networks Crossword Puzzles
Conquer and Conqueste 2024-04-29
Across
- name of the desert the silk road crosses
- People who don't stay and live in one specific area
- Grandson to Genghis Khan who was just as strong a ruler as him
- Something that made traders predicted on the monsoon marketplace that made travel easier
- The main disease the mongols brought to the rest of the world
- A new discovery in warfare that gave the mongols an advantage in battle
- A portable tent
- Animals that helped traders cross the silk road
- A stretch of land across Asia that is mostly grassland
- The main animal nomads used for everything
Down
- A monotheistic religion started in Asia that spread due to the silk road
- The mongol ruler who made great discoveries and conquests
- the fabric that made the Chinese wealthy
- The item Mansa Musa spread so much of it caused an economic crash
- a series of trade networks across water
- The silk road was the first type of this kind of trade route
- Something that Ghengis Khan catapulted into cities to cause diseases
- The reason why Mansa Musa was traveling to Mecca
- A monotheistic religion started in the middle east spreading due to trade on the silk road
- The system the Mongols constructed that unified Asia, we still us it today
20 Clues: A portable tent • a series of trade networks across water • name of the desert the silk road crosses • the fabric that made the Chinese wealthy • The main animal nomads used for everything • Animals that helped traders cross the silk road • The reason why Mansa Musa was traveling to Mecca • People who don't stay and live in one specific area • ...
Media and Technology 2023-11-28
Across
- - Promoting products or services using digital channels like social media and email.
- - A mobile phone with advanced features like internet access and app capabilities.
- - A digital audio or video file that is available for streaming or downloading.
- - Online platforms for sharing content and connecting with others.
- - Storing and accessing data and programs over the internet instead of a computer's hard drive.
- - Analyzing large sets of data to discover patterns and information.
- - Overlaying digital information onto the real world through technology.
- - Measures taken to protect computer systems and networks from cyber attacks.
- - A seminar conducted over the internet.
- - Sending multimedia content in a continuous stream.
Down
- - Buying and selling goods and services over the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The simulation of human intelligence in computers.
- - Computer-generated simulation of a three-dimensional image or environment.
- - Playing electronic games, often on a computer or console.
- - Content that spreads rapidly on the internet.
- (Internet of Things) - Interconnected devices that can communicate and exchange data.
- - Bullying that takes place using electronic communication.
- - Small digital images used to express an idea or emotion in electronic communication.
- - A set of rules followed by a computer to solve problems or perform tasks.
20 Clues: - A seminar conducted over the internet. • - Content that spreads rapidly on the internet. • - The simulation of human intelligence in computers. • - Sending multimedia content in a continuous stream. • - Buying and selling goods and services over the internet. • - Playing electronic games, often on a computer or console. • ...
RiddleRealm 2024-02-16
Across
- Testing to ensure existing functionalities still work after changes.
- Storage and retrieval system that uses keys for efficient data access.
- Base-2 number system used in computing.
- Quick check to verify basic functionalities are working.
- Subset of artificial intelligence where systems learn and improve from data.
- Sequence of steps to test a specific functionality.
- AI-powered program designed to simulate conversation with users.
- Document detailing discovered issues during testing.
- Rules governing the structure of code.
- Likes to chase mice
- A versatile programming language known for its platform independence.
- The practice of identifying and removing defects or errors in software
- The process of performing tasks without human intervention, often used in testing.
- Flying mammal
Down
- Protection of computer systems, networks, and data from cyber threats.
- A pre-built structure for developing software.
- Confirming that the software meets specified requirements.
- Software component relied upon by another.
- Interface for interacting with software components.
- Interconnected network of devices communicating and sharing data.
- Step-by-step procedure for solving a problem.
- Detailed instructions for executing a specific test.
- Decentralized and distributed ledger technology.
- Has a trunk
- Large marsupial
- A distributed version control system widely used in software development.
- A set of instructions that performs a specific task in programming.
27 Clues: Has a trunk • Flying mammal • Large marsupial • Likes to chase mice • Rules governing the structure of code. • Base-2 number system used in computing. • Software component relied upon by another. • Step-by-step procedure for solving a problem. • A pre-built structure for developing software. • Decentralized and distributed ledger technology. • ...
CYBER AWARENESS 2023-01-27
Across
- wide area network
- type of phishing attack that targets specific individuals or organizations typically through malicious emails
- networking hardware that connects devices on a computer network by using packet switching
- type of cyber-attack
- designed to harm or exploit a computer system
- A number (0-9) and/or symbol (such as !, #, or %)
- metropolitan area network
- is a software or program that generates various ads from different websites
- type of malware
- is a node that broadcasts data to every computer or Ethernet-based device connected to it
- safeguarding personal data from unauthorized access, use, or disclosure
- an essential component for any Wi-Fi network
Down
- the process of converting information or data into a code, especially to prevent unauthorized access
- type of malware
- virtual private network
- a phishing cyber-attack targeting CEOs
- is an identity and access management security method that requires two forms of identification to access resources and data
- can be used to identify an individual, such as name, address, phone number, email address, and financial information
- local area network
- type of malware
- involves flooding a website or network with traffic to make it unavailable to users
- networks of hijacked computer devices used to carry out various scams and cyberattacks
- of software that is designed to replicate itself and spread from one computer to another
23 Clues: type of malware • type of malware • type of malware • wide area network • local area network • type of cyber-attack • virtual private network • metropolitan area network • a phishing cyber-attack targeting CEOs • an essential component for any Wi-Fi network • designed to harm or exploit a computer system • A number (0-9) and/or symbol (such as !, #, or %) • ...
CS Principles Review 2023-04-26
Across
- A ZIP folder uses ______ compression.
- Information about an individual that can be used to uniquely identify them (directly or indirectly).
- The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
- A small network often in one building
- The technique used to "solve" NP problems
- Basically the use of loops in an algorithm
- is data about data
- the use of "the other type" of code
- The uncringe version of copyright
- Quick and light protocol for transfering data
Down
- ________ Computing; the use of multiple computers to run different parts of a program
- Symmetric key encryption involves ___ key for both encryption and decryption
- Basically the use of if statements in an algorithm
- Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
- a piece of software or a device that uses software(2 words)
- An attack where a user is tricked into revealing private information, often via a deceptive email.
- Common form of wired connection to the internet
- a wireless access point that gives unauthorized access to secure networks
- Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
- _____ Address; IP but for network
20 Clues: is data about data • _____ Address; IP but for network • The uncringe version of copyright • the use of "the other type" of code • A ZIP folder uses ______ compression. • A small network often in one building • The technique used to "solve" NP problems • Basically the use of loops in an algorithm • Quick and light protocol for transfering data • ...
Puzzle 2023-06-06
Across
- Part of the computer system that one can physically touch
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- A programming language known for its use in web development
- A collection of information stored and accessed electronically
- Graphics processing unit
- Coding language developed at MIT designed to teach programming concepts to children
- A popular open-source relational database
- High-level programming language known for its simple syntax
- Central Processing Unit
Down
- Programming language developed by Sun Microsystems, now owned by Oracle
- Measure of CPU speed
- A service offered by Google that allows you to store and share files online
- A worldwide network of interconnected networks and computers
- Number system used in digital electronics and computer programming
- Refers to software that is used to protect your computer against unwanted intrusions
- Personal Computer
- Temporary storage in computer where it holds data that CPU uses
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- The technology that allows for wireless communication between devices over short distances
- Cloud computing platform and API offered by Amazon
- Part of the computer where most calculations take place
- Apple's mobile operating system
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
Intro to Television 2021-12-15
Across
- TO MAKE FALSE OR ACCUSATORY REMARKS
- the speed of delivery or presentation timing; includes the use of pauses and
- which are used for computer networks
- USED TO ILLUSTRATE HOW INFO SHOULD BE ARRANGED IN A NEWS STORY
- the rising and falling of the voice, consists of creating an alternate pitch or tone,
- REFERS TO THE PROCESS OF RECORDING MOVING INAGES ON ELECTRONIC MEDIA
- Protocol Television a system where a digital television service is delivered by the same
- AN ACRONYM FOR PHASE ALTERING LINE
- VIEW THE CAMERA IS POSITION HIGH ABOVE THE ACTION
Down
- MICROPHONES ETERNALLY ATTACHED TO HAND-HELD CAMERAS
- TO INFLUENCE IN AN UNFAIR OR SUBJECTIVE WAY
- LARGE OVERHEAD MICROPHONES ATTACHED TO A POLE
- THE CAMERA IS POSITIONED TO INCREASE THE SENSE OF HEIGHT FO AN INDIVIDUAL OR GVE A SENSE OF SPEED MOTION
- delivery and presentation
- THE COLOR STANDARD USED TO CREAT IMAGES IN TELEVISION BROADCASTING
- THE CAMERA IS ELEVATED ABOVE THE ACTION USING A CRANE TO PROVIDE A GENERAL OVERVIEW OF A SCENE
- GRAPHIC ORGANIZER TO ILLUSTRATE A SERIES OF EVENTS
- the quality of a person’s voice
- speaking or pronouncing words in an articulate style
- TO MAKE A CLAIM, BUT AVOID THE APPEARANCE OF SUBSTANTIATED PROOF
- the property of sound which creates variation
21 Clues: delivery and presentation • the quality of a person’s voice • AN ACRONYM FOR PHASE ALTERING LINE • TO MAKE FALSE OR ACCUSATORY REMARKS • which are used for computer networks • TO INFLUENCE IN AN UNFAIR OR SUBJECTIVE WAY • LARGE OVERHEAD MICROPHONES ATTACHED TO A POLE • the property of sound which creates variation • VIEW THE CAMERA IS POSITION HIGH ABOVE THE ACTION • ...
Cybersecurity Crossword 2021-05-06
Across
- The use of ____ off-the-shelf products have weakened security of ICS.
- Network device designed to control the flow of traffic between networks.
- Support component that contributes to ICS vulnerabilities.
- Total amount of loss or damage that can be expected from a successful attack
- Four-step process of taking action to reduce or eliminate risk.
- Doing ____ is not a viable option for securing ICS.
- has led to workforce downsizing and cost reducing measures in ICS.
- Intrusion, attack, and ____ are the three stages of an attack.
- The majority of attackers are _____.
Down
- Weakness in a system that can be exploited.
- The equation for ____ is threat x vulnerability x consequence
- A copy of your password should NOT be left on your ___.
- _____ should be at least 8 alphanumeric characters long.
- The most common social engineering method.
- The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
- Along with intent and opportunity, ____ is needed for threats to succeed.
- 22% of breaches involved some form of ___ ___.
- ____% of attacks are financially motivated.
- _____ is rummaging through business or residential trash for the purpose of finding useful information.
- An attack that is used to make computer resources unavailable.
- Malicious software.
21 Clues: Malicious software. • The majority of attackers are _____. • The most common social engineering method. • Weakness in a system that can be exploited. • ____% of attacks are financially motivated. • 22% of breaches involved some form of ___ ___. • Doing ____ is not a viable option for securing ICS. • A copy of your password should NOT be left on your ___. • ...
IT Newsletter WordSearch #2 2025-02-25
Across
- A server that acts as an intermediary between a user and the internet.
- A popular web security and performance company protecting websites.
- The number of bits transmitted per second in a digital signal.
- The process of verifying a user's identity in security systems.
- A methodology combining software development and IT operations.
- A process of converting data into a fixed-length string for security.
- Gains unauthorized access to computer systems for various purposes.
- A value used to verify the integrity of data during transmission.
- A program that translates source code into machine code.
- Software embedded into hardware, often for low-level control functions.
- A facility that houses critical IT infrastructure, such as servers.
Down
- A cyber scam where attackers trick users into providing sensitive information.
- A malicious attempt to gain access to or damage computer systems.
- A program that initializes the operating system when a computer starts.
- A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
- A method of packaging software and dependencies for deployment.
- A wired networking technology for local area networks (LANs).
- A decentralized and tamper-proof digital ledger technology.
- Fake media created by the manipulation of real media by AI.
- An architectural approach where applications are built as small, independent services.
20 Clues: A program that translates source code into machine code. • A decentralized and tamper-proof digital ledger technology. • Fake media created by the manipulation of real media by AI. • A wired networking technology for local area networks (LANs). • The number of bits transmitted per second in a digital signal. • ...
Unit 5 Lab - Medical Terminology 2023-10-24
Across
- vessels that deliver blood to tissues
- specialized body fluid
- Disorders of the aorta-the main artery that supplies blood from the heart
- networks of small vessels that perfuse tissues
- an imaging test that uses X-rays to look at the structures and organs in your chest
- a problem with the rate or rhythm of your heartbeat
- computerized x-ray imaging procedure in which a narrow beam of x-rays is aimed at a patient and quickly rotated around the body\
- a scan used to look at the heart and nearby blood vessels
- blood
- pumps blood through the system
- arteries
Down
- one of the simplest and fastest tests used to evaluate the heart
- Antiarrhythmics Versus Implantable Defibrillators Study
- a method for evaluating heart function and blood flow
- Antitachycardia pacing
- heart
- Coronary artery disease
- a condition that develops when your heart doesn't pump enough blood for your body's needs
- Antiarrhythmic
- lump, clot
- cell
- Atrial fibrillation
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- vessels that return blood to the heart.
- happens when the flow of blood that brings oxygen to a part of your heart muscle suddenly becomes blocked
25 Clues: cell • heart • blood • arteries • lump, clot • Antiarrhythmic • Atrial fibrillation • Antitachycardia pacing • specialized body fluid • Coronary artery disease • pumps blood through the system • vessels that deliver blood to tissues • vessels that return blood to the heart. • networks of small vessels that perfuse tissues • a problem with the rate or rhythm of your heartbeat • ...
Commerce, Culture, and Trade Bhatt pd 7 2024-10-18
Across
- Became a symbol of monks rather than a daily activity
- Widely traveled Arab scholar, merchant, and public official
- Largest religious structure in the premodern world which sought to express the Hindu understanding of the cosmos
- A time with increased food production, population growth, urbanization, and industrial development across the Islamic world.
- Bacteria responsible for the start of the Black Death
- A kind contract promising payment
- A chinese dynastic title the Mongols gave themselves which suggested a new beginning in Chinese history.
- Major process of settlement and societal organization
- Located in central Java-an agriculturally rich region allied with Srivijaya
Down
- Provided rapid communication across the empire and fostered trade.
- Emphasized salvation by faith, without arduous study or intensive meditation
- Allowed people to make a long trek across the arid Sahara.
- Ruler of Mali, who undertook the hajj accompanied by enormous quantities of gold.
- Foreign merchants came and permanently settled, forming thesecommunities.
- Intellectual center of islamic learning
- Grammatically an African tongue with an Arabic script
- Advanced ships made and used by the Arabs and Chinese
- Inns or guesthouses that large camel caravans stopped at
- Great chinese admiral who commanded a huge fleet of ships in a series of voyages
- Became the center of the trading networks and had highly stratified societies
20 Clues: A kind contract promising payment • Intellectual center of islamic learning • Became a symbol of monks rather than a daily activity • Grammatically an African tongue with an Arabic script • Bacteria responsible for the start of the Black Death • Advanced ships made and used by the Arabs and Chinese • Major process of settlement and societal organization • ...
