networks Crossword Puzzles
Cyber Terms and Concepts Review 2016-11-08
Across
- Cyber capability considered an ISR activity
- "Deny" effect w/ intent to permanently and completely deny access to the target
- Any device, computer program, or technique designed to create an effect in or through cyberspace (2 words, no space)
- One of the 4 cyber capabilities, secures DoD networks (2 words, no space)
- Interconnected, end-to-end set of information capabilities for warfighters
- Mission type intended to project power by the application of force
- Principle that cyberspace is a global, ___-____ domain
- OCO effects are classified as denial or _______
Down
- "Deny" effect meant to completely but temporarily deny access to the target
- Employment of cyber capes to achieve objectives in or through cyberspace (2 words, no space)
- Global domain within the information environment
- Cyberspace can be described in terms of 3 layers: Physical, ____, Cyber-Persona
- Cyber capability considered a non-intelligence activity to support follow on military ops
- Cyberspace limitation, can be difficult to confirm _____ in cyberspace
- OCO effect that can include degrade, disrupt or destroy
- Mission type intended to preserve the ability to use friendly cyberspace
16 Clues: Cyber capability considered an ISR activity • OCO effects are classified as denial or _______ • Global domain within the information environment • Principle that cyberspace is a global, ___-____ domain • OCO effect that can include degrade, disrupt or destroy • Mission type intended to project power by the application of force • ...
Teen Brain 2024-01-03
Across
- These natural chemicals act as pain relievers and produce feelings of euphoria
- ________ self talk is the habit of engaging in pessimistic or self-critical thoughts
- This brain region develops earlier than the prefrontal cortex, associated with emotions and rewards
- sleep The stage of sleep crucial for memory consolidation and learning
- The body's automatic reaction to a perceived threat, triggering increased heart rate and adrenaline release (acronym)
- Chemical messengers that transmit signals across neural synapses
- Often called the "love hormone," it fosters trust and social bonding
Down
- An acronym representing the neurotransmitters associated with positive feelings
- ________ pathways are the connections between neurons create networks that facilitate the transmission of signals
- Term for the brain's ability to change and adapt throughout adolescence
- Chemicals released during pleasurable activities, influencing teen behavior
- cortex The area of the brain responsible for decision-making and impulse control
- The process of the brain discarding weaker neural connections to increase efficiency
- The age range generally considered as 13-19 years old.
- A sleep hormone that regulates the sleep-wake cycle
- Known as the "feel-good" neurotransmitter, linked to mood regulation
16 Clues: A sleep hormone that regulates the sleep-wake cycle • The age range generally considered as 13-19 years old. • Chemical messengers that transmit signals across neural synapses • Known as the "feel-good" neurotransmitter, linked to mood regulation • Often called the "love hormone," it fosters trust and social bonding • ...
Vocabulary Cell Structure 2025-02-13
Across
- organelles that, using oxygen, convert nutrients into energy that can be used by the cell.
- A rigid layer outside the plasma membrane in plant, fungi, and bacterial cells, mainly made of cellulose in plants.
- the semipermeable membrane surrounding the cytoplasm of a cell.
- a circular body in the cell that holds DNA and regulates gene expression.
- All the cell's contents except the nucleus.
- Organelles in animal cells that help organize microtubules and position the nucleus and other organelles.
- A small structure where proteins are synthesized
- a vesicle type that stores nutrients, water, and other chemicals. It helps the cells maintain their shape.
- a tiny body (that's in the nucleus) where ribosomes are synthesized.
Down
- Multiple passageways of networks where chemical compounds are manufactured, processed, and transported.
- Membrane stacks that collect, modify, and package chemical compounds.
- A tiny structure that can store pigment or food
- a small sac that contains digestive chemicals.
- a two-layered membrane which surrounds the nucleus.
- A small, sac-like package of proteins, water, or nutrients created by the Golgi apparatus.
- A plastid that contains chlorophyll and where photosynthesis happens.
16 Clues: All the cell's contents except the nucleus. • a small sac that contains digestive chemicals. • A tiny structure that can store pigment or food • A small structure where proteins are synthesized • a two-layered membrane which surrounds the nucleus. • the semipermeable membrane surrounding the cytoplasm of a cell. • ...
polska gurom 2024-11-23
Across
- What advanced degree does Wojciech Zaremba hold in computer science?
- What was the name of the co-founder of Wish who partnered with Piotr Szulczewski?
- Wojciech Zaremba is one of the co-creators of which advanced AI chatbot?
- Tomasz Czajka worked on the control and navigation software for which rocket?
- Which global e-commerce platform was founded by Piotr Szulczewski?
- ICEYE's satellites were initially designed to observe which environmental feature?
- What type of games is CD Projekt primarily known for?
- What competitive event brought early recognition to Tomasz Czajka?
Down
- What type of synthesis is the primary focus of ElevenLabs?
- What is the primary subject focus of the educational platform Brainly?
- Brainly uses AI to ensure the accuracy and quality of what?
- Which fantasy RPG series brought international fame to CD Projekt?
- What city is associated with Wojciech Zaremba’s birth?
- Piotr Szulczewski worked at which company, where he developed ad targeting technologies?
- Which term describes the neural networks used by ElevenLabs to generate natural voices?
- What is the key technology behind ICEYE's satellite imaging?
16 Clues: What type of games is CD Projekt primarily known for? • What city is associated with Wojciech Zaremba’s birth? • What type of synthesis is the primary focus of ElevenLabs? • Brainly uses AI to ensure the accuracy and quality of what? • What is the key technology behind ICEYE's satellite imaging? • Which fantasy RPG series brought international fame to CD Projekt? • ...
Cyber Security 2024-10-10
Across
- Type of software used to cause damage, e.g. viruses.
- A small piece of software designed to cause damage.
- Part of the Internet hidden behind logins, etc.
- Part of the Internet that can be accessed using a search engine.
- A way of jumbling up data so it is unreadable.
- A simple (and very old) method of encryption where the alphabet is shifted.
- Type of hacker who legally hacks, often to test networks.
- A way of convincing people to give up personal information.
- Describes criminals stealing personal information to impersonate someone.
- Type of hacker who commits illegal actions but for the greater good.
Down
- Using the Internet (often social media) to target someone negatively.
- A way of strengthening logins by sending a code to a phone or email.
- Convincing users to give up personal information, often using emails.
- Part of the Internet that is unmonitored and often contains illegal content.
- A simple (and very old) method of encrypting data by rotating the alphabet.
- French dude who invented a complex grid-based encryption method. Begins with a V.
- Type of hacker that commits illegal actions.
17 Clues: Type of hacker that commits illegal actions. • A way of jumbling up data so it is unreadable. • Part of the Internet hidden behind logins, etc. • A small piece of software designed to cause damage. • Type of software used to cause damage, e.g. viruses. • Type of hacker who legally hacks, often to test networks. • ...
OTC Dual Enrollment Programs 1 2025-08-11
Across
- Cut and weld metal components for a structural frame
- Install and maintain air conditioning systems in commercial buildings
- Style hair, apply color treatments, as well as skin and nail treatments
- Install and troubleshoot computer networks in a small business
- Designs and installs wiring systems in residential buildings
- Creates unique and memorable recipes for food and pastries
- recording, analyzing, summarizing, and classifying the financial transactions of a business or individual
- Assist in taking vital signs and recording patient information in a clinic
Down
- Diagnoses and repairs engine problems in passenger vehicles
- combines mechanical engineering, electronics, computer science, and control engineering to create intelligent systems
- Assist in preparing medications and managing inventory in a pharmacy
- Repairs the body of a vehicle after an accident
- The art and trade of working with wood to construct, install, or repair various structures and items
- Maintain and repair diesel engines in trucks and heavy equipment
- A manufacturing process that utilizes a special machine to produce parts in high volume
- A system of pipes and other apparatus for conveying water in a building
16 Clues: Repairs the body of a vehicle after an accident • Cut and weld metal components for a structural frame • Creates unique and memorable recipes for food and pastries • Diagnoses and repairs engine problems in passenger vehicles • Designs and installs wiring systems in residential buildings • Install and troubleshoot computer networks in a small business • ...
Career Clusters & Portfolio 2026-02-06
Across
- Technology, Career cluster focused on computers, software, and networks.
- A one-page summary of your skills, experience, and qualifications.
- Career cluster for food service, lodging, and guest services.
- Portfolio, A growing collection of work you maintain as you learn and develop skills.
- Professional clothing typically worn to interviews and formal workplace settings.
- A short paragraph at the top of a resume that highlights your strengths and career goals.
- A person who writes or provides recommendations on your behalf.
- Career cluster focused on building, maintaining, and repairing structures.
Down
- Portfolio, A curated collection of your best work.
- The process of meeting with an employer to discuss a job or candidacy.
- A list of abilities (e.g., teamwork, problem solving, communication).
- A collection of documents, images, and projects that demonstrate your skills.
- Portfolio, A brief collection used to identify current skills, strengths, and learning gaps.
- An official document listing your coursework and grades.
- Career cluster for banking, investing, and financial planning.
- Science, Career cluster for health professionals such as nurses, doctors, and allied health workers.
16 Clues: Portfolio, A curated collection of your best work. • An official document listing your coursework and grades. • Career cluster for food service, lodging, and guest services. • Career cluster for banking, investing, and financial planning. • A person who writes or provides recommendations on your behalf. • ...
AI Forensics(4n6) 2020-06-09
Across
- IBM tool using Watson technology to fight cyber attacks
- This tool was developed by Symantec to fight a Dragonfly 2.0 attack.
- an israel-based cloud-based network security service that uses AI for a zero-trust network model.
- a malware using AI model to identify its target using facial recognition, geolocation and voice recognition.
- Darktrace’s active self-defence product to Enterprise Immune System to identify suspicious activities.
- a tool that using AI and ML to validate a person's identity just from a swipe on a touchscreen.
- Vectra’s platform using AI to detect attackers in real-time.
Down
- The conference that launched the AI revolution in 1956.
- world's leading email defense companies,deploying AI and ML to mitigate threats.
- a malware analysis tool developed by DARPA using deep learning neural networks.
- an AI model that proposed End to End Digital Investigation Process.
- A Neural Fake News detection model by Allen Institute for AI (AI2).
12 Clues: The conference that launched the AI revolution in 1956. • IBM tool using Watson technology to fight cyber attacks • Vectra’s platform using AI to detect attackers in real-time. • an AI model that proposed End to End Digital Investigation Process. • A Neural Fake News detection model by Allen Institute for AI (AI2). • ...
CS Theory for Beginners 2021-12-02
Across
- controls the communication between the cpu and everything but the cpu, ram, and the graphics card.
- the rules for communicating
- a passive heat exchanger that transfers the heat generated by an electronic or a mechanical device to a fluid medium, often air or a liquid coolant, where it is dissipated away from the device, thereby allowing regulation of the device's temperature
- the number of bits sent over a certain amount of time
- controls communication between cpu, ram, and the graphics card
- the fastest thing in the computer memory hierarchy
- a single 1 or 0
Down
- a communications standard that allows applications and computing devices to exchange messages over a network
- a formatted unit of data carried by a packet-switched network
- a networking device that forwards data packets between computer networks
- the maximum transmission capacity of a device
- a numerical system which consists of ones and zeros
12 Clues: a single 1 or 0 • the rules for communicating • the maximum transmission capacity of a device • the fastest thing in the computer memory hierarchy • a numerical system which consists of ones and zeros • the number of bits sent over a certain amount of time • a formatted unit of data carried by a packet-switched network • ...
Alex p crossword 2016-08-31
Across
- a format for compressing image files.
- local area network
- a person who uses computers to gain unauthorized access to data.
- computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
Down
- Name Servers
- is a programming language that developers use to create applications on your computer.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- A router is a device that forwards data packets along networks.
- The data is usually text, a numeric value, or a formula.
- URL is one type of Uniform Resource Identifier
- basic point
12 Clues: basic point • Name Servers • local area network • a format for compressing image files. • URL is one type of Uniform Resource Identifier • The data is usually text, a numeric value, or a formula. • A router is a device that forwards data packets along networks. • a person who uses computers to gain unauthorized access to data. • ...
Alex p crossword 2016-08-31
Across
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- a format for compressing image files.
- computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources.
- -The data is usually text, a numeric value, or a formula.
- a person who uses computers to gain unauthorized access to data.
Down
- Name Servers
- router is a device that forwards data packets along networks.
