networks Crossword Puzzles
computer Vocabulary 2025-09-18
Across
- A unit of digital information that most commonly consists of eight bits.
- Read-only memory, a type of memory that stores permanent data and instructions.
- Data entered into a computer.
- Data produced by a computer.
- drive: A data storage device that stores and retrieves digital information using rapidly rotating disks.
- Random-access memory, a type of computer memory that can be accessed randomly and quickly.
- A network of remote servers that store and manage data.
- Programs and other operating information used by a computer.
Down
- A panel of keys that operates as a set of levers to input text and characters.
- The central processing unit, the "brain" of a computer.
- A display screen used to show computer images and data.
- A device that forwards data packets between computer networks.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
14 Clues: Data produced by a computer. • Data entered into a computer. • The central processing unit, the "brain" of a computer. • A display screen used to show computer images and data. • A network of remote servers that store and manage data. • Programs and other operating information used by a computer. • A device that forwards data packets between computer networks. • ...
Types of cyber attacks 2026-04-09
Across
- Injection Attack that inserts malicious SQL queries into input fields to manipulate databases
- Phishing attack conducted via SMS messages to deceive users into clicking malicious links
- Targeted phishing attack aimed at a specific individual or organization using personalized information
- Site Scripting Injection of malicious scripts into trusted websites viewed by other users
- Injection Attack that executes unauthorized system commands via vulnerable applications
- Phishing attack specifically targeting high-profile individuals such as executives or CEOs
- Malware that encrypts data and demands payment for its release
Down
- Malware disguised as legitimate software to trick users into installing it
- Malicious software that secretly monitors and collects user information
- Voice-based phishing attack where attackers use phone calls to steal sensitive information
- Fraudulent attempt to trick users into revealing sensitive information like passwords or credit card details through fake emails or websites
- Software designed to disrupt, damage, or gain unauthorized access to systems
- Software that automatically displays unwanted advertisements, often tracking user behavior
- Self-replicating malware that spreads across networks without user interaction
14 Clues: Malware that encrypts data and demands payment for its release • Malicious software that secretly monitors and collects user information • Malware disguised as legitimate software to trick users into installing it • Software designed to disrupt, damage, or gain unauthorized access to systems • ...
Units 13 andn 14 Vocab 2013-07-11
Across
- The person who is in charge of selecting artwork for a publication.
- The person who writes news about famous people.
- The person who puts in hardware and software for computer networks.
- "My husband came home smelling like perfume. I think he might be cheating on me."
- The person who does the dangerous actions in a film.
- The person who helps with software questions and problems.
- "You have to give me your homework right now!"
Down
- The person who goes to a different country or region to report on events.
- The person who chooses and adjusts pictures for a publication.
- "I was late today because the traffic was terrible!"
- "Nancy isn't at work today. She must have died."
- The person who chooses, arranges and edits the scenes in a movie.
- "By 2050, scientists will have found a cure for cancer."
- "You should eat more vegetables and less KFC."
- "If you don't clean your room, you won't be allowed to watch television for a week."
- "You are not a very hard-worker."
16 Clues: "You are not a very hard-worker." • "You should eat more vegetables and less KFC." • "You have to give me your homework right now!" • The person who writes news about famous people. • "Nancy isn't at work today. She must have died." • "I was late today because the traffic was terrible!" • The person who does the dangerous actions in a film. • ...
Technology 2016-07-29
Across
- piece of programming code inserted into other programming to cause damage
- smallest unit of measurement in
- the process of converting electronic data to an encrypted form
- a piece of code created by a web server and stored on a user's computer
- a set of symbols inserted into files intended for display on the world wide web
- the brains of your computer
- of characters you type into a browser to access a website
- a device that allows computers to transmit information to each other via ordinary telephone
- read-only memory
- unsolicited email messages sent for marketing purposes
Down
- a technology that allows computers and other devices to communicate via a wireless signal
- set of interconnected networks that allow computers in different locations to exchange info
- a barrier that acts as a security system to protect trusted computer systems
- many functions and calculations that make your computer run
- software program that allows you to surf the web
- a programming language that is commonly used in the development of client-server web applications
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- the brains of your computer
- many functions and calculations that make your computer run
- unsolicited email messages sent for marketing purposes
- set of interconnected networks that allow computers in different locations to exchange info
- read-only memory
- piece of programming code inserted into other programming to cause damage
- a set of symbols inserted into files intended for display on the world wide web
- a piece of code created by a web server and stored on a user's computer
Down
- a barrier that acts as a security system to protect trusted computer systems
- of characters you type into a browser to access a website
- the process of converting electronic data to an encrypted form
- software program that allows you to surf the web
- a device that allows computers to transmit information to each other via ordinary telephone
- smallest unit of measurement in
- a programming language that is commonly used in the development of client-server web applications
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Computer Concepts 2 2018-09-19
Across
- A test to determine processor speed
- Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently
- Bus width is measured in these
- example of a First Generation computer
- Type of malware that collects bits of data, like your surfing habits
- This device connects two or more networks and directs the flow of information along the network.
- The number of these in a CPU help determine processor performance
- A slowed down Wi-Fi connection can be the result of this
Down
- Type of malware that is spread when you distribute infected files, especially as e-mail attachments
- Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
- device that draws power even when they are turned off or in standby mode
- Electronic devices such as card readers use ___________ operating systems.
- High-speed, easily accessible storage space used by the CPU
- The first graphical Web browser released in 1993
- enables real-time conversations
- Head-mounted displays often use organic light emitting diode, or _____, technology.
16 Clues: Bus width is measured in these • enables real-time conversations • A test to determine processor speed • example of a First Generation computer • The first graphical Web browser released in 1993 • A slowed down Wi-Fi connection can be the result of this • High-speed, easily accessible storage space used by the CPU • ...
TECHNICAL ADMIN 2025-07-07
Across
- Induction plans, Branch allocation of Officers & Sailors & Cadre reviews articulated in Human Capital Strategy 2012-27 is responsibility of-
- Responsible for Code, Guidelines & Standards for safety regulations during operation of MPP.
- Issue policy directives pertaining to all Electrical machinery, equipment & systems & weapons.
- UNCLOS defined Maritime Area.
- Instructions & other than communication having general application to Ships, Establishment or personnel are promulgated through.
- Locate & Assist people in Distress at Sea, in Air or on Land.
- Entry with Green Ink for performance evaluation is done by.
- Responsible for Foreign Corporation & Policy matter concerning IN.
- Responsible for matters pertaining to Special operations & diving in IN.
Down
- Authority for laying down policy for maintenance & repair of Aircraft/Aero systems.
- One Man Inquiry (OMI) is also known as.
- Govt. owned company, Ex. Oil India, HAL, ONGC, SAIL, etc.
- 3 Chiefs - CNS, COAS, CAS form a committee called.
- GIS based system for Strategic monitoring.
- Handles capital dredging in Mumbai & Vizag Naval projects. Oversees Naval policy & planning for Naval Dockyard.
- A class Authority that formulate , promulgate standards/specifications of Information Security & Networks.
16 Clues: UNCLOS defined Maritime Area. • One Man Inquiry (OMI) is also known as. • GIS based system for Strategic monitoring. • 3 Chiefs - CNS, COAS, CAS form a committee called. • Govt. owned company, Ex. Oil India, HAL, ONGC, SAIL, etc. • Entry with Green Ink for performance evaluation is done by. • Locate & Assist people in Distress at Sea, in Air or on Land. • ...
AI 2025-11-08
Across
- A program designed to simulate human conversation.
- A branch of AI that enables systems to learn from data and improve over time.
- Elon Musk’s AI chatbot integrated into X (formerly Twitter).
- A subset of machine learning using neural networks to process complex patterns.
- A step-by-step set of rules or instructions for solving a problem.
- Google’s advanced AI model integrated across its apps.
- An AI platform that generates talking avatars and video presentations.
- A productivity and note-taking app enhanced with AI for writing and summarizing.
- AI that creates new content such as text, images, or videos.
- An AI search engine that provides conversational answers from the web.
Down
- The use of AI tools to create realistic videos from text or images.
- The craft of designing effective prompts to get the best results from AI models.
- Anthropic’s conversational AI model known for reasoning and safety.
- The ability of machines to perform tasks that require human-like intelligence.
- An AI tool used for video creation, editing, and special effects.
- Microsoft’s AI assistant built into Word, Excel, and other Office apps.
16 Clues: A program designed to simulate human conversation. • Google’s advanced AI model integrated across its apps. • Elon Musk’s AI chatbot integrated into X (formerly Twitter). • AI that creates new content such as text, images, or videos. • An AI tool used for video creation, editing, and special effects. • ...
TA_NNA 2025-10-28
Across
- Neural network where connections move only in one direction—from input to output.
- Type of neural network with feedback connections allowing memory of previous inputs.
- Trade-off that determines a model’s ability to generalize beyond training data.
- Adaptive optimization algorithm combining momentum and RMSProp for faster convergence.
- Simplest type of artificial neuron that performs binary classification.
- Optimization algorithm that minimizes error by updating weights in the opposite direction of the gradient.
- Algorithm used to train multilayer neural networks by propagating errors backward.
- Type of learning where models find hidden patterns in unlabeled data.
Down
- Problem where a model learns the training data too well but fails on new data.
- A machine learning task where inputs are assigned to discrete categories.
- Technique that accelerates gradient descent by considering previous updates.
- Technique used to prevent overfitting by adding a penalty to model complexity.
- Learning paradigm where the model is trained using labeled data.
- Regularization method that halts training when validation error begins to increase.
- Abbreviation for Multilayer Perceptron, a type of feedforward neural network.
- The basic biological and computational unit that processes and transmits information.
16 Clues: Learning paradigm where the model is trained using labeled data. • Type of learning where models find hidden patterns in unlabeled data. • Simplest type of artificial neuron that performs binary classification. • A machine learning task where inputs are assigned to discrete categories. • ...
INA ASSESSMENT 2020-08-26
Across
- more amplifiers
- an acrylic textile fibre.
- the brother of a saw
- short for amplifier
- a tool or machine with a rotating cutting tip or reciprocating hammer or chisel, used for making holes. procedure an established or official way of doing something
- the study of people's efficiency in their working environment
- The aesthetic object is an object of sensory experience and enjoyed as such: it is heard, seen, or (in the limiting case) imagined in sensory form.
Down
- (of a substance or material) capable of polishing or cleaning a hard surface by rubbing or grinding.
- slowly going up
- its something which pushes a object
- a stable subatomic particle with a charge of negative electricity, found in all atoms and acting as the primary carrier of electricity in solids.
- a basic filter network with specified cut-off frequencies, from which other networks may be derived to obtain sharper cut-offs, constancy of characteristic impedance with frequency
- convert (waste) into reusable material.
- something you wear when filing
14 Clues: more amplifiers • slowly going up • short for amplifier • the brother of a saw • an acrylic textile fibre. • something you wear when filing • its something which pushes a object • convert (waste) into reusable material. • the study of people's efficiency in their working environment • ...
IT and Business 2011-11-10
Across
- High Performance multi-user computer
- an optical instrument that projects an enlarged image on wall
- A system connecting computers around the world
- Software to make Conference Calls and Video Conferencing
- technology of communication at a distance by electronic transmission of impulses, as by telegraph, cable, telephone, radio, or television
- output device to print paper documents
- is a computer that provides services used by other computers. For example a web server serves up web pages
Down
- Web-based application for the secure transfer of funds between member accounts
- act of trying to achieve marketing objectives through electronic or digital means
- a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
- An agreement between a buyer and a seller to exchange an asset for payment
- a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
- collection of information that is organized so that it can easily be accessed, managed, and updated
- Junk e-mail
14 Clues: Junk e-mail • High Performance multi-user computer • output device to print paper documents • A system connecting computers around the world • Software to make Conference Calls and Video Conferencing • an optical instrument that projects an enlarged image on wall • An agreement between a buyer and a seller to exchange an asset for payment • ...
