networks Crossword Puzzles
ICT keywords 1 2025-03-05
Across
- used to connect LANs together, connecting different types of network so they act as one single LAN
- is public access to a vast collection of computers and networks
- is to run both systems together until the new system works properly when the new system works the old system is removed
- a private network used in companies and organisations
Down
- it is a fraudulent practice of making phone calls/leaving voice messages
- it is the system that displays questions for the user to answer, displaying the results
- a collection of facts and rules. Created from information provided by experts
- this network device connects a LAN to the internet
8 Clues: this network device connects a LAN to the internet • a private network used in companies and organisations • is public access to a vast collection of computers and networks • it is a fraudulent practice of making phone calls/leaving voice messages • a collection of facts and rules. Created from information provided by experts • ...
Cyber ethics 2025-06-14
Across
- A legal right granted by the law to the creator for his original work.
- Purchasing a single lisenced copy of the software and loading it into several computers.
- Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
- An illegal intrution into a computer system Or network.
- Vital information resources under seize.
- An act of sending to an user, misleading him to belive that it is from a trusted organisation.
- Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
- Unwanted bulk emails that comes from unknown sources.
8 Clues: Vital information resources under seize. • Unwanted bulk emails that comes from unknown sources. • An illegal intrution into a computer system Or network. • A legal right granted by the law to the creator for his original work. • Purchasing a single lisenced copy of the software and loading it into several computers. • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Angle between orbital plane and earth's equatorial plane • Part of the celestial sphere directly above the observer
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16
Across
- _____ administrator is responsible for the creation, administration and security of computer networks.
- The _____ administrator is responsible for the administration and management of an organization's network.
- A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
- _____ write new programs, update and modify existing programs/software.
- _____ designers create webpage, build and maintain websites for an individual or an organization.
- The System _____ main role is to implement a new computerised system or upgrade an existing one.
6 Clues: _____ write new programs, update and modify existing programs/software. • A _____ librarian keeps an organization's data files and software up-to-date and organised. • The System _____ main role is to implement a new computerised system or upgrade an existing one. • ...
. 2023-11-14
Across
- record the address to enable quick access in future
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- text files with small pieces of data
- a form of social engineering and scam where attackers deceive people into revealing sensitive information
Down
- malicious attack that involves injecting harmful code into legitimate online advertising networks
- a secret word or phrase that must be used to gain admission to a place
6 Clues: text files with small pieces of data • record the address to enable quick access in future • a secret word or phrase that must be used to gain admission to a place • malicious attack that involves injecting harmful code into legitimate online advertising networks • ...
Task 4 Methodology CRossword 2015-04-24
4 Clues: Overall startegy to treat input. • approach used in the initial online course. • participants are encouraged to develop the kinds of digital _____ skills. • Resource used to build global information sharing networks and foster connectivity for learning purposes.
PLACES 2022-12-20
4 Clues: a worldwide system of computer networks • large retail store operated on a self-service basis • someone who sells goods informally in public places • where buyers and sellers can meet to facilitate buying or selling of goods
Mass Media 2014-06-11
Across
- Any of the means of communication, as television or newspapers, that reach very large numbers of people.
- Modern popular culture transmitted via mass media and aimed particularly at younger people.
- Refers to the approach used to attract the attention of consumers and/or to influence their feelings toward the product, service, or cause.
- The action or business of promoting and selling products or services, including market research and advertising.
Down
- Give or hand over something in exchange for money.
- Downloading ideas and trends of older teens onto pre-teens.
- The activity or profession of producing advertisements for commercial products or services.
- Concerned with or engaged in commerce.
- Is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
- Obtain in exchange for payment.
10 Clues: Obtain in exchange for payment. • Concerned with or engaged in commerce. • Give or hand over something in exchange for money. • Downloading ideas and trends of older teens onto pre-teens. • The activity or profession of producing advertisements for commercial products or services. • ...
Media 2020-05-20
Across
- A digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
- Newspapers and magazines
- The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them
- An international computer network connecting other networks and computers from companies, universities, etc
- of a circuit or device that represents magnitudes in digits
- Instructions that are hidden within a computer program and are designed to cause faults or destroy data
Down
- A game in which you press buttons to control and move images on a screen
- Talk socially without exchanging too much information
- A machine that prints
- The flat surface at the front of a television, computer, or other electronic device, on which you see pictures or information
10 Clues: A machine that prints • Newspapers and magazines • Talk socially without exchanging too much information • of a circuit or device that represents magnitudes in digits • A game in which you press buttons to control and move images on a screen • The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-07
Across
- What region was identified in step one of the asset collection method?
- If we do not see racism in mental health services as a problem, it will be extremely difficult to create a ________
- Crisis Assistance Helping Out on The Streets Acronym
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model
- What is our asset organization's acronym?
Down
- Key asset component
- Category in the socio-ecological model that does not directly impact the individual but exerts both negative and positive interactive forces on the individual such as community contexts and social networks
- Declared anti-Black Racism as a public health crisis
- __________inequalities highlight the historic principles of modern-day discrimination
- The four components of the socio-ecological model include the microsystem, mesosystem, ecosystem and ___________?
10 Clues: Key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out on The Streets Acronym • What region was identified in step one of the asset collection method? • __________inequalities highlight the historic principles of modern-day discrimination • ...
Emtech Reviewer 2025-02-03
Across
- the chart's horizontal axis which presents the categories being charted, while the vertical axis shows the charted values.
- A visual storytelling software alternative to traditional slide-based presentation formats.
- It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks.
- for Apple devices
- Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.
Down
- Intellectual Property must also be protected.
- Web 3.0 machine must cater all languages as this third generation of web aims to serve diverse users.
- an open source operating system developed by Google.
- Plays a significant role in a graphic design.
- is an umbrella term which covers any communication devices, applications, and systems that people use to interact and connect with others.
10 Clues: for Apple devices • Intellectual Property must also be protected. • Plays a significant role in a graphic design. • an open source operating system developed by Google. • Our currently used web browsers, and HTML files cannot support the idea of Web 3.0. • A visual storytelling software alternative to traditional slide-based presentation formats. • ...
Introduction to Machine Learning 2024-12-09
Across
- A type of task where the goal is to predict continuous values like house prices.
- A learning type that requires labeled data for training.
- A reinforcement learning algorithm that maps states and actions to rewards.
- The process of grouping similar data points without predefined labels.
Down
- The error due to a model being too sensitive to training data noise.
- The error caused by overly simplistic models failing to capture data complexity.
- The phase where a machine learning model learns patterns from data.
- The broader field of study that includes machine learning and aims to simulate human intelligence.
- The specialized subset of ML that uses neural networks with multiple layers for complex tasks.
- The subset of AI that focuses on learning from data to make predictions or decisions.
10 Clues: A learning type that requires labeled data for training. • The phase where a machine learning model learns patterns from data. • The error due to a model being too sensitive to training data noise. • The process of grouping similar data points without predefined labels. • A reinforcement learning algorithm that maps states and actions to rewards. • ...
AI Crossword Puzzle 2024-12-09
Across
- A set of rules or instructions given to an AI system to help it learn how to solve problems or perform tasks.
- Allianz signed this pact committing to responsible AI use.
- Name of the new European Union regulation concerning artificial intelligence
- Name of the general-purpose AI system developed by Allianz (similar to ChatGPT)
- AI-generated media that can convincingly mimic real people.
- The risk category for AI systems like spam filters under the EU AI Act.
Down
- The dataset used to train an AI model.
- An approach where human intervention is part of the AI system's decision-making process.
- A subset of machine learning using neural networks with many layers, effective for tasks like image recognition
- Systematic errors in AI outputs due to prejudiced assumptions made during the algorithm's development or training process.
10 Clues: The dataset used to train an AI model. • Allianz signed this pact committing to responsible AI use. • AI-generated media that can convincingly mimic real people. • The risk category for AI systems like spam filters under the EU AI Act. • Name of the new European Union regulation concerning artificial intelligence • ...
Neuro Fuzzy 2024-04-18
Across
- Method that combines fuzzy logic and neural networks.
- A process used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
- Technique in neuro-fuzzy systems for modeling uncertain or imprecise information.
- Type of algorithm used in neuro-fuzzy systems to adjust parameters based on the error signal.
- An approach in neuro-fuzzy systems to adjust parameters based on error signal.
Down
- Mathematical model representing knowledge or data in the form of fuzzy rules
- The process of converting linguistic information into a form suitable for computation in fuzzy systems.
- Term for the output of a fuzzy logic system.
- A technique in neuro-fuzzy systems where the system structure and parameters are adjusted simultaneously.
- Method used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
10 Clues: Term for the output of a fuzzy logic system. • Method that combines fuzzy logic and neural networks. • Mathematical model representing knowledge or data in the form of fuzzy rules • An approach in neuro-fuzzy systems to adjust parameters based on error signal. • Technique in neuro-fuzzy systems for modeling uncertain or imprecise information. • ...
4th Grade Social Studies Homework Due 10/13/22 2022-10-10
Across
- When the land was no longer fertile, the settlers had to make their first big ________.
- The US gets resources from other countries in their ________.
- A farmer’s favorite ______ might be their tractor.
- Clean water is a precious ________ in many parts of the world.
- The Iroquois formed a ________ of tribes that worked together for trade and during times of war.
Down
- cost of gasoline can impact the country’s _________.
- The Native American ________ would have been located near water.
- Jill decides to take the bus to work instead of driving. It takes her 60 minutes to get there on the bus and driving would have been 40, so her _______ is 20 minutes.
- Maria is a firm believer in democratic system of __________.
- Decisions were often made through _________ in Native American tribes.
10 Clues: A farmer’s favorite ______ might be their tractor. • cost of gasoline can impact the country’s _________. • Maria is a firm believer in democratic system of __________. • The US gets resources from other countries in their ________. • Clean water is a precious ________ in many parts of the world. • The Native American ________ would have been located near water. • ...
ISA-VESIT CROSSWORD 2022-02-02
Across
- What is the name of India’s first indigenous supercomputer developed by CDAC?
- Which IIT has transformed an existing nitrogen plant into an oxygen generator?
- Which satellite is responsible for communication, meteorological services and television broadcasting in India?
- Who is largely responsible for breaking the German Enigma codes and created a test that provided a foundation for artificial intelligence?
- The concentric circles on the platter of hard disk are known as _____
Down
- Which is the programming language used for backend development of Instagram?
- What was the largest social network prior to facebook?
- _____ is the generic term for a collection of private computer networks within an organization.
- Which is the first telecom company in India that demonstrated the operation of the 5G network?
- MOV file extension usually refers to what kind of file?