- basic point
- system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- local-area network
- A URL is one type of Uniform Resource Identifier
- is a programming language that developers use to create applications on your computer.
12 Clues: basic point • Name Servers • local-area network • a format for compressing image files. • A URL is one type of Uniform Resource Identifier • -The data is usually text, a numeric value, or a formula. • router is a device that forwards data packets along networks. • a person who uses computers to gain unauthorized access to data. • ...
Magazine Crossword 2019-11-04
Across
- A page or collection of web pages that can be viewed and modified by anybody with a web browser and access to the internet
- An unit memory( 8 binary digits represent a character )
- The action of writing CODE or instructions for the computer to follow
- A small text file stored in a computer's hard drive by a website
- The opening page of a website
- A programming methodology that uses a number of existing technologies together and enables web applications to make incremental updates to the user interface without the need to reload the browser page
- A computer language used to create web pages
Down
- The global system of interconnected computer networks that link billions of devices
- The process of converting data into a secret code for transmission over a public network
- The protocol for mail transmission
- A security system that protects a network
- A temporary storage place for quick retrieval of frequently used data
12 Clues: The opening page of a website • The protocol for mail transmission • A security system that protects a network • A computer language used to create web pages • An unit memory( 8 binary digits represent a character ) • A small text file stored in a computer's hard drive by a website • The action of writing CODE or instructions for the computer to follow • ...
Cisco Crossword 2013-09-08
Across
- By 2020 how many billions things will be connected to The Network?
- ……….. are used to tie multiple networks together
- CEO of Cisco
- End users use the compute and communication devices they choose to increase productivity and mobility, anywhere
- Using a …………… service, you can call landline or cell phones. You can also call computer-to-computer, with both parties speaking into a computer microphone and listening through computer speakers or headsets
- Warrior- Chief Technology & Strategy Officer (CTO) of Cisco Systems
- Cisco ……… are scalable and cost-efficient and meet the need for any size of business
Down
- Bringing together people, process, data, and things to make networked connections more relevant and valuable more than ever before
- ………… and Servers enable end-to-end server visibility, management, and control
- A range of frequencies within a given band, in particular that used for transmitting a signal
- Highly secure remote access and increase flexibility and cost savings
- ……… was founded in 1984
12 Clues: CEO of Cisco • ……… was founded in 1984 • ……….. are used to tie multiple networks together • By 2020 how many billions things will be connected to The Network? • Warrior- Chief Technology & Strategy Officer (CTO) of Cisco Systems • Highly secure remote access and increase flexibility and cost savings • ...
Workplace Readiness Skills (Professional Skills) 2022-08-14
Across
- Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
- Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
- Knows how to select and safely use industry-specific technologies, tools, and machines
- Plans personal and professional goals related to education, career, finances, and health
- Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
- Applies mathematical skills to complete tasks as necessary
- Accepts constructive feedback well and is open to new ideas and ways of doing things
Down
- Locates information efficiently, evaluates the credibility and relevance of sources and facts
- reads and interprets workplace documents and writes effectively
- Plans, prioritizes, and adapts work goals to manage time and resources effectively
- Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
- Meets organizational expectations regarding work schedule, behavior, appearance, and communication
12 Clues: Applies mathematical skills to complete tasks as necessary • reads and interprets workplace documents and writes effectively • Plans, prioritizes, and adapts work goals to manage time and resources effectively • Accepts constructive feedback well and is open to new ideas and ways of doing things • ...
Social Issues 2023-03-06
Across
- a population with an increased proportion of elderly
- the practice of protecting systems, networks, and programs from digital attacks
- the movement of people from one country or place of residence, to settle in another
- the inability to read and write
- discrimination against an individual on the basis of their skin color, race or ethnicity
- a state of lacking financial resources and essentials for a certain standard of living
- the problem of long-term shifts in temperatures and weather patterns
- the basic rights and freedoms that belong to every person in the world
Down
- the social phenomenon in which people are not treated equally on the basis of gender
- a form of dishonesty or criminal offense undertaken by a person entrusted in a position of authority
- the condition of people unable to find any work
- a situation in which too many people or animals live in a certain area
12 Clues: the inability to read and write • the condition of people unable to find any work • a population with an increased proportion of elderly • the problem of long-term shifts in temperatures and weather patterns • a situation in which too many people or animals live in a certain area • the basic rights and freedoms that belong to every person in the world • ...
Hack Your Brain 2024-09-18
Across
- A small device or software used to create a secure encrypted tunnel between two networks
- The unauthorized exploitation of a network to access confidential data or systems
- A simulation-based cybersecurity exercise to assess an organization's defensive capabilities (Two words)
- The process of identifying and analyzing security risks
- A specific type of phishing that targets high-profile individuals, such as executives
- A malicious attempt to disrupt a network by overwhelming it with traffic
- An individual who uses hacking skills for ethical purposes
Down
- An offensive security activity where ethical hackers simulate real-world attacks to test defenses (Two words, hyphenated)
- Teaming A cybersecurity practice where teams work against each other, with attackers and defenders (Two words)
- A technique where attackers attempt to guess passwords by trying all possible combinations
- Shields The world's largest multinational cybersecurity exercise, organized annually by NATO (Two words)
- A widely-used asymmetric encryption algorithm named after its inventors
12 Clues: The process of identifying and analyzing security risks • An individual who uses hacking skills for ethical purposes • A widely-used asymmetric encryption algorithm named after its inventors • A malicious attempt to disrupt a network by overwhelming it with traffic • The unauthorized exploitation of a network to access confidential data or systems • ...
MCQ -1 Internet and Web Technology 2020-06-03
Across
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol
- A vast collection of different networks is ________
- expand ISP
- Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
Down
- which protocol assigns IP address to the client connected in the internet?
5 Clues: expand ISP • A vast collection of different networks is ________ • which protocol assigns IP address to the client connected in the internet? • Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ • ...
MCQ -1 Internet and Web Technology 2020-06-03
Across
- which protocol assigns IP address to the client connected in the internet?
- A vast collection of different networks is ________
Down
- expand ISP
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol
- Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
5 Clues: expand ISP • A vast collection of different networks is ________ • which protocol assigns IP address to the client connected in the internet? • Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ • ...
Disability Pride Month at Maximus 2024-07-31
Across
- Acronym for the organisation that offers free hearing tests, as per Steph's article
- A supportive and inspiring network for anyone passionate about disability and mental health
- The monthly digital newsletter from the Diversity, Equity, and Inclusion (DEI) team at Maximus
- The Disability and Health _____ was created in 2021 by MaxAbility to facilitate conversations around Disability and Health
Down
- Disability Pride Month empowers people with disabilities to take pride in their
- Kaylena Mushen is the _____ of our Colleague Network for anyone passionate about disability and mental health
- The number of DEI Colleague Networks at Maximus UK
- Nineteen ______ was the first year Disability Pride Month was recognised
- The month we recognise Disability Pride Month
9 Clues: The month we recognise Disability Pride Month • The number of DEI Colleague Networks at Maximus UK • Nineteen ______ was the first year Disability Pride Month was recognised • Disability Pride Month empowers people with disabilities to take pride in their • Acronym for the organisation that offers free hearing tests, as per Steph's article • ...
What Influences 'Sense of Place'? 2025-10-20
Across
- ...Relationships – How people interact within a place, including communities, social networks, and demographics.
- How people view a place, which can differ for locals versus outsiders.
- ...of Belonging – How strongly people identify with or feel part of a place.
- The physical or geographical position of a place, which can influence how people perceive it.
- ...Characteristics - Natural features like rivers, mountains, climate, and landscape that give a place its identity.
Down
- ...Attachment – The feelings, memories, and personal connections people have to a place.
- ...Characteristics - Built environment, infrastructure, land use, and cultural features shaped by people.
- ...Activities – How work, trade, and resources influence the perception and meaning of a place.
- ...Identity – Traditions, language, religion, and other cultural elements that define a place.
9 Clues: How people view a place, which can differ for locals versus outsiders. • ...of Belonging – How strongly people identify with or feel part of a place. • ...Attachment – The feelings, memories, and personal connections people have to a place. • The physical or geographical position of a place, which can influence how people perceive it. • ...
Crossword 9 2024-09-26
4 Clues: Device that opposes current flow in a circuit. • Instructions written for a computer to execute. • A diode that emits light when current passes through. • A wired networking technology used in local area networks.
Units 13 andn 14 Vocab 2013-07-11
Across
- The person who is in charge of selecting artwork for a publication.
- The person who puts in hardware and software for computer networks.
- "You should eat more vegetables and less KFC."
- The person who chooses, arranges and edits the scenes in a movie.
- The person who helps with software questions and problems.
- "Nancy isn't at work today. She must have died."
Down
- "You are not a very hard-worker."
- "You have to give me your homework right now!"
- The person who goes to a different country or region to report on events.
- The person who writes news about famous people.
- "By 2050, scientists will have found a cure for cancer."
- The person who does the dangerous actions in a film.
- "If you don't clean your room, you won't be allowed to watch television for a week."
- The person who chooses and adjusts pictures for a publication.
- "I was late today because the traffic was terrible!"
- "My husband came home smelling like perfume. I think he might be cheating on me."
16 Clues: "You are not a very hard-worker." • "You have to give me your homework right now!" • "You should eat more vegetables and less KFC." • The person who writes news about famous people. • "Nancy isn't at work today. She must have died." • The person who does the dangerous actions in a film. • "I was late today because the traffic was terrible!" • ...
Units 13 and 14 Vocab 2013-07-11
Across
- "You should eat more vegetables and less KFC."
- The person who chooses and adjusts pictures for a publication.
- "You have to give me your homework right now!"
- "My husband came home smelling like perfume. I think he might be cheating on me."
- The person who goes to a different country or region to report on events.
- "You are not a very hard-worker."
- The person who puts in hardware and software for computer networks.
- The person who chooses, arranges and edits the scenes in a movie.
- "Nancy isn't at work today. She must have died."
Down
- The person who is in charge of selecting artwork for a publication.
- The person who does the dangerous actions in a film.
- "By 2050, scientists will have found a cure for cancer."
- The person who helps with software questions and problems.
- The person who writes news about famous people.
- "I was late today because the traffic was terrible!"
- "If you don't clean your room, you won't be allowed to watch television for a week."
16 Clues: "You are not a very hard-worker." • "You should eat more vegetables and less KFC." • "You have to give me your homework right now!" • The person who writes news about famous people. • "Nancy isn't at work today. She must have died." • The person who does the dangerous actions in a film. • "I was late today because the traffic was terrible!" • ...
Immigration & Urbanization term 2015-02-18
Across
- POT an ethnic mixture of people from all over the world
- Immigrant station in San Francisco Bay
- immigrants given physical exam by doctor and inspector checks documents to if meets legal requirements
- MOVEMENTS enforced that immigrants have the skills to speak English and have knowledge of American history and government
- EXCLUSION ACT bans entry to most Chinese
- immigrants lived in these residences, where the conditions were harsh and quite UNSANITARY
Down
- AGREEMENT Japan limits emigration, in return U.S. repeals segregation
- TWEED New York city's Democratic power, political machine
- TRANSIT transit networks in many urban areas linked city neighborhoods to one another and to outlying communities
- this led to immigrants settling in cities and migration from country to city
- the illegal use of political influence for personal gain
- HOUSE community centers in slum neighborhoods
- MACHINE offered services to voters and businesses in exchange for political or financial support
- a favoritism toward native-born Americans
- ADDAMS founded Chicago's Hull House in 1889
- GOSPEL MOVEMENT preached salvation through service to the poor
16 Clues: Immigrant station in San Francisco Bay • EXCLUSION ACT bans entry to most Chinese • a favoritism toward native-born Americans • ADDAMS founded Chicago's Hull House in 1889 • HOUSE community centers in slum neighborhoods • POT an ethnic mixture of people from all over the world • the illegal use of political influence for personal gain • ...
Computer Science Engineering-3 2022-02-24
Across
- a logic programming language associated with artificial intelligence and computational linguistics
- An emulation of a computer system.
- The first section of an operating system to load into memory.
- transparent fiber made by drawing glass (silica) or plastic
- the set of rules that defines the combinations of symbols
- A collection in which the entities in the collection are kept in order
- the field concerned with the rigorous mathematical study of the meaning of programming languages.
