networks Crossword Puzzles
Key Internet Terms 2020-09-10
Across
- Unsolicited messages sent to large numbers of people via email for the purpose of commercial advertising or non commercial info
- A programming language used to create a web page and it stands for hypertext markup language
- An example of a web browser
- A set of documents on the Internet formatted in HTML
- An Internet service used to send and receive electronic letters
- one or more web pages that relate to a common theme, such as a person, business, organization or a subject, such as sports
Down
- An example of a search engine
- Sound, video, animation and 3D interactive video put together
- A program that is used to view web pages on the World Wide Web
- an electronic document written in a computer language called HTML (Hypertext Markup Language
- the address of a specific web site or file on the Internet that stands for Uniform Resource Locator
- A global system of interconnected computer networks
- A short term for internet service provider like xfinity,Verizon FIOS, Spectrum
13 Clues: An example of a web browser • An example of a search engine • A global system of interconnected computer networks • A set of documents on the Internet formatted in HTML • Sound, video, animation and 3D interactive video put together • A program that is used to view web pages on the World Wide Web • An Internet service used to send and receive electronic letters • ...
Basic Internet Terms 2020-09-10
Across
- Unsolicited messages sent to large numbers of people via email for the purpose of commercial advertising or non commercial info
- A programming language used to create a web page and it stands for hypertext markup language
- An example of a web browser
- A set of documents on the Internet formatted in HTML
- An Internet service used to send and receive electronic letters
- one or more web pages that relate to a common theme, such as a person, business, organization or a subject, such as sports
Down
- An example of a search engine
- Sound, video, animation and 3D interactive video put together
- A program that is used to view web pages on the World Wide Web
- an electronic document written in a computer language called HTML (Hypertext Markup Language
- the address of a specific web site or file on the Internet that stands for Uniform Resource Locator
- A global system of interconnected computer networks
- A short term for internet service provider like xfinity,Verizon FIOS, Spectrum
13 Clues: An example of a web browser • An example of a search engine • A global system of interconnected computer networks • A set of documents on the Internet formatted in HTML • Sound, video, animation and 3D interactive video put together • A program that is used to view web pages on the World Wide Web • An Internet service used to send and receive electronic letters • ...
CS Principles Review 2023-04-26
Across
- it is the maximum amount of data that can be sent in a fixed amount of time.
- a form of compression which removes all subtle colour variations
- process of finding a path from sender to receiver
- data about data
- a wireless access point that gives unauthorized access to secure networks(three words no spaces)
- a solution which is good enough
- why a certain thing or product was made
Down
- scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who Contribute relevant data to research using their own computing devices.(two words no spaces)
- the use of digital data to approximate real world things
- contain a chunk of data and _metadata__ used for routing the packet between the origin and the destination
- data have values that change smoothly, rather than in discrete intervals, over time.
- agreed-upon set of rules that specify the behavior of a system
- what something does
13 Clues: data about data • what something does • a solution which is good enough • why a certain thing or product was made • process of finding a path from sender to receiver • the use of digital data to approximate real world things • agreed-upon set of rules that specify the behavior of a system • a form of compression which removes all subtle colour variations • ...
Family 2024-10-14
Across
- living together in an intimate relationship without formal legal or religious sanctioning
- kin networks that extend outside or beyond the nuclear family
- familial form consisting of a father, a mother, and their children
- women's responsibility for housework and child care- everything from cooking dinner to doing laundry, bathing children, reading bedtime stories, and sewing Halloween costumes.
- marriage to someone outside one's social group
- the practice of having multiple husbands simultaneously
- marriage from within
- the practice of having multiple wives simultaneously
Down
- the notion that true womanhood centers on domestic responsibility and child-rearing
- the technical term for interracial marriage, literally meaning "a mixing of kinds"; it is politically and historically charged, and sociologists generally prefer the term exogamy or outmarriage.
- strings of relationships between people related by blood and co-residence (i.e., marriage)
- the practice of having more than one sexual partner or spouse at a time
- the practice of having only one sexual partner or spouse at a time
13 Clues: marriage from within • marriage to someone outside one's social group • the practice of having multiple wives simultaneously • the practice of having multiple husbands simultaneously • kin networks that extend outside or beyond the nuclear family • familial form consisting of a father, a mother, and their children • ...
Group and formal organization crossword 2025-09-25
Across
- one person does something for another, expects favor in return
- and predictability
- individuals forced to give in to the will of others; often expressed subtly through social pressure
- very efficient with dealing with the needs of industrial societies; promotion based on merit; cost efficient;
- help us evaluate ourselves and form identities; don’t necessarily have to be a member, only aspire to become member
- group toward which in-group members feel opposition, antagonism, or competition
Down
- Groups within a formal organization in which people are guided by norms and rituals
- individuals work against one another for larger share of rewards
- behavior that matches group expectations; allows for uniformity,
- difficulty of going against the decisions made by the group; exists when thinking in a group is self-deceptive; based on conformity to group beliefs; discourages members from expressing concern
- impersonal, people are treated like a number
- How much can you learn about someone just by identifying the groups and social networks they belong to?
- Composed of people who are close
- one person does something for another, expects favor in return
14 Clues: and predictability • Composed of people who are close • impersonal, people are treated like a number • one person does something for another, expects favor in return • one person does something for another, expects favor in return • individuals work against one another for larger share of rewards • behavior that matches group expectations; allows for uniformity, • ...
Brian Knowles Key Terms 2017-10-18
Across
- any device used to send data from a computer to another device
- completed partially or entirely by using a computer
- a portable computing device such as a smartphone or tablet computer
- a method of banking where transactions are conducted electronically
- a computer that is portable and suitable for use while traveling
- a camera that records and stores digital images
- expected to be transported during normal usage aka cellphone
- generally smaller than a briefcase that can easily be transported
- the software that supports a computer's basic functions
- person or thing that develops something
- appears on the recipient's screen as soon as it is transmitted
- a mobile phone incorporating a digital camera
- the single worldwide computer network that interconnects other networks
- a visual way of interacting with a computer using items such as windows
- an arrangement of intersecting horizontal and vertical lines
- include such things as database programs
- facts and statistics collected together for reference or analysis
- capable of transmitting an analog or digital signal
- a social media site to which a user makes short
- mobile electronic device designed to read digital e-books
- a piece of computer hardware equipment
- place or fix
- online platform which people use to build social networks
- a global computer network providing a variety of information
- a computer designed for use by one person at a time
Down
- the environmentally responsible and eco-friendly use of computers
- computer software used to satisfy the needs of an organization
- a palmtop computer that acts as a personal organizer and provides email or Internet access
- designed primarily for accessing Internet-based applications
- a process by which individual investors and traders buy and sell securities online
- a list of questions and answers relating to a particular subject
- tools, machinery
- A person traveling with a smartphone
- the central processing unit and primary memory of a computer
- personal computer that fits on or under a desk
- controlled by or connected to another computer or to a network
- dedicated function within a larger mechanical or electrical system
- run by an individual or small group
- brain of the computer
- an electronic version of a printed book that can be read on a computer
- is the ability to use computers and related technology efficiently
- the faculty by which the mind stores and remembers information
- ability to use information and communication technologies to find
- in any manner detectable by an observer
- that can conveniently be stored in a pocket
- A specialized desktop computer used to play video games
- facts provided or learned about something
- encompasses all the various types of enterprise software
- carry out or put into effect
- the process or state of converging
- a family member that uses a computer
51 Clues: place or fix • tools, machinery • brain of the computer • carry out or put into effect • the process or state of converging • run by an individual or small group • A person traveling with a smartphone • a family member that uses a computer • a piece of computer hardware equipment • person or thing that develops something • in any manner detectable by an observer • ...
information security 2018-05-17
Across
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- All malicious software, including viruses, Trojan horses, and worms
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Property of accuracy and completeness
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- A string of characters that allows access to a computer, interface, or system.
Down
- The fear of being without a mobile device, or beyond mobile phone contact
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A humorous or malicious deception
- the ability to control information about oneself
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- An autonomous and malicious software program propagating among computer networks
- The person that a software program or hardware device is designed for.
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Measure of the criticality of a situation--the likelihood of something being attacked
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
information security 2018-05-17
Across
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A humorous or malicious deception
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- The person that a software program or hardware device is designed for.
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- An autonomous and malicious software program propagating among computer networks
Down
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Property of accuracy and completeness
- the ability to control information about oneself
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- All malicious software, including viruses, Trojan horses, and worms
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- The fear of being without a mobile device, or beyond mobile phone contact
- Measure of the criticality of a situation--the likelihood of something being attacked
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A string of characters that allows access to a computer, interface, or system.
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
Y11/12 CompSci AS Level Review 2025-01-06
Across
- Collections of pre-written code that can be used by other programs.
- Software whose source code is publicly available and can be modified.
- A logical operation that returns true if the inputs are different.
- A part of an instruction that specifies the operation to be performed.
- A network topology that combines elements of multiple topologies.
- Temporary storage areas used to hold data while it is being transferred.
- A type of storage medium that uses magnetism to store data.
- A unique hardware address used to identify network devices.
- A part of the CPU responsible for performing arithmetic and logical operations.
- Another term for the decimal number system.
- A feature of an IDE where it formats the code or data to make it more readable.
- A method for error detection in data transmission using parity bits.
- Legal protection granted to the creators of original works.
- A network of remote servers used to store and manage data online.
- Software designed to help manage and tune computer resources.
- Self-replicating malicious software that spreads across networks without user intervention.
- A cryptographic method used to verify the authenticity of digital messages.
- The practice of dividing a network into smaller, more manageable sub-networks.
- Software that is available for use at no cost.
- The part of the CPU that directs operations within the computer.
Down
- the Vonn Neumann Cycle.
- Malicious software disguised as legitimate software to deceive users.
- Legal rights to creations of the mind, such as inventions and trademarks.
- A type of data compression where some data is lost to reduce size.
- A storage technology that uses light to read and write data, such as CDs and DVDs.
- A cyber attack where multiple systems overwhelm a target with traffic.
- Software that is distributed for free with the option to purchase after a trial period.
- The process of ensuring that input data is correct and reasonable.
- A communication system where data can flow in both directions simultaneously.
- Small, fast storage locations within a CPU used to store data temporarily.
- The process of checking that a system or product meets specified requirements.
- (Duplicate) Another term for the decimal number system.
- The process of tracking the status or performance of a system.
- Malicious software that replicates itself and spreads to other computers.
- Signals that halt the current process to handle a different task.
- A method of addressing memory directly by its exact location.
- A storage technology that uses flash memory instead of mechanical parts.
- A register that holds the address of the next instruction to be executed.
- The most recent version of the Internet Protocol addressing scheme.
- A software tool used for writing and testing code.
- A company that provides access to the internet.
- A protocol and address of your network
- A method of addressing memory by adding an index to a base address.
43 Clues: the Vonn Neumann Cycle. • A protocol and address of your network • Another term for the decimal number system. • Software that is available for use at no cost. • A company that provides access to the internet. • A software tool used for writing and testing code. • (Duplicate) Another term for the decimal number system. • ...
Engineering Tech Crossword 2025-04-30
Across
- The core part of an operating system that manages system resources.
- Measures taken to protect computers and networks from unauthorized access.
- The server-side logic and database layer of a software application.
- A set of rules for data communication over a network.
- The standard language for creating web pages.
- Network of physical objects embedded with sensors and software.
- A device that converts digital signals for internet transmission over telephone lines.
- Temporary storage that speeds up access to frequently used data.
- A set of practices combining development and IT operations.
- A tiny semiconductor used to perform specific functions in electronics.
- The main circuit board that connects all components in a computer.
- Permanent software programmed into hardware devices.
- Information that can be processed or analyzed by a computer.
- The data transfer capacity of a network connection.
- Number system consisting only of 0s and 1s.
- Technology that creates virtual versions of hardware, servers, or operating systems.
- A complete path through which electric current flows.
- The physical components of a computer or electronic system.
- A version control system for tracking code changes in software development.
- A device that detects and responds to physical inputs like heat or motion.
- A professional who designs, builds, and tests technological systems.
- The process of converting data into a secure, unreadable format.
- Technology that performs tasks with minimal human input.
Down
- A processor designed to accelerate graphics rendering.
- A collection of connected computers or devices that share resources.
- A command-line interface used to interact with a computer system.
- A wired network protocol commonly used in local area networks (LANs).
- A set of integrated circuits that manage data flow between components.
- A secure, distributed ledger system used for tracking digital transactions.
- A program that translates code from high-level to machine language.
- The arrangement of components or settings within a system.
- A remote-controlled or autonomous flying device.
- A lightweight, portable unit that packages software and its dependencies.
- A storage location for code and project files, often managed by version control.
- The number of bits processed per unit of time, often in streaming.
- A device or software that distributes network traffic across multiple servers.
- A versatile, object-oriented programming language used in many applications.
- The point of interaction between hardware, software, or users.
- Internet-based services for data storage, computing, and software delivery.
- To identify and fix bugs or errors in a program.
- Interface allowing different software applications to communicate with each other.
- A precise set of rules or instructions for solving a computational problem.
- A beginner-friendly, high-level programming language with readable syntax.
- A file containing code written to automate tasks.
- Central Processing Unit; executes instructions in a computer.
45 Clues: Number system consisting only of 0s and 1s. • The standard language for creating web pages. • A remote-controlled or autonomous flying device. • To identify and fix bugs or errors in a program. • A file containing code written to automate tasks. • The data transfer capacity of a network connection. • Permanent software programmed into hardware devices. • ...
Chapter 3; Network Topologies and Technologies 2025-03-08
Across
- 100 Mbps Ethernet using baseband signaling that runs Category 5+ UTP cabling using two of four wire pairs. It is the most commonly used Ethernet variety.
- The weakening of a signal as it travels across network media
- ____ ratio; A ratio that measures the amount of valid signal compared with the amount of noise in a network transmission.
- Carrier Sense Multiple Access with Collison____; An access control method used by Wi-Fi networks in which an acknowledgement is required for every packet sent to avoid most possibilities of collision.
- (MU) MIMO; a technology that uses a process called ‘beamforming’ to send data to multiple clients simultaneously
- ____ topology; The path that data travels between computers on a network. The most common logical topologies are switched, bus, and ring.
- extended ____ topology;
- __ __ mode; A wireless mode of operation typically used in small or temporary installations. There’s no central device, so the data travels through one device to another to reach the destination.
Down
- A type of signaling where each bit of data is represented by a pulse of electricity or light that takes over the medium’s entire bandwidth. Common to LAN technologies.
