networks Crossword Puzzles

Chapter 10 & 11 Key Terms 2022-02-08

Chapter 10 & 11 Key Terms crossword puzzle
Across
  1. muscle that compresses the cheek
  2. muscle-forming stem cell
  3. to the outside
  4. bundle of muscle fibers within a skeletal muscle
  5. striated muscle found in the heart; joined to one another at intercalated discs and under the regulation of pacemaker cells, which contract as one unit to pump blood through the circulatory system. Cardiac muscle is under involuntary control.
  6. protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
  7. moves the bone toward the midline
  8. muscle whose contraction is responsible for producing a particular motion
  9. formation of blood capillary networks
  10. muscle that increases the angle at the joint
  11. swallowing
Down
  1. muscle that adducts the thigh and flexes the leg at the knee
  2. regulatory protein that facilitates contraction in smooth muscles
  3. muscle that, along with the psoas major, makes up the iliopsoas
  4. broad, tendon-like sheet of connective tissue that attaches a skeletal muscle to another skeletal muscle or to a bone
  5. skeletal muscle that separates the thoracic and abdominal cavities and is dome-shaped at rest
  6. replacement of muscle fibers by scar tissue
  7. fascicles that extend over a broad area and converge on a common attachment site

18 Clues: swallowingto the outsidemuscle-forming stem cellmuscle that compresses the cheekmoves the bone toward the midlineformation of blood capillary networksreplacement of muscle fibers by scar tissuemuscle that increases the angle at the jointbundle of muscle fibers within a skeletal musclemuscle that adducts the thigh and flexes the leg at the knee...

11.5 Testout Crossword 2023-03-28

11.5 Testout Crossword crossword puzzle
Across
  1. Local area network.
  2. Passphrase a user enters to access the wireless network.
  3. Standard for local area networks created by The IEEE-SA.
  4. Wide area network.
  5. Technique used by hackers to gain access to a target's computer or online accounts.
  6. Sequence of characters that identify a WIFI network.
  7. The conversion of data from a readable format into an encoded format.
  8. Allows a device to securely connect to a wireless network without entering the PSK.
Down
  1. Combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
  2. Transmission without the use of wires or cables.
  3. When a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
  4. Telephone interface that uses a cable of twisted wire pairs.
  5. Password or identification process.
  6. Cable consisting of an inner conductor surrounded by a concentric conducting shielding.
  7. Was developed by Cisco to address security concerns in RADIUS.
  8. Increases bandwidth by using multiple antennas for both the transmitter and receiver.
  9. Developed at MIT and is a key component of Windows Active Directory.
  10. Standardized physical network interface connecting data equipment.

18 Clues: Wide area network.Local area network.Password or identification process.Transmission without the use of wires or cables.Sequence of characters that identify a WIFI network.Passphrase a user enters to access the wireless network.Standard for local area networks created by The IEEE-SA.Telephone interface that uses a cable of twisted wire pairs....

1.3 Network Connections and Protocols 2025-03-19

1.3 Network Connections and Protocols crossword puzzle
Across
  1. A wireless method for connecting devices to a network
  2. A global network connecting millions of devices worldwide
  3. A device that requests information from a server
  4. A device which provides data or services to other devices
  5. Online storage and computing services accessed via the internet
  6. A network that spans a large geographical area, such as the internet(acronym)
  7. The maximum amount of data that can be transmitted across a network
  8. A network layout where all devices connect to a central point
  9. A device that forwards data between networks
  10. A network layout where each devices connects directly to multiple others
Down
  1. A device which directs data only to the intended recipient
  2. A type of network that connects computers in a small area, like a school or office(acronym)
  3. The system that translates domain names into IP addresses(acronym)
  4. The arrangement or layout of devices in a network
  5. A computer in a network that can act as both client and server
  6. A wired networking technology commonly used in LANS
  7. A short-range wireless communication technology
  8. A high-speed internet connection that transmits large amounts of data

18 Clues: A device that forwards data between networksA short-range wireless communication technologyA device that requests information from a serverThe arrangement or layout of devices in a networkA wired networking technology commonly used in LANSA wireless method for connecting devices to a networkA global network connecting millions of devices worldwide...