- A general-purpose programming language that is class-based not a pure object-oriented
- device that converts data into a format suitable for a transmission medium
Down
- to receive data from a remote system
- Occurs when a thing is defined in terms of itself or of its type.
- Any auxiliary or ancillary device connected to or integrated within a computer system
- Computer data storage
- to send data to a remote system
- A networking device that forwards data packets between computer networks.
- a collection of data or computer instructions that tell the computer how to work
16 Clues: Computer data storage • to send data to a remote system • An emulation of a computer system. • to receive data from a remote system • the set of rules that defines the combinations of symbols • transparent fiber made by drawing glass (silica) or plastic • The first section of an operating system to load into memory. • ...
Cyber Crosswords 2025-07-03
Across
- Software that protects your computer from harmful programs.
- Malicious software that locks your files and demands money to unlock them.
- A method of converting data into a code to prevent unauthorized access.
- A secret word or phrase used to access a system or account.
- A voice-based scam where attackers call pretending to be from a trusted source.
- A person who gains unauthorized access to data or systems.
- A network security system that blocks unwanted access while allowing safe communication.
- A type of phishing attack done through SMS or text messages.
Down
- The practice of protecting systems, networks, and data from digital attacks.
- A weakness in software or systems that can be exploited by attackers.
- Malicious software designed to damage or gain unauthorized access to systems.
- Malware disguised as a legitimate program but harmful once opened.
- A short-range wireless technology used to connect devices like headphones and keyboards.
- A group of connected computers and devices that share resources.
- A longer version of a password made up of multiple words.
- A scam where attackers trick you into giving personal or financial information.
16 Clues: A longer version of a password made up of multiple words. • A person who gains unauthorized access to data or systems. • Software that protects your computer from harmful programs. • A secret word or phrase used to access a system or account. • A type of phishing attack done through SMS or text messages. • ...
Networking and Cyber Ethics 2025-06-08
Across
- The computer that communicated with each other.
- Most commonly used network card.
- Network which generally cover a range of less than 10 metres (30 feet).
- Law, that can be defined as the legal rules and restriction imposed on online users.
- Wireless technology used to interconnect mobile phones, computers and printers using short-range connection.
- The network that requires a public telecommunication media to transfer data.
- Spam attackers keep sending bulk mails till the mail server gets full.
- The topology which have all the nodes in the network are connected in a circular manner.
Down
- A process of transforming data into unreadable code.
- Act of harming, harassing,or targetting a person by using internet.
- Security system the prevent unauthorised people from accessing your system and network.
- A wireless antenna, which increases the communication range of the radio signals.
- Hacking, which is due for a good cause, such as national security.
- Simplest way to prevent plagiarism.
- Sets of rules that determine how data should be transferred over networks, compressed, presented on the screen.
- An illegal intrusion into a computer system or network.
16 Clues: Most commonly used network card. • Simplest way to prevent plagiarism. • The computer that communicated with each other. • A process of transforming data into unreadable code. • An illegal intrusion into a computer system or network. • Hacking, which is due for a good cause, such as national security. • ...
Chapter 1 & Chapter 2 - ITN 2022-06-18
Across
- Communication at a distance
- a layer in OSI model that handles the data which separated them into some segments
- can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network
- a topology larger networks use the extended star topology also called as
Down
- information presented in whatever form is agreed upon by the parties creating and using the data
- A set of rules that govern data communication
- ... model is a standard reference model that covers communication between two end-users in a network from ISO
- third layer in OSI model
- defines the way in which computers, printers and other devices are connected
- set of devices (often referred to as nodes) connected by communication links
- a topology that connects all devices (nodes) to each other for redundancy and fault tolerance
11 Clues: third layer in OSI model • Communication at a distance • A set of rules that govern data communication • a topology larger networks use the extended star topology also called as • defines the way in which computers, printers and other devices are connected • set of devices (often referred to as nodes) connected by communication links • ...
Finance Ke Fundey 2017-12-12
Across
- Authority whose mission is to create conditions for growth of telecom in India
- Telecom entity, which will soon be merged with Bharti Airtel
- Using a Camera or phone lines or internet that allows individuals at two or more sites to hear and see each other
- Technology to host mobile voice calls on Internet Protocol
- A Government program for provision of Mobile Services in Select Rural Regions of India. Provider gets subsidy for the same
Down
- First name of the current GSMA Chairman
- A network of networks of computers connected all around the world
- An Industry Association of GSM Mobile Operators in India
- Separate document which you can send with an e-mail message
- Number 2 Telecom Player of the world (basis CMS)
- Two types are spectrum are being used for Microwave. First one is Backbone, the other is……….
11 Clues: First name of the current GSMA Chairman • Number 2 Telecom Player of the world (basis CMS) • An Industry Association of GSM Mobile Operators in India • Technology to host mobile voice calls on Internet Protocol • Separate document which you can send with an e-mail message • Telecom entity, which will soon be merged with Bharti Airtel • ...
Machine Learning 2023-09-06
Across
- Ini adalah cabang dari kecerdasan buatan yang mengacu pada kemampuan mesin dan komputer untuk belajar dari data dan mengembangkan kemampuan untuk memahami pola dan membuat keputusan berdasarkan data tersebut.
- Ini adalah tugas dalam machine learning di mana model mencoba untuk mengelompokkan data ke dalam kelas atau kategori tertentu berdasarkan karakteristiknya. Contoh klasifikasi adalah pengenalan gambar atau analisis sentimen teks.
- Ini adalah hasil dari proses machine learning di mana model membuat perkiraan atau estimasi tentang hasil di masa depan berdasarkan data yang telah dipelajari selama pelatihan. Prediction bisa digunakan dalam berbagai konteks, seperti peramalan bisnis atau prediksi cuaca.
- Model machine learning adalah representasi matematis dari data dan aturan yang digunakan oleh sistem untuk membuat prediksi atau mengambil keputusan. Model ini dibangun selama proses pelatihan.
Down
- Ini adalah tugas di mana model machine learning mencoba untuk memprediksi nilai numerik atau kontinu berdasarkan data yang diberikan. Contoh regresi adalah memprediksi harga rumah berdasarkan berbagai fitur.
- Data adalah informasi yang digunakan oleh mesin dalam proses pembelajaran mesin. Ini bisa berupa berbagai jenis informasi, seperti angka, teks, gambar, atau suara, yang digunakan untuk melatih dan menguji model machine learning.
- Ini adalah langkah-langkah atau prosedur matematis yang digunakan oleh komputer untuk memecahkan masalah atau menyelesaikan tugas tertentu. Dalam konteks machine learning, algoritma digunakan untuk melatih model dan membuat prediksi.
- Ini adalah proses di mana model machine learning "dilatih" dengan menggunakan data pelatihan. Selama pelatihan, model mempelajari pola dalam data untuk membuat prediksi yang lebih baik di masa depan.
- Ini berkaitan dengan jaringan saraf tiruan (neural networks), yang adalah salah satu pendekatan populer dalam machine learning. Neural networks terinspirasi oleh struktur jaringan saraf manusia dan digunakan untuk memproses data kompleks.
9 Clues: Model machine learning adalah representasi matematis dari data dan aturan yang digunakan oleh sistem untuk membuat prediksi atau mengambil keputusan. Model ini dibangun selama proses pelatihan. • ...
Cyber Month Crossword Puzzle 2024-08-26
Across
- The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.
- Researching and publishing sensitive information about an individual or organisation on the internet without their consent, often with the intent to harass, intimidate, extort, or cause harm.
- An authentication type based on biological data that is unique and specific to a person (such as a fingerprint or face ID).
- Process of determining whether someone or something is who or what they say they are.
- A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules, policies, or access control lists, to prevent unauthorised access, malicious activities, or data breaches.
Down
- Characters used to verify identity, usually to gain access to an account, website, or system. For more information
- Malicious software designed to infiltrate or damage a computer system, including viruses, worms, Trojans, ransomware, and adware.
- Software designed to detect, prevent, and remove malicious software (malware) from computers and networks, including viruses, worms, Trojans, and other types of malware.
- The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
- An individual with technical skills and knowledge of systems, networks, and software, who exploits vulnerabilities, bypass security controls, or gain unauthorised access to systems or data, often categorised as white hat, black hat, or grey hat hackers based on their motivations.
- An unauthorised person following an authorised person into a secured area, typically by closely following them through a door.
- Software that displays advertisements or unwanted content to users, often bundled with free applications or downloaded without the user’s consent, potentially leading to privacy violations, system slowdowns, or security risks.
- A password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs help in reducing the risk of frauds like phishing because the password is not reusable.
14 Clues: Process of determining whether someone or something is who or what they say they are. • A type of malicious software designed to block access to a computer system or data until a sum of money is paid. • Characters used to verify identity, usually to gain access to an account, website, or system. For more information • ...
Cisco Crossword 2013-09-08
Across
- Proactive protection for radio frequency interference
- Private, Public, Hybrid, Community are all types of ………………
- Bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before
- Cisco ……… are scalable and cost-efficient and meet the need for any size of business
Down
- Instantly interacts with instant messaging and presence
- A range of frequencies within a given band, in particular that used for transmitting a signal
- Offers a wide range of products and networking solutions designed for enterprises and small businesses
- Enables productive online meetings anywhere, anytime, on any device
- A unified…………………… architecture that combines compute, storage, network and management into a platform designed to automate IT as a service across physical and virtual environments
- ……… are used to tie multiple networks together
- By 2020 how many billions things will be connected to The Network?
- Cisco ………… to meet and collaborate with more people in more places without travel
12 Clues: ……… are used to tie multiple networks together • Proactive protection for radio frequency interference • Instantly interacts with instant messaging and presence • Private, Public, Hybrid, Community are all types of ……………… • By 2020 how many billions things will be connected to The Network? • Enables productive online meetings anywhere, anytime, on any device • ...
Cisco Crossword 2013-09-08
Across
- Instantly interacts with instant messaging and presence
- Bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before
- Enables productive online meetings anywhere, anytime, on any device
- Private, Public, Hybrid, Community are all types of ……………….
- Cisco ………. are scalable and cost-efficient and meet the need for any size of business
- Cisco ………… to meet and collaborate with more people in more places without travel
- Offers a wide range of products and networking solutions designed for enterprises and small businesses
Down
- A range of frequencies within a given band, in particular that used for transmitting a signal
- ………. are used to tie multiple networks together
- Proactive protection for radio frequency interference
- ……………. Is a Flexible solutions from Cisco that can enable effective, scalable, and easy-to-manage deployments anywhere, on any device
- By 2020 how many billions things will be connected to The Network?
12 Clues: ………. are used to tie multiple networks together • Proactive protection for radio frequency interference • Instantly interacts with instant messaging and presence • Private, Public, Hybrid, Community are all types of ………………. • By 2020 how many billions things will be connected to The Network? • Enables productive online meetings anywhere, anytime, on any device • ...
Cisco Crossword 2013-09-08
Across
- A range of frequencies within a given band, in particular that used for transmitting a signal
- Instantly interacts with instant messaging and presence
- Enables productive online meetings anywhere, anytime, on any device
- Offers a wide range of products and networking solutions designed for enterprises and small businesses
- ……………. Is a Flexible solutions from Cisco that can enable effective, scalable, and easy-to-manage deployments anywhere, on any device
Down
- By 2020 how many billions things will be connected to The Network?
- Cisco ………. are scalable and cost-efficient and meet the need for any size of business
- Bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before
- Cisco ………… to meet and collaborate with more people in more places without travel
- Proactive protection for radio frequency interference
- ………. are used to tie multiple networks together
- Private, Public, Hybrid, Community are all types of ……………….
12 Clues: ………. are used to tie multiple networks together • Proactive protection for radio frequency interference • Instantly interacts with instant messaging and presence • Private, Public, Hybrid, Community are all types of ………………. • By 2020 how many billions things will be connected to The Network? • Enables productive online meetings anywhere, anytime, on any device • ...
Chapter 1 Choosing Your Career 2021-09-07
Across
- informal groups of people with common interests who interact for mutual assistance
- the amount of monthly or annual pay that you will earn for your labor
- advancing to a higher level of skill to increase your usefulness
- specialized, intensive programs that prepare students for higher-level work responsibilities
- organizations that offer services related to careers and employment
- any costs of working paid by the employee and not reimbursed by the employer
- learning new and different skills to retain the same level of employability
Down
- someone who assumes the risks of a new business
- daily activities of the job and the environment in which they must be performed
- a list of your strong and weak points along with plans for improvement
- an evaluation of the positive and negative attributes of a given career choice
- advancement to a position of greater responsibility and higher pay
12 Clues: someone who assumes the risks of a new business • advancing to a higher level of skill to increase your usefulness • advancement to a position of greater responsibility and higher pay • organizations that offer services related to careers and employment • the amount of monthly or annual pay that you will earn for your labor • ...