Unit 5 Activity 2 2024-10-24
Across
- The pair of spongy, pinkish-gray organs in your chest.
- Root word that means “little vessel.”
- The abbreviation for Arteries
- Networks of small vessels that perfuse tissues.
- inflammation of the inside lining of the heart chambers and heart valves
- produces a black-and-white image that shows the organs in your chest.
- chronic heart failure
- type of portable electrocardiogram (ECG).
- The abbreviation for blood vessels
- atrial fibrillation
- A test to record the electrical signals in the heart.
Down
- central nervous system
- _____ occurs when the heart muscle doesn't pump blood as well as it should.
- Medical condition in which poor blood flow to the brain causes cell death.
- Vessels that deliver blood to tissues.
- Any cardiovascular disease process involving one or more of the four valves of the heart.
- The abbreviation for Blood
- Vessels that return blood to the heart.
- Improper beating of the heart, whether irregular, too fast, or too slow.
- The abbreviation for heart
- A scan used to look at the heart and nearby blood vessels.
- tests A test done on a sample of blood to measure the amount of certain substances in the blood or to count different types of blood cells.
- Pumps blood through the system.
- electrocardiogram
- coronary heart disease
25 Clues: electrocardiogram • atrial fibrillation • chronic heart failure • central nervous system • coronary heart disease • The abbreviation for Blood • The abbreviation for heart • The abbreviation for Arteries • Pumps blood through the system. • The abbreviation for blood vessels • Root word that means “little vessel.” • Vessels that deliver blood to tissues. • ...
health systems final 2024-04-02
Across
- The most commonly used benchmark in pharmacy purchasing of drugs:
- What is the fixed dollar amount the beneficiary must pay entirely out of pocket before insurance begins to pay.
- What do the NAM, IHI, and NCQA focus on?
- This type of adherence involves unplanned behavior that is not commonly linked to beliefs or cognition.
- Medical errors are the ___ leading cause of death per year.
- Medicare is a part of what public payer?
- The US policy operates through:
- This report was the start of high medical education costs:
- This law established the average manufacture price (AWP).
- What is the largest healthcare entity?
- In managed care, negotiation is all about:
Down
- Tier 4 contains what type of medications?
- Integrated Delivery Networks (IDNs) are defined into a geographic ____.
- This has led to large advances in rural medicine:
- Do not overlook ___ health policy.
- List of drugs that are covered by insurance and details of how those drugs are covered:
- What is the retrospective discount off the cost of brand drugs?
- The political, policy cycle is a convoluted and ______ process.
- What is the extent to which the patient follows the recommendations of the provider?
- What is the largest sector of health care workers?
20 Clues: The US policy operates through: • Do not overlook ___ health policy. • What is the largest healthcare entity? • What do the NAM, IHI, and NCQA focus on? • Medicare is a part of what public payer? • Tier 4 contains what type of medications? • In managed care, negotiation is all about: • This has led to large advances in rural medicine: • ...
Thulo.ST10095843 2022-03-24
Across
- Two or more computer connected together to share resources.
- How much data can be transferred from one location to another in a period of time.
- The maximum capacity data is transmitted over an internet connection, measured in bits per second.
- How many layers are in the OSI model?
- Packets not reaching their destination.
- What does TCP stand for?
- The ability to continue operation despite component failures.
- Lag or delay in communication over the internet.
- What is used to transfer data to and from a link adapter?
Down
- A hardware component that connects the computer to a computer network?
- A storage unit for data for an adapter.
- A set of rules that determine how data is transmitted between devices in a network.
- What does IP stand for?
- Physical layer, data link layer and network layer are all part of which model?
- A device that communicates between your phone and the internet.
- A small unit of data sent through IP/TCP networks.
- A word for inconsistency of packets arrival in a network.
- The heart of the OSI model
- A hardware device used to connect to other devices using ethernet cables.
- A digital pathway used to transfer data between components in a computer, and devices connected to the computer.
20 Clues: What does IP stand for? • What does TCP stand for? • The heart of the OSI model • How many layers are in the OSI model? • A storage unit for data for an adapter. • Packets not reaching their destination. • Lag or delay in communication over the internet. • A small unit of data sent through IP/TCP networks. • A word for inconsistency of packets arrival in a network. • ...
Technology 2025-07-03
Across
- A common interface used for connecting devices to computers.
- A widely-used programming language often used for web and mobile apps.
- An error or flaw in software code.
- A device that forwards data packets between computer networks.
- Short for application, a software program designed for a specific task.
- A security system that controls incoming and outgoing network traffic.
- A step-by-step procedure for solving a problem or performing a task.
- An input device used to type text into a computer.
- A technology that allows electronic devices to connect to a wireless LAN.
- A memory location that stores frequently accessed data for quick access.
Down
- A computer that provides data or services to other computers.
- The smallest unit of data in a computer.
- A software application used to access websites.
- The smallest unit of a digital image.
- Remote servers used to store, manage, and process data online.
- A device that connects a computer to the internet via telephone or cable lines.
- A method of exchanging digital messages over the internet.
- A popular high-level programming language known for its readability.
- Temporary memory that helps your computer run programs quickly.
- A small graphical representation of a program or file.
20 Clues: An error or flaw in software code. • The smallest unit of a digital image. • The smallest unit of data in a computer. • A software application used to access websites. • An input device used to type text into a computer. • A small graphical representation of a program or file. • A method of exchanging digital messages over the internet. • ...
Technology and the Law 2025-07-17
Across
- This individual must approve an account takeover warrant.
- Online harassment, especially common among young people.
- A social media platform linked to online risks for young users.
- Disruption A type of warrant that allows modification of criminal data.
- Traditional crime increasingly committed online via scams and deception.
- A major police task force mentioned in the SLAID Act announcement.
- A common mental health impact of online abuse.
- Predatory behaviour targeting children online.
- The law enforcement agency given enhanced powers under the SLAID Act.
- Government centre that investigates online child exploitation.
Down
- Malicious software used to damage or gain access to systems.
- The dark ______ is often used by criminal networks.
- Criminal offences committed using computers or the internet.
- A type of scam where attackers trick victims into revealing information.
- A requirement before a warrant can be issued: reasonable ________.
- A common cybercrime involving unauthorised access to systems.
- The legislation gives power to take over a person's online ________.
- Acronym of the 2021 legislation allowing AFP to “hack back” against cybercriminals.
- ACCC-run program that tracks and reports financial scams.
- The SLAID Act targets ______ criminal activity online.
- Encrypted communication network targeted by Operation Ironside.
- Commissioner responsible for regulating online safety in Australia.
22 Clues: A common mental health impact of online abuse. • Predatory behaviour targeting children online. • The dark ______ is often used by criminal networks. • The SLAID Act targets ______ criminal activity online. • Online harassment, especially common among young people. • This individual must approve an account takeover warrant. • ...
Tissues, Organs, and Organ Systems 2022-11-21
Across
- a liquid-tissue which transports oxygen and other nutrients to cells
- muscle that helps your body move and is consciously controlled
- tissue that helps connect networks of cells together
- the organ system composed of ovaries and testes responsible for fertilization of an embryo
- the organ that pumps blood through the body
- the organ that digests food
- tissue that protects the body or lines organs
- the organ system responsible for supplying blood and oxygen to the body
- a group of two or more tissues working together
Down
- the organ system that protects the body from infection
- the organ that processes information from the nervous system
- the organ system responsible for absorbing nutrients from food into the body
- muscle that moves food through your digestive tract and is not consciously controlled
- the organ system responsible for secreting hormones to control bodily functions
- the organ that captures oxygen from the atmosphere
- a group of two or more organs working together
- a group of cells working together
- a chemical messenger used to control bodily functions
- the organ system used for sensing the world around us through sight, touch, smell, hearing, etc.
- the muscle that makes your heart beat
- the organ that absorbs nutrients from food
21 Clues: the organ that digests food • a group of cells working together • the muscle that makes your heart beat • the organ that absorbs nutrients from food • the organ that pumps blood through the body • tissue that protects the body or lines organs • a group of two or more organs working together • a group of two or more tissues working together • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital contens
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
Station 1 – Viet Minh Strengths 2025-11-18
Across
- : Political leader who directed the nationalist struggle and unified the Viet Minh.
- : Three-phase doctrine of mobilisation, guerrilla, and conventional warfare.
- : Viet Minh cadres entering colonial administration to gather information.
- : Province where the Viet Minh displaced French authority in liberated zones.
- : Heavy guns supplied by China and positioned above French positions.
- : Town abandoned after Viet Minh isolated French supply lines in 1951–52.
- : Areas under Viet Minh control where shadow governments replaced French rule.
- : Region where Viet Minh evaded French destruction during Operation Lea in 1947.
- : Nationalist and anti-imperialist education creating unity and discipline.
Down
- : Route Coloniale where French forces collapsed in 1950.
- : Final French defeat in 1954 due to encirclement and artillery dominance.
- : Recognised the DRV on 18 Jan 1950 and provided major military aid.
- : Recognised the DRV on 30 Jan 1950 and provided strategic backing.
- : Early-stage tactic conserving strength while weakening French occupation.
- : Secure cross-border bases in China for training and resupply.
- : Major Viet Minh victory on RC4 in 1950.
- : Informant networks embedded in French-controlled towns and villages.
- : Tens of thousands who carried supplies and artillery across mountains.
- : Strategy emphasising long-term mobilisation and gradual escalation.
- : Commander who led protracted people’s war and major military campaigns.
20 Clues: : Major Viet Minh victory on RC4 in 1950. • : Route Coloniale where French forces collapsed in 1950. • : Secure cross-border bases in China for training and resupply. • : Recognised the DRV on 30 Jan 1950 and provided strategic backing. • : Recognised the DRV on 18 Jan 1950 and provided major military aid. • ...
DECRYPT THE GRID 2025-10-29
Across
- Software intentionally designed to harm, disrupt, or gain unauthorized access to a system.
- Safety copy of your important data- your best friend during a crash.
- A storage location for code or data, often used in DevOps.
- Temporary storage that helps apps or browsers load faster.
- Malicious software that locks or encrypts data until payment is made.
- A person who manages system or network configurations.
- A security barrier that filters traffic between networks.
- A major platform where oversharing can cause security risks.
- A scam where fake emails or messages trick users into giving away personal information.
- Finding and fixing errors in code.
Down
- Username and password combination used to access accounts.
- A piece of code that takes advantage of a software vulnerability.
- Storing and accessing data over the internet instead of your hard drive.
- The process of converting data into code to prevent unauthorized access.
- The process of verifying the identity of a user or device.
- Installing the latest version of software to fix bugs or vulnerabilities.
- A group of connected computers that share resources and data.
- A person who gains unauthorized access to systems sometimes ethical, sometimes not.
- Systematic review of systems and logs to check for compliance.
- Risk posed by employees or trusted individuals misusing access.
20 Clues: Finding and fixing errors in code. • A person who manages system or network configurations. • A security barrier that filters traffic between networks. • Username and password combination used to access accounts. • The process of verifying the identity of a user or device. • A storage location for code or data, often used in DevOps. • ...
SECURITY TERMINOLOGY 2020-05-24
Across
- The unauthorized disclosure of which, could be expected to cause Serious Damage to National Security
- _______________ Assistance Program
- Used on official government information that should be withheld from the public
- The ability and opportunity to obtain knowledge of classified sensitive information
- Given the name “Purple Dragon”
- Reportable action (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
- Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems
- You are required to ____________ suspicious behavior
Down
- Not authorized special accesses such as COMSEC
- The unauthorized disclosure of which, could be expected to cause Exceptionally Grave Damage to National Security
- Devotion or loyalty to a person, group, cause, or country
- Goal of an Insider Threat Program
- Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities
- An adversary having the intent, capability, and opportunity to cause loss or damage
15 Clues: Reportable action (two words) • Given the name “Purple Dragon” • Goal of an Insider Threat Program • _______________ Assistance Program • Not authorized special accesses such as COMSEC • You are required to ____________ suspicious behavior • Devotion or loyalty to a person, group, cause, or country • ...
Workplace Tech 2021-08-31
Across
- machinery and equipment developed from the application of scientific knowledge.
- world's largest network; worldwide collection of LANs and WANs
- machines which allow people to make copies of duplicates of papers
- a machine for printing text or pictures onto paper
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a device that scans documents and converts them into digital data.
- any software that is copyrighted and bears limits against use, distribution and modification.
- an electronic device for storing and processing data
- Telephones transmitting pieces of paper electronically through telephone lines
Down
- physical components of a computer such as a monitor, hard drive, and printer
- number of computers connected together to share data, software, and hardware
- consists of programs controlling the operations of a computer and its devices
- refers to something people can modify and share because its design is publicly accessible
- portion of the internet consisting of computer sites containing billions of documents called web pages
- an internet connection that's shared with multiple devices in a home or business via a wireless router.
- series of instructions telling computerhardware what to do
16 Clues: a machine for printing text or pictures onto paper • an electronic device for storing and processing data • series of instructions telling computerhardware what to do • world's largest network; worldwide collection of LANs and WANs • machines which allow people to make copies of duplicates of papers • ...
Cross Word Puzzle 2021-08-24
Across
- Medium
- Software designated to allow user browse online
- Lifeline of today's era.
- Theory that focusses on how information is received organized, stored and retrieved by the mind
- Computer programs that try to emulate human decision-making capabilities
- Combination of text, graphics, audio, and video with links and tools that let the user navigate, interact, create, and communicate.
- recording, reproducing, or broadcasting of moving visual images.
Down
- Implementation of educational technology to accomplish intended learning outcomes.
- The legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy.
- being able to understand and use technology
- theory that says learners Construct knowledge rather than just passively take in information.
- set of related web pages located under a single domain name, typically produced by a single person or organization.
- theory of learning based on the idea that all behaviors are acquired through conditioning.
- The evolution of ever-changing learning networks their complexity, and the role of technology.
- Practice of taking someone else's work or ideas and passing them off as one's own.
15 Clues: Medium • Lifeline of today's era. • being able to understand and use technology • Software designated to allow user browse online • recording, reproducing, or broadcasting of moving visual images. • Computer programs that try to emulate human decision-making capabilities • Implementation of educational technology to accomplish intended learning outcomes. • ...
Jair Jesus Capitan Cortes 2013-05-01
Across
- Also known as junk mail, is unsolicited e-mail.
- A form of attack that prevents users from accessing normal services, such as e-mail and a web server.
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- Should be fully erased to prevent the possibility of recovery using specialized software.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
- Is a file or program other then a virus that is potentially harmful.
Down
- Is the protocol suite that is used to control all of the communications on the Internet.
- A __________ engineer is a person who is able to gain access to equipment.
- Is similar to adware.
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring.
- Technically a worm.
- Programming language that allows applets to run within a web browser.