10 Clues: What was the largest social network prior to facebook? • MOV file extension usually refers to what kind of file? • The concentric circles on the platter of hard disk are known as _____ • Which is the programming language used for backend development of Instagram? • What is the name of India’s first indigenous supercomputer developed by CDAC? • ...
G2 - Ambientes computacionais e Conectividade - 04/04/2022 2022-04-05
Across
- Um byte é formado por 8.
- Local Area Networks, ou Redes Locais.
- Tipo de transmissão de dados que ocorre em um único sentido.
- Qual camada OSI converte o formato do dados recebido pela camada aplicação em um formato comum a ser usado na transmissão.
- Qual topologia descreve o fluxo de dados através da rede.
Down
- Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos.
- Definem como será feita a transmissão de dados e coloca marcações nos dados que estão sendo transmitidos.
- Topologia comum que possui alto poder de expansão.
- Topologia de redes que a utilização da comunicação em um único sentido diminuem as chances de colisão e não há a necessidade de roteamento.
- Tipo de topologia de redes que geralmente possui um Hub no centro da estrutura.
10 Clues: Um byte é formado por 8. • Local Area Networks, ou Redes Locais. • Topologia comum que possui alto poder de expansão. • Qual topologia descreve o fluxo de dados através da rede. • Tipo de transmissão de dados que ocorre em um único sentido. • Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos. • ...
DATA TRASMISSION 2022-07-07
Across
- a small part of a message / data that is transmitted over a network
- stages in a network that can receive and transmit data packets
- data that can be sent in both directions at the same time (simultaneously)
Down
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that cant be sent in both directions but not at the same time
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check data transferred has been altered or corrupted
- data that can be sent on one direction only
- a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data packets • data that cant be sent in both directions but not at the same time • a small part of a message / data that is transmitted over a network • ...
How Aware Are You? 2025-09-12
Across
- Verifying the identity of a user, often using a username and password.
- A fake website designed to steal personal information.
- The practice of protecting systems and networks from digital attacks.
- A program that replicates itself and spreads to other computers.
- A software that monitors and blocks unauthorized access to a computer network.
- A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
- A string of characters used to log in to a system, it should be unique and complex.
- Adding a second layer of verification beyond a password, often a code sent to your phone
- The"lock" icon in a browser's address bar indicates a secure connection using this .
- A type of malware that blocks access to your data until a sum of money is paid.
10 Clues: A fake website designed to steal personal information. • A program that replicates itself and spreads to other computers. • The practice of protecting systems and networks from digital attacks. • Verifying the identity of a user, often using a username and password. • A software that monitors and blocks unauthorized access to a computer network. • ...
Business Model Crossword Puzzle 2025-11-13
Across
- Which business model is an agreement that details all rules and expectations for both parties?
- What do franchisees typically benefit from?
- What owner has complete autonomy and control over all aspects of the business, from operations and marketing to pricing and branding?
- Managed services is the practice of what?
- What does the franchisee usually pay for franchisor an initial startup?
- Owning an independent business gives you what type of control?
Down
- Franchising allows business owners to expand their business by what?
- The franchise business model dates to what century?
- What type of business model is outsourced service agreement where a third-party provider takes responsibility for managing and operating specific business functions for a client?
- Franchising is often recommended to what type of business owners?
10 Clues: Managed services is the practice of what? • What do franchisees typically benefit from? • The franchise business model dates to what century? • Owning an independent business gives you what type of control? • Franchising is often recommended to what type of business owners? • Franchising allows business owners to expand their business by what? • ...
Crossword 2022-10-25
4 Clues: That guy who does the EdTalks • A famous poet, a conference room, and lover of swans • Without doubt the best of the Extreme Networks offices • IT Guru. In some places they say his presence alone fixes computers...
computer science 2020-12-09
Across
- give an authority order
- a folder or box for holding loose papers that are typically arranged a difference
- its a corona that can contact everybody
- browser is a software application for accessing information on the world wide web.
- the amount of something produced by a person,machine,industry
- an island town or city
- device is a piece of computer device hardware equipment wich converts information
- storage cloud computing model thatstores data and information
- a person or thing that provides commonly
- something remmembered from the past
- annoy or bother someone
- local area network is a collection of devices together
- software thats designed to dirupt and damage
Down
- a small sweet cake typically round and flat and having a crisp flat between chewy textures
- wireless fidelity that can connect to a radio using waves without needing to use wires
- copy data from a computer system to another typically over internet
- devices a piece of equipment used to provide data and control signals into a information processing system as computer
- bar a long thin section at the edge of a computer
- process in restarting a computer
- a wall designed whit fire
- network is a group of networks that uses a set of communications
- a act or instance of booting a computer
22 Clues: an island town or city • give an authority order • annoy or bother someone • a wall designed whit fire • process in restarting a computer • something remmembered from the past • its a corona that can contact everybody • a act or instance of booting a computer • a person or thing that provides commonly • software thats designed to dirupt and damage • ...
WWI Crossword Puzzle 2022-05-27
Across
- Nations pride
- One of the first countries to surrender
- First full-scale offensive with tanks
- When all resources are devoted to war
- Russian leaving war
- Type of warfare with networks
- Warfare to sink any ship
- Dropping bombs on important places
- Continent where fighting was in Egypt
- Who went to war
- Where fighting of Germans and Russians happened
- First aircraft used
- Words for deaths
- Treaty from Russia to Germany
- Where Germans sent Zimmermann note
- Note from Germans to Mexico
- Goods needed for war
- Battle to stop advances of Germans
Down
- Big vehicles combating trench warfare
- Another word for planes
- He stepped down because of revolt in Germany
- German submarine
- First war that included use of planes
- Only country/continent involved
- Improved weapon used by soldiers
- First US Marines in WWI combat
- Where most of the fighting happened
- Popular way to recruit
- Plan to win
- Land between opposing sides
- A chemical warfare
- To strongly go against
- "Big Push" battle
- Fire weapon, used in trenches
- Longest battle in WWI
- Person who offered truce to Germany
- US continent
- French plan to retake
- Who replaced men in factories
- Battle for Germans to attack and frighten French
40 Clues: Plan to win • US continent • Nations pride • Who went to war • German submarine • Words for deaths • "Big Push" battle • A chemical warfare • Russian leaving war • First aircraft used • Goods needed for war • Longest battle in WWI • French plan to retake • Popular way to recruit • To strongly go against • Another word for planes • Warfare to sink any ship • Land between opposing sides • ...
Tech Terms 2022-11-28
Across
- To copy data from one system to another
- Portable Document Format
- A storage device containing a read-write mechanism
- a way to back up your hard drive
- unique address that identifies a device on the internet or a local network
- any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit
- starting a computer system again
- short for malicious software
- instructions that enable the hardware to perform tasks
- small files including unique identifiers that web servers send to browsers
- networking device that forwards data packets between computer networks.
- An example of this is Bing or Yahoo
- a family of wired computer networking technologies
- An example of this is Firefox or Google Chrome
- A security device that monitors traffic to and from your network
Down
- Monitor or speakers
- Mouse and keyboard
- A group of bits
- Central Processing Unit, The Brains
- to start a computer system
- The physical components of a computer
- Uniform Resource Locator
- HyperText Markup Language
- the software that supports a computer's basic functions.
- a device that converts signals produced by one type of device.
- equal to around 1 million bytes
- A binary digit
27 Clues: A binary digit • A group of bits • Mouse and keyboard • Monitor or speakers • Portable Document Format • Uniform Resource Locator • HyperText Markup Language • to start a computer system • short for malicious software • equal to around 1 million bytes • a way to back up your hard drive • starting a computer system again • Central Processing Unit, The Brains • ...
Technical Concepts Crossword 2020-09-04
Across
- a computer program that modifies another computer program and executes its own code
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- Evil software
- the method by which information is converted into a secret code that hides the information
- a software application for accessing the information on the World Wide Web
- local area network
- a small amount of data sent over a network
- A connected set of networks
- A mutually agreed on the method of communication
Down
- a numeric system that only uses two digits — 0 and 1.
- software with malicious behavior that aims to gather information about a person or organization
- the programs and other operating information used by a computer.
- pretends to be one thing, usually legit software but hides malware inside
- transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
- Crawler a script that explores the web
- types of malware; ads start popping up
- an interpreted, high-level and general-purpose programming language
- Smart Messaging Service(Can use satellites, emails) also known as message
- Internet service provider
20 Clues: Evil software • local area network • Internet service provider • A connected set of networks • Crawler a script that explores the web • types of malware; ads start popping up • a small amount of data sent over a network • A mutually agreed on the method of communication • a numeric system that only uses two digits — 0 and 1. • ...
Chemistry Chapters 1-9 General Review Part 2 2020-02-10
Across
- an intermolecular force created by the polar ends of some molecules
- the number of protons in an atom
- the heat required to cause a unit rise in the temperature of a unit mass of a given substance
- property used to predict whether a bond is primarily ionic or primarily covalent
- the rule that seems to drive bonding; involves the number 8
- the principle that states that the momentum and position cannot be measured simultaneously
- heat is given off or lost to the surroundings
- when the pressure on a gas increases, its volume _?_
- 0 K or -273.15 C
- the sharing of four electrons (2 pairs)
- type of bond created when electrons are unequally shared between two atoms
- a relatively strong force associated with hydrogen bonded to N, O, or F
Down
- valence shells form from a sea of delocalized electrons
- includes hard substances like diamonds, quartz, and silicon carbide
- PV = nRT
- physical combinations of different substances
- the transfer of electrons from one atom to another
- characterized by the sharing of a pair or pairs of electrons
- substances made from a combination of atoms chemically joined together
- a weak force that exist between all molecules
20 Clues: PV = nRT • 0 K or -273.15 C • the number of protons in an atom • the sharing of four electrons (2 pairs) • physical combinations of different substances • heat is given off or lost to the surroundings • a weak force that exist between all molecules • the transfer of electrons from one atom to another • when the pressure on a gas increases, its volume _?_ • ...
43. 2021-03-19
Across
- It's about old currency notes (7)
- GRASS Crazy King George behind American plant (3-5)
- Old dinasaur from Craggy Hill behind Knock (6)
- Hit mound behind junction (5)
- Sets up sailor bar in American city with first cousin - a man-eater (8)
- It's about former times and a meal we enjoyed then (6)
- Youngster with ape developed a pulse (8)
- One hour with ape misbehaving is a delight (8)
- Clean up what's beneath and behind American city (7)
- NETWORKS Old connections?