Workplace Readiness Skills (Professional Skills) 2022-08-14
Across
- Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
- Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
- Knows how to select and safely use industry-specific technologies, tools, and machines
- Plans personal and professional goals related to education, career, finances, and health
- Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
- Applies mathematical skills to complete tasks as necessary
- Accepts constructive feedback well and is open to new ideas and ways of doing things
Down
- Locates information efficiently, evaluates the credibility and relevance of sources and facts
- reads and interprets workplace documents and writes effectively
- Plans, prioritizes, and adapts work goals to manage time and resources effectively
- Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
- Meets organizational expectations regarding work schedule, behavior, appearance, and communication
12 Clues: Applies mathematical skills to complete tasks as necessary • reads and interprets workplace documents and writes effectively • Plans, prioritizes, and adapts work goals to manage time and resources effectively • Accepts constructive feedback well and is open to new ideas and ways of doing things • ...
Vocabulary 2021-04-21
Across
- A computer software that secretly records information about the way you use your computer.
- An e-mail that is not wanted.
- A document or file that is sent with e-mail.
- A computer virus that causes damage to computers connected to each other by a network.
- A technological barrier designed to prevent unauthorized or unwanted communications.
- A program that is designed to harm a computer by deleting data, ruining files, etc.
Down
- To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.
- An application; a computer program that performs a particular task.
- An image or usaname that represents a person online within forums and social networks.
- A dishonest way to make money by deceiving people.
- A protective software designed to defend your computer against malicious software.
- A software designed to interfere with a computer’s normal functioning.
12 Clues: An e-mail that is not wanted. • A document or file that is sent with e-mail. • A dishonest way to make money by deceiving people. • An application; a computer program that performs a particular task. • A software designed to interfere with a computer’s normal functioning. • A protective software designed to defend your computer against malicious software. • ...
Media Literacy 2023-12-11
Across
- Measurable characteristics of a particular group, such as age, gender, locale, and income level
- Indirect meaning contained in a media message
- false or inaccurate information, especially that which is deliberately intended to deceive
- Those within the news media who control the flow of information and spread of ideas
- a humorous or malicious deception.
- The literal meaning of a media message
Down
- the suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- make sense of; assign a meaning to
- Partiality, preference, or prejudice for/against a person, thing, or idea
- the practical application of science to commerce or industry
- information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
12 Clues: make sense of; assign a meaning to • a humorous or malicious deception. • The literal meaning of a media message • Indirect meaning contained in a media message • the practical application of science to commerce or industry • Partiality, preference, or prejudice for/against a person, thing, or idea • ...
Fill in the following crossword the following puzzle on various aspects of safety 2024-02-11
Across
- The act of willfully and deliberately setting fire to property
- Potential Source of harm
- tricking people into divulging sensitive information. {two words lengths (6, 12)}
- deliberate attempt to damage or disable computers, networks or electronic systems.
- The sum total of all the living and non-living elements and their effects that influence human life
Down
- Layer of the skin that is damaged in a first-degree burn
- website that looks identical to the legitimate site used to steal victim's log in credentials
- Malware that uses legitimate software to hide malicious code within it that will attack user computer to steal data or harm the computer.
- malware that encrypts a victim's files and demands a fee
- the condition/situation of being protected from harm or other danger.
- Used to protect the head from falling objects
- Used to protect the eyes from foreign objects e.g. dust, loose wood particles etc.
12 Clues: Potential Source of harm • Used to protect the head from falling objects • Layer of the skin that is damaged in a first-degree burn • malware that encrypts a victim's files and demands a fee • The act of willfully and deliberately setting fire to property • the condition/situation of being protected from harm or other danger. • ...
Y10 Sharp Start 2020-06-15
Across
- Where an algorithm changes depending on the answer to a question
- Part of an algorithm where you create variables or subroutines
- A map of how a network is laid out
- This logical operation is only TRUE if both the inputs are TRUE
- The unique address which every device which is able to connect to networks has
- The fancy word for putting comments in an algorithm
Down
- A number system which only uses 1 and 0 to represent numbers
- A part of an algorithm which is instructions happening one after another
- A part of an algorithm where code can be repeated more than once
- This logical operation is only TRUE is at least one of the inputs is TRUE
- A number system which uses 0,1,2,3,4,5,6,7,8,9 to represent numbers
- The address of a device on a network which isn't necessarily unique and can be shared by multiple devices
12 Clues: A map of how a network is laid out • The fancy word for putting comments in an algorithm • A number system which only uses 1 and 0 to represent numbers • Part of an algorithm where you create variables or subroutines • This logical operation is only TRUE if both the inputs are TRUE • Where an algorithm changes depending on the answer to a question • ...
Chapter 12: The Family 2019-05-08
Across
- people have more than one partner at a time
- a woman having several husbands
- kin networks that extend outside or beyond the nuclear family
- the technical term for interracial marriage, literally meaning “a mixing of kinds”; it is politically and historically charged – sociologists typically use exogamy or outmarriage as neutral terms
- a man having several wives
Down
- a person partners with only one other person
- living together in an intimate relationship without formal legal or religious sanctioning
- the notion that true womanhood centers on domestic responsibility and child-rearing
- consists of a mother, father and their children
- women’s responsibility for housework and child care – everything from cooking to doing laundry, bathing children, reading bedtime stories, and sewing Halloween costumes
- legal or normative sanctions against marrying outside one’s own race, class, or other social group; marriage from within.
- marriage to someone outside ones’ social group
12 Clues: a man having several wives • a woman having several husbands • people have more than one partner at a time • a person partners with only one other person • marriage to someone outside ones’ social group • consists of a mother, father and their children • kin networks that extend outside or beyond the nuclear family • ...
Symmetric and Distributed Shared Memory Architectures, Cache coherence 2020-01-21
Across
- Multiple simultaneous instruction streams operating on multiple data stream(4 Letters)
- Time to access all the memory location will be same for all the core architecture (3 letters)
- Communication wires are shared by the devices called (3 letters)
- A collection of commodity systems connected by interconnection networks (7 Letters)
- A processor that is able to process sequences of data with a single instruction (16 letters with 2 words)
- the boss of CPU(11 letters with 2 words)
Down
- data structure used in directory based cache coherence is (9 Letters)
- the worker of CPU(3 Letters)
- a number of simultaneous connection or connectivity in toroidal mesh interconnects. (14 letters with 2 words)
- data is written in the cache and the corresponding main memory location at same time is called (12 letters, 2 words)
- Language provide some of the mechanism of shared memory programs.
- Applies the same instruction to multiple data items or it’s idle (4 Letters)
12 Clues: the worker of CPU(3 Letters) • the boss of CPU(11 letters with 2 words) • Communication wires are shared by the devices called (3 letters) • Language provide some of the mechanism of shared memory programs. • data structure used in directory based cache coherence is (9 Letters) • Applies the same instruction to multiple data items or it’s idle (4 Letters) • ...
Cybersecurity Awareness Month 2024-09-27
Across
- Manages policies and practices aimed at preventing unauthorized access, data breaches, and misuse of personal data.
- A string of unique characters used to login to a computer.
- A sentence-like string of words used for authentication that is easy to remember but difficult to crack.
- The practice of protecting systems, networks, and programs from digital attacks.
- Attempting to acquire sensitive data, such as personal information or passwords, through a fraudulent solicitation in email.
- A method to verify identity and protect computers from unauthorized use.
Down
- Malware designed to deny a user or organization access to files on their computer.
- Phishing method using text messages
- A method used to defraud people over the phone.
- To keep safe from harm.
- A skilled programmer who secretly invades computers without authorization.
- A type of artificial intelligence used to create convincing fake images, videos and audio recordings.
12 Clues: To keep safe from harm. • Phishing method using text messages • A method used to defraud people over the phone. • A string of unique characters used to login to a computer. • A method to verify identity and protect computers from unauthorized use. • A skilled programmer who secretly invades computers without authorization. • ...
Digital Design 2023-05-04
Across
- a representation of a physical object or a person in the form of a photograph, painting, or drawing.
- attribute that identifies a unique HTML element
- an organization that helps high school students prepare for careers in business.
- a type of online service that enables users to upload, share, and view.
- the term for transmitting digital media
Down
- a worldside system of interconnected computer networks that use the internet protocol suite(TCP/IP) to link devices worldwide.
- a technique used on web pages to include video content directly in the web page.
- an acronym that stands for Hypertext Markup Language
- an electronic medium for the recording, playback, broadcasting, and display of moving visual media.
- an attribute used for applying a unique name/identifier to a group of HTML elements.
- a document or collection of documents that are published on the World Wide Web.
- an acronym that stands for "Cascading Stylesheets".
12 Clues: the term for transmitting digital media • attribute that identifies a unique HTML element • an acronym that stands for "Cascading Stylesheets". • an acronym that stands for Hypertext Markup Language • a type of online service that enables users to upload, share, and view. • a document or collection of documents that are published on the World Wide Web. • ...
February Safety Crossword 2026-02-03
Across
- This motion is used to put out a fire with an extinguisher
- A serious, unexpected and often dangerous situation requiring immediate action
- The safest way to lift a heavy object is to bend at the knees, keep the back straight, and lift with your
- Mold likes to grow under and in _____, ductwork and ducting terminals, and HVAC drain pans.
- These kits are located under all of our sinks
- Number of hours that perishables can sit out before they should be refrigerated
Down
- The three most common types of food contamination causes include ____, biological, and physical culprits
- The prevention of unauthorized access to networks, devices and data
- Type of security focused on the prevention of unauthorized access to facilities, equipment and resources
- Run, hide, ____.
- Pull the ___, point the nozzle and squeeze the handle to use a fire extinguisher
- This type of light is the single greatest way to protect your home other than locks
12 Clues: Run, hide, ____. • These kits are located under all of our sinks • This motion is used to put out a fire with an extinguisher • The prevention of unauthorized access to networks, devices and data • A serious, unexpected and often dangerous situation requiring immediate action • Number of hours that perishables can sit out before they should be refrigerated • ...
Online Safety 2025-09-10
Across
- (2 words) a unique sequence of digits assigned to a specific telephone or mobile device
- (2 words) a type of crime in which your private information is stolen and used for criminal activity.
- when someone poses as an institution and sends you a personalized message asking you to provide private information.
- what people call you.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
- (2 words) information that can be used to identify you because it is unique to you.
- a dishonest scheme; a fraud.
Down
- where you live.
- the intentional and repeated use of electronic devices to harass, threaten, or shame someone.
- a secret word or phrase that must be used to gain admission to something.
- interconnected networks using standardized communication protocols.
- an identification used by a person with access to a computer, network, or online service.
12 Clues: where you live. • what people call you. • a dishonest scheme; a fraud. • interconnected networks using standardized communication protocols. • a secret word or phrase that must be used to gain admission to something. • (2 words) information that can be used to identify you because it is unique to you. • ...
RU ITEC411- Freedom of Speech 2022-10-16
Across
- Newspapers, magazines, books
- made it a criminal crime for commercial websites to make available to minors material "harmful to minors" as judged by community standards
- unsolicited bulk email
- A variety of proposals for restrictions on how telephone and cable companies interact with their broadband customers and how they set charges for service
- the global nature of the Net makes it easier for one nation to impose restrictive standards on others.
- Telephones, postal system
- The main parts of this first major Internet censorship law were ruled unconstitutional
- the global nature of Net allows restrictions in one country to be circumvented by using networks in other, less restrictive countries.
- struck down a Michigan law that made it illegal to sell material that might be damaging to children
- Television, radio
- Block sites with specific words, phrases, and images
Down
- allow public access to governments in many situations
- How does the government regulate both the structure of the broadcasting industry and the content of its programs?
- the main parts of this first major Internet censorship law were ruled unconstitutional
- anti-spam law
- depicts a sexual act against state law
- requires libraries and schools to use filter software on Internet terminals
- which category has the strongest first Amendment right?
- in cyberspace protects criminal and antisocial ativitis
- what is one way to reduce spam?
