node on the network
- the format in which data is sent over transmission media
- Adapter enables nodes to communicate with each other and to access the network
- can be a computer, peripheral, or communication device on a network
Down
- the computer on which users accomplish specific tasks and make specific requests
- network in your home used to connect all your digital devices such as computers, periperhals, phones, and cameras
- made up of plastic or glass and transmits data at extremely fast speed
- actual speed of data transfer
- retransmits a signal to all other nodes attached to it
- network adapter
- provides information and/or resources to the client computers on a network
- network designed to provide access to a large geographic area
- Pair made up of copper wires
- network designed to provide access to a specific geographic area, such as an entire city
- handles data traffic between networks
- software used to set up and manage a network
20 Clues: network adapter • Pair made up of copper wires • actual speed of data transfer • handles data traffic between networks • software used to set up and manage a network • maximum speed at which data can be transmitted • retransmits a signal to all other nodes attached to it • handles data traffic between nodes on the same network • ...
Media and Information Literacy Grade 12-STEM, Rodmig Levi P. Tan 2024-08-30
Across
- the imparting or exchanging of information or news.
- almost or nearly as described
- a game played by electronically manipulating images
- the imparting or exchanging of information or news
- a system for transmitting visual images and sound that are reproduced on screens
- a global computer network providing a variety of information and communication facilities
- application of scientific knowledge for practical purposes
- a theater where movies are shown for public entertainment
- a group or system of interconnected people or things.
- the transmission and reception of electromagnetic waves
Down
- a set of related web pages located under a single domain name
- a band of frequencies used in radio and television transmission
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- false or inaccurate information
- facts provided or learned about something or someone.
- the main means of mass communication
- the ability to read, write
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- electronic technology that generates, stores and processes data in terms of positive and nonpositive states.
- a thin flexible strip of plastic or other material coated with light-sensitive emulsion
20 Clues: the ability to read, write • almost or nearly as described • false or inaccurate information • the main means of mass communication • the imparting or exchanging of information or news • the imparting or exchanging of information or news. • a game played by electronically manipulating images • facts provided or learned about something or someone. • ...
PAW 2025 2025-05-14
Across
- A privacy breach would have occurred without intervention.
- The fundamental concept of personal protection
- "Office of the Australian Information ________"
- Digital spaces where users communicate and share information
- The science of encrypting information to protect from unauthorised use
- A designated person at an organisation who is responsible for ensuring compliance with privacy laws
- Stronger than a password, is a pass_____
- The process followed at Acenda to identify a caller
- The acronym of the Australian regulator that privacy breaches are reported to
- What is the worldwide system of networks and devices that communicate with each other called?
Down
- What is used for account security and should never be shared?
- A situation where unauthorised access has occurred is a "privacy _____"
- The 6th most common password used in Australia in 2024
- A security method that requires verification using two or more factors
- The Australian privacy landscape is guided by 13 of these
- The person we all strive to protect at Acenda
- The Acenda Department responsible for ensuring all regulatory obligations are met
- Criminal activity that uses a computer, network or device
- A person authorised to access another individuals account
19 Clues: Stronger than a password, is a pass_____ • The person we all strive to protect at Acenda • The fundamental concept of personal protection • "Office of the Australian Information ________" • The process followed at Acenda to identify a caller • The 6th most common password used in Australia in 2024 • The Australian privacy landscape is guided by 13 of these • ...
STEM Careers 2024-12-10
Across
- helps prevent, diagnose, and treat heath problems in animals
- engineer who designs and tests electrical equipment
- engineer who designs and builds tools and systems that provide us with clean water
- studies the atmosphere and how it affects the rest of the environment
- engineer who helps plan transportation systems like railways or traffic patterns
- engineer who makes tech for aircraft, defense systems, and space exploration
- studies behaviors and habitats of wild animals
- helps people ensure they are eating the right diet
Down
- engineer who designs robots to replace or supplement human tasks, such as tedious or dangerous jobs
- safeguards a company's computer systems and networks
- studies how living things inherit traits through genes
- engineer who Involved in production of energy through natural resources
- studies physical properties of Earth
- treats injury and illness, checks symptoms and provides solutions
- keeps and inspect financial records for their employers
- studies water and the water cycle to predict drought or prevent pollution
- engineer who uses science of light to create tools such as lasers and fiber optics
- engineer who uses engineering to solve problems in medicine
- engineer who designs city structures such as bridges, buildings, and water systems
19 Clues: studies physical properties of Earth • studies behaviors and habitats of wild animals • helps people ensure they are eating the right diet • engineer who designs and tests electrical equipment • safeguards a company's computer systems and networks • studies how living things inherit traits through genes • keeps and inspect financial records for their employers • ...