- Finishes with alternative comic and works in The Garden with mimics (6)
- Lack of flesh? Not so much, when it's about former queen (8)
- Listen to writer going to American city with worthless old money (8)
- It's about old message to renew old connections (6)
Down
- Bird approaches hill behind American city with mimic (8)
- Part of hunt to persecute someone behind American news (8)
- Colonise Pluto with ape, perhaps (8)
- GEAR Special equipment for police in South American city with great rampaging (4,4)
- ALL In spite of everything, being behind American lines
- Gather outside South American city with lower ranking (8)
- Wall provided a role with mimic in it
- Renew old school ties
- Two presidents behind American attacks (8)
- Little weight behind American news report (8)
24 Clues: Renew old school ties • NETWORKS Old connections? • Hit mound behind junction (5) • It's about old currency notes (7) • Colonise Pluto with ape, perhaps (8) • Wall provided a role with mimic in it • Youngster with ape developed a pulse (8) • Two presidents behind American attacks (8) • Little weight behind American news report (8) • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
M1.4 2023-03-25
Across
- Help to access a computer over unsecured networks safely
- Allows user to view or manage software, for the hardware
- A id for a devices over the network or internet, usually in a string number or alphanumeric string
- A delay
- Help identify a service
- Allow the sending and receiving of data packets over the network and internet
- pieces of information sent to website to hep keep track of users activity and web traffic.
- testing the Wifi speed
- Saves data and information for later use when revisiting a website, which helps increase your web browning speed
- The Name for the devices connected to a network or system
Down
- Make computer resources available over the internet from a paid services
- A program or application that help to edit and compile code
- Allows to connect and print paper from the printer wirelessly
- Keeps track of how much life of the battery is left
- Isolating an environment or an application from other running programs
- Administrative command used to diagnose network issue
- A testing or sample field of a product before release to the public
- Helps hardware to communicate with each other
- Connects to the internet
- A command that allows user to trace network connections in hops
20 Clues: A delay • testing the Wifi speed • Help identify a service • Connects to the internet • Helps hardware to communicate with each other • Keeps track of how much life of the battery is left • Administrative command used to diagnose network issue • Help to access a computer over unsecured networks safely • Allows user to view or manage software, for the hardware • ...
FITAVocab.HBM 2013-05-15
Across
- presentation software program similar to Keynote and Powerpoint, but more abstract
- a file created by a software application
- Example: Windows
- rules and behaviors made to keep individuals safe when online
- an opening in a computer that allows to have more plug-ins
- part of the computer that processes everything
- main circuit board of a computer
- protecting information on computer systems/networks
- Example: printer
- legal means of protecting an author's work
- file format made by WORD that has a smaller chance of getting a virus
- digital, online, accesible on the digital world
- selection of editing and drawing/art tools on your computer
- file format made by Microsoft that can't be viewed by all programs
Down
- a file that serves as a starting place for a new document
- a software that runs on your computer
- the short term memory of a computer
- to start up a computer
- collection of data stored in one unit
- code of positive conduct online
- a piece of equipment that provides input and output for the computer
- a web-based program that saves your photos, docs, and music
- data transmission
- Example: keyboard
- file format made by ADOBE that is viewable by all programs
25 Clues: Example: Windows • Example: printer • data transmission • Example: keyboard • to start up a computer • code of positive conduct online • main circuit board of a computer • the short term memory of a computer • a software that runs on your computer • collection of data stored in one unit • a file created by a software application • legal means of protecting an author's work • ...
VOCAB REVIEW 2016-02-25
Across
- maximum particle size
- pattern: commonly encountered drainage pattern
- load: streams carry dissolved substances
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- slow flow
- leaping movement of sand
- separate from the drainage basin of another by a imaginary line
- flat area about level with top of the channel
- fast flow
- tangled networks
- basin: land area that contributes water to a river system
Down
- when streams diverge from a central area likes pokes from the hub of a wheel
- place where the ground slopes up/down
- load: fine particles suspended in water
- level: most streams is global sea level
- loop-like bend in a stream channel
- quantity of water passing by a point on the steamboat
- absorbed by plants, which the release it into the atmosphere
- maximum load
- bank:river cliff
- cycle: unending circulation of H2O
- the rate of rainfall exceeds earth's ability to absorb
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- process by which liquid water changer into water vapour
- gen. term for sediment deposited by streams
- and corner frequency
- pattern: exhibits many right angle bends
- bars:arcuate deposit of sand along the in inside of bend
- load: course particles move along streambed
29 Clues: slow flow • fast flow • maximum load • bank:river cliff • tangled networks • and corner frequency • maximum particle size • leaping movement of sand • loop-like bend in a stream channel • cycle: unending circulation of H2O • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
DigiCit Vocab Crossword Puzzle- Ariana & Evelyn 2016-05-27
Across
- A law to protect your creative work
- accept or admit the existence or truth of.
- Standards on which you judge
- Unexpected/ unknown identity
- media digitized content that can be transmitted over the internet or computer networks.
- Who are you
- a general statement or concept obtained by inference from specific cases.
- To make something bigger than it actually is
- To carefully examine
- Repetitive behaviors to hurt someone
- Drawings, Illustrations, symbols
- speech Verbal attack against race, appearance, religion, ability, gender, sexual orientation
Down
- use Ability to use a small amount of copyrighted work with no permission
- A website or program that collects related items of content and display them or link to them
- The result of your choices/ actions
- What you identify as; male, female, fluent
- Unsuitable; not proper
- All Caps
- Understand and can feel the emotion of what someone is experiencing
- Someone who witnessed cyberbullying and does nothing about it
- A regularly updated website or webpage, typically one run by an individual or small group, that is written in an informal or conversational style
- An icon or figure representing a particular person in a computer game
- work anything you have originated
- Trick, lie
- a settled or regular tendency or practice, especially one that is hard to give up.
25 Clues: All Caps • Trick, lie • Who are you • To carefully examine • Unsuitable; not proper • Standards on which you judge • Unexpected/ unknown identity • Drawings, Illustrations, symbols • work anything you have originated • A law to protect your creative work • The result of your choices/ actions • Repetitive behaviors to hurt someone • accept or admit the existence or truth of. • ...
Jose Daniel Saenz Serna 2022-05-09
Across
- is a programming language and computing platform
- a hyperlink or hyperlink.
- physical network interface.
- es el conjunto de programas de un sistema informático que gestiona los recursos de hardware.
- is a computer peripheral output device that enables a permanent range of text or graphic documents to be produced.
- logical digital equipment interconnection device.
- It is the main social network that exists in the world.
- intelligence expressed by machines.
Down
- is a computer application designed to be run on smartphones.
- It is a unique identifier that each manufacturer assigns to the network card of its devices.
- It is a computer network that allows communication and data exchange.
- a device that allows networks to interconnect with a different prefix in its IP address.
- is a Bitcoin block exploration service
- Memory for reading only, nothing can be recorded in this memory and its information is already recorded at the factory.
- set of all machines that have been created.
- Science that studies the management of information with electronic means.
- To write in text in Windows we use the program.
- tangible part of the computer.
- It is a Windows XP program.
- It is a set of computers capable of attending to the requests of a client and returning a response.
20 Clues: a hyperlink or hyperlink. • physical network interface. • It is a Windows XP program. • tangible part of the computer. • intelligence expressed by machines. • is a Bitcoin block exploration service • set of all machines that have been created. • To write in text in Windows we use the program. • is a programming language and computing platform • ...
Credit Crossword 2022-03-14
Across
- when the bank takes possession of your house
- a loan for your home
- loans with extreme interest rates if you dont pay them back in time
- when you owe money
- things you earn by using your credit card
- the money that builds up over time
- the type of credit that is on credit cards
- what you pay with that takes money directly from your account
- your history of your credit card spendings and payments
- close ended credit accounts
- Renting for a car
Down
- a credit card reward where you get money back
- one of the two credit card networks that will issue credit cards
- when your loan isnt tied to an asset
- interest rate that doesnt change
- a loan for a vehicle
- interest rate that changes
- what you take out to get money now
- the only source of revolving credit
- what you use to pay for something under $10
- your rating that you have that credit companies look at before giving you a loan
- a loan you take out for yourself
- points that you get for using your credit card
- when you put a security deposit on your card
- the credit card set up that allows parents to pay if a student can't
25 Clues: Renting for a car • when you owe money • a loan for your home • a loan for a vehicle • interest rate that changes • close ended credit accounts • interest rate that doesnt change • a loan you take out for yourself • what you take out to get money now • the money that builds up over time • the only source of revolving credit • when your loan isnt tied to an asset • ...
Unit 5 Lab 2023-10-23
Across
- Cardiovascular disease.
- A test that is done while you are exercising.
- Root word for small vessels.
- Cardiac rhythm management
- Any abnormal rhythm of the heart: too slow, too fast, or at an irregular beat or tempo.
- Peripheral vascular disease
- This reads your heart’s electrical impulses.
- This gives a picture of your heart using ultrasound, a type of X-ray
- Root word for heart.
- Networks of small vessels that perfuse tissues.
- Thin folds of the endocardium with a core of dense connective tissue.
- Used to measure the substances and show if, and how much of, your heart muscle has been damaged.
- Pumps blood through the cardiovascular system.
Down
- Vessels that deliver blood to tissues.
- A special dye is injected into your coronary arteries and an X-ray is taken.
- The heart not pumping blood as well as it should.
- Occurs because of blockage in a blood vessel that delivers blood and oxygen to the brain.
- The term for diseases of the heart muscle.
- Root word for aorta.
- When the heart muscle is cut off from the oxygen it needs to operate.
- Vessels that return blood to the heart.
- Transient ischemic attack
- Atrial fibrillation
- Root word for disease.
- Root word for artery.
25 Clues: Atrial fibrillation • Root word for aorta. • Root word for heart. • Root word for artery. • Root word for disease. • Cardiovascular disease. • Cardiac rhythm management • Transient ischemic attack • Peripheral vascular disease • Root word for small vessels. • Vessels that deliver blood to tissues. • Vessels that return blood to the heart. • The term for diseases of the heart muscle. • ...
RU ITEC411 Failures and Errors in Computer Systems 2023-12-01
Across
- A person who writes and develops computer programs, using a programming language.
- Outdated computer systems, software, or technology that is still used.
- Manipulation or setup in a way to achieve a specific outcome.
- Standardized rules and conventions that govern communication between systems.
- The process of verifying the identity of a user or device.
- An individual who interacts with a computer system.
- Potential dangers or risks to computer systems, networks, and data.
- The complete breakdown or malfunction of a computer system.
- The process of managing and overseeing operations and maintenance of computer systems.
- Additional devices connected to a computer, such as printers, scanners, or external drives.
Down
- An expert or specialist in the field of computers.
- A design or system that incorporates measures to prevent the impact of a mistake.
- A flaw or unintended error in a software program that causes weird behavior.
- Information used to verify the identity of a user.
- A structured collection of data, often used for efficient data management.
- Technique used by attackers to take advantage of vulnerabilities in a system.