INTERNAL TRADE 2023-01-29
Across
- retail outlets that sell their merchandise through mail
- type of transaction in which payment for goods or services are made at the time of delivery
- stores networks of retail shops that are owned by and operated by manafacturers
- buying and selling of goods within the boundaries of a nation
- these retail stores specialise in the sale of a specific line of products
- stores most commonly found in a local market and residential areas
- small retailers who open their shops at different places on fixed days
- purchase and sale of goods in small quantities, generally to ultimate consumers
Down
- small retailers who are commonly found at places where huge floating population gathers
- petty retailers who have independent shops of temporary nature
- purchase and sale of goods in large quantities for the purpose of resale
- small producers who carry the products on a bicycle, hand cart
- traders who do not have a fixed place to operate from
- large establishment offering a wide variety of products
14 Clues: traders who do not have a fixed place to operate from • retail outlets that sell their merchandise through mail • large establishment offering a wide variety of products • buying and selling of goods within the boundaries of a nation • petty retailers who have independent shops of temporary nature • small producers who carry the products on a bicycle, hand cart • ...
Soft tissue injury healing 2023-04-15
Across
- What type of collagen replaces type three collagen in the remodelling stage?
- What is the second stage of soft tissue healing?
- What type of receptor stimulates pain?
- What is the third stage of soft tissue healing?
- What does vasoconstriction, therefore a decrease in oxygen to the cells cause?
- What is the first stage of soft tissue healing?
- During inflammation, there is an increase in ____________ of small vessels during interaction of endothelial cells
- In inflammation, what type of pressure is created due to the increase in protein concentration (Causes fluids to be forced into the tissues, causing swelling)
Down
- What is the last stage of the remodelling process?
- The release of _______ results in the breakdown of cells and stimulates inflammation
- What is the name for new capillary budding which migrates and joins to existing capillary networks in the proliferation stage
- What is fibrinogen released and converted into to create a meshwork barrier?
- What is the fourth stage of soft tissue healing?
- what type of cells gradually disappear in the proliferation stage?
14 Clues: What type of receptor stimulates pain? • What is the third stage of soft tissue healing? • What is the first stage of soft tissue healing? • What is the second stage of soft tissue healing? • What is the fourth stage of soft tissue healing? • What is the last stage of the remodelling process? • what type of cells gradually disappear in the proliferation stage? • ...
Chapter 9 Internal and External Communication 2020-03-31
Across
- To conduct a meeting between two or more participants at different sites by using computer networks to transmit audio and video data.
- This is communication that consists of email, fax and text messaging.
- This type of communication provides a permanent record of a message.
- This is a written record of what was discussed at a meeting.
- This type of communication is between the receiver and the sender where each can respond and listen.
- The methods used to communicate a message.
- Messages distributed by electronic means from one computer user to one or more recipients via a network
- The receivers response to a message.
Down
- This is an official form sent to customers requesting payment.
- This is only used for communication within the business.
- This is the order for the conduct of a meeting.
- This is a official document which is sent to suppliers to request the supply and delivery of materials.
- This is communication that consists of graphs, charts, bar charts, diagrams
- This type of communication uses the spoken word.
14 Clues: The receivers response to a message. • The methods used to communicate a message. • This is the order for the conduct of a meeting. • This type of communication uses the spoken word. • This is only used for communication within the business. • This is a written record of what was discussed at a meeting. • ...
CSP Vocab Review 2022-04-27
Across
- An access point that provides an attacker unauthorized access to secure networks
- A type of computing that splits a program into multiple tasks that can be executed at the same time
- The capacity of a system to change in size and scale to meet new demands
- A type of protocol used for sending via packets
- An algorithm with an exponential efficiency runs in __________ time
- ___ images use lossy compression
Down
- Every algorithm can be constructed using combinations of sequencing, iteration, and __________
- A type of protocol that provides a mechanism to detect corrupt data in packages
- A type of error that occurs when the number of bits isn't enough to represent the number
- The process of encoding data to prevent unauthorized data
- An acronym for the library of procedures and the descriptions of how to call each procedure
- An error checking mechanism that is a part of the UDP protocol
- A type of data that changes smoothly
- A byte is a sequence of ______ bits
14 Clues: ___ images use lossy compression • A byte is a sequence of ______ bits • A type of data that changes smoothly • A type of protocol used for sending via packets • The process of encoding data to prevent unauthorized data • An error checking mechanism that is a part of the UDP protocol • An algorithm with an exponential efficiency runs in __________ time • ...
Business Technology 2024-02-27
Across
- The conduct of business activities electronically, typically through the internet
- Information system: A system that provides managers with the information they need to make informed decisions
- communication Technology: The use of technology to store, retrieve, transmit, and manipulate information
- The buying and selling of goods and services online
- Banking Machine: Where you can transfer cash to someone's account
- Technology: The use of computers and digital tool that enhances business operations
- Networks: Systems that allow computers and other devices to connect and communicate with each other
Down
- Banking: Where you can do transactions electronically
- Programs and applications that run of a computer system
- Teller Machine: This type of machine is where you can do withdrawal
- The use of technology to conduct meeting or conference
- Storage: The process of storing and organizing data in a computer or other storage devices
- The physical components of a computer system that can be touched and seen
- Aided Design: The use of computers software to create, modify and analyze designs for various purposes
14 Clues: The buying and selling of goods and services online • Banking: Where you can do transactions electronically • The use of technology to conduct meeting or conference • Programs and applications that run of a computer system • Banking Machine: Where you can transfer cash to someone's account • Teller Machine: This type of machine is where you can do withdrawal • ...
1-8 Vocab 2025-10-21
Across
- How a person would like to be seen.
- A business model that allows companies to buy and sell products over the internet.
- Purchases that are made after a good amount of thinking, consideration, and logic.
- How a person sees themselves.
- Uses social media networks to promote and sell products and services.
- Paying content creators, or influencers, to promote companies’ brands, products, and services to their (the influencer’s) large audience of fans and followers using social media.
Down
- Products that are easy for consumers to find and buy.
- The reasons people make certain purchases.
- Purchases made based on psychological factors, including feeling, emotion, and attitude.
- Unique items that consumers will spend a lot of time looking for.
- Items that usually cost more and are only purchased occasionally.
- The use of mobile technologies to sell products and services on cellular devices and tablets.
- A group of people who have the same social, economic, and/or educational status.
- Items that people don’t plan on wanting or needing.
14 Clues: How a person sees themselves. • How a person would like to be seen. • The reasons people make certain purchases. • Items that people don’t plan on wanting or needing. • Products that are easy for consumers to find and buy. • Unique items that consumers will spend a lot of time looking for. • Items that usually cost more and are only purchased occasionally. • ...
Magazine Crossword 2019-11-04
Across
- The process of converting data into a secret code for transmission over a public network
- A page or collection of web pages that can be viewed and modified by anybody with a web browser and access to the internet
- A computer language used to create web pages
- The opening page of a website
- A temporary storage place for quick retrieval of frequently used data
Down
- The protocol for mail transmission
- A security system that protects a network
- A small text file stored in a computer's hard drive by a website
- An unit memory( 8 binary digits represent a character )
- The action of writing CODE or instructions for the computer to follow
- The global system of interconnected computer networks that link billions of devices
- A programming methodology that uses a number of existing technologies together and enables web applications to make incremental updates to the user interface without the need to reload the browser page
12 Clues: The opening page of a website • The protocol for mail transmission • A security system that protects a network • A computer language used to create web pages • An unit memory( 8 binary digits represent a character ) • A small text file stored in a computer's hard drive by a website • The action of writing CODE or instructions for the computer to follow • ...
Careers using ICT 2021-01-08
Across
- Designs and teaches computer courses (1,1,7).
- Creates visual branding, adverts, brochures, magazines, website designs, product packaging and displays (7,8).
- Makes games that can be played online, and on mobile phones, PCs and games consoles (8,5,9).
- Designs, builds and tests computer programs for business, education and leisure services (8,9).
- Diagnoses and solves software and hardware problems for computer users (1,1,9,7).
- Supervises the design, installation and running of IT, data and telephony systems in an organisation (7,7).
Down
- Creates course materials that can be studied on a computer network or online (1,8,9).
- Identifies trends, creates models, collects numerical information and presents results (4,7,12).
- Designs, implements and maintains the way data is transferred across digital and telecommunications networks (7,8).
- Helps plan, design and build IT systems for clients (9,9).
- Uses their creative and technical skills to design new websites and redesign existing ones (3,8).
- Looks at a company's IT infrastructure and work out where to make improvements (7,7).
12 Clues: Designs and teaches computer courses (1,1,7). • Helps plan, design and build IT systems for clients (9,9). • Diagnoses and solves software and hardware problems for computer users (1,1,9,7). • Creates course materials that can be studied on a computer network or online (1,8,9). • ...
Chapter 10: Family 2021-05-14
Across
- the notion that true womanhood centers on domestic responsibility and child-rearing
- a woman having several husbands
- people have more than one partner at a time
- a man having several wives
- kin networks that extend outside or beyond the nuclear family
- women’s responsibility for housework and child care – everything from cooking to doing laundry, bathing children, reading bedtime stories, and sewing Halloween costumes
- marriage to someone outside ones’ social group
Down
- consists of a mother, father and their children
- a person partners with only one other person
- living together in an intimate relationship without formal legal or religious sanctioning
- legal or normative sanctions against marrying outside one’s own race, class, or other social group; marriage from within.
- the technical term for interracial marriage, literally meaning “a mixing of kinds”; it is politically and historically charged – sociologists typically use exogamy or outmarriage as neutral terms
12 Clues: a man having several wives • a woman having several husbands • people have more than one partner at a time • a person partners with only one other person • marriage to someone outside ones’ social group • consists of a mother, father and their children • kin networks that extend outside or beyond the nuclear family • ...
Language and Language Use (*words/names are separated by _ ) 2021-11-14
Across
- ______ hypothesis is the hypothesis that the human brain has evolved, so that humans can maintain larger ingroups.
- A mental representation of an event, object, or situation constructed at the time of comprehending a linguistic description.
- Group to which a person belongs.
- Networks of social relationships among individuals through which information can travel.
Down
- Words and expressions.
- ___ bias is a tendency for people to characterize positive things about their ingroup using more abstract expressions, but negative things about their outgroups using more abstract expressions.
- A stimulus presented to a person reminds him or her about other ideas associated with the stimulus.
- Rules by which words are strung together to form sentences.
- Constructing utterances to suit the audience’s knowledge.
- Group to which a person does not belong.
- ______ Hypothesis is the hypothesis that the language that people use determines their
- Information that is shared by people who engage in a conversation.
12 Clues: Words and expressions. • Group to which a person belongs. • Group to which a person does not belong. • Constructing utterances to suit the audience’s knowledge. • Rules by which words are strung together to form sentences. • Information that is shared by people who engage in a conversation. • ...
PUPPETS 2013-05-29
Across
- customary beliefs, social forms, and material traits of a racial, religious, or social group
- a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users
- the faculty of imagining, is the ability to form new images and sensations that are not perceived through sight, hearing, or other senses
- a thin, transparent sheet made of regenerated cellulose
- a place where two things or parts are joined
- motion of hands or body to emphasize or help to express a thought or feeling
Down
- a group of people who participate in a show
- a puppet controlled from above using wires or strings depending on regional variations
- partly or totally unlike in nature, form, or quality
- people who make puppets come to life
- a garment covering the whole hand
- to hold up or serve as a foundation or prop for
12 Clues: a garment covering the whole hand • people who make puppets come to life • a group of people who participate in a show • a place where two things or parts are joined • to hold up or serve as a foundation or prop for • partly or totally unlike in nature, form, or quality • a thin, transparent sheet made of regenerated cellulose • ...