- 100 Mbps Ethernet using baseband signaling over two strands of fiber-optic cabling.
- 10 Gigabit ethernet using baseband signaling that runs over four pairs of Category 6a UTP cabling
- point-to-____ topology; a topology in which a central device communicates with two for more other devices, with all communication going through the central device. It’s often used in WANs.
- The result of electricity bouncing off the end of a cable and back in the other direction. It causes corruption of data as the bouncing signal collides with signals behind it
- Cyclic ____ Check; The error-checking code in an Ethernet frame’s trailer that is calculated pre and post-departure; if the calculation on the destination device doesnt match the calculation in the frame, it indicates the data was altered.
- A type of signaling that moves data through mediums in waves rather than discrete pulses of electricity. Particular frequencies represent a ‘channel’ of data which allows them to stack and carry multiple streams of data on a single wire.
- the amount of information in a network transmission that isn’t part of the application data. This could include headers, acknowledgements, and retransmissions.
- ____ mode; An operational mode for Wi-fi networks in which wireless stations connect through a wireless access point before they can begin communicating with other devices.
- The actual application-to-application speed data transfer speed
- The result of two or more devices on the same medium transmitting simultaneously when CSMA/CD is the media access method in use.
- ____ topology; A network topology in which each device is connected to every other device, providing multiple pathways in the event of a device or cable failure.
20 Clues: extended ____ topology; • The weakening of a signal as it travels across network media • The actual application-to-application speed data transfer speed • 100 Mbps Ethernet using baseband signaling over two strands of fiber-optic cabling. • 10 Gigabit ethernet using baseband signaling that runs over four pairs of Category 6a UTP cabling • ...
Unit 32 How networks can be attacked 2013-11-28
Across
- Also known for advertising supported software
- Know as malicious software
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
Down
- of service It attempts to make a user or organisation lose its services
- Usually these are statistical analyses that attempt to discover keys
- door Is a method where any virus such Trojan, Malware can get through all security procedures
- Is a type of malicious software that is activated each time your system boots up
- Is a software that gathers information about a person or organisation without their knowledge
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
11 Clues: Know as malicious software • Also known for advertising supported software • Usually these are statistical analyses that attempt to discover keys • of service It attempts to make a user or organisation lose its services • Is a type of malicious software that is activated each time your system boots up • ...
COSC 100 2016-02-15
Across
- Display of HTML tags found on the World Wide Web
- Sending and receiving occur at different times
- Tool used for making slideshows that include pictures, video, music, and so on
- Known as local area network or when computers are geographically close
- Web servers and their files (WWW)
- Composed of HTML tags and multimedia files
- Using about half the words as the control condition
- Software that allows you to create a web page with only text
Down
- Sender and receiver are active at the same time
- Pictures, movies, graphics, etc. embedded in a web page
- Using neutral rather than subjective, boastful, or exaggerated language
- The main technology for local area networks, also used for connecting all the computers in a lab or building
- Gaining unauthorized access/data to a website or system
- The codes or tags that browsers use to create web pages
- The idea certain short files or media can be used without permission or payment from the holder
- False identifying yourself
- A site designed to read and write through the use of digital storytelling
- Legal right or permission to publish, use, perform, etc. another's material
- Areas to store memory to speed up the process of retrievals
- A group of information on a computer that can be software programs or data
20 Clues: False identifying yourself • Web servers and their files (WWW) • Composed of HTML tags and multimedia files • Sending and receiving occur at different times • Sender and receiver are active at the same time • Display of HTML tags found on the World Wide Web • Using about half the words as the control condition • Pictures, movies, graphics, etc. embedded in a web page • ...
Networking Review 2016-11-22
Across
- server used to authenticate based on user profile database
- layer of the OSI model IPsec operates in
- programmers develop these to fix any problems after a release
- requires private key and public key pairs
- relies on tickets to grant access to resources
- encapsulating one protocol within another
- computer controlled by third party
- virus that affects both the boot sector & files
- a network where only authorized users have access to the data
- attacker simply drives around scanning for networks
- standard allows you to create a private network on intranet
Down
- actively replicates itself without intervention
- uses two databases and TCP to authenticate users
- VPN protocol created by Microsoft
- acronym for Data Encryption Standard & type of public key encrypt
- hacker can use to intercept traffic on your network
- attack that prevents users from accessing the system
- authentication, authorization and ______
- defines the appropriate response to a security event
- people try to call or email for personal information
- process that encodes and decodes data
- type of antivirus scan even with no definition for it
- outdated and compromised security mechanism
- minimum length of passwords
- how often you should update antivirus software
- wireless access point installed without your knowledge
26 Clues: minimum length of passwords • VPN protocol created by Microsoft • computer controlled by third party • process that encodes and decodes data • layer of the OSI model IPsec operates in • authentication, authorization and ______ • requires private key and public key pairs • encapsulating one protocol within another • outdated and compromised security mechanism • ...
Colonizing in America 2017-05-20
Across
- The colony in Pennsylvania was founded for religious freedom for ________.
- Name of the King at the time of the Colonization era.
- Colonists in the 13 Colonies came from this country.
- Mother country gets rich at expense of colonies.
- The first English colony (lost colony).
- Document written in 1620.
- Fundamental Orders of __________.
- Another name for the Middle Colonies.
- This person was kicked out of Massachusetts and then went to Rhode Island.
- This person led the First Great Awakening.
- First permanent colony in America.
Down
- The New England Colonies did ________ farming.
- Africa and the Colonies traded ______ in the Middle Passage.
- Southern’s cash crops were tobacco, rice, indigo, and ______.
- Founder of Rhode Island.
- Published “Poor Richard’s Almanack" (famous colonial person).
- The New England, Middle, and Southern colonies all did ____ _________ with little government control.
- Trading networks between England, the Colonies, and Africa.
- The people from Plymouth moved to America for ________ _______.
- Founder of Virginia.
- Founder of New York and Delaware.
- This person helped to establish the idea of freedom of the press.
- These religious people lived in Maryland.
- Plantation owners first used ________ servants and then slaves for their labor force.
- Formed as a debtor colony and buffer zone between Spanish Florida and English colonies.
25 Clues: Founder of Virginia. • Founder of Rhode Island. • Document written in 1620. • Fundamental Orders of __________. • Founder of New York and Delaware. • First permanent colony in America. • Another name for the Middle Colonies. • The first English colony (lost colony). • These religious people lived in Maryland. • This person led the First Great Awakening. • ...
The Effects of ICT 2013-03-20
Across
- Books which can be accessed electronicaly.
- The use of machines to make a job more efficient.
- The vision of an office without the use of any paper instead, replying on computers.
- The negative view of ICT.
- People which create software for computers.
- These people create and update websites.
- These people use CAD software rather than pencil and paper on a drawing board.
- These people maintain and control large networks in companies.
- automated computer systems have replaced ___ exchange as it does not require any man power or skill.
- The introduction of ATMs have significantly reduced the number of these people.
- When one works away from an everyday office, eg: at home.
Down
- The positive view of ICT.
- ___ have been replaced by computers who can organise files virtually.
- The layout for a large amount of people typign the same document.
- A small CPU piece built into a single UI chip used in a computer.
- These people design and make new high-tech computer parts.
- To reduce the time needed to do a process while maintaining minimum costs.
- ___ work can now be done online as there are online stores such as amazon or ebay.
- e-books and online libraries have repleaced ___ work.
- These people are responsible for creating new ICT systems.
20 Clues: The positive view of ICT. • The negative view of ICT. • These people create and update websites. • Books which can be accessed electronicaly. • People which create software for computers. • The use of machines to make a job more efficient. • e-books and online libraries have repleaced ___ work. • When one works away from an everyday office, eg: at home. • ...
Internet Business Associate 2013-02-19
Across
- A public key encryption algorithm
- Data processed by protocols so it can be sent across a network
- A set of instructions or rules
- A machine that shares its resources among clients
- A computing paradigm in which users can use software over the Internet
- a concept or collection of symbols associated with a product, service or person
- A web page that integrates content and scripts from multiple web sites to create new applications
- A server that mediates traffic between a protected network and the Internet.
- A web... who creates the overview plan of a sites development
- A measurement of memory needed to store one 8 bit character
- A worldwide network of interconnected networks
- A system that maps uniquely hierarchical names to specific Internet addresses
Down
- An encrypted file transfer protocol
- Outgoing mail server
- A Web 2.0 programming language that consists of existing technologies
- Modulator Demodulator
- The practice of categorizing online content through tags
- Encrypting and decrypting email messages
- A problem solving model in which a task is given to a group of people rather than one.
- The integration of telephony and data technologies
- An individual computer on a network
- a computing language used to program Web 1.0
- A circuit board that enables a computer to connect to a network
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Careers 2014-05-01
Across
- Alleviates pain and stress using touch.
- Works independently of physicians when treating patients. Income about $89,960.00
- Helps patients with physical, mental, and developmental disabilities to assimilate into society.
- - Competition strong. Assists attorneys with research and clients.
- Patience and problem solving skills with weddings and conventions.
- Plays middleman between two married people, with problems.
- Assists veterinarian with animals in office and surgery.
- Works under doctor's supervision. Income about $62,430-$124,770.00
- Plant trees and shrubs. Maintains and designs landscape
- Sells health, auto, and life insurance
Down
- Rewrites, debugs, and maintains software.Income about $78.000.00
- Skin care specialist
- Hardest job on construction site. Plans, budgets, and oversees project.
- developer May design computer software games such as Candy Crush.
- Monitors security of computer networks for companies and government.
- Advises clients on food and nutrition. Income about $56,000.00
- Helps patients regain strength.
- Essential professionals installs, inspects, and repairs pipes.
- Cleans teeth.
- Interpretes language in schools and courtrooms.
- 8.6% employment growth in repairing and maintaining cars.
- Assists clients with finding real property
- Investigates causes of diseases, researches ways to prevent spread. $65,000.0
- - Responsible for cutting and installing glasswork on buildings.
- Industry made 7.4 billion dollars in 2012 by painting these.
- - Designs office buildings and libraries.
26 Clues: Cleans teeth. • Skin care specialist • Helps patients regain strength. • Sells health, auto, and life insurance • Alleviates pain and stress using touch. • - Designs office buildings and libraries. • Assists clients with finding real property • Interpretes language in schools and courtrooms. • Assists veterinarian with animals in office and surgery. • ...
ouiaklon 2014-02-19
Across
- Domain Name System.
- a code system using The binary digits 0 and 1 to represent a letter.
- A program with a graphical user interface.
- A string of numbers separated by periods.
- The practice of using the network of remote servers.
- a set of computer instructions in firmware that control input and output operations.
- Something inserted on to a rom chip can only be read, not removed.
- A group of people or things.
- A collection of items.
- Denoting software.
- Rigid, Slotted board were parts connect.
- A website's own style.
- The number of bits used to encode a single character of text.
- In a network.
Down
- The program and other operating information.
- A system that responds to requests acrossed a computer network.
- Random Access memory.
- The software that supports a computers info.
- Small enough to fit on a desk.
- port Universal serial bus.
- The host of a web page.
- Central Processing Unit.
- A device.
- A small piece of data sent from a website.
- A computer network consisting of worldwide networks of computer.
- The mechanical, magnetic, electronic, on your computer.
- A disk drive containing a hard disk.
- To load the first piece of software that starts a computer.
- Internet Service provider.
29 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • port Universal serial bus. • Internet Service provider. • A group of people or things. • Small enough to fit on a desk. • A disk drive containing a hard disk. • ...
Computer Vocab Crossword. 2014-02-19
Across
- A program with a graphical user interface.
- Something inserted on to a rom chip can only be read, not removed.
- The practice of using the network of remote servers.
- To load the first piece of software that starts a computer.
- In a network.
- A website's own style.
- Domain Name System.
- Central Processing Unit.
- The program and other operating information.
- A string of numbers separated by periods.
- Denoting software.
- a set of computer instructions in firmware that control input and output operations.
Down
- Internet Service provider.
- a code system using The binary digits 0 and 1 to represent a letter.
- The mechanical, magnetic, electronic, on your computer.
- Rigid, Slotted board were parts connect.
- A collection of items.
- The software that supports a computers info.
- A device.
- A group of people or things.
- The host of a web page.
- The number of bits used to encode a single character of text.
- Small enough to fit on a desk.
- A computer network consisting of worldwide networks of computer.
- A disk drive containing a hard disk.
- A small piece of data sent from a website.
- A system that responds to requests acrossed a computer network.
- Random Access memory.
- port Universal serial bus.
29 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • Internet Service provider. • port Universal serial bus. • A group of people or things. • Small enough to fit on a desk. • A disk drive containing a hard disk. • ...
Programming Crossword 2014-11-05
Across
- a step by step procedure for calculations
- a global system of interconnected computer networks that are linked several billion devices worldwide.
- Cascading Style Sheet, a language used for describing look and format of a document written in markup language
- a simplified programming language
- Hypertext Markup Language a standardized system to achieve Special Effects on World Wide Web pages
- Putting a plan into action
- a system of interlinked hypertext documents that are accessed via the Internet, they can be accessed from your computer via Web Browser
- Software Development Life Cycle
- Used for Android Operating System and allows web plug-ins
- A high level server side for websites and mobile apps, easy for beginners to understand
Down
- a program used to write coding for Java and other programming languages
- How a computer performs instructions
- a personal computer
- a framework created by Microsoft that typically runs on windows it is the easiest way to build Apps
- Circuit board that allows the hardware of a PC to communicate
- Random Access Memory used by the system to store data
- graphical representation of a computer program
- a data type which represents some finite subset of the mathematical integers,
- How programmers solve problems
- Used for both Web-Based and GUI-Based Applications
20 Clues: a personal computer • Putting a plan into action • How programmers solve problems • Software Development Life Cycle • a simplified programming language • How a computer performs instructions • a step by step procedure for calculations • graphical representation of a computer program • Used for both Web-Based and GUI-Based Applications • ...
Introduction to Programming (Michael Spoehr) 2014-11-05
Across
- - an object-oriented programming language that has been around since 1983.
- - translates human-readable source code into executable machine code.
- - Computers store data in ones and ___________
- - An IDE that supports many languages, including Java, C++, and HTML, that is sponsored by oracle.
- - code that is written to explain how a program works, not to be interpreted by a computer.
- - the most basic unit of information in computing
- - one of the world's first operational packet switching networks, and the first to implement TCP/IP.
- - One reason the .NET Framework is used is to create some ____________ across devices
- - programming language developed by oracle
- - one of the initial steps in computer programming
- - the process of removing bugs from code
- - webpages are written in this language.