- A person who has acquired knowledge and skills through formal education.
- Systems whose failures could result in great harm.
- The unauthorized use of someone else's personal information.
- A Mistake or fault in a computer program.
20 Clues: A Mistake or fault in a computer program. • An expert or specialist in the field of computers. • Information used to verify the identity of a user. • Systems whose failures could result in great harm. • An individual who interacts with a computer system. • The process of verifying the identity of a user or device. • ...
Networking n.1 2023-11-29
Across
- It can be Variable length or fixed length
- It happens when transmissions occur at the same time
- The amount of data that can be transferred from one point to another in a given time period
- Third parameter of the Cisco command for entering static routes
- A tool to check network connectivity
- Cisco command to deactivate an interface on the router
- Device that forwards data packets to the appropriate parts of a computer network
- Cisco command for changing the name of a device
- A device for connecting multiple network devices and multiple segments
- Automatic switching to a backup computer system in the event of system failure
Down
- It can be MAC or IP
- Formatted unit of data sent across networks
- When it becomes zero, the packet is discarded
- Medium Access Protocol, which can be of the CA (Collision Avoidance) or CD (Collision Detection) type
- Device which converts between digital and analogue signals, e.g. telephone line to computer
- Software or hardware that requests services from a server
- IP .... Cisco command for entering static routes
- Ethernet procedure used to handle collisions during transmissions
- A set of rules or standards that control communication between devices
- Software that provides services to a client, or the hardware that is running it
20 Clues: It can be MAC or IP • A tool to check network connectivity • It can be Variable length or fixed length • Formatted unit of data sent across networks • When it becomes zero, the packet is discarded • Cisco command for changing the name of a device • IP .... Cisco command for entering static routes • It happens when transmissions occur at the same time • ...
Powered Up 2024-02-01
Across
- see energy from the sun.
- a generic term for non-renewable energy sources such as coal, coal products, natural gas, derived gas, crude oil, petroleum products and non-renewable wastes
- a pipe or hole through which water or gas may escape.
- A standard desktop computer
- to produce electricity.
- a computer where information is stored that’s connected to a network of other computers.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- changes the electric current’s direction.
- a worldwide system of computer networks
- a person who designs, builds, or maintains engines, machines, or public works.
Down
- make smaller or less in amount, degree, or size.
- Light from the sunel
- the atoms that make up the material’s surface.
- is too remote to access electricity from the regular power grid.
- a way of generating electricity by harnessing the sun’s rays.
- a form of electric current that flows in only one direction.
- a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
- the devices that would convert sunlight into electricity.
- a form of energy resulting from the existence of charged
- not by means of the internet or other computer network.
20 Clues: Light from the sunel • to produce electricity. • see energy from the sun. • A standard desktop computer • a worldwide system of computer networks • changes the electric current’s direction. • the atoms that make up the material’s surface. • make smaller or less in amount, degree, or size. • a pipe or hole through which water or gas may escape. • ...
Internet Business Associate 2024-02-27
Across
- A public key encryption algorithm
- A server that mediates traffic between a protected network and the Internet.
- A machine that shares its resources among clients
- a concept or collection of symbols associated with a product, service or person
- The practice of categorizing online content through tags
- An encrypted file transfer protocol
- A web page that integrates content and scripts from multiple web sites to create new applications
- A computing paradigm in which users can use software over the Internet
- A worldwide network of interconnected networks
- A web... who creates the overview plan of a sites development
- Data processed by protocols so it can be sent across a network
- Encrypting and decrypting email messages
Down
- A system that maps uniquely hierarchical names to specific Internet addresses
- A Web 2.0 programming language that consists of existing technologies
- A set of instructions or rules
- A problem solving model in which a task is given to a group of people rather than one.
- A measurement of memory needed to store one 8 bit character
- a computing language used to program Web 1.0
- An individual computer on a network
- Modulator Demodulator
- The integration of telephony and data technologies
- A circuit board that enables a computer to connect to a network
- Outgoing mail server
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Unit 4 Review APCSP 2024-03-26
Across
- Method of encryption that does not require a secure channel to exchange keys
- Pop Up Advertisements
- Identifying and correcting errors and inconsistencies in data
- Attempt to trick a user into divulging their private information
- software intended to damage a computing system or to take partial control over its operation
- Steals data and sends it back to malware creators
- Social Media,Phones, Laptops, WWW, email are all types of...
- Name, birthday, social security, address, etc.
- System that monitors incoming and outgoing network traffic
- What people look for when analyzing big data?
Down
- Exhausting all possible combinations
- Wireless access point that gives unauthorized access to secure networks.
- Finding solutions to problems that would otherwise take forever to solve using only human capabilities
- Practice of engaging a group for a common goal
- Pair of keys used to encrypt and decrypt
- Protects a computer by scanning files and identifying malware
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- Holding an computer hostage by encrypting data
- Attacks that cause a website to slow down by flooding it with requests
- Authentication that requires at least two steps to unlock protected information
20 Clues: Pop Up Advertisements • Exhausting all possible combinations • Pair of keys used to encrypt and decrypt • What people look for when analyzing big data? • Practice of engaging a group for a common goal • Holding an computer hostage by encrypting data • Name, birthday, social security, address, etc. • Steals data and sends it back to malware creators • ...
Foundation of Security and Cybercrime 2024-11-19
Across
- anticipation of security incidents and planning for measures to be taken.
- an individualwho breaks into computer systems to steal, change, or destroy information
- unauthorized access of or interference with computer systems, servers, or other information and communication systems
- the use of electronic communication to bully a person
- an act or instance of using/closely imitating the language and thoughts of another author without authorization
- personnel, hardware, programs, networks, and data
- malicious program disguised as or embedded within legitimate software
- state of wel-being of information or infrastructure
- action taken in advance to protect the system against potential threats or dangers.
Down
- common type of online fraud
- applications on the computers and operating systems
- fraudulent practice of sending emails purporting to be someone reputable
- ensuring that the information is accessible to authorized persons when required without delay
- includes creating backup copies, malware management, and ensuring sufficient space and memory.
- malicious software
- wireless fidelity
- an assurance for which someone cannot deny something
- an action or event with potential to compromise and/or violate security.
- exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
- mass distribution of unsolicited messages, advertisements, and/or pornogaphy
20 Clues: wireless fidelity • malicious software • common type of online fraud • personnel, hardware, programs, networks, and data • applications on the computers and operating systems • state of wel-being of information or infrastructure • an assurance for which someone cannot deny something • the use of electronic communication to bully a person • ...
The Internet 2025-02-07
Across
- The amount of data that can be sent over an internet connection in a given time.
- A high-speed internet connection that is always on.
- A device that connects multiple devices to the internet.
- The process of converting data into a secret code to protect it.
- A company that provides internet access.
- Software that secretly collects information from a device.
- A security system that blocks unauthorized access to a network.
- A system that translates website names into IP addresses.
Down
- Protection of internet-connected systems from attacks.
- Breach When private data is accessed without permission.
- Backbone The high-speed global infrastructure that connects networks and data centers.
- Authentication A security process requiring two steps to log in.
- Small files stored on a device to track user activity online.
- A service that encrypts internet connections for privacy.
- Malicious software designed to harm or steal information.
- A device that connects to the internet through a service provider.
- Address A unique number assigned to each device on the internet.
- A scam where attackers trick users into revealing personal information.
- A wireless network that allows devices to connect to the internet.
- Computing Storing and accessing data over the internet instead of a local device.
20 Clues: A company that provides internet access. • A high-speed internet connection that is always on. • Protection of internet-connected systems from attacks. • Breach When private data is accessed without permission. • A device that connects multiple devices to the internet. • A service that encrypts internet connections for privacy. • ...
Chapter 3 2025-02-25
Across
- public Wifi network called _____
- systems use analog techniques to encode binary
- point to point topologies are used with wireless networks called _____
- The error checking code in an Ethernet Frame's trailer
- installed in a physical bus
- ___access method, in which an acknowledgment is required for every packet sent
- when electricity bounces off the end of a cable and back in the other direction
- occurs if two or more devices on the same medium transmit simultaneously
- signals arriving at different times
- the actual application to application data transfer speed is the ___
Down
- solid objects absorb radio signals, causing them to ___
- The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, known as ____
- cabling used to communicate between LANs or between switches
- ______ Ethernet, defined by IEEE 802.3i
- the path data travels between computers on a network is considered the network’s ____
- the simplest topology
- transmission method sends digital signals in which each bit of data is a pulse of electricity
- wireless networking, known as Wireless Fidelity
- network technology provides reliable transport of data, slow to current standards
- The 802.11n standard takes much of what works in the earlier standards and improves on it by adding ____ antennas
20 Clues: the simplest topology • installed in a physical bus • public Wifi network called _____ • signals arriving at different times • ______ Ethernet, defined by IEEE 802.3i • systems use analog techniques to encode binary • wireless networking, known as Wireless Fidelity • The error checking code in an Ethernet Frame's trailer • ...
Tech Terms 3 2025-04-16
Across
- Wide Web Interconected public webpages
- Right protecting creations from theft
- Computer programming language
- Global network of billions of devices
- Program manages access to a resource
- Read-only memory
- Smallest unit of data
- File that lets you share documents
- Gap of who has internet access and who doesn't
- Open Source Software
- start or restarting a computer
- Data that is 8 binary digits long
- 1 million bytes
- Random access memory
- Language for creating web pages
- Files of imformation that web server send to web browser
- Regularly updated website
- Sending from one device to another
- Converting data into a code
- Internal or External componet that stores data
Down
- 3-dimentional environment
- Connects 2 or more networks
- local area network
- Block unauthorized access
- What a computer does
- that manages hardware and software resources
- Web browser
- Central processing unit
- Network address for you computer
- Output Device
- Search engine
- Backup information on a computer
- Domain name system
- Converts data from digital format to one that is suitable for an analog transmission
- Main printed circuit board
- Input Device
- program to prevent viruses
- Address of resource on the internet
- Information used to trace indentities
39 Clues: Web browser • Input Device • Output Device • Search engine • 1 million bytes • Read-only memory • local area network • Domain name system • What a computer does • Open Source Software • Random access memory • Smallest unit of data • Central processing unit • 3-dimentional environment • Block unauthorized access • Regularly updated website • Main printed circuit board • program to prevent viruses • ...
Chapter 7 Security Plus 2024-10-03
Across
- An access control scheme that is the least restrictive
- injects stolen username and password across multiple websites
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
- small device that looks like a thumb drive which can be used for verification
- enables users to access a network resource through a directory service
- small number of passwords used when trying several different user accounts
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- features and characteristics of the individual
- Removing user accounts
- An access control scheme that is the most restrictive
- password attack attempting thousands of combinations per second
Down
- Single sign-on for networks owned by different organizations
- software designed to break passwords
- Using more than one type of authentication credential
- Requiring the user to provide proof that they are the unique user.