Cisco Crossword 2013-09-06
Across
- Transfer of information between two or more points that are not connected by an electrical conductor
- Defines net bit rate
- Links two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider Internet
- Solution that help you build more effective teams across corporate boundaries, companies, and continents
Down
- Software that provides self-service automated provisioning for private, public, or hybrid clouds
- An intelligent network optimized for rich media
- Utilizes public telecommunications networks to conduct private data communications
- Back up and protect your business data
- Provides extensive, reliable, and scalable element management capabilities to help you rapidly deploy and manage services
- Computer Network technologies for Local Area Network
- Enabling the deployment of multiple advanced services
- The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server
12 Clues: Defines net bit rate • Back up and protect your business data • An intelligent network optimized for rich media • Computer Network technologies for Local Area Network • Enabling the deployment of multiple advanced services • Utilizes public telecommunications networks to conduct private data communications • ...
Mobile Communication Services and Social Networking 2015-02-09
Across
- A range from a cell tower where access to the internet is possible
- A definition meaning a persons general reputation , can be both online and in the real world
- (2 words as 1) The use of someone else's social networking profile and pretending to be them
- A type of Internet service
- When people are informed of current events
- A definition meaning Where something suddenly turns popular on the internet because of people sharing the content
- The fourth generation of mobile internet technology
Down
- (2 words as 1) The freedom to be able to voice an opinion online
- (2 words as 1) Any platform where an online profile can be made or where topics may be discussed)
- Calls A verbal form of communication available thanks to mobile communication
- Messages A form of messaging available thanks to mobile communication
- Businesses may use social networks for this
12 Clues: A type of Internet service • When people are informed of current events • Businesses may use social networks for this • The fourth generation of mobile internet technology • (2 words as 1) The freedom to be able to voice an opinion online • A range from a cell tower where access to the internet is possible • ...
Ashly Cordova 2015-05-01
Across
- a reference to a published or unpublished source
- A system of connected computers that allows the sharing of files and equipment
- software used to view various kinds of Internet resources found on the Web
- the name for a way to display information on websites.
- Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- A collaborative website which can be directly edited by anyone with access to it
- NETWORKS online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
- A bully who operates online, in cyberspace; To bully online
Down
- To renew or revitalize; To reload a webpage on the internet
- Network etiquette; Online manners; following the rules of conduct for online or internet users, being a good digital citizen.
- a list of citations that appear at the end of a paper, article, chapter or book
- Originally known as Web Log.
12 Clues: Originally known as Web Log. • a reference to a published or unpublished source • the name for a way to display information on websites. • To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • software used to view various kinds of Internet resources found on the Web • ...
Paulina's Crossword 2016-08-30
Across
- A format for compressing image files.
- A system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
- A person who uses computers to gain unauthorized access to data.
- A process for making a physical object from a three-dimensional digital model, typically by laying down many successive thin layers of a material.
- A system designed to prevent unauthorized access to or from a private network.
- One type of Uniform Resource Identifier
Down
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- The act of creating a virtual
- A device that forwards data packets along networks.
- A local area network
- Using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- Domain Name System
12 Clues: Domain Name System • A local area network • The act of creating a virtual • A format for compressing image files. • One type of Uniform Resource Identifier • A device that forwards data packets along networks. • A person who uses computers to gain unauthorized access to data. • A system designed to prevent unauthorized access to or from a private network. • ...
Multimedia 2023-10-23
Across
- Type of Video Conferencing
- is a type of online meeting where two or more people engage in a live audio-visual call.
- A widely used document format for multimedia presentations
- learning is defined as the need and ability to learn through virtual media, such as personal electronic gadgets, social interactions, and content.
Down
- is a form of communication that uses a combination of different content forms such as writing, audio, images, animations, or video into a single interactive presentation
- type of MOOC Asynchronous
- A common file format for storing and transmitting multimedia presentations
- The most important MOOC platforms is
- is a simple and convenient service that integrates information on a single online page, posted on a variety of social networks.
- Device that can be used for mLearning
- A popular multimedia software developed by Adobe for creating and editing graphics and videos
- An online platform where users can upload, share, and view multimedia content
12 Clues: Type of Video Conferencing • type of MOOC Asynchronous • The most important MOOC platforms is • Device that can be used for mLearning • A widely used document format for multimedia presentations • A common file format for storing and transmitting multimedia presentations • An online platform where users can upload, share, and view multimedia content • ...
Cliste.ie Crossword 2025-02-17
Across
- A famous beverage made from roasted beans, taught in barista training workshops.
- A type of farming that focuses on sustainability and reducing environmental impact.
- A subject that explores how businesses and industries like farming operate financially.
- A form of textile created using knotting techniques, often taught in craft workshops.
- A method of recycling organic waste into nutrient-rich soil.
- A hands-on experience where students learn about network security and IP addresses.
Down
- A famous Irish dish that consists of mashed potatoes and cabbage or kale.
- A material made from tree pulp, often used in decoupage craft projects.
- This small insect plays a central role in worldwide food production and biodiversity.
- A course where students learn about making this popular Italian dish and managing food waste.
- This fast and affordable meal option is often criticized for its environmental and health impact.
- A natural sweetener produced by bees, often harvested in biodiversity workshops.
12 Clues: A method of recycling organic waste into nutrient-rich soil. • A material made from tree pulp, often used in decoupage craft projects. • A famous Irish dish that consists of mashed potatoes and cabbage or kale. • A famous beverage made from roasted beans, taught in barista training workshops. • ...
Word List 5 2024-11-22
Across
- the way you earn money in order to live
- to protect something, especially something of environmental or cultural importance, from harm or destruction
- to put several things, problems, etc., in order of importance so that you can deal with the most important ones first
- to make a judgment about a situation after thinking carefully about it
- to make a situation or the effects of something less unpleasant, harmful, or serious
Down
- the basic systems and structures that a country or organization needs in order to work properly, for example, roads, electricity stations, computer networks, etc.
- to think or know that something is going to happen in the future
- the action of using up a resource
- intended to stop something you do not want to happen, such as illness, from happening
- to have something bad happen to you, or to experience something bad
- careful to avoid danger or risks
- an effect or influence
12 Clues: an effect or influence • careful to avoid danger or risks • the action of using up a resource • the way you earn money in order to live • to think or know that something is going to happen in the future • to have something bad happen to you, or to experience something bad • to make a judgment about a situation after thinking carefully about it • ...
Verbal and Nonverbal Communication 2024-10-02
Across
- using hand gestures, facial expressions, or body language to convey information and share ideas
- looking at someone to show you are listening
- using words to convey information and share ideas
- interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- if you _____ your voice, people will be able to hear you
Down
- while part of communication is speaking, it is also _______
- slouching, standing up straight- these are examples of your
- using hand _____ can show someone you are engaged or passionate about a topic of conversation
- the ____ in which you speak can make it easier, or more difficult, for someone to follow your conversation
- your posture, facial expressions, and hand gestures
- a quick and easy way to send message to friends with your phone
- ordering food to be delivered to your house is an example of communicating through the:
12 Clues: looking at someone to show you are listening • using words to convey information and share ideas • your posture, facial expressions, and hand gestures • if you _____ your voice, people will be able to hear you • while part of communication is speaking, it is also _______ • slouching, standing up straight- these are examples of your • ...
Hack Your Brain 2024-09-18
Across
- A specific type of phishing that targets high-profile individuals, such as executives.
- A technology used to create a secure, encrypted tunnel between two networks.
- A malicious attempt to disrupt a network by overwhelming it with traffic.
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities.
- A technique where attackers attempt to guess passwords by trying all possible combinations.
- The unauthorized exploitation of a network to access confidential data or systems.
Down
- An individual who uses hacking skills for ethical purposes.
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated).
- A cybersecurity practice where teams work against each other, with attackers and defenders.
- ... Shields - The world's largest multinational cybersecurity exercise, organized annually by NATO.
- A widely used asymmetric encryption algorithm named after its inventors.
- ... Management - The process of identifying and analyzing issues that could have an unwanted effect on company assets.
12 Clues: An individual who uses hacking skills for ethical purposes. • A widely used asymmetric encryption algorithm named after its inventors. • A malicious attempt to disrupt a network by overwhelming it with traffic. • A technology used to create a secure, encrypted tunnel between two networks. • ...
BMA 4103: Group 2 2024-10-27
Across
- Dodd-Frank Act are to enhance regulation and promoting _________ .
- this is what usually happens when companies face pressure to adopt internationally recognized standards.
- enables board to address complex issue effectively and uphold accountability and transparency.
- disguising the origins of illegally obtained money to be legitimate
- practice of protecting systems, networks and programs from digital attack.
- SOX Act helps protect investors from _________ financial reporting by corporation.
- the board should focus on creating sustainable value and be accountable to shareholders for its performance.
- ongoing assessment of organization’s performance and adherence to government standards.
Down
- the process through which shareholders exercise through voting rights on ESG.
- refers to the process of having an independent party review to verify the info reported by the company.
- it imposes governance standards that influence local companies seeking to attract foreign investment or list in abroad.
- this particularly focused on preventing the excessive risk taking that contributed to the financial crisis.
12 Clues: Dodd-Frank Act are to enhance regulation and promoting _________ . • disguising the origins of illegally obtained money to be legitimate • practice of protecting systems, networks and programs from digital attack. • the process through which shareholders exercise through voting rights on ESG. • ...
The Birth of Television Crossword: 2026-03-27
Across
- Philo transformed his ideas into the first fully _____ television.
- Before television became common, people got their news and entertainment from this.
- The city where the World's Fair was held in 1939.
- Philo was this many years old when he built the first working model.
- Philo Farnsworth started thinking of his ideas when he was just a _____.
Down
- The first name of the teenager who had the idea for electronic television.
- This major global event caused networks to stop broadcasting.
- During the war, these places made supplies for soldiers instead of making televisions.
- One reason television didn't take off at first was that the sets were too _____.
- Television audiences grew rapidly after the war ended in this year. (Clue for kids: 1945).
- A TV set with this kind of "see-through" case proved to people that it wasn't a trick.
- One of the two inventions (along with the telephone) that made people think sending pictures was possible.
12 Clues: The city where the World's Fair was held in 1939. • This major global event caused networks to stop broadcasting. • Philo transformed his ideas into the first fully _____ television. • Philo was this many years old when he built the first working model. • Philo Farnsworth started thinking of his ideas when he was just a _____. • ...
The utility of synthetic data 2024-07-11
4 Clues: artificially generated data that mimics real‑world data. • Probabilistic models simulating complex dependencies in data. • is the process of determining causal relationships from data. • Neural networks learning latent representations to generate data.
Crossword 18 2024-09-26
4 Clues: A document saved on a computer. • A diode that emits light when current passes through. • The difference in electric potential between two points. • A wired networking technology used in local area networks.
Unit 3 puzzle 2021-04-02
Across
- --------- is saying true if the propositional formula is valid for all the possible cases
- In …………reasoning we combine probability theory with logic to handle the uncertainty.
- ………….network is key technology for dealing with probabilistic events and to solve a problem which has uncertainty
- A -------is a collection of prepositions and logical expressions relating those prepositions
- --------- is a pattern matching procedure.
- A premise that is derived from a known axiom and some observations is called as …………….
Down
- Semantic networks can show aggregation and ---------------
- A frame carries with it a set of .....that can represent objects which are normally associated with a subject of the frame.
- Perceptual inputs in the Wumpus World environment include Stench, ……….., Glitter, Bump and Scream
- ………combines all fuzzy conclusions obtained by inference into single conclusion.
- --------- knowledge is data-oriented and is also termed as functional knowledge
- -------------calculus is also known as “First Order Logic”
- A statement statement p ∧∼p is an example for …….
- Uncertainty can be dealt with probability theory , truth maintenance and ______ Logic.
14 Clues: --------- is a pattern matching procedure. • A statement statement p ∧∼p is an example for ……. • Semantic networks can show aggregation and --------------- • -------------calculus is also known as “First Order Logic” • ………combines all fuzzy conclusions obtained by inference into single conclusion. • ...