CS Principles Exam Review 2026-02-13

CS Principles Exam Review crossword puzzle
Across
  1. A data transport protocol that includes mechanisms for reliably transmitting packets to a destination
  2. ____ access point gives unauthorized access to secure networks
  3. making something in code that is based on something from the real world.
  4. hiding a message in plain sight (rain will not see this)
  5. Run-Time Error code is ____ but makes an error.
  6. Cipher where the letters are mixed up somehow
  7. _____ Error runs but there is a Mistake in how you wrote the code.
  8. Compressing data in a way that discards some data
  9. Compressing data in a way that preserves all data
  10. ____ science Crowdsourcing for science! The participation of volunteers from the public in a scientific research project
  11. A model in which many online users combine efforts to help fund projects
  12. data about data
Down
  1. A lightweight data transport protocol with minimal error checking.
  2. device/hardware that uses software or the software itself
  3. A technique that helps an algorithm find a good solution in a hard problem
  4. ETHERNET used ___ addresses to send data between computers on the network.
  5. ____ Area Network, A small network often in one building.
  6. ___ Cipher where every letter is ___ with another letter

18 Clues: data about dataCipher where the letters are mixed up somehowRun-Time Error code is ____ but makes an error.Compressing data in a way that discards some dataCompressing data in a way that preserves all datahiding a message in plain sight (rain will not see this)___ Cipher where every letter is ___ with another letter...

CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16

CrossWord 21CSE492T CYBERCRIMES  AND CYBERSECURITY IV Year / VII Sem  FT3 -17.10.25 SET A Duration :15 mins  Marks:20 crossword puzzle
Across
  1. A security mechanism or virtual trap intended to be compromised to capture attacker data.
  2. Data describing other data, such as timestamps or authors
  3. Firewall type that provides unified policy across distributed networks
  4. Unauthorized email scams that trick users into revealing information
  5. Potential events or circumstances that can cause harm to an organization's assets.
  6. Network tool for capturing and analyzing traffic
  7. A central security resource where multiple virtual traps are monitored (One word).
  8. Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
  9. Technology used by NGFW to detect and block malware
Down
  1. A security mechanism that creates a virtual trap to lure attackers and study their techniques.
  2. An illegal intrusion into a computer system or network
  3. The verification procedure to demonstrate that the network meets security requirements
  4. The 'A' in the CIA triad, ensuring systems and data must be available on demand.
  5. Legal process of collecting and analyzing digital evidence
  6. Process of identifying, assessing, and mitigating threats
  7. Malicious software specifically designed to disrupt or damage computer systems
  8. Programs designed to record personal information, typically undesired software
  9. A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
  10. Software that records keystrokes, potentially capturing sensitive login credentials.
  11. Deceptive emails or messages impersonating trusted entities to steal sensitive information

20 Clues: Network tool for capturing and analyzing trafficTechnology used by NGFW to detect and block malwareAn illegal intrusion into a computer system or networkData describing other data, such as timestamps or authorsProcess of identifying, assessing, and mitigating threatsLegal process of collecting and analyzing digital evidence...

Cybersecurity 2024-02-15

Cybersecurity crossword puzzle
Across
  1. A technique used to trick individuals into revealing sensitive information
  2. The process of protecting computer systems, networks, and data from theft or damage
  3. A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
  1. The practice of verifying the identity of a user or system before granting access
  2. A program or device used to detect and prevent unauthorized access to a computer or network
  3. A secret code used to gain access to a computer system, network, or account
  4. A malicious program that self-replicates and spreads to other computers

7 Clues: A malicious program that self-replicates and spreads to other computersA technique used to trick individuals into revealing sensitive informationA secret code used to gain access to a computer system, network, or accountThe practice of verifying the identity of a user or system before granting access...

Internet history 2022-11-10

Internet history crossword puzzle
Across
  1. the order in which a series of things appears
  2. to start an activity, especially an organized one
  3. to understand something or somebody wrongly
  4. a website where an individual person, or people representing an organization, write regularly about recent events or topics that interest them, usually with photos and links to other websites that they find interesting
Down
  1. to represent
  2. an international computer network connecting other networks and computers that allows people to share information around the world
  3. software such as a virus specifically designed to damage or gain access to a computer system without the user knowing

7 Clues: to representto understand something or somebody wronglythe order in which a series of things appearsto start an activity, especially an organized onesoftware such as a virus specifically designed to damage or gain access to a computer system without the user knowing...

test1 2024-03-01

test1 crossword puzzle
Across
  1. Annat ord för behov
  2. Berättelse
Down
  1. Flera om jobbar tillsammans

3 Clues: BerättelseAnnat ord för behovFlera om jobbar tillsammans

Exploratory Art: Cumulative Exam Review (#1-19) 2021-05-12

Exploratory Art: Cumulative Exam Review (#1-19) crossword puzzle
Across
  1. a device that creates the illusion of movement and was the forerunner to the modern projector.
  2. provided instant communication and information to a massive audience for the first time.
  3. creates animation using live footage as guides.
  4. an application of commercial photography to communicate or establish trends.
Down
  1. self-contained, self-sustained explosions, fires, flames, and fireworks used in live performances, film, and other forms of entertainment.
  2. a recording of a motion picture, or television program for playing through a television.
  3. transparent sheets of film on which objects are drawn or painted for traditional hand drawn animation.
  4. a standard communications protocol used to connect computer networks around the world.
  5. a visual series of rough drawings depicting the scenes of action in a story.
  6. transferring two dimensional images onto a screen for viewing.

