networks Crossword Puzzles

Plague 2022-04-29

Plague crossword puzzle
Across
  1. a deadly infection spread by fleas that live on rats
  2. interconnected groups of people
  3. destructive war between France and England that lasted from 1337 to 1453
Down
  1. unsuccessful revolt by peasants against feudal lords in England in 1381
  2. epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352

5 Clues: interconnected groups of peoplea deadly infection spread by fleas that live on ratsunsuccessful revolt by peasants against feudal lords in England in 1381destructive war between France and England that lasted from 1337 to 1453epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352

FORMS OF CAPITAL 2024-11-16

FORMS OF CAPITAL crossword puzzle
Across
  1. A form of capital defined by language and communication skills students bring to college.
  2. Implicit academic and social expectations may create challenges for students.
  3. Yosso’s model for understanding cultural wealth includes this strengths-based approach.
  4. This form of cultural capital includes knowledge and behaviors shaped by social standing.
  5. A strengths-based perspective highlights this form of capital, defined as "hopes and dreams."
Down
  1. This form of capital is a formal recognition of an asset, like a degree or certification.
  2. Bourdieu's theory includes this form of cultural capital that encompasses physical objects with cultural significance.
  3. Framework focusing on students' strengths and contributions.
  4. A form of capital related to students’ social and community networks.
  5. A form of capital tied to historical legacies of social justice and community advocacy.
  6. Yosso's model includes this form of capital involving skills to navigate social institutions.

11 Clues: Framework focusing on students' strengths and contributions.A form of capital related to students’ social and community networks.Implicit academic and social expectations may create challenges for students.A form of capital tied to historical legacies of social justice and community advocacy....

Malware 2025-11-05

Malware crossword puzzle
Across
  1. A method of cracking passwords by trying every possible combination.
  2. A type of cyberattack where fake emails or websites are used to trick users into revealing private information.
  3. Malware that encrypts files and demands payment to restore access.
  4. A protective barrier that filters incoming and outgoing traffic to block unauthorized access.
  5. A type of malware that replicates and spreads without user action, often via networks.
Down
  1. A password-cracking attack that tries common words or phrases from a list.
  2. Malware that monitors and records user activity, often stealing personal data.
  3. Malware that hides itself while giving unauthorized users administrator-level access.
  4. A program that attaches to other files and spreads when the infected file is executed.
  5. A malicious program disguised as a legitimate one, used to access or damage a system.
  6. Software that displays unwanted advertisements or redirects web traffic.

11 Clues: Malware that encrypts files and demands payment to restore access.A method of cracking passwords by trying every possible combination.Software that displays unwanted advertisements or redirects web traffic.A password-cracking attack that tries common words or phrases from a list....

MESLEKI YABANCI DIL SINAVI 2022-03-26

MESLEKI YABANCI DIL SINAVI crossword puzzle
Across
  1. hardware and software used to interconnect networks, directing traffic from one network to another (LAN TO LAN or LAN TO WAN)
  2. computers are the computers those are able to serve many users for hosting simultaneously which have advanced hardware features.
  3. a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network.
  4. Hosting in the word means ―housing‖. A service that allows customers to place their own content on the public Internet's World Wide Web according to the defined domain names.
  5. it is configuration of IP manually.
  6. hardware that you insert in a computer to connect a computer to a network.
  7. it is a variant of network that certain number of computers created in a particular area.Local area Networks consist of computers, network interface cards, network cables, network traffic control devices and other periphral devices.
  8. a networking device connecting multiple wires, allowing them to communicate simultaneously, when possible. Compare to the less efficient hub device that solely duplicates network packets to each wire.
Down
  1. a hub is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network, and the Internet All users connected to a hub share the available network bandwidthports.
  2. a device used in a network to strengthen a weak signal as it is passed along the network cable because of any reason and send it back to the user.
  3. a device that encodes digital computer signals into analog/analogue telephone signals and vice versa and allows computers to communicate over a phone line
  4. is the technology that enables rapid transfer of digital information through regular telephone cables (the line is asymmetrical because the connection is faster in one direction than the other).
  5. all types of user computers that uses the web sites. They may called the computers performing out of the server.
  6. a private network inside a company or organization that uses the same kinds of software that you find on the public Internet, but which is only for internal use.
  7. dynamic Host Configuration Protocol Dynamically assigns IP addresses to client stations located on a TCP/IP network at startup, and allows the addresses to be re-used when no longer needed.
  8. wireless Local Area Network Enables fast data transmission through a wireless connection particularly suitable for organisations such as hospitals and schools as well as businesses.

16 Clues: it is configuration of IP manually.hardware that you insert in a computer to connect a computer to a network.a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network.all types of user computers that uses the web sites. They may called the computers performing out of the server....

angels crossword 2015-04-29

angels crossword crossword puzzle
Across
  1. – the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
  2. – Software program that is designed to damage files on a computer that receives it. Viruses replicate and can spread to other applications and operating system software
  3. - A bully who operates online, in cyberspace
Down
  1. – An unauthorized person who secretly gains access to computer files
  2. NETWORKS -- online communities where people meet, socialize, exchange digital files, etc.
  3. – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
  4. – a group of connected computers

7 Clues: – a group of connected computers- A bully who operates online, in cyberspace– An unauthorized person who secretly gains access to computer filesNETWORKS -- online communities where people meet, socialize, exchange digital files, etc.– the unauthorized use, reproduction, distribution, or transmission of copyrighted material....

mobile technology 2020-08-30

mobile technology crossword puzzle
Across
  1. unique number,usually fifteen digits,associated with global system for mobile communication.
  2. is the process of selecting a path for taffic in a network or between or across multiple networks.
  3. owns to trade mark wifi.
  4. provides a means of reading or interrogating the data using the tag
  5. is a technology that is used to transfer information from one program to one or more other programs.
  6. prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
  7. has an onboard power source,usually a battery,and an active transmitter.
Down
  1. A dynamic change in pont of attachment maintains the network properties is done through
  2. id a temporary ip address for a mobile node
  3. smpp cilent is termed a external short message
  4. a set of two or more interconnection piconets form

11 Clues: owns to trade mark wifi.id a temporary ip address for a mobile nodesmpp cilent is termed a external short messagea set of two or more interconnection piconets formprovides a means of reading or interrogating the data using the taghas an onboard power source,usually a battery,and an active transmitter....

mobile technology 2020-08-30

mobile technology crossword puzzle
Across
  1. unique number,usually fifteen digits,associated with global system for mobile communication.
  2. a set of two or more interconnection piconets form
  3. is a technology that is used to transfer information from one program to one or more other programs.
  4. prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
  5. is the process of selecting a path for taffic in a network or between or across multiple networks.
  6. smpp cilent is termed a external short message
Down
  1. id a temporary ip address for a mobile node
  2. provides a means of reading or interrogating the data using the tag
  3. owns to trade mark wifi.
  4. has an onboard power source,usually a battery,and an active transmitter.
  5. A dynamic change in pont of attachment maintains the network properties is done through

11 Clues: owns to trade mark wifi.id a temporary ip address for a mobile nodesmpp cilent is termed a external short messagea set of two or more interconnection piconets formprovides a means of reading or interrogating the data using the taghas an onboard power source,usually a battery,and an active transmitter....

Finance Ke Fundey 2017-12-12

Finance Ke Fundey crossword puzzle
Across
  1. Technology to host mobile voice calls on Internet Protocol
  2. Telecom entity, which will soon be merged with Bharti Airtel
  3. An Industry Association of GSM Mobile Operators in India
  4. Separate document which you can send with an e-mail message
  5. Two types are spectrum are being used for Microwave. First one is Backbone, the other is……….
Down
  1. First name of the current GSMA Chairman
  2. Using a Camera or phone lines or internet that allows individuals at two or more sites to hear and see each other
  3. Authority whose mission is to create conditions for growth of telecom in India
  4. Number 2 Telecom Player of the world (basis CMS)
  5. A network of networks of computers connected all around the world
  6. A Government program for provision of Mobile Services in Select Rural Regions of India. Provider gets subsidy for the same

11 Clues: First name of the current GSMA ChairmanNumber 2 Telecom Player of the world (basis CMS)An Industry Association of GSM Mobile Operators in IndiaTechnology to host mobile voice calls on Internet ProtocolSeparate document which you can send with an e-mail messageTelecom entity, which will soon be merged with Bharti Airtel...

Impacts of social media on mental health crossword puzzle 2023-09-01

Impacts of social media on mental health crossword puzzle crossword puzzle
Across
  1. and harassment over the Internet through an application
  2. compare their lives to other people's or celebrities, because of the photos on the account
  3. Result of constant phone notifications and information overload
  4. People spend a lot of time on social networks, thus creating isolation
  5. People who spend a lot of time on social media
Down
  1. spreading false or misleading information
  2. La información errónea sobre salud en las redes sociales se refiere a la difusión de información inexacta o engañosa
  3. people who upload photos edited by the comments of others
  4. Constant exposure to idealized images on social media can have a significant impact on people's perception of body image.
  5. This factor allows users to hide their real identity online, which often leads to disrespectful and aggressive behavior on social media.
  6. People whose life revolves around social media

11 Clues: spreading false or misleading informationPeople whose life revolves around social mediaPeople who spend a lot of time on social mediaand harassment over the Internet through an applicationpeople who upload photos edited by the comments of othersResult of constant phone notifications and information overload...

Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16

Computing Careers (Created By: HTHS Business Dept. 2022) crossword puzzle
Across
  1. _____ administrator is responsible for the creation, administration and security of computer networks.
  2. The _____ administrator is responsible for the administration and management of an organization's network.
  3. A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
  1. _____ write new programs, update and modify existing programs/software.
  2. _____ designers create webpage, build and maintain websites for an individual or an organization.
  3. The System _____ main role is to implement a new computerised system or upgrade an existing one.

6 Clues: _____ write new programs, update and modify existing programs/software.A _____ librarian keeps an organization's data files and software up-to-date and organised.The System _____ main role is to implement a new computerised system or upgrade an existing one....

DIGITAL CITIZENSHIP VOCABULARY 2021-09-03

DIGITAL CITIZENSHIP VOCABULARY crossword puzzle
Across
  1. an area on the Web where information about a particular subject, organization, etc. can be found
  2. is an electronic machine that can store and arrange large amounts of information.
  3. a short description of a person, organization, etc., giving the main details about them.
  4. connected to and shared by a system of computers, especially the internet
Down
  1. a worldwide system of computer networks used to exchange information
  2. knowledge, equipment, and methods that are used in science and industry

6 Clues: a worldwide system of computer networks used to exchange informationknowledge, equipment, and methods that are used in science and industryconnected to and shared by a system of computers, especially the internetis an electronic machine that can store and arrange large amounts of information....

mobile technology 2020-08-30

mobile technology crossword puzzle
Across
  1. unique number,usually fifteen digits,associated with global system for mobile communication.
  2. a set of two or more interconnection piconets form
  3. is a technology that is used to transfer information from one program to one or more other programs.
  4. prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
  5. is the process of selecting a path for taffic in a network or between or across multiple networks.
  6. smpp cilent is termed a external short message
Down
  1. id a temporary ip address for a mobile node
  2. provides a means of reading or interrogating the data using the tag
  3. owns to trade mark wifi.
  4. has an onboard power source,usually a battery,and an active transmitter.
  5. A dynamic change in pont of attachment maintains the network properties is done through

11 Clues: owns to trade mark wifi.id a temporary ip address for a mobile nodesmpp cilent is termed a external short messagea set of two or more interconnection piconets formprovides a means of reading or interrogating the data using the taghas an onboard power source,usually a battery,and an active transmitter....

