networks Crossword Puzzles
Chemistry Chapters 1-9 General Review Part 2 2020-02-10
Across
- an intermolecular force created by the polar ends of some molecules
- the number of protons in an atom
- the heat required to cause a unit rise in the temperature of a unit mass of a given substance
- property used to predict whether a bond is primarily ionic or primarily covalent
- the rule that seems to drive bonding; involves the number 8
- the principle that states that the momentum and position cannot be measured simultaneously
- heat is given off or lost to the surroundings
- when the pressure on a gas increases, its volume _?_
- 0 K or -273.15 C
- the sharing of four electrons (2 pairs)
- type of bond created when electrons are unequally shared between two atoms
- a relatively strong force associated with hydrogen bonded to N, O, or F
Down
- valence shells form from a sea of delocalized electrons
- includes hard substances like diamonds, quartz, and silicon carbide
- PV = nRT
- physical combinations of different substances
- the transfer of electrons from one atom to another
- characterized by the sharing of a pair or pairs of electrons
- substances made from a combination of atoms chemically joined together
- a weak force that exist between all molecules
20 Clues: PV = nRT • 0 K or -273.15 C • the number of protons in an atom • the sharing of four electrons (2 pairs) • physical combinations of different substances • heat is given off or lost to the surroundings • a weak force that exist between all molecules • the transfer of electrons from one atom to another • when the pressure on a gas increases, its volume _?_ • ...
43. 2021-03-19
Across
- It's about old currency notes (7)
- GRASS Crazy King George behind American plant (3-5)
- Old dinasaur from Craggy Hill behind Knock (6)
- Hit mound behind junction (5)
- Sets up sailor bar in American city with first cousin - a man-eater (8)
- It's about former times and a meal we enjoyed then (6)
- Youngster with ape developed a pulse (8)
- One hour with ape misbehaving is a delight (8)
- Clean up what's beneath and behind American city (7)
- NETWORKS Old connections?
- Finishes with alternative comic and works in The Garden with mimics (6)
- Lack of flesh? Not so much, when it's about former queen (8)
- Listen to writer going to American city with worthless old money (8)
- It's about old message to renew old connections (6)
Down
- Bird approaches hill behind American city with mimic (8)
- Part of hunt to persecute someone behind American news (8)
- Colonise Pluto with ape, perhaps (8)
- GEAR Special equipment for police in South American city with great rampaging (4,4)
- ALL In spite of everything, being behind American lines
- Gather outside South American city with lower ranking (8)
- Wall provided a role with mimic in it
- Renew old school ties
- Two presidents behind American attacks (8)
- Little weight behind American news report (8)
24 Clues: Renew old school ties • NETWORKS Old connections? • Hit mound behind junction (5) • It's about old currency notes (7) • Colonise Pluto with ape, perhaps (8) • Wall provided a role with mimic in it • Youngster with ape developed a pulse (8) • Two presidents behind American attacks (8) • Little weight behind American news report (8) • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
M1.4 2023-03-25
Across
- Help to access a computer over unsecured networks safely
- Allows user to view or manage software, for the hardware
- A id for a devices over the network or internet, usually in a string number or alphanumeric string
- A delay
- Help identify a service
- Allow the sending and receiving of data packets over the network and internet
- pieces of information sent to website to hep keep track of users activity and web traffic.
- testing the Wifi speed
- Saves data and information for later use when revisiting a website, which helps increase your web browning speed
- The Name for the devices connected to a network or system
Down
- Make computer resources available over the internet from a paid services
- A program or application that help to edit and compile code
- Allows to connect and print paper from the printer wirelessly
- Keeps track of how much life of the battery is left
- Isolating an environment or an application from other running programs
- Administrative command used to diagnose network issue
- A testing or sample field of a product before release to the public
- Helps hardware to communicate with each other
- Connects to the internet
- A command that allows user to trace network connections in hops
20 Clues: A delay • testing the Wifi speed • Help identify a service • Connects to the internet • Helps hardware to communicate with each other • Keeps track of how much life of the battery is left • Administrative command used to diagnose network issue • Help to access a computer over unsecured networks safely • Allows user to view or manage software, for the hardware • ...
FITAVocab.HBM 2013-05-15
Across
- presentation software program similar to Keynote and Powerpoint, but more abstract
- a file created by a software application
- Example: Windows
- rules and behaviors made to keep individuals safe when online
- an opening in a computer that allows to have more plug-ins
- part of the computer that processes everything
- main circuit board of a computer
- protecting information on computer systems/networks
- Example: printer
- legal means of protecting an author's work
- file format made by WORD that has a smaller chance of getting a virus
- digital, online, accesible on the digital world
- selection of editing and drawing/art tools on your computer
- file format made by Microsoft that can't be viewed by all programs
Down
- a file that serves as a starting place for a new document
- a software that runs on your computer
- the short term memory of a computer
- to start up a computer
- collection of data stored in one unit
- code of positive conduct online
- a piece of equipment that provides input and output for the computer
- a web-based program that saves your photos, docs, and music
- data transmission
- Example: keyboard
- file format made by ADOBE that is viewable by all programs
25 Clues: Example: Windows • Example: printer • data transmission • Example: keyboard • to start up a computer • code of positive conduct online • main circuit board of a computer • the short term memory of a computer • a software that runs on your computer • collection of data stored in one unit • a file created by a software application • legal means of protecting an author's work • ...
VOCAB REVIEW 2016-02-25
Across
- maximum particle size
- pattern: commonly encountered drainage pattern
- load: streams carry dissolved substances
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- slow flow
- leaping movement of sand
- separate from the drainage basin of another by a imaginary line
- flat area about level with top of the channel
- fast flow
- tangled networks
- basin: land area that contributes water to a river system
Down
- when streams diverge from a central area likes pokes from the hub of a wheel
- place where the ground slopes up/down
- load: fine particles suspended in water
- level: most streams is global sea level
- loop-like bend in a stream channel
- quantity of water passing by a point on the steamboat
- absorbed by plants, which the release it into the atmosphere
- maximum load
- bank:river cliff
- cycle: unending circulation of H2O
- the rate of rainfall exceeds earth's ability to absorb
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- process by which liquid water changer into water vapour
- gen. term for sediment deposited by streams
- and corner frequency
- pattern: exhibits many right angle bends
- bars:arcuate deposit of sand along the in inside of bend
- load: course particles move along streambed
29 Clues: slow flow • fast flow • maximum load • bank:river cliff • tangled networks • and corner frequency • maximum particle size • leaping movement of sand • loop-like bend in a stream channel • cycle: unending circulation of H2O • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
DigiCit Vocab Crossword Puzzle- Ariana & Evelyn 2016-05-27
Across
- A law to protect your creative work
- accept or admit the existence or truth of.
- Standards on which you judge
- Unexpected/ unknown identity
- media digitized content that can be transmitted over the internet or computer networks.
- Who are you
- a general statement or concept obtained by inference from specific cases.
- To make something bigger than it actually is
- To carefully examine
- Repetitive behaviors to hurt someone
- Drawings, Illustrations, symbols
- speech Verbal attack against race, appearance, religion, ability, gender, sexual orientation
Down
- use Ability to use a small amount of copyrighted work with no permission
- A website or program that collects related items of content and display them or link to them
- The result of your choices/ actions
- What you identify as; male, female, fluent
- Unsuitable; not proper
- All Caps
- Understand and can feel the emotion of what someone is experiencing
- Someone who witnessed cyberbullying and does nothing about it
- A regularly updated website or webpage, typically one run by an individual or small group, that is written in an informal or conversational style
- An icon or figure representing a particular person in a computer game
- work anything you have originated
- Trick, lie
- a settled or regular tendency or practice, especially one that is hard to give up.
25 Clues: All Caps • Trick, lie • Who are you • To carefully examine • Unsuitable; not proper • Standards on which you judge • Unexpected/ unknown identity • Drawings, Illustrations, symbols • work anything you have originated • A law to protect your creative work • The result of your choices/ actions • Repetitive behaviors to hurt someone • accept or admit the existence or truth of. • ...
Jose Daniel Saenz Serna 2022-05-09
Across
- is a programming language and computing platform
- a hyperlink or hyperlink.
- physical network interface.
- es el conjunto de programas de un sistema informático que gestiona los recursos de hardware.
- is a computer peripheral output device that enables a permanent range of text or graphic documents to be produced.
- logical digital equipment interconnection device.
- It is the main social network that exists in the world.
- intelligence expressed by machines.
Down
- is a computer application designed to be run on smartphones.
- It is a unique identifier that each manufacturer assigns to the network card of its devices.
- It is a computer network that allows communication and data exchange.
- a device that allows networks to interconnect with a different prefix in its IP address.
- is a Bitcoin block exploration service
- Memory for reading only, nothing can be recorded in this memory and its information is already recorded at the factory.
- set of all machines that have been created.
- Science that studies the management of information with electronic means.
- To write in text in Windows we use the program.
- tangible part of the computer.
- It is a Windows XP program.
- It is a set of computers capable of attending to the requests of a client and returning a response.
20 Clues: a hyperlink or hyperlink. • physical network interface. • It is a Windows XP program. • tangible part of the computer. • intelligence expressed by machines. • is a Bitcoin block exploration service • set of all machines that have been created. • To write in text in Windows we use the program. • is a programming language and computing platform • ...
Credit Crossword 2022-03-14
Across
- when the bank takes possession of your house
- a loan for your home
- loans with extreme interest rates if you dont pay them back in time
- when you owe money
- things you earn by using your credit card
- the money that builds up over time
- the type of credit that is on credit cards
- what you pay with that takes money directly from your account
- your history of your credit card spendings and payments
- close ended credit accounts
- Renting for a car
Down
- a credit card reward where you get money back
- one of the two credit card networks that will issue credit cards
- when your loan isnt tied to an asset
- interest rate that doesnt change
- a loan for a vehicle
- interest rate that changes
- what you take out to get money now
- the only source of revolving credit
- what you use to pay for something under $10
- your rating that you have that credit companies look at before giving you a loan
- a loan you take out for yourself
- points that you get for using your credit card
- when you put a security deposit on your card
- the credit card set up that allows parents to pay if a student can't
25 Clues: Renting for a car • when you owe money • a loan for your home • a loan for a vehicle • interest rate that changes • close ended credit accounts • interest rate that doesnt change • a loan you take out for yourself • what you take out to get money now • the money that builds up over time • the only source of revolving credit • when your loan isnt tied to an asset • ...
Unit 5 Lab 2023-10-23
Across
- Cardiovascular disease.
- A test that is done while you are exercising.
- Root word for small vessels.
- Cardiac rhythm management
- Any abnormal rhythm of the heart: too slow, too fast, or at an irregular beat or tempo.
- Peripheral vascular disease
- This reads your heart’s electrical impulses.
- This gives a picture of your heart using ultrasound, a type of X-ray
- Root word for heart.
- Networks of small vessels that perfuse tissues.
- Thin folds of the endocardium with a core of dense connective tissue.
- Used to measure the substances and show if, and how much of, your heart muscle has been damaged.
- Pumps blood through the cardiovascular system.
Down
- Vessels that deliver blood to tissues.
- A special dye is injected into your coronary arteries and an X-ray is taken.
- The heart not pumping blood as well as it should.
- Occurs because of blockage in a blood vessel that delivers blood and oxygen to the brain.
- The term for diseases of the heart muscle.
- Root word for aorta.
- When the heart muscle is cut off from the oxygen it needs to operate.
- Vessels that return blood to the heart.
- Transient ischemic attack
- Atrial fibrillation
- Root word for disease.
- Root word for artery.