TECHNOLOGY VOCABULARY 2021-06-16
Across
- a worldwide network of computer networks
- a compact disk that is used with a computer
- an organized body of related information
- a sequence of data processed as a single unit of information
- of or pertaining to a number system having 2 as its base
- a unit of measurement of information
- adjusting the parts of something in relation to each other
Down
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- art ready-made pieces of computerized graphic art that can be used to decorate a document
- the amount of information that can be stored on a disk drive
- the symbolic arrangement of data in a computer program configure set up for a particular purpose
- RAM memory that is set aside as a specialized buffer storage
- any computer that is hooked up to a computer network
- locate and correct errors in a computer program code
14 Clues: a unit of measurement of information • a worldwide network of computer networks • an organized body of related information • a compact disk that is used with a computer • any computer that is hooked up to a computer network • locate and correct errors in a computer program code • of or pertaining to a number system having 2 as its base • ...
Elias crossword 2023-03-22
Across
- The I of the Anglo pride stands for someone who learns things all by himself
- The E of the Anglo pride stands for someone who produces the result that is wanted
- The R of the Anglo pride stands for a citizen who always does his part
- Someone that always tells the truth
- A extension that is mainly to type words, sentences, etc.
- When someone has no enemies and has a lot of friends
- A extension of a computer that helps you move around, click, and interact with things
Down
- A worldwide system of computer networks
- Someone that has no copy of itself
- The D of the Anglo pride stands for someone who is loyal and lovely
- The P of the Anglo pride that also stands for Critical Thinkers
- When someone helps you a lot he is...
- A field which combines computer science and robust datasets, to enable problem-solving
- Someone that has a lot of knowledge and is intelligent
14 Clues: Someone that has no copy of itself • Someone that always tells the truth • When someone helps you a lot he is... • A worldwide system of computer networks • When someone has no enemies and has a lot of friends • Someone that has a lot of knowledge and is intelligent • A extension that is mainly to type words, sentences, etc. • ...
Lost Soul, Be At Peace 2022-11-23
Across
- Giving little to no attention to someone, almost like abandoning someone
- A carnivorous animal that is closely related to the wolf and is known for its distinctive vocalization (barks or yips)
- A government building that directs the punishment to criminals/law breakers
- The terrifying hallucinations during sleep
- A worldwide system on computer networks and you can search up anything
- Homosexuality in women
- An event where a group of people mourn for the dead
- A common household pet that doesn't need to be taken out on walks
Down
- the state/act of giving approval and welcoming something in open arms
- A spirit that is see-through and can go through walls and can fly
- A person related or involved in crime
- The fully development of a persons brain in knowledge like an adult
- A moment in life, common during teenage years, that is sad and you feel like doing nothing in life
- A form of art that is performed with a smooth dance while using music
14 Clues: Homosexuality in women • A person related or involved in crime • The terrifying hallucinations during sleep • An event where a group of people mourn for the dead • A spirit that is see-through and can go through walls and can fly • A common household pet that doesn't need to be taken out on walks • The fully development of a persons brain in knowledge like an adult • ...
Cs Review Puzzle - Reid 2025-05-02
Across
- To reduce file size
- Naming
- An error where the number of bits is not large enough to handle the math.
- hiding the details of the code
- a wireless access point that gives unauthorized access to secure networks
- Pitch and volume of music, temperature, and the amount of light in the room are all examples of _______ data.
- A tool used as part of the DESIGN phase of the SDLC
Down
- the keyword needed to refer to instance variables or functions within a class
- using one function to combine the features of another.
- A ________ is an agreed-upon set of rules that specify the behavior of a system.
- software that is made freely available and may be redistributed, sold and/or modified .
- _______ is the process of finding a path from sender to receiver.
- The ________ of a computer network is the maximum amount of data that can be sent in a fixed amount of time.
- the study of encryption techniques
14 Clues: Naming • To reduce file size • hiding the details of the code • the study of encryption techniques • A tool used as part of the DESIGN phase of the SDLC • using one function to combine the features of another. • _______ is the process of finding a path from sender to receiver. • An error where the number of bits is not large enough to handle the math. • ...
Media Literacy Review 2025-04-08
Across
- Refers to the speaker's attitude toward the subject, conveyed through word choice, diction, and emotional appeal.
- information.
- Allowing personal opinions to influence your judgment
- One of the purposes of media- primary source of information for individuals, providing news, current affairs, and
- Known as “the appeal to emotion.”
- A person relies on their credibility or character when making an appeal or an argument.
- _______ Media is based on information technology exchange or networks
Down
- The main means of mass communication (broadcasting, publishing, and the internet)
- Culture and evolution have made certain _______ be perceived differently
- Headlines that are used to grab a reader’s attention, usually by using emotion-provoking language, exaggeration or curiosity.
- Convincing someone by using statistics
- The practice of taking someone else's work or ideas and passing them off as one's own.
- An experiment that found our choice of words affects perception
- is about what’s good and bad, what’s right and wrong, and what people should and shouldn’t do
14 Clues: information. • Known as “the appeal to emotion.” • Convincing someone by using statistics • Allowing personal opinions to influence your judgment • An experiment that found our choice of words affects perception • _______ Media is based on information technology exchange or networks • Culture and evolution have made certain _______ be perceived differently • ...
Snap-Treasure-Hunt 2026-01-05
Across
- I'm stronger than a comma but softer than a period- what am I?
- Moral Principles guiding business decisions
- Illegally accessing or breaking into computer systems or networks.
- A game of fun, a team affair, celebrating diversity, a bond we share. What am I, uniting us all, A playful event, breaking every wall?
- Valuable resource owned by business
- Introduce new ideas or methods in business
- I am the heart and soul of this event; I am the reason behind happening of these games.
- Formal Financial inspection
Down
- What shines bright with potential, yet is still waiting to be polished?
- What connects teams and files, yet lives in the cloud
- A list of pending tasks or work items that are yet to be completed.
- Private network for internal links
- I am the wall you can't see, but I stop the bad and let the good through.
- What lets you track hours worked and time off taken but never needs to punch in
14 Clues: Formal Financial inspection • Private network for internal links • Valuable resource owned by business • Introduce new ideas or methods in business • Moral Principles guiding business decisions • What connects teams and files, yet lives in the cloud • I'm stronger than a comma but softer than a period- what am I? • ...
Networks and the internet Crossword 2023-01-28
7 Clues: A wide network • a local network • a global computer network • a central point in a network • something that can connect to the internet • something that can be shared through a network • Multiple cables connecting to one cable to the server
Networks and the internet Crossword 2023-01-28
7 Clues: A wide network • a local network • a global computer network • a central point in a network • something that can connect to the internet • something that can be shared through a network • Multiple cables connecting to one cable to the server
Acronyms connected with computer networks 2016-12-06
Across
- What is acronym of Wi-Fi Protected Access?
- What is acronym of Asymmetric digital subscriber line?
- What LAN definition stands for?
- What is acronym of The Transmission Control Protocol?
Down
- What WAN definition stands for?
- What ECN definition stands for?
- What is acronym of A network access control list?
7 Clues: What WAN definition stands for? • What ECN definition stands for? • What LAN definition stands for? • What is acronym of Wi-Fi Protected Access? • What is acronym of A network access control list? • What is acronym of The Transmission Control Protocol? • What is acronym of Asymmetric digital subscriber line?
Digital Sales Graduation Crossword Puzzle 2022-03-30
Across
- We utilize this app to share educational information about our partners and solutions to their networks
- You need to _____ a lead in order for he/she to become a SQL.
- What Kali, Michele, Jacob, Sebastian, and Dylan have in common.
- The future of sales is ____ and buyer-centric
- The total number of certifications earned by the analysts
Down
- You learned how to think differently in sales with the ____ Sales Training
- _____ first to understand, solution later.
- ____ Avanade: One of the five growth pillars that will enable us to be more collaborative, focused on client outcomes, and reward shared success.
- As you create and work opportunities, you will need to ____ them to get paid when they close.
9 Clues: _____ first to understand, solution later. • The future of sales is ____ and buyer-centric • The total number of certifications earned by the analysts • You need to _____ a lead in order for he/she to become a SQL. • What Kali, Michele, Jacob, Sebastian, and Dylan have in common. • You learned how to think differently in sales with the ____ Sales Training • ...
Volcanic Hazards 2022-12-15
Across
- occur at volcanos that lack real-time ground based sensor networks
- A mixture of water and particles of all sizes that can range from small balls to giant boulders
- any potential loss or damage as a result of volcanic hazard
- larger rock fragments that land close to the volcano from an eruption
- molten rock flowing directly from a volcanic vent or fissure
- tiny particles which can travel up to hundreds of miles and contaminate air, water and more
Down
- any potentially dangerous volcanic process
- gravity driven rapidly moving mixtures of rockfragments and hot gas
- masses of rock and soil that slide rapidly down a slope due to failure of a slope of a volcano
9 Clues: any potentially dangerous volcanic process • any potential loss or damage as a result of volcanic hazard • molten rock flowing directly from a volcanic vent or fissure • occur at volcanos that lack real-time ground based sensor networks • gravity driven rapidly moving mixtures of rockfragments and hot gas • ...
telemedicine 2017-03-08
Across
- a procedure or policy statement for determining a course action
- measures a communacation channels information carrying capacity
- is a kind of date compression which allows users to reconstruct images without losinf information from the original copies
- that has the capability to carry a wide range of various frequencies
Down
- this is where the patient and physician are located during the time of consultation
- method that is use for reducing the volume of date
- is the use of telecommunication technology to provide clinical health care from a distance
- is a device which provides connection to at least two networks on an organization
- is a process of compressing date with high ratio
9 Clues: is a process of compressing date with high ratio • method that is use for reducing the volume of date • a procedure or policy statement for determining a course action • measures a communacation channels information carrying capacity • that has the capability to carry a wide range of various frequencies • ...
CPF 2017-03-21
Across
- Central Processing Unit (the brain of the computer). Executes data and instructions.
- Storage.
- Connects your computer to another computer over a wide area network.
- Local-Area network. Covers a small geographical area like at home, office or building.
- How much space to store data? Measured in bytes.
- Devices that you can carry with you and allows you to communicate with other devices.
- Wide-Area network. Covers a broad geographical area like a country or across countries.
- Read Only Memory. Non-Volatile.
- Allows many computers to connect to a network.
- Device where data are stored permanently.
Down
- Connects the computer to external networks or devices such as monitor, printers, thumb-drives or external hard disks.
- Describe the computer settings such CPU speed, RAM size, Hard-disk space etc
- A private network accessible only by authorised people who are usually employees or occupants of the same organisation or place.
- A public network accessible by everybody.
- Random Access Memory. Primary Storage. Volatile.
- Receives data and determines 'where to route' or which computer to send the data to.
16 Clues: Storage. • Read Only Memory. Non-Volatile. • A public network accessible by everybody. • Device where data are stored permanently. • Allows many computers to connect to a network. • How much space to store data? Measured in bytes. • Random Access Memory. Primary Storage. Volatile. • Connects your computer to another computer over a wide area network. • ...
Computer Concepts 2 2018-09-19
Across
- A test to determine processor speed
- example of a First Generation computer
- A slowed down Wi-Fi connection can be the result of this
- Bus width is measured in these
- Type of malware that collects bits of data, like your surfing habits
- This device connects two or more networks and directs the flow of information along the network.
- The number of these in a CPU help determine processor performance
- Type of communication where a company’s computers can monitor assembly lines and equipment to keep them running safely and efficiently
Down
- Type of malware that is spread when you distribute infected files, especially as e-mail attachments
- Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
- device that draws power even when they are turned off or in standby mode
- Electronic devices such as card readers use ___________ operating systems.
- High-speed, easily accessible storage space used by the CPU
- Head-mounted displays often use organic light emitting diode, or _____, technology.