20 Clues: anti-spam law • Television, radio • unsolicited bulk email • Telephones, postal system • Newspapers, magazines, books • what is one way to reduce spam? • depicts a sexual act against state law • Block sites with specific words, phrases, and images • allow public access to governments in many situations • which category has the strongest first Amendment right? • ...
Delivery Systems 2013-06-27
Across
- Notificatons to a member's cell phone about their transactions
- Free service that allows members to send out non-DCU payments
- Along with Relationship Checking can give members a discount on qualifying loans
- Can be International or Domestic
- Allows members to have more control and access to their accounts, service requests and loan applications
- Members can get paid up to 2 days early
- Can be issued to anyone with a Savings account
- Allows the DCU Primary account holder to send or receive money from another institution
Down
- Cooperative networks of Credit Unions that service each other's members
- Acts as a branch except for cash transactions
- Electronic deposit or withdrawal from a Savings, Money Market or Checking account
- Responds to members emails and live chat
- Automated phone systems for members to access account information
- One way you can transfer funds from you Checking account to your DCU loan
- Online service that allows members to scan in check deposits
- This number can only be changed when logging into Online Banking
- Website address used to access Online Banking
- Can be used at the ATM and wherever VISA is accepted
18 Clues: Can be International or Domestic • Members can get paid up to 2 days early • Responds to members emails and live chat • Acts as a branch except for cash transactions • Website address used to access Online Banking • Can be issued to anyone with a Savings account • Can be used at the ATM and wherever VISA is accepted • ...
Oral Histories - Technology, Machines, & The Future 2024-02-15
Across
- The practice of protecting systems, networks, and programs from digital attacks
- Energy derived from natural resources
- A speech spoken aloud by one person only
- Historical information gathered through spoken narratives
- The delivery or passing of something elsewhere
- The use of control systems and technology to automate processes
- Another term for story
- The act of asking questions of someone in a formal or informal setting
- Cultural knowledge, beliefs, customs, stories, and history told through spoken communication rather than through written texts
Down
- Shared beliefs, values, customs, traditions, behaviors, and artifacts that characterize a particular group of people or society.
- The deliberate modification of the characteristics of an organism by manipulating its genetic material
- A computer-generated simulation of an environment that can be interacted with in a seemingly real or physical way by a person
- Keep intact for the future
- The simulation of human intelligence processes by machines
- A traditional story often telling of the origins of things, places, people...
- The manipulation of matter on an atomic, molecular, and supramolecular scale
- Someone that tells a story, for a listener
- The interdisciplinary branch of engineering and science that deals with the design, construction, operation, and use of robots
18 Clues: Another term for story • Keep intact for the future • Energy derived from natural resources • A speech spoken aloud by one person only • Someone that tells a story, for a listener • The delivery or passing of something elsewhere • Historical information gathered through spoken narratives • The simulation of human intelligence processes by machines • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- Data describing other data, such as timestamps or authors
- An illegal intrusion into a computer system or network
- Legal process of collecting and analyzing digital evidence
- Unauthorized email scams that trick users into revealing information
- The verification procedure to demonstrate that the network meets security requirements
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Network tool for capturing and analyzing traffic
- Potential events or circumstances that can cause harm to an organization's assets.
- Technology used by NGFW to detect and block malware
Down
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A central security resource where multiple virtual traps are monitored (One word).
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Process of identifying, assessing, and mitigating threats
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Programs designed to record personal information, typically undesired software
- Malicious software specifically designed to disrupt or damage computer systems
- Firewall Firewall type that provides unified policy across distributed networks
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET D Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET F Duration :15 mins Marks:20 2025-10-23
Across
- Data describing other data, such as timestamps or authors
- Process of identifying, assessing, and mitigating threats
- The verification procedure to demonstrate that the network meets security requirements
- Technology used by NGFW to detect and block malware
- Unauthorized email scams that trick users into revealing information
- An illegal intrusion into a computer system or network
- A central security resource where multiple virtual traps are monitored (One word).
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Malicious software specifically designed to disrupt or damage computer systems
Down
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Network tool for capturing and analyzing traffic
- Programs designed to record personal information, typically undesired software
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
- Potential events or circumstances that can cause harm to an organization's assets.
- Legal process of collecting and analyzing digital evidence
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- Firewall Firewall type that provides unified policy across distributed networks
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Software that records keystrokes, potentially capturing sensitive login credentials.
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
Richard Demetrius Hurnall 2025-05-19
Across
- A cartoon character that has faces in it
- Laugh out loud
- person, especially a young man, who is perceived as independent, self-reliant, and possibly a bit of a "lone wolf".
- A secret mouth technique to gain a more defined jawline
- a wireless technology that allows devices to connect and exchange data over short distances using radio waves
- a person's "cool" or "it" factor, often used to describe someone's confidence, charisma, and stylishness.
- The notional environment in which communication over computer networks occurs
- Online experience to make it feel like the game is real
- If you know you know
Down
- Looking better then someone
- the programs and other operating information used by a computer.
- Universal serial bus
- A social media influencer and ex gangster, made famous for his human pig hybrid appearance.
- Main antagonist whom is a notorious hitman responsible for the high-profile murder of John Pork, a popular vlogger, and gang member.
- the machines, wiring, and other physical components of a computer or other electronic system.
- n intergalactic alien warlord and conqueror, a Chimera Sui Generis who serves as Ben's archenemy, and the main antagonist of the franchise Ben 10
- Away from keyboard
- In real life
18 Clues: In real life • Laugh out loud • Away from keyboard • Universal serial bus • If you know you know • Looking better then someone • A cartoon character that has faces in it • A secret mouth technique to gain a more defined jawline • Online experience to make it feel like the game is real • the programs and other operating information used by a computer. • ...
Richard Demetrius Hurnall 2025-05-19
Across
- A cartoon character that has faces in it
- Laugh out loud
- person, especially a young man, who is perceived as independent, self-reliant, and possibly a bit of a "lone wolf".
- A secret mouth technique to gain a more defined jawline
- a wireless technology that allows devices to connect and exchange data over short distances using radio waves
- a person's "cool" or "it" factor, often used to describe someone's confidence, charisma, and stylishness.
- The notional environment in which communication over computer networks occurs
- Online experience to make it feel like the game is real
- If you know you know
Down
- Looking better then someone
- the programs and other operating information used by a computer.
- Universal serial bus
- A social media influencer and ex gangster, made famous for his human pig hybrid appearance.
- Main antagonist whom is a notorious hitman responsible for the high-profile murder of John Pork, a popular vlogger, and gang member.
- the machines, wiring, and other physical components of a computer or other electronic system.
- n intergalactic alien warlord and conqueror, a Chimera Sui Generis who serves as Ben's archenemy, and the main antagonist of the franchise Ben 10
- Away from keyboard
- In real life
18 Clues: In real life • Laugh out loud • Away from keyboard • Universal serial bus • If you know you know • Looking better then someone • A cartoon character that has faces in it • A secret mouth technique to gain a more defined jawline • Online experience to make it feel like the game is real • the programs and other operating information used by a computer. • ...
Ethical Online Teaching and Data Management ABB 2025-07-25
Across
- U.S. law that protects the privacy of children under 13 online.
- The practice of protecting systems and networks from digital attacks.
- Data that provides information about other data.
- European Union regulation that governs data protection and privacy.
- The principle of protecting personal and academic info of learners. (Three Words)
- U.S. law that protects the privacy of student education records.
- Using technology and data in ways that respect rights and responsibilities.
- The trail of data left behind by users on the internet. (Two Words)
- The process of removing identifying details from data.
- Required permission from users before collecting or sharing their data.
Down
- Ethical duty to keep student or user information private.
- A school or organization's rules for technology use. (Three Words)
- An incident where sensitive information is accessed without authorization. (Two Words)
- A method of securing information by converting it into code. (Two Words)
- A security measure that uses two forms of identification. (Three Words)
- Verifying the identity of users before granting access.
- Collecting only the data necessary for a specific purpose. (Two Words)
- A deceptive attempt to obtain sensitive information via email or messaging.
18 Clues: Data that provides information about other data. • The process of removing identifying details from data. • Verifying the identity of users before granting access. • Ethical duty to keep student or user information private. • U.S. law that protects the privacy of children under 13 online. • U.S. law that protects the privacy of student education records. • ...
CS Principles Exam Review 2024-04-25
Across
- A data transport protocol that includes mechanisms for reliably transmitting packets to a destination
- ____ access point gives unauthorized access to secure networks
- making something in code that is based on something from the real world.
- hiding a message in plain sight (rain will not see this)
- Run-Time Error code is ____ but makes an error.
- Cipher where the letters are mixed up somehow
- _____ Error runs but there is a Mistake in how you wrote the code.
- Compressing data in a way that discards some data
- Compressing data in a way that preserves all data
- ____ science Crowdsourcing for science! The participation of volunteers from the public in a scientific research project
- A model in which many online users combine efforts to help fund projects
- data about data
Down
- A lightweight data transport protocol with minimal error checking.
- device/hardware that uses software or the software itself
- A technique that helps an algorithm find a good solution in a hard problem
- ETHERNET used ___ addresses to send data between computers on the network.
- ____ Area Network, A small network often in one building.
- ___ Cipher where every letter is ___ with another letter
18 Clues: data about data • Cipher where the letters are mixed up somehow • Run-Time Error code is ____ but makes an error. • Compressing data in a way that discards some data • Compressing data in a way that preserves all data • hiding a message in plain sight (rain will not see this) • ___ Cipher where every letter is ___ with another letter • ...
CSP Review C.D. 2025-05-02
Across
- a solution that is good enough, but not perfect
- an error checking mechanism built into metadata packets
- data about data
- _________ computing: using multiple different devices to run different parts of a program
- this kind of chart is used in planning a project timeline
- the first stage of SDLC
- a kind of search that operates on a sorted list by splitting it in half multiple times
- _____ science is when members of the public contribute relevant data using their own devices
- material that is created on a computer is the _______ property of the creator
Down
- the Software Development Life Cycle
- a _____ access point is a wireless connection that can be used to access unauthorized secure networks
- the uses case diagram is a _____ friendly breakdown of key features
- a small amount of text that tracks information about a website user
- this kind of routing allows for the scalability of the internet
- this is measured in bits per second
- an error when the number of bits is not enough to represent the full number
- _____ data: values that change smoothly
- the value used to show the improvement in computing time with the use of parallel computing
18 Clues: data about data • the first stage of SDLC • the Software Development Life Cycle • this is measured in bits per second • _____ data: values that change smoothly • a solution that is good enough, but not perfect • an error checking mechanism built into metadata packets • this kind of chart is used in planning a project timeline • ...
assgn1 asl 2021-08-19
Across
- What code is inserted into strings that are later passed to an instance of server
- What is simplest form of memory protection introduce in the single authentication system
Down
- code injection method used for attacking the database of a system /website.
- Cross Site Request Forgery
- ______ is a popular tool used for discovering networks as well as in security auditing.
5 Clues: Cross Site Request Forgery • code injection method used for attacking the database of a system /website. • What code is inserted into strings that are later passed to an instance of server • ______ is a popular tool used for discovering networks as well as in security auditing. • ...
MESLEKI YABANCI DIL SINAVI 2022-03-26
Across
- hardware and software used to interconnect networks, directing traffic from one network to another (LAN TO LAN or LAN TO WAN)
- computers are the computers those are able to serve many users for hosting simultaneously which have advanced hardware features.
- a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network.
- Hosting in the word means ―housing‖. A service that allows customers to place their own content on the public Internet's World Wide Web according to the defined domain names.
- it is configuration of IP manually.
- hardware that you insert in a computer to connect a computer to a network.
- it is a variant of network that certain number of computers created in a particular area.Local area Networks consist of computers, network interface cards, network cables, network traffic control devices and other periphral devices.
- a networking device connecting multiple wires, allowing them to communicate simultaneously, when possible. Compare to the less efficient hub device that solely duplicates network packets to each wire.
Down
- a hub is a network device that connects multiple computers on a LAN so they can communicate with one another, the rest of the network, and the Internet All users connected to a hub share the available network bandwidthports.
- a device used in a network to strengthen a weak signal as it is passed along the network cable because of any reason and send it back to the user.
- a device that encodes digital computer signals into analog/analogue telephone signals and vice versa and allows computers to communicate over a phone line
- is the technology that enables rapid transfer of digital information through regular telephone cables (the line is asymmetrical because the connection is faster in one direction than the other).