- Is a self-replicating program that is harmful to networks.
- Destruction is the process of removing sensitive data from hardware and software before recycling or discarding.
15 Clues: Technically a worm. • Is similar to adware. • Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a file or program other then a virus that is potentially harmful. • Programming language that allows applets to run within a web browser. • ...
HSIE - Globalisation 2013-02-20
Across
- The act or process of buying, selling, or exchanging commodities, at either wholesale or retail, within a country or between countries
- A privilege of a public nature conferred on an individual, group, or company by a government
- The quality or state of being sovereign
- The behaviors and beliefs characteristic of a particular social, ethnic, or age group
- Going beyond national boundaries or interests
- The investing of money or capital in order to gain profitable returns, as interest, income, or appreciation in value.
- A person or thing that consumes
- The basic, underlying framework or features of a system or organization
- The management of the resources of a community, country, etc., especially with a view to its productivity.
- The process or act of migrating
Down
- A vast computer network linking smaller computer networks worldwide
- A device designed to be launched into orbit around the earth
- An act or instance of combining into an integral whole
- The act of globalizing, or extending to other or all parts of the world
- To convey (cargo) in standard-sized containers
15 Clues: A person or thing that consumes • The process or act of migrating • The quality or state of being sovereign • Going beyond national boundaries or interests • To convey (cargo) in standard-sized containers • An act or instance of combining into an integral whole • A device designed to be launched into orbit around the earth • ...
The Black Death 2014-05-20
Across
- this rule never recovered after The Black Death ended
- a disease that spreads quickly through a population
- a terrible edidemic and deadly infection that spread through Europe (two words, no space)
- this person ordered that Jews shouldnt be forced to convert during the Black death
- during the plauge the town council ordered jews to convert to what religion
- The Black Death shook this world
Down
- terrified people during the plauge looked for a person to blame for there problems even if they didnt do it. What is this type of person called?
- the plauge tore apart this society
- what the plauge was caused by (two words, no space)
- about how many Europeans died between 1347 and 1352 when the first wave of the plauge ran its course (a fraction, written with letters)
- where the epidemic began (two words, no space)
- Another name for The Black Death (two words, no space)
- The Black Death ended what (two words, no space)
- the epidemic spread slowly along these networks
- during the plauge, what kind of people fled the towns taking doctors with them
15 Clues: The Black Death shook this world • the plauge tore apart this society • where the epidemic began (two words, no space) • the epidemic spread slowly along these networks • The Black Death ended what (two words, no space) • a disease that spreads quickly through a population • what the plauge was caused by (two words, no space) • ...
Radio, Recording, and Popular Music 2022-02-27
Across
- predetermined sequence of selected records to be played by a disc jockey
- a broadcasting station that aligns itself with a network
- single ownership and management of multiple radio stations in one market
- streaming or downloading of audio files recorded and stored on distant servers
- percentage of a market's total population that is reached by a piece of broadcast programming
- model, in broadcast regulation, the idea that broadcasters serve as the public's trustees fiduciaries
- radio, the delivery of "radio" over the Internet directly to individual listeners
- total sale of broadcast airtime
- a radio station's particular sound or programming content
Down
- the illegal recording and sale of copyrighted material
- relaxation of ownership and other rules for radio and television
- sale of radio or television content to stations on a market-by-market basis
- a device that translates digital computer information into an analog form so it can be transmitted through telephone lines
- "radio stations" that can be accessed only over the World Wide Web
- centralized production, distribution, decision-making organizations that links affiliates for the purpose of delivering their audiences to advertisers
15 Clues: total sale of broadcast airtime • the illegal recording and sale of copyrighted material • a broadcasting station that aligns itself with a network • a radio station's particular sound or programming content • relaxation of ownership and other rules for radio and television • "radio stations" that can be accessed only over the World Wide Web • ...
Networking 2022-03-19
Across
- a group or system of interconnected people or things.
- Optic consisting of or using thin flexible fibres with a glass core through which light signals.
- a computer or computer program which manages access to a centralized resource or service in a network.
- transmits power or data between devices or positions.
- rate the ratio of retransmitted packets to the total number of packets in a conversation
- Address a series of numbers that identifies any device on a network.
- the delay before a transfer of data begins following an instruction for its transfer.
Down
- a device that connects two or more packet-switched networks.
- rate/collisions s the result of two devices on the same Ethernet network attempting to transmit data at exactly the same time.
- a system for connecting a number of computer systems to form a local area network.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- set of rules that determine how data is transmitted.
- translates human readable domain names.
- a small segment of a larger message.
- stands for wireless fidelity.
15 Clues: stands for wireless fidelity. • a small segment of a larger message. • translates human readable domain names. • set of rules that determine how data is transmitted. • a group or system of interconnected people or things. • transmits power or data between devices or positions. • a device that connects two or more packet-switched networks. • ...
OP 8 - Exploration Vocab 2024-01-11
Across
- A conquistador who launched an invasion of modern-day Mexico with 500 men.
- Exchange The regular exchange between the Eastern and Western hemispheres into global networks.
- To travel all around the world.
- A light ship with triangular sails.
- Spanish navigator that led an expedition to be the first to circumnavigate the world.
- Portuguese explorer that sailed around Africa to India to prove it was possible.
Down
- Spanish soldiers and adventurers who led the conquest of the Americas.
- A conquistador that set off for South America and its gold.
- The group of people who were conquered by Pizarro and his men.
- The group of people who were conquered by Cortes and his men.
- Spanish navigator that was the first to cross through Panama with his crew.
- A system in which the government protects and regulates trade to create wealth.
- Gama Portuguese navigator explored the east African coast and India to bring back Asian spices and knowledge of sea routes.
- A navigator who had a historic voyage to the Americas.
- of Tordesillas Established a boundary that passed vertically through the Atlantic Ocean and Brazil.
15 Clues: To travel all around the world. • A light ship with triangular sails. • A navigator who had a historic voyage to the Americas. • A conquistador that set off for South America and its gold. • The group of people who were conquered by Cortes and his men. • The group of people who were conquered by Pizarro and his men. • ...
Artiom P. Period 1 2024-02-06
Across
- A short-range of wireless interconnection between mobile phones, computers, and other electronic devices
- Another word for the internet
- A type of image file that is constantly being used on the internet
- To transfer data into a file and or a program
- A collection of instructions, programs, and data that communicates to a computer on how to perform specific tasks
- Refers to the physical elements of a computer
- A cloud storage which allows you to create files and store files online.
Down
- To copy data, transfer, or move files from a website to other electronic devices.
- A worldwide networks that links computers
- Text files with minimal pieces of data
- An online cloud storage service that is from the Microsoft program which uses commonly used softwares
- The address of a web page
- A type of computer file format, for the compression and storage of digital images
- An application for being able to get on websites and the Internet
- A wireless networking technology that uses radio waves that allows electronic devices to connect to the internet
15 Clues: The address of a web page • Another word for the internet • Text files with minimal pieces of data • A worldwide networks that links computers • To transfer data into a file and or a program • Refers to the physical elements of a computer • An application for being able to get on websites and the Internet • ...
Automation 2024-04-11
Across
- Acronym for the practice of increasing the quantity and quality of traffic to your website through organic search engine results.
- Networks that can be utilized by automation tools to engage with a broad audience.
- Series of structured activities for marketing a product are known as what?
- Potential customers or clients in the marketing funnel.
- A common form of communication that can be automated to nurture leads.
- The measurement and optimization of marketing activities is known as what?
- What system allows marketers to automate repetitive tasks?
- A defined series of tasks within a marketing automation system to process leads.
Down
- Customizing marketing messages for individual recipients through automation.
- Acronym for Return On Investment, a key performance metric in marketing.
- What system is used to manage a company’s interactions with current and potential customers?
- A critical component of marketing that can be distributed automatically through various channels.
- The term for turning a lead into a customer.
- Dividing market into sub-groups with similar characteristics is known as what?
- An automated tool used on websites for instant customer interaction.
15 Clues: The term for turning a lead into a customer. • Potential customers or clients in the marketing funnel. • What system allows marketers to automate repetitive tasks? • An automated tool used on websites for instant customer interaction. • A common form of communication that can be automated to nurture leads. • ...
crossword 4 2024-09-23
Across
- A set of rules governing the exchange of data between devices.
- The delivery of computing services like storage, servers, and databases over the internet.
- A security system that controls network traffic based on predetermined rules.
- The software that supports a computer's basic functions, such as managing hardware and running applications
- A software application used to access and navigate the internet.
- A device that forwards data packets between computer networks.
Down
- A smaller, faster memory that stores copies of frequently accessed data.
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- A small file stored on a user's computer that tracks website activity.
- The address used to access resources on the internet.
- A computer
- The system that translates domain names to IP addresses for easier browsing.
- The process of converting information into a code to prevent unauthorized access.
- A set of rules or instructions designed to solve a problem or complete a task in computing.
- The amount of data that can be transferred over an internet connection in a given time.
15 Clues: A computer • The address used to access resources on the internet. • A set of rules governing the exchange of data between devices. • A device that forwards data packets between computer networks. • A software application used to access and navigate the internet. • A small file stored on a user's computer that tracks website activity. • ...
Computer Vocab Crossword. 2014-02-12
Across
- The number of bits used to encode a single character of text.
- A computer network consisting of worldwide networks of computer.
- a code system using The binary digits 0 and 1 to represent a letter.
- A device.
- Denoting software.
- A collection of items.
- A string of numbers separated by periods.
- The practice of using the network of remote servers.
- The program and other operating information.
- A system that responds to requests acrossed a computer network.
- A group of people or things.
- A website's own style.
Down
- A program with a graphical user interface.
- Rigid, Slotted board were parts connect.
- A small piece of data sent from a website.
- Domain Name System.
- Central Processing Unit.
- The software that supports a computers info.
- Internet Service provider.
- drive A disk drive containing a hard disk.
- Random Access memory.
- port Universal serial bus.
- To load the first piece of software that starts a computer.
- a set of computer instructions in firmware that control input and output operations.
- In a network.
- Small enough to fit on a desk.
- The host of a web page.
- Something inserted on to a rom chip can only be read, not removed.
28 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • Internet Service provider. • port Universal serial bus. • A group of people or things. • Small enough to fit on a desk. • Rigid, Slotted board were parts connect. • ...
BTT10o-F 2014-06-09
Across
- where a row and column intersect
- multiplication sign in excel.
- business letters are prepared on a ________
- two dollar signs used in a formula
- controls how objects move onto, off, and around your slides
- a ______ is the smallest unit of data a computer can use.
- the_____ is a wide area network, and connects to computers and networks around the world.
- The 4 parts of the ribbon are; font groups, buttons ______ and dialog box launcher
- a device that accepts input, processes data, stores data, and produces out
Down
- the certain amount of white space around all sides of the paper that doesn't contain any print
- direct the flow of data from one point to another.
- the state of one object being near another
- if your page lists the author and institution that published the page and provides a way of contacting him/her and...
- an application which allows users to perform calculations.
- lists different ways the word you want to use can be replaced.
- insert text that is already shadowed textured, coloured and contains interesting effects
- any numerical data entered into a worksheet
- used in large organizations where many people need access to the same data
- ________devices shows you what a computer is doing.
- _______lines of the paragraph starts typing from the centre.
20 Clues: multiplication sign in excel. • where a row and column intersect • two dollar signs used in a formula • the state of one object being near another • business letters are prepared on a ________ • any numerical data entered into a worksheet • direct the flow of data from one point to another. • ________devices shows you what a computer is doing. • ...
The Black Death crossword 2013-04-23
Across
- another word for rich
- a method of hurling deceased corpse' to infect opposition
- a numerous amount of people
- another word for remedies
- who many looked up to be cured from the plague
- famous group who tortured themselves for God’s forgiveness
- poisonous air produced by dead corpse
- were allegedly accused of being evil
- the head of the church during the time of the Black Death
- famous play proving equality in the Black Death
- the plague bacterium
- was heavily impacted through Black Death
- the large rash beneath arm pits
- another word for crisis
- cause of the Black Death
- Pope's self-protection from the Black Death
- religious group accused of spreading Black Death
Down
- British zoologist believed that some Black Death victims had this
- played an important role in treating the sick
- provided trading networks for exchange between other countries
- where plague bacteria infected the lungs
- Swis microbiologist who identified the plague bacterium
- another word for through the world
- beginning of Black Death
- where plague bacteria infect the bloodstream
- creatures used to suck out "bad" blood
- animal that spread the disease
- cure for illness
- 10 years in difference
- symptom of Black Death when body temperature rises
30 Clues: cure for illness • the plague bacterium • another word for rich • 10 years in difference • another word for crisis • beginning of Black Death • cause of the Black Death • another word for remedies • a numerous amount of people • animal that spread the disease • the large rash beneath arm pits • another word for through the world • were allegedly accused of being evil • ...
Internet Business Associate 2013-02-19
Across
- A public key encryption algorithm
- A server that mediates traffic between a protected network and the Internet.
- A machine that shares its resources among clients
- a concept or collection of symbols associated with a product, service or person
- The practice of categorizing online content through tags
- An encrypted file transfer protocol
- A web page that integrates content and scripts from multiple web sites to create new applications
- A computing paradigm in which users can use software over the Internet
- A worldwide network of interconnected networks
- A web... who creates the overview plan of a sites development
- Data processed by protocols so it can be sent across a network
- Encrypting and decrypting email messages
Down
- A system that maps uniquely hierarchical names to specific Internet addresses
- A Web 2.0 programming language that consists of existing technologies
- A set of instructions or rules
- A problem solving model in which a task is given to a group of people rather than one.
- A measurement of memory needed to store one 8 bit character
- a computing language used to program Web 1.0
- An individual computer on a network
- Modulator Demodulator
- The integration of telephony and data technologies
- A circuit board that enables a computer to connect to a network
- Outgoing mail server
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Unit 8 Crossword Puzzle #2 2014-12-15
Across
- the internet began here
- use of violence against people/property to force changes
- a nation that has industrialized
- businesses with offices in many countries
- a nation in the process of becoming industrialized
- United Nations
- all the financial interactions involving people, businesses, and governments
- _________ helps spread popular culture
- hacking networks or spreading viruses
- India split into _______ & India upon gaining independence
- this country mainly has Shia Muslims
- Association of Southeast Asian Nations
Down
- switching from a colony to an independent country
- interdependency amongst all countries of the world
- elements reflecting a group's common background and changing interests
- named an independent country in 1948 by the United Nations
- introducing new genes to an organism to give it new traits
- India has a ________ minority
- revolution of using new technology to increase food production globally
- one of the main sources of energy
- weapons of mass destruction
- led Indians on the Salt March
- India was controlled by this country before independence
- the African Congress Party leader who pushed for South African freedom
- organization of countries that export oil
- European Union
- this country experienced extreme racial segregation
- this country mainly has Sunni Muslims
- India has a ________ majority
29 Clues: United Nations • European Union • the internet began here • weapons of mass destruction • India has a ________ minority • led Indians on the Salt March • India has a ________ majority • a nation that has industrialized • one of the main sources of energy • this country mainly has Shia Muslims • hacking networks or spreading viruses • this country mainly has Sunni Muslims • ...