- The first graphical Web browser released in 1993
- enables real-time conversations
16 Clues: Bus width is measured in these • enables real-time conversations • A test to determine processor speed • example of a First Generation computer • The first graphical Web browser released in 1993 • A slowed down Wi-Fi connection can be the result of this • High-speed, easily accessible storage space used by the CPU • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- of characters you type into a browser to access a website
- software program that allows you to surf the web
- a piece of code created by a web server and stored on a user's computer
- set of interconnected networks that allow computers in different locations to exchange info
- the process of converting electronic data to an encrypted form
- unsolicited email messages sent for marketing purposes
- a set of symbols inserted into files intended for display on the world wide web
- piece of programming code inserted into other programming to cause damage
Down
- smallest unit of measurement in
- many functions and calculations that make your computer run
- a device that allows computers to transmit information to each other via ordinary telephone
- a barrier that acts as a security system to protect trusted computer systems
- the brains of your computer
- a programming language that is commonly used in the development of client-server web applications
- read-only memory
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Smart Cities 2018-04-07
Across
- / an event where computer programmers, developers and others gather to collaborate intensively on software projects for a very short time
- / the art of skilful persuasion
- / this group’s needs are at the heart of smart city design
- / obtaining input by enlisting the services of a large number of people
- / algorithm that facilitates the secure and authentic registering of transactions
- / Big Brother is watching you
- / this may be a concern when citizens’ personal data are collected by governments and businesses
- / the largest smart city project in South Korea
Down
- / Michel Foucault views this as a prison symbol of the disciplinary society of surveillance
- / metaphorical understanding of the optimization of cities
- / learn how to prepare for terrorist threats with this app
- / the imaginary of what a smart city wants to be
- / a device which detects or measures a physical property and records, indicates, or otherwise responds to it.
- / the assemblage of people and things that feed data for decision making
- / the technically skilled elite in charge of running the country
- / top ranked country in Juniper Networks’ Smart City Index 2017
16 Clues: / Big Brother is watching you • / the art of skilful persuasion • / the largest smart city project in South Korea • / the imaginary of what a smart city wants to be • / learn how to prepare for terrorist threats with this app • / this group’s needs are at the heart of smart city design • / metaphorical understanding of the optimization of cities • ...
Digital Literacy-Aishani 2024-06-13
Across
- You should regularly do this for your data/photos.
- Tries to open security holes in your computer so a hacker can gain access.
- Keeps track of every key you type and sends it to the hacker.
- When someone gets your personal information.
- Tries to trick you into telling them your passwords or financial information. Usually in an email or through phone calls.
- Blocks you from accessing your files until you pay a ransom
- Computer activities often leave digital...
Down
- Spies on you and steals information.
- Displays ads on your computer.
- Reads everyone’s data that is passing through a network Usually on public WiFi
- A group of computers all being controlled by a remote hacker to perform illegal activity.
- Where your data is housed online, keeping it safe from hard drive failures.
- Protects your computer from malware
- Malicious software that spreads between files on your computer, ruining them or your computer. Replicates itself
- When people steal intellectual property such as movies, music andsoftware.
- Spreads through networks and emails infecting as many computers as possible.
16 Clues: Displays ads on your computer. • Protects your computer from malware • Spies on you and steals information. • Computer activities often leave digital... • When someone gets your personal information. • You should regularly do this for your data/photos. • Blocks you from accessing your files until you pay a ransom • ...
Crossword AMJ'24 2024-08-03
Across
- The type of network configuration that divides a physical network into multiple logical networks.
- The method of subdividing an IP network into smaller segments.
- A screen that appears in Windows to indicate a serious system error.
- A table that lists the MAC addresses associated with each port on a network switch.
- A cloud computing service offered by Microsoft for building and managing applications.
- A protocol used for voice over IP (VoIP) communications.
- A technology used for remote access to applications and desktops.
- A protocol used for multimedia communication, particularly in video conferencing.
- A virtual private network, used for secure communication over the internet.
Down
- A mode in Windows used for troubleshooting by only loading essential drivers.
- The acronym for a protocol that maintains the quality of service in network traffic.
- A protocol used for identity federation and single sign-on.
- The hardware address used to uniquely identify devices on a network.
- A technology used to remotely access applications and desktops from various devices.
- A directory service protocol commonly used with Active Directory.
- A port number typically associated with sending emails via SMTP.
- A tool for managing mobile devices and applications in a corporate environment.
17 Clues: A protocol used for voice over IP (VoIP) communications. • A protocol used for identity federation and single sign-on. • The method of subdividing an IP network into smaller segments. • A port number typically associated with sending emails via SMTP. • A directory service protocol commonly used with Active Directory. • ...
IT Fundamentals Chapter 1 2023-04-10
Across
- creations of the mind that one can own
- the satisfaction of the computer needs that businesses, schools, governments, and other organizations have
- the study of computers and computing concepts
- light emitted from electronic devices
- the use of a company's internet connection for personal use on company time by employees
- the requirement of Internet Service Providers to allow equal access to all web content
- the use of malicious attacks on networks and websites for the purpose of promoting social change
- energy-efficiency in computing devices
- the publishing of another person’s phone number, address, and other personal information on the internet
Down
- machines achieving a level of superintelligence that surpasses our own
- the reduction of potential health problems by transforming employee workspaces
- a network of encrypted content that allows users to engage in untraceable activity
- personal behaviors that build responsibility and trust
- the use of traffic cameras, surveillance footage, and social media postings by law enforcement agencies to prevent crimes before they're actually committed
- the collection and utilization of data
- the use of digital tools to track work, employee performance, and work by companies
16 Clues: light emitted from electronic devices • creations of the mind that one can own • the collection and utilization of data • energy-efficiency in computing devices • the study of computers and computing concepts • personal behaviors that build responsibility and trust • machines achieving a level of superintelligence that surpasses our own • ...
IT_ Deák Lili 2023-12-27
Across
- A person who breaks into computers or computer networks
- A small application designed to run within another application.
- "Shopping ..." is a software used in online shopping.
- A type of malicious software that can self-replicate and spread to other computers.
- A person responsible for maintaining one or more websites.
- ... bank is a financial institution, which offers online banking services.
- Personal Identification Number, used to authenticate the identity of a user.
Down
- An online conversation between two or more people in real time.
- The address of a web page on the world wide web.
- A piece of written, printed, or electronic matter
- Software that is installed on a computer without the user's knowledge.
- Using a mobile phone outside of the range of your own service provider's area.
- A point within a network that acts as an entrance to another network.
- Written or printed material in the form of words or characters.
- A harmful or corrupting program that is designed to damage or disrupt a computer system.
- A word, phrase, or image in a webpage that you can click on to go to another page.
16 Clues: The address of a web page on the world wide web. • A piece of written, printed, or electronic matter • "Shopping ..." is a software used in online shopping. • A person who breaks into computers or computer networks • A person responsible for maintaining one or more websites. • An online conversation between two or more people in real time. • ...
Cybersecurity 2023-12-06
Across
- A security measure that involves verifying the identity of a user or system.
- Secret code that must be entered to access a computer or network.
- The study of secure communication and storage of information.
- Barrier that prevents unauthorized access to or from a private network.
- The practice of stealing personal information to commit fraud.
- Person who gains unauthorized access to computer systems for malicious purposes.
- An attack that involves flooding a network with traffic to make it unavailable.
Down
- Unauthorized access, disclosure, or acquisition of sensitive information.
- Type of malicious software that can replicate and spread to other computers.
- Software designed to harm or exploit computers or networks.
- Process of converting information or data into a code to prevent unauthorized access.
- A program or set of programs that runs on a computer to carry out tasks.
- Software designed to detect and remove computer viruses.
- A set of rules governing the exchange or transmission of data.
- Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- Type of malicious software disguised as legitimate software.
16 Clues: Software designed to detect and remove computer viruses. • Software designed to harm or exploit computers or networks. • Type of malicious software disguised as legitimate software. • The study of secure communication and storage of information. • A set of rules governing the exchange or transmission of data. • ...
COMPUTER PROJECT 2025-05-31
Across
- The process of transforming data into unreadable code
- To connect your computer to the available internet
- The act of copying and distributing software illegally
- The act of using or imitating the language and thoughts of another person as one's original work
- A legal right granted by the law to the creator for his original work
- Two or More computers and peripheral devices connected within a small area
- Each node is connected to every other node
- Unwanted bulk emails that come from unknown sources
Down
- Each Computer in a network
- It is related to the new inventions that grants the inventor the sole right to make, use, sell the invention for a particular time period
- The layout in which various components of a network are connected
- A device that connects two different types of networks with each other
- Card To physically attach a computer to a network
- This Protects your brand's distinctive designs
- A computer network mainly created for an individual person
- An illegal intrusion into a computer system or network
16 Clues: Each Computer in a network • Each node is connected to every other node • This Protects your brand's distinctive designs • To connect your computer to the available internet • Unwanted bulk emails that come from unknown sources • The process of transforming data into unreadable code • The act of copying and distributing software illegally • ...
COMPUTER PROJECT 2025-05-31
Across
- The process of transforming data into unreadable code
- To connect your computer to the available internet
- The act of copying and distributing software illegally
- The act of using or imitating the language and thoughts of another person as one's original work
- A legal right granted by the law to the creator for his original work
- Two or More computers and peripheral devices connected within a small area
- Each node is connected to every other node
- Unwanted bulk emails that come from unknown sources
Down
- Each Computer in a network
- It is related to the new inventions that grants the inventor the sole right to make, use, sell the invention for a particular time period
- The layout in which various components of a network are connected
- A device that connects two different types of networks with each other
- Card To physically attach a computer to a network
- This Protects your brand's distinctive designs
- A computer network mainly created for an individual person
- An illegal intrusion into a computer system or network
16 Clues: Each Computer in a network • Each node is connected to every other node • This Protects your brand's distinctive designs • To connect your computer to the available internet • Unwanted bulk emails that come from unknown sources • The process of transforming data into unreadable code • The act of copying and distributing software illegally • ...
Diana Vicente Velazquez 2013-05-01
Across
- is a form of attack that prevents users from accessing normal services
- A virus is a program written with malicious intent and sent out by attackers
- settings from being changed without the appropriate password
- technically a worm
- is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank
- Script tool with HTML source code to allow interactive websites
- is a file or program other then a virus that is potentially harmful
Down
- Prevents unauthorized access to the local computer and the network
- Gains access to resources on devices by pretending to be a trusted computer
- is unsolicited e-mail
- It is distributed without any user intervention or knowledge
- Wiping is a procedure performed to permanently delete data from a hard driver
- of death A series of repeated, larger than normal pings that crash the receiving computer
- is a self-replicating program that is harmful to networks
14 Clues: technically a worm • is unsolicited e-mail • is a self-replicating program that is harmful to networks • settings from being changed without the appropriate password • It is distributed without any user intervention or knowledge • Script tool with HTML source code to allow interactive websites • Prevents unauthorized access to the local computer and the network • ...
Unit 9A2 recap 2014-12-04
Across
- What type of signal does a fibre optic cable use to transmit data?
- What device connects computers together to create a network?
- What does STP stand for? (3 words - do not use a space on crossword answer)
- What type of signal does a copper cable such as Cat5e use to transmit data?
- WPA, WPA2 and WEP are all types of what?
- What device would you use to extend the wifi signal on your network?
- What device connects networks together?
Down
- what type of security classification does a retina scan, fingerprint and voiceprint fall under?
- What does UTP stand for? (3 words - do not use a space on crossword answer)
- How many wires are in a Cat5e UTP cable?
- What malicious software can record the keys you type?
- What type of signal uses a radio wave to transmit data?
- What connector is typically used on a Cat5e cable?
- What component translates signals from layer 1 of the OSI model into data?
14 Clues: What device connects networks together? • How many wires are in a Cat5e UTP cable? • WPA, WPA2 and WEP are all types of what? • What connector is typically used on a Cat5e cable? • What malicious software can record the keys you type? • What type of signal uses a radio wave to transmit data? • What device connects computers together to create a network? • ...
Network Requirements 2022-08-19
Across
- A reference model with seven layers
- The unit responsible for transferring data to and from the link adapter
- An essential security precaution when connecting to the internet
- The process of creating an interconnection between a peripheral and a computer
- A group of workstations that are interconnected and can both send and receive data from each other
Down
- a network node used in telecommunications that connects the two networks with different transmission Protocol together
- wireless technology that transfers data over a sort distance
- Technology for connecting devices in a wired LAN or WAN
- Computers that store network software and shared or private user files
- A collection point for wires that interconnect the workstations
- device that converts digital data into analog signals (often used by landlines)
- Personal Area Network
- A communication network that interconnects a variety of data communicating devices with a small geographical area
- protocol that governs the communication and exchange of data over the internet
14 Clues: Personal Area Network • A reference model with seven layers • Technology for connecting devices in a wired LAN or WAN • wireless technology that transfers data over a sort distance • A collection point for wires that interconnect the workstations • An essential security precaution when connecting to the internet • ...