- all types of user computers that uses the web sites. They may called the computers performing out of the server.
- a private network inside a company or organization that uses the same kinds of software that you find on the public Internet, but which is only for internal use.
- dynamic Host Configuration Protocol Dynamically assigns IP addresses to client stations located on a TCP/IP network at startup, and allows the addresses to be re-used when no longer needed.
- wireless Local Area Network Enables fast data transmission through a wireless connection particularly suitable for organisations such as hospitals and schools as well as businesses.
16 Clues: it is configuration of IP manually. • hardware that you insert in a computer to connect a computer to a network. • a device, such as a WLAN or Internet modem, that permits wireless devices to connect to a network. • all types of user computers that uses the web sites. They may called the computers performing out of the server. • ...
MCQ -1 Internet and Web Technology 2020-06-03
Across
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol
- A vast collection of different networks is ________
- expand ISP
- Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
Down
- which protocol assigns IP address to the client connected in the internet?
5 Clues: expand ISP • A vast collection of different networks is ________ • which protocol assigns IP address to the client connected in the internet? • Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ • ...
Cross Word Puzzle 1- Internet and Web Technology 2020-06-03
Across
- which protocol assigns IP address to the client connected in the internet?
- A vast collection of different networks is ________
Down
- expand ISP
- The first wide-area packet-switching network with distributed control and the first network to implement the TCP/IP protocol
- Internet access by transmitting digital data over the wires of a local telephone network is provided by _______
5 Clues: expand ISP • A vast collection of different networks is ________ • which protocol assigns IP address to the client connected in the internet? • Internet access by transmitting digital data over the wires of a local telephone network is provided by _______ • ...
Plague 2022-04-29
Across
- a deadly infection spread by fleas that live on rats
- interconnected groups of people
- destructive war between France and England that lasted from 1337 to 1453
Down
- unsuccessful revolt by peasants against feudal lords in England in 1381
- epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352
5 Clues: interconnected groups of people • a deadly infection spread by fleas that live on rats • unsuccessful revolt by peasants against feudal lords in England in 1381 • destructive war between France and England that lasted from 1337 to 1453 • epidemic of the bubonic plague that killed as many as one third of all Europeans between 1347 and 1352
FORMS OF CAPITAL 2024-11-16
Across
- A form of capital defined by language and communication skills students bring to college.
- Implicit academic and social expectations may create challenges for students.
- Yosso’s model for understanding cultural wealth includes this strengths-based approach.
- This form of cultural capital includes knowledge and behaviors shaped by social standing.
- A strengths-based perspective highlights this form of capital, defined as "hopes and dreams."
Down
- This form of capital is a formal recognition of an asset, like a degree or certification.
- Bourdieu's theory includes this form of cultural capital that encompasses physical objects with cultural significance.
- Framework focusing on students' strengths and contributions.
- A form of capital related to students’ social and community networks.
- A form of capital tied to historical legacies of social justice and community advocacy.
- Yosso's model includes this form of capital involving skills to navigate social institutions.
11 Clues: Framework focusing on students' strengths and contributions. • A form of capital related to students’ social and community networks. • Implicit academic and social expectations may create challenges for students. • A form of capital tied to historical legacies of social justice and community advocacy. • ...
Malware 2025-11-05
Across
- A method of cracking passwords by trying every possible combination.
- A type of cyberattack where fake emails or websites are used to trick users into revealing private information.
- Malware that encrypts files and demands payment to restore access.
- A protective barrier that filters incoming and outgoing traffic to block unauthorized access.
- A type of malware that replicates and spreads without user action, often via networks.
Down
- A password-cracking attack that tries common words or phrases from a list.
- Malware that monitors and records user activity, often stealing personal data.
- Malware that hides itself while giving unauthorized users administrator-level access.
- A program that attaches to other files and spreads when the infected file is executed.
- A malicious program disguised as a legitimate one, used to access or damage a system.
- Software that displays unwanted advertisements or redirects web traffic.
11 Clues: Malware that encrypts files and demands payment to restore access. • A method of cracking passwords by trying every possible combination. • Software that displays unwanted advertisements or redirects web traffic. • A password-cracking attack that tries common words or phrases from a list. • ...
ETR Crossword set 8 2026-03-08
Across
- Competes with Cisco in cybersecurity, especially next-generation firewalls and cloud security.
- Competes with Cisco in cloud services, collaboration tools, and enterprise software ecosystems.
- Offers enterprise networking, servers, and data-center infrastructure used by large organizations.
- Competes with Cisco in enterprise IT services, cloud infrastructure, and networking technologies.
- Major competitor in cloud networking and data-center switches, widely used by hyperscale companies like Meta and Microsoft.
Down
- One of Cisco’s closest rivals in enterprise and service-provider networking. Known for routers, switches, and its Junos operating system.
- Provides enterprise networking (including Aruba Networking), cloud infrastructure, and data-center solutions competing with Cisco.
- Strong competitor in network security and firewalls through its FortiGate platform.
- Competes in optical networking and telecommunications infrastructure.
- Provides telecom networking infrastructure competing with Cisco in service-provider networks.
- Competes with Cisco in cloud infrastructure and networking services.
11 Clues: Competes with Cisco in cloud infrastructure and networking services. • Competes in optical networking and telecommunications infrastructure. • Strong competitor in network security and firewalls through its FortiGate platform. • Provides telecom networking infrastructure competing with Cisco in service-provider networks. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- owns to trade mark wifi.
- provides a means of reading or interrogating the data using the tag
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- has an onboard power source,usually a battery,and an active transmitter.
Down
- A dynamic change in pont of attachment maintains the network properties is done through
- id a temporary ip address for a mobile node
- smpp cilent is termed a external short message
- a set of two or more interconnection piconets form
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- a set of two or more interconnection piconets form
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- smpp cilent is termed a external short message
Down
- id a temporary ip address for a mobile node
- provides a means of reading or interrogating the data using the tag
- owns to trade mark wifi.
- has an onboard power source,usually a battery,and an active transmitter.
- A dynamic change in pont of attachment maintains the network properties is done through
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Finance Ke Fundey 2017-12-12
Across
- Technology to host mobile voice calls on Internet Protocol
- Telecom entity, which will soon be merged with Bharti Airtel
- An Industry Association of GSM Mobile Operators in India
- Separate document which you can send with an e-mail message
- Two types are spectrum are being used for Microwave. First one is Backbone, the other is……….
Down
- First name of the current GSMA Chairman
- Using a Camera or phone lines or internet that allows individuals at two or more sites to hear and see each other
- Authority whose mission is to create conditions for growth of telecom in India
- Number 2 Telecom Player of the world (basis CMS)
- A network of networks of computers connected all around the world
- A Government program for provision of Mobile Services in Select Rural Regions of India. Provider gets subsidy for the same
11 Clues: First name of the current GSMA Chairman • Number 2 Telecom Player of the world (basis CMS) • An Industry Association of GSM Mobile Operators in India • Technology to host mobile voice calls on Internet Protocol • Separate document which you can send with an e-mail message • Telecom entity, which will soon be merged with Bharti Airtel • ...
Impacts of social media on mental health crossword puzzle 2023-09-01
Across
- and harassment over the Internet through an application
- compare their lives to other people's or celebrities, because of the photos on the account
- Result of constant phone notifications and information overload
- People spend a lot of time on social networks, thus creating isolation
- People who spend a lot of time on social media
Down
- spreading false or misleading information
- La información errónea sobre salud en las redes sociales se refiere a la difusión de información inexacta o engañosa
- people who upload photos edited by the comments of others
- Constant exposure to idealized images on social media can have a significant impact on people's perception of body image.
- This factor allows users to hide their real identity online, which often leads to disrespectful and aggressive behavior on social media.
- People whose life revolves around social media
11 Clues: spreading false or misleading information • People whose life revolves around social media • People who spend a lot of time on social media • and harassment over the Internet through an application • people who upload photos edited by the comments of others • Result of constant phone notifications and information overload • ...
angels crossword 2015-04-29
Across
- – the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate and can spread to other applications and operating system software
- - A bully who operates online, in cyberspace
Down
- – An unauthorized person who secretly gains access to computer files
- NETWORKS -- online communities where people meet, socialize, exchange digital files, etc.
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – a group of connected computers
7 Clues: – a group of connected computers • - A bully who operates online, in cyberspace • – An unauthorized person who secretly gains access to computer files • NETWORKS -- online communities where people meet, socialize, exchange digital files, etc. • – the unauthorized use, reproduction, distribution, or transmission of copyrighted material. • ...
mobile technology 2020-08-30
Across
- unique number,usually fifteen digits,associated with global system for mobile communication.
- a set of two or more interconnection piconets form
- is a technology that is used to transfer information from one program to one or more other programs.
- prohibits tracing of the identity of a mobile subscriber by interception of the traffic on the radio link.
- is the process of selecting a path for taffic in a network or between or across multiple networks.
- smpp cilent is termed a external short message
Down
- id a temporary ip address for a mobile node
- provides a means of reading or interrogating the data using the tag
- owns to trade mark wifi.
- has an onboard power source,usually a battery,and an active transmitter.
- A dynamic change in pont of attachment maintains the network properties is done through
11 Clues: owns to trade mark wifi. • id a temporary ip address for a mobile node • smpp cilent is termed a external short message • a set of two or more interconnection piconets form • provides a means of reading or interrogating the data using the tag • has an onboard power source,usually a battery,and an active transmitter. • ...
Engineering Careers 2014-07-21
Across
- make a real difference in the survival of our planet by finding ways of cleaning up our environment
- test and supervise the manufacture of lighting equipment
- oversee the construction of the buildings and infrastructure that make up our world
- ensure that complex and large scale systems operate safely and efficiently
- develop things that involve a mechanical process
- works on new technology for space travel and exploration
- design and implement all of the supplemental facilities necessary to the separation, processing, and transportation of oil and natural gas
- focuses on how to safely use and control moving water
- work in all stages of the design process, from conception to presentation of the finished plans
- optimize the overall efficiency of business and organizations
Down
- estimate the amount of oil or gas that can be recovered from a reservoir
- specialize in technology such as networks or broadband
- work in all forms of nuclear energy
- design and manufacture seacraft
- develop medical devices that lead to furthering of medical discoveries
- apply earth sciences to human problems
- discover new oil and gas sources and work on new technology to extract sources
- develop and maintain computer software
18 Clues: design and manufacture seacraft • work in all forms of nuclear energy • apply earth sciences to human problems • develop and maintain computer software • develop things that involve a mechanical process • focuses on how to safely use and control moving water • specialize in technology such as networks or broadband • ...
ICT Infrastructure (Homework 2) 2024-07-29
Across
- is a networking device that connects different networks together and transfer data in form of IP packets
- it is _________ and faster to install a network under wireless technology
- a type of data communication
- another key component of ICT infrastructure
- software that the source code is available for free
- a networking device that connects devices to the internet using radio waves
Down
- consists of all the components that enable the use of computer technologies to support the operation of a company or institution
- sharing resources and data is one of the __________ for an ICT infrastructure
- use to transmit information in using wireless technology
- some applications may have malicious code embedded inside and it is an __________ with downloading and installing software
- another type of data communication
- is a type of data transmission medium
- high speed of operation is a ___________ of cable technology
- is another type of data transmission medium
- is a common data networking device
- one of the key components of an ICT/IT infrastructure
- cost less to install is one of the ________ behind the use of cable technology
- software that was developed and owned by a company and source code is not available for free
18 Clues: a type of data communication • another type of data communication • is a common data networking device • is a type of data transmission medium • is another type of data transmission medium • another key component of ICT infrastructure • software that the source code is available for free • one of the key components of an ICT/IT infrastructure • ...
Davi de Jesus Duarte - 131 2021-10-24
Across
- Local Area Network.
- To send data to a remote system.
- Last name of the inventor of the modern computer, born in 1912.
- US State. Home to the World's Largest Ball of Yarn.
- Error or glitch.
- Bad internet guy. Person who can gain unauthorized access to computers or networks.
- To receive data from a remote system.
- First name of the winner of the Academy Award for Best Actor in 1996.
- Device used to input text to a computer.
Down
- Computer component which holds and allows communication between all of its parts.
- Piece of technology that does its job without processing numbers electronically like a computer does.
- Most common PC operating system.
- Most common connector type. Universal Serial Bus.
- A multiple of the unit byte. Equal to one billion bytes.