Engineering Careers 2014-07-21

Engineering Careers crossword puzzle
Across
  1. make a real difference in the survival of our planet by finding ways of cleaning up our environment
  2. test and supervise the manufacture of lighting equipment
  3. oversee the construction of the buildings and infrastructure that make up our world
  4. ensure that complex and large scale systems operate safely and efficiently
  5. develop things that involve a mechanical process
  6. works on new technology for space travel and exploration
  7. design and implement all of the supplemental facilities necessary to the separation, processing, and transportation of oil and natural gas
  8. focuses on how to safely use and control moving water
  9. work in all stages of the design process, from conception to presentation of the finished plans
  10. optimize the overall efficiency of business and organizations
Down
  1. estimate the amount of oil or gas that can be recovered from a reservoir
  2. specialize in technology such as networks or broadband
  3. work in all forms of nuclear energy
  4. design and manufacture seacraft
  5. develop medical devices that lead to furthering of medical discoveries
  6. apply earth sciences to human problems
  7. discover new oil and gas sources and work on new technology to extract sources
  8. develop and maintain computer software

18 Clues: design and manufacture seacraftwork in all forms of nuclear energyapply earth sciences to human problemsdevelop and maintain computer softwaredevelop things that involve a mechanical processfocuses on how to safely use and control moving waterspecialize in technology such as networks or broadband...

ICT Infrastructure (Homework 2) 2024-07-29

ICT Infrastructure (Homework 2) crossword puzzle
Across
  1. is a networking device that connects different networks together and transfer data in form of IP packets
  2. it is _________ and faster to install a network under wireless technology
  3. a type of data communication
  4. another key component of ICT infrastructure
  5. software that the source code is available for free
  6. a networking device that connects devices to the internet using radio waves
Down
  1. consists of all the components that enable the use of computer technologies to support the operation of a company or institution
  2. sharing resources and data is one of the __________ for an ICT infrastructure
  3. use to transmit information in using wireless technology
  4. some applications may have malicious code embedded inside and it is an __________ with downloading and installing software
  5. another type of data communication
  6. is a type of data transmission medium
  7. high speed of operation is a ___________ of cable technology
  8. is another type of data transmission medium
  9. is a common data networking device
  10. one of the key components of an ICT/IT infrastructure
  11. cost less to install is one of the ________ behind the use of cable technology
  12. software that was developed and owned by a company and source code is not available for free

18 Clues: a type of data communicationanother type of data communicationis a common data networking deviceis a type of data transmission mediumis another type of data transmission mediumanother key component of ICT infrastructuresoftware that the source code is available for freeone of the key components of an ICT/IT infrastructure...

Davi de Jesus Duarte - 131 2021-10-24

Davi de Jesus Duarte - 131 crossword puzzle
Across
  1. Local Area Network.
  2. To send data to a remote system.
  3. Last name of the inventor of the modern computer, born in 1912.
  4. US State. Home to the World's Largest Ball of Yarn.
  5. Error or glitch.
  6. Bad internet guy. Person who can gain unauthorized access to computers or networks.
  7. To receive data from a remote system.
  8. First name of the winner of the Academy Award for Best Actor in 1996.
  9. Device used to input text to a computer.
Down
  1. Computer component which holds and allows communication between all of its parts.
  2. Piece of technology that does its job without processing numbers electronically like a computer does.
  3. Most common PC operating system.
  4. Most common connector type. Universal Serial Bus.
  5. A multiple of the unit byte. Equal to one billion bytes.
  6. An organized collection of data, generally stored and accessed electronically from a computer system.
  7. Type of storage that contains digital data. Hint: look at the sky.
  8. Family of wireless network protocols which are commonly used for internet access. It works by transmitting data by radio waves.
  9. Reference to data that the user can follow by clicking or tapping.

18 Clues: Error or glitch.Local Area Network.Most common PC operating system.To send data to a remote system.To receive data from a remote system.Device used to input text to a computer.Most common connector type. Universal Serial Bus.US State. Home to the World's Largest Ball of Yarn.A multiple of the unit byte. Equal to one billion bytes....

AP Human Geography Unit 5 Vocab 2024-02-02

AP Human Geography Unit 5 Vocab crossword puzzle
Across
  1. ____ Farming making enough to sell for a profit.
  2. is the taming of plants and animals for human use
  3. ____ Hearths are places where people first domesticated plants/animals
  4. technological innovation that is designed to improve the usefulness of plant and animals species
  5. growing the same crop each year.
  6. ____ Farming making enough for your own survival
  7. ____ Practices involve a large amount of land as well as less labor and less technology
  8. Acronym for Genetically Modified Organisms
  9. ____ Desert is an area with limited access to affordable and nutritious food.
Down
  1. ____ Commodity Chain is Interconnected networks of production, distribution, and consumption
  2. ____ Model was developed in the 19th century to explain the spatial organization of agriculture
  3. ____ Agricultural Revolution Increase in agricultural output due to the Industrial Revolution
  4. The raising of animals or the growing of crops
  5. ____ Diffusion is the spread of domesticated plants and animals
  6. ____ Revolution pesticides, fertilization, irrigation, and GMO’s to created higher agricultural yields
  7. ____ Practices involve a small amount of labor and large amount of labor
  8. ____ Revolution is the transition from nomadic hunter-gatherers to sedentary farmers
  9. good that is produced in one country and sold to another country
  10. country receives goods, services, or raw materials into their borders that have been produced or originate in another countr

19 Clues: growing the same crop each year.Acronym for Genetically Modified OrganismsThe raising of animals or the growing of crops____ Farming making enough to sell for a profit.____ Farming making enough for your own survivalis the taming of plants and animals for human use____ Diffusion is the spread of domesticated plants and animals...

Network Security 2025-03-06

Network Security crossword puzzle
Across
  1. Malicious software spreading through networks, infecting connected devices.
  2. Deceptive scheme intended to defraud or trick individuals.
Down
  1. Malicious software designed to harm, exploit, or disrupt systems.
  2. Unwanted messages, often sent in bulk, typically for advertising.

4 Clues: Deceptive scheme intended to defraud or trick individuals.Malicious software designed to harm, exploit, or disrupt systems.Unwanted messages, often sent in bulk, typically for advertising.Malicious software spreading through networks, infecting connected devices.

Year 12 ITA Revision 2012-10-07

Year 12 ITA Revision crossword puzzle
Across
  1. A global network that consists of worldwide collections of networks
  2. Connects computers together so that the can share data and resources
  3. A licence that allows multiple users within an organisation to simultaneously use a software package
Down
  1. When there is no delay between sending and receiving a response (4,4)
  2. When a user's computer is connected to a network

5 Clues: When a user's computer is connected to a networkA global network that consists of worldwide collections of networksConnects computers together so that the can share data and resourcesWhen there is no delay between sending and receiving a response (4,4)...

Cybersecurity Definitions 2024-06-16

Cybersecurity Definitions crossword puzzle
Across
  1. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  2. An attack method where a perpetrator deceives individuals into divulging confidential information.
  3. The practice of protecting systems, networks, and programs from digital attacks.
Down
  1. A program that replicates itself to spread to other computers.
  2. A person who uses computers to gain unauthorized access to data.

5 Clues: A program that replicates itself to spread to other computers.A person who uses computers to gain unauthorized access to data.The practice of protecting systems, networks, and programs from digital attacks.Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems....

Cybersecurity Notables 2021-01-17

Cybersecurity Notables crossword puzzle
Across
  1. She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
  2. This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
  3. He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
  4. He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
  5. Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
  6. He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
  7. This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
  1. She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
  2. She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
  3. As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
  4. Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
  5. Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.

12 Clues: She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period....

Assignment 6 : Activities 2015-09-30

Assignment 6 : Activities crossword puzzle
Across
  1. The standard markup language used to create web pages
  2. A legal right that grants the creator of an original work exclusive rights to its use and distribution
  3. Pictures/movies/graphics
  4. A component that stores data so future requests for that data can be served faster
  5. The objective and subjective components of the reliability of a source or message
  6. The internet is primarily this type of communication system
  7. Window's default text editor
  8. The author or creator of a work
  9. A person who falsifies data to pretend to be someone else
Down
  1. The main technology used to connect local area networks
  2. A related group of networked computers
  3. The act of making a website as fully functional and effective as possible
  4. Converts the bits a computer outputs into a form that is compatible with its internet service provider
  5. Where the course is conducted except for the final
  6. A group of information on a computer that can be software programs or data
  7. A type of search engine that builds an index of the web's content based on keywords
  8. The ease of learning how to use a human-made object
  9. A question or request for information

18 Clues: Pictures/movies/graphicsWindow's default text editorThe author or creator of a workA question or request for informationA related group of networked computersWhere the course is conducted except for the finalThe ease of learning how to use a human-made objectThe standard markup language used to create web pages...

Security Services 2025-03-18

Security Services crossword puzzle
Across
  1. An authentication protocol that encrypts only passwords but has extensive logging.
  2. An SNMP function that allows network administrators to modify device settings.
  3. A network administrator’s tool for overseeing device performance remotely.
  4. The command center in SNMP that controls network elements.
  5. A security model ensuring access control, user permissions, and activity logging.
  6. A traffic analysis technology used to monitor network performance and security.
  7. A structured storage of SNMP device statistics and performance metrics.
  8. The SNMP command used when retrieving information from a monitored device.
  9. A security mechanism that ensures encrypted, authenticated communication over IP networks.
Down
  1. A Cisco-specific protocol that encrypts entire authentication packets.
  2. A hierarchical level in a system that dictates time synchronization accuracy.
  3. A secure method for connecting to a network over an untrusted environment.
  4. The central repository where devices send messages for analysis and troubleshooting.
  5. An alert sent to an SNMP manager to signal critical events proactively.
  6. The alternative name for a technique used to duplicate and inspect network traffic.
  7. The software counterpart that collects and reports operational network data.
  8. A protocol ensuring that all network devices remain time-synchronized.
  9. A tunneling protocol enabling encapsulation of multiple network protocols.

18 Clues: The command center in SNMP that controls network elements.A Cisco-specific protocol that encrypts entire authentication packets.A protocol ensuring that all network devices remain time-synchronized.An alert sent to an SNMP manager to signal critical events proactively.A structured storage of SNMP device statistics and performance metrics....