25 Clues: Atrial fibrillation • Root word for aorta. • Root word for heart. • Root word for artery. • Root word for disease. • Cardiovascular disease. • Cardiac rhythm management • Transient ischemic attack • Peripheral vascular disease • Root word for small vessels. • Vessels that deliver blood to tissues. • Vessels that return blood to the heart. • The term for diseases of the heart muscle. • ...
RU ITEC411 Failures and Errors in Computer Systems 2023-12-01
Across
- A person who writes and develops computer programs, using a programming language.
- Outdated computer systems, software, or technology that is still used.
- Manipulation or setup in a way to achieve a specific outcome.
- Standardized rules and conventions that govern communication between systems.
- The process of verifying the identity of a user or device.
- An individual who interacts with a computer system.
- Potential dangers or risks to computer systems, networks, and data.
- The complete breakdown or malfunction of a computer system.
- The process of managing and overseeing operations and maintenance of computer systems.
- Additional devices connected to a computer, such as printers, scanners, or external drives.
Down
- An expert or specialist in the field of computers.
- A design or system that incorporates measures to prevent the impact of a mistake.
- A flaw or unintended error in a software program that causes weird behavior.
- Information used to verify the identity of a user.
- A structured collection of data, often used for efficient data management.
- Technique used by attackers to take advantage of vulnerabilities in a system.
- A person who has acquired knowledge and skills through formal education.
- Systems whose failures could result in great harm.
- The unauthorized use of someone else's personal information.
- A Mistake or fault in a computer program.
20 Clues: A Mistake or fault in a computer program. • An expert or specialist in the field of computers. • Information used to verify the identity of a user. • Systems whose failures could result in great harm. • An individual who interacts with a computer system. • The process of verifying the identity of a user or device. • ...
Networking n.1 2023-11-29
Across
- It can be Variable length or fixed length
- It happens when transmissions occur at the same time
- The amount of data that can be transferred from one point to another in a given time period
- Third parameter of the Cisco command for entering static routes
- A tool to check network connectivity
- Cisco command to deactivate an interface on the router
- Device that forwards data packets to the appropriate parts of a computer network
- Cisco command for changing the name of a device
- A device for connecting multiple network devices and multiple segments
- Automatic switching to a backup computer system in the event of system failure
Down
- It can be MAC or IP
- Formatted unit of data sent across networks
- When it becomes zero, the packet is discarded
- Medium Access Protocol, which can be of the CA (Collision Avoidance) or CD (Collision Detection) type
- Device which converts between digital and analogue signals, e.g. telephone line to computer
- Software or hardware that requests services from a server
- IP .... Cisco command for entering static routes
- Ethernet procedure used to handle collisions during transmissions
- A set of rules or standards that control communication between devices
- Software that provides services to a client, or the hardware that is running it
20 Clues: It can be MAC or IP • A tool to check network connectivity • It can be Variable length or fixed length • Formatted unit of data sent across networks • When it becomes zero, the packet is discarded • Cisco command for changing the name of a device • IP .... Cisco command for entering static routes • It happens when transmissions occur at the same time • ...
Powered Up 2024-02-01
Across
- see energy from the sun.
- a generic term for non-renewable energy sources such as coal, coal products, natural gas, derived gas, crude oil, petroleum products and non-renewable wastes
- a pipe or hole through which water or gas may escape.
- A standard desktop computer
- to produce electricity.
- a computer where information is stored that’s connected to a network of other computers.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- changes the electric current’s direction.
- a worldwide system of computer networks
- a person who designs, builds, or maintains engines, machines, or public works.
Down
- make smaller or less in amount, degree, or size.
- Light from the sunel
- the atoms that make up the material’s surface.
- is too remote to access electricity from the regular power grid.
- a way of generating electricity by harnessing the sun’s rays.
- a form of electric current that flows in only one direction.
- a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
- the devices that would convert sunlight into electricity.
- a form of energy resulting from the existence of charged
- not by means of the internet or other computer network.
20 Clues: Light from the sunel • to produce electricity. • see energy from the sun. • A standard desktop computer • a worldwide system of computer networks • changes the electric current’s direction. • the atoms that make up the material’s surface. • make smaller or less in amount, degree, or size. • a pipe or hole through which water or gas may escape. • ...
Internet Business Associate 2024-02-27
Across
- A public key encryption algorithm
- A server that mediates traffic between a protected network and the Internet.
- A machine that shares its resources among clients
- a concept or collection of symbols associated with a product, service or person
- The practice of categorizing online content through tags
- An encrypted file transfer protocol
- A web page that integrates content and scripts from multiple web sites to create new applications
- A computing paradigm in which users can use software over the Internet
- A worldwide network of interconnected networks
- A web... who creates the overview plan of a sites development
- Data processed by protocols so it can be sent across a network
- Encrypting and decrypting email messages
Down
- A system that maps uniquely hierarchical names to specific Internet addresses
- A Web 2.0 programming language that consists of existing technologies
- A set of instructions or rules
- A problem solving model in which a task is given to a group of people rather than one.
- A measurement of memory needed to store one 8 bit character
- a computing language used to program Web 1.0
- An individual computer on a network
- Modulator Demodulator
- The integration of telephony and data technologies
- A circuit board that enables a computer to connect to a network
- Outgoing mail server
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Unit 4 Review APCSP 2024-03-26
Across
- Method of encryption that does not require a secure channel to exchange keys
- Pop Up Advertisements
- Identifying and correcting errors and inconsistencies in data
- Attempt to trick a user into divulging their private information
- software intended to damage a computing system or to take partial control over its operation
- Steals data and sends it back to malware creators
- Social Media,Phones, Laptops, WWW, email are all types of...
- Name, birthday, social security, address, etc.
- System that monitors incoming and outgoing network traffic
- What people look for when analyzing big data?
Down
- Exhausting all possible combinations
- Wireless access point that gives unauthorized access to secure networks.
- Finding solutions to problems that would otherwise take forever to solve using only human capabilities
- Practice of engaging a group for a common goal
- Pair of keys used to encrypt and decrypt
- Protects a computer by scanning files and identifying malware
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- Holding an computer hostage by encrypting data
- Attacks that cause a website to slow down by flooding it with requests
- Authentication that requires at least two steps to unlock protected information
20 Clues: Pop Up Advertisements • Exhausting all possible combinations • Pair of keys used to encrypt and decrypt • What people look for when analyzing big data? • Practice of engaging a group for a common goal • Holding an computer hostage by encrypting data • Name, birthday, social security, address, etc. • Steals data and sends it back to malware creators • ...
Foundation of Security and Cybercrime 2024-11-19
Across
- anticipation of security incidents and planning for measures to be taken.
- an individualwho breaks into computer systems to steal, change, or destroy information
- unauthorized access of or interference with computer systems, servers, or other information and communication systems
- the use of electronic communication to bully a person
- an act or instance of using/closely imitating the language and thoughts of another author without authorization
- personnel, hardware, programs, networks, and data
- malicious program disguised as or embedded within legitimate software
- state of wel-being of information or infrastructure
- action taken in advance to protect the system against potential threats or dangers.
Down
- common type of online fraud
- applications on the computers and operating systems
- fraudulent practice of sending emails purporting to be someone reputable
- ensuring that the information is accessible to authorized persons when required without delay
- includes creating backup copies, malware management, and ensuring sufficient space and memory.
- malicious software
- wireless fidelity
- an assurance for which someone cannot deny something
- an action or event with potential to compromise and/or violate security.
- exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
- mass distribution of unsolicited messages, advertisements, and/or pornogaphy
20 Clues: wireless fidelity • malicious software • common type of online fraud • personnel, hardware, programs, networks, and data • applications on the computers and operating systems • state of wel-being of information or infrastructure • an assurance for which someone cannot deny something • the use of electronic communication to bully a person • ...
The Internet 2025-02-07
Across
- The amount of data that can be sent over an internet connection in a given time.
- A high-speed internet connection that is always on.
- A device that connects multiple devices to the internet.
- The process of converting data into a secret code to protect it.
- A company that provides internet access.
- Software that secretly collects information from a device.
- A security system that blocks unauthorized access to a network.
- A system that translates website names into IP addresses.
Down
- Protection of internet-connected systems from attacks.
- Breach When private data is accessed without permission.
- Backbone The high-speed global infrastructure that connects networks and data centers.
- Authentication A security process requiring two steps to log in.
- Small files stored on a device to track user activity online.
- A service that encrypts internet connections for privacy.
- Malicious software designed to harm or steal information.
- A device that connects to the internet through a service provider.
- Address A unique number assigned to each device on the internet.
- A scam where attackers trick users into revealing personal information.
- A wireless network that allows devices to connect to the internet.
- Computing Storing and accessing data over the internet instead of a local device.
20 Clues: A company that provides internet access. • A high-speed internet connection that is always on. • Protection of internet-connected systems from attacks. • Breach When private data is accessed without permission. • A device that connects multiple devices to the internet. • A service that encrypts internet connections for privacy. • ...
Chapter 3 2025-02-25
Across
- public Wifi network called _____
- systems use analog techniques to encode binary
- point to point topologies are used with wireless networks called _____
- The error checking code in an Ethernet Frame's trailer
- installed in a physical bus
- ___access method, in which an acknowledgment is required for every packet sent
- when electricity bounces off the end of a cable and back in the other direction
- occurs if two or more devices on the same medium transmit simultaneously
- signals arriving at different times
- the actual application to application data transfer speed is the ___
Down
- solid objects absorb radio signals, causing them to ___
- The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, known as ____
- cabling used to communicate between LANs or between switches
- ______ Ethernet, defined by IEEE 802.3i
- the path data travels between computers on a network is considered the network’s ____
- the simplest topology
- transmission method sends digital signals in which each bit of data is a pulse of electricity
- wireless networking, known as Wireless Fidelity
- network technology provides reliable transport of data, slow to current standards
- The 802.11n standard takes much of what works in the earlier standards and improves on it by adding ____ antennas
20 Clues: the simplest topology • installed in a physical bus • public Wifi network called _____ • signals arriving at different times • ______ Ethernet, defined by IEEE 802.3i • systems use analog techniques to encode binary • wireless networking, known as Wireless Fidelity • The error checking code in an Ethernet Frame's trailer • ...
Tech Terms 3 2025-04-16
Across
- Wide Web Interconected public webpages
- Right protecting creations from theft
- Computer programming language
- Global network of billions of devices
- Program manages access to a resource
- Read-only memory
- Smallest unit of data
- File that lets you share documents
- Gap of who has internet access and who doesn't
- Open Source Software
- start or restarting a computer
- Data that is 8 binary digits long
- 1 million bytes
- Random access memory
- Language for creating web pages
- Files of imformation that web server send to web browser
- Regularly updated website
- Sending from one device to another
- Converting data into a code
- Internal or External componet that stores data
Down
- 3-dimentional environment
- Connects 2 or more networks
- local area network
- Block unauthorized access
- What a computer does
- that manages hardware and software resources
- Web browser
- Central processing unit
- Network address for you computer
- Output Device
- Search engine
- Backup information on a computer
- Domain name system
- Converts data from digital format to one that is suitable for an analog transmission
- Main printed circuit board
- Input Device
- program to prevent viruses
- Address of resource on the internet
- Information used to trace indentities
39 Clues: Web browser • Input Device • Output Device • Search engine • 1 million bytes • Read-only memory • local area network • Domain name system • What a computer does • Open Source Software • Random access memory • Smallest unit of data • Central processing unit • 3-dimentional environment • Block unauthorized access • Regularly updated website • Main printed circuit board • program to prevent viruses • ...