- An organized collection of data, generally stored and accessed electronically from a computer system.
- Type of storage that contains digital data. Hint: look at the sky.
- Family of wireless network protocols which are commonly used for internet access. It works by transmitting data by radio waves.
- Reference to data that the user can follow by clicking or tapping.
18 Clues: Error or glitch. • Local Area Network. • Most common PC operating system. • To send data to a remote system. • To receive data from a remote system. • Device used to input text to a computer. • Most common connector type. Universal Serial Bus. • US State. Home to the World's Largest Ball of Yarn. • A multiple of the unit byte. Equal to one billion bytes. • ...
AP Human Geography Unit 5 Vocab 2024-02-02
Across
- ____ Farming making enough to sell for a profit.
- is the taming of plants and animals for human use
- ____ Hearths are places where people first domesticated plants/animals
- technological innovation that is designed to improve the usefulness of plant and animals species
- growing the same crop each year.
- ____ Farming making enough for your own survival
- ____ Practices involve a large amount of land as well as less labor and less technology
- Acronym for Genetically Modified Organisms
- ____ Desert is an area with limited access to affordable and nutritious food.
Down
- ____ Commodity Chain is Interconnected networks of production, distribution, and consumption
- ____ Model was developed in the 19th century to explain the spatial organization of agriculture
- ____ Agricultural Revolution Increase in agricultural output due to the Industrial Revolution
- The raising of animals or the growing of crops
- ____ Diffusion is the spread of domesticated plants and animals
- ____ Revolution pesticides, fertilization, irrigation, and GMO’s to created higher agricultural yields
- ____ Practices involve a small amount of labor and large amount of labor
- ____ Revolution is the transition from nomadic hunter-gatherers to sedentary farmers
- good that is produced in one country and sold to another country
- country receives goods, services, or raw materials into their borders that have been produced or originate in another countr
19 Clues: growing the same crop each year. • Acronym for Genetically Modified Organisms • The raising of animals or the growing of crops • ____ Farming making enough to sell for a profit. • ____ Farming making enough for your own survival • is the taming of plants and animals for human use • ____ Diffusion is the spread of domesticated plants and animals • ...
Assignment 6 : Activities 2015-09-30
Across
- The standard markup language used to create web pages
- A legal right that grants the creator of an original work exclusive rights to its use and distribution
- Pictures/movies/graphics
- A component that stores data so future requests for that data can be served faster
- The objective and subjective components of the reliability of a source or message
- The internet is primarily this type of communication system
- Window's default text editor
- The author or creator of a work
- A person who falsifies data to pretend to be someone else
Down
- The main technology used to connect local area networks
- A related group of networked computers
- The act of making a website as fully functional and effective as possible
- Converts the bits a computer outputs into a form that is compatible with its internet service provider
- Where the course is conducted except for the final
- A group of information on a computer that can be software programs or data
- A type of search engine that builds an index of the web's content based on keywords
- The ease of learning how to use a human-made object
- A question or request for information
18 Clues: Pictures/movies/graphics • Window's default text editor • The author or creator of a work • A question or request for information • A related group of networked computers • Where the course is conducted except for the final • The ease of learning how to use a human-made object • The standard markup language used to create web pages • ...
Security Services 2025-03-18
Across
- An authentication protocol that encrypts only passwords but has extensive logging.
- An SNMP function that allows network administrators to modify device settings.
- A network administrator’s tool for overseeing device performance remotely.
- The command center in SNMP that controls network elements.
- A security model ensuring access control, user permissions, and activity logging.
- A traffic analysis technology used to monitor network performance and security.
- A structured storage of SNMP device statistics and performance metrics.
- The SNMP command used when retrieving information from a monitored device.
- A security mechanism that ensures encrypted, authenticated communication over IP networks.
Down
- A Cisco-specific protocol that encrypts entire authentication packets.
- A hierarchical level in a system that dictates time synchronization accuracy.
- A secure method for connecting to a network over an untrusted environment.
- The central repository where devices send messages for analysis and troubleshooting.
- An alert sent to an SNMP manager to signal critical events proactively.
- The alternative name for a technique used to duplicate and inspect network traffic.
- The software counterpart that collects and reports operational network data.
- A protocol ensuring that all network devices remain time-synchronized.
- A tunneling protocol enabling encapsulation of multiple network protocols.
18 Clues: The command center in SNMP that controls network elements. • A Cisco-specific protocol that encrypts entire authentication packets. • A protocol ensuring that all network devices remain time-synchronized. • An alert sent to an SNMP manager to signal critical events proactively. • A structured storage of SNMP device statistics and performance metrics. • ...
Vocab Quiz 1 Sentences 2025-09-29
Across
- Some older cell phones are already _________ and don’t work on the new networks.
- He spoke for a _________ amount of time. There was hardly any time left to work!
- The pattern was so _________ that you could barely tell what was happening.
- She was so _________ that she did it perfectly!
- If you _________ too many details, people won’t understand the story.
- They were blinded by their _________ and couldn’t see their own weakness.
- Some people only have _________ knowledge instead of a deep understanding.
- The season will _________ in a championship game.
- He chose to _________ the image entirely through colored ropes.
Down
- The flowers were blossoming _________. There were so many of them!
- He chose to use a _________ instead of cursing.
- There were too many _________ details for me to fully believe his story.
- I need a(n) _________ report so that I have the facts.
- He was so _________. He freely gave so many gifts to people.
- _________ can be a great obstacle to some. You need to care to succeed!
- The highway was lined with _________ that ruined the natural beauty.
- To compare them, you need to _________ them.
- Please make your conversation _________ so that we can save time.
18 Clues: To compare them, you need to _________ them. • He chose to use a _________ instead of cursing. • She was so _________ that she did it perfectly! • The season will _________ in a championship game. • I need a(n) _________ report so that I have the facts. • He was so _________. He freely gave so many gifts to people. • ...
Risk Interest Groups 2025-12-05
Across
- Machine learning using deep neural networks with many layers. (2 Words - between words)
- Packaging apps and dependencies into portable, isolated containers.
- Controls network traffic based on security policies.
- Transforming plaintext into ciphertext using cryptographic keys.
- Model memorizes noise in training data, hurting generalization.
- Security Information and Event Management for log aggregation and analytics.
- — Security model enforcing continuous verification and least privilege
- AI field enabling computers to understand and generate human language. (3 Words - between words)
- Public Key Infrastructure that manages certificates and trust.
- Algorithms that learn patterns from data to make predictions/decisions. (2 Words - between words)
Down
- Trusted entity that issues and validates digital certificates. (2 Words - between words)
- Single software instance serves multiple customers with isolation. (2 Words - between words)
- Automated coordination/management of services, containers, and workloads.
- Cryptographic proof of data integrity and signer authenticity. (2 Words - between words)
- Models that create new content (text, images, code) from learned patterns. (2 Words - between words)
- Algorithm that performs encryption and decryption.
- Access Control List defining allowed/denied permissions.
- Cloud model delivering virtualized compute, storage, and networking.
18 Clues: Algorithm that performs encryption and decryption. • Controls network traffic based on security policies. • Access Control List defining allowed/denied permissions. • Public Key Infrastructure that manages certificates and trust. • Model memorizes noise in training data, hurting generalization. • Transforming plaintext into ciphertext using cryptographic keys. • ...
Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16
Across
- _____ administrator is responsible for the creation, administration and security of computer networks.
- The _____ administrator is responsible for the administration and management of an organization's network.
- A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
- _____ write new programs, update and modify existing programs/software.
- _____ designers create webpage, build and maintain websites for an individual or an organization.
- The System _____ main role is to implement a new computerised system or upgrade an existing one.
6 Clues: _____ write new programs, update and modify existing programs/software. • A _____ librarian keeps an organization's data files and software up-to-date and organised. • The System _____ main role is to implement a new computerised system or upgrade an existing one. • ...
DIGITAL CITIZENSHIP VOCABULARY 2021-09-03
Across
- an area on the Web where information about a particular subject, organization, etc. can be found
- is an electronic machine that can store and arrange large amounts of information.
- a short description of a person, organization, etc., giving the main details about them.
- connected to and shared by a system of computers, especially the internet
Down
- a worldwide system of computer networks used to exchange information
- knowledge, equipment, and methods that are used in science and industry
6 Clues: a worldwide system of computer networks used to exchange information • knowledge, equipment, and methods that are used in science and industry • connected to and shared by a system of computers, especially the internet • is an electronic machine that can store and arrange large amounts of information. • ...
Year 12 ITA Revision 2012-10-07
Across
- A global network that consists of worldwide collections of networks
- Connects computers together so that the can share data and resources
- A licence that allows multiple users within an organisation to simultaneously use a software package
Down
- When there is no delay between sending and receiving a response (4,4)
- When a user's computer is connected to a network
5 Clues: When a user's computer is connected to a network • A global network that consists of worldwide collections of networks • Connects computers together so that the can share data and resources • When there is no delay between sending and receiving a response (4,4) • ...
Cybersecurity Definitions 2024-06-16
Across
- Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- An attack method where a perpetrator deceives individuals into divulging confidential information.
- The practice of protecting systems, networks, and programs from digital attacks.
Down
- A program that replicates itself to spread to other computers.
- A person who uses computers to gain unauthorized access to data.
5 Clues: A program that replicates itself to spread to other computers. • A person who uses computers to gain unauthorized access to data. • The practice of protecting systems, networks, and programs from digital attacks. • Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. • ...
Network Security 2025-03-06
4 Clues: Deceptive scheme intended to defraud or trick individuals. • Malicious software designed to harm, exploit, or disrupt systems. • Unwanted messages, often sent in bulk, typically for advertising. • Malicious software spreading through networks, infecting connected devices.
Cybersecurity Notables 2021-01-17
Across
- She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon”
- This astronomer caught the first advanced persistent threat and wrote about it in the 1989 book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage”
- He gained unauthorized access to dozens of computer networks. Arrested by the FBI in 1995, he pleaded guilty to four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication, resulting in five years in prison. Now he runs a computer security consultancy and is part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing.
- He exposed some of the biggest data breaches ever, including the ones at Target and Home Depot. He has also written several books chronicling his extensive work investigating cyber-criminal gangs in Russia and elsewhere. But he is not related to the recently fired CISA director.
- Best known for his work involving DNS cache poisoning, he is one of just seven people with the authority to restore the DNS root keys on the Internet in the event of an emergency.
- He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo.
- This Cornell University graduate student created in 1988 the very first internet worm and denial-of-service (DoS) attack.
Down
- She invented the Spanning Tree Protocol (STP) that builds a loop-free logical topology for Ethernet networks.
- She created Microsoft’s Bug Bounty Program and the Hacker One Bug Bounty Program, where she helped create the Department of Defense's "Hack the Pentagon" pilot program.
- As a researcher at BBN technologies, he realized in 1970 the possibilities of creating a program capable of moving in a network and leaving behind a trail.
- Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period.
- Created the haveibeenpwned.com website that allows anyone to check to see if their email or username has been compromised in major breaches.
12 Clues: She wrote “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon” • He founded the Stanford Internet Observatory and led the security teams at Facebook and Yahoo. • Exploited a security flaw in MySpace that allowed him to gain 1 million friends in a 20-hour period. • ...
Today's Technologies (Module 1) 2022-01-13
Across
- A pointing device that fits under the palm of your hand comfortably
- Small speakers that rest inside each ear canal
- A _______ console is designed for single-player or multiplayer video games
- An output device that produces text and graphics on a physical medium, such as paper
- A personal computer designed to be in a stationary location
- Software that enables users with an Internet connection
- Does not contain a tower and instead uses the same case to house the display and the processing circuitry
- Also called a notebook computer
- A _______ device is a small, mobile computing consumer device designed to be worn
- An electronic device, operating under the control of instructions stored in its own memory
Down
- A _______ engine is software that finds websites, webpages, images, videos
- Internet-capable phone
- A computer dedicated to providing one or more services to other computers
- Worldwide collection of computer networks
- A ______ drive is a portable flash memory storage device that you plug in a USB port
- An ______ device allows you to enter data
- A thin, lighter-weight mobile computer that has a touch screen
- A collection of computers and devices connected together
18 Clues: Internet-capable phone • Also called a notebook computer • Worldwide collection of computer networks • An ______ device allows you to enter data • Small speakers that rest inside each ear canal • Software that enables users with an Internet connection • A collection of computers and devices connected together • ...
