networks Crossword Puzzles
Plague 2022-04-29
Across
- a deadly infection spread by fleas that live on rats
- interconnected groups of people
- destructive war between France and England that lasted from 1337 to 1453
Down
- unsuccessful revolt by peasants against feudal lords in England in 1381
- epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352
5 Clues: interconnected groups of people • a deadly infection spread by fleas that live on rats • unsuccessful revolt by peasants against feudal lords in England in 1381 • destructive war between France and England that lasted from 1337 to 1453 • epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352
FORMS OF CAPITAL 2024-11-16
Across
- A form of capital defined by language and communication skills students bring to college.
- Implicit academic and social expectations may create challenges for students.
- Yosso’s model for understanding cultural wealth includes this strengths-based approach.
- This form of cultural capital includes knowledge and behaviors shaped by social standing.
- A strengths-based perspective highlights this form of capital, defined as "hopes and dreams."
Down
- This form of capital is a formal recognition of an asset, like a degree or certification.
- Bourdieu's theory includes this form of cultural capital that encompasses physical objects with cultural significance.
- Framework focusing on students' strengths and contributions.
- A form of capital related to students’ social and community networks.
- A form of capital tied to historical legacies of social justice and community advocacy.
- Yosso's model includes this form of capital involving skills to navigate social institutions.
11 Clues: Framework focusing on students' strengths and contributions. • A form of capital related to students’ social and community networks. • Implicit academic and social expectations may create challenges for students. • A form of capital tied to historical legacies of social justice and community advocacy. • ...
Malware 2025-11-05
Across
- A method of cracking passwords by trying every possible combination.
- A type of cyberattack where fake emails or websites are used to trick users into revealing private information.
- Malware that encrypts files and demands payment to restore access.
- A protective barrier that filters incoming and outgoing traffic to block unauthorized access.
- A type of malware that replicates and spreads without user action, often via networks.
Down
- A password-cracking attack that tries common words or phrases from a list.
- Malware that monitors and records user activity, often stealing personal data.
- Malware that hides itself while giving unauthorized users administrator-level access.
- A program that attaches to other files and spreads when the infected file is executed.
- A malicious program disguised as a legitimate one, used to access or damage a system.
- Software that displays unwanted advertisements or redirects web traffic.
11 Clues: Malware that encrypts files and demands payment to restore access. • A method of cracking passwords by trying every possible combination. • Software that displays unwanted advertisements or redirects web traffic. • A password-cracking attack that tries common words or phrases from a list. • ...
MESLEKI YABANCI DIL SINAVI 2022-03-26
Across
- hardware and software used to interconnect networks, directing traffic from one network to another (LAN TO LAN or LAN TO WAN)
- computers are the computers those are able to serve many users for hosting simultaneously which have advanced hardware features.
- a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network.
- Hosting in the word means ―housing‖. A service that allows customers to place their own content on the public Internet's World Wide Web according to the defined domain names.
- it is configuration of IP manually.
- hardware that you insert in a computer to connect a computer to a network.
- it is a variant of network that certain number of computers created in a particular area.Local area Networks consist of computers, network interface cards, network cables, network traffic control devices and other periphral devices.
- a networking device connecting multiple wires, allowing them to communicate simultaneously, when possible. Compare to the less efficient hub device that solely duplicates network packets to each wire.
Down
- a hub is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network, and the Internet All users connected to a hub share the available network bandwidthports.
- a device used in a network to strengthen a weak signal as it is passed along the network cable because of any reason and send it back to the user.
- a device that encodes digital computer signals into analog/analogue telephone signals and vice versa and allows computers to communicate over a phone line
- is the technology that enables rapid transfer of digital information through regular telephone cables (the line is asymmetrical because the connection is faster in one direction than the other).
- all types of user computers that uses the web sites. They may called the computers performing out of the server.
- a private network inside a company or organization that uses the same kinds of software that you find on the public Internet, but which is only for internal use.
- dynamic Host Configuration Protocol Dynamically assigns IP addresses to client stations located on a TCP/IP network at startup, and allows the addresses to be re-used when no longer needed.
- wireless Local Area Network Enables fast data transmission through a wireless connection particularly suitable for organisations such as hospitals and schools as well as businesses.
16 Clues: it is configuration of IP manually. • hardware that you insert in a computer to connect a computer to a network. • a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network. • all types of user computers that uses the web sites. They may called the computers performing out of the server. • ...
angels crossword 2015-04-29
Across
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate and can spread to other applications and operating system software
- - A bully who operates online, in cyberspace
Down
- – An unauthorized person who secretly gains access to computer files
- NETWORKS -- online communities where people meet, socialize, exchange digital files, etc.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – a group of connected computers
7 Clues: – a group of connected computers • - A bully who operates online, in cyberspace • – An unauthorized person who secretly gains access to computer files • NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. • – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- owns to trade mark wifi.
- provides a means of reading or interrogating the data using the tag
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- has an onboard power source,usually a battery,and an active transmitter.
Down
- A dynamic change in pont of attachment maintains the network properties is done through
- id a temporary ip address for a mobile node
- smpp cilent is termed a external short message
- a set of two or more interconnection piconets form
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- a set of two or more interconnection piconets form
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- smpp cilent is termed a external short message
Down
- id a temporary ip address for a mobile node
- provides a means of reading or interrogating the data using the tag
- owns to trade mark wifi.
- has an onboard power source,usually a battery,and an active transmitter.
- A dynamic change in pont of attachment maintains the network properties is done through
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Finance Ke Fundey 2017-12-12
Across
- Technology to host mobile voice calls on Internet Protocol
- Telecom entity, which will soon be merged with Bharti Airtel
- An Industry Association of GSM Mobile Operators in India
- Separate document which you can send with an e-mail message
- Two types are spectrum are being used for Microwave. First one is Backbone, the other is……….
Down
- First name of the current GSMA Chairman
- Using a Camera or phone lines or internet that allows individuals at two or more sites to hear and see each other
- Authority whose mission is to create conditions for growth of telecom in India
- Number 2 Telecom Player of the world (basis CMS)
- A network of networks of computers connected all around the world
- A Government program for provision of Mobile Services in Select Rural Regions of India. Provider gets subsidy for the same
11 Clues: First name of the current GSMA Chairman • Number 2 Telecom Player of the world (basis CMS) • An Industry Association of GSM Mobile Operators in India • Technology to host mobile voice calls on Internet Protocol • Separate document which you can send with an e-mail message • Telecom entity, which will soon be merged with Bharti Airtel • ...
Impacts of social media on mental health crossword puzzle 2023-09-01
Across
- and harassment over the Internet through an application
- compare their lives to other people's or celebrities, because of the photos on the account
- Result of constant phone notifications and information overload
- People spend a lot of time on social networks, thus creating isolation
- People who spend a lot of time on social media
Down
- spreading false or misleading information
- La información errónea sobre salud en las redes sociales se refiere a la difusión de información inexacta o engañosa
- people who upload photos edited by the comments of others
- Constant exposure to idealized images on social media can have a significant impact on people's perception of body image.
- This factor allows users to hide their real identity online, which often leads to disrespectful and aggressive behavior on social media.
- People whose life revolves around social media
11 Clues: spreading false or misleading information • People whose life revolves around social media • People who spend a lot of time on social media • and harassment over the Internet through an application • people who upload photos edited by the comments of others • Result of constant phone notifications and information overload • ...
Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16
Across
- _____ administrator is responsible for the creation, administration and security of computer networks.
- The _____ administrator is responsible for the administration and management of an organization's network.
- A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
- _____ write new programs, update and modify existing programs/software.
- _____ designers create webpage, build and maintain websites for an individual or an organization.
- The System _____ main role is to implement a new computerised system or upgrade an existing one.
6 Clues: _____ write new programs, update and modify existing programs/software. • A _____ librarian keeps an organization's data files and software up-to-date and organised. • The System _____ main role is to implement a new computerised system or upgrade an existing one. • ...
DIGITAL CITIZENSHIP VOCABULARY 2021-09-03
Across
- an area on the Web where information about a particular subject, organization, etc. can be found
- is an electronic machine that can store and arrange large amounts of information.
- a short description of a person, organization, etc., giving the main details about them.
- connected to and shared by a system of computers, especially the internet
Down
- a worldwide system of computer networks used to exchange information
- knowledge, equipment, and methods that are used in science and industry
6 Clues: a worldwide system of computer networks used to exchange information • knowledge, equipment, and methods that are used in science and industry • connected to and shared by a system of computers, especially the internet • is an electronic machine that can store and arrange large amounts of information. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- a set of two or more interconnection piconets form
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- smpp cilent is termed a external short message
Down
- id a temporary ip address for a mobile node
- provides a means of reading or interrogating the data using the tag
- owns to trade mark wifi.
- has an onboard power source,usually a battery,and an active transmitter.
- A dynamic change in pont of attachment maintains the network properties is done through
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Engineering Careers 2014-07-21
Across
- make a real difference in the survival of our planet by finding ways of cleaning up our environment
- test and supervise the manufacture of lighting equipment
- oversee the construction of the buildings and infrastructure that make up our world
- ensure that complex and large scale systems operate safely and efficiently
- develop things that involve a mechanical process
- works on new technology for space travel and exploration
- design and implement all of the supplemental facilities necessary to the separation, processing, and transportation of oil and natural gas
- focuses on how to safely use and control moving water
- work in all stages of the design process, from conception to presentation of the finished plans
- optimize the overall efficiency of business and organizations
Down
- estimate the amount of oil or gas that can be recovered from a reservoir
- specialize in technology such as networks or broadband
- work in all forms of nuclear energy
- design and manufacture seacraft
- develop medical devices that lead to furthering of medical discoveries
- apply earth sciences to human problems
- discover new oil and gas sources and work on new technology to extract sources
- develop and maintain computer software
18 Clues: design and manufacture seacraft • work in all forms of nuclear energy • apply earth sciences to human problems • develop and maintain computer software • develop things that involve a mechanical process • focuses on how to safely use and control moving water • specialize in technology such as networks or broadband • ...