Vocab Quiz 1 Sentences 2025-09-29

Vocab Quiz 1 Sentences crossword puzzle
Across
  1. Some older cell phones are already _________ and don’t work on the new networks.
  2. He spoke for a _________ amount of time. There was hardly any time left to work!
  3. The pattern was so _________ that you could barely tell what was happening.
  4. She was so _________ that she did it perfectly!
  5. If you _________ too many details, people won’t understand the story.
  6. They were blinded by their _________ and couldn’t see their own weakness.
  7. Some people only have _________ knowledge instead of a deep understanding.
  8. The season will _________ in a championship game.
  9. He chose to _________ the image entirely through colored ropes.
Down
  1. The flowers were blossoming _________. There were so many of them!
  2. He chose to use a _________ instead of cursing.
  3. There were too many _________ details for me to fully believe his story.
  4. I need a(n) _________ report so that I have the facts.
  5. He was so _________. He freely gave so many gifts to people.
  6. _________ can be a great obstacle to some. You need to care to succeed!
  7. The highway was lined with _________ that ruined the natural beauty.
  8. To compare them, you need to _________ them.
  9. Please make your conversation _________ so that we can save time.

18 Clues: To compare them, you need to _________ them.He chose to use a _________ instead of cursing.She was so _________ that she did it perfectly!The season will _________ in a championship game.I need a(n) _________ report so that I have the facts.He was so _________. He freely gave so many gifts to people....

Risk Interest Groups 2025-12-05

Risk Interest Groups crossword puzzle
Across
  1. Machine learning using deep neural networks with many layers. (2 Words - between words)
  2. Packaging apps and dependencies into portable, isolated containers.
  3. Controls network traffic based on security policies.
  4. Transforming plaintext into ciphertext using cryptographic keys.
  5. Model memorizes noise in training data, hurting generalization.
  6. Security Information and Event Management for log aggregation and analytics.
  7. — Security model enforcing continuous verification and least privilege
  8. AI field enabling computers to understand and generate human language. (3 Words - between words)
  9. Public Key Infrastructure that manages certificates and trust.
  10. Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
  1. Trusted entity that issues and validates digital certificates. (2 Words - between words)
  2. Single software instance serves multiple customers with isolation. (2 Words - between words)
  3. Automated coordination/management of services, containers, and workloads.
  4. Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
  5. Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
  6. Algorithm that performs encryption and decryption.
  7. Access Control List defining allowed/denied permissions.
  8. Cloud model delivering virtualized compute, storage, and networking.

18 Clues: Algorithm that performs encryption and decryption.Controls network traffic based on security policies.Access Control List defining allowed/denied permissions.Public Key Infrastructure that manages certificates and trust.Model memorizes noise in training data, hurting generalization.Transforming plaintext into ciphertext using cryptographic keys....

Today's Technologies (Module 1) 2022-01-13

Today's Technologies (Module 1) crossword puzzle
Across
  1. A pointing device that fits under the palm of your hand comfortably
  2. Small speakers that rest inside each ear canal
  3. A _______ console is designed for single-player or multiplayer video games
  4. An output device that produces text and graphics on a physical medium, such as paper
  5. A personal computer designed to be in a stationary location
  6. Software that enables users with an Internet connection
  7. Does not contain a tower and instead uses the same case to house the display and the processing circuitry
  8. Also called a notebook computer
  9. A _______ device is a small, mobile computing consumer device designed to be worn
  10. An electronic device, operating under the control of instructions stored in its own memory
Down
  1. A _______ engine is software that finds websites, webpages, images, videos
  2. Internet-capable phone
  3. A computer dedicated to providing one or more services to other computers
  4. Worldwide collection of computer networks
  5. A ______ drive is a portable flash memory storage device that you plug in a USB port
  6. An ______ device allows you to enter data
  7. A thin, lighter-weight mobile computer that has a touch screen
  8. A collection of computers and devices connected together

18 Clues: Internet-capable phoneAlso called a notebook computerWorldwide collection of computer networksAn ______ device allows you to enter dataSmall speakers that rest inside each ear canalSoftware that enables users with an Internet connectionA collection of computers and devices connected together...

COSC 100 Part 1 Assignment 6 2015-09-23

COSC 100 Part 1 Assignment 6 crossword puzzle
Across
  1. About half the word count as the control condition.
  2. The default Windows text editor.
  3. Type of communication where the sender and the receiver are active at the same time.
  4. The markup used to write HTML
  5. The codes or tags that browsers use to create web pages.
  6. A group of information on a computer that can be software programs or data.
  7. The flow of data across the Internet.
  8. Networks that are not geographically close.
  9. When computers are geographically close and can be linked by a single cable or pair of wires.
  10. The author of a work (e.g., video, audio, graphic, icon).
Down
  1. Using the "marketese" found on many commercial web sites.
  2. A person who falsifies data to pretend to be someone else.
  3. Visits sites on the Internet, discovering web pages and building its index.
  4. Pictures, movies and graphics that can be embedded in a web page.
  5. Looks up user-submitted keywords in the index and reports back with web pages containing the keywords.
  6. Type of communication where the sending and receiving occur at different times.
  7. A permanently fixed original work.
  8. place on your hard drive where data is temporarily stored.

18 Clues: The markup used to write HTMLThe default Windows text editor.A permanently fixed original work.The flow of data across the Internet.Networks that are not geographically close.About half the word count as the control condition.The codes or tags that browsers use to create web pages.Using the "marketese" found on many commercial web sites....

Richard Demetrius Hurnall 2025-05-19

Richard Demetrius Hurnall crossword puzzle
Across
  1. A cartoon character that has faces in it
  2. Laugh out loud
  3. person, especially a young man, who is perceived as independent, self-reliant, and possibly a bit of a "lone wolf".
  4. A secret mouth technique to gain a more defined jawline
  5. a wireless technology that allows devices to connect and exchange data over short distances using radio waves
  6. a person's "cool" or "it" factor, often used to describe someone's confidence, charisma, and stylishness.
  7. The notional environment in which communication over computer networks occurs
  8. Online experience to make it feel like the game is real
  9. If you know you know
Down
  1. Looking better then someone
  2. the programs and other operating information used by a computer.
  3. Universal serial bus
  4. A social media influencer and ex gangster, made famous for his human pig hybrid appearance.
  5. Main antagonist whom is a notorious hitman responsible for the high-profile murder of John Pork, a popular vlogger, and gang member.
  6. the machines, wiring, and other physical components of a computer or other electronic system.
  7. n intergalactic alien warlord and conqueror, a Chimera Sui Generis who serves as Ben's archenemy, and the main antagonist of the franchise Ben 10
  8. Away from keyboard
  9. In real life

18 Clues: In real lifeLaugh out loudAway from keyboardUniversal serial busIf you know you knowLooking better then someoneA cartoon character that has faces in itA secret mouth technique to gain a more defined jawlineOnline experience to make it feel like the game is realthe programs and other operating information used by a computer....

describing technical functions and applications 2025-09-23

describing technical functions and applications crossword puzzle
Across
  1. : The base-2 number system used by computers, consisting of just zeros and ones.
  2. : The component of a computer that performs the main calculations.
  3. Clues
  4. : A set of rules or instructions for solving a problem or performing a task.
  5. : The physical parts of a computer or electronic system.
  6. : The set of instructions and data that tells a computer what to do.
  7. Clues
  8. : A device that detects and responds to some type of input from the physical environment.
  9. : A single point in a graphical image on a digital display.
  10. : An organized collection of structured information.
Down
  1. : A closed loop through which an electric current can flow.
  2. : The process of writing instructions for a computer to execute.
  3. : The practice of protecting systems and networks from digital threats.
  4. : A small piece of semiconducting material on which an integrated circuit is imprinted.
  5. : An object placed in orbit to transmit and receive signals, used for communication or GPS.
  6. : The point where a user and a computer system interact.
  7. : A type of signal that is continuous and represented by a physical quantity.
  8. : The engineering field that deals with the design and operation of mechanical machines.
  9. : A deviation from what is standard, normal, or expected.

19 Clues: CluesClues: An organized collection of structured information.: The point where a user and a computer system interact.: The physical parts of a computer or electronic system.: A deviation from what is standard, normal, or expected.: A closed loop through which an electric current can flow.: A single point in a graphical image on a digital display....

Charter Communications-Fun Day Trivia 2018-01-05

Charter Communications-Fun Day Trivia crossword puzzle
Across
  1. Which team handles repayment agreements for medical deductions(________ Benefits)
  2. Philo Farnsworth battled with ________Zworykin to be called the "father of television."
  3. Charter, Time Warner Cable and _________ house networks combined in 2016.
  4. How many business units do we service?
  5. If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
  6. One of our key necessities is expanding access to ___________. This is a necessity to compete.
Down
  1. Charter Partnered with___________ Channel to connect veterans with their communities.
  2. The Second Largest Cable Provider in the U.S.
  3. Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
  4. The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
  5. If I am out on workman’s compensation, my updates are completed by the _________ team.

11 Clues: How many business units do we service?The Second Largest Cable Provider in the U.S.Charter, Time Warner Cable and _________ house networks combined in 2016.Which team handles repayment agreements for medical deductions(________ Benefits)Charter Partnered with___________ Channel to connect veterans with their communities....

Software 2014-10-07

Software crossword puzzle
Across
  1. an interface through which a user interacts with electronic devices such as computers.
  2. software that manages computer hardware and software resources.
  3. user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line.
  4. a network security system that controls the incoming and outgoing network traffic.
  5. a system, tool, or technical process that is developed by and for a specific business entity.
Down
  1. a computer program written specifically for your company.
  2. a software utility that rearranges the fragments.
  3. everything designed into an information device with which a human being may interact.
  4. the protection of personal hardware programs networks and data.
  5. program in which the source code is available to the general public.
  6. A program that performs a very specific task.

11 Clues: A program that performs a very specific task.a software utility that rearranges the fragments.a computer program written specifically for your company.the protection of personal hardware programs networks and data.software that manages computer hardware and software resources.program in which the source code is available to the general public....

Find the words! 2020-05-30

Find the words! crossword puzzle
Across
  1. Soon we will be able to upload ourselves to a ______ environment
  2. The advancements of _________ has made the biggest impact on how we live our day to day life in the last century
  3. ____ has high expectations in business areas such as logistics distribution, military and food safety due to its
  4. recognition rate, contactless recognition media, reach, connectivity with other networks and scalability of
  5. These days, cell phones have iris recognition ______
Down
  1. __________ helps us complete complicated tasks quickly
  2. Soon labors will become significantly more redundant due to _________(-ically/+ed) machinery
  3. Due to the recent pandemic the governments ________d a plethora of necessary products such as masks or other hygiene products to the civilians
  4. Do not forget to ________ in order to receive your promotion
  5. The ______ of technology is in vogue these days
  6. Tesla is currently the fastest growing eco friendly ____-______ car company

11 Clues: The ______ of technology is in vogue these daysThese days, cell phones have iris recognition ________________ helps us complete complicated tasks quicklyDo not forget to ________ in order to receive your promotionSoon we will be able to upload ourselves to a ______ environment...