COSC 100 Part 1 Assignment 6 2015-09-23
Across
- About half the word count as the control condition.
- The default Windows text editor.
- Type of communication where the sender and the receiver are active at the same time.
- The markup used to write HTML
- The codes or tags that browsers use to create web pages.
- A group of information on a computer that can be software programs or data.
- The flow of data across the Internet.
- Networks that are not geographically close.
- When computers are geographically close and can be linked by a single cable or pair of wires.
- The author of a work (e.g., video, audio, graphic, icon).
Down
- Using the "marketese" found on many commercial web sites.
- A person who falsifies data to pretend to be someone else.
- Visits sites on the Internet, discovering web pages and building its index.
- Pictures, movies and graphics that can be embedded in a web page.
- Looks up user-submitted keywords in the index and reports back with web pages containing the keywords.
- Type of communication where the sending and receiving occur at different times.
- A permanently fixed original work.
- place on your hard drive where data is temporarily stored.
18 Clues: The markup used to write HTML • The default Windows text editor. • A permanently fixed original work. • The flow of data across the Internet. • Networks that are not geographically close. • About half the word count as the control condition. • The codes or tags that browsers use to create web pages. • Using the "marketese" found on many commercial web sites. • ...
Richard Demetrius Hurnall 2025-05-19
Across
- A cartoon character that has faces in it
- Laugh out loud
- person, especially a young man, who is perceived as independent, self-reliant, and possibly a bit of a "lone wolf".
- A secret mouth technique to gain a more defined jawline
- a wireless technology that allows devices to connect and exchange data over short distances using radio waves
- a person's "cool" or "it" factor, often used to describe someone's confidence, charisma, and stylishness.
- The notional environment in which communication over computer networks occurs
- Online experience to make it feel like the game is real
- If you know you know
Down
- Looking better then someone
- the programs and other operating information used by a computer.
- Universal serial bus
- A social media influencer and ex gangster, made famous for his human pig hybrid appearance.
- Main antagonist whom is a notorious hitman responsible for the high-profile murder of John Pork, a popular vlogger, and gang member.
- the machines, wiring, and other physical components of a computer or other electronic system.
- n intergalactic alien warlord and conqueror, a Chimera Sui Generis who serves as Ben's archenemy, and the main antagonist of the franchise Ben 10
- Away from keyboard
- In real life
18 Clues: In real life • Laugh out loud • Away from keyboard • Universal serial bus • If you know you know • Looking better then someone • A cartoon character that has faces in it • A secret mouth technique to gain a more defined jawline • Online experience to make it feel like the game is real • the programs and other operating information used by a computer. • ...
describing technical functions and applications 2025-09-23
Across
- : The base-2 number system used by computers, consisting of just zeros and ones.
- : The component of a computer that performs the main calculations.
- Clues
- : A set of rules or instructions for solving a problem or performing a task.
- : The physical parts of a computer or electronic system.
- : The set of instructions and data that tells a computer what to do.
- Clues
- : A device that detects and responds to some type of input from the physical environment.
- : A single point in a graphical image on a digital display.
- : An organized collection of structured information.
Down
- : A closed loop through which an electric current can flow.
- : The process of writing instructions for a computer to execute.
- : The practice of protecting systems and networks from digital threats.
- : A small piece of semiconducting material on which an integrated circuit is imprinted.
- : An object placed in orbit to transmit and receive signals, used for communication or GPS.
- : The point where a user and a computer system interact.
- : A type of signal that is continuous and represented by a physical quantity.
- : The engineering field that deals with the design and operation of mechanical machines.
- : A deviation from what is standard, normal, or expected.
19 Clues: Clues • Clues • : An organized collection of structured information. • : The point where a user and a computer system interact. • : The physical parts of a computer or electronic system. • : A deviation from what is standard, normal, or expected. • : A closed loop through which an electric current can flow. • : A single point in a graphical image on a digital display. • ...
Charter Communications-Fun Day Trivia 2018-01-05
Across
- Which team handles repayment agreements for medical deductions(________ Benefits)
- Philo Farnsworth battled with ________Zworykin to be called the "father of television."
- Charter, Time Warner Cable and _________ house networks combined in 2016.
- How many business units do we service?
- If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
- One of our key necessities is expanding access to ___________. This is a necessity to compete.
Down
- Charter Partnered with___________ Channel to connect veterans with their communities.
- The Second Largest Cable Provider in the U.S.
- Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
- The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
- If I am out on workman’s compensation, my updates are completed by the _________ team.
11 Clues: How many business units do we service? • The Second Largest Cable Provider in the U.S. • Charter, Time Warner Cable and _________ house networks combined in 2016. • Which team handles repayment agreements for medical deductions(________ Benefits) • Charter Partnered with___________ Channel to connect veterans with their communities. • ...
Software 2014-10-07
Across
- an interface through which a user interacts with electronic devices such as computers.
- software that manages computer hardware and software resources.
- user interface to a computer's operating system or an application in which the user responds to a visual prompt by typing in a command on a specified line.
- a network security system that controls the incoming and outgoing network traffic.
- a system, tool, or technical process that is developed by and for a specific business entity.
Down
- a computer program written specifically for your company.
- a software utility that rearranges the fragments.
- everything designed into an information device with which a human being may interact.
- the protection of personal hardware programs networks and data.
- program in which the source code is available to the general public.
- A program that performs a very specific task.
11 Clues: A program that performs a very specific task. • a software utility that rearranges the fragments. • a computer program written specifically for your company. • the protection of personal hardware programs networks and data. • software that manages computer hardware and software resources. • program in which the source code is available to the general public. • ...
Find the words! 2020-05-30
Across
- Soon we will be able to upload ourselves to a ______ environment
- The advancements of _________ has made the biggest impact on how we live our day to day life in the last century
- ____ has high expectations in business areas such as logistics distribution, military and food safety due to its
- recognition rate, contactless recognition media, reach, connectivity with other networks and scalability of
- These days, cell phones have iris recognition ______
Down
- __________ helps us complete complicated tasks quickly
- Soon labors will become significantly more redundant due to _________(-ically/+ed) machinery
- Due to the recent pandemic the governments ________d a plethora of necessary products such as masks or other hygiene products to the civilians
- Do not forget to ________ in order to receive your promotion
- The ______ of technology is in vogue these days
- Tesla is currently the fastest growing eco friendly ____-______ car company
11 Clues: The ______ of technology is in vogue these days • These days, cell phones have iris recognition ______ • __________ helps us complete complicated tasks quickly • Do not forget to ________ in order to receive your promotion • Soon we will be able to upload ourselves to a ______ environment • ...
Robot Vocab 2023-03-17
Across
- learning machines notice patterns and learn from them to become more intelligent
- loop compares an actual variable with a desirable variable and adjusts the system accordingly
- system knowledge that is collected from experts and stored into a database
- intelligence The science of making machines do things that would require intelligence if done by men
- test a test for intelligence in a computer or robot to answer the question “Can machines think?”
- networks essentially a machine that processes information and learns from its experiences
Down
- making decisions and solving problems using common sense
- learning learning unsupervised from data that is unstructured or unlabeled
- analysis a method that allows you to examine the relationship between two or more variables of interest
- a set of rules designed to solve a problem
- valley feeling of revulsion humans get when presented with a robot
11 Clues: a set of rules designed to solve a problem • making decisions and solving problems using common sense • valley feeling of revulsion humans get when presented with a robot • learning learning unsupervised from data that is unstructured or unlabeled • system knowledge that is collected from experts and stored into a database • ...
ACRONYMS 2 2026-01-21
Across
- Personally Identifiable Information personal details like your name, address, or phone number
- Information Technology the field concerned with computer systems and networks
- Software as a Service software delivery and licensing accessed online via a subscription
- Random Access Memory computer hardware for short-term memory that resets when power shuts off
- Portable Network Graphics common compressed image format
Down
- Protocol A unique number that identifies a computer on the Internet.
- Multi-Factor Authentication requires multiple verification steps for security.
- Quality Assurance process of testing systems to ensure reliability.
- Internet Service Provider A company or group that provides access to the Internet.
- Red, Green, Blue color model for screens and digital media
- machine learning when a computer learns from data and examples to make better decisions over time. OS operating system software for a computer's basic functions, like executing applications and controlling peripherals
11 Clues: Portable Network Graphics common compressed image format • Red, Green, Blue color model for screens and digital media • Quality Assurance process of testing systems to ensure reliability. • Protocol A unique number that identifies a computer on the Internet. • Information Technology the field concerned with computer systems and networks • ...
Unit 32 How networks can be attacked 2013-11-28
Across
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
- Is a software that gathers information about a person or organisation without their knowledge
- Is a type of malicious software that is activated each time your system boots up
- It attempts to make a user or organisation lose its services
- Usually these are statistical analyses that attempt to discover keys
Down
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
- Know as malicious software
- Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- Is a method where any virus such Trojan, Malware can get through all security procedures
- Also known for advertising supported software
11 Clues: Know as malicious software • Also known for advertising supported software • It attempts to make a user or organisation lose its services • Usually these are statistical analyses that attempt to discover keys • Is a type of malicious software that is activated each time your system boots up • ...
Basic Computer Vocabulary 2021-01-20
Across
- the process of assigning a code to something for classification or identification
- The physical components of my computer or device
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- copy (data) from one computer system to another, typically over the internet.
Down
- The programs and other operating information used by a computer
- the address of a web page.
- a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen.
7 Clues: the address of a web page. • The physical components of my computer or device • The programs and other operating information used by a computer • copy (data) from one computer system to another, typically over the internet. • the process of assigning a code to something for classification or identification • ...
e-cell-weekly-newsletter-2 2022-01-02
Across
- I'm the last one to be added into the unicorns from India in 2021
- I'm the co-founder of one of the crypto networks that brings massive scale to Ethereum using Plasma and PoS based side-chain
- I am India's first and largest chain of backpackers' hostel in India
Down
- World's largest crypto exchange platform
- Only startup from IIT BHU Alumni to make it to the Nasdaq-100 Index
- I occur when a buyer purchases more than half of a firm.
- My IPO buyers were the most unhappy when I was listed on the stock exchange.
7 Clues: World's largest crypto exchange platform • I occur when a buyer purchases more than half of a firm. • I'm the last one to be added into the unicorns from India in 2021 • Only startup from IIT BHU Alumni to make it to the Nasdaq-100 Index • I am India's first and largest chain of backpackers' hostel in India • ...
Romance scam 2024-02-16
Across
- The practice of protecting computer systems, networks, and programs from digital attacks, theft, or damage.
- A person engaged in fraudulent activities, such as scams or deceit.
- The action of threatening to reveal embarrassing or damaging information about someone unless they do something, usually pay money.
- To identify or discover something, often used in the context of finding fraudulent activities.
Down
- To stop something from happening, in this case, stopping romance scams before they occur.
- The act of intentionally misleading or tricking someone.
- Malicious software designed to harm or exploit computer systems.
7 Clues: The act of intentionally misleading or tricking someone. • Malicious software designed to harm or exploit computer systems. • A person engaged in fraudulent activities, such as scams or deceit. • To stop something from happening, in this case, stopping romance scams before they occur. • ...
Vocational Variety 2016-09-14
Across
- a program that enables a user to view and move among websites
- a filmmaking technique that utilizes only natural light & sound
- a single file in a collection of files that make a web page
- a savoury, open-faced pastry crust with a filling of cheese, meat, seafood or vegetables.
- retailer selling through conventional and online
- a baked egg-based dish which originated in early eighteenth century France.
- a device that breaks solid materials into smaller pieces by grinding, crushing, or cutting
- the global network of computers
- The name of an HTML tag
- A large deciduous tree in the mint family having hard, heavy, durable yellowish .
Down
- A characteristic applied to an HTML tag
- a set of rules that determine how data is transmitted on a network
- a filmmaking technique utilizing harsh contrasts & shadows
- an element such as a form, image or video file on a web page
- Retailers who sell primarily through the internet
- a boneless cut or slice of meat or fish,
- a computer networking device joining two or more networks
- A machine for shaping a piece of material, such as wood or metal, by rotating it
18 Clues: The name of an HTML tag • the global network of computers • A characteristic applied to an HTML tag • a boneless cut or slice of meat or fish, • retailer selling through conventional and online • Retailers who sell primarily through the internet • a computer networking device joining two or more networks • a filmmaking technique utilizing harsh contrasts & shadows • ...