Chapter 7 Security Plus 2024-10-03
Across
- An access control scheme that is the least restrictive
- injects stolen username and password across multiple websites
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
- small device that looks like a thumb drive which can be used for verification
- enables users to access a network resource through a directory service
- small number of passwords used when trying several different user accounts
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- features and characteristics of the individual
- Removing user accounts
- An access control scheme that is the most restrictive
- password attack attempting thousands of combinations per second
Down
- Single sign-on for networks owned by different organizations
- software designed to break passwords
- Using more than one type of authentication credential
- Requiring the user to provide proof that they are the unique user.
- Granting access that is limited
- key stretching algorithms
- Standard preconfigured passwords
- evidence or proof of something
- allows secure web domains to exchange user authentication and authorization data
- The point in time when a password is no longer valid
- An open-source federation framework
- provide control over user validation and the resources that may be accessed
25 Clues: Removing user accounts • key stretching algorithms • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • software designed to break passwords • A key pair “burned” into a security key • The ability of systems to exchange information • features and characteristics of the individual • ...
Electrical 2024-07-24
Across
- The generation of an electromotive force (EMF) in a conductor due to changes in magnetic field.
- Booster, Transformer used to control real power on parallel networks.
- Group, Defines the phase difference primary to secondary
- Cosine rule states what? divided by the hypotenuse
- A law which says current is the voltage divided by the resistance
- √2 divided by RMS Voltage
- The opposition to AC current
- (left Rule) Magnetic field points away, current direction is 90 degrees right, which direction is the FORCE
- Describes generation such as wind and hydro
- Physicist who said the sum of currents into a node equal the sum of currents leaving the node
- Changer, Mechanism which adjusts turns ratio in a transformer
- Odd multiples of the 3rd harmonic
Down
- Type of fault with zero resistance between conductors
- Normal direction of phase rotation
- Sinusoidal wave an Integer multiple of the fundamental
- Percentage change in output voltage from no load to full load
- Voltage measured between live and neutral
- Factor Term describes the ratio between active and apparent power
- Type of fault through a normally insulating medium, has resistance
- Factor, The rise (ratio) phase-to-ground voltage (healthy phases) during ground fault
- Name for power that is true/real and measured in watts
21 Clues: √2 divided by RMS Voltage • The opposition to AC current • Odd multiples of the 3rd harmonic • Normal direction of phase rotation • Voltage measured between live and neutral • Describes generation such as wind and hydro • Cosine rule states what? divided by the hypotenuse • Type of fault with zero resistance between conductors • ...
Chapter 6 - Innovation through Artificial Intelligence 2024-07-11
Across
- Filtering AI algorithms filtering emails to protect users.
- Language Processing (NLP) Deals with computer-human interaction using language.
- Assistant A type of personal assistant powered by AI.
- Essential for machine learning to identify patterns and make decisions.
- A context where AI can predict traffic conditions.
- Recognition: Siri is an example of this technology.
- A concern regarding AI's impact on human employment.
- systems: Utilize human knowledge to solve problems requiring expertise.
- Impacted by AI, as discussed in the lecture on AI's societal effects.
- What expert systems aim to improve in workplaces.
- An essential component of AI where systems improve from experience.
- Vision: Allows computers to interpret visual information.
Down
- Google's AI for search query analysis.
- Learning A technique that automates analytical model building.
- The next lecture topic following Innovation through AI.
- Using AI to monitor environments through video.
- A wide use of AI systems in various industries.
- Text Technology that suggests words during typing.
- Building machines that perform physical tasks.
- A company behind RankBrain and major advancements in AI.
- Networks: A type of network involved in machine learning.
- Media Services enhanced by AI for better user engagement.
- A robot assisting with social media interaction and health reminders.
- Facebook's facial recognition technology.
- Therapy Can be administered through expert systems.
25 Clues: Google's AI for search query analysis. • Facebook's facial recognition technology. • Building machines that perform physical tasks. • Using AI to monitor environments through video. • A wide use of AI systems in various industries. • What expert systems aim to improve in workplaces. • Text Technology that suggests words during typing. • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
IITA List of Programme KPIs -(2024 - 2030) 2025-03-17
Across
- Number of people trained in group trainings on IITA products, including researchers, farmers, and others.
- Number of proposals developed to support gender, youth, and social participation.
- Number of active partnerships with NARES and external agricultural research institutes.
- Number of IITA products incorporated into product catalogs (e.g., TAAT, AICCRA).
- Number of outreach events promoting collaboration with NGOs, IFIs, etc.
- Percentage of IITA products adopted by partners for large-scale implementation.
- Number of new or improved crop varieties released.
- Annual rate of genetic improvement in crops, measured as a percentage.
- Scientific publications and findings contributing to agricultural knowledge.
- Participation in global discussions, conferences, and research networks.
- Evaluating the influence of IITA’s projects on agricultural development.
Down
- Percentage of projects that address diet, health, and nutrition-related objectives.
- Number of peer-reviewed papers made available through open-access repositories.
- Research products or services reaching end-users effectively.
- Ensuring long-term viability of agricultural innovations and research.
- Number of students trained, disaggregated by qualification type (M.Sc. or Ph.D.) and gender.
- The core field of IITA’s research, focused on food security and development.
- Number of papers published in journals with an impact factor greater than 10.
- Number of plant genetic accessions available and safely duplicated by crop.
- Amount of financial resources secured for research and product delivery.
20 Clues: Number of new or improved crop varieties released. • Research products or services reaching end-users effectively. • Ensuring long-term viability of agricultural innovations and research. • Annual rate of genetic improvement in crops, measured as a percentage. • Number of outreach events promoting collaboration with NGOs, IFIs, etc. • ...
crossword for AP world vocab 2025-10-31
Across
- paper money
- an agricultural expression of hinduism and largest religious structure in the premodern world
- inns located along the trade routes from east med to china
- encompassed 25000 square miles and linked some 150 outlying settlements to the main centers
- Swahili civilization participated in the larger Indian ocean
- like Malacca and the fronteir of expanding the Islamic world
- widely traveled Arab scholar, Marchant, and public official
- traveling poets. musicians, and storytellers who maintain oral tradition of west africa
- a symbol than daily activity
Down
- a north American chiefdom that lay at the center of widespread trading networks
- increased food production and led to population growth and organization
- ruler of Mali and possibly the richest man ever
- had their own neighborhoods in the city which act as intermediaries between government and the foreign merchants
- rejected the religous aspects of Buddhism and daoism but appreciated the might moral standards
- amitabna ensured rebirth as a heavenly realm
- captain that sought to enroll distant people and states
- commerate the beginning of Islamic rule in the region after defeating the last Hindu ruler
- used their triangular sails sewing boards of hull together
- could go 10 days without water and cross the Sahara better
- the Chinese chan school of Buddhism became zen in japan
20 Clues: paper money • a symbol than daily activity • amitabna ensured rebirth as a heavenly realm • ruler of Mali and possibly the richest man ever • captain that sought to enroll distant people and states • the Chinese chan school of Buddhism became zen in japan • inns located along the trade routes from east med to china • ...
Technology in education 2025-10-13
Across
- Using devices students bring from home to school
- Storing and accessing files remotely rather than locally.
- Short for Artificial Intelligence
- Remote delivery of audio/video lessons in real time or recorded
- Popular format of online courses often open to many learners
- Digital place where students collect evidence of learning
- Core term for information transmitted via networks — the global network
- Skills for finding, evaluating, using digital information
- Use of data to improve teaching and learning
- Practice of making learning fun with game elements.
- Learning model where students watch lectures at home, do activities in class.
- Teaching/learning through the internet — two words often hyphenated
Down
- Measurement of student performance; tests and feedback.
- Connecting and working together online; team learning.
- School system software that manages student records
- Platform schools use to host courses, materials, grades
- Technology-driven physical machines used in STEM learning.
- Technology that overlays digital info on the real world
- Course material delivered as downloadable, editable files
- Online collections of openly licensed teaching materials
- Hands-on mix of science, tech, engineering, arts and math in education.
- Process of turning lessons into short video/audio clips teachers can share.
- Small software programs on phones; short for applications
- Programming activity often taught to students
- Using simulated environments for immersive learning
25 Clues: Short for Artificial Intelligence • Use of data to improve teaching and learning • Programming activity often taught to students • Using devices students bring from home to school • School system software that manages student records • Practice of making learning fun with game elements. • Using simulated environments for immersive learning • ...
ASEANPOL 2025-09-22
Across
- Efforts to stop acts of terror
- The systematic process of gathering, documenting, and using data in investigations
- Illegal drug production, distribution, or use
- Working jointly, especially by sharing information or resources
- Abbreviation for ASEAN Police — ASEAN____
- Crime involving money-based wrongdoing
- Fundamental entitlements and freedoms of people
- Information especially secret or confidential used for strategic purposes
- Association of Southeast Asian Nations
- Illegally importing or exporting goods
- Teaching or preparing members in skills or knowledge
- Large-scale criminal enterprises (plural)
- Efforts to stop bad things before they happen
- The act of working together toward a common goal
Down
- Crime that crosses digital networks
- Official inquiries or probes
- An area or part of the world
- Countries that belong to a group
- Ability, skills, or resources that allow action
- The carrying out of planned tasks or missions
- Across multiple nations
- Relating to boundaries between countries
- The legal authority to make decisions or judgments
- A planned set of actions toward achieving something
- Material proof presented in legal cases
- International police organization
- The action of transporting illegal goods or people
- State of being free from danger or threats
- Capital city where many ASEANAPOL meetings are held
- Formal agreement or rules governing behavior
30 Clues: Across multiple nations • Official inquiries or probes • An area or part of the world • Efforts to stop acts of terror • Countries that belong to a group • International police organization • Crime that crosses digital networks • Crime involving money-based wrongdoing • Association of Southeast Asian Nations • Illegally importing or exporting goods • ...
Cyber Crossword 2025-10-30
Across
- crime investigation; comes after “digital”
- attack stage involving traversal between systems
- slang term for “hacked”
- attack component that performs the target malicious action
- to gain attacker presence on a system
- field focusing on protecting computers
- attack stage where NMAP may be used
- facility whose analysts may use a SIEM
- investigation of system and network records
- principle of least ___
- phrase an attacker says after gaining access
- network layer protocol with pings
- THE defensive cyber club
- fancy term for Google-fu
- smartcards using close-proximity communication
- fun term for a CDRU member
- evidence of malicious activity
- evil computer program
Down
- short form of “covered writing”
- comes before “base” or “science”
- a tantalizing trap for attackers
- engineering type that works on people
- act of sending a malicious email
- the shield to red’s sword
- authorized cyberattack to identify vulnerabilities
- proactive defense, or our theme this semester
- bypassing physical security devices without a key
- IT person in charge of organization computers
- act of smuggling data from a system
- common term for offensive security person
- short form of “secret writing”
- often a network packet filter
- collections of connected computers
- either 0 or 1
34 Clues: either 0 or 1 • evil computer program • principle of least ___ • slang term for “hacked” • THE defensive cyber club • fancy term for Google-fu • the shield to red’s sword • fun term for a CDRU member • often a network packet filter • short form of “secret writing” • evidence of malicious activity • short form of “covered writing” • comes before “base” or “science” • ...