Down
- - A popular IDE for C# and Java
- - The .NET Framework was created by _________
- - the most important step in computer programming
- - an object-oriented programming language developed by Microsoft.
- - translates a web address (like www.example.com) into an IP address.
- - IDE Stands for ___________ Development Environment
- - an internet connected computer that sends web pages to other computers
- - a process or set of rules to be followed in calculations or other problem-solving operations
- - this language is used to style webpages.
21 Clues: - A popular IDE for C# and Java • - the process of removing bugs from code • - webpages are written in this language. • - this language is used to style webpages. • - programming language developed by oracle • - The .NET Framework was created by _________ • - Computers store data in ones and ___________ • - the most important step in computer programming • ...
CTDI Fun Facts 2015-01-23
Across
- Don Parsons' wife.
- This customer recently purchased Time Warner Cable.
- Mascot of the university Leo Parsons attended.
- One of this division's responsibilities is material staging, kitting, turn-up and testing.
- European headquarters is located in this country.
- This Parsons family member has an MBA from Villanova University.
- Number of Parsons family members currently employed.
- Don Parsons was an engineer at this company for 27 years before creating CTDI in his garage.
- ____ Engineering, Repair and Logistics.
- Since 2009, cable companies moved channels to this format.
Down
- City in which the global headquarters is located today.
- Last name of first non-Parsons employee hired at CTDI.
- Electronic Tracking Ordering System.
- This division is responsible for our wireless, wireline, routers and gateways, CPE and tablets, cellsites, data networks, switching, optical broadband and DSL, enterprise and transport
- Wireless division usess this device to test up to 10 tablets at a time using CTDI developed Apps.
- Latest division to join CTDI.
- CTDI moved to this location in 1976.
- This saint is also celebrated on the anniversary of CTDI.
- ____ Road (Street where the "CTDI" garage is located)
- Last name of the first engineer hired at CTDI.
- Number of months spent in the garage creating CTDI prior to moving to the basement of a building nearby.
21 Clues: Don Parsons' wife. • Latest division to join CTDI. • Electronic Tracking Ordering System. • CTDI moved to this location in 1976. • ____ Engineering, Repair and Logistics. • Mascot of the university Leo Parsons attended. • Last name of the first engineer hired at CTDI. • European headquarters is located in this country. • This customer recently purchased Time Warner Cable. • ...
Nervous System 2021-09-24
Across
- nerve networks formed from merging of anterior rami with one or more adjacent anterior rami
- transmits impulses to skeletal muscle
- fine filament of connective tissue that extends from conus medullaris
- thin, intermediate layer surrounding brain and spinal cord
- innervates organs and conveys visceral efferent and afferent fibers to and from organs of the body cavities
- saw tooth like fibrous sheets of pia
- outer layer of dura mater formed by periosteum covering internal surface of calvaria
- in or on wall of target organ
- delicate, internal layer surrounding brain and spinal cord
Down
- contains cell bodies of sensory neurons
- tapered inferior end of spinal cord located at L1/L2 vertebral level
- bundle of nerve roots of spinal nerves caudal to L2 vertebra
- enlargement of the subarachnoid space in the dural sac caudal to conus medullaris
- dural infolding between the cerebral hemispheres
- partial partitions of dura between parts of the brain providing support
- tough, thick, external fibrous layer surrounding brain and spinal cord
- dural infolding between the hemispheres of the cerebellum
- dural infolding superior to the cerebellum
- includes sympathetic and parasympathetic divisions
- inner layer of dura mater, strong fibrous membrane continuous at the foramen magnum with dura mater covering spinal cord
20 Clues: in or on wall of target organ • saw tooth like fibrous sheets of pia • transmits impulses to skeletal muscle • contains cell bodies of sensory neurons • dural infolding superior to the cerebellum • dural infolding between the cerebral hemispheres • includes sympathetic and parasympathetic divisions • dural infolding between the hemispheres of the cerebellum • ...
Unit 2/3 Test Review 2021-10-07
Across
- In 1984 _____ introduced the first OS with icons and windows.
- Last name of the man who developed the first computer mouse.
- Moral standards or values
- The program used to find a view web pages.
- A network in close proximity
- A group of 8 bits.
- This feature allows users to comb the internet to find something in particular.
- The abbreviation/name of the first computer built in 1946.
- _____+F allows users to search on a single webpage to find desired text.
- Claiming someone else's work as your own.
- This professor stated computing power doubles approx. every 2 years.
- When one computer/device is connected to another a ____ is created.
- Computers use these to prevent unauthorized network access.
Down
- Pretending to be someone else to open accounts/spend money
- The results of your search are called:
- A group of 1000/1024 bits.
- Powerful computers that host the files found on the internet.
- An message that is unsolicited and often sent to many recipients.
- This lead to rapid computer development in the 1960's.
- The proper name for a link to another webpage.
- We use Windows/File ____ in Windows OS to view/manage files.
- A combination of computer networks that spans the Earth.
- A network covering a large area
23 Clues: A group of 8 bits. • Moral standards or values • A group of 1000/1024 bits. • A network in close proximity • A network covering a large area • The results of your search are called: • Claiming someone else's work as your own. • The program used to find a view web pages. • The proper name for a link to another webpage. • This lead to rapid computer development in the 1960's. • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
Credit Crossword 2022-03-14
Across
- close ended credit accounts
- when you put a security deposit on your card
- when your loan isnt tied to an asset
- when you owe money
- a credit card reward where you get money back
- the type of credit that is on credit cards
- your history of your credit card spendings and payments
- the money that builds up over time
- interest rate that doesnt change
- loans with extreme interest rates if you dont pay them back in time
Down
- a loan for a vehicle
- a loan you take out for yourself
- things you earn by using your credit card
- what you pay with that takes money directly from your account
- one of the two credit card networks that will issue credit cards
- interest rate that changes
- your rating that you have that credit companies look at before giving you a loan
- the only source of revolving credit
- the credit card set up that allows parents to pay if a student can't
- points that you get for using your credit card
- a loan for your home
- Renting for a car
- what you use to pay for something under $10
- what you take out to get money now
24 Clues: Renting for a car • when you owe money • a loan for a vehicle • a loan for your home • interest rate that changes • close ended credit accounts • a loan you take out for yourself • interest rate that doesnt change • the money that builds up over time • what you take out to get money now • the only source of revolving credit • when your loan isnt tied to an asset • ...
Thulo.ST10095843 2022-03-24
Across
- The maximum capacity data is transmitted over an internet connection, measured in bits per second.
- How many layers are in the OSI model?
- A device that communicates between your phone and the internet.
- The heart of the OSI model
- A word for inconsistency of packets arrival in a network.
- A hardware device used to connect to other devices using ethernet cables.
- What does TCP stand for?
- The ability to continue operation despite component failures.
- A small unit of data sent through IP/TCP networks.
- A set of rules that determine how data is transmitted between devices in a network.
- How much data can be transferred from one location to another in a period of time.
Down
- Physical layer, data link layer and network layer are all part of which model?
- A hardware component that connects the computer to a computer network?
- What is used to transfer data to and from a link adapter?
- A digital pathway used to transfer data between components in a computer, and devices connected to the computer.
- Lag or delay in communication over the internet.
- Packets not reaching their destination.
- What does IP stand for?
- A storage unit for data for an adapter.
- Two or more computer connected together to share resources.
20 Clues: What does IP stand for? • What does TCP stand for? • The heart of the OSI model • How many layers are in the OSI model? • Packets not reaching their destination. • A storage unit for data for an adapter. • Lag or delay in communication over the internet. • A small unit of data sent through IP/TCP networks. • What is used to transfer data to and from a link adapter? • ...
Unit 5 Lab 2022-10-26
Across
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- Slow
- atrioventricular
- coronary care unit, cardiac care unit
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- Pumps blood through the system
- Two
- sometimes called a ‘treadmill’ or ‘exercise’ test, is a type of ECG that is done while you are exercising
- atrial fibrillation
- acute coronary syndrome
- Networks of small vessels that perfuse tissues
- Pertaining to
- It gives a picture of your heart using ultrasound, a type of X-ray. It uses a probe either on your chest or down your esophagus (throat)
- a problem with the rate or rhythm of your heartbeat.
Down
- one or more of the valves in your heart doesn't work properly
- happens when a part of the heart muscle doesn't get enough blood
- occurs when the heart muscle doesn't pump blood as well as it should
- Vessels that deliver blood to tissues
- removal
- cardiopulmonary resuscitation
- Vessels that return blood to the heart
- a quick and painless test that records the electrical signals in the heart
- It is a non-invasive test for people who may be experiencing unusual cardiac symptoms
23 Clues: Two • Slow • removal • Pertaining to • atrioventricular • atrial fibrillation • acute coronary syndrome • cardiopulmonary resuscitation • Pumps blood through the system • Vessels that deliver blood to tissues • coronary care unit, cardiac care unit • Vessels that return blood to the heart • Networks of small vessels that perfuse tissues • ...
TECHNOLOGY CROSSWORD PUZZLE 2023-11-27
Across
- A language used to build web pages.
- Used to put images and words from the computer onto paper.
- device Used to put data in the computer.
- A device used to record our voice.
- Used to play music or sounds from the computer.
- A screen used to see images and computer data.
- A networking device that helps in the transfer of data packets between networks.
- A device used to see each other on the screen.
- Used to type on the computer. It has letters and numbers on it.
- Address A unique code used for each computer and device on the internet.
- A program that speaks between a computer and a server.
Down
- A machine used to do many things, such as browse the internet or play video games.
- A computer you can take anywhere.
- Citizenship Being responsible online.
- device Used to get information from the computer.
- A secret code used to log in
- A network that connects millions of computers worlwide.
- in Signing in to a computer.
- A device used to pass documents and images from paper to the computer.
- Giving instructions to a computer.
- Used to select items and move the cursor on the screen.
- The web address of a website.
22 Clues: A secret code used to log in • in Signing in to a computer. • The web address of a website. • A computer you can take anywhere. • A device used to record our voice. • Giving instructions to a computer. • A language used to build web pages. • Citizenship Being responsible online. • device Used to put data in the computer. • A screen used to see images and computer data. • ...
Hiring & Staffing 2023-09-15
Across
- Training while still working or at work
- Filling a vacancy from the existing workforce
- The rate at which employees leave the workforce and get replaced by others
- Formal conversation where on person asks questions while the other provides answers
- Person working for wages or salary
- Employs people
- Process of finding, interviewing, and screening people for a job
- A mention about a certain something, could be from past employers informing new ones about the potential employee
- New employees gain the necessary knowlege, skills, and behaviors to become effective members of their workforce
- Websites that allow users to create and share contact through networks
- Rearranging tasks and responsibilites
- Getting rid of staff positions
Down
- Organizing, managing, and coordinating an organizations employees to carry about the goals of the organization
- The action of opening a vacancy to more candidates instead of picking someone from the already exisiting staff
- Document created to share their background information when trying to find new employment
- Statement including information about credit activity and currect credit
- Raise to a higher position
- An employee's departure from the job, ending their career with that specific employer
- Documents containing details for qualifications and experience
- Reduction in force, getting rid of positions
- Volunteering to leave a position
21 Clues: Employs people • Raise to a higher position • Getting rid of staff positions • Volunteering to leave a position • Person working for wages or salary • Rearranging tasks and responsibilites • Training while still working or at work • Reduction in force, getting rid of positions • Filling a vacancy from the existing workforce • ...
Chapter 6 2019-09-27
Across
- The State shall develop a self-reliant and independent national economy effectively controlled by _____.
- ______ participation is encourage to support children's learning of pro-social activities at home.
- It serves the students' need to learn social responsibility and peacemaking skill.
- Is the peaceful exchangr of information and the sharing of feelings, decisions, and ideas.
- The State shall ensure the ____ of local governments.
- "The distinctive meaning of national security means freedom from foreign _______".
- The separation of ____ and State shall be invioble.
- Artcile II, Declaration of ______ and State Policies.
- The absence of __ does not necessarily mean there is peace.
- National ____ is the requirement to maintain the survival of the state.
Down
- Innovative _____ teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
- The prime duty of this is to serve and protect the people.
- Is a state without war.
- Collaborative ______ and family-school-community networks implement programs to increase peace.
- The Philippines is a ____ and republican State.
- A _____ to make school a place of piece is one of the ultimate challenges in education.
- War cannot be prevented without changing the ____ itself.
- From Latin diploma, meaning an official document.
- It shall pursue an independent foreign policy.
- It supposed to represent a democratic society with a mission to educate, not to police children.
20 Clues: Is a state without war. • It shall pursue an independent foreign policy. • The Philippines is a ____ and republican State. • From Latin diploma, meaning an official document. • The separation of ____ and State shall be invioble. • The State shall ensure the ____ of local governments. • Artcile II, Declaration of ______ and State Policies. • ...
Crossword 2020-01-08
Across
- Provide short summaries or complete information about the articles cited in various media types.
- Book created by Silvertone in 1997.
- A place wherein literary, musical, information, etc. are found.
- Online general encyclopedia.
- A newspaper covering the three regions of Northern Luzon.
- Composed of million of networks.
- It is the collections of various of facts usually written by different contributors.
- Refers to a group of article.
- It also sends visual images through channels for various purposes.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It allows to easily and instantaneously access several types of information.
Down
- It reaches a large audience through broadcast communication.
- Covers a large variety of articles of up-to-date information.
- It covers an in depth entries of Information.
- A weekly publication of opinion and news from Cordillera.
- Used for looking great deal of information about the topic.
- A weekly newspaper that is created by and for the people of Baguio City.
- It collects and edit articles about current events that is usually published.
- Refers to organized collection of records or the items found in a library.
- Virginia tech’s library catalog also called as _____.
- It is an engineering database.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Crossword 2020-01-08
Across
- Covers a large variety of articles of up-to-date information.
- It is the collections of various of facts usually written by different contributors.
- Online general encyclopedia.
- It reaches a large audience through broadcast communication.
- It is an engineering database.
- Used for looking great deal of information about the topic.
- A newspaper covering the three regions of Northern Luzon.
- Provide short summaries or complete information about the articles cited in various media types.
- Composed of million of networks.
- A place wherein literary, musical, information, etc. are found.
Down
- Virginia tech’s library catalog also called as _____.
- A weekly publication of opinion and news from Cordillera.
- It allows to easily and instantaneously access several types of information.
- It collects and edit articles about current events that is usually published.
- It covers an in depth entries of Information.
- Refers to a group of article.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It also sends visual images through channels for various purposes.