ICT Infrastructure (Homework 2) 2024-07-29
Across
- is a networking device that connects different networks together and transfer data in form of IP packets
- it is _________ and faster to install a network under wireless technology
- a type of data communication
- another key component of ICT infrastructure
- software that the source code is available for free
- a networking device that connects devices to the internet using radio waves
Down
- consists of all the components that enable the use of computer technologies to support the operation of a company or institution
- sharing resources and data is one of the __________ for an ICT infrastructure
- use to transmit information in using wireless technology
- some applications may have malicious code embedded inside and it is an __________ with downloading and installing software
- another type of data communication
- is a type of data transmission medium
- high speed of operation is a ___________ of cable technology
- is another type of data transmission medium
- is a common data networking device
- one of the key components of an ICT/IT infrastructure
- cost less to install is one of the ________ behind the use of cable technology
- software that was developed and owned by a company and source code is not available for free
18 Clues: a type of data communication • another type of data communication • is a common data networking device • is a type of data transmission medium • is another type of data transmission medium • another key component of ICT infrastructure • software that the source code is available for free • one of the key components of an ICT/IT infrastructure • ...
Davi de Jesus Duarte - 131 2021-10-24
Across
- Local Area Network.
- To send data to a remote system.
- Last name of the inventor of the modern computer, born in 1912.
- US State. Home to the World's Largest Ball of Yarn.
- Error or glitch.
- Bad internet guy. Person who can gain unauthorized access to computers or networks.
- To receive data from a remote system.
- First name of the winner of the Academy Award for Best Actor in 1996.
- Device used to input text to a computer.
Down
- Computer component which holds and allows communication between all of its parts.
- Piece of technology that does its job without processing numbers electronically like a computer does.
- Most common PC operating system.
- Most common connector type. Universal Serial Bus.
- A multiple of the unit byte. Equal to one billion bytes.
- An organized collection of data, generally stored and accessed electronically from a computer system.
- Type of storage that contains digital data. Hint: look at the sky.
- Family of wireless network protocols which are commonly used for internet access. It works by transmitting data by radio waves.
- Reference to data that the user can follow by clicking or tapping.
18 Clues: Error or glitch. • Local Area Network. • Most common PC operating system. • To send data to a remote system. • To receive data from a remote system. • Device used to input text to a computer. • Most common connector type. Universal Serial Bus. • US State. Home to the World's Largest Ball of Yarn. • A multiple of the unit byte. Equal to one billion bytes. • ...
AP Human Geography Unit 5 Vocab 2024-02-02
Across
- ____ Farming making enough to sell for a profit.
- is the taming of plants and animals for human use
- ____ Hearths are places where people first domesticated plants/animals
- technological innovation that is designed to improve the usefulness of plant and animals species
- growing the same crop each year.
- ____ Farming making enough for your own survival
- ____ Practices involve a large amount of land as well as less labor and less technology
- Acronym for Genetically Modified Organisms
- ____ Desert is an area with limited access to affordable and nutritious food.
Down
- ____ Commodity Chain is Interconnected networks of production, distribution, and consumption
- ____ Model was developed in the 19th century to explain the spatial organization of agriculture
- ____ Agricultural Revolution Increase in agricultural output due to the Industrial Revolution
- The raising of animals or the growing of crops
- ____ Diffusion is the spread of domesticated plants and animals
- ____ Revolution pesticides, fertilization, irrigation, and GMO’s to created higher agricultural yields
- ____ Practices involve a small amount of labor and large amount of labor
- ____ Revolution is the transition from nomadic hunter-gatherers to sedentary farmers
- good that is produced in one country and sold to another country
- country receives goods, services, or raw materials into their borders that have been produced or originate in another countr
19 Clues: growing the same crop each year. • Acronym for Genetically Modified Organisms • The raising of animals or the growing of crops • ____ Farming making enough to sell for a profit. • ____ Farming making enough for your own survival • is the taming of plants and animals for human use • ____ Diffusion is the spread of domesticated plants and animals • ...
Network Security 2025-03-06
4 Clues: Deceptive scheme intended to defraud or trick individuals. • Malicious software designed to harm, exploit, or disrupt systems. • Unwanted messages, often sent in bulk, typically for advertising. • Malicious software spreading through networks, infecting connected devices.
Year 12 ITA Revision 2012-10-07
Across
- A global network that consists of worldwide collections of networks
- Connects computers together so that the can share data and resources
- A licence that allows multiple users within an organisation to simultaneously use a software package
Down
- When there is no delay between sending and receiving a response (4,4)
- When a user's computer is connected to a network
5 Clues: When a user's computer is connected to a network • A global network that consists of worldwide collections of networks • Connects computers together so that the can share data and resources • When there is no delay between sending and receiving a response (4,4) • ...
Cybersecurity Definitions 2024-06-16
Across
- Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- An attack method where a perpetrator deceives individuals into divulging confidential information.
- The practice of protecting systems, networks, and programs from digital attacks.
Down
- A program that replicates itself to spread to other computers.
- A person who uses computers to gain unauthorized access to data.
5 Clues: A program that replicates itself to spread to other computers. • A person who uses computers to gain unauthorized access to data. • The practice of protecting systems, networks, and programs from digital attacks. • Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. • ...
Cybersecurity Notables 2021-01-17
Across
- She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
- This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
- He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
- He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
- Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
- He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
- This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
- She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
- She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
- As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
- Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
- Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.
12 Clues: She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” • He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo. • Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period. • ...
Assignment 6 : Activities 2015-09-30
Across
- The standard markup language used to create web pages
- A legal right that grants the creator of an original work exclusive rights to its use and distribution
- Pictures/movies/graphics
- A component that stores data so future requests for that data can be served faster
- The objective and subjective components of the reliability of a source or message
- The internet is primarily this type of communication system
- Window's default text editor
- The author or creator of a work
- A person who falsifies data to pretend to be someone else
Down
- The main technology used to connect local area networks
- A related group of networked computers
- The act of making a website as fully functional and effective as possible
- Converts the bits a computer outputs into a form that is compatible with its internet service provider
- Where the course is conducted except for the final
- A group of information on a computer that can be software programs or data
- A type of search engine that builds an index of the web's content based on keywords
- The ease of learning how to use a human-made object
- A question or request for information
18 Clues: Pictures/movies/graphics • Window's default text editor • The author or creator of a work • A question or request for information • A related group of networked computers • Where the course is conducted except for the final • The ease of learning how to use a human-made object • The standard markup language used to create web pages • ...
Security Services 2025-03-18
Across
- An authentication protocol that encrypts only passwords but has extensive logging.
- An SNMP function that allows network administrators to modify device settings.
- A network administrator’s tool for overseeing device performance remotely.
- The command center in SNMP that controls network elements.
- A security model ensuring access control, user permissions, and activity logging.
- A traffic analysis technology used to monitor network performance and security.
- A structured storage of SNMP device statistics and performance metrics.
- The SNMP command used when retrieving information from a monitored device.
- A security mechanism that ensures encrypted, authenticated communication over IP networks.
Down
- A Cisco-specific protocol that encrypts entire authentication packets.
- A hierarchical level in a system that dictates time synchronization accuracy.
- A secure method for connecting to a network over an untrusted environment.
- The central repository where devices send messages for analysis and troubleshooting.
- An alert sent to an SNMP manager to signal critical events proactively.
- The alternative name for a technique used to duplicate and inspect network traffic.
- The software counterpart that collects and reports operational network data.
- A protocol ensuring that all network devices remain time-synchronized.
- A tunneling protocol enabling encapsulation of multiple network protocols.
18 Clues: The command center in SNMP that controls network elements. • A Cisco-specific protocol that encrypts entire authentication packets. • A protocol ensuring that all network devices remain time-synchronized. • An alert sent to an SNMP manager to signal critical events proactively. • A structured storage of SNMP device statistics and performance metrics. • ...
Vocab Quiz 1 Sentences 2025-09-29
Across
- Some older cell phones are already _________ and don’t work on the new networks.
- He spoke for a _________ amount of time. There was hardly any time left to work!
- The pattern was so _________ that you could barely tell what was happening.
- She was so _________ that she did it perfectly!
- If you _________ too many details, people won’t understand the story.
- They were blinded by their _________ and couldn’t see their own weakness.
- Some people only have _________ knowledge instead of a deep understanding.
- The season will _________ in a championship game.
- He chose to _________ the image entirely through colored ropes.
Down
- The flowers were blossoming _________. There were so many of them!
- He chose to use a _________ instead of cursing.
- There were too many _________ details for me to fully believe his story.
- I need a(n) _________ report so that I have the facts.
- He was so _________. He freely gave so many gifts to people.
- _________ can be a great obstacle to some. You need to care to succeed!
- The highway was lined with _________ that ruined the natural beauty.
- To compare them, you need to _________ them.
- Please make your conversation _________ so that we can save time.
18 Clues: To compare them, you need to _________ them. • He chose to use a _________ instead of cursing. • She was so _________ that she did it perfectly! • The season will _________ in a championship game. • I need a(n) _________ report so that I have the facts. • He was so _________. He freely gave so many gifts to people. • ...