Robot Vocab 2023-03-17

Robot Vocab crossword puzzle
Across
  1. learning machines notice patterns and learn from them to become more intelligent
  2. loop compares an actual variable with a desirable variable and adjusts the system accordingly
  3. system knowledge that is collected from experts and stored into a database
  4. intelligence The science of making machines do things that would require intelligence if done by men
  5. test a test for intelligence in a computer or robot to answer the question “Can machines think?”
  6. networks essentially a machine that processes information and learns from its experiences
Down
  1. making decisions and solving problems using common sense
  2. learning learning unsupervised from data that is unstructured or unlabeled
  3. analysis a method that allows you to examine the relationship between two or more variables of interest
  4. a set of rules designed to solve a problem
  5. valley feeling of revulsion humans get when presented with a robot

11 Clues: a set of rules designed to solve a problemmaking decisions and solving problems using common sensevalley feeling of revulsion humans get when presented with a robotlearning learning unsupervised from data that is unstructured or unlabeledsystem knowledge that is collected from experts and stored into a database...

Basic Computer Vocabulary 2021-01-20

Basic Computer Vocabulary crossword puzzle
Across
  1. the process of assigning a code to something for classification or identification
  2. The physical components of my computer or device
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  4. copy (data) from one computer system to another, typically over the internet.
Down
  1. The programs and other operating information used by a computer
  2. the address of a web page.
  3. a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.

7 Clues: the address of a web page.The physical components of my computer or deviceThe programs and other operating information used by a computercopy (data) from one computer system to another, typically over the internet.the process of assigning a code to something for classification or identification...

test1 2024-03-01

test1 crossword puzzle
Across
  1. Annat ord för behov
  2. Berättelse
Down
  1. Flera om jobbar tillsammans

3 Clues: BerättelseAnnat ord för behovFlera om jobbar tillsammans

Unit 32 How networks can be attacked 2013-11-28

Unit 32 How networks can be attacked crossword puzzle
Across
  1. Programs that are masked as a real program, but instead inflicts, harm or damage your computer
  2. Is a software that gathers information about a person or organisation without their knowledge
  3. Is a type of malicious software that is activated each time your system boots up
  4. It attempts to make a user or organisation lose its services
  5. Usually these are statistical analyses that attempt to discover keys
Down
  1. They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
  2. Know as malicious software
  3. Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
  4. Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
  5. Is a method where any virus such Trojan, Malware can get through all security procedures
  6. Also known for advertising supported software

11 Clues: Know as malicious softwareAlso known for advertising supported softwareIt attempts to make a user or organisation lose its servicesUsually these are statistical analyses that attempt to discover keysIs a type of malicious software that is activated each time your system boots up...

e-cell-weekly-newsletter-2 2022-01-02

e-cell-weekly-newsletter-2 crossword puzzle
Across
  1. I'm the last one to be added into the unicorns from India in 2021
  2. I'm the co-founder of one of the crypto networks that brings massive scale to Ethereum using Plasma and PoS based side-chain
  3. I am India's first and largest chain of backpackers' hostel in India
Down
  1. World's largest crypto exchange platform
  2. Only startup from IIT BHU Alumni to make it to the Nasdaq-100 Index
  3. I occur when a buyer purchases more than half of a firm.
  4. My IPO buyers were the most unhappy when I was listed on the stock exchange.

7 Clues: World's largest crypto exchange platformI occur when a buyer purchases more than half of a firm.I'm the last one to be added into the unicorns from India in 2021Only startup from IIT BHU Alumni to make it to the Nasdaq-100 IndexI am India's first and largest chain of backpackers' hostel in India...

Romance scam 2024-02-16

Romance scam crossword puzzle
Across
  1. The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
  2. A person engaged in fraudulent activities, such as scams or deceit.
  3. The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
  4. To identify or discover something, often used in the context of finding fraudulent activities.
Down
  1. To stop something from happening, in this case, stopping romance scams before they occur.
  2. The act of intentionally misleading or tricking someone.
  3. Malicious software designed to harm or exploit computer systems.

7 Clues: The act of intentionally misleading or tricking someone.Malicious software designed to harm or exploit computer systems.A person engaged in fraudulent activities, such as scams or deceit.To stop something from happening, in this case, stopping romance scams before they occur....

Vocational Variety 2016-09-14

Vocational Variety crossword puzzle
Across
  1. a program that enables a user to view and move among websites
  2. a filmmaking technique that utilizes only natural light & sound
  3. a single file in a collection of files that make a web page
  4. a savoury, open-faced pastry crust with a filling of cheese, meat, seafood or vegetables.
  5. retailer selling through conventional and online
  6. a baked egg-based dish which originated in early eighteenth century France.
  7. a device that breaks solid materials into smaller pieces by grinding, crushing, or cutting
  8. the global network of computers
  9. The name of an HTML tag
  10. A large deciduous tree in the mint family having hard, heavy, durable yellowish .
Down
  1. A characteristic applied to an HTML tag
  2. a set of rules that determine how data is transmitted on a network
  3. a filmmaking technique utilizing harsh contrasts & shadows
  4. an element such as a form, image or video file on a web page
  5. Retailers who sell primarily through the internet
  6. a boneless cut or slice of meat or fish,
  7. a computer networking device joining two or more networks
  8. A machine for shaping a piece of material, such as wood or metal, by rotating it

18 Clues: The name of an HTML tagthe global network of computersA characteristic applied to an HTML taga boneless cut or slice of meat or fish,retailer selling through conventional and onlineRetailers who sell primarily through the interneta computer networking device joining two or more networksa filmmaking technique utilizing harsh contrasts & shadows...

Chapter 10 & 11 Key Terms 2022-02-08

Chapter 10 & 11 Key Terms crossword puzzle
Across
  1. muscle that compresses the cheek
  2. muscle-forming stem cell
  3. to the outside
  4. bundle of muscle fibers within a skeletal muscle
  5. striated muscle found in the heart; joined to one another at intercalated discs and under the regulation of pacemaker cells, which contract as one unit to pump blood through the circulatory system. Cardiac muscle is under involuntary control.
  6. protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
  7. moves the bone toward the midline
  8. muscle whose contraction is responsible for producing a particular motion
  9. formation of blood capillary networks
  10. muscle that increases the angle at the joint
  11. swallowing
Down
  1. muscle that adducts the thigh and flexes the leg at the knee
  2. regulatory protein that facilitates contraction in smooth muscles
  3. muscle that, along with the psoas major, makes up the iliopsoas
  4. broad, tendon-like sheet of connective tissue that attaches a skeletal muscle to another skeletal muscle or to a bone
  5. skeletal muscle that separates the thoracic and abdominal cavities and is dome-shaped at rest
  6. replacement of muscle fibers by scar tissue
  7. fascicles that extend over a broad area and converge on a common attachment site

18 Clues: swallowingto the outsidemuscle-forming stem cellmuscle that compresses the cheekmoves the bone toward the midlineformation of blood capillary networksreplacement of muscle fibers by scar tissuemuscle that increases the angle at the jointbundle of muscle fibers within a skeletal musclemuscle that adducts the thigh and flexes the leg at the knee...

11.5 Testout Crossword 2023-03-28

11.5 Testout Crossword crossword puzzle
Across
  1. Local area network.
  2. Passphrase a user enters to access the wireless network.
  3. Standard for local area networks created by The IEEE-SA.
  4. Wide area network.
  5. Technique used by hackers to gain access to a target's computer or online accounts.
  6. Sequence of characters that identify a WIFI network.
  7. The conversion of data from a readable format into an encoded format.
  8. Allows a device to securely connect to a wireless network without entering the PSK.
Down
  1. Combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
  2. Transmission without the use of wires or cables.
  3. When a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
  4. Telephone interface that uses a cable of twisted wire pairs.
  5. Password or identification process.
  6. Cable consisting of an inner conductor surrounded by a concentric conducting shielding.
  7. Was developed by Cisco to address security concerns in RADIUS.
  8. Increases bandwidth by using multiple antennas for both the transmitter and receiver.
  9. Developed at MIT and is a key component of Windows Active Directory.
  10. Standardized physical network interface connecting data equipment.

18 Clues: Wide area network.Local area network.Password or identification process.Transmission without the use of wires or cables.Sequence of characters that identify a WIFI network.Passphrase a user enters to access the wireless network.Standard for local area networks created by The IEEE-SA.Telephone interface that uses a cable of twisted wire pairs....

1.3 Network Connections and Protocols 2025-03-19

1.3 Network Connections and Protocols crossword puzzle
Across
  1. A wireless method for connecting devices to a network
  2. A global network connecting millions of devices worldwide
  3. A device that requests information from a server
  4. A device which provides data or services to other devices
  5. Online storage and computing services accessed via the internet
  6. A network that spans a large geographical area, such as the internet(acronym)
  7. The maximum amount of data that can be transmitted across a network
  8. A network layout where all devices connect to a central point
  9. A device that forwards data between networks
  10. A network layout where each devices connects directly to multiple others
Down
  1. A device which directs data only to the intended recipient
  2. A type of network that connects computers in a small area, like a school or office(acronym)
  3. The system that translates domain names into IP addresses(acronym)
  4. The arrangement or layout of devices in a network
  5. A computer in a network that can act as both client and server
  6. A wired networking technology commonly used in LANS
  7. A short-range wireless communication technology
  8. A high-speed internet connection that transmits large amounts of data

18 Clues: A device that forwards data between networksA short-range wireless communication technologyA device that requests information from a serverThe arrangement or layout of devices in a networkA wired networking technology commonly used in LANSA wireless method for connecting devices to a networkA global network connecting millions of devices worldwide...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

Cybersecurity 2024-02-15

Cybersecurity crossword puzzle
Across
  1. A technique used to trick individuals into revealing sensitive information
  2. The process of protecting computer systems, networks, and data from theft or damage
  3. A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
  1. The practice of verifying the identity of a user or system before granting access
  2. A program or device used to detect and prevent unauthorized access to a computer or network
  3. A secret code used to gain access to a computer system, network, or account
  4. A malicious program that self-replicates and spreads to other computers

7 Clues: A malicious program that self-replicates and spreads to other computersA technique used to trick individuals into revealing sensitive informationA secret code used to gain access to a computer system, network, or accountThe practice of verifying the identity of a user or system before granting access...

Internet history 2022-11-10

Internet history crossword puzzle
Across
  1. the order in which a series of things appears
  2. to start an activity, especially an organized one
  3. to understand something or somebody wrongly
  4. a website where an individual person, or people representing an organization, write regularly about recent events or topics that interest them, usually with photos and links to other websites that they find interesting
Down
  1. to represent
  2. an international computer network connecting other networks and computers that allows people to share information around the world
  3. software such as a virus specifically designed to damage or gain access to a computer system without the user knowing

7 Clues: to representto understand something or somebody wronglythe order in which a series of things appearsto start an activity, especially an organized onesoftware such as a virus specifically designed to damage or gain access to a computer system without the user knowing...

network 2024-01-14

network crossword puzzle
Across
  1. determines the best path though the network
  2. represents data to te use, plus encoding and dialog control
Down
  1. control the hardware devices and media that make up the network
  2. supports communication between various devices across diverse networks

4 Clues: determines the best path though the networkrepresents data to te use, plus encoding and dialog controlcontrol the hardware devices and media that make up the networksupports communication between various devices across diverse networks

Exploratory Art: Cumulative Exam Review (#1-19) 2021-05-12

Exploratory Art: Cumulative Exam Review (#1-19) crossword puzzle
Across
  1. a device that creates the illusion of movement and was the forerunner to the modern projector.
  2. provided instant communication and information to a massive audience for the first time.
  3. creates animation using live footage as guides.
  4. an application of commercial photography to communicate or establish trends.
Down
  1. self-contained, self-sustained explosions, fires, flames, and fireworks used in live performances, film, and other forms of entertainment.
  2. a recording of a motion picture, or television program for playing through a television.
  3. transparent sheets of film on which objects are drawn or painted for traditional hand drawn animation.
  4. a standard communications protocol used to connect computer networks around the world.
  5. a visual series of rough drawings depicting the scenes of action in a story.
  6. transferring two dimensional images onto a screen for viewing.