- Refers to organized collection of records or the items found in a library.
- A weekly newspaper that is created by and for the people of Baguio City.
- Book created by Silvertone in 1997.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Crossword 2020-01-08
Across
- A place wherein literary, musical, information, etc. are found.
- Online general encyclopedia.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It collects and edit articles about current events that is usually published.
- It is an engineering database.
- Virginia tech’s library catalog also called as _____.
- Provide short summaries or complete information about the articles cited in various media types.
- Book created by Silvertone in 1997.
- A newspaper covering the three regions of Northern Luzon.
- Refers to a group of article.
- It is the collections of various of facts usually written by different contributors.
Down
- A weekly publication of opinion and news from Cordillera.
- Composed of million of networks.
- It covers an in depth entries of Information.
- It reaches a large audience through broadcast communication.
- Covers a large variety of articles of up-to-date information.
- Used for looking great deal of information about the topic.
- It allows to easily and instantaneously access several types of information.
- Refers to organized collection of records or the items found in a library.
- A weekly newspaper that is created by and for the people of Baguio City.
- It also sends visual images through channels for various purposes.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Mental Health 2020-11-17
Across
- / an even distribution of weight enabling someone or something to remain upright and steady.
- or Flight / the instinctive physiological response to a threatening situation, which readies one either to resist forcibly or to run away.
- / interacting with the community and people around you
- / The emotion of feeling mad
- / The ability to bounce back
- / of, affecting, or arising in the mind; related to the mental and emotional state of a person.
- disorder / Another name for manic depression
- / A constant and ongoing feeling of being depressed.
- / the action or practice of meditating.
- / easily agitated or alarmed.
- networks / People and places you can go to for help.
- / make or become less tense or anxious.
- / in a manner relating to the body as opposed to the mind.
Down
- / A constant feeling of being nervous, worried or stressed.
- / relating to a person's emotions.
- / Extreme or irrational fear of entering open or crowded places, of leaving one's own home, or of being in places from which escape is difficult.
- disorder / recurring panic attacks and ongoing fears about experiencing more panic attacks.
- / a written or spoken discourse expressing considered thoughts on a subject.
- Awareness / conscious knowledge of one's own character and feelings.
- Thinking / to have positive thoughts
- / in a manner relating to the mind.
- / a response to pressure or threat
22 Clues: / The emotion of feeling mad • / The ability to bounce back • / easily agitated or alarmed. • / relating to a person's emotions. • / a response to pressure or threat • / in a manner relating to the mind. • Thinking / to have positive thoughts • / the action or practice of meditating. • / make or become less tense or anxious. • ...
Chapter 4 Intro to Networking 2024-08-25
Across
- Amount of time, including delays, for data to travel
- half duplex
- fiber that survives in harsh undersea environments
- sense cable type
- The measure of the transfer of bits across the media
- most common networking media
- how the bit values, “1” and “0” are represented on the physical medium
- fiber used in long distance application
- OSI layer that has the components like NIC
- data encoding method that embeds clock signal
- IEEE 802.15
- Less susceptible to attenuation, and completely immune to EMI/RFI
- material the shield is made of
- used primarily for Internet of Things (IoT) applications
Down
- networking concept of packaging data for transmission
- straight Host to Network Device
- capacity at which a medium can carry data
- the longer the electrical signals have to travel, the weaker they get
- Throughput - traffic overhead
- protect the signal from interference
- noise in a communication channel
- most common type of cabling used in networks today
- 1,000 bps
- Host-to-Host
- common coaxial connector
- Device that provides Wi-Fi connectivity to multiple devices
- the rj-45 is plugged into this
- Better noise protection than UTP
- fiber used in datacenters
- distort and corrupt the data signals
- 1,000 mbps
31 Clues: 1,000 bps • 1,000 mbps • half duplex • IEEE 802.15 • Host-to-Host • sense cable type • common coaxial connector • fiber used in datacenters • most common networking media • Throughput - traffic overhead • the rj-45 is plugged into this • material the shield is made of • straight Host to Network Device • noise in a communication channel • Better noise protection than UTP • ...
Puzzle 2023-06-06
Across
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- Temporary storage in computer where it holds data that CPU uses
- Refers to software that is used to protect your computer against unwanted intrusions
- A collection of information stored and accessed electronically
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- Number system used in digital electronics and computer programming
- Central Processing Unit
- High-level programming language known for its simple syntax
- Measure of CPU speed
- Part of the computer where most calculations take place
Down
- Part of the computer system that one can physically touch
- A worldwide network of interconnected networks and computers
- A popular open-source relational database
- Cloud computing platform and API offered by Amazon
- Apple's mobile operating system
- A programming language known for its use in web development
- Programming language developed by Sun Microsystems, now owned by Oracle
- A service offered by Google that allows you to store and share files online
- Coding language developed at MIT designed to teach programming concepts to children
- The technology that allows for wireless communication between devices over short distances
- Graphics processing unit
- Personal Computer
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
CS Principles Review 2023-04-26
Across
- A ZIP folder uses ______ compression.
- Information about an individual that can be used to uniquely identify them (directly or indirectly).
- The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
- A small network often in one building
- The technique used to "solve" NP problems
- Basically the use of loops in an algorithm
- is data about data
- the use of "the other type" of code
- The uncringe version of copyright
- Quick and light protocol for transfering data
Down
- ________ Computing; the use of multiple computers to run different parts of a program
- Symmetric key encryption involves ___ key for both encryption and decryption
- Basically the use of if statements in an algorithm
- Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
- a piece of software or a device that uses software(2 words)
- An attack where a user is tricked into revealing private information, often via a deceptive email.
- Common form of wired connection to the internet
- a wireless access point that gives unauthorized access to secure networks
- Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
- _____ Address; IP but for network
20 Clues: is data about data • _____ Address; IP but for network • The uncringe version of copyright • the use of "the other type" of code • A ZIP folder uses ______ compression. • A small network often in one building • The technique used to "solve" NP problems • Basically the use of loops in an algorithm • Quick and light protocol for transfering data • ...
French 2024-11-22
Across
- home page
- social media/networks
- search engine
- to broadcast/distribute
- to become
- to have the right to...
- addicted
- targeted by
- to stream and watch a movie
- to light up
- to protect
- file
- to remove
- to choose (to)
- to communicate
- to protect oneself
- to send
- private
- connected, trendy, plugged-in
- cyberbullying
- to report
- with difficulty
- smartphone
- risk/danger
- text message
- easily
- an account
- to interact
- unlimited
- data
- to behave
- screen
- an app
- to stay up to date/informed of
- hyperconnected
- cyper-dependant
- to secure/protect one's profile
Down
- addicted
- user
- to save a file
- resource
- to recive
- to belong to/be part of
- to learn
- to protect
- to permit/allow
- respectful
- computer
- to download
- law
- victim
- negative comment
- digital identity
- behavior
- digital footprint
- the world
- to post
- punish
- prudent/careful
- to become
- to transfer a file
- plagairism
- to use
- internet user
- network
- plan
- to forbif/prohibit
- private life
- to prevent
- password
- to have access to
71 Clues: law • user • file • plan • data • victim • punish • to use • easily • screen • an app • to post • to send • private • network • addicted • resource • to learn • computer • addicted • behavior • password • home page • to recive • to become • the world • to remove • to become • to report • unlimited • to behave • to protect • respectful • to protect • plagairism • smartphone • to prevent • an account • to download • targeted by • to light up • risk/danger • to interact • ...
Mobile Phones & Online Banking 2025-01-30
Across
- Mobile phones can also be called _____ phones.
- You can _____ payments to send them automatically at a specified time.
- A wireless technology to connect a phone to other devices.
- Second generation mobiles introduced _____ transmission methods that cinverted voice into binary information.
- You can pay your ____ online.
- This card contains the user's information, the connection data and the phonebook.
- Fingerprints are a type of _____ authentication.
- What can you trade online? (buy and sell shares)
- A bank that doesn't have a web presence is called a brick-and-____ bank.
- Security _____ are microchip-based devices that generate a number for two factor authentication.
Down
- The type of banking where you can use mobile phone networks to perform transactions.
- The Abbreviation of "Universal Mobile Telecommunications System".
- The capability of mobile phones to transfer calls to different base stations is called _____.
- A hands-free kit is useful for having phone calls while _____.
- What do base stations divide the coverage area into?
- Banks that don't have physical branches or ATMs are called ___ banks.
- You can talk without holding the headset if you have a _________.
- The abbreviation for "Global System for Mobile".
- The most common file format for music on the internet.
- A TAN is required for some transactions, it can only be used once.
20 Clues: You can pay your ____ online. • Mobile phones can also be called _____ phones. • The abbreviation for "Global System for Mobile". • Fingerprints are a type of _____ authentication. • What can you trade online? (buy and sell shares) • What do base stations divide the coverage area into? • The most common file format for music on the internet. • ...
Cultural Exchanges and Influences on Trade Routes 2024-10-18
Across
- The pathogen that caused the widespread of disease in history like the "Black Death."
- Oral Historians and musicians in West Africa.
- Groups of peoples that lives away from their homeland.
- A Chinese philosophy that combines Confucian principles with other spiritual ideas.
- Buddhism A form of Buddhism that teaches rebirth in a happy place after death.
- An ancient city known for its impressive earthworks in North America.
- A cultural achievement of the ancient Pueblo peoples in the Southwest.
- Rest stops for merchants and travelers.
- Networks for transporting good and ideas between different regions.
Down
- Traditional boats used for trading on water in Asia.
- Tallest brick tower in Delhi, India.
- An important dynasty in Southeast Asia known for its architectural and cultural legacy.
- Revolution Agricultural advancements that improved farming techniques in Islamic world.
- A language derived from Bantu Roots and was influenced by the Arabic.
- of Exchange An system that allows trade without physical money.
- Trade routes over the water which is used for transporting goods between civilizations.
- A school of Buddhism that focuses on meditation.
- A monumental and a religious temple complex in Cambodia which was dedicate for Hindu Deities.
- A famous traveler who explored the Islamic world and he spent his whole life on traveling.
- Wealthiest king in Mali.
20 Clues: Wealthiest king in Mali. • Tallest brick tower in Delhi, India. • Rest stops for merchants and travelers. • Oral Historians and musicians in West Africa. • A school of Buddhism that focuses on meditation. • Traditional boats used for trading on water in Asia. • Groups of peoples that lives away from their homeland. • ...
vocabulary crossword 2025-03-21
Across
- a historical account of events arranged in order of time usually without analysis or interpretation
- (adj) - impossible to refute; something that can’t be disproved
- a bill prohibiting social networks from allowing strangers to message minors
- (v) - to destroy the resolve or courage of; intimidate
- line (n) - financial considerations (such as cost or profit or loss)
- (n) - a wily subterfuge : trick
- (v) - to refuse abruptly
- (v) - to make an earnest request to (someone) : beg
- overflowing of the land by water.
- (adj) - having the agreement and consent of all
- eagerness and ardent interest in pursuit of something
- (n) - an organization (such as a business or governmental unit) that has an identity separate from those of its members
- disposed to look after civic needs and interests
Down
- the act or an instance of grappling
- causing or tending to cause ruin.
- (adj) - impossible to refute; something that can’t be disproved
- an app being banned by Utah law
- (adj) - involving, imposing, or constituting a burden : troublesome
- (adj) deficient in firmness : not stringent
- (adj) - perfectly typical or representative of a particular kind of person or thing
- an overflowing of the land by water.
- (n) - a detailed plan of a scientific or medical experiment, treatment, or procedure
- a professor of child development
23 Clues: (v) - to refuse abruptly • an app being banned by Utah law • (n) - a wily subterfuge : trick • a professor of child development • causing or tending to cause ruin. • overflowing of the land by water. • the act or an instance of grappling • an overflowing of the land by water. • (adj) deficient in firmness : not stringent • (adj) - having the agreement and consent of all • ...
Networking concept and Cyber Ethics 2025-05-19
Across
- The unwanted bulk emails that come from unknown sources are called.
- A computer ion a network.
- Equivalent form of Hacking.
- simplest way to prevent plagiarism.
- Program that disrupts the normal functioning of a computer.
- It is wireless technology.
- Protecting the data and resources from any unauthorized access.
- Refers to criminal activities that involve the use of computer, network and internet.
- Group of computers or other peripheral devices.
- Refers to an illegal intrusion in a computer system or a network.
- It is a legal right granted by law to the creator for his original work.
- Is used to connect a computer to the available internet connection over the existing telephone line.
Down
- Certain sets of rule determine how data should be transferred over networks and so on.
- Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
- Ranges less than 10 meters.
- It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
- Refers to computer network restricted to a organization.
- Group of star figured workstations connected to a linear backbone cable.
- It is a network device that is used to connect all computers to a network.
- Metropolitan Area Network.
20 Clues: A computer ion a network. • It is wireless technology. • Metropolitan Area Network. • Ranges less than 10 meters. • Equivalent form of Hacking. • simplest way to prevent plagiarism. • Group of computers or other peripheral devices. • Refers to computer network restricted to a organization. • Program that disrupts the normal functioning of a computer. • ...
Computer Science Vocab 2023-01-09
Across
- manages the CPU's operations and controls how data and instructions are loaded and executed by the CPU
- physical components of a computer system
- a device that receives, stores, and processes information
- stores or transfers data
- unit of memory data, group of 8 bits
- worldwide system of computer networks, global network of physical cables
- holds components of a computer together so they can interact
- the component of a computer system that controls the interpretation and execution of instructions
- hardware or software that temporarily stores data
- data or programs used to operate computers and execute specific tasks
- interconnected system of webpages accessible through the internet
Down
- provides intuitive and visual elements for interacting with the computer
- short term memory of a computer where the data currently in use is stored
- text document that contains additional formatting information in a language called HTML
- program that accesses a Web page, interprets its content, and displays the page
- allow the computer to receive data and instructions from external sources
- allows the computer to display or broadcast its results
- Internet-enabled computer that stores Web pages and executes software for providing access to the pages
- manages all application programs in a computer
- used by websites to navigate online content, takes the user to another location
20 Clues: stores or transfers data • unit of memory data, group of 8 bits • physical components of a computer system • manages all application programs in a computer • hardware or software that temporarily stores data • allows the computer to display or broadcast its results • a device that receives, stores, and processes information • ...