Computer/Web Crossword 2015-09-28
Across
- Network where computers are geographically close
- A group of information on a computer that can be software programs or data
- a permanently fixed original work
- used to view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks
- Related group of networked computers
- Type of writing known as "marketese"
- Main technology used for local area networks
- Caching system that uses caching servers to store content closer to end users.
- Translates the hierarchical, human-readable names into four-number IP addresses
Down
- Unauthorized access to another person's or company's data.
- Type of communication where sender and receiver are active at the same time
- a MAC text editor
- a video, audio, graphical, or icon creation
- Google service that orders links by relevance to user
- Business which provides internet service
- the code or tags that browsers use to create web pages
- a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive
- Visits sites on the internet, discovering web pages and building an index to the web's content based on keywords
- Type of language using neutral words
- a PC text Editor
20 Clues: a PC text Editor • a MAC text editor • a permanently fixed original work • Related group of networked computers • Type of writing known as "marketese" • Type of language using neutral words • Business which provides internet service • a video, audio, graphical, or icon creation • Main technology used for local area networks • Network where computers are geographically close • ...
PART 1 CROSSWORD 2016-02-22
Across
- Type of storage that provides remote storage to computer users
- A keyword or term that is assigned to a piece of information
- Primary type of communication system for the internet
- Type of text with about half the word count as control condition
- The main technology for local area networks
- A modifier of an HTML element type
- Social bookmarking for teachers where they can create free student accounts.
- A specialized form of computer memory designed to speed up the user experience
Down
- Web tool for creating slideshows that includes,video,images,music,and more.
- Acronym for local area network
- A related group of networked computers
- Interfere with UT IT resources or other users
- Legal doctrine that permits limited use of copyrighted material(2 words)
- Exclusive legal right to material
- A computer dedicated to providing services to other computers and devices connected together
- A group of information on a computer that can be software programs or data
- Using neutral language rather than subjective, boastful, or exaggerated
- Interfere with the security mechanisms
- An application used to access and view websites.
- A duplicate of content on a storage medium that you can use in case the original is lost
- The codes or tags that browsers use to create web pages
21 Clues: Acronym for local area network • Exclusive legal right to material • A modifier of an HTML element type • A related group of networked computers • Interfere with the security mechanisms • The main technology for local area networks • Interfere with UT IT resources or other users • An application used to access and view websites. • ...
Unit 7 terms 2015-12-16
Across
- wind to create electricity
- trade/continues to open themselves to foreign investment and international markets.
- flow of water on a wheel, is contained and reused as power.
- of comparative advantages in international trade.
- cost associated with the establishment transportation networks accessible from a specific place.
- finished goods including processing and construction.
- industries that cater to the general population and businesses.
- resulting from the unique characteristics of a location.
- an atom splits or collides turning it into nuclear energy
- 2 atoms are mixed together to make more power
- burned creates electricity.
Down
- of physical infracsture and emergence of social/political elite.
- or harvests products from the earth including production from raw materials and basic foods.
- advanced gas
- triggered by external influence, interests, or markets.
- to provide security and protection for citizens and businesses.
- purpose is to facilitate the other businesses.
- in manufacturing exceeds 10%of national income; development of modern social, economic, and political institutions.
- purpose is to provide services to individual consumers who desire them and can afford to pay for them.
- that absorb sunlight and turn it into electricity
20 Clues: advanced gas • wind to create electricity • burned creates electricity. • 2 atoms are mixed together to make more power • purpose is to facilitate the other businesses. • of comparative advantages in international trade. • that absorb sunlight and turn it into electricity • finished goods including processing and construction. • ...
Chapter 10 2017-04-27
Across
- electronic disturbance which degrades communications
- network that uses no physical wires
- transmits multiple signals simultaneously
- device which transmits data to its correct destination on a network
- an always-on physical connected between 2 communications devices
- set of standards for digital transmission of data over standard copper phone lines
- initiates instructions and information
- uses fiber-optic cable providing extremely high-speed Internet access
- a collection of computers and devices connected together
- the amount of data, instructions, and information that can travel over transmission media
- simple, inexpensive network that connects less than 10 computer, used for very small businesses and home users
Down
- radio waves that provide a high-speed signal transmission
- network that covers a large geographic area
- also called a switch, device which provides a central point for cables in a network
- high-speed network that connects local area networks in a metropolitan area
- network standard that specifies no central computer
- time it takes a signal to travel from one location to another on a network
- accepts the transmission of data, instructions, and information
- connects computers/devices in a limited geographical area
- connects devices in an individual's workspace using wired and wireless technology
- refers to the layout of the computers and devices in a communications network
21 Clues: network that uses no physical wires • initiates instructions and information • transmits multiple signals simultaneously • network that covers a large geographic area • network standard that specifies no central computer • electronic disturbance which degrades communications • a collection of computers and devices connected together • ...
REVIEW 2020-04-13
Across
- is it being used to its maximum capacity
- Laws: labor laws, health and safety regulations, rules on advertising, restrictions on sales . Laws do change.
- all these needed by a business to produce goods or services for the consumer
- managers will need to act promptly
- initial order, usage pattern, recorder level, lead time
- this has become a major source of concern for major record companies and film producers
- product onnovation, process innovation, positioning innovation and paradign innovation
- the 4 factors for contingency planning
- is important to all businesses
- there are split into two general forms
- Measure of the efficiency of production
- senior managers will need to communicate in an objective way
Down
- enables the organization to focus on its core activity.Could help cut costs
- It is about being prepared
- two forms of creativity
- systematic steps and efforts by the organization to limit the damage from sudden crisis
- market, final product, stock, infrastructure, finance, human resources
- Existing transport networks for people and products
- reduce costs,Increase market share, Extension strategies and use defensive strategies
- Consider the type of workers available and balance this with the skills and qualifications needed for all the business operations
20 Clues: two forms of creativity • It is about being prepared • is important to all businesses • managers will need to act promptly • the 4 factors for contingency planning • there are split into two general forms • Measure of the efficiency of production • is it being used to its maximum capacity • Existing transport networks for people and products • ...
Crossword Puzzle Constitution Unit Crossword 2021-01-07
Across
- a distant territory belonging to or under the control of a nation
- a shift of political power from the british monarchy to Parliament
- legislative body of government
- a document written by the pilgrims establishing themselves as a political society and setting guidelines for self government
- a charter of liberties agreed to by King John of England
- the first permanent English settlement
- a movement that spread the idea that logic could improve society in the 1700s
- originally called New Netherland
- laws passed in the colonies to control slaves
- a crop that is continuously in demand
Down
- a political meeting at which people make decisions on local issues
- trading networks in which good and slaves moved among England, the American colonies, and Africa
- founded by William Penn and the Quakers
- a colonist who received free passage to North America in exchange for working without pay for a certain number of years
- Jamestown was located here
- James Oglethorpe founded this colony to give debtors a new start
- a religious movement that swept through the colonies in the 1730s & 1740s
- the colonial representative assembly of Virginia
- founded by Roger Williams and the Puritans
- belief in the benefits of profitable trading; commercialism
20 Clues: Jamestown was located here • legislative body of government • originally called New Netherland • a crop that is continuously in demand • the first permanent English settlement • founded by William Penn and the Quakers • founded by Roger Williams and the Puritans • laws passed in the colonies to control slaves • the colonial representative assembly of Virginia • ...
Unit 5 Lab 2022-10-26
Across
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- Slow
- atrioventricular
- coronary care unit, cardiac care unit
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- Pumps blood through the system
- Two
- sometimes called a ‘treadmill’ or ‘exercise’ test, is a type of ECG that is done while you are exercising
- atrial fibrillation
- acute coronary syndrome
- Networks of small vessels that perfuse tissues
- Pertaining to
- It gives a picture of your heart using ultrasound, a type of X-ray. It uses a probe either on your chest or down your esophagus (throat)
- a problem with the rate or rhythm of your heartbeat.
Down
- one or more of the valves in your heart doesn't work properly
- happens when a part of the heart muscle doesn't get enough blood
- occurs when the heart muscle doesn't pump blood as well as it should
- Vessels that deliver blood to tissues
- removal
- cardiopulmonary resuscitation
- Vessels that return blood to the heart
- a quick and painless test that records the electrical signals in the heart
- It is a non-invasive test for people who may be experiencing unusual cardiac symptoms
23 Clues: Two • Slow • removal • Pertaining to • atrioventricular • atrial fibrillation • acute coronary syndrome • cardiopulmonary resuscitation • Pumps blood through the system • Vessels that deliver blood to tissues • coronary care unit, cardiac care unit • Vessels that return blood to the heart • Networks of small vessels that perfuse tissues • ...
Caden Powell-Crossword-2nd Period 2016-10-24
Across
- junk emails.
- small size preview of a larger image.
- uses data from a Local Area Network only allowing certain devices to connect to it.
- wireless access to network.
- medium for transferring data over phone lines.
- What type of storage device has no moving parts.
- programs that run on your computer such as word, google,etc.
- computers connected without going through another computer server.
- small negative programs that can effect your computers memory system.
- device used to connect devices together on a computer network.
- how you treat others over the internet.
- programs that make up an operating system for a computer.
- standard and advanced features in a phone that allows you to take picture,video, etc.
- storing data and programs over the internet on other computer networks that are not on your hard drive.
Down
- uses mechanical arm to read/write storage, usually slow than solid state drive.
- refers to today's desktop/laptop computers.
- area where you can sit down and work on assignments there is normally wifi, computer, etc.
- malicious software.
- most common type of internet access for computers.
- the computer and how to share and communicate things electronically.
- people that try to steal your personal information online using adds.
- central connection for computer in a specific area.
22 Clues: junk emails. • malicious software. • wireless access to network. • small size preview of a larger image. • how you treat others over the internet. • refers to today's desktop/laptop computers. • medium for transferring data over phone lines. • What type of storage device has no moving parts. • most common type of internet access for computers. • ...
Vocabulary: Unit 1,2,3 2019-11-12
Across
- It is a pointing device used to facilitate the handling of a graphic environment on a computer. It is usually made of plastic, and is used with one of the hands.
- It is a science that manages methods, techniques and processes in order to store, process and transmit information and data in digital format.
- video player
- It's a tongue
- natural phenomenon
- is the hardware inside a computer
- it's like the heart of the computer
- It consists of a set of computers connected to each other through various methods to share information and services.
- It is a storage medium used in computers and electronic devices, which allows only the reading of information and not its writing
- device to write on the computer
- device to see what happens on a computer
- device to scan things
- device for cooling the CPU of a computer
Down
- It is a flexible, transparent fiber, made by embedding or extruding glass or plastic in a diameter slightly thicker than that of a human hair
- music listening devices
- school subject
- device to make the voice sound louder
- device to play the music of a device
- It is a card to store things from the computer
- It is a device to have computer images
- digital conversation
21 Clues: video player • It's a tongue • school subject • natural phenomenon • digital conversation • device to scan things • music listening devices • device to write on the computer • is the hardware inside a computer • it's like the heart of the computer • device to play the music of a device • device to make the voice sound louder • It is a device to have computer images • ...
Computer Apps! 2023-12-08
Across
- modulator-demodulator
- Firefox, Chrome, Edge
- Random access memory
- A personal or business website that's regularly updated
- A gateway that passes data between one or more local area networks
- Physical parts of a computer
- To receive data or a file from the Internet on your computer
- Portable document format
- To turn off after restarting
- Hypertext markup language
- Intrusive and malicious software
- Microsoft Bing, Google, Yahoo
- Binary digit
- Divide between those with internet and those without it
- Category of property
- Personal identifiable information
- Domain name system
- Text files with small amounts of data
- A unit of information equal to 220
- A family of wired computer networking technologies
Down
- The numeric codes for the operations that a particular computer can execute directly
- Main printed circuit board
- Provides internet
- Read only memory
- Address of a webpage
- Windows, Linux, Android
- Keyboard, Mouse, Microphone
- Scrambling data
- Operating system and data of a computer
- Monitor, projector, printer
- Network protection, filters and scans data
- Stores data
- Open source software
- A unique series of numbers for every device connected to the internet
- Central processing unit
- Simulated experience
- A group of binary digits
37 Clues: Stores data • Binary digit • Scrambling data • Read only memory • Provides internet • Domain name system • Address of a webpage • Random access memory • Open source software • Simulated experience • Category of property • modulator-demodulator • Firefox, Chrome, Edge • Windows, Linux, Android • Central processing unit • Portable document format • A group of binary digits • Hypertext markup language • ...
Network Requirements 2024-08-13
Across
- security measure for network communication
- the time-sensitive delivery of data packets in a network, crucial for streaming
- it is a special purpose computer systems that are embedded in application environments and provided specialized support
- a network device that connects multiple devices within the same LAN
- a unique hardware identifier assigned to network interfaces
- device that forwards data packets between computer networks
- protocol used for assigning IP addresses to devices on a network
- converting data into a secure format
- connection that allows for multiple devices to share data
Down
- security measure that blocks unauthorized access to a network
- type of network that covers a large geographical area
- technology that allows data to be transmitted over long distances without wires
- this layer in the OSI model is responsible for routing packets
- methods and conventions that dictate the process in which data is transferred over a network
- process of dividing a network into smaller, more manageable segments
- a device that combines or aggregates multiple signals into one
- technology used to connect remote users securely over the internet
- a unique identifier for a device on a network
- a protocol used for translating domain names into IP addresses
- crucial factor determining the network's maximum capacity
20 Clues: converting data into a secure format • security measure for network communication • a unique identifier for a device on a network • type of network that covers a large geographical area • crucial factor determining the network's maximum capacity • connection that allows for multiple devices to share data • a unique hardware identifier assigned to network interfaces • ...
Dieguito 2024-09-14
Across
- Your favourite study location…?
- Your official spot for spritz is …?
- Frecuentaste mucho este lugar en el verano solo para mostrarle los prohibidos a una Chiquita…?
- Where you can find the best deep-fried corn products?
- Paraguay y el mar Boliviano son…?
- When you rent a boat without even knowing how to drive it, but you eat a… and nothing else matters?
- Something really Ecuadorian that can be found only in Genova…?
Down
- Best city of Italy?
- La saga del Bellaqueo, also known as…?
- You honor Italian cuisine, with every rule set, But there’s one thing you crave, you can’t quite forget
- Broth Pokémon, alive but completely seasoned and cooked.
- A good ají has this but Wendy will never return it…? (She did tho)
- What’s another name for your German squirrel?
- Answer the poll or suffer the…?
- …… que peina canas y ablanda el corazón como Old Man y Botafogo, Rico, Lombardo y Macón (tango song)
- El bolon no debe ser…?
- Implementation of graph neuronal networks for reconstruction of …… at the IceCube Real-Time Alert system.
- Human of USFQ that was part of your tango journey…?