Risk Interest Groups 2025-12-05
Across
- Machine learning using deep neural networks with many layers. (2 Words - between words)
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Transforming plaintext into ciphertext using cryptographic keys.
- Model memorizes noise in training data, hurting generalization.
- Security Information and Event Management for log aggregation and analytics.
- — Security model enforcing continuous verification and least privilege
- AI field enabling computers to understand and generate human language. (3 Words - between words)
- Public Key Infrastructure that manages certificates and trust.
- Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
- Trusted entity that issues and validates digital certificates. (2 Words - between words)
- Single software instance serves multiple customers with isolation. (2 Words - between words)
- Automated coordination/management of services, containers, and workloads.
- Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
- Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
- Algorithm that performs encryption and decryption.
- Access Control List defining allowed/denied permissions.
- Cloud model delivering virtualized compute, storage, and networking.
18 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Model memorizes noise in training data, hurting generalization. • Transforming plaintext into ciphertext using cryptographic keys. • ...
Today's Technologies (Module 1) 2022-01-13
Across
- A pointing device that fits under the palm of your hand comfortably
- Small speakers that rest inside each ear canal
- A _______ console is designed for single-player or multiplayer video games
- An output device that produces text and graphics on a physical medium, such as paper
- A personal computer designed to be in a stationary location
- Software that enables users with an Internet connection
- Does not contain a tower and instead uses the same case to house the display and the processing circuitry
- Also called a notebook computer
- A _______ device is a small, mobile computing consumer device designed to be worn
- An electronic device, operating under the control of instructions stored in its own memory
Down
- A _______ engine is software that finds websites, webpages, images, videos
- Internet-capable phone
- A computer dedicated to providing one or more services to other computers
- Worldwide collection of computer networks
- A ______ drive is a portable flash memory storage device that you plug in a USB port
- An ______ device allows you to enter data
- A thin, lighter-weight mobile computer that has a touch screen
- A collection of computers and devices connected together
18 Clues: Internet-capable phone • Also called a notebook computer • Worldwide collection of computer networks • An ______ device allows you to enter data • Small speakers that rest inside each ear canal • Software that enables users with an Internet connection • A collection of computers and devices connected together • ...
COSC 100 Part 1 Assignment 6 2015-09-23
Across
- About half the word count as the control condition.
- The default Windows text editor.
- Type of communication where the sender and the receiver are active at the same time.
- The markup used to write HTML
- The codes or tags that browsers use to create web pages.
- A group of information on a computer that can be software programs or data.
- The flow of data across the Internet.
- Networks that are not geographically close.
- When computers are geographically close and can be linked by a single cable or pair of wires.
- The author of a work (e.g., video, audio, graphic, icon).
Down
- Using the "marketese" found on many commercial web sites.
- A person who falsifies data to pretend to be someone else.
- Visits sites on the Internet, discovering web pages and building its index.
- Pictures, movies and graphics that can be embedded in a web page.
- Looks up user-submitted keywords in the index and reports back with web pages containing the keywords.
- Type of communication where the sending and receiving occur at different times.
- A permanently fixed original work.
- place on your hard drive where data is temporarily stored.
18 Clues: The markup used to write HTML • The default Windows text editor. • A permanently fixed original work. • The flow of data across the Internet. • Networks that are not geographically close. • About half the word count as the control condition. • The codes or tags that browsers use to create web pages. • Using the "marketese" found on many commercial web sites. • ...
Richard Demetrius Hurnall 2025-05-19
Across
- A cartoon character that has faces in it
- Laugh out loud
- person, especially a young man, who is perceived as independent, self-reliant, and possibly a bit of a "lone wolf".
- A secret mouth technique to gain a more defined jawline
- a wireless technology that allows devices to connect and exchange data over short distances using radio waves
- a person's "cool" or "it" factor, often used to describe someone's confidence, charisma, and stylishness.
- The notional environment in which communication over computer networks occurs
- Online experience to make it feel like the game is real
- If you know you know
Down
- Looking better then someone
- the programs and other operating information used by a computer.
- Universal serial bus
- A social media influencer and ex gangster, made famous for his human pig hybrid appearance.
- Main antagonist whom is a notorious hitman responsible for the high-profile murder of John Pork, a popular vlogger, and gang member.
- the machines, wiring, and other physical components of a computer or other electronic system.
- n intergalactic alien warlord and conqueror, a Chimera Sui Generis who serves as Ben's archenemy, and the main antagonist of the franchise Ben 10
- Away from keyboard
- In real life
18 Clues: In real life • Laugh out loud • Away from keyboard • Universal serial bus • If you know you know • Looking better then someone • A cartoon character that has faces in it • A secret mouth technique to gain a more defined jawline • Online experience to make it feel like the game is real • the programs and other operating information used by a computer. • ...
describing technical functions and applications 2025-09-23
Across
- : The base-2 number system used by computers, consisting of just zeros and ones.
- : The component of a computer that performs the main calculations.
- Clues
- : A set of rules or instructions for solving a problem or performing a task.
- : The physical parts of a computer or electronic system.
- : The set of instructions and data that tells a computer what to do.
- Clues
- : A device that detects and responds to some type of input from the physical environment.
- : A single point in a graphical image on a digital display.
- : An organized collection of structured information.
Down
- : A closed loop through which an electric current can flow.
- : The process of writing instructions for a computer to execute.
- : The practice of protecting systems and networks from digital threats.
- : A small piece of semiconducting material on which an integrated circuit is imprinted.
- : An object placed in orbit to transmit and receive signals, used for communication or GPS.
- : The point where a user and a computer system interact.
- : A type of signal that is continuous and represented by a physical quantity.
- : The engineering field that deals with the design and operation of mechanical machines.
- : A deviation from what is standard, normal, or expected.
19 Clues: Clues • Clues • : An organized collection of structured information. • : The point where a user and a computer system interact. • : The physical parts of a computer or electronic system. • : A deviation from what is standard, normal, or expected. • : A closed loop through which an electric current can flow. • : A single point in a graphical image on a digital display. • ...
Charter Communications-Fun Day Trivia 2018-01-05
Across
- Which team handles repayment agreements for medical deductions(________ Benefits)
- Philo Farnsworth battled with ________Zworykin to be called the "father of television."
- Charter, Time Warner Cable and _________ house networks combined in 2016.
- How many business units do we service?
- If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
- One of our key necessities is expanding access to ___________. This is a necessity to compete.
Down
- Charter Partnered with___________ Channel to connect veterans with their communities.
- The Second Largest Cable Provider in the U.S.
- Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
- The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
- If I am out on workman’s compensation, my updates are completed by the _________ team.
11 Clues: How many business units do we service? • The Second Largest Cable Provider in the U.S. • Charter, Time Warner Cable and _________ house networks combined in 2016. • Which team handles repayment agreements for medical deductions(________ Benefits) • Charter Partnered with___________ Channel to connect veterans with their communities. • ...
Software 2014-10-07
Across
- an interface through which a user interacts with electronic devices such as computers.
- software that manages computer hardware and software resources.
- user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line.
- a network security system that controls the incoming and outgoing network traffic.
- a system, tool, or technical process that is developed by and for a specific business entity.
Down
- a computer program written specifically for your company.
- a software utility that rearranges the fragments.
- everything designed into an information device with which a human being may interact.
- the protection of personal hardware programs networks and data.
- program in which the source code is available to the general public.
- A program that performs a very specific task.
11 Clues: A program that performs a very specific task. • a software utility that rearranges the fragments. • a computer program written specifically for your company. • the protection of personal hardware programs networks and data. • software that manages computer hardware and software resources. • program in which the source code is available to the general public. • ...
Find the words! 2020-05-30
Across
- Soon we will be able to upload ourselves to a ______ environment
- The advancements of _________ has made the biggest impact on how we live our day to day life in the last century
- ____ has high expectations in business areas such as logistics distribution, military and food safety due to its
- recognition rate, contactless recognition media, reach, connectivity with other networks and scalability of
- These days, cell phones have iris recognition ______
Down
- __________ helps us complete complicated tasks quickly
- Soon labors will become significantly more redundant due to _________(-ically/+ed) machinery
- Due to the recent pandemic the governments ________d a plethora of necessary products such as masks or other hygiene products to the civilians
- Do not forget to ________ in order to receive your promotion
- The ______ of technology is in vogue these days
- Tesla is currently the fastest growing eco friendly ____-______ car company
11 Clues: The ______ of technology is in vogue these days • These days, cell phones have iris recognition ______ • __________ helps us complete complicated tasks quickly • Do not forget to ________ in order to receive your promotion • Soon we will be able to upload ourselves to a ______ environment • ...
Robot Vocab 2023-03-17
Across
- learning machines notice patterns and learn from them to become more intelligent
- loop compares an actual variable with a desirable variable and adjusts the system accordingly
- system knowledge that is collected from experts and stored into a database
- intelligence The science of making machines do things that would require intelligence if done by men
- test a test for intelligence in a computer or robot to answer the question “Can machines think?”
- networks essentially a machine that processes information and learns from its experiences
Down
- making decisions and solving problems using common sense
- learning learning unsupervised from data that is unstructured or unlabeled
- analysis a method that allows you to examine the relationship between two or more variables of interest
- a set of rules designed to solve a problem
- valley feeling of revulsion humans get when presented with a robot
11 Clues: a set of rules designed to solve a problem • making decisions and solving problems using common sense • valley feeling of revulsion humans get when presented with a robot • learning learning unsupervised from data that is unstructured or unlabeled • system knowledge that is collected from experts and stored into a database • ...