- Granting access that is limited
- key stretching algorithms
- Standard preconfigured passwords
- evidence or proof of something
- allows secure web domains to exchange user authentication and authorization data
- The point in time when a password is no longer valid
- An open-source federation framework
- provide control over user validation and the resources that may be accessed
25 Clues: Removing user accounts • key stretching algorithms • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • software designed to break passwords • A key pair “burned” into a security key • The ability of systems to exchange information • features and characteristics of the individual • ...
Electrical 2024-07-24
Across
- The generation of an electromotive force (EMF) in a conductor due to changes in magnetic field.
- Booster, Transformer used to control real power on parallel networks.
- Group, Defines the phase difference primary to secondary
- Cosine rule states what? divided by the hypotenuse
- A law which says current is the voltage divided by the resistance
- √2 divided by RMS Voltage
- The opposition to AC current
- (left Rule) Magnetic field points away, current direction is 90 degrees right, which direction is the FORCE
- Describes generation such as wind and hydro
- Physicist who said the sum of currents into a node equal the sum of currents leaving the node
- Changer, Mechanism which adjusts turns ratio in a transformer
- Odd multiples of the 3rd harmonic
Down
- Type of fault with zero resistance between conductors
- Normal direction of phase rotation
- Sinusoidal wave an Integer multiple of the fundamental
- Percentage change in output voltage from no load to full load
- Voltage measured between live and neutral
- Factor Term describes the ratio between active and apparent power
- Type of fault through a normally insulating medium, has resistance
- Factor, The rise (ratio) phase-to-ground voltage (healthy phases) during ground fault
- Name for power that is true/real and measured in watts
21 Clues: √2 divided by RMS Voltage • The opposition to AC current • Odd multiples of the 3rd harmonic • Normal direction of phase rotation • Voltage measured between live and neutral • Describes generation such as wind and hydro • Cosine rule states what? divided by the hypotenuse • Type of fault with zero resistance between conductors • ...
Chapter 6 - Innovation through Artificial Intelligence 2024-07-11
Across
- Filtering AI algorithms filtering emails to protect users.
- Language Processing (NLP) Deals with computer-human interaction using language.
- Assistant A type of personal assistant powered by AI.
- Essential for machine learning to identify patterns and make decisions.
- A context where AI can predict traffic conditions.
- Recognition: Siri is an example of this technology.
- A concern regarding AI's impact on human employment.
- systems: Utilize human knowledge to solve problems requiring expertise.
- Impacted by AI, as discussed in the lecture on AI's societal effects.
- What expert systems aim to improve in workplaces.
- An essential component of AI where systems improve from experience.
- Vision: Allows computers to interpret visual information.
Down
- Google's AI for search query analysis.
- Learning A technique that automates analytical model building.
- The next lecture topic following Innovation through AI.
- Using AI to monitor environments through video.
- A wide use of AI systems in various industries.
- Text Technology that suggests words during typing.
- Building machines that perform physical tasks.
- A company behind RankBrain and major advancements in AI.
- Networks: A type of network involved in machine learning.
- Media Services enhanced by AI for better user engagement.
- A robot assisting with social media interaction and health reminders.
- Facebook's facial recognition technology.
- Therapy Can be administered through expert systems.
25 Clues: Google's AI for search query analysis. • Facebook's facial recognition technology. • Building machines that perform physical tasks. • Using AI to monitor environments through video. • A wide use of AI systems in various industries. • What expert systems aim to improve in workplaces. • Text Technology that suggests words during typing. • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
IITA List of Programme KPIs -(2024 - 2030) 2025-03-17
Across
- Number of people trained in group trainings on IITA products, including researchers, farmers, and others.
- Number of proposals developed to support gender, youth, and social participation.
- Number of active partnerships with NARES and external agricultural research institutes.
- Number of IITA products incorporated into product catalogs (e.g., TAAT, AICCRA).
- Number of outreach events promoting collaboration with NGOs, IFIs, etc.
- Percentage of IITA products adopted by partners for large-scale implementation.
- Number of new or improved crop varieties released.
- Annual rate of genetic improvement in crops, measured as a percentage.
- Scientific publications and findings contributing to agricultural knowledge.
- Participation in global discussions, conferences, and research networks.
- Evaluating the influence of IITA’s projects on agricultural development.
Down
- Percentage of projects that address diet, health, and nutrition-related objectives.
- Number of peer-reviewed papers made available through open-access repositories.
- Research products or services reaching end-users effectively.
- Ensuring long-term viability of agricultural innovations and research.
- Number of students trained, disaggregated by qualification type (M.Sc. or Ph.D.) and gender.
- The core field of IITA’s research, focused on food security and development.
- Number of papers published in journals with an impact factor greater than 10.
- Number of plant genetic accessions available and safely duplicated by crop.
- Amount of financial resources secured for research and product delivery.
20 Clues: Number of new or improved crop varieties released. • Research products or services reaching end-users effectively. • Ensuring long-term viability of agricultural innovations and research. • Annual rate of genetic improvement in crops, measured as a percentage. • Number of outreach events promoting collaboration with NGOs, IFIs, etc. • ...
crossword for AP world vocab 2025-10-31
Across
- paper money
- an agricultural expression of hinduism and largest religious structure in the premodern world
- inns located along the trade routes from east med to china
- encompassed 25000 square miles and linked some 150 outlying settlements to the main centers
- Swahili civilization participated in the larger Indian ocean
- like Malacca and the fronteir of expanding the Islamic world
- widely traveled Arab scholar, Marchant, and public official
- traveling poets. musicians, and storytellers who maintain oral tradition of west africa
- a symbol than daily activity
Down
- a north American chiefdom that lay at the center of widespread trading networks
- increased food production and led to population growth and organization
- ruler of Mali and possibly the richest man ever
- had their own neighborhoods in the city which act as intermediaries between government and the foreign merchants
- rejected the religous aspects of Buddhism and daoism but appreciated the might moral standards
- amitabna ensured rebirth as a heavenly realm
- captain that sought to enroll distant people and states
- commerate the beginning of Islamic rule in the region after defeating the last Hindu ruler
- used their triangular sails sewing boards of hull together
- could go 10 days without water and cross the Sahara better
- the Chinese chan school of Buddhism became zen in japan
20 Clues: paper money • a symbol than daily activity • amitabna ensured rebirth as a heavenly realm • ruler of Mali and possibly the richest man ever • captain that sought to enroll distant people and states • the Chinese chan school of Buddhism became zen in japan • inns located along the trade routes from east med to china • ...
Technology in education 2025-10-13
Across
- Using devices students bring from home to school
- Storing and accessing files remotely rather than locally.
- Short for Artificial Intelligence
- Remote delivery of audio/video lessons in real time or recorded
- Popular format of online courses often open to many learners
- Digital place where students collect evidence of learning
- Core term for information transmitted via networks — the global network
- Skills for finding, evaluating, using digital information
- Use of data to improve teaching and learning
- Practice of making learning fun with game elements.
- Learning model where students watch lectures at home, do activities in class.
- Teaching/learning through the internet — two words often hyphenated
Down
- Measurement of student performance; tests and feedback.
- Connecting and working together online; team learning.
- School system software that manages student records
- Platform schools use to host courses, materials, grades
- Technology-driven physical machines used in STEM learning.
- Technology that overlays digital info on the real world
- Course material delivered as downloadable, editable files
- Online collections of openly licensed teaching materials
- Hands-on mix of science, tech, engineering, arts and math in education.
- Process of turning lessons into short video/audio clips teachers can share.
- Small software programs on phones; short for applications
- Programming activity often taught to students
- Using simulated environments for immersive learning
25 Clues: Short for Artificial Intelligence • Use of data to improve teaching and learning • Programming activity often taught to students • Using devices students bring from home to school • School system software that manages student records • Practice of making learning fun with game elements. • Using simulated environments for immersive learning • ...
ASEANPOL 2025-09-22
Across
- Efforts to stop acts of terror
- The systematic process of gathering, documenting, and using data in investigations
- Illegal drug production, distribution, or use
- Working jointly, especially by sharing information or resources
- Abbreviation for ASEAN Police — ASEAN____
- Crime involving money-based wrongdoing
- Fundamental entitlements and freedoms of people
- Information especially secret or confidential used for strategic purposes
- Association of Southeast Asian Nations
- Illegally importing or exporting goods
- Teaching or preparing members in skills or knowledge
- Large-scale criminal enterprises (plural)
- Efforts to stop bad things before they happen
- The act of working together toward a common goal
Down
- Crime that crosses digital networks
- Official inquiries or probes
- An area or part of the world
- Countries that belong to a group
- Ability, skills, or resources that allow action
- The carrying out of planned tasks or missions
- Across multiple nations
- Relating to boundaries between countries
- The legal authority to make decisions or judgments
- A planned set of actions toward achieving something
- Material proof presented in legal cases
- International police organization
- The action of transporting illegal goods or people
- State of being free from danger or threats
- Capital city where many ASEANAPOL meetings are held
- Formal agreement or rules governing behavior
30 Clues: Across multiple nations • Official inquiries or probes • An area or part of the world • Efforts to stop acts of terror • Countries that belong to a group • International police organization • Crime that crosses digital networks • Crime involving money-based wrongdoing • Association of Southeast Asian Nations • Illegally importing or exporting goods • ...
Cyber Crossword 2025-10-30
Across
- crime investigation; comes after “digital”
- attack stage involving traversal between systems
- slang term for “hacked”
- attack component that performs the target malicious action
- to gain attacker presence on a system
- field focusing on protecting computers
- attack stage where NMAP may be used
- facility whose analysts may use a SIEM
- investigation of system and network records
- principle of least ___
- phrase an attacker says after gaining access
- network layer protocol with pings
- THE defensive cyber club
- fancy term for Google-fu
- smartcards using close-proximity communication
- fun term for a CDRU member
- evidence of malicious activity
- evil computer program
Down
- short form of “covered writing”
- comes before “base” or “science”
- a tantalizing trap for attackers
- engineering type that works on people
- act of sending a malicious email
- the shield to red’s sword
- authorized cyberattack to identify vulnerabilities
- proactive defense, or our theme this semester
- bypassing physical security devices without a key
- IT person in charge of organization computers
- act of smuggling data from a system
- common term for offensive security person
- short form of “secret writing”
- often a network packet filter
- collections of connected computers
- either 0 or 1
34 Clues: either 0 or 1 • evil computer program • principle of least ___ • slang term for “hacked” • THE defensive cyber club • fancy term for Google-fu • the shield to red’s sword • fun term for a CDRU member • often a network packet filter • short form of “secret writing” • evidence of malicious activity • short form of “covered writing” • comes before “base” or “science” • ...