- Counting sheep should help, but here’s a new quest: Instead of those sheep, what do you proclaim?
- Best beverage in the world is…?
20 Clues: Best city of Italy? • El bolon no debe ser…? • Your favourite study location…? • Answer the poll or suffer the…? • Best beverage in the world is…? • Paraguay y el mar Boliviano son…? • Your official spot for spritz is …? • La saga del Bellaqueo, also known as…? • What’s another name for your German squirrel? • Human of USFQ that was part of your tango journey…? • ...
Coding 2024-10-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
Edgescan Cybersecurity Crossword 2025-02-20
Across
- Attempt to breach security
- Verifying user identity
- Malware that encrypts files and demands payment
- Deceptive emails trying to steal information
- Relating to computers and networks
- Potential danger to a system
- Checking for vulnerabilities
- Self-replicating malicious code
- Person attempting unauthorized access
- Software update to fix vulnerabilities
- Taking advantage of a vulnerability
- Security event that may indicate a breach
- Review of security controls
- Information stored on a system
- Attack that disrupts service availability
- Restoring data after a loss
- Malware disguised as legitimate software
- Connected computers and devices
- Weakness that can be exploited
- Unsolicited bulk email
Down
- Copy of data for recovery
- Simulated attack to find weaknesses
- Ensuring systems are accessible
- Ensuring data accuracy
- Unauthorized access to data
- Software that hides malware on a system
- Scrambling data to make it unreadable
- Programs that run on a computer
- Software that secretly monitors user activity
- Keeping information secret
- Protecting systems and data
- Secret word for access
- Protecting personal information
- Measures to prevent attacks
- Network of infected computers
- Network security system controlling traffic
- Safeguard from harm
- Malicious software designed to harm systems
- Potential for loss or damage
39 Clues: Safeguard from harm • Ensuring data accuracy • Secret word for access • Unsolicited bulk email • Verifying user identity • Copy of data for recovery • Attempt to breach security • Keeping information secret • Unauthorized access to data • Protecting systems and data • Review of security controls • Measures to prevent attacks • Restoring data after a loss • Potential danger to a system • ...
Computer Network Crossword 2025-04-21
Across
- Time delay algorithm used after a collision in CSMA/CD networks.
- Device that connects devices in a LAN and forwards frames based on MAC addresses.
- Basic unit of communication at the data link layer.
- Lowest layer of the OSI model that handles node-to-node data transfer.
- Protocol that allows multiple frames to be in transit without waiting for acknowledgment.
- Error detection method using polynomial division.
- ARQ protocol that retransmits only the erroneous or lost frames.
- Distance Minimum number of bit changes needed to convert one code to another.
- Protocol used to map IP addresses to MAC addresses.
- Error control protocol that resends all frames after a lost or damaged one.
- Logical segmentation of a LAN into multiple broadcast domains.
- A simple method for error detection using summing of bits.
Down
- Technique where data is divided into fixed-size units for error detection.
- Flow control protocol where sender waits for acknowledgment after each frame.
- Unique identifier assigned to network interfaces for communication.
- Widely used wired LAN technology that uses MAC addressing.
- Mechanism for detecting and correcting transmission errors.
- Bit added for simple error detection in transmitted data.
- Ensures sender does not overwhelm the receiver with data.
- When two frames are transmitted simultaneously and interfere.
20 Clues: Error detection method using polynomial division. • Basic unit of communication at the data link layer. • Protocol used to map IP addresses to MAC addresses. • Bit added for simple error detection in transmitted data. • Ensures sender does not overwhelm the receiver with data. • Widely used wired LAN technology that uses MAC addressing. • ...
Core 1 2025-05-13
Across
- Allows smartphones to make payments via proximity.
- The startup process that checks system hardware
- Device that digitizes printed documents.
- Software that runs virtual machines.
- Special IP address used for testing your own machine.
- Combines multiple disks for redundancy or speed.
- Short-range wireless communication protocol.
- Converts names like google.com into IP addresses.
- Device used to extend a computer display to a wall or screen.
- Software permanently programmed into hardware devices.
- Form factor common in compact desktops.
- High-speed I/O port, common on Macs.
Down
- Encrypts your internet traffic and masks your IP.
- Smartwatch feature that tracks heart rate and steps
- Cloud model for services like Google Docs.
- High-speed storage interface that uses PCIe.
- Smallest replaceable component in a smartphone.
- Files stored online instead of locally.
- Port for connecting printers, mice, and keyboards.
- Type of cloud service that provides virtual machines.
- Common cause of overheating in laptops.
- Carries both video and audio signals digitally.
- Converts AC power to DC inside a PC.
- Common interface for connecting hard drives and optical drives.
- Device to test power supply voltage.
- Device that joins multiple networks together.
- Type of storage with no moving parts.
27 Clues: Software that runs virtual machines. • Converts AC power to DC inside a PC. • Device to test power supply voltage. • High-speed I/O port, common on Macs. • Type of storage with no moving parts. • Files stored online instead of locally. • Common cause of overheating in laptops. • Form factor common in compact desktops. • Device that digitizes printed documents. • ...
angielski zawodowy 2025-05-22
Across
- A unique number identifying a device on a network
- Temporary memory used to store data while the computer is running
- A file that organizes data in rows and columns, often used for calculations
- The positioning of text (left, center, right, justified)
- The way users interact with a computer or software
- The brain of the computer that processes data
- A powerful computer that provides services or resources to other computers
- A specific category of information in a database
Down
- Text style that slants letters to the right
- A device used to store data permanently
- A program used for writing and editing text
- A clickable element that links to another webpage
- A structured collection of data stored electronically
- A program used to find websites and online information
- A group of connected computers that share resources
- A design for text characters used in documents
- A connector on a computer used for data transfer and peripheral devices
- A device that forwards data between computer networks
- A set of data arranged in rows and columns in a database
- A request for data or information from a database
- Text style that makes letters thicker and darker
- A single box in a spreadsheet where you enter data
22 Clues: A device used to store data permanently • Text style that slants letters to the right • A program used for writing and editing text • The brain of the computer that processes data • A design for text characters used in documents • Text style that makes letters thicker and darker • A specific category of information in a database • ...
module 1 2025-07-29
Across
- Holds users responsible for their actions in a networked environment
- The process of claiming an identity before authentication
- Forwards data packets between different networks efficiently
- Data is broken into smaller units and transmitted independently across the network
- Connects devices in a LAN and forwards data based on MAC addresses
- Restricts or permits traffic based on predefined security policies
- A cyberattack that involves unauthorized monitoring without altering data
- Verifies the identity of a user or system before granting access
Down
- A layered security approach using multiple protective measures
- Guarantees that data remains consistent, accurate, and unaltered during transmission or storage
- Ensures systems and services are accessible when needed
- Ensures that sensitive data is not disclosed to unauthorized individuals or systems
- Prevents denial of actions or communications by users
- An attack launched straight from the attacker to the target system
- Automatically assigns IP addresses and configurations to network devices
- Tricks users into revealing confidential information by impersonating trusted sources
- A fully isolated and organization-controlled network
- Translates private IP addresses into public IP addresses for external communication
- Resolves IP addresses to MAC addresses for local communication
- Detects and blocks malicious traffic patterns within the network
20 Clues: A fully isolated and organization-controlled network • Prevents denial of actions or communications by users • Ensures systems and services are accessible when needed • The process of claiming an identity before authentication • Forwards data packets between different networks efficiently • A layered security approach using multiple protective measures • ...
Criminology Final 2021-01-14
Across
- What step in the criminal justice process involves capital punishment, probation and parole
- What type of police organization assigns officers to a particular role within a specialized unit
- A member of a fire department who tries to extinguish fires
- Deliberate and criminal starting of fires
Down
- The legal process where a judge reviews evidence and legal reasoning from opposing parties to determine their rights and obligations
- A cyberattack that redirects a website's traffic to a different fake website
- Which level of law enforcement has statewide authority to conduct law enforcement and criminal investigations
- A criminal act that involves theft, destruction of information, computer networks and the Internet
8 Clues: Deliberate and criminal starting of fires • A member of a fire department who tries to extinguish fires • A cyberattack that redirects a website's traffic to a different fake website • What step in the criminal justice process involves capital punishment, probation and parole • ...
Chapter 2 vocab 2022-08-30
Across
- repeatability of results
- describe the conditions of your study so that someone else can reproduce your findings.
- are networks of interdependent components and processes, with materials and energy flowing from one component of the system to another.
Down
- ability of system to recover from disturbance
- a severe disturbance in which the system does not return to normal but instead results in significant changes in some of its state variables
- the energy and matter that flow into, through, and out of a system.
- dynamic state in which system is stable over time (homeostasis)
- periodic destructive events such as fire or flood that destabilize or change the system.
8 Clues: repeatability of results • ability of system to recover from disturbance • dynamic state in which system is stable over time (homeostasis) • the energy and matter that flow into, through, and out of a system. • describe the conditions of your study so that someone else can reproduce your findings. • ...
Crossword Marwan 2024-04-17
Across
- is used to transmit data securely and anonymously over public networks.
- attack which consists of testing all possible password or key solutions.
- attack which consists of testing all the words in a list as a keyword
- a symmetric encryption algorithm (block cipher) using 56-bit keys
Down
- malware that infects your PC or mobile device and collects information
- The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
- a public-key cryptosystem, one of the oldest widely used for secure data transmission.
- attack that makes a server inaccessible in order to cause an outage
8 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keys • attack that makes a server inaccessible in order to cause an outage • attack which consists of testing all the words in a list as a keyword • malware that infects your PC or mobile device and collects information • is used to transmit data securely and anonymously over public networks. • ...
Types of Digital forensics 2023-08-08
Across
- Collecting evidence from computer networks or devices.
- It collects raw data from system memory (RAM, cache, and system registers).
- Deals with the inspection and evaluation of phones and smartphones and aids in retrieving contacts, call logs, incoming and outgoing SMS, and other available data.
- Focuses on researching and analyzing databases and the associated metadata.
Down
- Monitoring and examining computer network traffic.
- It is concerned with locating suspicious code and researching viruses, worms, etc.
- Emails, including deleted emails, calendars, and contacts, are discussed along with their recovery and analysis.
- Deals with locating active, updated, or deleted files in order to extract raw data from the device's primary or secondary storage.
8 Clues: Monitoring and examining computer network traffic. • Collecting evidence from computer networks or devices. • It collects raw data from system memory (RAM, cache, and system registers). • Focuses on researching and analyzing databases and the associated metadata. • It is concerned with locating suspicious code and researching viruses, worms, etc. • ...
Discovery 2025-03-24
Across
- The Internet is a series of computer _______ that connect with each other to allow the exchange of information.
- The space rover's mission was to ______ the surface of Mars.
- Explorers push their _______ sometimes for the benefit of all humankind.
- Some Sherpa people from Nepal work as guides helping climbers _______ up Mount Everest.
- Astronauts who go to the ISS, ________ into space from Baikonur Cosmodrome in Kazakhstan.
Down
- To prove her _____ , the scientist carried out research for five years.
- It requires a great deal of _______ for humans to spend any length of time in space.
- Sir Alexander Fleming's accidental discovery that penicillin kills bacteria was an important ______ in medicine.
8 Clues: The space rover's mission was to ______ the surface of Mars. • To prove her _____ , the scientist carried out research for five years. • Explorers push their _______ sometimes for the benefit of all humankind. • It requires a great deal of _______ for humans to spend any length of time in space. • ...
Introduction Technology 2025-08-01
Across
- A structured collection of data, typically stored electronically on a computer system, that can be easily accessed, managed, and updated.
- A display device that outputs visual information from a computer or other electronic system
- A global network that allows communication and access to information.
- Protecting computer systems and networks from unauthorized access or cyberattacks.
Down
- A piece of computer hardware that displays or produces the results of computer processing.
- Physical objects or machines designed for specific functions.
- Computer programs that provide instructions for hardware to operate.
- Refers to the act of putting something into a system or process, or the thing that is put in
8 Clues: Physical objects or machines designed for specific functions. • Computer programs that provide instructions for hardware to operate. • A global network that allows communication and access to information. • Protecting computer systems and networks from unauthorized access or cyberattacks. • ...
3rd 2023-05-17
Across
- What is the process of converting plain text into ciphertext called?
- What mobile operating system was developed by Google?
- What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
Down
- What technology allows devices to connect to a network without using cables or wires?
- What type of malware is disguised as a legitimate software program?
- What do you call a group of interconnected computers and devices?
- What type of malware is capable of self-replicating and spreading across networks?
- In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?
8 Clues: What mobile operating system was developed by Google? • What do you call a group of interconnected computers and devices? • What type of malware is disguised as a legitimate software program? • What is the process of converting plain text into ciphertext called? • What type of malware is capable of self-replicating and spreading across networks? • ...
English Activity 2021-11-04
Across
- the activity of promoting goods in order to try to sell them
- all the people who are about the same age
- using an electronic system that changes sounds or images into numbers before it stores or sends them
Down
- knowledge, equipment, and methods that are used in science and industrydigital digital
- a worldwide system of computer networks used to exchange information
5 Clues: all the people who are about the same age • the activity of promoting goods in order to try to sell them • a worldwide system of computer networks used to exchange information • knowledge, equipment, and methods that are used in science and industrydigital digital • ...
Networking concept 2 2025-05-23
Across
- connect two networks and make routing decisions — often mistaken for a switch.
- the silent guardian that decides what enters or leaves your network.
- ensure your messages don’t collide on a shared medium; I listen before I speak.
Down
- translate names like “google.com” into IP addresses so computers can understand.
- assign IP addresses dynamically on demand — who am I?
5 Clues: assign IP addresses dynamically on demand — who am I? • the silent guardian that decides what enters or leaves your network. • connect two networks and make routing decisions — often mistaken for a switch. • ensure your messages don’t collide on a shared medium; I listen before I speak. • ...
Beware, Become Cyber Aware! 2025-05-23
Across
- To imitate a legitimate sender’s address in order to trick you.
- The practice of protecting systems, networks, and data from digital threats.
Down
- To imitate a legitimate sender's email address in order to trick the recipient
- What you should do via a different communication channel when in doubt about a suspicious email
- ___________, Don't Delete: Best option for handling suspicious emails
5 Clues: To imitate a legitimate sender’s address in order to trick you. • ___________, Don't Delete: Best option for handling suspicious emails • The practice of protecting systems, networks, and data from digital threats. • To imitate a legitimate sender's email address in order to trick the recipient • ...
Medical Terminology 2021-03-21
Across
- Root word that represents something that you hear with your ears
- Suffix that represents another phrase for bigger than normal
- Root word that represents the largest organ in the body
- Commonly known as a heart attack
- instrument to measure pressure
- Root word that represents something that your body builds when you lift weights
- Vessels that deliver blood to tissues
- test that uses ultrasound to look at the heart and its vessels
- Abbreviation for what you breathe
- Abbreviation for where a doctor completes surgery
- Abbreviation for how fast your heart is beating
- an artery has a weakened wall
- Two layered sac that encloses the heart
Down
- The complete stopping of the heart
- meaning process of recording
- procedure using x-ray dye and a tiny tube called a catheter
- Narrowing in the arteries surrounding the heart
- networks of small vessels that perfuse tissues.