Digital Technology Final part 1 2023-05-08
Across
- a document created by a program or system
- online journal which creates interaction from readers. They consist of special or common interest groups
- local area network
- type of file that has been created or saved by an application
- the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
- acceptable use policy
- Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
- Something used to hold files or other folders
- the screen that displays the desktop
- a computer file like an image, video or document which can be included in an email and shared
- wide area network
- the physical parts of the computer that store and run written instructions
Down
- website that allows users to add and update content on the site using their own web browser.
- Arranging all folders files and other documents in an organized manner
- free web-based application in which documents and spreadsheets can be edited, created and stored online
- Free cloud storage service that is integrated with the company's other services and systems
- universal serial bus
- everything you see when you start your computer
- a set of digital instructions, data or programs used to operate computers
- computer processing unit
20 Clues: wide area network • local area network • universal serial bus • acceptable use policy • computer processing unit • the screen that displays the desktop • a document created by a program or system • Something used to hold files or other folders • everything you see when you start your computer • type of file that has been created or saved by an application • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
Islamic Golden Age- By: Stone Hatzfeld 2025-02-25
Across
- A Muslim poet who was famous for the Book of Kings.
- Byzantine buildings that represented Muslim worship and architecture.
- the art of producing beautiful handwriting.
- Also known as Avicenna and was a Persian physician who wrote the Canon on Medicine.
- this road was crucial for trading goods between East Asia and Europe.
- Buildings for social interactions and for group prayers.
- spread of products, cultures and technologies.
- Built vast trading networks and traded for gold.
- a renowned physician who pioneered the study of many diseases.
- This is the Holy book of the Islamic religion.
Down
- These people produced fine goods steel swords and cotton textiles
- a common institution in Muslim lands of forcing people to work.
- Was an Arab thinker who established many principles of many branches of knowledge.
- Was a philosopher and a scientist and also known as Averroes.
- Known as a poet who crafted many quatrains and development of algebra.
- introduction of an Indian number system to Europe number system known as.
- Handicraft manufacturing was organized by these in Muslim cities.
- Him and his successors established Baghdad as the greatest Muslim center of learning.
- The English word check comes from this Arabic word.
- the ability to move up in society.
20 Clues: the ability to move up in society. • the art of producing beautiful handwriting. • spread of products, cultures and technologies. • This is the Holy book of the Islamic religion. • Built vast trading networks and traded for gold. • A Muslim poet who was famous for the Book of Kings. • The English word check comes from this Arabic word. • ...
Islamic Civilization Crossword Puzzle 2025-02-26
Across
- organized handicraft manufacturing and helped improve quality of products
- contributed to the development of algebra and studied the sky to help make the Muslim Calendar
- made fine goods used for art and trade
- thinker who helped create the principles of knowledge for history and economics
- physician who started the study of diseases like measles and smallpox and wrote books about medicine
- developed concepts of algebra and helped to create the earliest maps of the world
- philosopher and scientist who contributed to the study of diseases and sickness and analyzed humans fate
- organized large irrigation projects to help grow crops and help farmers
- being able to improve in society
- united diverse groups and blended traditions to improve civilization
Down
- creating beautiful handwriting
- Muslim poet famous for The Book of Kings and centered his writings around royalty and hero’s
- established Baghdad as the Muslim enter of learning where scholar made advances in many different subjects
- travelers who brought food and goods from settled lands
- places used for religion, education, and social interaction
- honored in Muslim culture and built many trading networks across the world
- wrote books about different medical practices
- produced glassware, furniture, and tapestries
- the works produced by scholars that shaped Muslim culture and civilization
- important route for trade in Europe and Asia
20 Clues: creating beautiful handwriting • being able to improve in society • made fine goods used for art and trade • important route for trade in Europe and Asia • wrote books about different medical practices • produced glassware, furniture, and tapestries • travelers who brought food and goods from settled lands • places used for religion, education, and social interaction • ...
Chapter 3 and 4 vocab 2025-10-31
Across
- A period of transformation in agriculture within the Muslim world
- Temple that reflects a powerful empire
- A historic city in Mali, West Africa
- Ruler of Mali who gained wealth by controlling the trade of gold
- Major hub for trade and religious ceremonies
- Powerful Buddhist kingdom in the 8th and 9th century
- Philosophical and ethical system in China that was adopted by the Mongol Empure
- Crucial animal to trade in the Arabian Peninsula
- Traveler that also wrote about different countries
Down
- Language that was deeply influenced by Indian Ocean Trade
- Ming dynasty admiral who commanded massive fleets in the navy
- Type of Buddhism favored by Mongolians that are centered on a different leader
- System of paper currency in China. The idea spread to Mongol empire and facilitated trade.
- Allows monks to collect food and eat because they are not allowed to store their own food.
- Hereditary class of professional West African storytellers, musicians, and oral historians
- Indian landmark and victory tower built by the first Sultan of Delhi
- Type of ship that facilitated traded.
- Communities that have dispersed and settled around the world
- Roadside inns that were for travelers. They aided in communication and trade networks.
- School of Buddhism that emphasizes reaching enlightenment
20 Clues: A historic city in Mali, West Africa • Type of ship that facilitated traded. • Temple that reflects a powerful empire • Major hub for trade and religious ceremonies • Crucial animal to trade in the Arabian Peninsula • Traveler that also wrote about different countries • Powerful Buddhist kingdom in the 8th and 9th century • ...
Station 1 – Viet Minh Strengths 2025-11-18
Across
- : Political leader who directed the nationalist struggle and unified the Viet Minh.
- : Three-phase doctrine of mobilisation, guerrilla, and conventional warfare.
- : Viet Minh cadres entering colonial administration to gather information.
- : Province where the Viet Minh displaced French authority in liberated zones.
- : Heavy guns supplied by China and positioned above French positions.
- : Town abandoned after Viet Minh isolated French supply lines in 1951–52.
- : Areas under Viet Minh control where shadow governments replaced French rule.
- : Region where Viet Minh evaded French destruction during Operation Lea in 1947.
- : Nationalist and anti-imperialist education creating unity and discipline.
Down
- : Route Coloniale where French forces collapsed in 1950.
- : Final French defeat in 1954 due to encirclement and artillery dominance.
- : Recognised the DRV on 18 Jan 1950 and provided major military aid.
- : Recognised the DRV on 30 Jan 1950 and provided strategic backing.
- : Early-stage tactic conserving strength while weakening French occupation.
- : Secure cross-border bases in China for training and resupply.
- : Major Viet Minh victory on RC4 in 1950.
- : Informant networks embedded in French-controlled towns and villages.
- : Tens of thousands who carried supplies and artillery across mountains.
- : Strategy emphasising long-term mobilisation and gradual escalation.
- : Commander who led protracted people’s war and major military campaigns.
20 Clues: : Major Viet Minh victory on RC4 in 1950. • : Route Coloniale where French forces collapsed in 1950. • : Secure cross-border bases in China for training and resupply. • : Recognised the DRV on 30 Jan 1950 and provided strategic backing. • : Recognised the DRV on 18 Jan 1950 and provided major military aid. • ...
ETHAN'S CROSSWORD 2025-12-08
Across
- – A set of rules governing data communication on a network.
- – A 32-bit addressing system used for identifying devices on the Internet.
- – A variable used to pass information into a function.
- – A network of infected computers controlled by a hacker.
- – Compression technique that reduces file size without losing data.
- – A tiny electronic switch used to represent bits in a computer.
- – Maximum amount of data transferable per second.
- – A small chunk of data sent across a network.
- – A security system that filters allowed and blocked network traffic.
- – A character encoding system that represents text using numeric codes.
Down
- – Prediction that the number of transistors on a chip doubles roughly every two years.
- – A device that forwards data packets across networks.
- – Compression that removes some data to make a file smaller.
- – A scam that tricks users into giving personal information.
- – Repeating steps or loops within a program.
- – A number system using only 0s and 1s.
- – The delay it takes for data to travel across a network.
- – A data type that can be only true or false.
- – An error that occurs when a value exceeds the maximum amount storable.
- – A step-by-step set of instructions for solving a problem.
20 Clues: – A number system using only 0s and 1s. • – Repeating steps or loops within a program. • – A data type that can be only true or false. • – A small chunk of data sent across a network. • – Maximum amount of data transferable per second. • – A device that forwards data packets across networks. • – A variable used to pass information into a function. • ...
ypdva-y9-CS-unit-1-revision-keywords 2025-12-03
Across
- Tool used on emails and networks to block spam or suspicious traffic
- Prevention method that ensures people know how to spot a cyber trick
- Software designed to protect your device from malware
- Copies of data needed to recover from a ransomware attack
- Attack that floods a server with requests from many sources
- The process used with 2FA to verify a user's identity
- Tempting downloads or USB sticks to trick someone into giving data
- Prevention method for this threat is being aware of who is watching your screen
- General term for malicious software
- Installing these will fix security holes and vulnerabilities
- A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
- Security system that monitors and filters network traffic
- Attack that floods a server with requests, often from a single source
- Malware that locks your files and demands payment
- Sending fake emails to trick a user into clicking a link
- Attack that guesses passwords by trying lots of different combinations
- Accessing a computer system without permission
- A secret set of characters used to secure an account
- A dishonest scheme used to trick people
- Type of password that makes brute force attacks take a very long time
20 Clues: General term for malicious software • A dishonest scheme used to trick people • Accessing a computer system without permission • Malware that locks your files and demands payment • A secret set of characters used to secure an account • Software designed to protect your device from malware • The process used with 2FA to verify a user's identity • ...
Media B4nter 2014-04-23
Across
- Men look for fertile women; women look for men with resources.
- Successful individuals of high status.
- Found that older people were interested in celebrity gossip because it helped them form social networks with other people.
- Course of conduct involving two or more events of harassment.
- Fans with severe deficits in sense of personal identity crave celebrity worship.
- Found that the more people saw a character, the more positive meaning they gave it.
- Given time and repeated exposure we can grow to like most things.
- Children develop an Internal Working Model of relationships in infancy.
Down
- Scale that measures three dimensions of celebrity worship.
- Found that gender only accounted for 3% of individual differences.
- Found that resistant types are often very emotional, but have negative views about themselves. Intense celebrity attraction allows development of connection without fear of rejection.
- One sided relationship.
- Showed that female birds were attracted to males with most complex songs.
- The love of novel/new things.
- Exchanging information that is beneficial to keep track of alliances and relationships.
15 Clues: One sided relationship. • The love of novel/new things. • Successful individuals of high status. • Scale that measures three dimensions of celebrity worship. • Course of conduct involving two or more events of harassment. • Men look for fertile women; women look for men with resources. • Given time and repeated exposure we can grow to like most things. • ...
Crossword Puzzle - IT LEC Project 2019-11-16
Across
- is a software that aims to gather information about an organization or a person without his or her knowledge.
- allows users to access web pages and web 2.0 programs.
- us a type of malware that can block access the victims data.
- is the appearance of motion created by displaying a series of still images in sequence.
- adds yours email name and address
- consist of full motion images that are played back at various speeds
- refers to ad-supported programs, games, or utilities that are distributed as adware.
- is a digital representation of nontext information.
Down
- is a business transaction that occurs over an electronic network.
- is the process of receiving information.
- is the process of transferring data in a continuous and even flow.
- refers to any application that combines text with graphics, Animation, Audio, Video and Virtual Reality.
- includes music, speech, or any other sound.
- is a worldwide collection of networks that links millions of business, government, agencies, education institutions and individuals.
- is a real-time typed conversation that takes place on a computer.
15 Clues: adds yours email name and address • is the process of receiving information. • includes music, speech, or any other sound. • is a digital representation of nontext information. • allows users to access web pages and web 2.0 programs. • us a type of malware that can block access the victims data. • is a business transaction that occurs over an electronic network. • ...
1984 Crossword Puzzle 2019-09-10
Across
- Special words or expressions that are used by a particular profession or group.
- Of or characteristic of the middle class, typically with reference to it's perceived.
- Softened or matured by age or experience.
- Showing willingness to allow the existence of opinions or behavior.
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- Offering Nothing that is stimulating or challenging.
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time.
- Intense and eager enjoyment, interest, or approval.
- A secret plan by a group to do something unlawful or harmful.
- Fail to resist pressure, temptation, or some other negative force.
Down
- A political and economic theory of social organization.
- The action subjecting a country or person to one's control, or the fact of being subjected.
- The state of practice of refraining from extramarital, or especially from all, sexual intercourse.
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- Discover or identify the presence or existence of.
15 Clues: Softened or matured by age or experience. • Discover or identify the presence or existence of. • Intense and eager enjoyment, interest, or approval. • Offering Nothing that is stimulating or challenging. • A political and economic theory of social organization. • A secret plan by a group to do something unlawful or harmful. • ...
IT Crossword Puzzle 2020-11-09
Across
- for internet protocol
- electronic device for storing and processing data according to instructions given to it in a variable program
- which is capable of copying itself and has a detrimental effect, such as corrupting the system or destroying data
- person who uses computers to gain unauthorized access to data
- most popular operating system for personal computers
- computer that is portable and suitable for use while traveling
- computer input device in the form of a small panel containing different touch-sensitive areas
- open-source operating system modeled on UNIX
Down
- imagery
- series of coded software instructions to control the operation of a computer or other machine
- nelectronic communications network that connects computer networks and organizational computer facilities around the world
- very powerful computer
- high-level general-purpose programming language, also a type of snake
- structured set of data held in a computer
- printed circuit board containing the components of a computer, with connectors for other circuit boards to be slotted into
15 Clues: imagery • for internet protocol • very powerful computer • structured set of data held in a computer • open-source operating system modeled on UNIX • most popular operating system for personal computers • person who uses computers to gain unauthorized access to data • computer that is portable and suitable for use while traveling • ...
Social media 2023-09-26
Across
- To be seen or heard by people through the media
- Person interested in someone and who follows their evolution especially on social networks.
- Very popular after spreading quickly on the internet.
- The polite way of expressing yourself with other people when you use the internet.
- A word with the symbol # in front of it.
- Where information comes from
- A series of email messages or messages on a forum about a particular subject
- To send a direct message to someone.
Down
- Someone who writes negative and hostile comments on a website in order to provoke people.
- The way news is reported on television or radio or in the newspapers
- People who use social media to promote products so that other people will buy them.
- A series of organized activities designed to achieve a particular social, commercial or political result.
- A link on a website that is designed to catch people's attention.
- An image, video that spreads very quickly on the internet.
- To be frequently mentioned or discussed on the internet, particularly on social media platforms.
15 Clues: Where information comes from • To send a direct message to someone. • A word with the symbol # in front of it. • To be seen or heard by people through the media • Very popular after spreading quickly on the internet. • An image, video that spreads very quickly on the internet. • A link on a website that is designed to catch people's attention. • ...