10 Clues: creates animation using live footage as guides.transferring two dimensional images onto a screen for viewing.a visual series of rough drawings depicting the scenes of action in a story.an application of commercial photography to communicate or establish trends.a standard communications protocol used to connect computer networks around the world....

Globalization 2022-11-04

Globalization crossword puzzle
Across
  1. Money received, especially on a regular basis, for work or through investments.
  2. Difference in size, degree, circumstances
  3. The process by which businesses or other organizations develop international influence or start operating on an international scale.
  4. The action of buying and selling goods and services.
Down
  1. A friend, or a person who works for someone in authority, especially one who is willing to give and receive dishonest help.
  2. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  3. Taking place or progressing slowly or by degrees.
  4. A society or association formed by people with a common interest or purpose.
  5. A state or society governed by the wealthy.
  6. The transfer of a business, industry, or service from public to private ownership and control

10 Clues: Difference in size, degree, circumstancesA state or society governed by the wealthy.Taking place or progressing slowly or by degrees.The action of buying and selling goods and services.A society or association formed by people with a common interest or purpose.Money received, especially on a regular basis, for work or through investments....

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06

community-based  mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. Crisis Assistance Helping Out On The Streets Acronym
  2. What region was identified in step one of the asset collection method?
  3. key asset component
  4. Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
Down
  1. What is Bill 178?
  2. Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
  3. Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
  4. Declared anti-Black Racism as a public health crisis
  5. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
  6. What is our asset organization's acronym?

10 Clues: What is Bill 178?key asset componentWhat is our asset organization's acronym?Crisis Assistance Helping Out On The Streets AcronymDeclared anti-Black Racism as a public health crisisWhat region was identified in step one of the asset collection method?...

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06

community-based  mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
  2. Crisis Assistance Helping Out On The Streets Acronym
  3. Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
  4. Key asset component
  5. What is our asset organization's acronym?
Down
  1. What region was identified in step one of the asset collection method?
  2. What is Bill 178?
  3. Declared anti-Black Racism as a public health crisis
  4. Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
  5. Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)

10 Clues: What is Bill 178?Key asset componentWhat is our asset organization's acronym?Declared anti-Black Racism as a public health crisisCrisis Assistance Helping Out On The Streets AcronymWhat region was identified in step one of the asset collection method?...

Networking Puzzle 2016-04-26

Networking Puzzle crossword puzzle
Across
  1. I am a small network that interconnects computers within a limited area such as a residence, school,lab etc
  2. I am address assigned to each device (e.g., computer, printer) participating in a computer network
  3. I am a group of two or more computer systems linked togetherIP.
  4. Term used to send audio and/or video content to everyone in the network
Down
  1. I am used to regenerate or replicate a signal.
  2. is communication between a single sender and a single receiver over a network
  3. I serve as a central connection for all of your network equipment but i am not intelligent
  4. I span over a relatively large geographical typically consists of two or more local-area networks (LANs).
  5. I am also called physical address/hardware address
  6. I perform the "traffic directing" functions on the Internet

10 Clues: I am used to regenerate or replicate a signal.I am also called physical address/hardware addressI perform the "traffic directing" functions on the InternetI am a group of two or more computer systems linked togetherIP.Term used to send audio and/or video content to everyone in the network...

Loy Krathong 2023-11-22

Loy Krathong crossword puzzle
Across
  1. the round object that moves around the earth and shines at night by light reflected from the sun
  2. a natural flow of water that continues in a long line across land to the sea
  3. round stick of wax with that is lit to give light as it burns
  4. the natural world in which people, animals and plants live
  5. tropical plant with white or pink flowers that grows on the surface of lakes
  6. physical or mental pain
Down
  1. computer network connecting other networks and computers that allows people to share information around the world
  2. scientific knowledge used in practical ways in industry
  3. material that is produced by chemical processes and can be formed into shapes
  4. all the plants, animals and things that exist in the universe that are not made by people

10 Clues: physical or mental painscientific knowledge used in practical ways in industrythe natural world in which people, animals and plants liveround stick of wax with that is lit to give light as it burnsa natural flow of water that continues in a long line across land to the seatropical plant with white or pink flowers that grows on the surface of lakes...