Rykov's Crossword 2025-06-07
Across
- Tech reducing human effort in business
- Fixing errors in software
- First line of defense in security
- Driving force behind tech and business merging
- Directs traffic in enterprise networks
- Provides managed services
- Tracks health or security activity
- Growing media startup format
- Concern in surveillance debates
- Merging systems for seamless function
- Virtual boundary for location alerts
- Writes code for software solutions
- Pending tasks in Agile development
- Key to user-friendly design
- Formalizes service expectations
- Scramble data for protection
- Society embracing new tech
- Extending a service agreement
- Risk in digital transactions
Down
- Plan for project milestones
- Safeguard against data loss
- When systems are unexpectedly offline
- Radical change from new tech adoption
- Combined power of converging industries
- Modern way to watch television
- Pocket-sized tech revolutionizing life
- Consequence for missing SLA terms
- Mobile payments speeding up retail
- King in digital media
- Backbone of data centers
- Threat to banking and data safety
- Bridge between phone and laptop
- Device reading barcodes in stores
- Measuring user interaction
- Blocks unauthorized network access
- Remote doctor visits via tech
- Data capacity of a network
- Meeting regulations in healthcare
- Critical project milestone
- Billing for services rendered
40 Clues: King in digital media • Backbone of data centers • Fixing errors in software • Provides managed services • Measuring user interaction • Data capacity of a network • Critical project milestone • Society embracing new tech • Plan for project milestones • Safeguard against data loss • Key to user-friendly design • Growing media startup format • Scramble data for protection • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital content
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
Chapter 10 Communication 2025-09-28
Across
- — Everyone sees who was copied.
- — Any unsolicited email sent over the internet.
- — A worldwide collection of interconnected networks.
- — Websites that allow any user to create and edit pages with a web browser.
- networking sites — Sites for building online communities with shared interests and activities.
- — The address of a web page on the WWW.
- — Personal internet journals with observations and links.
- — The recipient’s name is hidden from everyone else.
- — A computer network based on internet technology but for internal organisational needs.
- — A part of the internet which users can access using web browser software.
- — Sends the original message and all previous history to a new person.
- — Software that displays a web page on a computer screen.
Down
- — The language used in emails should follow an acceptable code of practice.
- — Online discussion boards moderated by an administrator.
- — Allow intranets to be extended outside the organisation.
- — Send out multiple emails if addresses are grouped together under a single name.
- — A company that provides internet access, usually for a monthly fee.
- — Contain a combination of letters, numbers, and other symbols (e.g., Sy12@#TT90kj=0).
- — A shortened form of the phrase "internet etiquette," meaning respect and courtesy online.
- — The file is visible and available for the recipient to download.
20 Clues: — Everyone sees who was copied. • — The address of a web page on the WWW. • — Any unsolicited email sent over the internet. • — A worldwide collection of interconnected networks. • — The recipient’s name is hidden from everyone else. • — Online discussion boards moderated by an administrator. • — Personal internet journals with observations and links. • ...
crossword inquizitive 2018-04-20
4 Clues: / Number of non-zero singular values. • / Method to train deep neural networks. • / The concept used to check the continuity of a function at a point. • / Layer that uses a gating mechanism to control the information flow.
urmumsbum 2021-10-29
Across
- what is the acronym for Plain Old Telephone Service?
- what is re-booting a device either with a cold or warm boot called?
- what is the type of file that organises other files in a hierarchal structure?
- what is it called when you turn off a computer by pressing and holding down the power button until the system turns off? (two words)
- what is the acronym for 'post office protocol'?
- what is the device that routes traffic between networks?
Down
- what is a one-to-one connection? (3words)
- what is the interface on the computer or device where a device is connected?
- what is the acronym for pages per minute?
- what is the one piece of data along with a destination address used in a packet switching network called?
10 Clues: what is a one-to-one connection? (3words) • what is the acronym for pages per minute? • what is the acronym for 'post office protocol'? • what is the acronym for Plain Old Telephone Service? • what is the device that routes traffic between networks? • what is re-booting a device either with a cold or warm boot called? • ...
Mich Security 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- tool Programming language that allows applets to run within a web browser.
- Technology created by Microsoft to control interactivity on web pages.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
Down
- Also known as junk mail, is unsolicited e-mail.
- A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
- Gains access to resources on devices by pretending to be a trusted computer.
- Or malware is a file or program other then a virus that is potentially harmful.
- Is a self-replicating program that is harmful to networks.
10 Clues: Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a program written with malicious intent and sent out by attackers. • Technology created by Microsoft to control interactivity on web pages. • ...
ISM221 2023-03-02
Across
- Combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
- Innovation type that changes made to make a process more efficient.
- A set of instructions, data or programs used to operate computers and execute specific tasks
- ____is a computer program application used to improve a company's decision-making capabilities.
Down
- Full lifecycle of a product or process, including material sourcing, production, consumption and disposal/recycling processes
- Mode of computer data storage in which digital data is stored on servers in off-site locations.
- The way materials and other goods are brought into a company
- all the physical parts that make up a computer.
- ____is a collection of facts
- A type of management support system that facilitates and supports senior executive information and decision-making needs
10 Clues: ____is a collection of facts • all the physical parts that make up a computer. • The way materials and other goods are brought into a company • Innovation type that changes made to make a process more efficient. • A set of instructions, data or programs used to operate computers and execute specific tasks • ...
Risk Management 2023-03-06
Across
- Location that consists of everything that a business needs except computers
- Process of downgrading-undoing a recently applied patch or updated
- Documents that set out how to limit damage and recover quickly from an incident
- Open source tool for penetration testing many aspects of wireless networks
- Contract that defines the services, products, and time frames for the vendor to achieve
Down
- Process of documenting significant changes to the network
- Set of procedures defining actions employees should perform to protect the network's security
- Popular and extremely comprehensive vulnerability testing tool
- Document used to track the collection, handling, and transfer of evidence
- A unique tool that enables a penetration tester to use a massive library of attacks as well as tweak those attacks for unique penetrations
10 Clues: Process of documenting significant changes to the network • Popular and extremely comprehensive vulnerability testing tool • Process of downgrading-undoing a recently applied patch or updated • Document used to track the collection, handling, and transfer of evidence • Open source tool for penetration testing many aspects of wireless networks • ...
HSP3C Exam Review 2023-01-20
Across
- Things like eye color, hair color, and physical attributes are inherited from parents' genes.
- The scientific study of humans, including their origins, behavior; and physical, social, and cultural development.
- the scientific study of social behavior or society, including its origins, development, organization, networks, and institutions.
- to understand human society, culture, actions, attitudes, and behavior.
- Standards of what is important, good, true, and ethical
Down
- Study of bone and stone remains of our ancient ancestors.
- type of learning in which an unconditional stimulus is paired with a neutral stimulus, leading to a conditioned response
- Focuses on life experiences and connections between the conscious and unconscious mind
- The study of the origins and cultures of different races and peoples.
- Feeling that one’s values and lifestyles are superior to others.
10 Clues: Standards of what is important, good, true, and ethical • Study of bone and stone remains of our ancient ancestors. • Feeling that one’s values and lifestyles are superior to others. • The study of the origins and cultures of different races and peoples. • to understand human society, culture, actions, attitudes, and behavior. • ...
Artificial Intelligence 2023-04-26
Across
- a Technique used by AI systems to learn and improve from experience without being explicitly programmed.
- The branch of AI that deals with the design, construction, and operation of robots.
- a type of AI that mimics the structure and function of the human brain.
- the ability of an AI system to understand and interpret human language.
- A set of instructions or rules followed by a computer program to solve a problem.
- The use of AI to enhance human intelligence and decision-making.
Down
- an AI system designed to simulate conversation with human users.
- an AI system that uses knowledge and expertise to solve complex problems.
- a subfield of machine learning that uses neural networks to analyze large amounts of data.
- The ability of an AI system to interpret and understand visual information.
10 Clues: an AI system designed to simulate conversation with human users. • The use of AI to enhance human intelligence and decision-making. • the ability of an AI system to understand and interpret human language. • a type of AI that mimics the structure and function of the human brain. • an AI system that uses knowledge and expertise to solve complex problems. • ...
History of Computers 2020-05-08
Across
- responds to the rhythm of voice commands and delivers wisecracks pre-recorded on 78 rpm records.
- a short story detailing a world where computers, called Logics,
- Created by David Jones and Mike Dailly,
- funds the outfitting of a packet radio research van at SRI to develop standards for a Packet Radio Network (PRNET).
- becoming a major supplier of corporate network services
Down
- emerges as the dominant object-oriented language in the computer industry when Bjarne Stroustrup publishes the book
- connected via to New York over special telephone lines.
- had been a modest experimental network of networks owned by the U.S. government.
- a book has a major influence on research into artificial intelligence and control systems.
- read-only rope memory is launched into space aboard the Apollo 11 mission
10 Clues: Created by David Jones and Mike Dailly, • connected via to New York over special telephone lines. • becoming a major supplier of corporate network services • a short story detailing a world where computers, called Logics, • read-only rope memory is launched into space aboard the Apollo 11 mission • ...
GZ MAG 6 2020-11-06
Across
- softens the dirt within the pores.
- prejudice directed against a person or people groups on the basis of their membership in a particular racial or ethnic group.
- a chemical that improves a person's mood.
- one of the worst things you could apply to your face.
- showing the hole essence of what you are trying to show to the audience.
- putting yourself in a place where people can see how you work.
Down
- practice of defending computers, mobile devices, electronic systems, networks, and data from malicious or cyber-attacks.
- a store with style that inspires young people to feel confident about themselves when dressing up.
- refers to a change or shift along with a curve on a graph of price versus quantity.
- artistry a way to express yourself, boost your confidence, and show it off.
10 Clues: softens the dirt within the pores. • a chemical that improves a person's mood. • one of the worst things you could apply to your face. • putting yourself in a place where people can see how you work. • showing the hole essence of what you are trying to show to the audience. • artistry a way to express yourself, boost your confidence, and show it off. • ...
CMT Crossword 2016-12-20
Across
- - a telephone line built with a solid transmission medium
- - An acronym for World Wide Web
- - A site or area on the Internet that is accessed by its own Internet address.
- - a device that modulates an analog carrier with digital data
- - Sending and receiving electronic messages through a computer network.
- - a company that provides access to the internet for a monthly fee.sending and receiving information electronically between two or more computers.
Down
- - Referring to 'Wireless networks
- - a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio
- - To transfer a file or program from a central computer to a smaller computer or to a computer at a remote location.
- - Software used to view the Internet, it translates the HTML code
10 Clues: - An acronym for World Wide Web • - Referring to 'Wireless networks • - a telephone line built with a solid transmission medium • - a device that modulates an analog carrier with digital data • - Software used to view the Internet, it translates the HTML code • - Sending and receiving electronic messages through a computer network. • ...
Access Network-Crossword 2019-09-26
Across
- A device that connects two or more networks and forwards packets among them
- A means of delivering information to all members in a network.
- A communication channel whose transmission rate is lower than 2 Mbit/s
- Outer part of the optical fiber
- The sum of the service usage, consumption, and recharge fees of a subscriber.
Down
- It is used for splitting and sending optical power to multiple ONUs connected by an optical fiber
- A term that indicates the capacity with enough bandwidth to transmit voice, data and video signals.
- A process in which multiple channels of low-rate signals are multiplexed into one or several channels of required signals.
- A device that terminates the fiber optical network at the customer premises
- A process of transmitting data packets from one source to many destinations.
10 Clues: Outer part of the optical fiber • A means of delivering information to all members in a network. • A communication channel whose transmission rate is lower than 2 Mbit/s • A device that connects two or more networks and forwards packets among them • A device that terminates the fiber optical network at the customer premises • ...