Unit 5.04 2024-04-26
Across
- The physical components of a computer system (e.g. The central processing unit, hard drive, modem)
- Working from home or a remote location
- An object placed into orbit by humans; most are used for communications purposes
- Computer software designed to mimic the knowledge of a human expert
- The use of computer technology to plan, design, test, and alter products
- A mobile phone with advanced capabilities, such as accessing the Internet
- Technology that allows users to make telephone calls over the internet
- Programs that instruct computers to perform specific operations
- The practical application of science to society and industry
- Computer software designed to mimic the knowledge of a human expert
- A system of computers connected together by telephone wires, cable wires, or other means
Down
- A number you choose to gain access to an account
- A navigational system that uses satellite technology to determine location and provide directions
- Technology that allows users to communicate over the Internet rather than through traditional public networks
- The use of computer software to control machines, tools, and processes involved in manufacturing products
15 Clues: Working from home or a remote location • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • Computer software designed to mimic the knowledge of a human expert • ...
5.01 Vocab 2024-04-22
Across
- A mobile phone with advanced capabilities, such as accessing the Internet
- Programs that instruct computers to perform specific operations
- over Internet Protocol Technology that allows users to make telephone calls over the Internet
- manufacturing The use of computer software to control machines, tools, and processes involved in manufacturing products
- A system of computers connected together by telephone wires, cable wires, or other means
- telephony Technology that allows users to communicate over the Internet rather than through traditional public networks
- Working from home or a remote location
- positioning system A navigational system that uses satellite technology to determine location and provide directions
- An object placed into orbit by humans; most are used for communications purposes
Down
- Computerized storage for information and facts
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- design The use of computer technology to plan, design, test, and alter products
- The practical application of science to society and industry
- system Computer software designed to mimic the knowledge of a human expert
- identification number A number you choose to gain access to an account
15 Clues: Working from home or a remote location • Computerized storage for information and facts • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • identification number A number you choose to gain access to an account • A mobile phone with advanced capabilities, such as accessing the Internet • ...
Industry 4.0 Newsletter 2024-03-14
Across
- ________ machine learning algorithms deal with labelled data
- Measure of how much the values in a dataset vary from the mean
- The process of transforming unstructured data into structured data
- An algorithmic approach that iteratively improves a solution
- A graphical representation of the distribution of a dataset, showing the median, skewness, locality and outliers, ________ plot
- A statistical technique for estimating the relationship between variables
- A method for checking the accuracy and quality of the data
Down
- ________ is an unsupervised ML algorithm for classifying data into groups
- What statistical measure is used to assess the strength and direction of the relationship between two variables?
- A common file type used in data analysis
- It is a deep learning toolkit framework developed by Google
- The initial phase of data analysis where raw data is explored to understand the predominant features, patterns, and anomalies
- A type of machine learning algorithm inspired by the structure of the brain, ________ Networks
- ________ algorithm that mimics the process of natural selection to evolve solutions
14 Clues: A common file type used in data analysis • A method for checking the accuracy and quality of the data • It is a deep learning toolkit framework developed by Google • ________ machine learning algorithms deal with labelled data • An algorithmic approach that iteratively improves a solution • Measure of how much the values in a dataset vary from the mean • ...
Safe Social Media Puzzle 2023-05-02
Across
- Different sites and pages allow users to have conversations, share information and create content.
- The use of electronic devices to send messages of intimidating or threatening nature
- A setting you can put your account onto to only allow certain users you approve to interact with you
- A worldwide system of networks used to research, interact and explore
- A user-created page on a social media platform
- What you use to log in and keep your accounts safe
- Somebody who is being cyberbullied
- When you change the settings to stop interacting with another user
Down
- The act of restricting searches so that they are safe and relevant
- Requesting another person to be able to communicate with each other and view each others content
- What you can send to communicate with other users
- The gaining of unauthorized access to data in a system or computer
- When you are able to use the internet and access social media
- When you receive unwanted messages that ask you to click on links etc.
14 Clues: Somebody who is being cyberbullied • A user-created page on a social media platform • What you can send to communicate with other users • What you use to log in and keep your accounts safe • When you are able to use the internet and access social media • The act of restricting searches so that they are safe and relevant • ...
Crossword Puzzle 2023-01-19
Across
- A collection of web pages and media over the internet
- the ability of an object to take on many forms
- the gaining of unauthorized access to data in a system
- an organized collection of structured information, or data
- special program that translates a programming language's source code into machine code
- network of networks
- the main circuit board of a computer that holds together many of the important components of a computer
Down
- set of instructions for solving a problem or accomplishing a task.
- small Java applications which can be accessed on an Internet server
- collection of items of same data type stored at contiguous memory locations.
- Linux-based mobile operating system that primarily runs on smartphones and tablets
- small Java applications which can be accessed on an Internet server
- intelligence the ability of a machine to display human-like capabilities such as reasoning, learning, planning and creativity
- a type of automated machine that can execute specific tasks with little or no human intervention
- standard markup language for creating Web pages
15 Clues: network of networks • the ability of an object to take on many forms • standard markup language for creating Web pages • A collection of web pages and media over the internet • the gaining of unauthorized access to data in a system • an organized collection of structured information, or data • set of instructions for solving a problem or accomplishing a task. • ...
Harassment 2026-02-25
Across
- Treat others with kindness and valuing their feelings.
- Support or help towards someone in need, especially in difficult situations.
- A false story or comment that is spread to harm someone.
- A person who repeatedly causes physical, emotional, or social harm to another.
- The act of informing an adult or authority about a bullying situation.
- Repeated conduct that physically or emotionally hurts another person.
Down
- A person who witnesses a situation of harassment, even if he or she does not participate directly.
- The ability to understand what another person is feeling or experiencing.
- Harassment that occurs through the internet, social networks or electronic devices.
- A comment or action made to ridicule or make someone feel bad.
- A person who receives the harm, mockery or aggression of the harasser.
- The action of intentionally leaving someone out of activities or groups.
- Words or actions that announce harm to a person.
- Actions or words used to cause fear in someone.
14 Clues: Actions or words used to cause fear in someone. • Words or actions that announce harm to a person. • Treat others with kindness and valuing their feelings. • A false story or comment that is spread to harm someone. • A comment or action made to ridicule or make someone feel bad. • Repeated conduct that physically or emotionally hurts another person. • ...
S 2 I 4 E 1 States Of Matter 2025-01-09
Across
- The result of forces between the molecules of gas and container walls.
- A material in which particles are arranged in an orderly, repeating, three-dimensional pattern called a crystal lattice.
- Any substance that flows.
- Solids consisting of networks of atoms held together by covalent bonds.
- A body spins around a fixed point.
- Solids consisting of positively and negatively charged ions held together by ionic bonds.
- Describes all matter as tiny particles that are in constant motion.
- A set of conditions used for comparing properties of different gases and corresponds to a temperature of 0 degrees C and atmospheric pressure at sea level.
Down
- Solids held together by relatively weak intermolecular forces.
- A body shifting from one point in space to another.
- A solid lacking an ordered internal structure.
- An object moves rapidly back and forth but stays in a fixed place.
- Solids formed via strong metallic bonds.
- Energy an object has because of its motion.
14 Clues: Any substance that flows. • A body spins around a fixed point. • Solids formed via strong metallic bonds. • Energy an object has because of its motion. • A solid lacking an ordered internal structure. • A body shifting from one point in space to another. • Solids held together by relatively weak intermolecular forces. • ...
Nathaniel Cybersecurity Crossword 2026-04-02
Across
- a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
- malicious code that replicates by independently exploiting vulnerabilities in networks.
- holds a computer system, or the data it contains, captive until the target makes a payment
- an attacker requests personal information from a party in exchange for something, like a gift.
- displays annoying pop-ups to generate revenue for its authors
- non-technical means for a criminal to gather information on a target
- malware that carries out malicious operations under the guise of a desired operation such as playing an online game
Down
- software that enables a criminal to obtain information about a user’s computer activities.
- phishing using voice communication technology
- takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
- malicious software
- This type of malware remains inactive until that trigger event happens.
- program or code introduced by a criminal who has compromised a system.
- modifies the operating system to create a backdoor.
- malicious executable code attached to another executable file, such as a legitimate program.
15 Clues: malicious software • phishing using voice communication technology • modifies the operating system to create a backdoor. • displays annoying pop-ups to generate revenue for its authors • non-technical means for a criminal to gather information on a target • program or code introduced by a criminal who has compromised a system. • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
Cyber Crossword 2021-04-26
Across
- A result or effect, typically one that is unwelcome or unpleasant.
- the use of technology to harass, threaten, embarrass, or target another person.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- Electronic device most students own at home and is square and mostly portable.
Down
- An individual who causes harm or stress to another human intentionally and repetitively.
- A repetitive action toward another human purposely causing harm or intimidation.
- The act of protecting ones self or others from harm or intimidation online.
- Having firm belief or reliability in someone.
- media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
9 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • The act of protecting ones self or others from harm or intimidation online. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • ...
Internet Crossword 2013-02-07
Across
- wide web its at the beginning of almost all web address's acronym is www
- is provided by your ISP provider and can either be fast or slow
- hardware or software used to block unauthorised access, usually from the internet into private networks
- you send things using this
Down
- address that defines the route of a web page from a specific server (Uniform resource locator)
- small text file that stores temporary information about the user and is accessed by a website to uniquely identify that user
- engine you use it to browse the web and there different ones.
- similar to internet but run on local server on a LAN network
- agreed set of rules for exchange of messages
9 Clues: you send things using this • agreed set of rules for exchange of messages • similar to internet but run on local server on a LAN network • engine you use it to browse the web and there different ones. • is provided by your ISP provider and can either be fast or slow • wide web its at the beginning of almost all web address's acronym is www • ...
Location 2014-01-22
Across
- the geographical position of a business
- when governments identify regions to be suffering from high unemployment and low incomes
- they need to choose their location close to their customers so that they can reduce costs
- when a business choses their location close to other organisations that operate in alike or complementary markets
- the unwillingness to relocate because of the trouble of moving
Down
- a business that picks their location near the source of raw materials due to having heavier material to transport than the final product
- any business that doesn't gain any costs-reducing advantages from locating in a specific location
- the communication, transportation and support networks in a certain area
- they can't be recuperated if the business fails
9 Clues: the geographical position of a business • they can't be recuperated if the business fails • the unwillingness to relocate because of the trouble of moving • the communication, transportation and support networks in a certain area • when governments identify regions to be suffering from high unemployment and low incomes • ...
Location 2014-01-22
Across
- the unwillingness to relocate because of the trouble of moving
- they can't be recuperated if the business fails
- they need to choose their location close to their customers so that they can reduce costs
- the communication, transportation and support networks in a certain area
Down
- any business that doesn't gain any costs-reducing advantages from locating in a specific location
- a business that picks their location near the source of raw materials due to having heavier material to transport than the final product
- when a business choses their location close to other organisations that operate in alike or complementary markets
- when governments identify regions to be suffering from high unemployment and low incomes
- the geographical position of a business
9 Clues: the geographical position of a business • they can't be recuperated if the business fails • the unwillingness to relocate because of the trouble of moving • the communication, transportation and support networks in a certain area • when governments identify regions to be suffering from high unemployment and low incomes • ...
Safer internet 2023-12-04
Across
- programs for directing a computer or processing electrinic data
- a large computer network linking smaller computer networks worldwide
- any similar act of threatening someone into doing something untersiable
- the key component of the computer system
- the stat of being safe
Down
- the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from comruter users for purposes of identili theft
- a computer program designed specifically to damage or disrupt a system such as a virus
- a group of connected pages on the world wid web containing information on a particular subject
- a part of a compyter program that is planted illegally in another program offten on damage or shut down a system on network
9 Clues: the stat of being safe • the key component of the computer system • programs for directing a computer or processing electrinic data • a large computer network linking smaller computer networks worldwide • any similar act of threatening someone into doing something untersiable • a computer program designed specifically to damage or disrupt a system such as a virus • ...