Basic Computer Vocabulary 2021-01-20
Across
- the process of assigning a code to something for classification or identification
- The physical components of my computer or device
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- copy (data) from one computer system to another, typically over the internet.
Down
- The programs and other operating information used by a computer
- the address of a web page.
- a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
7 Clues: the address of a web page. • The physical components of my computer or device • The programs and other operating information used by a computer • copy (data) from one computer system to another, typically over the internet. • the process of assigning a code to something for classification or identification • ...
test1 2024-03-01
Unit 32 How networks can be attacked 2013-11-28
Across
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
- Is a software that gathers information about a person or organisation without their knowledge
- Is a type of malicious software that is activated each time your system boots up
- It attempts to make a user or organisation lose its services
- Usually these are statistical analyses that attempt to discover keys
Down
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
- Know as malicious software
- Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- Is a method where any virus such Trojan, Malware can get through all security procedures
- Also known for advertising supported software
11 Clues: Know as malicious software • Also known for advertising supported software • It attempts to make a user or organisation lose its services • Usually these are statistical analyses that attempt to discover keys • Is a type of malicious software that is activated each time your system boots up • ...
e-cell-weekly-newsletter-2 2022-01-02
Across
- I'm the last one to be added into the unicorns from India in 2021
- I'm the co-founder of one of the crypto networks that brings massive scale to Ethereum using Plasma and PoS based side-chain
- I am India's first and largest chain of backpackers' hostel in India
Down
- World's largest crypto exchange platform
- Only startup from IIT BHU Alumni to make it to the Nasdaq-100 Index
- I occur when a buyer purchases more than half of a firm.
- My IPO buyers were the most unhappy when I was listed on the stock exchange.
7 Clues: World's largest crypto exchange platform • I occur when a buyer purchases more than half of a firm. • I'm the last one to be added into the unicorns from India in 2021 • Only startup from IIT BHU Alumni to make it to the Nasdaq-100 Index • I am India's first and largest chain of backpackers' hostel in India • ...
Romance scam 2024-02-16
Across
- The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
- A person engaged in fraudulent activities, such as scams or deceit.
- The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
- To identify or discover something, often used in the context of finding fraudulent activities.
Down
- To stop something from happening, in this case, stopping romance scams before they occur.
- The act of intentionally misleading or tricking someone.
- Malicious software designed to harm or exploit computer systems.
7 Clues: The act of intentionally misleading or tricking someone. • Malicious software designed to harm or exploit computer systems. • A person engaged in fraudulent activities, such as scams or deceit. • To stop something from happening, in this case, stopping romance scams before they occur. • ...
Vocational Variety 2016-09-14
Across
- a program that enables a user to view and move among websites
- a filmmaking technique that utilizes only natural light & sound
- a single file in a collection of files that make a web page
- a savoury, open-faced pastry crust with a filling of cheese, meat, seafood or vegetables.
- retailer selling through conventional and online
- a baked egg-based dish which originated in early eighteenth century France.
- a device that breaks solid materials into smaller pieces by grinding, crushing, or cutting
- the global network of computers
- The name of an HTML tag
- A large deciduous tree in the mint family having hard, heavy, durable yellowish .
Down
- A characteristic applied to an HTML tag
- a set of rules that determine how data is transmitted on a network
- a filmmaking technique utilizing harsh contrasts & shadows
- an element such as a form, image or video file on a web page
- Retailers who sell primarily through the internet
- a boneless cut or slice of meat or fish,
- a computer networking device joining two or more networks
- A machine for shaping a piece of material, such as wood or metal, by rotating it
18 Clues: The name of an HTML tag • the global network of computers • A characteristic applied to an HTML tag • a boneless cut or slice of meat or fish, • retailer selling through conventional and online • Retailers who sell primarily through the internet • a computer networking device joining two or more networks • a filmmaking technique utilizing harsh contrasts & shadows • ...
Chapter 10 & 11 Key Terms 2022-02-08
Across
- muscle that compresses the cheek
- muscle-forming stem cell
- to the outside
- bundle of muscle fibers within a skeletal muscle
- striated muscle found in the heart; joined to one another at intercalated discs and under the regulation of pacemaker cells, which contract as one unit to pump blood through the circulatory system. Cardiac muscle is under involuntary control.
- protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
- moves the bone toward the midline
- muscle whose contraction is responsible for producing a particular motion
- formation of blood capillary networks
- muscle that increases the angle at the joint
- swallowing
Down
- muscle that adducts the thigh and flexes the leg at the knee
- regulatory protein that facilitates contraction in smooth muscles
- muscle that, along with the psoas major, makes up the iliopsoas
- broad, tendon-like sheet of connective tissue that attaches a skeletal muscle to another skeletal muscle or to a bone
- skeletal muscle that separates the thoracic and abdominal cavities and is dome-shaped at rest
- replacement of muscle fibers by scar tissue
- fascicles that extend over a broad area and converge on a common attachment site
18 Clues: swallowing • to the outside • muscle-forming stem cell • muscle that compresses the cheek • moves the bone toward the midline • formation of blood capillary networks • replacement of muscle fibers by scar tissue • muscle that increases the angle at the joint • bundle of muscle fibers within a skeletal muscle • muscle that adducts the thigh and flexes the leg at the knee • ...
11.5 Testout Crossword 2023-03-28
Across
- Local area network.
- Passphrase a user enters to access the wireless network.
- Standard for local area networks created by The IEEE-SA.
- Wide area network.
- Technique used by hackers to gain access to a target's computer or online accounts.
- Sequence of characters that identify a WIFI network.
- The conversion of data from a readable format into an encoded format.
- Allows a device to securely connect to a wireless network without entering the PSK.
Down
- Combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
- Transmission without the use of wires or cables.
- When a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
- Telephone interface that uses a cable of twisted wire pairs.
- Password or identification process.
- Cable consisting of an inner conductor surrounded by a concentric conducting shielding.
- Was developed by Cisco to address security concerns in RADIUS.
- Increases bandwidth by using multiple antennas for both the transmitter and receiver.
- Developed at MIT and is a key component of Windows Active Directory.
- Standardized physical network interface connecting data equipment.
18 Clues: Wide area network. • Local area network. • Password or identification process. • Transmission without the use of wires or cables. • Sequence of characters that identify a WIFI network. • Passphrase a user enters to access the wireless network. • Standard for local area networks created by The IEEE-SA. • Telephone interface that uses a cable of twisted wire pairs. • ...
1.3 Network Connections and Protocols 2025-03-19
Across
- A wireless method for connecting devices to a network
- A global network connecting millions of devices worldwide
- A device that requests information from a server
- A device which provides data or services to other devices
- Online storage and computing services accessed via the internet
- A network that spans a large geographical area, such as the internet(acronym)
- The maximum amount of data that can be transmitted across a network
- A network layout where all devices connect to a central point
- A device that forwards data between networks
- A network layout where each devices connects directly to multiple others
Down
- A device which directs data only to the intended recipient
- A type of network that connects computers in a small area, like a school or office(acronym)
- The system that translates domain names into IP addresses(acronym)
- The arrangement or layout of devices in a network
- A computer in a network that can act as both client and server
- A wired networking technology commonly used in LANS
- A short-range wireless communication technology
- A high-speed internet connection that transmits large amounts of data
18 Clues: A device that forwards data between networks • A short-range wireless communication technology • A device that requests information from a server • The arrangement or layout of devices in a network • A wired networking technology commonly used in LANS • A wireless method for connecting devices to a network • A global network connecting millions of devices worldwide • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
Cybersecurity 2024-02-15
Across
- A technique used to trick individuals into revealing sensitive information
- The process of protecting computer systems, networks, and data from theft or damage
- A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
- The practice of verifying the identity of a user or system before granting access
- A program or device used to detect and prevent unauthorized access to a computer or network
- A secret code used to gain access to a computer system, network, or account
- A malicious program that self-replicates and spreads to other computers
7 Clues: A malicious program that self-replicates and spreads to other computers • A technique used to trick individuals into revealing sensitive information • A secret code used to gain access to a computer system, network, or account • The practice of verifying the identity of a user or system before granting access • ...
Internet history 2022-11-10
Across
- the order in which a series of things appears
- to start an activity, especially an organized one
- to understand something or somebody wrongly
- a website where an individual person, or people representing an organization, write regularly about recent events or topics that interest them, usually with photos and links to other websites that they find interesting
Down
- to represent
- an international computer network connecting other networks and computers that allows people to share information around the world
- software such as a virus specifically designed to damage or gain access to a computer system without the user knowing
7 Clues: to represent • to understand something or somebody wrongly • the order in which a series of things appears • to start an activity, especially an organized one • software such as a virus specifically designed to damage or gain access to a computer system without the user knowing • ...
network 2024-01-14
4 Clues: determines the best path though the network • represents data to te use, plus encoding and dialog control • control the hardware devices and media that make up the network • supports communication between various devices across diverse networks
Exploratory Art: Cumulative Exam Review (#1-19) 2021-05-12
Across
- a device that creates the illusion of movement and was the forerunner to the modern projector.
- provided instant communication and information to a massive audience for the first time.
- creates animation using live footage as guides.
- an application of commercial photography to communicate or establish trends.
Down
- self-contained, self-sustained explosions, fires, flames, and fireworks used in live performances, film, and other forms of entertainment.
- a recording of a motion picture, or television program for playing through a television.
- transparent sheets of film on which objects are drawn or painted for traditional hand drawn animation.
- a standard communications protocol used to connect computer networks around the world.