Information Security in Artificial intelligence 2023-11-27
Across
- The branch of artificial intelligence that enables computer systems to improve their performance through experience
- Physiological or behavioral characteristics of an individual used for authentication
- The practice of protecting networks and computer systems from digital attacks
- The process of algorithmically transforming information to hide its content
- A form of communication used to send and receive electronic messages
- Relates to the concept of protecting personal information from being improperly collected, processed or shared
- A computational model that mimics the structure of the human brain and is used for learning and decision-making in artificial intelligence
Down
- A complex neural network technique that simulates the human learning process
- A person who breaks into a computer system or network
- A set of instructions used in artificial intelligence to solve problems and perform tasks
- Malicious software that can damage a computer or steal data
- Information for machine learning and analytics
- A security system used to prevent unauthorized access to a network system
- A communication channel connecting computers to each other
- Weaknesses in system security that can be exploited
15 Clues: Information for machine learning and analytics • Weaknesses in system security that can be exploited • A person who breaks into a computer system or network • A communication channel connecting computers to each other • Malicious software that can damage a computer or steal data • A form of communication used to send and receive electronic messages • ...
Women,Technology, & Environment Unit 10 Choice Board 2021-05-03
Across
- a document by Elizabeth Cady Stanton that was signed in 1848 by 68 women and 32 men—100 out of some 300 attendees at the first woman's rights convention to be organized by women
- soviets launched sputnik in 1957 and the US created NASA
- chief operating officer of facebook
- first female & third prime minister of india
- research and techniques used in farming to increase food production
- bulky-room sized machines, difficult to use back then
- great britain's first female prime minister
Down
- stood as a symbol on a poster that stated " we can do it" as a symbol for woman in the workforce & women's independence
- female prime minister of pakistan 1988-1990 & 1993-1996
- British political activist and leader of the british suffrage movement that helped women win the right to vote in britain
- I am a female who wants equal rights with men
- movement of people in cities
- first female president of philippine
- connection of computer networks around the world
- primary source for news and global events in the 1950's
15 Clues: movement of people in cities • chief operating officer of facebook • first female president of philippine • great britain's first female prime minister • first female & third prime minister of india • I am a female who wants equal rights with men • connection of computer networks around the world • bulky-room sized machines, difficult to use back then • ...
CROSSWORD 2022-03-29
Across
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- Microsoft is setting up its largest data center in India in this city
- Founder of world wide web - Tim _____ Lee
- Digital dexterity is a term coined by
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- The acronymn for 5 tech stocks that replaced FAANG
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
Down
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- Society 5.0 is an intiative by which country
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Project _____ is BPCL's initiative on the digital front
- India's latest unicorn which is into developing software for OTT networks
- Cloud computing service that provides computing, storage and networking resources on demand
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Shaun Rose 2024-01-09
Across
- a written description of how a command or piece of code works or was developed.
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- NOT, AND, and OR, which evaluate to a Boolean value.
- a named reference to a value that can be used repeatedly throughout a program.
- Finding and fixing problems in an algorithm or program.
- A chunk of data sent over a network.
Down
- a named group of programming instructions.
- A type of computer that forwards data across a network
- the inputs and outputs that allow a user to interact with a piece of software.
- any data that are sent from a program to a device.
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- data about data
- form of program documentation written into the program to be read by people and which do not affect how a program runs.
- an ordered sequence of characters.
- a combination of operators and values that evaluates to a single value
15 Clues: data about data • an ordered sequence of characters. • A chunk of data sent over a network. • a named group of programming instructions. • any data that are sent from a program to a device. • NOT, AND, and OR, which evaluate to a Boolean value. • A type of computer that forwards data across a network • Finding and fixing problems in an algorithm or program. • ...
unit-26-28-ÉFT-12/B 2024-11-26
Across
- self copying programs
- Banks that don't have physical branches are brick-and-... ..
- Electronic equivalent of a ...-wallet for online shopping.
- The exchange of goods and services over the WEB.
- Many people belive they have been offered a special gift only to find out later they have been decived.
- Programs that spread by attaching themselfs to executable files.
- Crackers try to find a way to copy the latest game or computer program.
- A ... gateway, an interface between the website and the bank that accepts the electronic payment.
- The type off banking where you can use mobile phone networks to platform transactions.
Down
- Software created by crakers.
- One of the best methods of identifying the user of a bank account is ... authentication, the use of a finger print or faceID.
- Companies whose activity is centered on the Internet.
- One fo the programs used to help shoppers while ordering on the Internet is called ... cart program.
- Most online banks have introduced the concept of two-factor ...
- Bank fraud to get banking information such as passwords.
15 Clues: self copying programs • Software created by crakers. • The exchange of goods and services over the WEB. • Companies whose activity is centered on the Internet. • Bank fraud to get banking information such as passwords. • Electronic equivalent of a ...-wallet for online shopping. • Banks that don't have physical branches are brick-and-... .. • ...
Cloud Tecnology 2025-05-13
Across
- – The system’s capacity to automatically adjust resources according to workload.
- – Cloud environment open to multiple organizations and managed by a third-party provider.
- – A cloud infrastructure operated solely for one organization.
- – A combination of public and private cloud systems working together.
- – The ability of a system to grow or shrink to meet demand.
Down
- – A facility that houses computer systems and related components like storage and networking.
- – Online storage model in which data is stored on remote servers accessed via the internet.
- – Software that is delivered and accessed over the internet, usually on a subscription basis.
- – The maximum data transfer rate of a network or internet connection.
- – The creation of virtual versions of physical components like servers or networks.
- – A model for enabling on-demand access to shared computing resources over the Internet.
- – Cloud service that provides virtualized computing infrastructure over the internet.
- – The amount of time a system or service is available and running.
- – The time delay between a user action and the response from the system.
- – Cloud service that offers a platform for developers to build, test, and deploy applications.
15 Clues: – The ability of a system to grow or shrink to meet demand. • – A cloud infrastructure operated solely for one organization. • – The amount of time a system or service is available and running. • – The maximum data transfer rate of a network or internet connection. • – A combination of public and private cloud systems working together. • ...
Networking Concept 2025-06-03
Across
- one benefit of computer networking as shared resources like printers and files can lower expenses.
- device in a Local Network.
- network structure combining characteristics of star and bus topology often used in large organisation.
- a type of network that spans a city or large campus larger than a LAN but smaller than a VAN.
- device or point in a network that can send receive or forward data.
- send data between computer networks.
- a global network of connected computers.
Down
- and technology is used to protect data and resources in a network from unauthorized access.
- network setup where is devices connected to other forming a circular pathway.
- a group of computers linked together.
- physical media used to connect network devices such as Ethernet or fibre optic.
- a network connect two or more computers located at distant places.
- a small network like in a school.
- Central device that connect multiple computer in a network and sent started to all of them.
- connect a home or school network to the internet.
15 Clues: device in a Local Network. • a small network like in a school. • send data between computer networks. • a group of computers linked together. • a global network of connected computers. • connect a home or school network to the internet. • a network connect two or more computers located at distant places. • ...
NETWORKS 2021-09-06
Networks 2014-07-02
Cisco Chapter 1 Crossword 2020-09-24
Across
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Applications can be accessed over the Internet through a subscription.
- Interactive websites where people create and share user-generated content with friends and family
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Hosts that provide information
- Examples include routers, switches and wireless access points
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of network provides access to users over a small geographical area
- Real-time communication between two or more people
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
Down
- identify the physical location of intermediary devices and cable installation.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- lol
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Something that helps people work together on a particular file or piece of software
- Examples include copper, fiber and wireless
- Private networks in use by just one company
- limits the impact of a failure, so that the fewest number of devices are affected.
- Type of network provides access to users over a large geographical area
- Web pages that groups of people can edit and view together
- Provides the physical connection to the network at the PC or other host device
- Having multiple paths to a destination
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- allows people to share files with each other without having to store and download them from a central server
- Identify devices, ports, and addressing scheme.
39 Clues: lol • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Examples include copper, fiber and wireless
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Examples include routers, switches and wireless access points
- Interactive websites where people create and share user-generated content with friends and family
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- limits the impact of a failure, so that the fewest number of devices are affected.
- allows people to share files with each other without having to store and download them from a central server
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Hosts that provide information
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Type of network provides access to users over a large geographical area
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Down
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- identify the physical location of intermediary devices and cable installation.
- Applications can be accessed over the Internet through a subscription.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Web pages that groups of people can edit and view together
- Private networks in use by just one company
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- lol
- Provides the physical connection to the network at the PC or other host device
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a small geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Having multiple paths to a destination
- diagram Diagram of a network
- Real-time communication between two or more people
- Identify devices, ports, and addressing scheme.
40 Clues: lol • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Hosts that provide information
- Private networks in use by just one company
- Web pages that groups of people can edit and view together
- limits the impact of a failure, so that the fewest number of devices are affected.
- Applications can be accessed over the Internet through a subscription.
- identify the physical location of intermediary devices and cable installation.
- yes
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Identify devices, ports, and addressing scheme.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a large geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- Real-time communication between two or more people
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Interactive websites where people create and share user-generated content with friends and family
Down
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Hosts that request information
- allows people to share files with each other without having to store and download them from a central server
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a small geographical area
- Having multiple paths to a destination
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Examples include routers, switches and wireless access points
41 Clues: yes • diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Modern Technology Terms 2023-05-18
Across
- Rechargeable battery used to power a laptop.
- Protection of computer systems and networks from theft or damage.
- Latest version of USB used for connecting devices to a computer.
- Online meeting conducted using Zoom video conferencing software.
- Network security system that monitors and controls incoming and outgoing network traffic.
- Two dimensional barcode used for storing information.
- Display screen that responds to touch input.
- Networking device that forwards data packets between computer networks.
- Small application designed to run within a web browser.
- Unit of digital image resolution equal to one million pixels.
- Programming language used to create interactive web pages.
- Settings for configuring a firewall.
- Video sharing platform.
- Portable storage device that uses USB technology.
- Software used for creating and managing backups of data or files.
- Software that securely stores and manages passwords.
- Portable computer designed for use on a lap or desk.
- Protection of internet connected devices from threats and attacks.
- Software used to access and view websites on the internet.
- Software that manages computer hardware and software resources.
- Input device used to type text and commands into a computer.
- Portable computer designed for use on a lap or desk.
- Branch of physics that studies the behavior of matter and energy at the quantum level.
- Network of physical devices, vehicles, and other objects connected to the internet.
- Software that reads and interprets XML documents.
- Process of creating and restoring backups of data or files.
- Design, construction, and operation of robots.
- Mathematical formula used for encrypting and decrypting data.
- Delivery of computing services over the internet.
- Physical or logical arrangement of network devices and connections.
- Software that can perform tasks or provide information in response to voice commands.
- Simulation of human intelligence in machines.
- Measure of the effectiveness of a password in preventing unauthorized access.
- Mobile phone with advanced computing capabilities.
- Process of analyzing large sets of data to discover patterns and relationships.
- Protection of computer networks from unauthorized access or attacks.
- Integration of digital information with the physical environment.
Down
- Software designed to harm or disrupt computer systems.
- Online platforms for sharing information and connecting with others.
- Universal Serial Bus used for connecting devices to a computer.
- Network security system that monitors and controls incoming and outgoing network traffic.
- Head mounted display used for virtual reality experiences.
- Design and development of robots and robotic systems.
- Display screen that responds to touch input.
- Set of instructions for solving a problem or completing a task.
- Extensible Markup Language used for storing and transporting data.
- Input device used to control the movement of a cursor on a computer screen.
- Process of analyzing and interpreting data to gain insights and make decisions.
- Account on YouTube used for uploading and sharing videos.
- Representation of data in visual form, such as charts or graphs.
- Set of instructions for controlling network traffic.
- Programming language used for developing applications and software.
- Hypertext Markup Language used to create web pages.
- Use of GPS technology for tracking the location of a person or object.
- Arrangement of keys on a keyboard.
- Unit of digital information equal to one billion bytes.
- Video uploaded to YouTube for sharing and viewing.
- Combination of keys used to perform a specific task.
- Global Positioning System used for navigation and location tracking.
- Social media platform for sharing photos and videos.
- Set of rules for validating XML documents.
- Secret code used to access a computer or online account.
- Group of interconnected devices and computers.
- Process of converting data into a code to prevent unauthorized access.
- Online seminar conducted using Zoom video conferencing software.
- Process of removing malware from a computer system.
- Wireless networking technology that uses radio waves to provide high speed internet and network connections.
- Use of social media platforms for marketing and advertising.
- Latest version of HTML used for creating web pages.
- Computer generated simulation of a three dimensional environment.
- Use of GPS technology for navigation and location tracking.
- Code used to encrypt and decrypt data.
- Backup of data or files stored in the cloud.
- Use of quantum mechanical phenomena to perform computing tasks.
- Process of creating and maintaining websites.
- Purchasing goods or services over the internet.
- Copy of data or files made in case the original is lost or damaged.
- Conducting banking transactions over the internet.
- Online storage service for data and files.
- Software used for creating and editing HTML code.
- Wireless communication technology for short range data exchange.
- Video conferencing software.
82 Clues: Video sharing platform. • Video conferencing software. • Arrangement of keys on a keyboard. • Settings for configuring a firewall. • Code used to encrypt and decrypt data. • Set of rules for validating XML documents. • Online storage service for data and files. • Rechargeable battery used to power a laptop. • Display screen that responds to touch input. • ...
Information Technologies 2023-09-05
Across
- software written to solve problems such as payroll processing, financial analysis or creation of contracts. Usually this type of software is purchased, however there are free open-source versions.
- Rather than needing to buy application software and host it on a corporate computer systems which entail high up-front costs, SAAS is a lease and pay as you payment option. The key difference is the software resides at the software vendor’s data center which can be problematic for certain contexts (such as hospitals). SAAS has helped many small businesses reduce their start-up costs and complexity.
- a principal that computers double in speed ever 18 to 24 months
- a roadmap created by an organization to describe its current processes, and goals, and focuses on ensuring the data, apps, and technology infrastructure support business operations and strategy
- glass ‘wire’ tubes (made from melted beach sand) that were installed in the walls of homes and businesses, by the side of roads and underground (and under oceans) for super fast data transmission.
- software that can read an image such as a pdf and turn it into a document that can be edited.
- the brain of the computer that accepts programmed instructions, data to control tasks and perform calculations
- the measurement of actual data transmission spped
- older information system including hardware, operating system, and application software which remains in use because it still works.