10 Clues: creates animation using live footage as guides.transferring two dimensional images onto a screen for viewing.a visual series of rough drawings depicting the scenes of action in a story.an application of commercial photography to communicate or establish trends.a standard communications protocol used to connect computer networks around the world....

Globalization 2022-11-04

Globalization crossword puzzle
Across
  1. Money received, especially on a regular basis, for work or through investments.
  2. Difference in size, degree, circumstances
  3. The process by which businesses or other organizations develop international influence or start operating on an international scale.
  4. The action of buying and selling goods and services.
Down
  1. A friend, or a person who works for someone in authority, especially one who is willing to give and receive dishonest help.
  2. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  3. Taking place or progressing slowly or by degrees.
  4. A society or association formed by people with a common interest or purpose.
  5. A state or society governed by the wealthy.
  6. The transfer of a business, industry, or service from public to private ownership and control

10 Clues: Difference in size, degree, circumstancesA state or society governed by the wealthy.Taking place or progressing slowly or by degrees.The action of buying and selling goods and services.A society or association formed by people with a common interest or purpose.Money received, especially on a regular basis, for work or through investments....

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06

community-based  mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. Crisis Assistance Helping Out On The Streets Acronym
  2. What region was identified in step one of the asset collection method?
  3. key asset component
  4. Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
Down
  1. What is Bill 178?
  2. Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
  3. Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
  4. Declared anti-Black Racism as a public health crisis
  5. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
  6. What is our asset organization's acronym?

10 Clues: What is Bill 178?key asset componentWhat is our asset organization's acronym?Crisis Assistance Helping Out On The Streets AcronymDeclared anti-Black Racism as a public health crisisWhat region was identified in step one of the asset collection method?...

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06

community-based  mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
  2. Crisis Assistance Helping Out On The Streets Acronym
  3. Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
  4. Key asset component
  5. What is our asset organization's acronym?
Down
  1. What region was identified in step one of the asset collection method?
  2. What is Bill 178?
  3. Declared anti-Black Racism as a public health crisis
  4. Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
  5. Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)

10 Clues: What is Bill 178?Key asset componentWhat is our asset organization's acronym?Declared anti-Black Racism as a public health crisisCrisis Assistance Helping Out On The Streets AcronymWhat region was identified in step one of the asset collection method?...

Networking Puzzle 2016-04-26

Networking Puzzle crossword puzzle
Across
  1. I am a small network that interconnects computers within a limited area such as a residence, school,lab etc
  2. I am address assigned to each device (e.g., computer, printer) participating in a computer network
  3. I am a group of two or more computer systems linked togetherIP.
  4. Term used to send audio and/or video content to everyone in the network
Down
  1. I am used to regenerate or replicate a signal.
  2. is communication between a single sender and a single receiver over a network
  3. I serve as a central connection for all of your network equipment but i am not intelligent
  4. I span over a relatively large geographical typically consists of two or more local-area networks (LANs).
  5. I am also called physical address/hardware address
  6. I perform the "traffic directing" functions on the Internet

10 Clues: I am used to regenerate or replicate a signal.I am also called physical address/hardware addressI perform the "traffic directing" functions on the InternetI am a group of two or more computer systems linked togetherIP.Term used to send audio and/or video content to everyone in the network...

Loy Krathong 2023-11-22

Loy Krathong crossword puzzle
Across
  1. the round object that moves around the earth and shines at night by light reflected from the sun
  2. a natural flow of water that continues in a long line across land to the sea
  3. round stick of wax with that is lit to give light as it burns
  4. the natural world in which people, animals and plants live
  5. tropical plant with white or pink flowers that grows on the surface of lakes
  6. physical or mental pain
Down
  1. computer network connecting other networks and computers that allows people to share information around the world
  2. scientific knowledge used in practical ways in industry
  3. material that is produced by chemical processes and can be formed into shapes
  4. all the plants, animals and things that exist in the universe that are not made by people

10 Clues: physical or mental painscientific knowledge used in practical ways in industrythe natural world in which people, animals and plants liveround stick of wax with that is lit to give light as it burnsa natural flow of water that continues in a long line across land to the seatropical plant with white or pink flowers that grows on the surface of lakes...

Special Technical ICT Definitions 2024-03-10

Special Technical ICT Definitions crossword puzzle
Across
  1. The method by which information is converted into secret code that hides the information's true meaning.
  2. A list of records linked together using special cryptographic operations across a distributed network of computers⁵.
  3. A set of rules to be followed in calculations or other problem-solving operations.
  4. A network security system that monitors and controls incoming and outgoing network traffic.
  5. Records of events that happen in an operating system or other software.
Down
  1. The maximum rate of data transfer across a given path.
  2. A hardware or software component that stores data so future requests for that data can be served faster.
  3. An identification string that defines a realm of administrative autonomy, authority or control within the internet.
  4. The loss of signal strength in networking cables or connections⁵.
  5. A device that forwards data packets along networks.

10 Clues: A device that forwards data packets along networks.The maximum rate of data transfer across a given path.The loss of signal strength in networking cables or connections⁵.Records of events that happen in an operating system or other software.A set of rules to be followed in calculations or other problem-solving operations....

5G Pillars 2024-11-26

5G Pillars crossword puzzle
Across
  1. What feature helps to conserve battery life by managing power usage in devices?
  2. What high-frequency waves are used in 5G to enable ultra-fast data speeds?
  3. What network component must be upgraded to handle the large volume of traffic generated by small cells?
  4. What is improved in 5G to enhance spectral efficiency, energy efficiency, and latency?
  5. What concept allows the sharing of wireless infrastructure among multiple network operators?
Down
  1. What technique is used to allow efficient utilization of available frequency bands?
  2. What is densely deployed to improve coverage and handle massive traffic indoors and outdoors?
  3. What is allocated to 5G to support higher data capacities and better coverage?
  4. What type of communication focuses on machine-to-machine interactions?
  5. What term refers to networks that can configure, optimize, and repair themselves automatically?

10 Clues: What type of communication focuses on machine-to-machine interactions?What high-frequency waves are used in 5G to enable ultra-fast data speeds?What is allocated to 5G to support higher data capacities and better coverage?What feature helps to conserve battery life by managing power usage in devices?...

Fun Friday 2024-04-28

Fun Friday crossword puzzle
Across
  1. A device that directs data packets between computer networks.
  2. The measure of data transfer rate over a network.
  3. A device that modulates and demodulates analog signals for transmitting digital data over communication lines.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. The process of encoding data to make it unreadable without the proper decryption key.
Down
  1. Software used to access and view websites on the internet.
  2. A set of rules governing the exchange of data between devices on a network.
  3. A virtual private network that creates a secure connection over the internet, often used for remote access to a private network.
  4. A standard system for connecting computers to a local area network (LAN).
  5. Software designed to disrupt, damage, or gain unauthorized access to computer systems.

10 Clues: The measure of data transfer rate over a network.Software used to access and view websites on the internet.A device that directs data packets between computer networks.A standard system for connecting computers to a local area network (LAN).A set of rules governing the exchange of data between devices on a network....

Technology Glossary 2 2025-03-01

Technology Glossary 2 crossword puzzle
Across
  1. A request for data or information from a database.
  2. A sequence of instructions that is continually repeated until a certain condition is reached.
  3. A programming language commonly used to create interactive effects within web browsers.
  4. A device that forwards data packets between computer networks.
  5. learning A field of artificial intelligence that uses statistical techniques to give computers the ability to learn from data.
  6. A word or concept of great significance in programming and searching.
Down
  1. A group of interconnected computers that can communicate with each other.
  2. programming A programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
  3. The process of designing and building an executable computer program to accomplish a specific computing task.
  4. The programs and other operating information used by a computer.

10 Clues: A request for data or information from a database.A device that forwards data packets between computer networks.The programs and other operating information used by a computer.A word or concept of great significance in programming and searching.A group of interconnected computers that can communicate with each other....

Unit 2 Crossword 2024-12-29

Unit 2 Crossword crossword puzzle
Across
  1. Luxury item that was a major trade good on the Silk Road.
  2. Chinese innovation that spread to Europe, transforming military power.
  3. Disease that spread through increased trade, significantly reducing global populations.
  4. A key Silk Road city known for thriving markets and Islamic scholarship.
  5. Religion that spread from India to East Asia via the Silk Road, leading to syncretic forms like Zen Buddhism.
  6. A trading city located at the convergence of major Silk Road routes.
Down
  1. Rest-stops along the Silk Road that provided safety and cultural exchange.
  2. Muslim scholar who traveled extensively through Islamic regions and documented his experiences.
  3. East African civilization that combined Bantu culture with Arabic influences through Islamic trade networks.
  4. A type of rice from Vietnam that led to significant population growth in China.

10 Clues: Luxury item that was a major trade good on the Silk Road.A trading city located at the convergence of major Silk Road routes.Chinese innovation that spread to Europe, transforming military power.A key Silk Road city known for thriving markets and Islamic scholarship.Rest-stops along the Silk Road that provided safety and cultural exchange....

CYBER-BULLYING 2024-07-25

CYBER-BULLYING crossword puzzle
Across
  1. - staying safe online from bullies and hackers
  2. - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. - careful investigation into a crime or mystery
  4. - a witness of the bullying
Down
  1. - an electronic communications network that connects computer networks and organizational computer facilities around the world
  2. - bullying but online
  3. - a secret word or phrase that must be used to gain admission to a place.
  4. - Someone who stands up to the bullies
  5. - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. - the address of a unique resource on the internet

10 Clues: - bullying but online- a witness of the bullying- Someone who stands up to the bullies- staying safe online from bullies and hackers- careful investigation into a crime or mystery- the address of a unique resource on the internet- a secret word or phrase that must be used to gain admission to a place....

Industrial Revolution 2025-11-20

Industrial Revolution crossword puzzle
Across
  1. people in the middle of the social hierarchy
  2. uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
  3. the process of making an area more urban
  4. the process of supplying a military force with modern weapons and vehicles
  5. social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
  6. people who earn wages through labor
  7. a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
  1. the process of making something conform to a standard
  2. system of interconnected routes and relationships that facilitate between different regions and ethnicity
  3. the measure of efficiency of production of goods or services

10 Clues: people who earn wages through laborthe process of making an area more urbanpeople in the middle of the social hierarchythe process of making something conform to a standardthe measure of efficiency of production of goods or servicesthe process of supplying a military force with modern weapons and vehicles...