- Abbreviation for where you go when there is a medical emergency
- Suffix that represents what you feel when you get hurt
- a procedure done in a specialized area of radiology
- vessels that return blood to the heart.
- Heart is not efficiently pumping from the left ventricle
- Pumps blood to the rest of the body
24 Clues: meaning process of recording • an artery has a weakened wall • instrument to measure pressure • Commonly known as a heart attack • Abbreviation for what you breathe • The complete stopping of the heart • Pumps blood to the rest of the body • Vessels that deliver blood to tissues • vessels that return blood to the heart. • Two layered sac that encloses the heart • ...
Crossword Puzzle Constitution Unit Crossword 2021-01-07
Across
- a movement that spread the idea that logic could improve society in the 1700s
- laws passed in the colonies to control slaves
- a distant territory belonging to or under the control of a nation
- a shift of political power from the british monarchy to Parliament
- the first permanent English settlement
- a crop that is continuously in demand
- legislative body of government
- a charter of liberties agreed to by King John of England
- founded by Roger Williams and the Puritans
- a political meeting at which people make decisions on local issues
Down
- a colonist who received free passage to North America in exchange for working without pay for a certain number of years
- the colonial representative assembly of Virginia
- originally called New Netherland
- belief in the benefits of profitable trading; commercialism
- a document written by the pilgrims establishing themselves as a political society and setting guidelines for self government
- James Oglethorpe founded this colony to give debtors a new start
- Jamestown was located here
- trading networks in which good and slaves moved among England, the American colonies, and Africa
- founded by William Penn and the Quakers
- a religious movement that swept through the colonies in the 1730s & 1740s
20 Clues: Jamestown was located here • legislative body of government • originally called New Netherland • a crop that is continuously in demand • the first permanent English settlement • founded by William Penn and the Quakers • founded by Roger Williams and the Puritans • laws passed in the colonies to control slaves • the colonial representative assembly of Virginia • ...
Review 2020-04-13
Across
- Factors that need to be considered when calculating the optimal level of stock
- outsourcing outside the home country
- unpredictable event occurs and threatens to harm the organizations and its stakeholders
- Measure of the efficiency of production
- help improve quality BUT still you need to innovate
- Existing transport networks for people and products
- technical development of products or processes
- legal right of the owner of intellectual property
- an innovation so important that it may change the industry itself
- how efficient the facility is
- a natural event such as a flood, earthquake, or hurricane that causes great damage or loss of life.
- is developing responses in advance for various situations that might impact business
Down
- building from many components and building something bigger (TVs, cars)
- an innovation in the use or perception of a new product or service
- buying large quantities of raw material and turning them into smaller end products (paper mills, slaughterhouses)
- occur due to certain acts on the part of workers.
- an unfortunate incident that happens unexpectedly and unintentionally, typically resulting in damage or injury.
- wide system of connected organizations, information, resources, and operations
- granting of a property right by a sovereign authority to an inventor
- The practice of employing another business to perform some peripheral activities
20 Clues: how efficient the facility is • outsourcing outside the home country • Measure of the efficiency of production • technical development of products or processes • occur due to certain acts on the part of workers. • legal right of the owner of intellectual property • help improve quality BUT still you need to innovate • Existing transport networks for people and products • ...
SMAC/JMC INTRAMS 2020-10-15
Across
- connection of networks
- mathematician who wrote "Discourse on Method"
- study of numbers, its properties & operations
- derived from the Greek word nominal and poly
- the owner of "Bing" web search engine
- used as epoxy resins
- stalk of the flower
- relationship bet. two dissimilar beings
- used to measure current in a circuit
- an element common to all acids
- major ingredient of leather
- a science that quantifies reality
- science of directing a craft to its position
Down
- a mineral used in pencils
- device that processes data & converts info
- unit to measure the amplitude of sound
- inter. of species w/c results positive effect
- represents a part of a whole
- destroy vital data & make problems to targets
- a number of times a no. multiplied by itself
- longest side of a right-angled triangle
- a quantity w/c assumes any of a set of values
- deals w/ symbols & rules to manipulate symbol
- part of a flower to which a stalk is attached
- can input graphical images for a computer
- metals w/c forms algams to other metals
- a number in a decimal system
- a force of attraction w/c exists bet.2 masses
- area where plants/animals work together
- study of the universe
30 Clues: stalk of the flower • used as epoxy resins • study of the universe • connection of networks • a mineral used in pencils • major ingredient of leather • represents a part of a whole • a number in a decimal system • an element common to all acids • a science that quantifies reality • used to measure current in a circuit • the owner of "Bing" web search engine • ...
WiFi 2020-11-08
Across
- _____ is handled at the MAC layer
- WiFi stands for wireless_________
- Mode that the device is active in the piconet
- WiFi uses ______ prism architecture
- A wireless network uses ___ waves to transmit signals.
- An added layer of Internet security
- Connect two networks to form a single network at the data-link layer over Wi-Fi.
- Access to the transmission medium is controlled by _________ function.
- Forwards data packets from one network to another
- The adaptation is done at the ______ layer in WiFi
- A low-power-consumption mode
- Devices share their Internet connection using ad-hoc
Down
- Mode that communicate with each other by first going through an Access Point.
- Mode that is no longer a memberof the piconet, but remains synchronized
- The future for Wi-Fi is
- Increasing the number of Wi-Fi access points for a network
- Mode in which the ACL traffic of a device is stopped for a certain period
- Signal sent from a user device to other nearby devices.
- Mode that communicate with each other directly instead of access point
- When a station receives multiple signals on a channel at the same time
- _____uses different techniques (DSSS, CCK, OFDM)
- State that the station cannot either transmit or receive
- The kind of multiplexing WiFi uses
23 Clues: The future for Wi-Fi is • A low-power-consumption mode • _____ is handled at the MAC layer • WiFi stands for wireless_________ • The kind of multiplexing WiFi uses • WiFi uses ______ prism architecture • An added layer of Internet security • Mode that the device is active in the piconet • _____uses different techniques (DSSS, CCK, OFDM) • ...
Journey Inside 2021-11-25
Across
- Temporary computer memory used directly by the CPU.
- 4. Information sent through the networks are broken into small parts.
- The smallest unit of visual information.
- The binary code used to represent letters, numbers, and characters on keyboard.
- A light bulb is an example of a ______ in a circuit.
- The negatively charged particles in an atom.
- Materials that allow the flow of electrons.
- 9. The microprocessor goes three steps to process info, fetch, _______________, and execute.
- The four functions of a computer is input, processing, output, and ___________.
- The number system made up of 0s and 1s.
- Materials that does not conduct electrical current like plastic, rubber, and glass.
- An electronic switch with no moving parts.
Down
- The opposition of the flow of electricity.
- The language used to create web pages.
- The most important part of the computer.
- An output device that outputs sound.
- unit used for small measurements and is equal to .0001 of a centimeter
- The centre of an atom.
- Another term describing a web address.
- The width of the path that data travels through the Internet and affects downloading time.
- A device responsible for directing in a file to the correct location on a network.
- The mother of computer programming
22 Clues: The centre of an atom. • The mother of computer programming • An output device that outputs sound. • The language used to create web pages. • Another term describing a web address. • The number system made up of 0s and 1s. • The most important part of the computer. • The smallest unit of visual information. • The opposition of the flow of electricity. • ...
A-Z of ICT Crossword 2017-06-25
Across
- Online learning tool starting with the letter 'Q'
- A unit of information equal to one sextillion
- A network that connects computers and other devices in a relatively small area
- A collection of physical parts of a computer system
- Examples include Facebook
- A group of computers linked together
- Supplies a device with mechanical of electrical energy
- One of the main search engines
- A type of high speed internet connection.
- A video sharing website
- A unit of information equal to one million bytes
- A mark up language much like HTML
- A software program that infects computers
- Controlled by of connected to a computer
- A object on a computer that stores data, information and settings
Down
- A software developed by Microsoft to allow users to calculate data using a spreadsheet
- A worldwide system of computer networks
- The science of application of knowledge for practical purposes
- A programming language
- A mobile phone that preforms many functions of a computer
- A part of the computer system commonly referred to as the "Brains of a computer
- Random Access Memory
- A panel of keys that operate a computer or typewriter
- Uniform resource locater
- A computer suitable for use at an ordinary 'desk'
- A facility allowing devices to connect to the internet
26 Clues: Random Access Memory • A programming language • A video sharing website • Uniform resource locater • Examples include Facebook • One of the main search engines • A mark up language much like HTML • A group of computers linked together • A worldwide system of computer networks • Controlled by of connected to a computer • A type of high speed internet connection. • ...
Computer Vocabulary 2017-06-21
Across
- graphic representation on a screen of a program, option , or window
- a handheld device that is used to move a cursor on the screen
- flash drive an external flash drive that can be used if it has a USB port
- occurs when a software application stops functioning properly and exits
- a storage space that many files can placed into
- malicious software program
- the primary display screen of a graphical user interface
- device for observing or checking
- System the software that supports a computer’s basic functions
- restart
- collection of physical parts of a computer
Down
- a folder organizing loose articles
- device or program that enables a computer to transmit data
- a computer program that manages access to a central resource
- client software program that runs against a webserver
- distinguishes something that is merely conceptual from something that has physical reality
- practice of sending unwanted email messages
- receive data from a remote system
- an electronic device for storing and processing dataCPU-central processing unit
- a panel of keys that operate a computer
- global system of interconnected computer networks
- Drive storage device containing a read-write mechanism
- information system on the internet that allows the user search and use files
23 Clues: restart • malicious software program • device for observing or checking • receive data from a remote system • a folder organizing loose articles • a panel of keys that operate a computer • collection of physical parts of a computer • practice of sending unwanted email messages • a storage space that many files can placed into • ...
VOCAB REVIEW 2016-02-25
Across
- separate from the drainage basin of another by a imaginary line
- basin: land area that contributes water to a river system
- pattern: commonly encountered drainage pattern
- maximum load
- tangled networks
- level: most streams is global sea level
- when streams diverge from a central area likes pokes from the hub of a wheel
- loop-like bend in a stream channel
- the rate of rainfall exceeds earth's ability to absorb
- maximum particle size
- and corner frequency
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- gen. term for sediment deposited by streams
Down
- load: fine particles suspended in water
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- load: streams carry dissolved substances
- cycle: unending circulation of H2O
- pattern: exhibits many right angle bends
- flat area about level with top of the channel
- absorbed by plants, which the release it into the atmosphere
- slow flow
- process by which liquid water changer into water vapour
- fast flow
- load: course particles move along streambed
- leaping movement of sand
- quantity of water passing by a point on the steamboat
- place where the ground slopes up/down
- bank:river cliff
- bars:arcuate deposit of sand along the in inside of bend
29 Clues: slow flow • fast flow • maximum load • tangled networks • bank:river cliff • and corner frequency • maximum particle size • leaping movement of sand • cycle: unending circulation of H2O • loop-like bend in a stream channel • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
ING1 Company Life 2016-12-06
Across
- a business that is owned or controlled by another larger company
- After a long discussion, they all reached agreement, so the motion was carried ______.
- The English word for "un cadre" is an ________.
- Having lost a lot of money over the last year, they decided to ____ the company.
- the state of being without enough money to pay what you owe
- We need to ____ ____ a policy concerning access to social networks during office hours.
- The French word for "the balance sheet" is le ________.
- The Managing Director is going to _____ next month's AGM.
- English word for "compte-rendu de la réunion"
Down
- the authority that you give to someone to do something for you when you cannot do it yourself
- another term meaning "headquarters"
- French acronym, equivalent to "private limited liability company"
- English word for "actionnaire"
- two-word expression meaning "être introduit en bourse"
- There are eight people on the ____ of Directors.
- the list of points to be discussed at a meeting
- The English word for "un associé" is a _______.
- a skilled person, especially one who makes beautiful things by hand
- person who officially examines the business and financial records of a company
- Let's take a break for now. We'll _____ the meeting at 10.30.
20 Clues: English word for "actionnaire" • another term meaning "headquarters" • English word for "compte-rendu de la réunion" • The English word for "un cadre" is an ________. • the list of points to be discussed at a meeting • The English word for "un associé" is a _______. • There are eight people on the ____ of Directors. • ...
Actividades de ocio 2019-04-25
Across
- (to) rest/relax at home
- yoga (to) practice yoga
- (to) gossip
- un museo (to) visit/go to a museum
- (to) surf the internet/web
- (to) swim
- (to) dance
- (to) organize; arrange; put in order
- to drive (a vehicle)
- (to) pray
- (to) sing
- (to) travel
- (to) watch movies
- (to) do the shopping
- (to) sleep
- (to) draw, sketch
- (to) go out with friends
- (to) show
- (to) use social media/networks
- (to) clean
- (to) take photos
- (to) eat
- (to) go camping
- (to) take care of
- la guitarra (to) play the guitar
Down
- un instrumento (to) play an instrument
- (to) ski
- (to) chat with friends
- (to) do homework
- (to) learn
- (to) talk on the phone
- (to) joke around
- (to) dine in restaurants
- (to) demonstrate, protest
- (to) text (someone)
- (to) paint
- (to) lift weights
- (to) exercise
- (to) take a hike
- (to) run
- en monopatín (to) skateboard
- (to) meditate; (to) contemplate
- (to) cook
- (to) window shop
- (to) act in a play
- (to) walk
- (to) recycle
- (to) attend
- to study
- free time/spare time
- (to) sunbathe, tan
- (to) help/assist people
52 Clues: (to) ski • (to) run • to study • (to) eat • (to) swim • (to) cook • (to) pray • (to) sing • (to) walk • (to) show • (to) learn • (to) paint • (to) dance • (to) sleep • (to) clean • (to) gossip • (to) travel • (to) attend • (to) recycle • (to) exercise • (to) go camping • (to) do homework • (to) joke around • (to) take a hike • (to) window shop • (to) take photos • (to) lift weights • (to) watch movies • (to) draw, sketch • ...
FITCvocab.GJK 2013-05-15
Across
- Flat disc used to store data
- one page document about your life
- protection of info. on the Internet
- Serves information to other computers
- 1000 bytes
- a slot where you can put head phones
- Internet/Online
- internet rules to keep you safe
- An official catch phrase of a company or brand
- Stands for ISP
- who is asking? what are they asking? Why do they want it?