- language a programming language that builds objects such as a button, input box, or chart and gives them attributes and capabilities (such as printing, displaying data or validating data entry) or that leverages programming objects built by others. The idea is that the code is organized when it is embedded in the objects.
- copper wires that were installed in the walls of homes and businesses used for higher speed cable TV and cable modems
- A group of interconnected computing devices tht can share resources and communicate data using standard (rather than proprietary meaning company owned) protocols. Inside a building another name is local area network which use Ethernet wired technology or WIFI
- the copper wires of old telephone networks which were installed in the walls of homes and businesses. It was an engineering feat to use these wires for DSL (highspeed) data transmission
Down
- an in-home or business computing device that connects to the fiber optics or cable coaxial cable modem and creates a WIFI network used to connect devices to the Internet.
- a data storage, processing and transmitting technology embedded into labels that is used to track the location and movement of assets such as pallets of inventory.
- software used to write computer programs which are instructions to process data. Popular examples are Python, C#, C++, and Visual Basic.
- written instructions that control computer data processing and hardware. The software controls the hardware and tells it what to do such as calculating payroll using different business rules to implement different tax structures.
- the maximum BPS that a network channel can transmit. Slang usage is a meaure of the capacity of a person or department to get work done.
- software that controls and connects the different parts of the computer such as disk storage, RAM, the keyboard, screen and the CPU to the application software.
- the data transmission protocol invented by Americans and UK engineers that created the Internet
- as opposed to disk drives, and solid state memory which are used for permanent storage, RAM computer chips are used to temporarily store and manipulate data. Data is copied from permanent storage into RAM for ‘in-memory’ processing such as calculation of metrics.
- a computer generated bot that uses AI to support your information needs, for example to choose the best flight to Florida.
- software modules (such as a print driver) that are created by programmers and can be freely used by other programmers to build new application software.
- voice over internet protocol a technology that enables telephone calls over the internet rather than private networks managed by telephone companies.
- rather than rely of copper or glass ‘wires’ WIFI uses radio waves emitted from a system of cellular towers.
- an electronic device that can be programmed to accept data input, store it, manipulate it and output data.
- transmission the ability to transmit data without wires either long distances (5G networks) or short distances (bluetooth).
27 Clues: the measurement of actual data transmission spped • a principal that computers double in speed ever 18 to 24 months • software that can read an image such as a pdf and turn it into a document that can be edited. • the data transmission protocol invented by Americans and UK engineers that created the Internet • ...
cscw01 2021-12-03
Across
- Unencrypted information.
- A collection of computers compromised by malicious code and controlled across a network.
Down
- Software that compromises the operation of a system by performing an unauthorized function or process.
- The interdependent network of information technology infrastructures, that includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
- A list of entities that are blocked or denied privileges or access.
5 Clues: Unencrypted information. • A list of entities that are blocked or denied privileges or access. • A collection of computers compromised by malicious code and controlled across a network. • Software that compromises the operation of a system by performing an unauthorized function or process. • ...
Ethernet Standards 2025-10-16
Across
- Improved Ethernet offering speeds of up to 100 Mbps.
- Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs.
- LAN stands for:
Down
- Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
- This was the original standard, offering speeds of up to 10 Mbps.
5 Clues: LAN stands for: • Improved Ethernet offering speeds of up to 100 Mbps. • This was the original standard, offering speeds of up to 10 Mbps. • Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs. • Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
Crack the Cold War Code 2024-12-13
Across
- A Soviet clerk who defected to Canada, exposing Soviet spy networks and starting the Cold War
- Canadian-built fighter jet was designed to defend North America from Soviet bombers during the Cold War
- A radar system built in Canada's north to detect Soviet missile attacks during the Cold War
- Communist superpower
- A defense alliance between Canada and the U.S. to defend against Soviet missile attacks
- Canada's key military partner during the Cold War
- A competition between the U.S. and the Soviet Union to build powerful weapons during the Cold War
Down
- A military alliance that included Canada, created to protect against Soviet expansion
- An economic system based on private ownership and free markets
- An economic and political system where the government controls production, central to Cold War tensions
- In the Cold War, Canada was often referred to as a "Middle ______"
- A period of tension between the U.S. and the Soviet Union without direct fighting
- This "scare" symbolized the hunt for Soviet spies in Canada
13 Clues: Communist superpower • Canada's key military partner during the Cold War • This "scare" symbolized the hunt for Soviet spies in Canada • An economic system based on private ownership and free markets • In the Cold War, Canada was often referred to as a "Middle ______" • A period of tension between the U.S. and the Soviet Union without direct fighting • ...
Their are dashes between the words 2024-01-19
Across
- private network that uses internet technologies, but its resources are made available only to external
- limited in range to only a few feet
- a portion of a network with a common network address
- geographically isolated and connected to form a large internetwork
- a computer system controlled by a single organization
- geographically dispersed WAN connections that connect multiple LANs
Down
- it uses radio signals instead of wires to connect systems together
- a network that covers an area as small as a few city blocks to as large as an entire metropolitan city
- network made up of an interconnection of local area networks within a limited geographical area, such as a university's campus
- network that uses software to control connectivity, management and services between data centers and remote branches
- a network in a small geographic area,
- a private network that uses internet technologies
- a large world-wide public network
13 Clues: a large world-wide public network • limited in range to only a few feet • a network in a small geographic area, • a private network that uses internet technologies • a portion of a network with a common network address • a computer system controlled by a single organization • it uses radio signals instead of wires to connect systems together • ...
Mobile Communication Basics 2025-03-20
Across
- The fifth-generation mobile communication standard, known for ultra-fast speeds
- This component in GSM acts as a bridge between BTS and MSC
- The third-generation (3G) mobile communication standard
- A key component of GSM architecture responsible for routing calls and managing mobility
- The high-speed wireless technology introduced in 4G networks
- The radio interface between the mobile phone and the base transceiver station in GSM
- The first generation of mobile communication (1G) used this type of technology
- A database that temporarily stores subscriber information when they roam into a new area
Down
- This technology introduced packet-switched data transmission in 2.5G
- A mobile device connects to this station for communication with the network
- The technology that allows multiple users to share the same frequency band in GSM
- The process of dividing a geographic area into smaller regions for better frequency reuse
- This GSM element keeps a database of all mobile subscribers permanently registered in the network
13 Clues: The third-generation (3G) mobile communication standard • This component in GSM acts as a bridge between BTS and MSC • The high-speed wireless technology introduced in 4G networks • This technology introduced packet-switched data transmission in 2.5G • A mobile device connects to this station for communication with the network • ...
Computer Science Crossword 2025-10-04
Across
- Security device or software that filters network traffic based on rules.
- A device that connects two or more networks and directs data between them.
- Solid State Drive: fast storage device based on flash memory with no moving parts.
- The part of the CPU responsible for arithmetic and logical operations.
- The process of removing unnecessary details to focus on the essential parts of a problem.
- A network covering a small geographic area, such as a building.
- Number system using only 0s and 1s; also known as base 2.
Down
- Software designed with malicious intent to harm or access data.
- A translator that converts source code to machine code in a single pass.
- A named value in a program that can store data and be changed during execution.
- Search algorithm that repeatedly divides an ordered list in half to find a value.
- Random Access Memory: temporary storage for programs and data that is lost when power is off.
- Software that controls the operation of the computer and provides a user interface.
13 Clues: Number system using only 0s and 1s; also known as base 2. • Software designed with malicious intent to harm or access data. • A network covering a small geographic area, such as a building. • The part of the CPU responsible for arithmetic and logical operations. • A translator that converts source code to machine code in a single pass. • ...
Internal Audit Newsletter 2022-04-01
Across
- Founder of world wide web - Tim _____ Lee
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital dexterity is a term coined by
- Society 5.0 is an intiative by which country
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- Cloud computing service that provides computing, storage and networking resources on demand
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- The acronymn for 5 tech stocks that replaced FAANG
Down
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- India's latest unicorn which is into developing software for OTT networks
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- Project _____ is BPCL's initiative on the digital front
- Microsoft is setting up its largest data center in India in this city
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Networking Basics 2023-01-26
Across
- A network device that moves traffic within an IP network
- A device, usually located on a building wall, that provides a port where a network cable can be connected.
- LAN is what type of area network?
- A cable that provides connectivity between network devices. "Network ____________"
- The principal communications protocol in the internet protocol suite that is used to route information over the internet. "Internet _______ "
- WAN is what type of area network?
- A network device that moves traffic between two different IP networks
Down
- What type of address is a unique, burned-into read-only memory address of a network interface?
- A computer component that provides a port where a network cable can be connected. "Network __________"
- A network of interconnected LANs across a large geographical location.
- group of networked computers that are physically close together, usually in the same building.
- Organizations that provide many services for accessing and using the Internet. "Internet Service _______"
- Short for modulator/demodulator
- Determines the range that an IP address falls within. "Default Address _______"
- An address assigned by software and, as such, can be changed
15 Clues: Short for modulator/demodulator • LAN is what type of area network? • WAN is what type of area network? • A network device that moves traffic within an IP network • An address assigned by software and, as such, can be changed • A network device that moves traffic between two different IP networks • ...
Industrial Revolution Vocabulary 2021-02-11
Across
- the movement of either people or animals from one area to another
- a boat that moves by steam power
- an instrument designed for the simultaneous transmission and reception of the human voice
- productive work (especially physical work done for wages)
- a powered rail vehicle used for pulling trains
- a person who migrates to another country, usually for permanent residence
- a refusal to work organised by a group of employees as a form of protest to gain a concession
- communication by transmitting signals over a wire
Down
- a system where businesses and services are mainly run by private people rather than the government
- a market structure characterized by a single seller, selling a unique product in the market
- an economy is transformed from a primary agriculture one to one based on the manufacturing of goods
- the money that a person or company has left after expenses have been paid
- networks of iron rails on which steam locomotives pulled long trains at high speeds
- an organized association of workers formed to protect and further their rights and interests
- a building where goods are made
15 Clues: a building where goods are made • a boat that moves by steam power • a powered rail vehicle used for pulling trains • communication by transmitting signals over a wire • productive work (especially physical work done for wages) • the movement of either people or animals from one area to another • ...
C4 How to Review the Literature and Develop Research Qs 2021-05-26
Across
- prediction or educated guess; formal statement of the researcher's prediction of the relationship that exists among the variable under investigation
- database containing entries from Psychological Abstracts
- education issue or problem within a broad topic area
- systematic review or integration of qualitative reesarch findings into a literature summary article
- question about the relationship that exists between two or more variables
- broad subject matter area to be investigated
- database containing information from Current Index to Journals in education and resources in education
Down
- research that relies primarily on the collection of qualitative data
- statement of researcher's intent or objective of the study
- database containing entries from all areas of business
- database containing entries from Sociological Abstracts
- quantitative technique that is used to integrate and describe the results of a large number of studies
- explanation or explanatory system that discusses how a phenomenon opeates and why it opeates as it does
- statement of the specific question the reseacher seeks to answer via empicial research
- network of networks consisting of millions of computers and tens of millions of users all world the world
15 Clues: broad subject matter area to be investigated • education issue or problem within a broad topic area • database containing entries from all areas of business • database containing entries from Sociological Abstracts • database containing entries from Psychological Abstracts • statement of researcher's intent or objective of the study • ...
Bubbles 2021-07-30
Across
- The primary grapes in Cava are Macabeu, Parellada, and _____.
- What term is used for sparkling wines from French regions other than Champagne, such as Alsace and the Loire?
- Traditional method sparkling wine from Northern Italy
- Sparkling wine gets it's bubbles by adding ____ and and sugar to the still wine, starting a secondary fermentation.
- The final sweetness level of Champagne is determined by the “dosage”. What does the label say when wine is bone dry/has little residual sugar?
- What do you call a bottling of wines from several different years?
- What is the term for sparkling wine made in Germany?
Down
- French Champagne house that produces Domaine Carneros in California
- In Champagne, large brands, known as ______, purchase many of their grapes from
- A sparkling wine produced with only white grapes is called _____?
- Sparking wine from Spain
- The three major grapes of champagne are Chardonnay, Pinot Noir, and _____
- Prosecco is made primarily with this grape?
- Before it is released, a vintage Champagne must be aged a minimum of how many years, according to French law?
- of smaller growers; and many smaller estates
15 Clues: Sparking wine from Spain • Prosecco is made primarily with this grape? • of smaller growers; and many smaller estates • What is the term for sparkling wine made in Germany? • Traditional method sparkling wine from Northern Italy • The primary grapes in Cava are Macabeu, Parellada, and _____. • A sparkling wine produced with only white grapes is called _____? • ...
Cyber Security 2021-07-20
Across
- Gaining unauthorised access to or control of a computer system.
- A self replicating malware that modifies code and programs.
- A group or person who is interested in creating disruptions or embarrassment through hacking.
- An attack where the perpetrator invents a story to convince the victim into providing money or data.
- ________ is created when data is processed and meaningful.
- Malware that infects a computer and spams the user with adds.
- Automated programs that perform tasks repeatedly.
- Multiple computers send packets or data to a system in an attempt to overload the network.
- ____ is raw fact and figures.
Down
- An attack where the victim receives and email disguised to resemble an official email.
- An attack where the attacker is watching the victim while they provide sensitive information.
- a form of virus that encrypts users data and requests payments to decrypt the data.
- A large collection of malware infected devices called zombies.
- A self replicating malware that spreads through the networks and uses system resources.
- A piece of malware that disguises itself to appear as a useful program.
15 Clues: ____ is raw fact and figures. • Automated programs that perform tasks repeatedly. • ________ is created when data is processed and meaningful. • A self replicating malware that modifies code and programs. • Malware that infects a computer and spams the user with adds. • A large collection of malware infected devices called zombies. • ...
1984 Crossword Puzzle 2019-09-10
Across
- Discover or identify the presence or existence of.
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- Of or characteristic of the middle class, typically with reference to it's perceived.
- Intense and eager enjoyment, interest, or approval.
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- Fail to resist pressure, temptation, or some other negative force.
Down
- Showing willingness to allow the existence of opinions or behavior.
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time.
- The state of practice of refraining from extramarital, or especially from all, sexual intercourse.
- The action subjecting a country or person to one's control, or the fact of being subjected.
- A secret plan by a group to do something unlawful or harmful.
- A political and economic theory of social organization.
- Offering Nothing that is stimulating or challenging.
- Special words or expressions that are used by a particular profession or group.
- Softened or matured by age or experience.
15 Clues: Softened or matured by age or experience. • Discover or identify the presence or existence of. • Intense and eager enjoyment, interest, or approval. • Offering Nothing that is stimulating or challenging. • A political and economic theory of social organization. • A secret plan by a group to do something unlawful or harmful. • ...