Navigating the Web of Cyber Law 2025-06-05

Navigating the Web of Cyber Law crossword puzzle
Across
  1. A violation of privacy where an individual's data is exposed or stolen.
  2. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
  3. A legal framework that governs the use of electronic signatures in contracts.
  4. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
  5. The unauthorized copying or distribution of software or digital content.
Down
  1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
  2. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  3. A method of writing in code so that only authorized parties can access it.
  4. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
  5. The unlawful act of accessing a computer system without authorization.

10 Clues: The unlawful act of accessing a computer system without authorization.A violation of privacy where an individual's data is exposed or stolen.The unauthorized copying or distribution of software or digital content.A method of writing in code so that only authorized parties can access it....

DS 2025-09-26

DS crossword puzzle
Across
  1. What's the term for a piece of evidence or information that helps solve a mystery?
  2. What term describes a step-by-step procedure for solving problems in computer science?
  3. What word describes an elaborately planned theft by a skilled criminal team?
  4. What metric measures the proportion of correct predictions among total cases examined in classification?
  5. Which versatile programming language, named after a snake, is used in web dev, data analysis, and AI?
  6. What acronym represents a technique to reduce dataset dimensionality while preserving information?
Down
  1. Which ML subset is inspired by the human brain, using neural networks?
  2. In machine learning evaluation, what three-letter acronym represents a graphical plot illustrating a classifier’s performance across various thresholds?
  3. a.k.a
  4. What term describes the money or items demanded by criminals to release victims?

10 Clues: a.k.aWhich ML subset is inspired by the human brain, using neural networks?What word describes an elaborately planned theft by a skilled criminal team?What term describes the money or items demanded by criminals to release victims?What's the term for a piece of evidence or information that helps solve a mystery?...

cyber puzzle 2024-11-15

cyber puzzle crossword puzzle
Across
  1. This word maintain the accuracy and trustworthinessof data over its entire lifecycle
  2. Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
  3. Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
  1. This word ensures that information and resources are accessible to authorized users when needed.
  2. This word ensures that sensitive information is only accessible to authorized individuals.
  3. The state of being protected from danger, theft, or unauthorized use of resources.
  4. A term used to describe anything related to computers, networks, or the internet.

7 Clues: A term used to describe anything related to computers, networks, or the internet.The state of being protected from danger, theft, or unauthorized use of resources.This word maintain the accuracy and trustworthinessof data over its entire lifecycleMeasures or systems designed to protect against threats, damage, or unauthorized access....

Information 2013-04-09

Information crossword puzzle
Across
  1. an organization that publishes a newspaper in the USA (three words)
  2. the institution, system, or practice of forbidding information
  3. an organization that publishes a newspaper (two words)
  4. a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising (two words)
Down
  1. any of the means of communication, as television or newspapers, that reach very large numbers of people (two words)
  2. a statement prepared and distributed to the press by Amway (two words)
  3. a vast computer network linking smaller computer networks worldwide

7 Clues: an organization that publishes a newspaper (two words)the institution, system, or practice of forbidding informationan organization that publishes a newspaper in the USA (three words)a vast computer network linking smaller computer networks worldwidea statement prepared and distributed to the press by Amway (two words)...

FIBER OPTICS 2015-03-11

FIBER OPTICS crossword puzzle
Across
  1. In this type of network the peers are computer systems which are connected to each other via the Internet.
  2. FTTB stands for......................
  3. FTTC stands for....................
  4. This technology can increase the capacity of the existing networks without the need for new cable installation, and it uses laser beams and fiber optic media to work.
Down
  1. This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH.
  2. FTTH stands for.......................
  3. Fiber optics is a technology that uses...........or plastic threads to transmit data.

7 Clues: FTTC stands for....................FTTB stands for......................FTTH stands for.......................Fiber optics is a technology that uses...........or plastic threads to transmit data.This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH....

Smart System 2021-06-30

Smart System crossword puzzle
Across
  1. Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
  2. Application that involves wireless sensor and RFID technology,
  3. Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
  1. A maintenance technique that estimates when maintenance should be performed
  2. Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
  3. A sensor that detects movement sensor that detects
  4. Smart system application that reduces global emission

7 Clues: A sensor that detects movement sensor that detectsSmart system application that reduces global emissionApplication that involves wireless sensor and RFID technology,A maintenance technique that estimates when maintenance should be performed...

"WHAT'S IS THE HIDDEN WORDS?" 2023-11-26

"WHAT'S IS THE HIDDEN WORDS?" crossword puzzle
Across
  1. to use machines and computers instead of people to do a job or task.
  2. make changes i something established, especially by introducing new methods, ideas or product.
  3. a portable computer that can work with a battery.
  4. an international computer network connecting other networks and computers that allows people to share information around the world
Down
  1. a person who is enthusiastic about advanced equipments or devices.
  2. a formal discussion on a particular topic in a public meeting or legislative assembly, in which opposing arguments are put forward.
  3. an often small mechanical or electronic device which does something useful.

7 Clues: a portable computer that can work with a battery.a person who is enthusiastic about advanced equipments or devices.to use machines and computers instead of people to do a job or task.an often small mechanical or electronic device which does something useful....

Network Security 2023-06-05

Network Security crossword puzzle
Across
  1. A method used to encode data during storage or transmission (10)
  2. It refers to the right of individuals to determine what information is stored about them and how that information will be used.
  3. The unauthorised accessing of a computer system.
Down
  1. A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
  2. A small piece of software that uses computer networks and security holes to replicate itself. (5)
  3. A type of software used to protect computer systems from viruses.
  4. Another name for electronic junk mail.

7 Clues: Another name for electronic junk mail.The unauthorised accessing of a computer system.A method used to encode data during storage or transmission (10)A type of software used to protect computer systems from viruses.A small piece of software that uses computer networks and security holes to replicate itself. (5)...

MALWARE 2025-04-09

MALWARE crossword puzzle
Across
  1. - Software that automatically displays or downloads advertising material when online.
  2. - A stealthy malware that hides its presence and gives attackers control over a system.
  3. - A self-replicating malware that spreads through networks without user interaction.
  4. - Software that secretly monitors user activity and sends the data to a third party.
Down
  1. - A tool used to record every keystroke typed on a keyboard, often to steal passwords.
  2. - A malicious program that attaches to files and spreads when the file is opened.
  3. - Malware disguised as a harmless file or program to trick users into installing it.

7 Clues: - A malicious program that attaches to files and spreads when the file is opened.- Malware disguised as a harmless file or program to trick users into installing it.- A self-replicating malware that spreads through networks without user interaction.- Software that secretly monitors user activity and sends the data to a third party....

Lesson 7 year 11 crossword 2024-11-04

Lesson 7 year 11 crossword crossword puzzle
Across
  1. A network that connects computers within a small geographical area, such as a building or office.
  2. processor of a computer
  3. A private network that allows authorized external users to access certain parts of an organization's internal system.
Down
  1. The process of double-checking data to ensure its correctness, often through manual review or automated tools.
  2. A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs).
  3. A network that covers large geographical areas, often connecting multiple LANs, typically using third-party providers.
  4. memory of a computer

7 Clues: memory of a computerprocessor of a computerA network that connects computers within a small geographical area, such as a building or office.A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs)....

NSS Chapter 2C 2023-01-09

NSS Chapter 2C crossword puzzle
Across
  1. Amount of time, including delays, for data to travel from one given point to another
  2. The measure of usable data transferred over a given period of time (Goodput = Throughput - traffic overhead)
  3. Braided or foil shield provides EMI/RFI protection
  4. capacity at which a medium can carry data.
Down
  1. the most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
  2. The measure of the transfer of bits across the media over a given period of time
  3. how the bit values, “1” and “0” are represented on the physical medium.
  4. Twisted pairs protect the signal from interference.

8 Clues: capacity at which a medium can carry data.Braided or foil shield provides EMI/RFI protectionTwisted pairs protect the signal from interference.how the bit values, “1” and “0” are represented on the physical medium.The measure of the transfer of bits across the media over a given period of time...

asd 2023-04-21

asd crossword puzzle
Across
  1. a type of software that allows you to find and view websites on the Internet
  2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. a technological process for telling a computer which tasks to perform in order to solve problems
  4. a worldwide system of computer networks
Down
  1. a group of related hardware units or programs or both, especially when dedicated to a single application
  2. a program designed to detect and remove viruses and other kinds of malicious software from your computer
  3. a coding error in a computer program
  4. the action or practice of playing video games

8 Clues: a coding error in a computer programa worldwide system of computer networksthe action or practice of playing video gamesa type of software that allows you to find and view websites on the Interneta technological process for telling a computer which tasks to perform in order to solve problems...

It 2023-05-17

It crossword puzzle
Across
  1. What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
  2. What mobile operating system was developed by Google?
  3. What do you call a group of interconnected computers and devices?
Down
  1. What technology allows devices to connect to a network without using cables or wires?
  2. What type of malware is capable of self-replicating and spreading across networks?
  3. horse Whattype of malware is disguised as a legitimate software program?
  4. What is the process of converting plain text into ciphertext called?
  5. In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?

8 Clues: What mobile operating system was developed by Google?What do you call a group of interconnected computers and devices?What is the process of converting plain text into ciphertext called?horse Whattype of malware is disguised as a legitimate software program?What type of malware is capable of self-replicating and spreading across networks?...

Types of measures to counter security threats. 2022-05-10

Types of measures to counter security threats. crossword puzzle
Across
  1. - involves focusing efforts to prevent threats to the most valuable information
  2. - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
  3. of the system to changes in the environment
  4. methods are based on one principle of information security management;
Down
  1. of additional tasks and requirements for employees of the organization caused by information protection measures
  2. special programs, software packages and information security systems in information systems for various purposes and data processing facilities
  3. tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
  4. - excludes acquaintance of third parties with the means and technology of information protection

8 Clues: of the system to changes in the environmentmethods are based on one principle of information security management;- involves focusing efforts to prevent threats to the most valuable information- excludes acquaintance of third parties with the means and technology of information protection...

Globalisation and crime 2025-02-07

Globalisation and crime crossword puzzle
Across
  1. A term describing global organised crime networks, as explored in the book by Misha Glenny.
  2. The study of social harm rather than just criminal behaviour.
  3. A sociologist known for his work on the network society and the impact of digital communication.
  4. A term referring to the interconnection between global and local processes.
  5. A sociologist who theorised about risk society and the global implications of modernity.
Down
  1. The idea that all parts of society and the world are linked and influence each other.
  2. A sociologist who describes primary and secondary green crime.
  3. A sociologist who analysed the globalisation of crime and the role of capitalism in shaping criminal activity.

8 Clues: The study of social harm rather than just criminal behaviour.A sociologist who describes primary and secondary green crime.A term referring to the interconnection between global and local processes.The idea that all parts of society and the world are linked and influence each other....