Sprinto Crossword 2024-10-23
Across
- Ensuring that data remains accurate, consistent, and unaltered during storage and transmission.
- European Union regulation governing data protection and privacy.
- A weakness in a system that can be exploited to compromise security.
- The process of converting plaintext into ciphertext to prevent unauthorized access
Down
- A network security device that monitors and filters incoming and outgoing traffic based on predetermined security rules.
- Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- Unauthorized access to data, systems, or networks resulting in information disclosure.
- Report framework used to evaluate and communicate the controls at a service organization, relevant to security and privacy.
8 Clues: European Union regulation governing data protection and privacy. • A weakness in a system that can be exploited to compromise security. • The process of converting plaintext into ciphertext to prevent unauthorized access • Unauthorized access to data, systems, or networks resulting in information disclosure. • ...
Digital Security 2026-02-27
Across
- A secret number used to prove your identity, often for banking or phone access.
- The act of proving you are who you say you are.
- Attempts by hackers to damage or gain unauthorized access to computer systems or networks.
- People who pretend to be someone else to trick others.
Down
- Understanding that not everyone has equal access to technology and using shared resources responsibly.
- The process of proving who you are when using digital systems.
- The act of telling a system who you are, like entering your username
- Using technology and the internet in safe, responsible, and ethical ways
8 Clues: The act of proving you are who you say you are. • People who pretend to be someone else to trick others. • The process of proving who you are when using digital systems. • The act of telling a system who you are, like entering your username • Using technology and the internet in safe, responsible, and ethical ways • ...
steel 2026-03-16
Across
- What unified enterprise store holds OT + IT data for analytics?
- System where AI analyses coil, slab, or plate images to automatically detect defects on production lines.
- What DRI input gas reduces iron ore without using coke?
- What practice automates early failure detection for motors and gearboxes?
Down
- Which new coating from Tata Steel Nederland (launched in January 2026) makes packaging steel safer by replacing hexavalent chromium and meeting REACH rules?
- What risk mitigation architecture isolates production networks from external intrusion
- Which OT protocol is becoming the standard for interoperable green steel digital ecosystems?
- What EU mechanism equalises carbon costs on imported steel?
8 Clues: What DRI input gas reduces iron ore without using coke? • What EU mechanism equalises carbon costs on imported steel? • What unified enterprise store holds OT + IT data for analytics? • What practice automates early failure detection for motors and gearboxes? • What risk mitigation architecture isolates production networks from external intrusion • ...
Industrialization 2022-02-16
Across
- A belief that government can and should achieve justice and equality of opportunity
- Allowed fast long-distance communication
- Manufacturing of goods in a factory
- A system in which society, usually in the form of the government, owns and controls the means of production
- External-combustion engine in which heat is used to raise steam which either turns a turbine or forces a piston to move up and down in a cylinder
- Manufacturing of goods in a domestic environment
Down
- Networks of iron and steel upon which locomotives pulled trains
- An allow of carbon and iron
- A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches
- A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765
10 Clues: An allow of carbon and iron • Manufacturing of goods in a factory • Allowed fast long-distance communication • Manufacturing of goods in a domestic environment • Networks of iron and steel upon which locomotives pulled trains • A belief that government can and should achieve justice and equality of opportunity • ...
crossword 1 2023-01-15
Across
- Strabismus in which one or both eyes turn inward toward the nose
- (biology) the functioning of a particular part of a body
- A Shiite Islamic political and paramilitary organization based in Lebanon
- British pathologist who isolated and purified penicillin, which had been discovered in 1928 by Sir Alexander Fleming (1898-1968)
- A computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
Down
- The act, process, or result of salifying; the state of being salified
- Relating to or characteristic of cubism
- (physics) the ejection of electrons from an atom or other species due to interaction with photons
- A woman host
- Situated beyond the moon or its orbit around the earth
10 Clues: A woman host • Relating to or characteristic of cubism • Situated beyond the moon or its orbit around the earth • (biology) the functioning of a particular part of a body • Strabismus in which one or both eyes turn inward toward the nose • The act, process, or result of salifying; the state of being salified • ...