Rykov's Crossword 2025-06-07
Across
- Tech reducing human effort in business
- Fixing errors in software
- First line of defense in security
- Driving force behind tech and business merging
- Directs traffic in enterprise networks
- Provides managed services
- Tracks health or security activity
- Growing media startup format
- Concern in surveillance debates
- Merging systems for seamless function
- Virtual boundary for location alerts
- Writes code for software solutions
- Pending tasks in Agile development
- Key to user-friendly design
- Formalizes service expectations
- Scramble data for protection
- Society embracing new tech
- Extending a service agreement
- Risk in digital transactions
Down
- Plan for project milestones
- Safeguard against data loss
- When systems are unexpectedly offline
- Radical change from new tech adoption
- Combined power of converging industries
- Modern way to watch television
- Pocket-sized tech revolutionizing life
- Consequence for missing SLA terms
- Mobile payments speeding up retail
- King in digital media
- Backbone of data centers
- Threat to banking and data safety
- Bridge between phone and laptop
- Device reading barcodes in stores
- Measuring user interaction
- Blocks unauthorized network access
- Remote doctor visits via tech
- Data capacity of a network
- Meeting regulations in healthcare
- Critical project milestone
- Billing for services rendered
40 Clues: King in digital media • Backbone of data centers • Fixing errors in software • Provides managed services • Measuring user interaction • Data capacity of a network • Critical project milestone • Society embracing new tech • Plan for project milestones • Safeguard against data loss • Key to user-friendly design • Growing media startup format • Scramble data for protection • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital content
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
Chapter 10 Communication 2025-09-28
Across
- — Everyone sees who was copied.
- — Any unsolicited email sent over the internet.
- — A worldwide collection of interconnected networks.
- — Websites that allow any user to create and edit pages with a web browser.
- networking sites — Sites for building online communities with shared interests and activities.
- — The address of a web page on the WWW.
- — Personal internet journals with observations and links.
- — The recipient’s name is hidden from everyone else.
- — A computer network based on internet technology but for internal organisational needs.
- — A part of the internet which users can access using web browser software.
- — Sends the original message and all previous history to a new person.
- — Software that displays a web page on a computer screen.
Down
- — The language used in emails should follow an acceptable code of practice.
- — Online discussion boards moderated by an administrator.
- — Allow intranets to be extended outside the organisation.
- — Send out multiple emails if addresses are grouped together under a single name.
- — A company that provides internet access, usually for a monthly fee.
- — Contain a combination of letters, numbers, and other symbols (e.g., Sy12@#TT90kj=0).
- — A shortened form of the phrase "internet etiquette," meaning respect and courtesy online.
- — The file is visible and available for the recipient to download.
20 Clues: — Everyone sees who was copied. • — The address of a web page on the WWW. • — Any unsolicited email sent over the internet. • — A worldwide collection of interconnected networks. • — The recipient’s name is hidden from everyone else. • — Online discussion boards moderated by an administrator. • — Personal internet journals with observations and links. • ...
urmumsbum 2021-10-29
Across
- what is the acronym for Plain Old Telephone Service?
- what is re-booting a device either with a cold or warm boot called?
- what is the type of file that organises other files in a hierarchal structure?
- what is it called when you turn off a computer by pressing and holding down the power button until the system turns off? (two words)
- what is the acronym for 'post office protocol'?
- what is the device that routes traffic between networks?
Down
- what is a one-to-one connection? (3words)
- what is the interface on the computer or device where a device is connected?
- what is the acronym for pages per minute?
- what is the one piece of data along with a destination address used in a packet switching network called?
10 Clues: what is a one-to-one connection? (3words) • what is the acronym for pages per minute? • what is the acronym for 'post office protocol'? • what is the acronym for Plain Old Telephone Service? • what is the device that routes traffic between networks? • what is re-booting a device either with a cold or warm boot called? • ...
Mich Security 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- tool Programming language that allows applets to run within a web browser.
- Technology created by Microsoft to control interactivity on web pages.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
Down
- Also known as junk mail, is unsolicited e-mail.
- A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
- Gains access to resources on devices by pretending to be a trusted computer.
- Or malware is a file or program other then a virus that is potentially harmful.
- Is a self-replicating program that is harmful to networks.
10 Clues: Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a program written with malicious intent and sent out by attackers. • Technology created by Microsoft to control interactivity on web pages. • ...
ISM221 2023-03-02
Across
- Combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
- Innovation type that changes made to make a process more efficient.
- A set of instructions, data or programs used to operate computers and execute specific tasks
- ____is a computer program application used to improve a company's decision-making capabilities.
Down
- Full lifecycle of a product or process, including material sourcing, production, consumption and disposal/recycling processes
- Mode of computer data storage in which digital data is stored on servers in off-site locations.
- The way materials and other goods are brought into a company
- all the physical parts that make up a computer.
- ____is a collection of facts
- A type of management support system that facilitates and supports senior executive information and decision-making needs
10 Clues: ____is a collection of facts • all the physical parts that make up a computer. • The way materials and other goods are brought into a company • Innovation type that changes made to make a process more efficient. • A set of instructions, data or programs used to operate computers and execute specific tasks • ...
Risk Management 2023-03-06
Across
- Location that consists of everything that a business needs except computers
- Process of downgrading-undoing a recently applied patch or updated
- Documents that set out how to limit damage and recover quickly from an incident
- Open source tool for penetration testing many aspects of wireless networks
- Contract that defines the services, products, and time frames for the vendor to achieve
Down
- Process of documenting significant changes to the network
- Set of procedures defining actions employees should perform to protect the network's security
- Popular and extremely comprehensive vulnerability testing tool
- Document used to track the collection, handling, and transfer of evidence
- A unique tool that enables a penetration tester to use a massive library of attacks as well as tweak those attacks for unique penetrations
10 Clues: Process of documenting significant changes to the network • Popular and extremely comprehensive vulnerability testing tool • Process of downgrading-undoing a recently applied patch or updated • Document used to track the collection, handling, and transfer of evidence • Open source tool for penetration testing many aspects of wireless networks • ...
HSP3C Exam Review 2023-01-20
Across
- Things like eye color, hair color, and physical attributes are inherited from parents' genes.
- The scientific study of humans, including their origins, behavior; and physical, social, and cultural development.
- the scientific study of social behavior or society, including its origins, development, organization, networks, and institutions.
- to understand human society, culture, actions, attitudes, and behavior.
- Standards of what is important, good, true, and ethical
Down
- Study of bone and stone remains of our ancient ancestors.
- type of learning in which an unconditional stimulus is paired with a neutral stimulus, leading to a conditioned response
- Focuses on life experiences and connections between the conscious and unconscious mind
- The study of the origins and cultures of different races and peoples.
- Feeling that one’s values and lifestyles are superior to others.
10 Clues: Standards of what is important, good, true, and ethical • Study of bone and stone remains of our ancient ancestors. • Feeling that one’s values and lifestyles are superior to others. • The study of the origins and cultures of different races and peoples. • to understand human society, culture, actions, attitudes, and behavior. • ...
Artificial Intelligence 2023-04-26
Across
- a Technique used by AI systems to learn and improve from experience without being explicitly programmed.
- The branch of AI that deals with the design, construction, and operation of robots.
- a type of AI that mimics the structure and function of the human brain.
- the ability of an AI system to understand and interpret human language.
- A set of instructions or rules followed by a computer program to solve a problem.
- The use of AI to enhance human intelligence and decision-making.
Down
- an AI system designed to simulate conversation with human users.
- an AI system that uses knowledge and expertise to solve complex problems.
- a subfield of machine learning that uses neural networks to analyze large amounts of data.
- The ability of an AI system to interpret and understand visual information.
10 Clues: an AI system designed to simulate conversation with human users. • The use of AI to enhance human intelligence and decision-making. • the ability of an AI system to understand and interpret human language. • a type of AI that mimics the structure and function of the human brain. • an AI system that uses knowledge and expertise to solve complex problems. • ...
History of Computers 2020-05-08
Across
- responds to the rhythm of voice commands and delivers wisecracks pre-recorded on 78 rpm records.
- a short story detailing a world where computers, called Logics,
- Created by David Jones and Mike Dailly,
- funds the outfitting of a packet radio research van at SRI to develop standards for a Packet Radio Network (PRNET).
- becoming a major supplier of corporate network services
Down
- emerges as the dominant object-oriented language in the computer industry when Bjarne Stroustrup publishes the book
- connected via to New York over special telephone lines.
- had been a modest experimental network of networks owned by the U.S. government.
- a book has a major influence on research into artificial intelligence and control systems.
- read-only rope memory is launched into space aboard the Apollo 11 mission
10 Clues: Created by David Jones and Mike Dailly, • connected via to New York over special telephone lines. • becoming a major supplier of corporate network services • a short story detailing a world where computers, called Logics, • read-only rope memory is launched into space aboard the Apollo 11 mission • ...
GZ MAG 6 2020-11-06
Across
- softens the dirt within the pores.
- prejudice directed against a person or people groups on the basis of their membership in a particular racial or ethnic group.
- a chemical that improves a person's mood.
- one of the worst things you could apply to your face.
- showing the hole essence of what you are trying to show to the audience.
- putting yourself in a place where people can see how you work.
Down
- practice of defending computers, mobile devices, electronic systems, networks, and data from malicious or cyber-attacks.
- a store with style that inspires young people to feel confident about themselves when dressing up.
- refers to a change or shift along with a curve on a graph of price versus quantity.
- artistry a way to express yourself, boost your confidence, and show it off.
10 Clues: softens the dirt within the pores. • a chemical that improves a person's mood. • one of the worst things you could apply to your face. • putting yourself in a place where people can see how you work. • showing the hole essence of what you are trying to show to the audience. • artistry a way to express yourself, boost your confidence, and show it off. • ...
CMT Crossword 2016-12-20
Across
- - a telephone line built with a solid transmission medium
- - An acronym for World Wide Web
- - A site or area on the Internet that is accessed by its own Internet address.
- - a device that modulates an analog carrier with digital data
- - Sending and receiving electronic messages through a computer network.
- - a company that provides access to the internet for a monthly fee.sending and receiving information electronically between two or more computers.
Down
- - Referring to 'Wireless networks
- - a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio
- - To transfer a file or program from a central computer to a smaller computer or to a computer at a remote location.
- - Software used to view the Internet, it translates the HTML code
10 Clues: - An acronym for World Wide Web • - Referring to 'Wireless networks • - a telephone line built with a solid transmission medium • - a device that modulates an analog carrier with digital data • - Software used to view the Internet, it translates the HTML code • - Sending and receiving electronic messages through a computer network. • ...