Payments Crossword 2023-07-31
Across
- Payment disbursements made by a business to its various stakeholders, including customers, employees, vendors, suppliers, and channel partners
- Financial intermediary between merchants and card payment networks enabling a merchant to accept card payments
- Card scheme or payment network launched by National Payments Corporation of India
- Accounting process that compares logged financial records with bank entries
- Global payments network
Down
- Process of replacing the payment card account numbers with a unique digital identifier for enhanced data security
- Fund transfer by an issuing bank from the merchant's account to the customer's account when customer raises a payment dispute with the bank
- Global standard for secure payment messaging
- Central bank digital currency launched by RBI in retail & wholesale versions
- Unique identifier for an individual or a business on UPI to enable payment transactions
10 Clues: Global payments network • Global standard for secure payment messaging • Accounting process that compares logged financial records with bank entries • Central bank digital currency launched by RBI in retail & wholesale versions • Card scheme or payment network launched by National Payments Corporation of India • ...
Word Hike 2023-10-09
Across
- A hierarchical data structure consisting of nodes, with each node having child nodes.
- The process of finding and fixing errors or issues in a program.
- A program that translates source code into machine code or bytecode.
- The global network of interconnected computer networks.
- A reusable block of code that performs a specific task or operation.
Down
- A structured collection of data that is organized for efficient retrieval and manipulation.
- A set of instructions written in a programming language that tells a computer what to do.
- A linear data structure that holds a sequence of elements, allowing for dynamic resizing.
- The set of rules that dictate how code should be structured in a programming language.
- Data provided to a program, often entered by a user or from another source.
10 Clues: The global network of interconnected computer networks. • The process of finding and fixing errors or issues in a program. • A program that translates source code into machine code or bytecode. • A reusable block of code that performs a specific task or operation. • Data provided to a program, often entered by a user or from another source. • ...
Stay Safe in the Digital World 2025-03-25
Across
- A strong password should include a mix of these, along with letters and special characters.
- A network that allows you to securely browse the internet
- A method that adds an extra layer of security, requiring both a password and a code
- To make sure your operating system and software are protected from known vulnerabilities, you need to do this
Down
- The digital currency often used in ransomware attacks
- A setting method of limiting who can see your personal details on social media and online platforms.
- The process of saving your important data so you can recover it
- A suspicious email, message, or website designed to steal your personal information.
- software that helps detect and prevent malicious attacks on your computer.
- This tool is essential for protecting your personal information from hackers on public networks.
10 Clues: The digital currency often used in ransomware attacks • A network that allows you to securely browse the internet • The process of saving your important data so you can recover it • software that helps detect and prevent malicious attacks on your computer. • A method that adds an extra layer of security, requiring both a password and a code • ...
DEB 2025-10-10
Across
- – A smartphone’s __________________ is the flat display surface used to view apps, videos, and images.
- – A device used to supply electrical energy to the smartphone’s battery. __________________.
- – __________________ life determines how long a smartphone can run before needing to be charged.
- – The __________________ card is a small chip that allows smartphones to connect to mobile networks.
Down
- – __________________ is a wireless technology used to connect a smartphone with other devices.
- – __________________ sensor allows users to unlock their smartphones securely using their touch.
- – The total amount of data that can be saved on the device is called __________________ capacity.
- – The __________________ is the brain of the smartphone that controls all functions and performance.
- – A smartphone feature used to take photos and record videos is called a __________________.
- – __________________ are software programs installed on smartphones for performing specific tasks.
10 Clues: – A device used to supply electrical energy to the smartphone’s battery. __________________. • – A smartphone feature used to take photos and record videos is called a __________________. • – __________________ is a wireless technology used to connect a smartphone with other devices. • ...
Non-GT Cyber Security Fun Quiz 2025-09-23
Across
- A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
- _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
- The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
- A program designed to spread from one computer to another is called a _ _ _ _ _.
- The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
- The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
- _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
- The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
- A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
- A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.
10 Clues: The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _. • A program designed to spread from one computer to another is called a _ _ _ _ _. • A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet. • A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information. • ...
Emerging and Future Technology 2021-11-26
Across
- Theory of computer systems able to perform tasks requiring human intelligence
- Machines that use the properties of quantum physics to and perform computations
- network of objects that are embedded with technologies for the purpose of connecting and exchanging data with other devices over the internet.
- Fifth generation technology standard for broadband cellular networks
Down
- Branch of computer science which focuses on the use of data and algorithms to imitate the way that humans learn
- A computer-generated simulation of an environment
- System in which a record of transactions made in a cryptocurrency are maintained across several linked computers
- Technology that is used for automating jobs
8 Clues: Technology that is used for automating jobs • A computer-generated simulation of an environment • Fifth generation technology standard for broadband cellular networks • Theory of computer systems able to perform tasks requiring human intelligence • Machines that use the properties of quantum physics to and perform computations • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
INTRODUCING TODAY'S TECHNOLOGIES PART2 2021-09-10
Across
- Wireless communication technology that uses short-range radio signal
- Term used to refer collectively to hard disks and SSDs
- Each electronic document on the web; can contain text, graphics, audio, and video.
- A collection of related webpages and associated items stored on a web server.
- Software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
Down
- storage An Internet service that provides remote storage to computer users
- Program designed to make users more productive and/or assist them with personal tasks
- camera A mobile device that allows users to take pictures and store the photographed images digitally
- reader A mobile device that is used primarily for reading e-books and other digital publications.
- A worldwide collection of computer networks
10 Clues: A worldwide collection of computer networks • Term used to refer collectively to hard disks and SSDs • Wireless communication technology that uses short-range radio signal • storage An Internet service that provides remote storage to computer users • A collection of related webpages and associated items stored on a web server. • ...
Medicare Advantage 2021-06-28
Across
- Medicare Advantage plans include ________ coverage to protect your pearly whites.
- Former Jets quarterback turned Medicare Advantage spokesperson.
- Medicare Advantage plans offer low or $0 _______.
- Your Supplement plan premium will ________ every year, forcing you to pay more regardless of how often you use your plan.
- Medicare Advantage plans have larger ________ than ever, giving you access to more doctors and hospitals.
Down
- These video calls with your doctor are covered by Medicare Advantage.
- You got one as a kid for doing chores; now you can get one from your Medicare Advantage plan to use at the drug store.
- Medicare Advantage plans often include coverage for prescription ________.
- During Annual Enrollment, you can _______ from your current plan to a different plan for 2022.
- Save money on Medicare Advantage by paying as you ________, instead of monthly.
10 Clues: Medicare Advantage plans offer low or $0 _______. • Former Jets quarterback turned Medicare Advantage spokesperson. • These video calls with your doctor are covered by Medicare Advantage. • Medicare Advantage plans often include coverage for prescription ________. • Save money on Medicare Advantage by paying as you ________, instead of monthly. • ...
Message Management System 2019-11-17
Across
- Live, interactive conversations over a public network.
- Using the computer to speed up the performance of existing tasks.
- The user point-of-entry for the required function in client/server computing
- Program code defects or errors.
- A piece of information describing a particular entity.
- A binary digit representing the smallest unit of data in a computer system.
Down
- The coding and scrambling of messages to prevent their being read or accessed without authorization.
- Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use
- Software designed to detect, and often eliminate, computer viruses from an information system.
- Standard for wireless personal area networks that can transmit up to 722 Kbps within a 10-meter area.
10 Clues: Program code defects or errors. • Live, interactive conversations over a public network. • A piece of information describing a particular entity. • Using the computer to speed up the performance of existing tasks. • A binary digit representing the smallest unit of data in a computer system. • ...
Set 3 2022-10-16
Across
- The core building block of a CNN, most of the computation occurs in this layer
- A process of categorizing a given set of data into classes
- A Machine Learning technique that helps in detecting the outliers in data
- An activation functions that does not activate all the neurons at the same time
Down
- A matrix layout that is used to define the performance of a classification algorithm
- Algorithm that maps data to a high-dimensional feature space so that data points can be categorized
- Machine learning is a subset of
- ML Algorithm based on the idea of Bagging
- A regression technique that can process both numeric and categorical input attributes
- The activation function that is most widely used in the output layer of neural networks for multiclass classification
10 Clues: Machine learning is a subset of • ML Algorithm based on the idea of Bagging • A process of categorizing a given set of data into classes • A Machine Learning technique that helps in detecting the outliers in data • The core building block of a CNN, most of the computation occurs in this layer • ...
Globalisation 2024-02-24
Across
- The action of buying and selling goods and services.
- The degree to which places are connected or linked by communication networks.
- To package goods in large standardised containers for efficient shipping.
- Exchanging of information by speaking, writing or using some other medium.
- Process by which people become interconnected around the world, both in ideas and activities.
Down
- Relating to or including more than one country
- A company operating in several countries.
- To take or carry (people or goods) from one place to another using vehicle, aircraft, or ship
- A term which refers to the rapid rate of globalisation that has made the world feel smaller, more connected to people on the other side of the world
- The system of trade and industry by which the wealth of a country is made and used
10 Clues: A company operating in several countries. • Relating to or including more than one country • The action of buying and selling goods and services. • To package goods in large standardised containers for efficient shipping. • Exchanging of information by speaking, writing or using some other medium. • ...
Middleware And Protocols Of IOT 2024-04-06
Across
- It Defines Input and the output of Apis
- To provide an internet connection, and connect devices to a local network
- Is a software that sits b/w the Hardware and applications layer in iot
- composed of several key components that work together to deliver high-speed wireless communication
- a standardized set of rules for formatting and processing data.
Down
- A standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks
- It sometimes arrives that some sensors have items that belong or not to them.
- composed of an interrogator (reader) and at least one transponder (tag
- The Protocol services include Who-IS,Who-Has,I-Have,I-Am which are used for device and object Discovery
- The End devices can have multiple Eps
10 Clues: The End devices can have multiple Eps • It Defines Input and the output of Apis • a standardized set of rules for formatting and processing data. • composed of an interrogator (reader) and at least one transponder (tag • Is a software that sits b/w the Hardware and applications layer in iot • ...
STEM Careers 2023-04-17
Across
- someone who designs buildings and overlooks construction.
- engineer that develop, test, manufacture and maintain systems and products that use ________ technology
- an engineer that is associated with biology and technology for the research and development of new products
- engineer who deals with the design, development, and maintenance of software applications
Down
- measures and gather data about the individuals or elements of a sample, then analyze data to generate stats
- engineer that focuses on advances in technology and medicine to develop new equipment for improving human health
- someone who overlooks technological purposes to ensure the protection of cybersystems or networks
- engineer that develop, and test aircrafts, satellites, and missiles
- scientists that define the computational principles that are basis of all software
- engineer that designs, builds, supervises, constructs, and maintains infrastructure projects
10 Clues: someone who designs buildings and overlooks construction. • engineer that develop, and test aircrafts, satellites, and missiles • scientists that define the computational principles that are basis of all software • engineer who deals with the design, development, and maintenance of software applications • ...
Data Transmission 2022-07-13
Across
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that can be sent in one direction only
- a horizontal and vertical parity check on a block of data being transmitted
Down
- data that can be sent in both directions but not at the same time
- data that can be sent in both direction simultaneously
- stages in a network that can receive and transmit data packets such as routers
- a bit either 0 or 1 added to a byte of data in the most significant bit position
- a number in a data packet header used used to stop data packets that never reach their destination from clogging up the data paths
- data that arrives at the destination with bits no longer synchronised
10 Clues: data that can be sent in one direction only • the actual data being carried in a data packet • data that can be sent in both direction simultaneously • data that can be sent in both directions but not at the same time • data that arrives at the destination with bits no longer synchronised • a device that enables data packets to be moved between different networks • ...
Data Transmission 2022-07-13
Across
- data that can be sent in both direction but not at the same time
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths
- a small part of a message that is transmitted over a network
- the actual data being carried in a data packet
Down
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check if data transferred has been altered or corrupted
- a horizontal and vertical parity check on a block of data being transmitted
- a device that enables data packets to be moved between networks
- stages in a network that can receive and transmit data
- data that can be sent on one direction only
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data • a small part of a message that is transmitted over a network • a device that enables data packets to be moved between networks • data that can be sent in both direction but not at the same time • ...