- a visual series of rough drawings depicting the scenes of action in a story.
- transferring two dimensional images onto a screen for viewing.
10 Clues: creates animation using live footage as guides. • transferring two dimensional images onto a screen for viewing. • a visual series of rough drawings depicting the scenes of action in a story. • an application of commercial photography to communicate or establish trends. • a standard communications protocol used to connect computer networks around the world. • ...
Globalization 2022-11-04
Across
- Money received, especially on a regular basis, for work or through investments.
- Difference in size, degree, circumstances
- The process by which businesses or other organizations develop international influence or start operating on an international scale.
- The action of buying and selling goods and services.
Down
- A friend, or a person who works for someone in authority, especially one who is willing to give and receive dishonest help.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Taking place or progressing slowly or by degrees.
- A society or association formed by people with a common interest or purpose.
- A state or society governed by the wealthy.
- The transfer of a business, industry, or service from public to private ownership and control
10 Clues: Difference in size, degree, circumstances • A state or society governed by the wealthy. • Taking place or progressing slowly or by degrees. • The action of buying and selling goods and services. • A society or association formed by people with a common interest or purpose. • Money received, especially on a regular basis, for work or through investments. • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Crisis Assistance Helping Out On The Streets Acronym
- What region was identified in step one of the asset collection method?
- key asset component
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
Down
- What is Bill 178?
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
- Declared anti-Black Racism as a public health crisis
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- What is our asset organization's acronym?
10 Clues: What is Bill 178? • key asset component • What is our asset organization's acronym? • Crisis Assistance Helping Out On The Streets Acronym • Declared anti-Black Racism as a public health crisis • What region was identified in step one of the asset collection method? • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- Crisis Assistance Helping Out On The Streets Acronym
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- Key asset component
- What is our asset organization's acronym?
Down
- What region was identified in step one of the asset collection method?
- What is Bill 178?
- Declared anti-Black Racism as a public health crisis
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
10 Clues: What is Bill 178? • Key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out On The Streets Acronym • What region was identified in step one of the asset collection method? • ...
Networking Puzzle 2016-04-26
Across
- I am a small network that interconnects computers within a limited area such as a residence, school,lab etc
- I am address assigned to each device (e.g., computer, printer) participating in a computer network
- I am a group of two or more computer systems linked togetherIP.
- Term used to send audio and/or video content to everyone in the network
Down
- I am used to regenerate or replicate a signal.
- is communication between a single sender and a single receiver over a network
- I serve as a central connection for all of your network equipment but i am not intelligent
- I span over a relatively large geographical typically consists of two or more local-area networks (LANs).
- I am also called physical address/hardware address
- I perform the "traffic directing" functions on the Internet
10 Clues: I am used to regenerate or replicate a signal. • I am also called physical address/hardware address • I perform the "traffic directing" functions on the Internet • I am a group of two or more computer systems linked togetherIP. • Term used to send audio and/or video content to everyone in the network • ...
Loy Krathong 2023-11-22
Across
- the round object that moves around the earth and shines at night by light reflected from the sun
- a natural flow of water that continues in a long line across land to the sea
- round stick of wax with that is lit to give light as it burns
- the natural world in which people, animals and plants live
- tropical plant with white or pink flowers that grows on the surface of lakes
- physical or mental pain
Down
- computer network connecting other networks and computers that allows people to share information around the world
- scientific knowledge used in practical ways in industry
- material that is produced by chemical processes and can be formed into shapes
- all the plants, animals and things that exist in the universe that are not made by people
10 Clues: physical or mental pain • scientific knowledge used in practical ways in industry • the natural world in which people, animals and plants live • round stick of wax with that is lit to give light as it burns • a natural flow of water that continues in a long line across land to the sea • tropical plant with white or pink flowers that grows on the surface of lakes • ...
Special Technical ICT Definitions 2024-03-10
Across
- The method by which information is converted into secret code that hides the information's true meaning.
- A list of records linked together using special cryptographic operations across a distributed network of computers⁵.
- A set of rules to be followed in calculations or other problem-solving operations.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Records of events that happen in an operating system or other software.
Down
- The maximum rate of data transfer across a given path.
- A hardware or software component that stores data so future requests for that data can be served faster.
- An identification string that defines a realm of administrative autonomy, authority or control within the internet.
- The loss of signal strength in networking cables or connections⁵.
- A device that forwards data packets along networks.
10 Clues: A device that forwards data packets along networks. • The maximum rate of data transfer across a given path. • The loss of signal strength in networking cables or connections⁵. • Records of events that happen in an operating system or other software. • A set of rules to be followed in calculations or other problem-solving operations. • ...
5G Pillars 2024-11-26
Across
- What feature helps to conserve battery life by managing power usage in devices?
- What high-frequency waves are used in 5G to enable ultra-fast data speeds?
- What network component must be upgraded to handle the large volume of traffic generated by small cells?
- What is improved in 5G to enhance spectral efficiency, energy efficiency, and latency?
- What concept allows the sharing of wireless infrastructure among multiple network operators?
Down
- What technique is used to allow efficient utilization of available frequency bands?
- What is densely deployed to improve coverage and handle massive traffic indoors and outdoors?
- What is allocated to 5G to support higher data capacities and better coverage?
- What type of communication focuses on machine-to-machine interactions?
- What term refers to networks that can configure, optimize, and repair themselves automatically?
10 Clues: What type of communication focuses on machine-to-machine interactions? • What high-frequency waves are used in 5G to enable ultra-fast data speeds? • What is allocated to 5G to support higher data capacities and better coverage? • What feature helps to conserve battery life by managing power usage in devices? • ...
Fun Friday 2024-04-28
Across
- A device that directs data packets between computer networks.
- The measure of data transfer rate over a network.
- A device that modulates and demodulates analog signals for transmitting digital data over communication lines.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of encoding data to make it unreadable without the proper decryption key.
Down
- Software used to access and view websites on the internet.
- A set of rules governing the exchange of data between devices on a network.
- A virtual private network that creates a secure connection over the internet, often used for remote access to a private network.
- A standard system for connecting computers to a local area network (LAN).
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
10 Clues: The measure of data transfer rate over a network. • Software used to access and view websites on the internet. • A device that directs data packets between computer networks. • A standard system for connecting computers to a local area network (LAN). • A set of rules governing the exchange of data between devices on a network. • ...
Technology Glossary 2 2025-03-01
Across
- A request for data or information from a database.
- A sequence of instructions that is continually repeated until a certain condition is reached.
- A programming language commonly used to create interactive effects within web browsers.
- A device that forwards data packets between computer networks.
- learning A field of artificial intelligence that uses statistical techniques to give computers the ability to learn from data.
- A word or concept of great significance in programming and searching.
Down
- A group of interconnected computers that can communicate with each other.
- programming A programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
- The process of designing and building an executable computer program to accomplish a specific computing task.
- The programs and other operating information used by a computer.
10 Clues: A request for data or information from a database. • A device that forwards data packets between computer networks. • The programs and other operating information used by a computer. • A word or concept of great significance in programming and searching. • A group of interconnected computers that can communicate with each other. • ...
Unit 2 Crossword 2024-12-29
Across
- Luxury item that was a major trade good on the Silk Road.
- Chinese innovation that spread to Europe, transforming military power.
- Disease that spread through increased trade, significantly reducing global populations.
- A key Silk Road city known for thriving markets and Islamic scholarship.
- Religion that spread from India to East Asia via the Silk Road, leading to syncretic forms like Zen Buddhism.
- A trading city located at the convergence of major Silk Road routes.
Down
- Rest-stops along the Silk Road that provided safety and cultural exchange.
- Muslim scholar who traveled extensively through Islamic regions and documented his experiences.
- East African civilization that combined Bantu culture with Arabic influences through Islamic trade networks.
- A type of rice from Vietnam that led to significant population growth in China.
10 Clues: Luxury item that was a major trade good on the Silk Road. • A trading city located at the convergence of major Silk Road routes. • Chinese innovation that spread to Europe, transforming military power. • A key Silk Road city known for thriving markets and Islamic scholarship. • Rest-stops along the Silk Road that provided safety and cultural exchange. • ...
CYBER-BULLYING 2024-07-25
Across
- - staying safe online from bullies and hackers
- - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
- - careful investigation into a crime or mystery
- - a witness of the bullying
Down
- - an electronic communications network that connects computer networks and organizational computer facilities around the world
- - bullying but online
- - a secret word or phrase that must be used to gain admission to a place.
- - Someone who stands up to the bullies
- - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- - the address of a unique resource on the internet
10 Clues: - bullying but online • - a witness of the bullying • - Someone who stands up to the bullies • - staying safe online from bullies and hackers • - careful investigation into a crime or mystery • - the address of a unique resource on the internet • - a secret word or phrase that must be used to gain admission to a place. • ...
Industrial Revolution 2025-11-20
Across
- people in the middle of the social hierarchy
- uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
- the process of making an area more urban
- the process of supplying a military force with modern weapons and vehicles
- social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
- people who earn wages through labor
- a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
- the process of making something conform to a standard
- system of interconnected routes and relationships that facilitate between different regions and ethnicity
- the measure of efficiency of production of goods or services
10 Clues: people who earn wages through labor • the process of making an area more urban • people in the middle of the social hierarchy • the process of making something conform to a standard • the measure of efficiency of production of goods or services • the process of supplying a military force with modern weapons and vehicles • ...
Navigating the Web of Cyber Law 2025-06-05
Across
- A violation of privacy where an individual's data is exposed or stolen.