Access Network-Crossword 2019-09-26
Across
- A device that connects two or more networks and forwards packets among them
- A means of delivering information to all members in a network.
- A communication channel whose transmission rate is lower than 2 Mbit/s
- Outer part of the optical fiber
- The sum of the service usage, consumption, and recharge fees of a subscriber.
Down
- It is used for splitting and sending optical power to multiple ONUs connected by an optical fiber
- A term that indicates the capacity with enough bandwidth to transmit voice, data and video signals.
- A process in which multiple channels of low-rate signals are multiplexed into one or several channels of required signals.
- A device that terminates the fiber optical network at the customer premises
- A process of transmitting data packets from one source to many destinations.
10 Clues: Outer part of the optical fiber • A means of delivering information to all members in a network. • A communication channel whose transmission rate is lower than 2 Mbit/s • A device that connects two or more networks and forwards packets among them • A device that terminates the fiber optical network at the customer premises • ...
Payments Crossword 2023-07-31
Across
- Payment disbursements made by a business to its various stakeholders, including customers, employees, vendors, suppliers, and channel partners
- Financial intermediary between merchants and card payment networks enabling a merchant to accept card payments
- Card scheme or payment network launched by National Payments Corporation of India
- Accounting process that compares logged financial records with bank entries
- Global payments network
Down
- Process of replacing the payment card account numbers with a unique digital identifier for enhanced data security
- Fund transfer by an issuing bank from the merchant's account to the customer's account when customer raises a payment dispute with the bank
- Global standard for secure payment messaging
- Central bank digital currency launched by RBI in retail & wholesale versions
- Unique identifier for an individual or a business on UPI to enable payment transactions
10 Clues: Global payments network • Global standard for secure payment messaging • Accounting process that compares logged financial records with bank entries • Central bank digital currency launched by RBI in retail & wholesale versions • Card scheme or payment network launched by National Payments Corporation of India • ...
Word Hike 2023-10-09
Across
- A hierarchical data structure consisting of nodes, with each node having child nodes.
- The process of finding and fixing errors or issues in a program.
- A program that translates source code into machine code or bytecode.
- The global network of interconnected computer networks.
- A reusable block of code that performs a specific task or operation.
Down
- A structured collection of data that is organized for efficient retrieval and manipulation.
- A set of instructions written in a programming language that tells a computer what to do.
- A linear data structure that holds a sequence of elements, allowing for dynamic resizing.
- The set of rules that dictate how code should be structured in a programming language.
- Data provided to a program, often entered by a user or from another source.
10 Clues: The global network of interconnected computer networks. • The process of finding and fixing errors or issues in a program. • A program that translates source code into machine code or bytecode. • A reusable block of code that performs a specific task or operation. • Data provided to a program, often entered by a user or from another source. • ...
Stay Safe in the Digital World 2025-03-25
Across
- A strong password should include a mix of these, along with letters and special characters.
- A network that allows you to securely browse the internet
- A method that adds an extra layer of security, requiring both a password and a code
- To make sure your operating system and software are protected from known vulnerabilities, you need to do this
Down
- The digital currency often used in ransomware attacks
- A setting method of limiting who can see your personal details on social media and online platforms.
- The process of saving your important data so you can recover it
- A suspicious email, message, or website designed to steal your personal information.
- software that helps detect and prevent malicious attacks on your computer.
- This tool is essential for protecting your personal information from hackers on public networks.
10 Clues: The digital currency often used in ransomware attacks • A network that allows you to securely browse the internet • The process of saving your important data so you can recover it • software that helps detect and prevent malicious attacks on your computer. • A method that adds an extra layer of security, requiring both a password and a code • ...
DEB 2025-10-10
Across
- – A smartphone’s __________________ is the flat display surface used to view apps, videos, and images.
- – A device used to supply electrical energy to the smartphone’s battery. __________________.
- – __________________ life determines how long a smartphone can run before needing to be charged.
- – The __________________ card is a small chip that allows smartphones to connect to mobile networks.
Down
- – __________________ is a wireless technology used to connect a smartphone with other devices.
- – __________________ sensor allows users to unlock their smartphones securely using their touch.
- – The total amount of data that can be saved on the device is called __________________ capacity.
- – The __________________ is the brain of the smartphone that controls all functions and performance.
- – A smartphone feature used to take photos and record videos is called a __________________.
- – __________________ are software programs installed on smartphones for performing specific tasks.
10 Clues: – A device used to supply electrical energy to the smartphone’s battery. __________________. • – A smartphone feature used to take photos and record videos is called a __________________. • – __________________ is a wireless technology used to connect a smartphone with other devices. • ...
Non-GT Cyber Security Fun Quiz 2025-09-23
Across
- A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
- _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
- The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
- A program designed to spread from one computer to another is called a _ _ _ _ _.
- The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
- The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
- _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
- The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
- A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
- A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.
10 Clues: The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _. • A program designed to spread from one computer to another is called a _ _ _ _ _. • A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet. • A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information. • ...
crossword inquizitive 2018-04-20
4 Clues: / Number of non-zero singular values. • / Method to train deep neural networks. • / The concept used to check the continuity of a function at a point. • / Layer that uses a gating mechanism to control the information flow.
Satellite Communication And Networks 2019-03-12
5 Clues: Equatorial orbit is sometimes called as • Link between satellite and earth station • Reliability curve in Satellite communication • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
INTRODUCING TODAY'S TECHNOLOGIES PART2 2021-09-10
Across
- Wireless communication technology that uses short-range radio signal
- Term used to refer collectively to hard disks and SSDs
- Each electronic document on the web; can contain text, graphics, audio, and video.
- A collection of related webpages and associated items stored on a web server.
- Software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
Down
- storage An Internet service that provides remote storage to computer users
- Program designed to make users more productive and/or assist them with personal tasks
- camera A mobile device that allows users to take pictures and store the photographed images digitally
- reader A mobile device that is used primarily for reading e-books and other digital publications.
- A worldwide collection of computer networks
10 Clues: A worldwide collection of computer networks • Term used to refer collectively to hard disks and SSDs • Wireless communication technology that uses short-range radio signal • storage An Internet service that provides remote storage to computer users • A collection of related webpages and associated items stored on a web server. • ...
Medicare Advantage 2021-06-28
Across
- Medicare Advantage plans include ________ coverage to protect your pearly whites.
- Former Jets quarterback turned Medicare Advantage spokesperson.
- Medicare Advantage plans offer low or $0 _______.
- Your Supplement plan premium will ________ every year, forcing you to pay more regardless of how often you use your plan.
- Medicare Advantage plans have larger ________ than ever, giving you access to more doctors and hospitals.
Down
- These video calls with your doctor are covered by Medicare Advantage.
- You got one as a kid for doing chores; now you can get one from your Medicare Advantage plan to use at the drug store.
- Medicare Advantage plans often include coverage for prescription ________.
- During Annual Enrollment, you can _______ from your current plan to a different plan for 2022.
- Save money on Medicare Advantage by paying as you ________, instead of monthly.
10 Clues: Medicare Advantage plans offer low or $0 _______. • Former Jets quarterback turned Medicare Advantage spokesperson. • These video calls with your doctor are covered by Medicare Advantage. • Medicare Advantage plans often include coverage for prescription ________. • Save money on Medicare Advantage by paying as you ________, instead of monthly. • ...
Message Management System 2019-11-17
Across
- Live, interactive conversations over a public network.
- Using the computer to speed up the performance of existing tasks.
- The user point-of-entry for the required function in client/server computing
- Program code defects or errors.
- A piece of information describing a particular entity.
- A binary digit representing the smallest unit of data in a computer system.
Down
- The coding and scrambling of messages to prevent their being read or accessed without authorization.
- Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use
- Software designed to detect, and often eliminate, computer viruses from an information system.
- Standard for wireless personal area networks that can transmit up to 722 Kbps within a 10-meter area.
10 Clues: Program code defects or errors. • Live, interactive conversations over a public network. • A piece of information describing a particular entity. • Using the computer to speed up the performance of existing tasks. • A binary digit representing the smallest unit of data in a computer system. • ...
Set 3 2022-10-16
Across
- The core building block of a CNN, most of the computation occurs in this layer
- A process of categorizing a given set of data into classes
- A Machine Learning technique that helps in detecting the outliers in data
- An activation functions that does not activate all the neurons at the same time
Down
- A matrix layout that is used to define the performance of a classification algorithm
- Algorithm that maps data to a high-dimensional feature space so that data points can be categorized
- Machine learning is a subset of
- ML Algorithm based on the idea of Bagging
- A regression technique that can process both numeric and categorical input attributes
- The activation function that is most widely used in the output layer of neural networks for multiclass classification
10 Clues: Machine learning is a subset of • ML Algorithm based on the idea of Bagging • A process of categorizing a given set of data into classes • A Machine Learning technique that helps in detecting the outliers in data • The core building block of a CNN, most of the computation occurs in this layer • ...
Globalisation 2024-02-24
Across
- The action of buying and selling goods and services.
- The degree to which places are connected or linked by communication networks.
- To package goods in large standardised containers for efficient shipping.
- Exchanging of information by speaking, writing or using some other medium.
- Process by which people become interconnected around the world, both in ideas and activities.
Down
- Relating to or including more than one country
- A company operating in several countries.
- To take or carry (people or goods) from one place to another using vehicle, aircraft, or ship
- A term which refers to the rapid rate of globalisation that has made the world feel smaller, more connected to people on the other side of the world
- The system of trade and industry by which the wealth of a country is made and used
10 Clues: A company operating in several countries. • Relating to or including more than one country • The action of buying and selling goods and services. • To package goods in large standardised containers for efficient shipping. • Exchanging of information by speaking, writing or using some other medium. • ...
Middleware And Protocols Of IOT 2024-04-06
Across
- It Defines Input and the output of Apis
- To provide an internet connection, and connect devices to a local network
- Is a software that sits b/w the Hardware and applications layer in iot
- composed of several key components that work together to deliver high-speed wireless communication
- a standardized set of rules for formatting and processing data.
Down
- A standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks
- It sometimes arrives that some sensors have items that belong or not to them.
- composed of an interrogator (reader) and at least one transponder (tag
- The Protocol services include Who-IS,Who-Has,I-Have,I-Am which are used for device and object Discovery
- The End devices can have multiple Eps
10 Clues: The End devices can have multiple Eps • It Defines Input and the output of Apis • a standardized set of rules for formatting and processing data. • composed of an interrogator (reader) and at least one transponder (tag • Is a software that sits b/w the Hardware and applications layer in iot • ...
STEM Careers 2023-04-17
Across
- someone who designs buildings and overlooks construction.