Crossword2 2024-04-01
Across
- What is the term for a program that replicates itself and spreads to other computers?
- What is the term for the science and art of creating computer programs?
- Which company produces the Windows operating system?
- Which company is famous for its gaming console PlayStation?
- What is the smallest unit of data in a computer?
Down
- What is the term for a device that connects multiple computer networks together?
- Which company developed the Windows operating system?
- What is the term for a malicious program that spreads from one computer to another by attaching itself to other files?
- Which company is known for its "ThinkPad" line of laptops?
- What is the term for a graphical representation of data in which symbols are used to represent information?
10 Clues: What is the smallest unit of data in a computer? • Which company produces the Windows operating system? • Which company developed the Windows operating system? • Which company is known for its "ThinkPad" line of laptops? • Which company is famous for its gaming console PlayStation? • What is the term for the science and art of creating computer programs? • ...
AI and problem solving methods 2024-09-24
Across
- A step-by-step procedure used to solve a problem or complete a task in AI.
- Satisfaction A method that solves problems by finding values that satisfy a set of constraints.
- A fundamental method in AI for finding solutions by exploring a problem space.
- The process of finding the best solution from a set of possible solutions.
- Learning A method that enables systems to learn from data and improve over time.
- A method of problem-solving that involves undoing previous steps.
Down
- A tree-like model of decisions and their possible consequences.
- A learning technique in neural networks to adjust weights based on error.
- A rule-of-thumb strategy for problem-solving that reduces the solution space.
9 Clues: A tree-like model of decisions and their possible consequences. • A method of problem-solving that involves undoing previous steps. • A learning technique in neural networks to adjust weights based on error. • A step-by-step procedure used to solve a problem or complete a task in AI. • The process of finding the best solution from a set of possible solutions. • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- of characters you type into a browser to access a website
- software program that allows you to surf the web
- a piece of code created by a web server and stored on a user's computer
- set of interconnected networks that allow computers in different locations to exchange info
- the process of converting electronic data to an encrypted form
- unsolicited email messages sent for marketing purposes
- a set of symbols inserted into files intended for display on the world wide web
- piece of programming code inserted into other programming to cause damage
Down
- smallest unit of measurement in
- many functions and calculations that make your computer run
- a device that allows computers to transmit information to each other via ordinary telephone
- a barrier that acts as a security system to protect trusted computer systems
- the brains of your computer
- a programming language that is commonly used in the development of client-server web applications
- read-only memory
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
Technology 2016-07-29
Across
- a technology that allows computers and other devices to communicate via a wireless signal
- of characters you type into a browser to access a website
- software program that allows you to surf the web
- a piece of code created by a web server and stored on a user's computer
- set of interconnected networks that allow computers in different locations to exchange info
- the process of converting electronic data to an encrypted form
- unsolicited email messages sent for marketing purposes
- a set of symbols inserted into files intended for display on the world wide web
- piece of programming code inserted into other programming to cause damage
Down
- smallest unit of measurement in
- many functions and calculations that make your computer run
- a device that allows computers to transmit information to each other via ordinary telephone
- a barrier that acts as a security system to protect trusted computer systems
- the brains of your computer
- a programming language that is commonly used in the development of client-server web applications
- read-only memory
16 Clues: read-only memory • the brains of your computer • smallest unit of measurement in • software program that allows you to surf the web • unsolicited email messages sent for marketing purposes • of characters you type into a browser to access a website • many functions and calculations that make your computer run • ...
IT vocabulary 2023-01-26
Across
- A graphic symbol on screen that represents an action or a resource such as an application.
- It receives and sends data on computer networks.
- A document you can put in a folder.
- Something made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- The place where you insert a plug.
- The place where your documents go when you delete them.
- When it's dead, recharge it or replace it.
- disconnect from the mains.
- a computer that is small enough to be carried around easily and is designed for use outside an office.
Down
- It prevents the computer from overheating.
- The process of identifying, planning and resolving a problem, error or fault within a software or computer system.
- Another word for cable.
- A connection without wires.
- You need to change or refill this when your printer runs out of ink.
- to find a solution to a problem or bad situation; to repair
- A motherboard is the main circuit board inside a computer that connects the different parts of a computer together.
16 Clues: Another word for cable. • disconnect from the mains. • A connection without wires. • The place where you insert a plug. • A document you can put in a folder. • It prevents the computer from overheating. • When it's dead, recharge it or replace it. • It receives and sends data on computer networks. • The place where your documents go when you delete them. • ...
Organizational Behaviour Chapters 10-12 (a&b) 2023-03-31
Across
- Truthfulness, consistent words and actions
- This refers to a moderately high achievement need and inquisitiveness and is action oriented and bold
- Vocal authority using legitimate or coercive power -Reminding, checking, bullying
- Logical arguments or emotional appeal or an attempt to convince
- This is predicted by extroversion, conscientiousness and the other big five factors
- This is used in negotiation reciprocity and social networks
- Interdependence with power holder and how many and how quickly others are affected by you
- Either party gets everything they want in negotiation.
Down
- This is best when the issue is less important to you than other party and/or the value/logic of your position is imperfect.
- This is best Best when a quick resolution is required
- Teams do this for better mutual understanding and high cohesion and to minimize relationship conflict
- Unclear or or uncertain and often found in court rulings and politics
- _______ is the capacity to influence others by value
- All conflict requires this
- This authority has legitimate power and influences behaviour by mere presence
- Truthfulness, consistent words/actions.
- This is the amount an individual or organization is in control
17 Clues: All conflict requires this • Truthfulness, consistent words/actions. • Truthfulness, consistent words and actions • _______ is the capacity to influence others by value • This is best Best when a quick resolution is required • Either party gets everything they want in negotiation. • This is used in negotiation reciprocity and social networks • ...
MADISON PHILLIPS 2013-04-19
Across
- persons responsible primarily for supporting end-user software applications, normally done remotely via telephone.
- a person who designs, creates, and maintains software.
- programs on the computer with written commands that tell a computer what tasks to perform.
- technology that enables information to be used to produce products and services.
- a system of computers, peripherals, terminals,and databases connected by communication lines.
- electronic information networks that carry audio, video, and computer data.
- the person responsible for maintaining and updating a website
Down
- a person employed to maintain and operate a computer system or network for a company or other organization.
- a programmer who designs and manages the development of business applications on the computer.
- people who work in communicating a concept or information via a computer using audio, video, text, graphics, animation, etc.
- a person who creates technical documentation and user guides for a professional field.
- the physical parts of the computer
12 Clues: the physical parts of the computer • a person who designs, creates, and maintains software. • the person responsible for maintaining and updating a website • electronic information networks that carry audio, video, and computer data. • technology that enables information to be used to produce products and services. • ...
Cisco Crossword 2013-09-08
Across
- In May 2011 what did the UN declare a Fundamental Human right?
- Proactive protection for radio frequency interference
- An integrated solution that brings together security, mobility, management, and intelligent network infrastructure to target and solve key business problems.
- provides video on any device to anyone
- A system for connecting a number of computer systems to form a local area network
- Instantly interacts with instant messaging and presence
Down
- Integrated or modular device that simplifies the deployment and operation of wireless networks
- Provides requirements, recommendations, policies, and performance metrics to aid in a successful Cisco Unity deployment on VMware ESX
- Offers a wide range of products and networking solutions designed for enterprises and small businesses
- Cisco switches are scalable and cost-efficient and meet the need for any size of business.
- Headquater of Cisco Systems
- A high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously
12 Clues: Headquater of Cisco Systems • provides video on any device to anyone • Proactive protection for radio frequency interference • Instantly interacts with instant messaging and presence • In May 2011 what did the UN declare a Fundamental Human right? • A system for connecting a number of computer systems to form a local area network • ...
Computer Crossword 2019-03-08
Across
- (Domain Name Server) what lets users connect to websites using domain names instead of IP addresses
- Address identifies a device on the Internet or a local network
- a set of rules or procedures for transmitting data
- allows for the transmission of power or data between devices
- rate one of the basic mechanisms
- traditional technology for connecting wired local area networks
Down
- the amount of data that can be sent from one point to another in a certain period of time
- Optic A technology that uses glass (or plastic) threads to transmit data
- The degree of errors encountered during data transmission over a communications
- amount of time a message takes to traverse a system
- collection of data that can be used by computers
- name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections
12 Clues: rate one of the basic mechanisms • collection of data that can be used by computers • a set of rules or procedures for transmitting data • amount of time a message takes to traverse a system • allows for the transmission of power or data between devices • Address identifies a device on the Internet or a local network • ...
Introduction to Cybersecurity 2024-02-22
Across
- is the act of skirting or breaking through security boundaries.
- a type of hacker that is generally ethical and law-abiding.
- focuses on keeping applications or programs secure throughout their lifecycle.
- certification validates the holders have met the baseline of understanding required by all cybersecurity job positions.
Down
- is based on the key concepts of information assurance.
- an attack in which the attacker is connectedto a network and monitors an authenticated session.
- a set of policies and procedures meant to improve and guide anorganization’s cybersecurity practices.
- Is the protection of digital devices and their connected networks from danger and threats.
- a process in which organizations determine the information about themselves which should be kept private versus what can be shared with the public.
- prevents and protects unauthorized intrusions into the network.
- which is a set of security controls designed to protect payment account security.
- includes threats such as viruses, worms, Trojan horses.
12 Clues: is based on the key concepts of information assurance. • includes threats such as viruses, worms, Trojan horses. • a type of hacker that is generally ethical and law-abiding. • is the act of skirting or breaking through security boundaries. • prevents and protects unauthorized intrusions into the network. • ...
Impact of Cybersecurity 2025-03-03
Across
- ___ security aims to protect the organization’s technology assets
- ______ security encompasses the protection of tangible items such as buildings, equipment, and other physical assets.
- _____ Triad is a security measure that guarantees every system is system.
- _______ ensures that information is protected from unauthorized or unintentional alteration.
- There are ____ pillars of security that can safeguard an organization against potential threats.
- _____ is the protection of information from people who are not authorized to view it.
- ________ is the protection of computer systems, networks, and data from digital attacks.
- _________ of Things is a network of devices with the ability to connect and exchange data.
Down
- ___ security aims to reduce the risk of human error, negligence, or intentional acts of harm.
- __ security involves safeguarding confidential information from theft, unauthorized access, and ensuring data privacy, both in storage and transit.
- _____ involves developing an incident response plan
- is assurance that systems and data are accessible by authorized users when and where it is needed
12 Clues: _____ involves developing an incident response plan • ___ security aims to protect the organization’s technology assets • _____ Triad is a security measure that guarantees every system is system. • _____ is the protection of information from people who are not authorized to view it. • ...
Professional Skills 2024-09-11
Across
- the ability to acquire and apply knowledge and skills
- a great deal of effort or endurance
- the successful conveying or sharing of ideas and feelings.
- the ability to adjust to new conditions.
- the combined action of a group of people, especially when effective and efficient.
- the ability to be easily modified to respond to altered circumstances or conditions.
- the reason or reasons one has for acting or behaving in a particular way.
Down
- the objective analysis and evaluation of an issue in order to form a judgment.
- free of deceit and untruthfulness and being sincere.
- the process of consciously planning and controlling time spent on specific tasks to increase how efficient you are
- the combined action of a group of people, especially when effective and efficient.
- a communication method that uses electronic devices to deliver messages across computer networks
- the use of the imagination or original ideas, especially in the production of an artistic work.
13 Clues: a great deal of effort or endurance • the ability to adjust to new conditions. • free of deceit and untruthfulness and being sincere. • the ability to acquire and apply knowledge and skills • the successful conveying or sharing of ideas and feelings. • the reason or reasons one has for acting or behaving in a particular way. • ...