- A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
- A legal framework that governs the use of electronic signatures in contracts.
- The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
- The unauthorized copying or distribution of software or digital content.
Down
- The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
- The practice of protecting computers, networks, and data from unauthorized access or attacks.
- A method of writing in code so that only authorized parties can access it.
- A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
- The unlawful act of accessing a computer system without authorization.
10 Clues: The unlawful act of accessing a computer system without authorization. • A violation of privacy where an individual's data is exposed or stolen. • The unauthorized copying or distribution of software or digital content. • A method of writing in code so that only authorized parties can access it. • ...
DS 2025-09-26
Across
- What's the term for a piece of evidence or information that helps solve a mystery?
- What term describes a step-by-step procedure for solving problems in computer science?
- What word describes an elaborately planned theft by a skilled criminal team?
- What metric measures the proportion of correct predictions among total cases examined in classification?
- Which versatile programming language, named after a snake, is used in web dev, data analysis, and AI?
- What acronym represents a technique to reduce dataset dimensionality while preserving information?
Down
- Which ML subset is inspired by the human brain, using neural networks?
- In machine learning evaluation, what three-letter acronym represents a graphical plot illustrating a classifier’s performance across various thresholds?
- a.k.a
- What term describes the money or items demanded by criminals to release victims?
10 Clues: a.k.a • Which ML subset is inspired by the human brain, using neural networks? • What word describes an elaborately planned theft by a skilled criminal team? • What term describes the money or items demanded by criminals to release victims? • What's the term for a piece of evidence or information that helps solve a mystery? • ...
cyber puzzle 2024-11-15
Across
- This word maintain the accuracy and trustworthinessof data over its entire lifecycle
- Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
- Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
- This word ensures that information and resources are accessible to authorized users when needed.
- This word ensures that sensitive information is only accessible to authorized individuals.
- The state of being protected from danger, theft, or unauthorized use of resources.
- A term used to describe anything related to computers, networks, or the internet.
7 Clues: A term used to describe anything related to computers, networks, or the internet. • The state of being protected from danger, theft, or unauthorized use of resources. • This word maintain the accuracy and trustworthinessof data over its entire lifecycle • Measures or systems designed to protect against threats, damage, or unauthorized access. • ...
Information 2013-04-09
Across
- an organization that publishes a newspaper in the USA (three words)
- the institution, system, or practice of forbidding information
- an organization that publishes a newspaper (two words)
- a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising (two words)
Down
- any of the means of communication, as television or newspapers, that reach very large numbers of people (two words)
- a statement prepared and distributed to the press by Amway (two words)
- a vast computer network linking smaller computer networks worldwide
7 Clues: an organization that publishes a newspaper (two words) • the institution, system, or practice of forbidding information • an organization that publishes a newspaper in the USA (three words) • a vast computer network linking smaller computer networks worldwide • a statement prepared and distributed to the press by Amway (two words) • ...
FIBER OPTICS 2015-03-11
Across
- In this type of network the peers are computer systems which are connected to each other via the Internet.
- FTTB stands for......................
- FTTC stands for....................
- This technology can increase the capacity of the existing networks without the need for new cable installation, and it uses laser beams and fiber optic media to work.
Down
- This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH.
- FTTH stands for.......................
- Fiber optics is a technology that uses...........or plastic threads to transmit data.
7 Clues: FTTC stands for.................... • FTTB stands for...................... • FTTH stands for....................... • Fiber optics is a technology that uses...........or plastic threads to transmit data. • This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH. • ...
Smart System 2021-06-30
Across
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- Application that involves wireless sensor and RFID technology,
- Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
- A maintenance technique that estimates when maintenance should be performed
- Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
- A sensor that detects movement sensor that detects
- Smart system application that reduces global emission
7 Clues: A sensor that detects movement sensor that detects • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • ...
"WHAT'S IS THE HIDDEN WORDS?" 2023-11-26
Across
- to use machines and computers instead of people to do a job or task.
- make changes i something established, especially by introducing new methods, ideas or product.
- a portable computer that can work with a battery.
- an international computer network connecting other networks and computers that allows people to share information around the world
Down
- a person who is enthusiastic about advanced equipments or devices.
- a formal discussion on a particular topic in a public meeting or legislative assembly, in which opposing arguments are put forward.
- an often small mechanical or electronic device which does something useful.
7 Clues: a portable computer that can work with a battery. • a person who is enthusiastic about advanced equipments or devices. • to use machines and computers instead of people to do a job or task. • an often small mechanical or electronic device which does something useful. • ...
Network Security 2023-06-05
Across
- A method used to encode data during storage or transmission (10)
- It refers to the right of individuals to determine what information is stored about them and how that information will be used.
- The unauthorised accessing of a computer system.
Down
- A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
- A small piece of software that uses computer networks and security holes to replicate itself. (5)
- A type of software used to protect computer systems from viruses.
- Another name for electronic junk mail.
7 Clues: Another name for electronic junk mail. • The unauthorised accessing of a computer system. • A method used to encode data during storage or transmission (10) • A type of software used to protect computer systems from viruses. • A small piece of software that uses computer networks and security holes to replicate itself. (5) • ...
MALWARE 2025-04-09
Across
- - Software that automatically displays or downloads advertising material when online.
- - A stealthy malware that hides its presence and gives attackers control over a system.
- - A self-replicating malware that spreads through networks without user interaction.
- - Software that secretly monitors user activity and sends the data to a third party.
Down
- - A tool used to record every keystroke typed on a keyboard, often to steal passwords.
- - A malicious program that attaches to files and spreads when the file is opened.
- - Malware disguised as a harmless file or program to trick users into installing it.
7 Clues: - A malicious program that attaches to files and spreads when the file is opened. • - Malware disguised as a harmless file or program to trick users into installing it. • - A self-replicating malware that spreads through networks without user interaction. • - Software that secretly monitors user activity and sends the data to a third party. • ...
Lesson 7 year 11 crossword 2024-11-04
Across
- A network that connects computers within a small geographical area, such as a building or office.
- processor of a computer
- A private network that allows authorized external users to access certain parts of an organization's internal system.
Down
- The process of double-checking data to ensure its correctness, often through manual review or automated tools.
- A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs).
- A network that covers large geographical areas, often connecting multiple LANs, typically using third-party providers.
- memory of a computer
7 Clues: memory of a computer • processor of a computer • A network that connects computers within a small geographical area, such as a building or office. • A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs). • ...
NSS Chapter 2C 2023-01-09
Across
- Amount of time, including delays, for data to travel from one given point to another
- The measure of usable data transferred over a given period of time (Goodput = Throughput - traffic overhead)
- Braided or foil shield provides EMI/RFI protection
- capacity at which a medium can carry data.
Down
- the most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
- The measure of the transfer of bits across the media over a given period of time
- how the bit values, “1” and “0” are represented on the physical medium.
- Twisted pairs protect the signal from interference.
8 Clues: capacity at which a medium can carry data. • Braided or foil shield provides EMI/RFI protection • Twisted pairs protect the signal from interference. • how the bit values, “1” and “0” are represented on the physical medium. • The measure of the transfer of bits across the media over a given period of time • ...
asd 2023-04-21
Across
- a type of software that allows you to find and view websites on the Internet
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- a technological process for telling a computer which tasks to perform in order to solve problems
- a worldwide system of computer networks
Down
- a group of related hardware units or programs or both, especially when dedicated to a single application
- a program designed to detect and remove viruses and other kinds of malicious software from your computer
- a coding error in a computer program
- the action or practice of playing video games
8 Clues: a coding error in a computer program • a worldwide system of computer networks • the action or practice of playing video games • a type of software that allows you to find and view websites on the Internet • a technological process for telling a computer which tasks to perform in order to solve problems • ...
It 2023-05-17
Across
- What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
- What mobile operating system was developed by Google?
- What do you call a group of interconnected computers and devices?
Down
- What technology allows devices to connect to a network without using cables or wires?
- What type of malware is capable of self-replicating and spreading across networks?
- horse Whattype of malware is disguised as a legitimate software program?
- What is the process of converting plain text into ciphertext called?
- In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?
8 Clues: What mobile operating system was developed by Google? • What do you call a group of interconnected computers and devices? • What is the process of converting plain text into ciphertext called? • horse Whattype of malware is disguised as a legitimate software program? • What type of malware is capable of self-replicating and spreading across networks? • ...
Types of measures to counter security threats. 2022-05-10
Across
- - involves focusing efforts to prevent threats to the most valuable information
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- of the system to changes in the environment
- methods are based on one principle of information security management;
Down
- of additional tasks and requirements for employees of the organization caused by information protection measures
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- - excludes acquaintance of third parties with the means and technology of information protection
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Globalisation and crime 2025-02-07
Across
- A term describing global organised crime networks, as explored in the book by Misha Glenny.
- The study of social harm rather than just criminal behaviour.
- A sociologist known for his work on the network society and the impact of digital communication.
- A term referring to the interconnection between global and local processes.
- A sociologist who theorised about risk society and the global implications of modernity.
Down
- The idea that all parts of society and the world are linked and influence each other.
- A sociologist who describes primary and secondary green crime.
- A sociologist who analysed the globalisation of crime and the role of capitalism in shaping criminal activity.
8 Clues: The study of social harm rather than just criminal behaviour. • A sociologist who describes primary and secondary green crime. • A term referring to the interconnection between global and local processes. • The idea that all parts of society and the world are linked and influence each other. • ...