- engineer that develop, test, manufacture and maintain systems and products that use ________ technology
- an engineer that is associated with biology and technology for the research and development of new products
- engineer who deals with the design, development, and maintenance of software applications
Down
- measures and gather data about the individuals or elements of a sample, then analyze data to generate stats
- engineer that focuses on advances in technology and medicine to develop new equipment for improving human health
- someone who overlooks technological purposes to ensure the protection of cybersystems or networks
- engineer that develop, and test aircrafts, satellites, and missiles
- scientists that define the computational principles that are basis of all software
- engineer that designs, builds, supervises, constructs, and maintains infrastructure projects
10 Clues: someone who designs buildings and overlooks construction. • engineer that develop, and test aircrafts, satellites, and missiles • scientists that define the computational principles that are basis of all software • engineer who deals with the design, development, and maintenance of software applications • ...
Data Transmission 2022-07-13
Across
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that can be sent in one direction only
- a horizontal and vertical parity check on a block of data being transmitted
Down
- data that can be sent in both directions but not at the same time
- data that can be sent in both direction simultaneously
- stages in a network that can receive and transmit data packets such as routers
- a bit either 0 or 1 added to a byte of data in the most significant bit position
- a number in a data packet header used used to stop data packets that never reach their destination from clogging up the data paths
- data that arrives at the destination with bits no longer synchronised
10 Clues: data that can be sent in one direction only • the actual data being carried in a data packet • data that can be sent in both direction simultaneously • data that can be sent in both directions but not at the same time • data that arrives at the destination with bits no longer synchronised • a device that enables data packets to be moved between different networks • ...
Data Transmission 2022-07-13
Across
- data that can be sent in both direction but not at the same time
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths
- a small part of a message that is transmitted over a network
- the actual data being carried in a data packet
Down
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check if data transferred has been altered or corrupted
- a horizontal and vertical parity check on a block of data being transmitted
- a device that enables data packets to be moved between networks
- stages in a network that can receive and transmit data
- data that can be sent on one direction only
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data • a small part of a message that is transmitted over a network • a device that enables data packets to be moved between networks • data that can be sent in both direction but not at the same time • ...
THE INTERNET & SURVEILANCE QUIZ 2025-02-19
Across
- a global network of interconnected computers and servers that communicate with each other using standardized protocols.
- A system used for tracking movement
- A short-range wireless standard for exchanging data between devices and creating personal area networks.
- a malicious and deliberate attempt by an individual or organization to breach the information system
- an organization that provides myriad services related to accessing, using, managing, or participating in the Internet.
Down
- The act of secretly listening to conversation
- a specific area where someone or something lacks the necessary technical skills, knowledge, or capability to perform a task effectively.
- The system used to link alphabetical website names to numeric internet protocol addresses
- The access of stored data without the permission of those holding it
- a network security device that blocks IP addresses
10 Clues: A system used for tracking movement • The act of secretly listening to conversation • a network security device that blocks IP addresses • The access of stored data without the permission of those holding it • The system used to link alphabetical website names to numeric internet protocol addresses • ...
Industrial Revolution 2025-11-20
Across
- people in the middle of the social hierarchy
- uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
- the process of making an area more urban
- the process of supplying a military force with modern weapons and vehicles
- social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
- people who earn wages through labor
- a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
- the process of making something conform to a standard
- system of interconnected routes and relationships that facilitate between different regions and ethnicity
- the measure of efficiency of production of goods or services
10 Clues: people who earn wages through labor • the process of making an area more urban • people in the middle of the social hierarchy • the process of making something conform to a standard • the measure of efficiency of production of goods or services • the process of supplying a military force with modern weapons and vehicles • ...
Emerging and Future Technology 2021-11-26
Across
- Theory of computer systems able to perform tasks requiring human intelligence
- Machines that use the properties of quantum physics to and perform computations
- network of objects that are embedded with technologies for the purpose of connecting and exchanging data with other devices over the internet.
- Fifth generation technology standard for broadband cellular networks
Down
- Branch of computer science which focuses on the use of data and algorithms to imitate the way that humans learn
- A computer-generated simulation of an environment
- System in which a record of transactions made in a cryptocurrency are maintained across several linked computers
- Technology that is used for automating jobs
8 Clues: Technology that is used for automating jobs • A computer-generated simulation of an environment • Fifth generation technology standard for broadband cellular networks • Theory of computer systems able to perform tasks requiring human intelligence • Machines that use the properties of quantum physics to and perform computations • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Internet crossword puzzle 2014-04-30
Across
- a reference to a published source.
- network etiquette; following the rules online,being a good digital citizen.
- text or graphics that,when clicked,will connect the user to a new web page or another place on the same page.
- the unauthorized use,reproduction,distribution,or transmission of copyrighted material (like pirates-its stealing)
- a restricted computer network;a private network created using a world wide web software,example:Hays CISD network.
- A group of connected computers
Down
- a bully who operates online, in cyberspace; to bully online
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
8 Clues: A group of connected computers • a reference to a published source. • a bully who operates online, in cyberspace; to bully online • network etiquette; following the rules online,being a good digital citizen. • text or graphics that,when clicked,will connect the user to a new web page or another place on the same page. • ...
Science and Technology in the 2000s 2023-03-24
Across
- Mobile devices used for communication and accessing the Internet
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Websites and applications that enable users to create and share content or to participate in social networking.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Tech company best known for its extensive search engine and other products
- Among the most popular mobile phone distributor
- Largest online shopping/delivery company
8 Clues: Largest online shopping/delivery company • Among the most popular mobile phone distributor • Mobile devices used for communication and accessing the Internet • Tech company best known for its extensive search engine and other products • Websites and applications that enable users to create and share content or to participate in social networking. • ...
COMPUTER 2018-09-22
Across
- It is the term short for "emotion icon.”
- It is also called a notebook computer or small portable personal computer.
- It is defined as the transmission of messages over communications networks.
- It is a particular way that information is encoded for storage in a computer file.
Down
- It is a global wide area network that connects computer systems across the world.
- It is a specific typeface of a certain size and style.
- It is a typewriter-style device which uses an arrangement of buttons or keys to act as mechanical levers or electronic switches.
- It refers to moving an icon or other image on a display screen.
8 Clues: It is the term short for "emotion icon.” • It is a specific typeface of a certain size and style. • It refers to moving an icon or other image on a display screen. • It is also called a notebook computer or small portable personal computer. • It is defined as the transmission of messages over communications networks. • ...
Crossword Li5 2023-12-28
Across
- Name the annual economic document presented by the Government of India detailing the state of the economy.
- Identify the Indian financial regulation act that governs non-banking financial companies and microfinance institutions.
- Founder of a very famous Indian multinational corporation?
- India's central public sector enterprise under the Ministry of Finance, involved in tax collection?
- Name the Indian government program launched to connect rural areas with high-speed internet networks.
Down
- Indian regulatory authority is responsible for the regulation and supervision of the insurance sector?
- Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017?
- Indian government's crop insurance scheme to protect farmers against crop failure?
8 Clues: Founder of a very famous Indian multinational corporation? • Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017? • Indian government's crop insurance scheme to protect farmers against crop failure? • India's central public sector enterprise under the Ministry of Finance, involved in tax collection? • ...
ESTI: April 2021 Newsletter 2021-04-09
4 Clues: A phase in the human sleep cycle • A computer program that mimics the human brain • Chemical messengers in the brain that transmit signals between neurons • The ability of neural networks to change based on external experiences.
Internet 2020-11-23
Across
- to write about your activities or opinions on the net, an online diary
- an international computer network connecting other networks and computers from companies,universities, different organizations etc.
- to use the Internet while looking for information
- an area on the Internet where you can communicate with each other
Down
- a person who writes an online diary
- a place connected to the Internet where a company, an organization or an individual puts information
- a secret word or a phrase that you need to kmow to be allowed to use a computer system
- a way of sending messages and information by means of computers connected in a network
8 Clues: a person who writes an online diary • to use the Internet while looking for information • an area on the Internet where you can communicate with each other • to write about your activities or opinions on the net, an online diary • a secret word or a phrase that you need to kmow to be allowed to use a computer system • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Chapter 7 - Individual and Collective Economic Empowerment (pg. 279 - 316) 2023-05-25
Across
- the institution of (blank) coerced Blacks into playing a major role in generating pre-Civil War economic growth in the U.S.
- prioritizing the application of entrepreneurial and other business principle to solve social problems
- Black(blank)entrepreneurship, Black majority ownership and decision-making power
Down
- difference in income that has narrowed down over the years, but still exists
- a vehicle to teach the black entrepreneur how to tap into the billions of dollars generated by Blacks
- a movement to describe the effort to establish economic networks
- (1929-1933) took it's tool in the number of Black businesses that failed
- measure of everything a household owns (assets), minus everything owed to creditors (liabilities).
8 Clues: a movement to describe the effort to establish economic networks • (1929-1933) took it's tool in the number of Black businesses that failed • difference in income that has narrowed down over the years, but still exists • Black(blank)entrepreneurship, Black majority ownership and decision-making power • ...
Educational Inequality Crossword 2025-11-25
Across
- Policies, laws, and institutions that reproduce racial inequalities.
- Daily, commonplace insults and racial slights that cumulatively affect the psychological well-being of people of color.
- The power of a socially dominant group to make its preferences, tastes, and norms appear to be superior to those of the nondominant group.
- Cultural resources that offer social and other benefits.
Down
- The unequal distribution of resources, opportunities, and outcomes in education
- Relationships and networks that offer social and other benefits.
- The disparate educational outcomes of White, Asian, Black, Latinx, and Native American People.
- Theory that multiple social categories like race, gender, class, and sexuality can overlap to create unique systems of discrimination or privilege.
8 Clues: Cultural resources that offer social and other benefits. • Relationships and networks that offer social and other benefits. • Policies, laws, and institutions that reproduce racial inequalities. • The unequal distribution of resources, opportunities, and outcomes in education • ...
Daniela Carballido 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization
- Is a self-replicating program that is harmful to networks
- Web ... is important because so many people visit the World Wide Web every day
- Is a program written with malicious intent and sent out by attackers
- Is a software program that displays advertising on your computer
Down
- Is technically a worm, does not need to be attached to other software
- Organizations also make ... aware of the dangers of opening e-mail attachments that may contain a virus or a worm
- It is distributed without any user intervention or knowledge
- Is a file or program other then a virus that is potentially harmful
- Events or attacks that remove, corrupt, deny access,allow access or steal imformation
10 Clues: Is a self-replicating program that is harmful to networks • It is distributed without any user intervention or knowledge • Is a software program that displays advertising on your computer • Is a file or program other then a virus that is potentially harmful • Is a program written with malicious intent and sent out by attackers • ...