THE INTERNET & SURVEILANCE QUIZ 2025-02-19
Across
- a global network of interconnected computers and servers that communicate with each other using standardized protocols.
- A system used for tracking movement
- A short-range wireless standard for exchanging data between devices and creating personal area networks.
- a malicious and deliberate attempt by an individual or organization to breach the information system
- an organization that provides myriad services related to accessing, using, managing, or participating in the Internet.
Down
- The act of secretly listening to conversation
- a specific area where someone or something lacks the necessary technical skills, knowledge, or capability to perform a task effectively.
- The system used to link alphabetical website names to numeric internet protocol addresses
- The access of stored data without the permission of those holding it
- a network security device that blocks IP addresses
10 Clues: A system used for tracking movement • The act of secretly listening to conversation • a network security device that blocks IP addresses • The access of stored data without the permission of those holding it • The system used to link alphabetical website names to numeric internet protocol addresses • ...
Industrial Revolution 2025-11-20
Across
- people in the middle of the social hierarchy
- uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
- the process of making an area more urban
- the process of supplying a military force with modern weapons and vehicles
- social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
- people who earn wages through labor
- a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
- the process of making something conform to a standard
- system of interconnected routes and relationships that facilitate between different regions and ethnicity
- the measure of efficiency of production of goods or services
10 Clues: people who earn wages through labor • the process of making an area more urban • people in the middle of the social hierarchy • the process of making something conform to a standard • the measure of efficiency of production of goods or services • the process of supplying a military force with modern weapons and vehicles • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Equatorial orbit is sometimes called as • Link between satellite and earth station • Reliability curve in Satellite communication • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Internet crossword puzzle 2014-04-30
Across
- a reference to a published source.
- network etiquette; following the rules online,being a good digital citizen.
- text or graphics that,when clicked,will connect the user to a new web page or another place on the same page.
- the unauthorized use,reproduction,distribution,or transmission of copyrighted material (like pirates-its stealing)
- a restricted computer network;a private network created using a world wide web software,example:Hays CISD network.
- A group of connected computers
Down
- a bully who operates online, in cyberspace; to bully online
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
8 Clues: A group of connected computers • a reference to a published source. • a bully who operates online, in cyberspace; to bully online • network etiquette; following the rules online,being a good digital citizen. • text or graphics that,when clicked,will connect the user to a new web page or another place on the same page. • ...
Science and Technology in the 2000s 2023-03-24
Across
- Mobile devices used for communication and accessing the Internet
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Websites and applications that enable users to create and share content or to participate in social networking.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Tech company best known for its extensive search engine and other products
- Among the most popular mobile phone distributor
- Largest online shopping/delivery company
8 Clues: Largest online shopping/delivery company • Among the most popular mobile phone distributor • Mobile devices used for communication and accessing the Internet • Tech company best known for its extensive search engine and other products • Websites and applications that enable users to create and share content or to participate in social networking. • ...
COMPUTER 2018-09-22
Across
- It is the term short for "emotion icon.”
- It is also called a notebook computer or small portable personal computer.
- It is defined as the transmission of messages over communications networks.
- It is a particular way that information is encoded for storage in a computer file.
Down
- It is a global wide area network that connects computer systems across the world.
- It is a specific typeface of a certain size and style.
- It is a typewriter-style device which uses an arrangement of buttons or keys to act as mechanical levers or electronic switches.
- It refers to moving an icon or other image on a display screen.
8 Clues: It is the term short for "emotion icon.” • It is a specific typeface of a certain size and style. • It refers to moving an icon or other image on a display screen. • It is also called a notebook computer or small portable personal computer. • It is defined as the transmission of messages over communications networks. • ...
Crossword Li5 2023-12-28
Across
- Name the annual economic document presented by the Government of India detailing the state of the economy.
- Identify the Indian financial regulation act that governs non-banking financial companies and microfinance institutions.
- Founder of a very famous Indian multinational corporation?
- India's central public sector enterprise under the Ministry of Finance, involved in tax collection?
- Name the Indian government program launched to connect rural areas with high-speed internet networks.
Down
- Indian regulatory authority is responsible for the regulation and supervision of the insurance sector?
- Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017?
- Indian government's crop insurance scheme to protect farmers against crop failure?
8 Clues: Founder of a very famous Indian multinational corporation? • Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017? • Indian government's crop insurance scheme to protect farmers against crop failure? • India's central public sector enterprise under the Ministry of Finance, involved in tax collection? • ...
Internet 2020-11-23
Across
- to write about your activities or opinions on the net, an online diary
- an international computer network connecting other networks and computers from companies,universities, different organizations etc.
- to use the Internet while looking for information
- an area on the Internet where you can communicate with each other
Down
- a person who writes an online diary
- a place connected to the Internet where a company, an organization or an individual puts information
- a secret word or a phrase that you need to kmow to be allowed to use a computer system
- a way of sending messages and information by means of computers connected in a network
8 Clues: a person who writes an online diary • to use the Internet while looking for information • an area on the Internet where you can communicate with each other • to write about your activities or opinions on the net, an online diary • a secret word or a phrase that you need to kmow to be allowed to use a computer system • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Chapter 7 - Individual and Collective Economic Empowerment (pg. 279 - 316) 2023-05-25
Across
- the institution of (blank) coerced Blacks into playing a major role in generating pre-Civil War economic growth in the U.S.
- prioritizing the application of entrepreneurial and other business principle to solve social problems
- Black(blank)entrepreneurship, Black majority ownership and decision-making power
Down
- difference in income that has narrowed down over the years, but still exists
- a vehicle to teach the black entrepreneur how to tap into the billions of dollars generated by Blacks
- a movement to describe the effort to establish economic networks
- (1929-1933) took it's tool in the number of Black businesses that failed
- measure of everything a household owns (assets), minus everything owed to creditors (liabilities).
8 Clues: a movement to describe the effort to establish economic networks • (1929-1933) took it's tool in the number of Black businesses that failed • difference in income that has narrowed down over the years, but still exists • Black(blank)entrepreneurship, Black majority ownership and decision-making power • ...
Educational Inequality Crossword 2025-11-25
Across
- Policies, laws, and institutions that reproduce racial inequalities.
- Daily, commonplace insults and racial slights that cumulatively affect the psychological well-being of people of color.
- The power of a socially dominant group to make its preferences, tastes, and norms appear to be superior to those of the nondominant group.
- Cultural resources that offer social and other benefits.
Down
- The unequal distribution of resources, opportunities, and outcomes in education
- Relationships and networks that offer social and other benefits.
- The disparate educational outcomes of White, Asian, Black, Latinx, and Native American People.
- Theory that multiple social categories like race, gender, class, and sexuality can overlap to create unique systems of discrimination or privilege.
8 Clues: Cultural resources that offer social and other benefits. • Relationships and networks that offer social and other benefits. • Policies, laws, and institutions that reproduce racial inequalities. • The unequal distribution of resources, opportunities, and outcomes in education • ...
ESTI: April 2021 Newsletter 2021-04-09
4 Clues: A phase in the human sleep cycle • A computer program that mimics the human brain • Chemical messengers in the brain that transmit signals between neurons • The ability of neural networks to change based on external experiences.
Daniela Carballido 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization
- Is a self-replicating program that is harmful to networks
- Web ... is important because so many people visit the World Wide Web every day
- Is a program written with malicious intent and sent out by attackers
- Is a software program that displays advertising on your computer
Down
- Is technically a worm, does not need to be attached to other software
- Organizations also make ... aware of the dangers of opening e-mail attachments that may contain a virus or a worm
- It is distributed without any user intervention or knowledge
- Is a file or program other then a virus that is potentially harmful
- Events or attacks that remove, corrupt, deny access,allow access or steal imformation
10 Clues: Is a self-replicating program that is harmful to networks • It is distributed without any user intervention or knowledge • Is a software program that displays advertising on your computer • Is a file or program other then a virus that is potentially harmful • Is a program written with malicious intent and sent out by attackers • ...
11.2 2014-03-21
Across
- selling television programs to individual stations, not networks
- an illegal payment by record labels to radio stations to persuade them to play the label's record
- in film distribution, target audience after a film has been in first run at theaters
- previews of upcoming movies shown before they are released
Down
- total income from sales before costs, expenses, and taxes are deducted
- a catchy tune or song that promotes a product or comapny
- a promotional plan that combines selling advertising, public relations, and the use of different media to reach target market.
- in film distribution, the target audience, which is the theaters that show films in first release.
- the schedule, or times, for broadcasting shows on televison, or radio.
- theaters that sell tickets and show films to an audience
10 Clues: a catchy tune or song that promotes a product or comapny • theaters that sell tickets and show films to an audience • previews of upcoming movies shown before they are released • selling television programs to individual stations, not networks • total income from sales before costs, expenses, and taxes are deducted • ...
Basics In Networking 2015-02-10
Across
- It is a connectionless service used by DHCP.A connection network service at the Transport layer
- _________ allows a user to connect to a remote host in terminal mode
- To send a signal in all directions at the same time
- Length of this address is 128 bits -
- It is a 15 bit number used for identifying a wireless system
Down
- These are used to tie multiple networks together and analyze the data being sent over a network, change how it is packaged, and send it to another network.
- A network device that connects two different systems, using direct and systematic translation between protocols
- ___ determines the network portion of an IP address
- one-to-many approach to network address translation
- A computer or device that links two similar LANs based on the same protocol
10 Clues: Length of this address is 128 bits - • ___ determines the network portion of an IP address • one-to-many approach to network address translation • To send a signal in all directions at the same time • It is a 15 bit number used for identifying a wireless system • _________ allows a user to connect to a remote host in terminal mode • ...
internet dangers 2021-03-15
Across
- computer program that replicates itself in order to spread to other computers.
- a malicious piece of computer code designed to spread from device to device.
- collection of instructions and data that tell the computer how to work
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
Down
- attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the protection of computer systems and networks from information disclosure,
- aimed at causing the network connection to fail.
- any malware which misleads users of its true intent
- messages transmitted and received by digital computers through a network
10 Clues: aimed at causing the network connection to fail. • any malware which misleads users of its true intent • collection of instructions and data that tell the computer how to work • messages transmitted and received by digital computers through a network • the protection of computer systems and networks from information disclosure, • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Declared anti-Black Racism as a public health crisis
- Crisis Assistance Helping Out On The Streets Acronym
- What is Bill 178?
- What is our asset organization's acronym?
Down
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- key asset component
- What region was identified in step one of the asset collection method?
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
10 Clues: What is Bill 178? • key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out On The Streets Acronym • What region was identified in step one of the asset collection method? • ...
Data Transmission 2022-07-13
Across
- a verification method used to check if data transferred has been altered or corrupted
- stages in a network that can receive and transmit data
- a device that enables data packets to be moved between networks
- a small part of a message that is transmitted over a network
- data that can be sent on one direction only
Down
- data that arrives at the destination with the bits no longer synchronised
- the actual data being carried in a data packet
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths
- data that can be sent in both direction but not at the same time
- a horizontal and vertical parity check on a block of data being transmitted
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data • a small part of a message that is transmitted over a network • a device that enables data packets to be moved between networks • data that can be sent in both direction but not at the same time • ...
Cailey Mustafa - HIring and Staffing 2023-09-14
Across
- advance or raise (someone) to a higher position or rank.
- a form employers use to collection information about you to see if you are a good fit for the position
- the action of finding new people to join an organization or support a cause.