ICT keywords 1 2025-03-05
Across
- used to connect LANs together, connecting different types of network so they act as one single LAN
- is public access to a vast collection of computers and networks
- is to run both systems together until the new system works properly when the new system works the old system is removed
- a private network used in companies and organisations
Down
- it is a fraudulent practice of making phone calls/leaving voice messages
- it is the system that displays questions for the user to answer, displaying the results
- a collection of facts and rules. Created from information provided by experts
- this network device connects a LAN to the internet
8 Clues: this network device connects a LAN to the internet • a private network used in companies and organisations • is public access to a vast collection of computers and networks • it is a fraudulent practice of making phone calls/leaving voice messages • a collection of facts and rules. Created from information provided by experts • ...
Cyber ethics 2025-06-14
Across
- A legal right granted by the law to the creator for his original work.
- Purchasing a single lisenced copy of the software and loading it into several computers.
- Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
- An illegal intrution into a computer system Or network.
- Vital information resources under seize.
- An act of sending to an user, misleading him to belive that it is from a trusted organisation.
- Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
- Unwanted bulk emails that comes from unknown sources.
8 Clues: Vital information resources under seize. • Unwanted bulk emails that comes from unknown sources. • An illegal intrution into a computer system Or network. • A legal right granted by the law to the creator for his original work. • Purchasing a single lisenced copy of the software and loading it into several computers. • ...
Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16
Across
- _____ administrator is responsible for the creation, administration and security of computer networks.
- The _____ administrator is responsible for the administration and management of an organization's network.
- A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
- _____ write new programs, update and modify existing programs/software.
- _____ designers create webpage, build and maintain websites for an individual or an organization.
- The System _____ main role is to implement a new computerised system or upgrade an existing one.
6 Clues: _____ write new programs, update and modify existing programs/software. • A _____ librarian keeps an organization's data files and software up-to-date and organised. • The System _____ main role is to implement a new computerised system or upgrade an existing one. • ...
. 2023-11-14
Across
- record the address to enable quick access in future
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- text files with small pieces of data
- a form of social engineering and scam where attackers deceive people into revealing sensitive information
Down
- malicious attack that involves injecting harmful code into legitimate online advertising networks
- a secret word or phrase that must be used to gain admission to a place
6 Clues: text files with small pieces of data • record the address to enable quick access in future • a secret word or phrase that must be used to gain admission to a place • malicious attack that involves injecting harmful code into legitimate online advertising networks • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Angle between orbital plane and earth's equatorial plane • Part of the celestial sphere directly above the observer
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Task 4 Methodology CRossword 2015-04-24
4 Clues: Overall startegy to treat input. • approach used in the initial online course. • participants are encouraged to develop the kinds of digital _____ skills. • Resource used to build global information sharing networks and foster connectivity for learning purposes.
PLACES 2022-12-20
4 Clues: a worldwide system of computer networks • large retail store operated on a self-service basis • someone who sells goods informally in public places • where buyers and sellers can meet to facilitate buying or selling of goods
Mass Media 2014-06-11
Across
- Any of the means of communication, as television or newspapers, that reach very large numbers of people.
- Modern popular culture transmitted via mass media and aimed particularly at younger people.
- Refers to the approach used to attract the attention of consumers and/or to influence their feelings toward the product, service, or cause.
- The action or business of promoting and selling products or services, including market research and advertising.
Down
- Give or hand over something in exchange for money.
- Downloading ideas and trends of older teens onto pre-teens.
- The activity or profession of producing advertisements for commercial products or services.
- Concerned with or engaged in commerce.
- Is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
- Obtain in exchange for payment.
10 Clues: Obtain in exchange for payment. • Concerned with or engaged in commerce. • Give or hand over something in exchange for money. • Downloading ideas and trends of older teens onto pre-teens. • The activity or profession of producing advertisements for commercial products or services. • ...
Media 2020-05-20
Across
- A digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
- Newspapers and magazines
- The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them
- An international computer network connecting other networks and computers from companies, universities, etc
- of a circuit or device that represents magnitudes in digits
- Instructions that are hidden within a computer program and are designed to cause faults or destroy data
Down
- A game in which you press buttons to control and move images on a screen
- Talk socially without exchanging too much information
- A machine that prints
- The flat surface at the front of a television, computer, or other electronic device, on which you see pictures or information
10 Clues: A machine that prints • Newspapers and magazines • Talk socially without exchanging too much information • of a circuit or device that represents magnitudes in digits • A game in which you press buttons to control and move images on a screen • The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-07
Across
- What region was identified in step one of the asset collection method?
- If we do not see racism in mental health services as a problem, it will be extremely difficult to create a ________
- Crisis Assistance Helping Out on The Streets Acronym
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model
- What is our asset organization's acronym?
Down
- Key asset component
- Category in the socio-ecological model that does not directly impact the individual but exerts both negative and positive interactive forces on the individual such as community contexts and social networks
- Declared anti-Black Racism as a public health crisis
- __________inequalities highlight the historic principles of modern-day discrimination
- The four components of the socio-ecological model include the microsystem, mesosystem, ecosystem and ___________?
10 Clues: Key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out on The Streets Acronym • What region was identified in step one of the asset collection method? • __________inequalities highlight the historic principles of modern-day discrimination • ...
Emtech Reviewer 2025-02-03
Across
- the chart's horizontal axis which presents the categories being charted, while the vertical axis shows the charted values.
- A visual storytelling software alternative to traditional slide-based presentation formats.
- It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks.
- for Apple devices
- Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.
Down
- Intellectual Property must also be protected.
- Web 3.0 machine must cater all languages as this third generation of web aims to serve diverse users.
- an open source operating system developed by Google.
- Plays a significant role in a graphic design.
- is an umbrella term which covers any communication devices, applications, and systems that people use to interact and connect with others.
10 Clues: for Apple devices • Intellectual Property must also be protected. • Plays a significant role in a graphic design. • an open source operating system developed by Google. • Our currently used web browsers, and HTML files cannot support the idea of Web 3.0. • A visual storytelling software alternative to traditional slide-based presentation formats. • ...
Introduction to Machine Learning 2024-12-09
Across
- A type of task where the goal is to predict continuous values like house prices.
- A learning type that requires labeled data for training.
- A reinforcement learning algorithm that maps states and actions to rewards.
- The process of grouping similar data points without predefined labels.
Down
- The error due to a model being too sensitive to training data noise.
- The error caused by overly simplistic models failing to capture data complexity.
- The phase where a machine learning model learns patterns from data.
- The broader field of study that includes machine learning and aims to simulate human intelligence.
- The specialized subset of ML that uses neural networks with multiple layers for complex tasks.
- The subset of AI that focuses on learning from data to make predictions or decisions.
10 Clues: A learning type that requires labeled data for training. • The phase where a machine learning model learns patterns from data. • The error due to a model being too sensitive to training data noise. • The process of grouping similar data points without predefined labels. • A reinforcement learning algorithm that maps states and actions to rewards. • ...
AI Crossword Puzzle 2024-12-09
Across
- A set of rules or instructions given to an AI system to help it learn how to solve problems or perform tasks.
- Allianz signed this pact committing to responsible AI use.
- Name of the new European Union regulation concerning artificial intelligence
- Name of the general-purpose AI system developed by Allianz (similar to ChatGPT)
- AI-generated media that can convincingly mimic real people.
- The risk category for AI systems like spam filters under the EU AI Act.
Down
- The dataset used to train an AI model.
- An approach where human intervention is part of the AI system's decision-making process.
- A subset of machine learning using neural networks with many layers, effective for tasks like image recognition
- Systematic errors in AI outputs due to prejudiced assumptions made during the algorithm's development or training process.
10 Clues: The dataset used to train an AI model. • Allianz signed this pact committing to responsible AI use. • AI-generated media that can convincingly mimic real people. • The risk category for AI systems like spam filters under the EU AI Act. • Name of the new European Union regulation concerning artificial intelligence • ...
Neuro Fuzzy 2024-04-18
Across
- Method that combines fuzzy logic and neural networks.
- A process used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
- Technique in neuro-fuzzy systems for modeling uncertain or imprecise information.
- Type of algorithm used in neuro-fuzzy systems to adjust parameters based on the error signal.
- An approach in neuro-fuzzy systems to adjust parameters based on error signal.
Down
- Mathematical model representing knowledge or data in the form of fuzzy rules
- The process of converting linguistic information into a form suitable for computation in fuzzy systems.
- Term for the output of a fuzzy logic system.
- A technique in neuro-fuzzy systems where the system structure and parameters are adjusted simultaneously.
- Method used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
10 Clues: Term for the output of a fuzzy logic system. • Method that combines fuzzy logic and neural networks. • Mathematical model representing knowledge or data in the form of fuzzy rules • An approach in neuro-fuzzy systems to adjust parameters based on error signal. • Technique in neuro-fuzzy systems for modeling uncertain or imprecise information. • ...
4th Grade Social Studies Homework Due 10/13/22 2022-10-10
Across
- When the land was no longer fertile, the settlers had to make their first big ________.
- The US gets resources from other countries in their ________.
- A farmer’s favorite ______ might be their tractor.
- Clean water is a precious ________ in many parts of the world.
- The Iroquois formed a ________ of tribes that worked together for trade and during times of war.
Down
- cost of gasoline can impact the country’s _________.
- The Native American ________ would have been located near water.
- Jill decides to take the bus to work instead of driving. It takes her 60 minutes to get there on the bus and driving would have been 40, so her _______ is 20 minutes.
- Maria is a firm believer in democratic system of __________.
- Decisions were often made through _________ in Native American tribes.