ICT keywords 1 2025-03-05

ICT keywords 1 crossword puzzle
Across
  1. used to connect LANs together, connecting different types of network so they act as one single LAN
  2. is public access to a vast collection of computers and networks
  3. is to run both systems together until the new system works properly when the new system works the old system is removed
  4. a private network used in companies and organisations
Down
  1. it is a fraudulent practice of making phone calls/leaving voice messages
  2. it is the system that displays questions for the user to answer, displaying the results
  3. a collection of facts and rules. Created from information provided by experts
  4. this network device connects a LAN to the internet

8 Clues: this network device connects a LAN to the interneta private network used in companies and organisationsis public access to a vast collection of computers and networksit is a fraudulent practice of making phone calls/leaving voice messagesa collection of facts and rules. Created from information provided by experts...

Cyber ethics 2025-06-14

Cyber ethics crossword puzzle
Across
  1. A legal right granted by the law to the creator for his original work.
  2. Purchasing a single lisenced copy of the software and loading it into several computers.
  3. Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
  1. An illegal intrution into a computer system Or network.
  2. Vital information resources under seize.
  3. An act of sending to an user, misleading him to belive that it is from a trusted organisation.
  4. Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
  5. Unwanted bulk emails that comes from unknown sources.

8 Clues: Vital information resources under seize.Unwanted bulk emails that comes from unknown sources.An illegal intrution into a computer system Or network.A legal right granted by the law to the creator for his original work.Purchasing a single lisenced copy of the software and loading it into several computers....

Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16

Computing Careers (Created By: HTHS Business Dept. 2022) crossword puzzle
Across
  1. _____ administrator is responsible for the creation, administration and security of computer networks.
  2. The _____ administrator is responsible for the administration and management of an organization's network.
  3. A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
  1. _____ write new programs, update and modify existing programs/software.
  2. _____ designers create webpage, build and maintain websites for an individual or an organization.
  3. The System _____ main role is to implement a new computerised system or upgrade an existing one.

6 Clues: _____ write new programs, update and modify existing programs/software.A _____ librarian keeps an organization's data files and software up-to-date and organised.The System _____ main role is to implement a new computerised system or upgrade an existing one....

. 2023-11-14

. crossword puzzle
Across
  1. record the address to enable quick access in future
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  3. text files with small pieces of data
  4. a form of social engineering and scam where attackers deceive people into revealing sensitive information
Down
  1. malicious attack that involves injecting harmful code into legitimate online advertising networks
  2. a secret word or phrase that must be used to gain admission to a place

6 Clues: text files with small pieces of datarecord the address to enable quick access in futurea secret word or phrase that must be used to gain admission to a placemalicious attack that involves injecting harmful code into legitimate online advertising networks...

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Link between earth station and satellite
  2. Combination of transmitter and receiver in satellite
  3. Part of the celestial sphere directly above the observer
Down
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satelliteAngle between orbital plane and earth's equatorial planePart of the celestial sphere directly above the observer

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

Task 4 Methodology CRossword 2015-04-24

Task 4 Methodology CRossword crossword puzzle
Across
  1. Overall startegy to treat input.
  2. Resource used to build global information sharing networks and foster connectivity for learning purposes.
Down
  1. approach used in the initial online course.
  2. participants are encouraged to develop the kinds of digital _____ skills.

4 Clues: Overall startegy to treat input.approach used in the initial online course.participants are encouraged to develop the kinds of digital _____ skills.Resource used to build global information sharing networks and foster connectivity for learning purposes.

PLACES 2022-12-20

PLACES crossword puzzle
Across
  1. where buyers and sellers can meet to facilitate buying or selling of goods
  2. a worldwide system of computer networks
Down
  1. large retail store operated on a self-service basis
  2. someone who sells goods informally in public places

4 Clues: a worldwide system of computer networkslarge retail store operated on a self-service basissomeone who sells goods informally in public placeswhere buyers and sellers can meet to facilitate buying or selling of goods

Mass Media 2014-06-11

Mass Media crossword puzzle
Across
  1. Any of the means of communication, as television or newspapers, that reach very large numbers of people.
  2. Modern popular culture transmitted via mass media and aimed particularly at younger people.
  3. Refers to the approach used to attract the attention of consumers and/or to influence their feelings toward the product, service, or cause.
  4. The action or business of promoting and selling products or services, including market research and advertising.
Down
  1. Give or hand over something in exchange for money.
  2. Downloading ideas and trends of older teens onto pre-teens.
  3. The activity or profession of producing advertisements for commercial products or services.
  4. Concerned with or engaged in commerce.
  5. Is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
  6. Obtain in exchange for payment.

10 Clues: Obtain in exchange for payment.Concerned with or engaged in commerce.Give or hand over something in exchange for money.Downloading ideas and trends of older teens onto pre-teens.The activity or profession of producing advertisements for commercial products or services....

Media 2020-05-20

Media crossword puzzle
Across
  1. A digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
  2. Newspapers and magazines
  3. The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them
  4. ​An international computer network connecting other networks and computers from companies, universities, etc
  5. of a circuit or device that represents magnitudes in digits
  6. Instructions that are hidden within a computer program and are designed to cause faults or destroy data
Down
  1. A game in which you press buttons to control and move images on a screen
  2. Talk socially without exchanging too much information
  3. A machine that prints
  4. The flat surface at the front of a television, computer, or other electronic device, on which you see pictures or information

10 Clues: A machine that printsNewspapers and magazinesTalk socially without exchanging too much informationof a circuit or device that represents magnitudes in digitsA game in which you press buttons to control and move images on a screenThe act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them...

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-07

community-based mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. What region was identified in step one of the asset collection method?
  2. If we do not see racism in mental health services as a problem, it will be extremely difficult to create a ________
  3. Crisis Assistance Helping Out on The Streets Acronym
  4. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model
  5. What is our asset organization's acronym?
Down
  1. Key asset component
  2. Category in the socio-ecological model that does not directly impact the individual but exerts both negative and positive interactive forces on the individual such as community contexts and social networks
  3. Declared anti-Black Racism as a public health crisis
  4. __________inequalities highlight the historic principles of modern-day discrimination
  5. The four components of the socio-ecological model include the microsystem, mesosystem, ecosystem and ___________?

10 Clues: Key asset componentWhat is our asset organization's acronym?Declared anti-Black Racism as a public health crisisCrisis Assistance Helping Out on The Streets AcronymWhat region was identified in step one of the asset collection method?__________inequalities highlight the historic principles of modern-day discrimination...

Emtech Reviewer 2025-02-03

Emtech Reviewer crossword puzzle
Across
  1. the chart's horizontal axis which presents the categories being charted, while the vertical axis shows the charted values.
  2. A visual storytelling software alternative to traditional slide-based presentation formats.
  3. It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks.
  4. for Apple devices
  5. Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.
Down
  1. Intellectual Property must also be protected.
  2. Web 3.0 machine must cater all languages as this third generation of web aims to serve diverse users.
  3. an open source operating system developed by Google.
  4. Plays a significant role in a graphic design.
  5. is an umbrella term which covers any communication devices, applications, and systems that people use to interact and connect with others.

10 Clues: for Apple devicesIntellectual Property must also be protected.Plays a significant role in a graphic design.an open source operating system developed by Google.Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.A visual storytelling software alternative to traditional slide-based presentation formats....

Introduction to Machine Learning 2024-12-09

Introduction to Machine Learning crossword puzzle
Across
  1. A type of task where the goal is to predict continuous values like house prices.
  2. A learning type that requires labeled data for training.
  3. A reinforcement learning algorithm that maps states and actions to rewards.
  4. The process of grouping similar data points without predefined labels.
Down
  1. The error due to a model being too sensitive to training data noise.
  2. The error caused by overly simplistic models failing to capture data complexity.
  3. The phase where a machine learning model learns patterns from data.
  4. The broader field of study that includes machine learning and aims to simulate human intelligence.
  5. The specialized subset of ML that uses neural networks with multiple layers for complex tasks.
  6. The subset of AI that focuses on learning from data to make predictions or decisions.

10 Clues: A learning type that requires labeled data for training.The phase where a machine learning model learns patterns from data.The error due to a model being too sensitive to training data noise.The process of grouping similar data points without predefined labels.A reinforcement learning algorithm that maps states and actions to rewards....

AI Crossword Puzzle 2024-12-09

AI Crossword Puzzle crossword puzzle
Across
  1. A set of rules or instructions given to an AI system to help it learn how to solve problems or perform tasks.
  2. Allianz signed this pact committing to responsible AI use.
  3. Name of the new European Union regulation concerning artificial intelligence
  4. Name of the general-purpose AI system developed by Allianz (similar to ChatGPT)
  5. AI-generated media that can convincingly mimic real people.
  6. The risk category for AI systems like spam filters under the EU AI Act.
Down
  1. The dataset used to train an AI model.
  2. An approach where human intervention is part of the AI system's decision-making process.
  3. A subset of machine learning using neural networks with many layers, effective for tasks like image recognition
  4. Systematic errors in AI outputs due to prejudiced assumptions made during the algorithm's development or training process.

10 Clues: The dataset used to train an AI model.Allianz signed this pact committing to responsible AI use.AI-generated media that can convincingly mimic real people.The risk category for AI systems like spam filters under the EU AI Act.Name of the new European Union regulation concerning artificial intelligence...

Neuro Fuzzy 2024-04-18

Neuro Fuzzy crossword puzzle
Across
  1. Method that combines fuzzy logic and neural networks.
  2. A process used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
  3. Technique in neuro-fuzzy systems for modeling uncertain or imprecise information.
  4. Type of algorithm used in neuro-fuzzy systems to adjust parameters based on the error signal.
  5. An approach in neuro-fuzzy systems to adjust parameters based on error signal.
Down
  1. Mathematical model representing knowledge or data in the form of fuzzy rules
  2. The process of converting linguistic information into a form suitable for computation in fuzzy systems.
  3. Term for the output of a fuzzy logic system.
  4. A technique in neuro-fuzzy systems where the system structure and parameters are adjusted simultaneously.
  5. Method used in neuro-fuzzy systems to automatically generate fuzzy rules from data.

10 Clues: Term for the output of a fuzzy logic system.Method that combines fuzzy logic and neural networks.Mathematical model representing knowledge or data in the form of fuzzy rulesAn approach in neuro-fuzzy systems to adjust parameters based on error signal.Technique in neuro-fuzzy systems for modeling uncertain or imprecise information....

4th Grade Social Studies Homework Due 10/13/22 2022-10-10

4th Grade Social Studies Homework Due 10/13/22 crossword puzzle
Across
  1. When the land was no longer fertile, the settlers had to make their first big ________.
  2. The US gets resources from other countries in their ________.
  3. A farmer’s favorite ______ might be their tractor.
  4. Clean water is a precious ________ in many parts of the world.
  5. The Iroquois formed a ________ of tribes that worked together for trade and during times of war.
Down
  1. cost of gasoline can impact the country’s _________.
  2. The Native American ________ would have been located near water.
  3. Jill decides to take the bus to work instead of driving. It takes her 60 minutes to get there on the bus and driving would have been 40, so her _______ is 20 minutes.
  4. Maria is a firm believer in democratic system of __________.
  5. Decisions were often made through _________ in Native American tribes.

10 Clues: A farmer’s favorite ______ might be their tractor.cost of gasoline can impact the country’s _________.Maria is a firm believer in democratic system of __________.The US gets resources from other countries in their ________.Clean water is a precious ________ in many parts of the world.The Native American ________ would have been located near water....