- a statement that has information about your credit activity and current credit situation
- make (a company or organization) smaller by eliminating staff positions.
Down
- hiring someone from within your existing business structure
- a person, company, or organization that pays people to work for them. My employer is rude.
- a person employed for wages or salary, especially at non executive level
- interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- filling a job vacancy with an employee from outside the company
10 Clues: advance or raise (someone) to a higher position or rank. • hiring someone from within your existing business structure • filling a job vacancy with an employee from outside the company • a person employed for wages or salary, especially at non executive level • make (a company or organization) smaller by eliminating staff positions. • ...
Artificial Intelligence and Finance 2023-09-21
Across
- The process of transforming unstructured financial data (e.g., news articles) into structured data for analysis (2 words)
- A measure of model performance in machine learning, often used to evaluate banking risk models
- The organization responsible for regulating financial markets in the United States
- A measure of the overall stock market's performance
- The technique in NLP that converts words or phrases into numerical representations
Down
- Boosting method popularly used in Wells Fargo
- The process of spreading investments across various asset classes to reduce risk.
- A machine learning technique that involves training multiple models and combining their predictions, commonly used in credit scoring
- A type of account that earns interest and has no fixed maturity date
- An advanced AI technique used in banking to model complex financial systems, often involving recurrent neural networks
10 Clues: Boosting method popularly used in Wells Fargo • A measure of the overall stock market's performance • A type of account that earns interest and has no fixed maturity date • The process of spreading investments across various asset classes to reduce risk. • The organization responsible for regulating financial markets in the United States • ...
Cisco Chapter 11 2016-06-07
Across
- malicious code that presents itself as something it is not
- someone who steals your personal information
- someone trying to gain control of your system by trying to crack the password
- after looking at your data, they change the data
- the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- communication between you and your friend but someone else is monitoring you
- allows traffic that originated from inside the local network to return through the firewall from outside the network
- network attack involves the disabling or corruption of networks, systems, or services
- network attack that replicated and attacks other computers
10 Clues: someone who steals your personal information • after looking at your data, they change the data • malicious code that presents itself as something it is not • network attack that replicated and attacks other computers • communication between you and your friend but someone else is monitoring you • ...
Cisco Chapter 11 2016-06-07
Across
- malicious code that presents itself as something it is not
- network attack involves the disabling or corruption of networks, systems, or services
- allows traffic that originated from inside the local network to return through the firewall from outside the network
- someone who steals your personal information
- network attack that replicated and attacks other computers
Down
- communication between you and your friend but someone else is monitoring you
- after looking at your data, they change the data
- the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- someone trying to gain control of your system by trying to crack the password
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
10 Clues: someone who steals your personal information • after looking at your data, they change the data • malicious code that presents itself as something it is not • network attack that replicated and attacks other computers • communication between you and your friend but someone else is monitoring you • ...
Station 1 2024-05-23
Across
- Plants and algae make ______ using light energy, water and carbon dioxide in the process of photosynthesis
- Objects made from _____ density materials typically have a _____ mass
- The computer's "brain" responsible for processing instructions entered into the computer
- The random motion of tiny particles in a fluid is known as _______ motion
- A type of memory where data is lost when the computer is switched off
- Programs that control the operation of a computer or the processing of electronic data
- All substances are made of tiny particles of matter called ______ which are the building blocks of all matter
Down
- Liquids and solutions that are able to conduct electricity are called __________
- Used to connect two networks or network segments to create a single larger network
- Moving images with or without sound, used for entertainment, education, or promotional purposes
10 Clues: Objects made from _____ density materials typically have a _____ mass • A type of memory where data is lost when the computer is switched off • The random motion of tiny particles in a fluid is known as _______ motion • Liquids and solutions that are able to conduct electricity are called __________ • ...
Network Attack 2024-10-01
Across
- A covert method of secretly intercepting data during sensitive transmissions
- A self-replicating malware that spreads through networks in a rapid manner
- A deceptive scheme using fraudulent emails to trick users into revealing sensitive information
- A dangerous technique that exploits vulnerable systems by inserting malicious code
- A devastating form of malware that locks files and demands a substantial payment for access
Down
- A stealthy technique for capturing valuable network packets to gather information
- A deceptive form of malware disguised as trustworthy software to trick users
- A massive attack that floods a target with excessive traffic to disrupt service
- A malicious tactic that disguises the attacker's identity as a legitimate source to gain unauthorized access
- A destructive piece of code that attaches itself to innocent files and spreads
10 Clues: A self-replicating malware that spreads through networks in a rapid manner • A covert method of secretly intercepting data during sensitive transmissions • A deceptive form of malware disguised as trustworthy software to trick users • A destructive piece of code that attaches itself to innocent files and spreads • ...
Cloud Computing 2025-03-06
Across
- Provide ways of moving data within the cloud or between networks and resources.
- network model in which data, applications, and processing power are managed by servers on the internet
- Refers to cloud functions that process data in some way
- Services delivered by a third-party provider
- cloud computing platform offered by Oracle as a rebranding of their existing On Demand services
- caused by poor routing, insufficient bandwidth, or a bottleneck
Down
- virtual—meaning logical or even imaginary—version of something rather than the actual, or physical, version
- When company delivers cloud services to their own employees through the use of virtualization technologies
- a logical computer running an operating system that borrows hardware resources from its physical host computer and otherwise functions as a completely independent system.
- computing arm of Microsoft’s enterprise
10 Clues: computing arm of Microsoft’s enterprise • Services delivered by a third-party provider • Refers to cloud functions that process data in some way • caused by poor routing, insufficient bandwidth, or a bottleneck • Provide ways of moving data within the cloud or between networks and resources. • ...
Technology and Digital Literacy 2025-04-14
Across
- : Measures taken to protect computers, networks, and data from attacks or damage.
- : The process of converting information into a secret code to prevent unauthorized access.
- : A secret word or phrase used to gain access to a system or service.
- : A model or program that imitates real-world processes or systems for study or training.
- : Programs and operating information used by a computer.
- : A set of step-by-step instructions used to solve a problem or perform a task.
Down
- : A computer that provides data and services to other computers over a network.
- : A new idea, method, or device that brings improvement or change.
- : A group of connected computers or devices that share resources and information.
- : Information, often in the form of facts or numbers, that is collected and used for analysis.
10 Clues: : Programs and operating information used by a computer. • : A new idea, method, or device that brings improvement or change. • : A secret word or phrase used to gain access to a system or service. • : A computer that provides data and services to other computers over a network. • : A set of step-by-step instructions used to solve a problem or perform a task. • ...
Set A-Deep Learning 2025-07-23
Across
- This neural network type uses convolution operations and is popular in image recognition tasks.
- A type of learning where the system infers patterns without labeled outcomes.
- A visual representation extracted from audio to train music genre classifiers.
- The function used to introduce non-linearity in a neural network, commonly ReLU or sigmoid.
- An unsupervised model that learns efficient representations by encoding and decoding input data.
- A type of neural network suitable for sequential data like text or time series.
Down
- A method that involves normalizing input values across a batch during training.
- The phenomenon where a model performs well on training data but poorly on new data.
- The method by which neural networks are trained, adjusting weights to reduce error.
- This mechanism in RNNs helps retain long-term dependencies.
10 Clues: This mechanism in RNNs helps retain long-term dependencies. • A type of learning where the system infers patterns without labeled outcomes. • A visual representation extracted from audio to train music genre classifiers. • A method that involves normalizing input values across a batch during training. • ...
Network 2012-11-30
Across
- items like printers that can be used by many different users on network
- device that connects two or more networks together
- most basic and cheapest device that connects all computers on network
- this computer does not rely heavily on server yet still uses resources on network
- most common way to connect computers on network without using cables
- unique number built into virtually every network device,it is stored on ROM
- fastest type of cable,limited to speed of light
- networkt hat may spread over several countries and continents
Down
- sender and receiver synchronise times & agree on transfer rate
- type of cable that is used to connect computers on network
- each machine is given this,it is used to identify it uniquely on network
- identifies services available on network computers
- a rule that deals with ensuring that data is send & received on network
- company that provides access to internet
- computer which connects to network & uses its resources
- device that carries out tasks on network and provides other computers with access to resources
- network within small area
- set of rules about how to dos omething,communication on a network would not bepossible without it
- assigns blocks of addresses to countries
- series of high speed cables which provides network over large geographical area
20 Clues: network within small area • company that provides access to internet • assigns blocks of addresses to countries • fastest type of cable,limited to speed of light • identifies services available on network computers • device that connects two or more networks together • computer which connects to network & uses its resources • ...
Unit 2 Vocabulary Crossword 2012-10-02
Across
- the programs and other operating information used by a computer
- the systematic knowledge of the physical or material world gained through observation and experimentation
- a system of interlinked hypertext documents contained on the Internet
- a camera that captures and stores videos digitally
- the link for a hypertext file to another location
- programs on a computer with a user interface
- the exchanging of information
- the key component of a computer's system
- an international computer network that lets you access educational institutions, government agencies, and industry
Down
- a program that accesses files on the internet and other networks
- the physical components of a computer
- combing words using and, or, not, near to define your internet search
- the application of scientific knowledge for practical purposes
- the act of copying data from one computer system to another
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- stands for hypertext markup language
- to send messages through the internet on the computer
- to browse the Internet; look around casually and randomly, without seeking anything in particular
- a camera that captures and stores images digitally
- a location or address identifying where documents can be found on the Internet
20 Clues: the exchanging of information • stands for hypertext markup language • the physical components of a computer • the key component of a computer's system • programs on a computer with a user interface • the link for a hypertext file to another location • a camera that captures and stores videos digitally • a camera that captures and stores images digitally • ...
The Islamic World 2013-03-12
Across
- Core of Islam for scholars
- Center of commercial networks
- Spanish Muslim Poet
- Allowed Islam cities to become syncretistic
- highly influential thinker and rationalist
- Caused spread of the Quran
- language of science, literature and religion
- Smallest population in world at this time
- What brought the masses to Islam
- time when Islam became the peoples faith
- tax for none Muslims
- Where Arabic is primary langue
- Vehicle once believed to be capable to unite Islamic world
- Mystical movement in Islam
- Turks who conquered the Shiite's
- City Mongol's attacked in 1258
Down
- One of the three things embraced by the Islam Culture
- Area lead by caliphs
- Areas Sufi had carried religion to
- Uniting group of Orthodox and unorthodox Muslims
- Sufi order made Islam this
- Religion which spoke to the common folk
- people who were the educated class
- Founder of the Mevlevi Sufi order
- System made to protect the religious minorities
- Time when a unified Islam seemed just a dream
- Where Islam had spread to by 1300's
- Muslims became the majority of people
- The major religion Islam fought against
- Allowed for many cultures to flourish
- Was politically fractured during this time period
31 Clues: Spanish Muslim Poet • Area lead by caliphs • tax for none Muslims • Core of Islam for scholars • Sufi order made Islam this • Caused spread of the Quran • Mystical movement in Islam • Center of commercial networks • Where Arabic is primary langue • City Mongol's attacked in 1258 • What brought the masses to Islam • Turks who conquered the Shiite's • Founder of the Mevlevi Sufi order • ...
Digital Literacy and Responsibility 2014-10-21
Across
- storage of music on digital audio players
- something you can add to a software
- known as an app
- the use of letters and punctuation that indicates a emotion
- physical parts of a computer
- content and media that combines
- representing the thoughts of an author as your own
- receiving data, such as music, or videos
- like google and bing
- electronic mail
- system that stores enormous amounts of data
- a camera for real-time video footage
- sending data on a website
Down
- Rights given to someone who creates the original work
- a cell phone that is smart
- the location of the website
- to harm someone online
- your computer network has been broken into
- network which links smaller computer networks together
- world wide web
- area where a cell phone doesn't receive a signal
- Media like Facebook and twitter
- address of a website
- Processing Unit Brain of the computer called CPU
- software that displays advertisement.