IT Era 2019-11-11
Across
- refers to the use of equipment such as machines or computers to accomplish previously human-exclusive taskq
- the appearance of motion created by displaying a series of still images in sequence
- a software that aims to gather information about an organization or a person without his or her knowledge
- a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals
- a real-time typed conversation that takes place on a computer
- a small version of a larger graphic
- consists of full-motion images that are played back at various speeds
- an online area in which users have written discussions about a particular subject
Down
- a serious phenomenon brought about by social media
- a type of malware that can block access to the victim's data
- includes music, speech, of any other sound
- a combination of the words internet and etiquette
- a digital representation of nontext information
- the process of transferring data in a continuous and even flow
- hardware devices that have the capability to measure an event, object, or any physical quality that is happening
15 Clues: a small version of a larger graphic • includes music, speech, of any other sound • a digital representation of nontext information • a combination of the words internet and etiquette • a serious phenomenon brought about by social media • a type of malware that can block access to the victim's data • a real-time typed conversation that takes place on a computer • ...
Business crossword 2023-11-01
Across
- Technology that allows users to make telephone calls over the Internet.
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem).
- Programs that instruct computers to perform specific operations.
- Computerized storage for information and facts.
- Computer software designed to mimic the knowledge of a human expert.
- A number you choose to gain access to an account.
- Working from home or a remote location.
- A navigational system that uses satellite technology to determine location and provide directions.
Down
- Technology that allows users to communicate over the Internet rather than through traditional public networks.
- The use of computer technology to plan, design, test, and alter products.
- A mobile phone with advanced capabilities, such as accessing the Internet.
- An object placed into orbit by humans; most are used for communications purposes.
- The use of computer software to control machines, tools, and processes involved in manufacturing products.
- Technology that allows users to make telephone calls over the Internet.
- The practical application of science to society and industry.
- A system of computers connected together by telephone wires, cable wires, or other means.
16 Clues: Working from home or a remote location. • Computerized storage for information and facts. • A number you choose to gain access to an account. • The practical application of science to society and industry. • Programs that instruct computers to perform specific operations. • Computer software designed to mimic the knowledge of a human expert. • ...
HC U3 Vocab 2023-09-21
Across
- attraction between oppositely charged particles
- when 2 atoms share two pairs of electrons
- measure of its ability to respond to an electric field and acquire an electric dipole moment
- formed when electrons are shared between 2 atoms
- the 3- dimensional structure or arrangement of atoms in a molecule
- composed of atoms covalently bonded together into a 3- dimensional network or layers of 2- dimensional networks
- points toward the more electronegative element/ atom in the structure of molecule
Down
- region in which electrons are most likely to be found (bonding or non bonding)
- energy required to convert one mole of an ionic solid into gaseous ionic constituents
- formed by the transferring of electrons
- no integer charge value when measured in elementary charge units
- valence shell electron pair repulsion
- tendency of atoms to prefer to have eight electrons in the valence shell
- process by which ions are formed by gain or loss of an electron from an atom or molecule
- ability of a material to conduct heat from its one side to the other
15 Clues: valence shell electron pair repulsion • formed by the transferring of electrons • when 2 atoms share two pairs of electrons • attraction between oppositely charged particles • formed when electrons are shared between 2 atoms • no integer charge value when measured in elementary charge units • the 3- dimensional structure or arrangement of atoms in a molecule • ...
CROSSWORD PUZZLE!! 2024-05-16
Across
- This is platform, object-oriented programming language.
- This covers all technical means used to handle information and aid communication.
- It specifies accessibility to changing variables, methods, and classes.
- A style or method of cooking, especially as characteristics of a particular country, region, or establishment.
- This is an issue that can have significant impact on the individual's mental and emotional well being.
- This can be frustrating to people.
Down
- A compulsive need to spend a lot of time in the internet.
- The various of methods used to prepare food.
- A variable that has been allocated "Statically"; This only declares with a "static" keyword.
- An illness caused by bacteria or other toxins in food.
- A list of dishes available in a restaurant.
- This is a type of access modifier that allows access inside the class, subclass, or other classes of the same package as the modifier.
- It is a global computer network.
- Having to do cooking in the kitchen.
- This is the practice of protecting systems, networks, and programs from digital attacks.
15 Clues: It is a global computer network. • This can be frustrating to people. • Having to do cooking in the kitchen. • A list of dishes available in a restaurant. • The various of methods used to prepare food. • An illness caused by bacteria or other toxins in food. • This is platform, object-oriented programming language. • ...
1990s 2024-03-28
Across
- technology company created by Steve Jobs that creates computer and phone hardware
- in which the storing, organizing, and processing of data became the most important industries of all
- North American Free Trade Agreement
- wealthy Saudi and leader of Al Qaeda terrorist cell
- North Atlantic Treaty Organization, US's defensive military alliance
- First Lady in the 1990s behind healthcare reform efforts and later Senator and Secretary of State and first woman to win the popular vote for President of the US
- Clinton signed reductions of this in 1996
Down
- Clinton's impeachment centered around lies he made about this
- modern trade and tech have made the world more connected
- Dream of self-rule for Palestinian people living in Israel in the West Bank or Gaza
- Family and Medical Leave Law, allows protected time for new parents without pay
- technology company created by Bill Gates that creates computer software
- Republican agenda in the 1990s
- invention at the heart of the information age that allows people to connect on computer networks
- World Trade Organization, successor to GATT
15 Clues: Republican agenda in the 1990s • North American Free Trade Agreement • Clinton signed reductions of this in 1996 • World Trade Organization, successor to GATT • wealthy Saudi and leader of Al Qaeda terrorist cell • modern trade and tech have made the world more connected • Clinton's impeachment centered around lies he made about this • ...
Business technology 2024-02-27
Across
- computer-based networks and applications that help managers make informed decisions.
- any process that a business organization conducts over a computer-mediated network.
- all the technical means used to handle information and aid communication.
- a machine that dispenses cash or performs other banking services when an account holder inserts a bank card.
- tools, machinery, and other durable equipment.
- an 'automated' banking platform that does not require any banking representative/teller or a human cashier.
- a process that uses computers to create 2D drawings and 3D models of products.
- any electronic object or system that helps employees accomplish tasks.
Down
- a live meeting between two or more people in different locations.
- the use of telecommunication devices to hold discussions between participants in different locations.
- a system of interconnected electronic components or circuits.
- the programs and other operating information used by a computer.
- a way to conduct financial transactions electronically through a bank's website or mobile app.
- the process of organizing and preserving digital information for future access and retrieval.
- commercial transaction conducted electronically on the internet
15 Clues: tools, machinery, and other durable equipment. • a system of interconnected electronic components or circuits. • commercial transaction conducted electronically on the internet • the programs and other operating information used by a computer. • a live meeting between two or more people in different locations. • ...
5.04 BE 2024-09-17
Across
- Programs that instruct computers to perform specific operations
- A system of computers connected together by telephone wires, cable wires, or other means
- Technology that allows users to make telephone calls over the Internet
- An object placed into orbit by humans; most are used for communications purposes
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- Computerized storage for information and facts
- A navigational system that uses satellite technology to determine location and provide directions
Down
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- A number you choose to gain access to an account
- Computer software designed to mimic the knowledge of a human expert
- The practical application of science to society and industry
- The use of computer technology to plan, design, test, and alter products
- Working from home or a remote location
- A mobile phone with advanced capabilities, such as accessing the Internet
- Technology that allows users to communicate over the Internet rather than through traditional public networks
15 Clues: Working from home or a remote location • Computerized storage for information and facts • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
10-1 Ch. 3 Identity, Media, and Communication Technology Part 1TNN 2024-09-30
Across
- the interconnection of information and communications technologies, computer networks, and media content
- a process wherein fewer individuals or organizations control shares of the mass media
- the evaluation or estimation of the nature, quality, or ability of someone or something
- how you view yourself
- the customs, arts, social institutions, and achievements of a particular nation, people, or other social group
- the process by which businesses or other organizations develop international influence or start operating on an international scale
- how you view a belief, idea, issue etc.
Down
- an alliance for combined action (to fulfill a specific goal)
- cultural modification of an individual, group, or people by adapting to or borrowing traits from another culture
- when you spend much time physically alone on technology (even if you are communicating with other people)
- how a collective views a belief, idea, issue etc.
- the imparting or exchanging of information or news
- a person whose first language is French
- (of people)inhabiting or existing in a land from the earliest times or from before the arrival of colonists
- media that communicates its message all around the world
15 Clues: how you view yourself • a person whose first language is French • how you view a belief, idea, issue etc. • how a collective views a belief, idea, issue etc. • the imparting or exchanging of information or news • media that communicates its message all around the world • an alliance for combined action (to fulfill a specific goal) • ...
compsci 2025-04-09
Across
- cybercrime where attackers, posing as legitimate entities, use deceptive methods, often through email or text
- a standard encoding system that assigns a unique numeric value to every character, regardless of the platform, program, or language
- State Hard Drive
- a semiconductor device used to amplify or switch electrical signals and power
- refers to the frequency at which a processor's clock generator pulses
- any software designed to harm, exploit, or compromise devices, networks, or data.
- a hardware or software component that stores frequently accessed data
- gate a fundamental electronic circuit that performs a basic logical operation on one or more binary inputs
Down
- cycle fundamental process by which a CPU processes instructions, consisting of fetching the instruction from memory,
- a data storage device that uses integrated circuits to store data
- type of malware that encrypts the victim's personal data until a ransom is paid
- Basic Input/Output System
- a fundamental component of a computer's central processing unit
- Engineering the term used for a broad range of malicious activities accomplished through human interactions
- character encoding standard for electronic communication
15 Clues: State Hard Drive • Basic Input/Output System • character encoding standard for electronic communication • a fundamental component of a computer's central processing unit • a data storage device that uses integrated circuits to store data • refers to the frequency at which a processor's clock generator pulses • ...
CyberSecurity 2025-06-19
Across
- The use of physical characteristics, such as fingerprints, to verify identity.
- A copy of data stored separately to protect against data loss.
- Software that secretly monitors and collects information about users.
- A service that encrypts your internet connection and hides your IP address.
- A type of malware that threatens to publish or block access to data unless a ransom is paid.
- A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
- The process of verifying the identity of a user or device.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Software designed to detect and destroy computer viruses.
- A secret word or phrase used to gain access to a system.
- A network security device that monitors and filters incoming and outgoing network traffic.
- The process of converting information or data into a code to prevent unauthorized access.
- Unwanted or unsolicited email messages.
- An individual who uses technical skills to gain unauthorized access to systems.
15 Clues: Unwanted or unsolicited email messages. • A secret word or phrase used to gain access to a system. • Software designed to detect and destroy computer viruses. • The process of verifying the identity of a user or device. • A copy of data stored separately to protect against data loss. • Software that secretly monitors and collects information about users. • ...
Animal Cell 2021-10-06
Across
- membrane-bound organelles they handle waste products, taking in waste products and get rid of them
- a nonmembranous body make of protein and RNA and the site of ribosome synthesis
- where proteins are synthesized
- Contains DNA and directs cells activities
- contains no ribosomes and functions in lipid synthesis, absorption of fats, and metabolism of drugs
- Boundary that holds cell contents, move substances in and out of the cell and uses signal transduction
- make up most of the cell volume, a clear liquid (cytosol), cytoskeleton, and networks of membranes and organelles
- transports materials within the cell, provide attachment for ribosomes and synthesizes lipids
Down
- condensed DNA in which is formed during cell division
- packages protein molecules for transport and secretion
- the double-layered layer that contains relatively large nuclear pores
- release energy from nutrient molecules and change energy into a usable form
- enables a sperm cell to move
- contains ribosomes and functions in protein synthesis and processing
- digest worn cellular parts or substances that enter cells
- near the nucleus usually in pairs and involved in the development of spindle fibers in cell division
- propel fluid over cellular surfaces
17 Clues: enables a sperm cell to move • where proteins are synthesized • propel fluid over cellular surfaces • Contains DNA and directs cells activities • condensed DNA in which is formed during cell division • packages protein molecules for transport and secretion • digest worn cellular parts or substances that enter cells • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- 10. Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The illegal trade and distribution of drugs is called drug ________
- Illegal networks that distribute drugs internationally
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- Excessive use of drugs can lead to ________, which can be fatal.
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Many drug users experience this mental condition, causing sadness and hopelessness.
- In the long term, drug use leads to ___________, making it hard to stop
Down
- The illegal act of transporting or selling drugs
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- A harmful mental effect caused by drug use, where users see things that aren't real
- Drug users often experience ________, a mental disorder involving intense fear
- The condition of relying on drugs and unable to function without them
- The misuse of substances that affect both physical and mental health
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- Drug users are often involved in illegal ________ acts to support their addictio
- Drug addiction often leads to losing this, impacting economic productivity.
- A fatal consequence of drug use, often from excessive consumption
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Ancient history egypt 2024-10-28
Across
- - Ancient Egyptian writing system using pictographs and symbols.
- - Location of rock-cut tombs for New Kingdom pharaohs.
- - Massive statue with a lion’s body and a human head near Khafre’s pyramid.
- - Title given to Egyptian kings, considered gods on Earth.
- - Preserved body prepared for the afterlife in ancient Egypt.
- - Major temple complex dedicated to gods like Amun-Ra.
- - The river that was the lifeline of Egypt, providing fertile soil and transportation.
- - Land with which Hatshepsut established trade, known for luxury goods like myrrh.
Down
- - One of the first female pharaohs who expanded trade networks.
- - Site of temples built by Ramses II to honor his legacy and power.
- - Young pharaoh known for his intact tomb, discovered in the 20th century.
- - God of the afterlife, central to Egyptian religion in the Middle Kingdom.
- - Location of the Great Pyramid built for Pharaoh Khufu.
- - Material used for writing in ancient Egypt, made from a Nile plant.
- - Military technology introduced by the Hyksos during the Second Intermediate Period.
- - Known as Ramses the Great, he led military campaigns and built numerous temples.
- - Concept of truth, balance, and order maintained by the pharaoh.
17 Clues: - Location of rock-cut tombs for New Kingdom pharaohs. • - Major temple complex dedicated to gods like Amun-Ra. • - Location of the Great Pyramid built for Pharaoh Khufu. • - Title given to Egyptian kings, considered gods on Earth. • - Preserved body prepared for the afterlife in ancient Egypt. • - One of the first female pharaohs who expanded trade networks. • ...