Human Trafficking and Modern Slavery Quiz 2024-11-04
Across
- Which country has a “dirty list” of firms that use modern slavery?
- What kind of cooperation is essential between countries to combat trafficking?
- What type of disaster can disrupt social structures and make people vulnerable to trafficking?
- What do traffickers often withhold from victims to manipulate and control them?
- What type of crime fuels the networks that exploit vulnerable individuals for human trafficking and modern slavery?
Down
- What is the term for the illegal practice of forcing someone to work to repay a debt?
- What online platforms are used to advertise victims for sexual exploitation?
- What type of legal frameworks are crucial for criminalizing human trafficking?
- What illegal activity generates significant profits for perpetrators of human trafficking?
- What can be raised through campaigns to equip individuals to identify and report trafficking?
- What type of messaging services allow traffickers to communicate discreetly?
- What kind of opportunities do people in poverty lack, making them susceptible to trafficking?
12 Clues: Which country has a “dirty list” of firms that use modern slavery? • What online platforms are used to advertise victims for sexual exploitation? • What type of messaging services allow traffickers to communicate discreetly? • What type of legal frameworks are crucial for criminalizing human trafficking? • ...
Presenting Yourself Online 2023-01-18
Across
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- the use of persuasion, influence, or intimidation to make someone do something.
- websites and applications that enable users to create and share content or to participate in social networking.
- causing mental or emotional turmoil
- not genuine; counterfeit.
Down
- used to indicate that a named person is also known or more familiar under another specified name.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- An app that can alter (a photographic image) digitally
- feeling or showing envy of someone or their achievements and advantages
- appearance-altering digital image effects often used on social media
- To change the physical appearence of yourself with tecnology.
- experiencing worry, unease, or nervousness, typically about an imminent event or something with an uncertain outcome.
12 Clues: not genuine; counterfeit. • causing mental or emotional turmoil • An app that can alter (a photographic image) digitally • To change the physical appearence of yourself with tecnology. • appearance-altering digital image effects often used on social media • feeling or showing envy of someone or their achievements and advantages • ...
DMS Open House & tailgate 2025-10-11
Across
- Official aggie greeting
- Where is the DMS located?
- Upcoming DMS Aggie Spirit Tour on Oct. 17
- DMS initiative that provides a blend of learning and marketable skill development that comes in a Summit, Workshops, or 1:1 coaching
- Name of A&M’s football field
- staff-led day trips across Texas that connect students to science, history, art, and innovation while deepening reflection and peer support called ______ Explorations
Down
- The night before every home football game at Texas A&M University where fans get hyped up for game day and practice their yells
- local experiences that link students to the Bryan-College Station community and encourage them to build confidence and networks close to home called ______ Explorations.
- A&M Fight Song name
- An Empower Hours recurring resource happening on Thursdays from 3-5pm
- Credit course collaboration
- What month did the DMS officially become a department?
12 Clues: A&M Fight Song name • Official aggie greeting • Where is the DMS located? • Credit course collaboration • Name of A&M’s football field • Upcoming DMS Aggie Spirit Tour on Oct. 17 • What month did the DMS officially become a department? • An Empower Hours recurring resource happening on Thursdays from 3-5pm • ...
Stop Loss Basics 2012-07-18
Across
- One of the benefits not eligible for stop-loss coverage
- This coverage protects against excessive losses from over utilization on claims of all employees
- Stop-Loss protects against these types of losses
- All self-funded group health plans are required to comply with these laws
- Our managed care resource that links employers to managed care services and networks
- Implies that the employer is the plan sponsor and can be held liable if an employee were to file suit against the plan
Down
- Stop-Loss carriers partner with these vendors to control claim costs
- The employer is responsible for all benefit dollars up to this amount
- Provides two major functions for the employer's stop-loss plan; administrative and claim services
- An alternative to paying the increasing premium costs of fully insured medical plans
- One of Sun Life's key competitors
- Sun Life's distribution of Stop-Loss is directly through these individuals
12 Clues: One of Sun Life's key competitors • Stop-Loss protects against these types of losses • One of the benefits not eligible for stop-loss coverage • Stop-Loss carriers partner with these vendors to control claim costs • The employer is responsible for all benefit dollars up to this amount • All self-funded group health plans are required to comply with these laws • ...
JJ Williams 2015-05-01
Across
- OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
- To reload a webpage on the internet
- Networks online communities where people meet
- An authorized person who secretly gains access to computer files
- Software program that is designed to damage files on a computer that receives it
Down
- a piece of writing that has been copied from someone else and is presented as being your own work
- websites that contains dated text entries
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text. Example: www.google.com
- software used to view various kinds of Internet resources found on the Web
- A collaborative website which can be directly edited by anyone with access to it; www.Wikipedia.com
- bully A bully who operates online
12 Clues: bully A bully who operates online • To reload a webpage on the internet • websites that contains dated text entries • Networks online communities where people meet • An authorized person who secretly gains access to computer files • software used to view various kinds of Internet resources found on the Web • ...
Tan Bowie 8 Lyra 2023-01-19
Across
- world's leading destination for short-form mobile video
- mall loudspeaker held or worn close to the listener's ear or within the outer ear.
- one of the world's largest producers of electronic devices.
- a computer-based technology that facilitates the sharing of ideas, thoughts, and information through virtual networks and communities.
- the company that owns Facebook, Instagram, and WhatsApp.
- an input device used to enter characters and functions into the computer system by pressing buttons, or keys.
- the application of scientific knowledge to the practical aims of human life.
- a power saving state that stops all actions on the computer.
Down
- a wearable computer in the form of a watch.
- protection from, or resilience against, potential harm caused by others, by restraining the freedom of others to act.
- personal computer that can be easily moved and used in a variety of locations.
- a hand-held pointing device that detects two-dimensional motion relative to a surface.
12 Clues: a wearable computer in the form of a watch. • world's leading destination for short-form mobile video • the company that owns Facebook, Instagram, and WhatsApp. • one of the world's largest producers of electronic devices. • a power saving state that stops all actions on the computer. • the application of scientific knowledge to the practical aims of human life. • ...
Workplace Readiness Skills (Professional Skills) 2022-08-14
Across
- Meets organizational expectations regarding work schedule, behavior, appearance, and communication
- Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
- Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
- Locates information efficiently, evaluates the credibility and relevance of sources and facts
- Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
- Plans, prioritizes, and adapts work goals to manage time and resources effectively
Down
- Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
- Accepts constructive feedback well and is open to new ideas and ways of doing things
- Plans personal and professional goals related to education, career, finances, and health
- Knows how to select and safely use industry-specific technologies, tools, and machines
- Applies mathematical skills to complete tasks as necessary
- reads and interprets workplace documents and writes effectively
12 Clues: Applies mathematical skills to complete tasks as necessary • reads and interprets workplace documents and writes effectively • Plans, prioritizes, and adapts work goals to manage time and resources effectively • Accepts constructive feedback well and is open to new ideas and ways of doing things • ...
Magazine Crossword 2019-11-04
Across
- The process of converting data into a secret code for transmission over a public network
- A page or collection of web pages that can be viewed and modified by anybody with a web browser and access to the internet
- A computer language used to create web pages
- The opening page of a website
- A temporary storage place for quick retrieval of frequently used data
Down
- The protocol for mail transmission
- A security system that protects a network
- A small text file stored in a computer's hard drive by a website
- An unit memory( 8 binary digits represent a character )
- The action of writing CODE or instructions for the computer to follow
- The global system of interconnected computer networks that link billions of devices
- A programming methodology that uses a number of existing technologies together and enables web applications to make incremental updates to the user interface without the need to reload the browser page
12 Clues: The opening page of a website • The protocol for mail transmission • A security system that protects a network • A computer language used to create web pages • An unit memory( 8 binary digits represent a character ) • A small text file stored in a computer's hard drive by a website • The action of writing CODE or instructions for the computer to follow • ...
Day 2 Activity IoT 2024-10-04
Across
- – Microcontroller with built-in Wi-Fi and Bluetooth capabilities.
- – Devices used to detect and respond to physical inputs like temperature, light, or pressure.
- – A system that hosts websites and delivers web content over the internet.
- – Devices that convert energy into motion, typically for moving or controlling mechanisms.
- – A city that leverages technology to enhance infrastructure, services, and living standards.
- – Devices like watches or fitness bands that integrate technology for health tracking, communication, or other smart features.
Down
- – Used to connect components on a breadboard or between a breadboard and other devices.
- – A tool for building and testing circuits without soldering.
- – A switch operated by an electromagnet, used for controlling high-power devices.
- – Measures to protect data, devices, and networks from unauthorized access or harm.
- – A lightweight messaging protocol often used in IoT for efficient communication between devices.
- – A network of remote servers that store and manage data, allowing for access and sharing over the internet.
12 Clues: – A tool for building and testing circuits without soldering. • – Microcontroller with built-in Wi-Fi and Bluetooth capabilities. • – A system that hosts websites and delivers web content over the internet. • – A switch operated by an electromagnet, used for controlling high-power devices. • ...
Home Network 2025-01-24
Across
- a company that offers internet access to customers.
- A system of devices that work together to provide seamless wireless coverage
- A wireless networking technology that allows devices to connect to the internet
- A standard communication protocol for connecting devices in a wired local area network.
- The connection between the access points and the core network in a mesh system.
- A device that modulates and demodulates signals for communication over telephone lines or fiber.
- used to partition and isolate network traffic.
- A device that forwards data packets between computer networks, providing access to the internet
Down
- A network security system that monitors and controls incoming and outgoing network traffic.
- A device that creates a wireless local area network, often in a home or office.
- A device that connects multiple devices within a network and uses MAC addresses to forward data
- A device that uses electrical wiring to extend network connectivity.
12 Clues: used to partition and isolate network traffic. • a company that offers internet access to customers. • A device that uses electrical wiring to extend network connectivity. • A system of devices that work together to provide seamless wireless coverage • A device that creates a wireless local area network, often in a home or office. • ...
Unit 5 Crossword 2025-04-21
Across
- Deep learning technique used for training models by optimizing weights through error
- A Google-developed machine learning platform famous for using computational graphs and Keras.
- Framework that supports AR, face detection, and video processing in computer vision.
- Python library used for creating beautiful statistical visualizations, often in data science.
- The concept of AI running on smartphones and IoT devices without cloud dependency.
Down
- This popular Python library provides static, animated, and interactive visualizations.
- This Google tool converts spoken words into text using machine learning.
- Open-source AI framework developed by Facebook for deep learning and neural networks.
- This AI model from Google DeepMind supports multimodal input like text, images, and audio.
- This AI writing assistant uses GPT models to create marketing and copywriting content.
- This AI tool by OpenAI is known for its conversational capabilities and GPT-based responses.
- A platform by Amazon offering scalable cloud computing and machine learning services.
12 Clues: This Google tool converts spoken words into text using machine learning. • The concept of AI running on smartphones and IoT devices without cloud dependency. • Deep learning technique used for training models by optimizing weights through error • Framework that supports AR, face detection, and video processing in computer vision. • ...
Terminology - English 4 2026-03-14
Across
- (noun) Any moment where a person comes into contact with a brand
- (noun), plural) Non-physical things that still have value, like reputation, trust, patents, or brand recognition
- (noun) A customer who helps shape or customise a product
- (noun) Another term for a robot used by search engines to index websites
- (noun) Extra words that explain what a brand is or does (e.g., “online bank”, “whitening toothpaste”)
- (noun) High-speed internet connections that carry large amounts of data between networks
Down
- (noun)A person or organisation that controls what information reaches the public
- (noun)How much attention media give to a topic or how widely it is reported
- (verb) The option to stop receiving emails or newsletters
- (noun) An animated ad that appears on top of webpage content
- (noun) A brand name shown in a specific text style
- (noun)A programme used by search engines to scan and index websites
12 Clues: (noun) A brand name shown in a specific text style • (noun) A customer who helps shape or customise a product • (verb) The option to stop receiving emails or newsletters • (noun) An animated ad that appears on top of webpage content • (noun) Any moment where a person comes into contact with a brand • ...