- 1000 kilobytes
- Slots for hardware
- for connecting keyboards and mouses
- don't plagiarize
- Service set identification name signed to wifi networks
Down
- Data stored in a computers memory
- EX.headphones
- 1000 Gigabytes
- Stands for CPU
- Official picture of a company
- Piece of written matter
- Long term memory
- Search engine that take you to other search engines
- Selection of editing tools
- Stands for RAM
- front of the program
- rich text format
- Smallest piece of information
- Visual display used in devices
- DSL,Cable
- protect users form people phising
- program stored on internet servers
- No wire
- EX.mouse
- how you act online
- The second smallest device that stores information(8 Bits)
- 1000 megabytes
- Wireless Fidelity
- one canvas you can put anything on
- Document
41 Clues: No wire • EX.mouse • Document • DSL,Cable • 1000 bytes • EX.headphones • 1000 Gigabytes • Stands for CPU • Stands for RAM • Stands for ISP • 1000 kilobytes • 1000 megabytes • Internet/Online • Long term memory • rich text format • don't plagiarize • Wireless Fidelity • how you act online • Slots for hardware • front of the program • Piece of written matter • Selection of editing tools • ...
hs web definitions 2013-09-03
Across
- Short for "Web Log," this term refers to a list of journal entries posted on a Web page.
- a mobile phone that includes advanced functionality beyond making phone calls and sending text messages.
- World Wide Web
- media a collection of Internet-based communities that allow users to interact with each other online.
- used to verify that a human, rather than a computer,
- "computer screen"
- the primary user interface of a computer. When you boot up your computer
- spreads across the globe and consists of countless networks and computers
- The term computer file management refers to the manipulation of documents and data in files on a computer.
- An instance of a relief pitcher saving a game.
- Uniform (or universal) resource locator, the address of a World Wide Web page.
Down
- The mouse
- is the program people use to access the World Wide Web
- a marker for a Web site
- Google, Excite, Lycos, AltaVista, Infoseek, and Yahoo are all ?
- Short for "Wireless Fidelity
- Information Communication Technology
- address In computing, a Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies where an identified resource is...
- is the embodiment of a person or idea.
- junk e-mail or irrelevant postings to a newsgroup or bulletin board.
20 Clues: The mouse • World Wide Web • "computer screen" • a marker for a Web site • Short for "Wireless Fidelity • Information Communication Technology • is the embodiment of a person or idea. • An instance of a relief pitcher saving a game. • used to verify that a human, rather than a computer, • is the program people use to access the World Wide Web • ...
BoB's crossword, the most useful crossword of all time !! 2015-09-20
Across
- has more turns on the secondary coil and so it increases voltage
- where current splits or join in a circuit
- the high-pressure steam is forced through a turbine making it turn
- a path for electrical charge to pass through
- things that uses electromagnets in a door bell
- instrument to measure the flow of electricity
- an electric current that always flows in one direction
- electricity is transported across the country by vast networks of pylons
- when electricity is passed through a coil of wire, the coil has a magnetic field around it
- the region around a magnet where it has a magnetic effect
- stored energy
- unit of energy
Down
- fossil fuels are burnt to heat and water
- an electric current that is constantly changing direction
- a safety device that protects an electric cable from overheating so that the insulation doesn't catch fire
- when energy spreads out into the surroundings
- the rate at which an electrical appliance uses electrical energy
- has fewer turns on the secondary coil and so decreases voltage
- can be used to change the voltage of AC
- joules per second
- the turbine is attached to a generator which turns to generate electricity
- how good a device is at changing energy from one form to another
22 Clues: stored energy • unit of energy • joules per second • can be used to change the voltage of AC • fossil fuels are burnt to heat and water • where current splits or join in a circuit • a path for electrical charge to pass through • when energy spreads out into the surroundings • instrument to measure the flow of electricity • things that uses electromagnets in a door bell • ...
Programming 2015-01-21
Across
- performs logical and arithmetical operations on the data as specified in the instructions
- A global system of interconnected computer networks
- software that manages computer hardware and software resources and provides common services for computer programs
- A type of software that is used for programming
- allows data items to be read and written in roughly the same amount of time
- represents numeric values using two different symbols
- A programming environment made by microsoft
- a diagrammatic representation of an algorithm
- What is used to browse the internet
- a character-encoding scheme, Originally based on the English alphabet
- a positional numeral system with a radix
- A widely used general-purpose, high-level programming language
- What you write programming statements with
Down
- intended for human reading rather than machine reading
- Display device used for computers
- The other inventor of the world wide web
- One of the two inventors of the world wide web
- a system of interlinked hypertext documents that are accessed via the Internet
- the set of well defined instruction in sequence to solve a program
- a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user
- The company that buit .net framework
21 Clues: Display device used for computers • What is used to browse the internet • The company that buit .net framework • The other inventor of the world wide web • a positional numeral system with a radix • What you write programming statements with • A programming environment made by microsoft • a diagrammatic representation of an algorithm • ...
Internet Citation Terms 2016-09-05
Across
- If I electronically send you a letter that is called ___.
- If I am speaking internet language, I would use the term ____ instead of period for this symbol (.)
- The first page a visitor will encounter on a web site is called the _________page.
- www is the most common
- Google is an example of a _____.
- .edu
- personal website where you record opinions
- .gov
- .net
- used to mark a website so you can look at it later.
- If I am on a website and then I “jump” to another website, I have probably selected a _____.
- use of convincing-looking emails to lure you into typing your account numbers and passwords.
Down
- .mil
- kind of tracking number assigned to computers and phones
- Addresses on the internet have different results depending on whether the letters are capital or lower case. This is called ___
- .com
- The domain of a URL is usually only ___ letters long
- If I lived on the internet, my address would be called a
- malicious software
- If I were to take the file cabinets in this room and put them on the computer, they would become a ______.
- .org
- allows collaborative editing of its content and structure by its users.
22 Clues: .mil • .com • .edu • .org • .gov • .net • malicious software • www is the most common • Google is an example of a _____. • personal website where you record opinions • used to mark a website so you can look at it later. • The domain of a URL is usually only ___ letters long • kind of tracking number assigned to computers and phones • ...
Medical Terminology 2024-04-27
Across
- / records the hearts electrical activity
- / damage in the heart major blood vessels
- attack / happens when part of the heart is blocked by a blood clot
- / one of the meaning of the heart
- / A device placed in the body connected to the heart to help control the rhythm
- / network tubes of where the blood is pumped through the body
- / vessels that deliver blood to tissues
- / largest artery in the body
- / strong tissue that protects bones and joints
- / Gives a picture of the heart using a ultrasound
- / vessels that return blood to the heart
- / condition when irregularities in heartbeat
Down
- / condition when narrow blood vessels reduce or block blood flow to the limbs
- MRI / uses radio waves, magnets, and computer to create a picture
- Failure / condition where the heart don't pump blood right
- angiogram / used to examine coronary arteries supplying blood to heart muscle
- / an interruption in the flow of blood to cells in the brain
- / transport fluid to and from every organ in the body
- / networks of small vessels that perfuse tissues
- / temporary blockage of blood flow to the brain
- scan / detailed pictures of the heart
- / pumps blood through your body
- / carry oxygen and blood to and from your heart
- blood pressure / condition of pressure of the blood is too high
- / Damage from the brain stop its blood supply
25 Clues: / largest artery in the body • / pumps blood through your body • / one of the meaning of the heart • scan / detailed pictures of the heart • / vessels that deliver blood to tissues • / records the hearts electrical activity • / vessels that return blood to the heart • / damage in the heart major blood vessels • / condition when irregularities in heartbeat • ...
social media 2024-04-05
Across
- reinforcing behavior
- A uncontrollable behavior
- division into two sharply contrasting groups or sets of opinions or beliefs
- good feeling after a pleasant experience
- a set of rules and signals that rank content on a social platform
- a difficult situation or problem
- relating to or deriving from psychometry or psychometrics
- comedy series
- Comparing two versions of a webpage or app
- impossible to perceive
- field of study in artificial intelligence concerned with the development and study of statistical algorithms
- Using creative, low cost strategies to help companies get customers
- not true
- Profit-making incentive, and arose as advertising companies
- critical point in a situation, process, or system beyond which a significant and often unstoppable
- how people are interacting with your social media accounts and content
Down
- morally bad
- emotions expressed by friends, via online social networks, influence our own moods
- a person who is a member of a group, organization, society, etc
- Process or set or rules
- Attention,Interest,Desire(or, in some variations, Decision) and Action
- Technique that loads more content and allows the user to view more content
- Branch on knowledge that deals with moral principles
- branch of computer science
- person who uses or operates something, especially a computer or other machine.
25 Clues: not true • morally bad • comedy series • reinforcing behavior • impossible to perceive • Process or set or rules • A uncontrollable behavior • branch of computer science • a difficult situation or problem • good feeling after a pleasant experience • Comparing two versions of a webpage or app • Branch on knowledge that deals with moral principles • ...
monoploy 2024-10-12
Across
- Lightweight process
- Topology where each device connects to a central hub
- Java feature to close resources automatically
- Constants in C++ are also known as
- Protocol for assigning IP addresses dynamically
- Device that forwards data between networks
- Class to compile regular expressions in Java
- Protocol ensuring reliable data transmission
- Delay in data transmission
- Committee standardizing C language
- Procedure for switching between processes
- Fundamental unit of data transfer in a network
- Stores data in a swap file on hard drive
- Command to send signals in UNIX
- OS that reads and reacts to actual time
- Data type that stores different types in the same memory location
Down
- Device that prevents unauthorized network access
- OOP concept where a class derives from another
- Most optimal CPU scheduling algorithm
- Process of moving data between main memory and disk
- Data structure used for recursion in C
- Scheduling command in UNIX
- List of processes prepared to execute in OS
- Command interpreter in UNIX
- Keyword that preserves variable value across function calls
- Empty pointer in C
- Function to copy memory blocks in C
- Keyword for a variable that may change at any time
- Concept converting real-world objects into class
- A variable storing memory address in C
30 Clues: Empty pointer in C • Lightweight process • Scheduling command in UNIX • Delay in data transmission • Command interpreter in UNIX • Command to send signals in UNIX • Constants in C++ are also known as • Committee standardizing C language • Function to copy memory blocks in C • Most optimal CPU scheduling algorithm • Data structure used for recursion in C • ...
PuzzlE 2023-06-06
Across
- Part of the computer system that one can physically touch
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- A programming language known for its use in web development
- A collection of information stored and accessed electronically
- Graphics processing unit
- Coding language developed at MIT designed to teach programming concepts to children
- A popular open-source relational database
- High-level programming language known for its simple syntax
- Central Processing Unit
Down
- Programming language developed by Sun Microsystems, now owned by Oracle
- Measure of CPU speed
- A service offered by Google that allows you to store and share files online
- A worldwide network of interconnected networks and computers
- Number system used in digital electronics and computer programming
- Refers to software that is used to protect your computer against unwanted intrusions
- Personal Computer
- Temporary storage in computer where it holds data that CPU uses
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- The technology that allows for wireless communication between devices over short distances
- Cloud computing platform and API offered by Amazon
- Part of the computer where most calculations take place
- Apple's mobile operating system
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
WWI Crossword 2022-05-12
Across
- country that received Zimmermann note
- fighting between Gremans and Russians happened
- plan to win
- fire weapon, used in trenches
- type of warfare with networks
- dropping bombs on important places
- battle to stop advances in Germany
- treaty from Russia to Germany
- handheld weapon used in trenches
- first aircraft used
- big vehicles combating trench warfare
- a chemical warfare
- who replaced men in factories
- goods needed for war
- one of the first countries to surrender
- note from Germans to Mexico
- first US marines in WWI combat
- french plan to retake
Down
- only country/continent involved
- who went to war
- weapon/warfare used to sink any ship
- where most of the fighting happened
- word for deaths
- continent where fighting was in Egypt
- when a country leaves the war peacefully
- to strongly go against
- battle for German to frighten French
- Big Push battle
- German submarine
- person who offered truce to Germany
- country where Woodrow Wilson lived
- when all resources are devoted to war
- popular way to recruit
- first full scale offensive battle with tanks
- he stepped down of revolt in Germany
- nations pride
- longest battle
- land between opposing sides
- first war that included use of planes
39 Clues: plan to win • nations pride • longest battle • who went to war • word for deaths • Big Push battle • German submarine • a chemical warfare • first aircraft used • goods needed for war • french plan to retake • to strongly go against • popular way to recruit • note from Germans to Mexico • land between opposing sides • fire weapon, used in trenches • type of warfare with networks • ...
separation The first clause in the Bill of Rights states assures this between church and state. 2023-06-02
Across
- Frank ______,commander of the Apollo 8 mission.
- Saint who said, "You have made us for yourself O Lord, and our heart is restless until it rests in you."
- Travis Jackson's interview with NASA took place at this historic venue.
- Connor Jordan built these for his Eagle Scout project
- Charles ______, only Catholic signer of the Declaration of Independence.
- Worn by early ascetics, a form of self punishment.
- Travis Jackson witnessed almost all of these space missions.
- Saint born in 1195 in Lisbon, Portugal.
- The Desert Mothers developed early networks of women that emerged as early forms of these.
- "Our Faith can move ______." Matthew 17:20
- kept away from the outside world, as in a monastery.
- Birthplace of the St. Francis.
Down
- Italian countryside and popular travel destination.
- An exotic ice cream flavor popular in Belize.
- University where Tom Hubert was a student.
- The first clause in the Bill of Rights assures this between church and state.
- Jack ______, former deacon of St. Michael's.
- St. Michael's makes a yearly mission trip here.
- The final prayer of the day.
- Latin for mother.
- a mental state achieved by focusing one's awareness on the present moment.
- The rope that girds the waist of Franciscan monks has three of these.
- David Nichols dream boat.
23 Clues: Latin for mother. • David Nichols dream boat. • The final prayer of the day. • Birthplace of the St. Francis. • Saint born in 1195 in Lisbon, Portugal. • University where Tom Hubert was a student. • "Our Faith can move ______." Matthew 17:20 • Jack ______, former deacon of St. Michael's. • An exotic ice cream flavor popular in Belize. • ...
END VIOLENCE AGAINST CHILDREN 2024-11-25
Across
- Violence can severely impact a child’s physical and mental ___
- The United Nations agency working for child protection and development
- Therapy provided to children who have experienced violence
- Governments must enforce ___ to protect children from harm
- Strong ___ networks can help protect children from abuse
- Measures taken to stop violence before it occurs
- The use of children in armed conflict
- Failure to meet a child’s basic needs like food and shelter
- A child's well-being
Down
- a form of non-physical abuse that affects a child's well-being
- Speaking out and taking action to protect children's rights
- The act of intentionally causing physical harm to a child
- Access to ___ can empower children and reduce vulnerability to violence
- Repeated aggressive behavior intended to harm a child physically or emotionally
- Corporal ___ is a harmful practice that can lead to abuse
- Children have the right to ___ from violence and abuse
- Promoting gender ___ helps reduce violence against girls
- Offering ___ to victims of violence can aid their recovery
- A condition that increases the risk of violence against children
- Raising ___ about child protection issues helps prevent abuse
- Teaching children their ___ can empower them to report abuse
- Emotional and psychological damage caused by abuse or violence
- A form of abuse where children are used for labor
23 Clues: A child's well-being • The use of children in armed conflict • Measures taken to stop violence before it occurs • A form of abuse where children are used for labor • Children have the right to ___ from violence and abuse • Promoting gender ___ helps reduce violence against girls • Strong ___ networks can help protect children from abuse • ...