- act of quoting providing the specific source of the material
- a device that is used for reading electronic books
- theft fraud when someone pretends to be you
- computer software designed to harm a computer
- you can get this at places to get on the internet
30 Clues: world wide web • known as an app • electronic mail • address of a website • like google and bing • to harm someone online • a cell phone that is smart • sending data on a website • the location of the website • physical parts of a computer • content and media that combines • Media like Facebook and twitter • something you can add to a software • a camera for real-time video footage • ...
VOCAB REVIEW 2016-02-25
Across
- maximum particle size
- pattern: commonly encountered drainage pattern
- load: streams carry dissolved substances
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- slow flow
- leaping movement of sand
- separate from the drainage basin of another by a imaginary line
- flat area about level with top of the channel
- fast flow
- tangled networks
- basin: land area that contributes water to a river system
Down
- when streams diverge from a central area likes pokes from the hub of a wheel
- place where the ground slopes up/down
- load: fine particles suspended in water
- level: most streams is global sea level
- loop-like bend in a stream channel
- quantity of water passing by a point on the steamboat
- absorbed by plants, which the release it into the atmosphere
- maximum load
- bank:river cliff
- cycle: unending circulation of H2O
- the rate of rainfall exceeds earth's ability to absorb
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- process by which liquid water changer into water vapour
- gen. term for sediment deposited by streams
- and corner frequency
- pattern: exhibits many right angle bends
- bars:arcuate deposit of sand along the in inside of bend
- load: course particles move along streambed
29 Clues: slow flow • fast flow • maximum load • bank:river cliff • tangled networks • and corner frequency • maximum particle size • leaping movement of sand • loop-like bend in a stream channel • cycle: unending circulation of H2O • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
unit 7 terms 2015-12-16
Across
- burned creates electricity.
- finished goods including processing and construction.
- of physical infracsture and emergence of social/political elite.
- advanced gas
- cost associated with the establishment transportation networks accessible from a specific place.
- industries that cater to the general population and businesses.
- of comparative advantages in international trade.
- flow of water on a wheel, is contained and reused as power.
- trade/continues to open themselves to foreign investment and international markets.
Down
- or harvests products from the earth including production from raw materials and basic foods.
- purpose is to facilitate the other businesses.
- purpose is to provide services to individual consumers who desire them and can afford to pay for them.
- 2 atoms are mixed together to make more power
- wind to create electricity
- resulting from the unique characteristics of a location.
- that absorb sunlight and turn it into electricity
- triggered by external influence, interests, or markets.
- in manufacturing exceeds 10%of national income; development of modern social, economic, and political institutions.
- an atom splits or collides turning it into nuclear energy
- to provide security and protection for citizens and businesses.
20 Clues: advanced gas • wind to create electricity • burned creates electricity. • 2 atoms are mixed together to make more power • purpose is to facilitate the other businesses. • that absorb sunlight and turn it into electricity • of comparative advantages in international trade. • finished goods including processing and construction. • ...
COSC 100 2016-02-15
Across
- Display of HTML tags found on the World Wide Web
- Sending and receiving occur at different times
- Tool used for making slideshows that include pictures, video, music, and so on
- Known as local area network or when computers are geographically close
- Web servers and their files (WWW)
- Composed of HTML tags and multimedia files
- Using about half the words as the control condition
- Software that allows you to create a web page with only text
Down
- Sender and receiver are active at the same time
- Pictures, movies, graphics, etc. embedded in a web page
- Using neutral rather than subjective, boastful, or exaggerated language
- The main technology for local area networks, also used for connecting all the computers in a lab or building
- Gaining unauthorized access/data to a website or system
- The codes or tags that browsers use to create web pages
- The idea certain short files or media can be used without permission or payment from the holder
- False identifying yourself
- A site designed to read and write through the use of digital storytelling
- Legal right or permission to publish, use, perform, etc. another's material
- Areas to store memory to speed up the process of retrievals
- A group of information on a computer that can be software programs or data
20 Clues: False identifying yourself • Web servers and their files (WWW) • Composed of HTML tags and multimedia files • Sending and receiving occur at different times • Sender and receiver are active at the same time • Display of HTML tags found on the World Wide Web • Using about half the words as the control condition • Pictures, movies, graphics, etc. embedded in a web page • ...
rspl 2015-12-04
Across
- programming Language is exclusive used for Artificial Intelligence.
- Destroy System slow down and very harmful.
- Transmission of data in scrambled form.
- A gateway that limits access between networks in accordance with local security policy.
- Only way to share data across Android Application.
- Name of latest Android OS.
- Low power data transfer.
- Founder of Finder.
- Re-referenced by software during operation to increase the overall speed of software program.
- First Female Engineer hired Facebook.
- Step by step formula for solving problem.
- Test to make sure that you are Human.
- A set of functions , procedures, methods, classes or protocols that an os, library or a service provides to support request made by program.
- A technology dynamic boundries which uses GPS and can be RFID.e.g. notify me when i m at office.
Down
- A program successfully masquerades as another bu falsing data.
- Founder of Apple Inc.
- Protected character string used to authenticate the identity of computer user or system to access resources.
- A programmer with no long term contract.
- Visual Presentation of information Architecture model.
- Name of one of the founder of android.
- Visible light High Speed still wireless and very latest.
- Reusable standard document.
- Social media with 140 character limit.
23 Clues: Founder of Finder. • Founder of Apple Inc. • Low power data transfer. • Name of latest Android OS. • Reusable standard document. • First Female Engineer hired Facebook. • Test to make sure that you are Human. • Name of one of the founder of android. • Transmission of data in scrambled form. • Social media with 140 character limit. • A programmer with no long term contract. • ...
Computer Science- Mathieu CHAUVIN 2016-05-31
Across
- what a programmer needs to work all night
- to break into computers or computers networks by exploiting their weaknesses
- you write a lot of this when you're a programmer
- a bar, often at the top of the screen, where you can select an action
- you don't want to have it on your PC
- something you execute to fill a task
- the only equipment a programmer needs to work
- we often oppose it to hardware
- combinaison of keys to make some tasks quicker
- some part of your code which take parameters and gives you a result
- it is useful to interact with your program
- a crucial step to avoid errors
- it gives you access directely to a memory case
Down
- 418 : "I'm a ..."
- it is used to connect several computers each other
- '... world ! ' : the output of your first program
- the first place you go when you got a bug
- a data structure where you can select an element by its index
- the most-used operating system
- a way of programming based on 'objects' and 'classes'
- it is used to write text, or code in a file
- a way of communicating instructions to a machine
- the first name of the man who created Linux
23 Clues: 418 : "I'm a ..." • the most-used operating system • we often oppose it to hardware • a crucial step to avoid errors • you don't want to have it on your PC • something you execute to fill a task • what a programmer needs to work all night • the first place you go when you got a bug • it is useful to interact with your program • it is used to write text, or code in a file • ...
Modern World History 2020-06-01
Across
- Development in machine production
- Having a common national, racial, linguistic, religious or cultural tradition
- Moral principles or standards
- Is a business owned by stockholders who share in its profits but are not personally responsible for its debts
- The racial or national group to which one belongs
- The creation of identical copies of DNA
- A person who organizes, manages and takes risk of business
- the shift beginning in England during the 18th century, from making goods by hand to making them by machine
Down
- Spread and diffusion of economic or cultural influences
- All the financial interactions that croos international boundaries
- Movement of people to cities
- A certain right of ownership
- The voluntary linkage of computer networks around the world
- An economic system in which all means of production are owned by the people, private property does not exist, and all goods and services are shared equally
- The customs, ideas, art, etc. of a particular civilization, society or social group
- A government controlled by religious leader
- A new intellectual movement that stressed reason and thought and the power of individuals to solve problems.
- An economic system based on private ownership
- the elimination of trade barriers
- A difference in culture, nationality, race, religion, etc.
- A believe in a worship of god or gods
21 Clues: Movement of people to cities • A certain right of ownership • Moral principles or standards • Development in machine production • the elimination of trade barriers • A believe in a worship of god or gods • The creation of identical copies of DNA • A government controlled by religious leader • An economic system based on private ownership • ...
Technical Concepts 2020-09-03
Across
- a unit of data that is eight binary digits long
- a software program that runs on your computer
- physical parts of a computer
- a set of networks
- a small amount of data sent over a network
- a suite of communication protocols used to interconnect network devices on the internet
- the number of transistors on a microchip doubles about every two years
- when a packet is passed from one network segment to the next
- the smallest unit of measurement used to quantify computer data
Down
- an organization that provides services for using the internet
- tools for storing, managing, using and gathering data in an organization
- a tool that enables users to locate info on the web
- a computer program that automatically searches docs on the web
- instructions that tell a computer how to work
- a way to access information of the web
- a numerical label assigned to each device
- a set of rules that determine how data is transmitted between different devices
- a device used to amplify its electrical input
- text or image within a file that you can click that gives you access to another doc or image
- a formatting system for displaying material retrieved over the internet
20 Clues: a set of networks • physical parts of a computer • a way to access information of the web • a numerical label assigned to each device • a small amount of data sent over a network • instructions that tell a computer how to work • a software program that runs on your computer • a device used to amplify its electrical input • a unit of data that is eight binary digits long • ...
AP VOCAB Imanol Juarez 2nd 2019-04-29
Across
- the percentage of people who can read and write
- sites dispersed around a city
- redrawing legislative boundaries
- territory that is legally tied to another country
- interconnected nodes without a center
- total value of goods and services produced
- an official count or survey of a population
- culture traditionally practiced by a small group
- improvement in material conditions
- factories built by US
- group of cities close to each other
- site factors
- housing provided by low-income households
- agreement between US, Mexico, and Canada
- discarded electronic devices
Down
- a disease prevalent over a whole country
- refers to the physical gap
- the arrangement of something across earth's surface
- trade alternative to international trade
- association of sovereign states
- widespread occurrence
- feature or trend from one place to another
- relation between the number of people on earth
- utilized in the production of iron and steel
- relatively short-term feeling of disorientation
- incorporation of a territory
- drawing lines on a map
- physical character of a place
- permanent collection of buildings
- vocabulary that is used by a specific group of people
- principle city in a country or state
- amount of labor needed
- process of less dominant cultures
- state of being banned
- traditional regional food
35 Clues: site factors • widespread occurrence • factories built by US • state of being banned • drawing lines on a map • amount of labor needed • traditional regional food • refers to the physical gap • incorporation of a territory • discarded electronic devices • sites dispersed around a city • physical character of a place • association of sovereign states • redrawing legislative boundaries • ...
MLCrossword 2020-09-12
Across
- the machine learning task of learning a function with labels' prior
- arrange (things) in sets or groups
- a neural network model whose goal is to predict the input itself
- a function that can be "ON" (1) or "OFF" (0) depending on input
- an apparatus using mechanical power and having several parts
- notice taken of someone or something
- an algorithm to efficiently calculate the gradients in a neural network
- a regularization technique for neural networks that prevents overfitting
- Generative Adversarial Network
- a function derived from two given functions by integration
Down
- rectified linear unit
- in contrast to feedback
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data or predict future observations reliably
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- the process of partitioning a digital image into multiple segments
- involving or characterized by conflict or opposition
- a group or system of interconnected people or things
- the act or process of normalizing
- the process of adding information in order to solve an ill-posed problem or to prevent overfitting
- An open source machine learning framework that accelerates the path from research prototyping to production deployment
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