My crossword 2021-01-17
Across
- a form of bullying on the internet
- an attempt to trick someone into giving information over the internet or by email
- protecting against computer viruses
- a place on the Internet where people can leave messages or discuss particular subjects with other people at the same time
Down
- the act of illegally copying a computer program, music, a film, etc. and selling it
- a type of intellectual property that gives its owner the exclusive right to made copies of a word
- a global system of interconnected networks
- unwanted email, usually advertisements
- a secret word or combination of letters or numbers, used for communicating with another person or with a computer to prove who you are
- computer software that is designed to damage the way a computer works
10 Clues: a form of bullying on the internet • protecting against computer viruses • unwanted email, usually advertisements • a global system of interconnected networks • computer software that is designed to damage the way a computer works • an attempt to trick someone into giving information over the internet or by email • ...
Alexander Polak 1F 2020-12-18
Across
- An industry standard that establishes connection, communication and power supply between computers, peripherals and other computers.
- a type of computer program that edits plain text.
- A copy of computer data taken and stored else where so that it may be used to restore the original after a data loss event.
- System software that manages computer hardware and software resources.
Down
- A computer application for organization, analysis and storage of data in tabular form.
- A pointing device with specialized surface.
- a particular size, weight and style of a typeface.
- A piece of computer hardware or software that provides functionality for other programs or devices.
- A networking device that forwards data packets between computer networks.
- A computer software used to manage the creation and modification of digital content
10 Clues: A pointing device with specialized surface. • a type of computer program that edits plain text. • a particular size, weight and style of a typeface. • System software that manages computer hardware and software resources. • A networking device that forwards data packets between computer networks. • ...
Globalization :( 2021-02-07
Across
- improvements in technology has made communication amongst people more __________ .
- economic networks consists of _________ , producers and consumers.
- a process where ideas and activities of people in different parts of the world becomes interconnected.
- the _______ of travelling and transportation goods reduces due to the improvements made to the different modes of transport.
- advancements in technology ___________ the exchange of ideas and knowledge between across different parts of the world.
Down
- the driving forces of globalization encourages economic __________________ .
- by getting cheaper resources and utilise a cheaper labour pool, this helps MNCs ________ their profits
- developments in transportation refers to a more efficient and __________ transportation infrastructure.
- an example of a multinational company.
- by building airports, seaports, railways and highways this will increase the ________ of goods and people.
10 Clues: an example of a multinational company. • economic networks consists of _________ , producers and consumers. • the driving forces of globalization encourages economic __________________ . • improvements in technology has made communication amongst people more __________ . • ...
The Global Village 2021-06-17
Across
- a vast system of interconnected computers and computer networks that are joined together
- allows messages to be exchanged using the Internet
- a system of documents which are linked and accessed by the Internet
- describes all the financial and commercial transactions that take place electronically
- persons who make connections and build relationships regardless of the physical distances between them
Down
- a website that makes it easy for companies and individuals to upload material onto the Web for others to see
- receiving media which can be viewed immediately before a complete file transmitted
- to send data from a local computer to a remote system
- receiving data onto a local computer from a remote computer system
- software applications that are used for social purposes and personal communication
10 Clues: allows messages to be exchanged using the Internet • to send data from a local computer to a remote system • receiving data onto a local computer from a remote computer system • a system of documents which are linked and accessed by the Internet • receiving media which can be viewed immediately before a complete file transmitted • ...
digitech crossword puzzle 2021-08-04
Across
- What are the small blocks of data created by a wed server while a user is browsing a website?
- A device that routes traffic between networks
- re-booting a device either with a cold or warm boot
- The endpoint of a network connection
- A system for connecting a number of computer systems to form a local area network
Down
- A group of computers/electronic devices with a common set of rules and procedures administered as a unit
- What is the pictures element that is the smallest part of a graphic image?
- what is the part of a computer system that's designed to block unauthorized access?
- What devices is required for internet connection?
- An interface of the computer or device where a device is connected
10 Clues: The endpoint of a network connection • A device that routes traffic between networks • What devices is required for internet connection? • re-booting a device either with a cold or warm boot • An interface of the computer or device where a device is connected • What is the pictures element that is the smallest part of a graphic image? • ...