ISA-VESIT CROSSWORD 2022-02-02

ISA-VESIT   CROSSWORD crossword puzzle
Across
  1. What is the name of India’s first indigenous supercomputer developed by CDAC?
  2. Which IIT has transformed an existing nitrogen plant into an oxygen generator?
  3. Which satellite is responsible for communication, meteorological services and television broadcasting in India?
  4. Who is largely responsible for breaking the German Enigma codes and created a test that provided a foundation for artificial intelligence?
  5. The concentric circles on the platter of hard disk are known as _____
Down
  1. Which is the programming language used for backend development of Instagram?
  2. What was the largest social network prior to facebook?
  3. _____ is the generic term for a collection of private computer networks within an organization.
  4. Which is the first telecom company in India that demonstrated the operation of the 5G network?
  5. MOV file extension usually refers to what kind of file?

10 Clues: What was the largest social network prior to facebook?MOV file extension usually refers to what kind of file?The concentric circles on the platter of hard disk are known as _____Which is the programming language used for backend development of Instagram?What is the name of India’s first indigenous supercomputer developed by CDAC?...

G2 - Ambientes computacionais e Conectividade - 04/04/2022 2022-04-05

G2 - Ambientes computacionais e Conectividade - 04/04/2022 crossword puzzle
Across
  1. Um byte é formado por 8.
  2. Local Area Networks, ou Redes Locais.
  3. Tipo de transmissão de dados que ocorre em um único sentido.
  4. Qual camada OSI converte o formato do dados recebido pela camada aplicação em um formato comum a ser usado na transmissão.
  5. Qual topologia descreve o fluxo de dados através da rede.
Down
  1. Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos.
  2. Definem como será feita a transmissão de dados e coloca marcações nos dados que estão sendo transmitidos.
  3. Topologia comum que possui alto poder de expansão.
  4. Topologia de redes que a utilização da comunicação em um único sentido diminuem as chances de colisão e não há a necessidade de roteamento.
  5. Tipo de topologia de redes que geralmente possui um Hub no centro da estrutura.

10 Clues: Um byte é formado por 8.Local Area Networks, ou Redes Locais.Topologia comum que possui alto poder de expansão.Qual topologia descreve o fluxo de dados através da rede.Tipo de transmissão de dados que ocorre em um único sentido.Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos....

DATA TRASMISSION 2022-07-07

DATA TRASMISSION crossword puzzle
Across
  1. a small part of a message / data that is transmitted over a network
  2. stages in a network that can receive and transmit data packets
  3. data that can be sent in both directions at the same time (simultaneously)
Down
  1. the actual data being carried in a data packet
  2. a device that enables data packets to be moved between different networks
  3. data that cant be sent in both directions but not at the same time
  4. data that arrives at the destination with the bits no longer synchronised
  5. a verification method used to check data transferred has been altered or corrupted
  6. data that can be sent on one direction only
  7. a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port

10 Clues: data that can be sent on one direction onlythe actual data being carried in a data packetstages in a network that can receive and transmit data packetsdata that cant be sent in both directions but not at the same timea small part of a message / data that is transmitted over a network...

How Aware Are You? 2025-09-12

How Aware Are You? crossword puzzle
Across
  1. Verifying the identity of a user, often using a username and password.
  2. A fake website designed to steal personal information.
  3. The practice of protecting systems and networks from digital attacks.
  4. A program that replicates itself and spreads to other computers.
  5. A software that monitors and blocks unauthorized access to a computer network.
  6. A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
  1. A string of characters used to log in to a system, it should be unique and complex.
  2. Adding a second layer of verification beyond a password, often a code sent to your phone
  3. The"lock" icon in a browser's address bar indicates a secure connection using this .
  4. A type of malware that blocks access to your data until a sum of money is paid.

10 Clues: A fake website designed to steal personal information.A program that replicates itself and spreads to other computers.The practice of protecting systems and networks from digital attacks.Verifying the identity of a user, often using a username and password.A software that monitors and blocks unauthorized access to a computer network....

Business Model Crossword Puzzle 2025-11-13

Business Model Crossword Puzzle crossword puzzle
Across
  1. Which business model is an agreement that details all rules and expectations for both parties?
  2. What do franchisees typically benefit from?
  3. What owner has complete autonomy and control over all aspects of the business, from operations and marketing to pricing and branding?
  4. Managed services is the practice of what?
  5. What does the franchisee usually pay for franchisor an initial startup?
  6. Owning an independent business gives you what type of control?
Down
  1. Franchising allows business owners to expand their business by what?
  2. The franchise business model dates to what century?
  3. What type of business model is outsourced service agreement where a third-party provider takes responsibility for managing and operating specific business functions for a client?
  4. Franchising is often recommended to what type of business owners?

10 Clues: Managed services is the practice of what?What do franchisees typically benefit from?The franchise business model dates to what century?Owning an independent business gives you what type of control?Franchising is often recommended to what type of business owners?Franchising allows business owners to expand their business by what?...

Crossword 2022-10-25

Crossword crossword puzzle
Across
  1. That guy who does the EdTalks
  2. Without doubt the best of the Extreme Networks offices
Down
  1. A famous poet, a conference room, and lover of swans
  2. IT Guru. In some places they say his presence alone fixes computers...

4 Clues: That guy who does the EdTalksA famous poet, a conference room, and lover of swansWithout doubt the best of the Extreme Networks officesIT Guru. In some places they say his presence alone fixes computers...

computer science 2020-12-09

computer science crossword puzzle
Across
  1. give an authority order
  2. a folder or box for holding loose papers that are typically arranged a difference
  3. its a corona that can contact everybody
  4. browser is a software application for accessing information on the world wide web.
  5. the amount of something produced by a person,machine,industry
  6. an island town or city
  7. device is a piece of computer device hardware equipment wich converts information
  8. storage cloud computing model thatstores data and information
  9. a person or thing that provides commonly
  10. something remmembered from the past
  11. annoy or bother someone
  12. local area network is a collection of devices together
  13. software thats designed to dirupt and damage
Down
  1. a small sweet cake typically round and flat and having a crisp flat between chewy textures
  2. wireless fidelity that can connect to a radio using waves without needing to use wires
  3. copy data from a computer system to another typically over internet
  4. devices a piece of equipment used to provide data and control signals into a information processing system as computer
  5. bar a long thin section at the edge of a computer
  6. process in restarting a computer
  7. a wall designed whit fire
  8. network is a group of networks that uses a set of communications
  9. a act or instance of booting a computer

22 Clues: an island town or citygive an authority orderannoy or bother someonea wall designed whit fireprocess in restarting a computersomething remmembered from the pastits a corona that can contact everybodya act or instance of booting a computera person or thing that provides commonlysoftware thats designed to dirupt and damage...

WWI Crossword Puzzle 2022-05-27

WWI Crossword Puzzle crossword puzzle
Across
  1. Nations pride
  2. One of the first countries to surrender
  3. First full-scale offensive with tanks
  4. When all resources are devoted to war
  5. Russian leaving war
  6. Type of warfare with networks
  7. Warfare to sink any ship
  8. Dropping bombs on important places
  9. Continent where fighting was in Egypt
  10. Who went to war
  11. Where fighting of Germans and Russians happened
  12. First aircraft used
  13. Words for deaths
  14. Treaty from Russia to Germany
  15. Where Germans sent Zimmermann note
  16. Note from Germans to Mexico
  17. Goods needed for war
  18. Battle to stop advances of Germans
Down
  1. Big vehicles combating trench warfare
  2. Another word for planes
  3. He stepped down because of revolt in Germany
  4. German submarine
  5. First war that included use of planes
  6. Only country/continent involved
  7. Improved weapon used by soldiers
  8. First US Marines in WWI combat
  9. Where most of the fighting happened
  10. Popular way to recruit
  11. Plan to win
  12. Land between opposing sides
  13. A chemical warfare
  14. To strongly go against
  15. "Big Push" battle
  16. Fire weapon, used in trenches
  17. Longest battle in WWI
  18. Person who offered truce to Germany
  19. US continent
  20. French plan to retake
  21. Who replaced men in factories
  22. Battle for Germans to attack and frighten French

40 Clues: Plan to winUS continentNations prideWho went to warGerman submarineWords for deaths"Big Push" battleA chemical warfareRussian leaving warFirst aircraft usedGoods needed for warLongest battle in WWIFrench plan to retakePopular way to recruitTo strongly go againstAnother word for planesWarfare to sink any shipLand between opposing sides...

Tech Terms 2022-11-28

Tech Terms crossword puzzle
Across
  1. To copy data from one system to another
  2. Portable Document Format
  3. A storage device containing a read-write mechanism
  4. a way to back up your hard drive
  5. unique address that identifies a device on the internet or a local network
  6. any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit
  7. starting a computer system again
  8. short for malicious software
  9. instructions that enable the hardware to perform tasks
  10. small files including unique identifiers that web servers send to browsers
  11. networking device that forwards data packets between computer networks.
  12. An example of this is Bing or Yahoo
  13. a family of wired computer networking technologies
  14. An example of this is Firefox or Google Chrome
  15. A security device that monitors traffic to and from your network
Down
  1. Monitor or speakers
  2. Mouse and keyboard
  3. A group of bits
  4. Central Processing Unit, The Brains
  5. to start a computer system
  6. The physical components of a computer
  7. Uniform Resource Locator
  8. HyperText Markup Language
  9. the software that supports a computer's basic functions.
  10. a device that converts signals produced by one type of device.
  11. equal to around 1 million bytes
  12. A binary digit

27 Clues: A binary digitA group of bitsMouse and keyboardMonitor or speakersPortable Document FormatUniform Resource LocatorHyperText Markup Languageto start a computer systemshort for malicious softwareequal to around 1 million bytesa way to back up your hard drivestarting a computer system againCentral Processing Unit, The Brains...

Technical Concepts Crossword 2020-09-04

Technical Concepts Crossword crossword puzzle
Across
  1. a computer program that modifies another computer program and executes its own code
  2. a semiconductor device used to amplify or switch electronic signals and electrical power.
  3. Evil software
  4. the method by which information is converted into a secret code that hides the information
  5. a software application for accessing the information on the World Wide Web
  6. local area network
  7. a small amount of data sent over a network
  8. A connected set of networks
  9. A mutually agreed on the method of communication
Down
  1. a numeric system that only uses two digits — 0 and 1.
  2. software with malicious behavior that aims to gather information about a person or organization
  3. the programs and other operating information used by a computer.
  4. pretends to be one thing, usually legit software but hides malware inside
  5. transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
  6. a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
  7. Crawler a script that explores the web
  8. types of malware; ads start popping up
  9. an interpreted, high-level and general-purpose programming language
  10. Smart Messaging Service(Can use satellites, emails) also known as message
  11. Internet service provider

20 Clues: Evil softwarelocal area networkInternet service providerA connected set of networksCrawler a script that explores the webtypes of malware; ads start popping upa small amount of data sent over a networkA mutually agreed on the method of communicationa numeric system that only uses two digits — 0 and 1....