10 Clues: A farmer’s favorite ______ might be their tractor. • cost of gasoline can impact the country’s _________. • Maria is a firm believer in democratic system of __________. • The US gets resources from other countries in their ________. • Clean water is a precious ________ in many parts of the world. • The Native American ________ would have been located near water. • ...
ISA-VESIT CROSSWORD 2022-02-02
Across
- What is the name of India’s first indigenous supercomputer developed by CDAC?
- Which IIT has transformed an existing nitrogen plant into an oxygen generator?
- Which satellite is responsible for communication, meteorological services and television broadcasting in India?
- Who is largely responsible for breaking the German Enigma codes and created a test that provided a foundation for artificial intelligence?
- The concentric circles on the platter of hard disk are known as _____
Down
- Which is the programming language used for backend development of Instagram?
- What was the largest social network prior to facebook?
- _____ is the generic term for a collection of private computer networks within an organization.
- Which is the first telecom company in India that demonstrated the operation of the 5G network?
- MOV file extension usually refers to what kind of file?
10 Clues: What was the largest social network prior to facebook? • MOV file extension usually refers to what kind of file? • The concentric circles on the platter of hard disk are known as _____ • Which is the programming language used for backend development of Instagram? • What is the name of India’s first indigenous supercomputer developed by CDAC? • ...
G2 - Ambientes computacionais e Conectividade - 04/04/2022 2022-04-05
Across
- Um byte é formado por 8.
- Local Area Networks, ou Redes Locais.
- Tipo de transmissão de dados que ocorre em um único sentido.
- Qual camada OSI converte o formato do dados recebido pela camada aplicação em um formato comum a ser usado na transmissão.
- Qual topologia descreve o fluxo de dados através da rede.
Down
- Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos.
- Definem como será feita a transmissão de dados e coloca marcações nos dados que estão sendo transmitidos.
- Topologia comum que possui alto poder de expansão.
- Topologia de redes que a utilização da comunicação em um único sentido diminuem as chances de colisão e não há a necessidade de roteamento.
- Tipo de topologia de redes que geralmente possui um Hub no centro da estrutura.
10 Clues: Um byte é formado por 8. • Local Area Networks, ou Redes Locais. • Topologia comum que possui alto poder de expansão. • Qual topologia descreve o fluxo de dados através da rede. • Tipo de transmissão de dados que ocorre em um único sentido. • Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos. • ...
DATA TRASMISSION 2022-07-07
Across
- a small part of a message / data that is transmitted over a network
- stages in a network that can receive and transmit data packets
- data that can be sent in both directions at the same time (simultaneously)
Down
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that cant be sent in both directions but not at the same time
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check data transferred has been altered or corrupted
- data that can be sent on one direction only
- a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data packets • data that cant be sent in both directions but not at the same time • a small part of a message / data that is transmitted over a network • ...
How Aware Are You? 2025-09-12
Across
- Verifying the identity of a user, often using a username and password.
- A fake website designed to steal personal information.
- The practice of protecting systems and networks from digital attacks.
- A program that replicates itself and spreads to other computers.
- A software that monitors and blocks unauthorized access to a computer network.
- A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
- A string of characters used to log in to a system, it should be unique and complex.
- Adding a second layer of verification beyond a password, often a code sent to your phone
- The"lock" icon in a browser's address bar indicates a secure connection using this .
- A type of malware that blocks access to your data until a sum of money is paid.
10 Clues: A fake website designed to steal personal information. • A program that replicates itself and spreads to other computers. • The practice of protecting systems and networks from digital attacks. • Verifying the identity of a user, often using a username and password. • A software that monitors and blocks unauthorized access to a computer network. • ...
Business Model Crossword Puzzle 2025-11-13
Across
- Which business model is an agreement that details all rules and expectations for both parties?
- What do franchisees typically benefit from?
- What owner has complete autonomy and control over all aspects of the business, from operations and marketing to pricing and branding?
- Managed services is the practice of what?
- What does the franchisee usually pay for franchisor an initial startup?
- Owning an independent business gives you what type of control?
Down
- Franchising allows business owners to expand their business by what?
- The franchise business model dates to what century?
- What type of business model is outsourced service agreement where a third-party provider takes responsibility for managing and operating specific business functions for a client?
- Franchising is often recommended to what type of business owners?
10 Clues: Managed services is the practice of what? • What do franchisees typically benefit from? • The franchise business model dates to what century? • Owning an independent business gives you what type of control? • Franchising is often recommended to what type of business owners? • Franchising allows business owners to expand their business by what? • ...
Crossword 2022-10-25
4 Clues: That guy who does the EdTalks • A famous poet, a conference room, and lover of swans • Without doubt the best of the Extreme Networks offices • IT Guru. In some places they say his presence alone fixes computers...
computer science 2020-12-09
Across
- give an authority order
- a folder or box for holding loose papers that are typically arranged a difference
- its a corona that can contact everybody
- browser is a software application for accessing information on the world wide web.
- the amount of something produced by a person,machine,industry
- an island town or city
- device is a piece of computer device hardware equipment wich converts information
- storage cloud computing model thatstores data and information
- a person or thing that provides commonly
- something remmembered from the past
- annoy or bother someone
- local area network is a collection of devices together
- software thats designed to dirupt and damage
Down
- a small sweet cake typically round and flat and having a crisp flat between chewy textures
- wireless fidelity that can connect to a radio using waves without needing to use wires
- copy data from a computer system to another typically over internet
- devices a piece of equipment used to provide data and control signals into a information processing system as computer
- bar a long thin section at the edge of a computer
- process in restarting a computer
- a wall designed whit fire
- network is a group of networks that uses a set of communications
- a act or instance of booting a computer
22 Clues: an island town or city • give an authority order • annoy or bother someone • a wall designed whit fire • process in restarting a computer • something remmembered from the past • its a corona that can contact everybody • a act or instance of booting a computer • a person or thing that provides commonly • software thats designed to dirupt and damage • ...
WWI Crossword Puzzle 2022-05-27
Across
- Nations pride
- One of the first countries to surrender
- First full-scale offensive with tanks
- When all resources are devoted to war
- Russian leaving war
- Type of warfare with networks
- Warfare to sink any ship
- Dropping bombs on important places
- Continent where fighting was in Egypt
- Who went to war
- Where fighting of Germans and Russians happened
- First aircraft used
- Words for deaths
- Treaty from Russia to Germany
- Where Germans sent Zimmermann note
- Note from Germans to Mexico
- Goods needed for war
- Battle to stop advances of Germans
Down
- Big vehicles combating trench warfare
- Another word for planes
- He stepped down because of revolt in Germany
- German submarine
- First war that included use of planes
- Only country/continent involved
- Improved weapon used by soldiers
- First US Marines in WWI combat
- Where most of the fighting happened
- Popular way to recruit
- Plan to win
- Land between opposing sides
- A chemical warfare
- To strongly go against
- "Big Push" battle
- Fire weapon, used in trenches
- Longest battle in WWI
- Person who offered truce to Germany
- US continent
- French plan to retake
- Who replaced men in factories
- Battle for Germans to attack and frighten French
40 Clues: Plan to win • US continent • Nations pride • Who went to war • German submarine • Words for deaths • "Big Push" battle • A chemical warfare • Russian leaving war • First aircraft used • Goods needed for war • Longest battle in WWI • French plan to retake • Popular way to recruit • To strongly go against • Another word for planes • Warfare to sink any ship • Land between opposing sides • ...
Tech Terms 2022-11-28
Across
- To copy data from one system to another
- Portable Document Format
- A storage device containing a read-write mechanism
- a way to back up your hard drive
- unique address that identifies a device on the internet or a local network
- any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit
- starting a computer system again
- short for malicious software
- instructions that enable the hardware to perform tasks
- small files including unique identifiers that web servers send to browsers
- networking device that forwards data packets between computer networks.
- An example of this is Bing or Yahoo
- a family of wired computer networking technologies
- An example of this is Firefox or Google Chrome
- A security device that monitors traffic to and from your network
Down
- Monitor or speakers
- Mouse and keyboard
- A group of bits
- Central Processing Unit, The Brains
- to start a computer system
- The physical components of a computer
- Uniform Resource Locator
- HyperText Markup Language
- the software that supports a computer's basic functions.
- a device that converts signals produced by one type of device.
- equal to around 1 million bytes
- A binary digit
27 Clues: A binary digit • A group of bits • Mouse and keyboard • Monitor or speakers • Portable Document Format • Uniform Resource Locator • HyperText Markup Language • to start a computer system • short for malicious software • equal to around 1 million bytes • a way to back up your hard drive • starting a computer system again • Central Processing Unit, The Brains • ...
Technical Concepts Crossword 2020-09-04
Across
- a computer program that modifies another computer program and executes its own code
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- Evil software
- the method by which information is converted into a secret code that hides the information
- a software application for accessing the information on the World Wide Web
- local area network
- a small amount of data sent over a network
- A connected set of networks
- A mutually agreed on the method of communication
Down
- a numeric system that only uses two digits — 0 and 1.
- software with malicious behavior that aims to gather information about a person or organization
- the programs and other operating information used by a computer.
- pretends to be one thing, usually legit software but hides malware inside
- transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
- Crawler a script that explores the web
- types of malware; ads start popping up
- an interpreted, high-level and general-purpose programming language
- Smart Messaging Service(Can use satellites, emails) also known as message
- Internet service provider
20 Clues: Evil software • local area network • Internet service provider • A connected set of networks • Crawler a script that explores the web • types of malware; ads start popping up • a small amount of data sent over a network • A mutually agreed on the method of communication • a numeric system that only uses two digits — 0 and 1. • ...