UNIT 5 CROSSWORD 2025-04-29
Across
- Neural networks for advanced AI tasks
- AI learns from rewards and penalties
- Conversational AI chatbot by OpenAI
- Reduces human error in decisions
- Converts spoken language to text
- Natural Language Processing
- Python library for data visualization
- Google's multimodal AI model
- AI that creates text, images, or videos
- Allows tuning of AI models for specific needs
- Tools usable from anywhere via cloud
- Reduces human effort in repetitive tasks
- Tensor Processing Unit used in Google AI
- AI-powered content generation tool
- Automate customer service interactions
- Reinforcement Learning from Human Feedback
- Running apps and storing data online
Down
- Ability to handle large data and computations
- Identifying unusual patterns in data
- High-level API for building TensorFlow models
- Computer vision and image processing library
- Suggests items based on user behavior
- Cloud-based Jupyter notebook platform
- AI that runs on local devices without cloud
- Gaining insights from data using AI
- Deep learning framework developed by Meta
- Forecasting future trends using data
- Making data easier to understand using plots
- Extremely large data sets analyzed by AI
- Statistical data visualization library based on Matplotlib
- Open-source machine learning framework by Google
- Structure used in deep learning models
32 Clues: Natural Language Processing • Google's multimodal AI model • Reduces human error in decisions • Converts spoken language to text • AI-powered content generation tool • Conversational AI chatbot by OpenAI • Gaining insights from data using AI • Identifying unusual patterns in data • AI learns from rewards and penalties • Forecasting future trends using data • ...
Empires Crossword 2025-08-13
Across
- Major African export in regional and global trade networks.
- Southern African kingdom with strong indigenous traditions.
- Policy of limiting foreign contact and influence.
- Forced transport of enslaved Africans to the Americas.
- West African empire controlling trans-Saharan trade routes.
- Songhai city and center of trade and Islamic scholarship.
- Valued African export traded with Europe and Asia.
- Caravan trade route exchanging gold, salt, and goods.
- Powerful West African empire active in the Transatlantic Slave Trade.
- Religion founded in Punjab that challenged Mughal authority.
- East African trade network linking Africa, Arabia, and Asia.
- Central African kingdom that adopted Christianity.
- Muslim-ruled states in southern India before Mughal dominance.
Down
- Branch of Christianity practiced in Ethiopia.
- Coastal outposts in Africa and Asia for European trade.
- Warrior class of feudal Japan.
- Japanese military government enforcing a closed-country policy.
- Manchu-led dynasty, China’s last imperial house.
- Overland trade network connecting East Asia to the Mediterranean.
- Chinese dynasty known for expansion, trade, and cultural achievements.
- Belief system that attributes spiritual essence to natural objects.
- Indian empire blending Islamic and Hindu traditions.
- Islamic empire spanning Europe, Asia, and Africa, lasting into the 20th century.
- Songhai ruler who promoted Islam and expanded the empire.
- Military ruler of Japan with real political power.
25 Clues: Warrior class of feudal Japan. • Branch of Christianity practiced in Ethiopia. • Manchu-led dynasty, China’s last imperial house. • Policy of limiting foreign contact and influence. • Valued African export traded with Europe and Asia. • Military ruler of Japan with real political power. • Central African kingdom that adopted Christianity. • ...
COMPUTER 2025-01-13
Across
- Writing instructions that a computer can execute.
- Related to systems that run computer hardware.
- A global network of interconnected computers.
- Measures to protect computers and networks from attacks.
- The process of finding and fixing errors in code.
- A boundary for interaction between systems or humans and computers.
- An input device used to type text into a computer.
- A step-by-step procedure to solve a specific problem.
- The component that executes instructions in a computer.
- Connecting computers to share resources and information.
- Hardware that interacts with a computer, like printers or scanners.
Down
- Devices or media where digital data is saved.
- Related to non-natural intelligence developed by humans.
- Creating a virtual version of hardware, software, or resources.
- Programs and operating information used by a computer.
- A system designed to block unauthorized access to a network.
- A collection of organized data stored electronically.
- The physical components of a computer system.
- The process of converting data into a secure format.
- Software that converts code into machine language.
- Visual data generated and displayed by a computer.
- Hardware that stores data temporarily or permanently.
- A combination of hardware and software working together.
- The ability of machines to mimic human cognitive functions.
24 Clues: Devices or media where digital data is saved. • A global network of interconnected computers. • The physical components of a computer system. • Related to systems that run computer hardware. • Writing instructions that a computer can execute. • The process of finding and fixing errors in code. • Software that converts code into machine language. • ...
Security Crossword 2025-01-23
Across
- The process of managing updates for software applications and technologies.
- Intermediary server for network requests.
- Unauthorized data access incident.
- A firewall that monitors and filters traffic between a web application and the internet.
- Attempt to obtain sensitive information.
- Testing a system for vulnerabilities by simulating attacks.
- Algorithm for performing encryption or decryption.
- A collection of tools used by an attacker to maintain access to a system while hiding their presence.
- Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
- Measures taken to protect the integrity and usability of networks.
- Running programs in a controlled environment to prevent them from affecting the host system.
- A formal document outlining how security measures are implemented within an organization.
- Protection measures applied to end-user devices like computers and mobile devices.
- A framework for managing digital certificates and public-key encryption.
- A systematic evaluation of the security of a company’s information system.
- An entity that issues digital certificates for secure communications.
- Protocol for establishing an encrypted link between a server and a client.
- Permissions granted to users regarding what they can do with resources on a system.
- A type of malware that replicates itself to spread to other computers without user intervention.
- Software that secretly collects user information.
20 Clues: Unauthorized data access incident. • Attempt to obtain sensitive information. • Intermediary server for network requests. • Software that secretly collects user information. • Algorithm for performing encryption or decryption. • Testing a system for vulnerabilities by simulating attacks. • Measures taken to protect the integrity and usability of networks. • ...
Unit 3 Vocab - On Track 2025-01-13
Across
- - Happening right away or very quickly.
- - Feeling very worried or in trouble, willing to do anything.
- - In the middle or halfway.
- - To go away or not be seen anymore.
- - Held tightly in place.
- - Words or actions that warn of harm or danger.
- - Locked up in prison.
- - Real, legal, or following the rules.
- - Facts or details about something.
- - A very smart or talented person.
- - To think again and maybe change your mind.
- - Fun or exciting experiences, sometimes risky.
- - So full that it spills over.
- - Special glasses to protect your eyes.
- - A secret word or code to open or use something.
Down
- - A deep understanding of something.
- - Not known or familiar.
- - Followed or found where something came from.
- - A planned activity or task.
- - A tool or machine made for a specific purpose.
- - To give something to help others.
- - To talk or work with other people.
- - Half awake and half asleep.
- - Breaking into computers or networks without permission.
- - An animal or person that hunts or hurts others.
- - Checking to make sure something is correct.
- - Being free from danger or harm.
- - Paying close attention to one thing.
- - Paying attention to avoid mistakes or harm.
29 Clues: - Locked up in prison. • - Not known or familiar. • - Held tightly in place. • - In the middle or halfway. • - A planned activity or task. • - Half awake and half asleep. • - So full that it spills over. • - Being free from danger or harm. • - A very smart or talented person. • - To give something to help others. • - Facts or details about something. • ...
ASEANAPOL Crossword Puzzle 2025-09-22
Across
- : The act of working together toward a common goal
- : Fundamental entitlements and freedoms of people
- : Working jointly, especially by sharing information or resources
- : Information especially secret or confidential used for strategic purposes
- : Crime that crosses digital networks
- : Formal agreement or rules governing behavior
- : International police organization
- : Association of Southeast Asian Nations
- : An area or part of the world
- : Countries that belong to a group
- : Capital city where many ASEANAPOL meetings are held
- : Teaching or preparing members in skills or knowledge
- : The carrying out of planned tasks or missions
- : Efforts to stop acts of terror
- : Official inquiries or probes
- : The action of transporting illegal goods or people
- : The legal authority to make decisions or judgments
Down
- : Material proof presented in legal cases
- : Abbreviation for ASEAN Police — ASEAN____
- : The systematic process of gathering, documenting, and using data in investigations
- : Illegally importing or exporting goods
- : State of being free from danger or threats
- : Relating to boundaries between countries
- : Efforts to stop bad things before they happen
- : A planned set of actions toward achieving something
- : Illegal drug production, distribution, or use
- : Across multiple nations
- : Ability, skills, or resources that allow action
- : Crime involving money-based wrongdoing
- : Large-scale criminal enterprises (plural)
30 Clues: : Across multiple nations • : An area or part of the world • : Official inquiries or probes • : Efforts to stop acts of terror • : Countries that belong to a group • : International police organization • : Crime that crosses digital networks • : Illegally importing or exporting goods • : Association of Southeast Asian Nations • : Crime involving money-based wrongdoing • ...
WWI Terms 2025-10-17
Across
- this was the assassin who killed the Austrian archduke
- strong level of patriotism
- the US president at the start of WWI
- calling young men into service (first used in 1917 for US troops)
- most of the fighting took place in these
- the development of and ramping up of weapons and troops
- a place that people could grow food to help the war effort
- _____________ note - a telegram sent by Germany to Mexico
- Britain, France, and Russia (and later the US) in WWI
- a piece of legislation that made it illegal to speak against the government or the War
Down
- these networks directly contributed to the start of WWI because countries were connected
- the British ocean liner sunk by German U-boats
- biased communication to the public
- the country that Germany went through to get to France
- a new weapon in WWI used to move troops and get over trenches
- chemical used in Europe in the trenches
- this man was assassinated and it sparked WWI
- a system that ensured people got enough food at home during the war
- large-scale movement or hundreds of thousands of southern African Americans to cities in the North.
- the system of empire and colonialism
- Germany, Austria-Hungary, and the Ottoman Empire
21 Clues: strong level of patriotism • biased communication to the public • the US president at the start of WWI • the system of empire and colonialism • chemical used in Europe in the trenches • most of the fighting took place in these • this man was assassinated and it sparked WWI • the British ocean liner sunk by German U-boats • Germany, Austria-Hungary, and the Ottoman Empire • ...
Putting It All Together 2025-12-19
Across
- | Strong networks of people who help reduce relapse risk
- | DBT skill focused on awareness
- | The body and this are interconnected
- | Exercise releases this natural brain chemical
- | Skill that involves fully hearing others
- | The brain’s ability to heal and rewire itself
- | Brain’s pleasure pathway altered by substances
- | Cravings rise and fall like these
- | Brain area responsible for decision-making and impulse control
- | Healthy relationships are built on trust, safety, and this
- | A sense of purpose or direction in life
- | Clear limits that protect recovery
- | Building a life worth protecting is the goal of this process
- | Communication style that is confident and respectful
Down
- | Macronutrient that supports brain repair
- | Long-term drive that values provide for recovery
- | Strong urges to use that come and go
- | Emotions are data, not these
- | Noticing without this is a DBT skill
- | Repairing relationships requires time and this
- | People, places, or things that activate old patterns
- | Balanced meals help stabilize mood and energy
- | These guide decisions and habits
- | Dehydration can feel like this or irritability
- | Recovery is more than stopping this
- | Brain system tied to emotions and survival
- | Risk that increases when supports are missing
- | Many people ask, “Who am I without substances?” This concept
- | This restores emotional regulation
29 Clues: | Emotions are data, not these • | DBT skill focused on awareness • | These guide decisions and habits • | Cravings rise and fall like these • | This restores emotional regulation • | Clear limits that protect recovery • | Recovery is more than stopping this • | Strong urges to use that come and go • | The body and this are interconnected • ...
Ethan Crossword 2025-12-08
Across
- : A security system that filters network traffic
- : A small unit of data sent across a network
- : A value passed into a function to customize its behavior
- : An error that occurs when a value exceeds the maximum amount storable
- : The quality, accuracy, trustworthiness, and reliability of data
- : A data type with only two values, true or false
- : A set of rules governing how data is transmitted on a network
- : Compression that reduces file size without losing any data
Down
- : A group of infected computers controlled by an attacker
- : A step-by-step procedure for solving a problem
- : A number system using only 0s and 1s
- : A 32-bit numerical addressing system for devices on the Internet
- : A tiny electronic switch used to represent bits in a computer
- : A character encoding system that represents text using numeric codes
- : The repeated execution of a set of instructions
- : The idea that transistor counts roughly double every two years
- : The maximum amount of data transferable per second
- : The delay it takes for data to travel over a network
- : A device that directs data packets between networks
- : Compression that removes some data to make a file smaller
- : A scam that tricks users into revealing personal information
21 Clues: : A number system using only 0s and 1s • : A small unit of data sent across a network • : A step-by-step procedure for solving a problem • : A security system that filters network traffic • : The repeated execution of a set of instructions • : A data type with only two values, true or false • : The maximum amount of data transferable per second • ...
Basics of Health Insurance 2020-12-10
Across
- A health insurance plan that provides integrated care and a potential for lower costs, but limits coverage to in-network providers.
- An upfront fee for insurance coverage.
- The official process of signing up for health insurance.
- Proof of insurance.
- The different types of health insurance options, made up of networks and benefits.
- A group of providers who have chosen to contract with the insurance company.
- The portion of medical and hospital expenses that are covered by insurance.
Down
- Amount a member is responsible for before insurance begins paying for health services.
- A contract or special arrangement in which a person pays a company to provide some sort of protection or reimbursement for monies paid or lost in regard to healthcare.
- The percentage of a bill a member must pay after the deductible is satisfied.
- A person or company that provides a healthcare service to individuals.
- A government sponsored health insurance plan that provides comprehensive coverage but has an age or disability requirement.
- Flat fee a member pays for medical services.
13 Clues: Proof of insurance. • An upfront fee for insurance coverage. • Flat fee a member pays for medical services. • The official process of signing up for health insurance. • A person or company that provides a healthcare service to individuals. • The portion of medical and hospital expenses that are covered by insurance. • ...
Business 4.1 2022-10-04
Across
- measure of quality of life using factors like life expectancy, literacy, access to clean water, income, etc.
- GDP divided by population
- Acronym for emerging economies including India
- The percentage of a country's people who can read and write
- the total market value of all final goods and services produced in an economy over a specific period of time
- Acronym for emerging economies including Indonesia
- electricity supply, rail/road networks & waste disposal facilities
- A good or service produced in the home country and sold in another country.
Down
- Value of each country's GDP is altered to take account of differences in the cost of living
- An investment into a country by a company from another country.
- Nations with business activity in the process of rapid growth and industrialization
- bring (goods or services) into a country from abroad for sale.
- dishonest or fraudulent conduct by those in power, typically involving bribery.
13 Clues: GDP divided by population • Acronym for emerging economies including India • Acronym for emerging economies including Indonesia • The percentage of a country's people who can read and write • bring (goods or services) into a country from abroad for sale. • An investment into a country by a company from another country. • ...