Special Technical ICT Definitions 2024-03-10

Special Technical ICT Definitions crossword puzzle
Across
  1. The method by which information is converted into secret code that hides the information's true meaning.
  2. A list of records linked together using special cryptographic operations across a distributed network of computers⁵.
  3. A set of rules to be followed in calculations or other problem-solving operations.
  4. A network security system that monitors and controls incoming and outgoing network traffic.
  5. Records of events that happen in an operating system or other software.
Down
  1. The maximum rate of data transfer across a given path.
  2. A hardware or software component that stores data so future requests for that data can be served faster.
  3. An identification string that defines a realm of administrative autonomy, authority or control within the internet.
  4. The loss of signal strength in networking cables or connections⁵.
  5. A device that forwards data packets along networks.

10 Clues: A device that forwards data packets along networks.The maximum rate of data transfer across a given path.The loss of signal strength in networking cables or connections⁵.Records of events that happen in an operating system or other software.A set of rules to be followed in calculations or other problem-solving operations....

DS 2025-09-26

DS crossword puzzle
Across
  1. What's the term for a piece of evidence or information that helps solve a mystery?
  2. What term describes a step-by-step procedure for solving problems in computer science?
  3. What word describes an elaborately planned theft by a skilled criminal team?
  4. What metric measures the proportion of correct predictions among total cases examined in classification?
  5. Which versatile programming language, named after a snake, is used in web dev, data analysis, and AI?
  6. What acronym represents a technique to reduce dataset dimensionality while preserving information?
Down
  1. Which ML subset is inspired by the human brain, using neural networks?
  2. In machine learning evaluation, what three-letter acronym represents a graphical plot illustrating a classifier’s performance across various thresholds?
  3. a.k.a
  4. What term describes the money or items demanded by criminals to release victims?

10 Clues: a.k.aWhich ML subset is inspired by the human brain, using neural networks?What word describes an elaborately planned theft by a skilled criminal team?What term describes the money or items demanded by criminals to release victims?What's the term for a piece of evidence or information that helps solve a mystery?...

Navigating the Web of Cyber Law 2025-06-05

Navigating the Web of Cyber Law crossword puzzle
Across
  1. A violation of privacy where an individual's data is exposed or stolen.
  2. A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
  3. A legal framework that governs the use of electronic signatures in contracts.
  4. The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
  5. The unauthorized copying or distribution of software or digital content.
Down
  1. The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
  2. The practice of protecting computers, networks, and data from unauthorized access or attacks.
  3. A method of writing in code so that only authorized parties can access it.
  4. A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
  5. The unlawful act of accessing a computer system without authorization.

10 Clues: The unlawful act of accessing a computer system without authorization.A violation of privacy where an individual's data is exposed or stolen.The unauthorized copying or distribution of software or digital content.A method of writing in code so that only authorized parties can access it....

Business technology 2026-02-22

Business technology crossword puzzle
Across
  1. conferencing-Videoconferencing is a specialized type of teleconferencing that adds real-time video, allowing participants to see facial expressions and share screens.
  2. technology- refers to the use of all types of business make of information technology
  3. buying and selling product online
  4. hardware of a company’s IT system includes the items that you can readily see and touch.
  5. Teleconferencing is a broad term for any, often audio-only, remote meeting connecting people in different locations.
  6. the programs inside the computer (like apps).
Down
  1. running an entire company online.
  2. banking - managing money through a website / app.
  3. networks-interconnected systems of devices—such as computers, servers, or components—that communicate via cable, radio, or optical signals to share information, resources, and data.
  4. storage-savings digital files for later.

10 Clues: running an entire company online.buying and selling product onlinestorage-savings digital files for later.the programs inside the computer (like apps).banking - managing money through a website / app.technology- refers to the use of all types of business make of information technology...

5G Pillars 2024-11-26

5G Pillars crossword puzzle
Across
  1. What feature helps to conserve battery life by managing power usage in devices?
  2. What high-frequency waves are used in 5G to enable ultra-fast data speeds?
  3. What network component must be upgraded to handle the large volume of traffic generated by small cells?
  4. What is improved in 5G to enhance spectral efficiency, energy efficiency, and latency?
  5. What concept allows the sharing of wireless infrastructure among multiple network operators?
Down
  1. What technique is used to allow efficient utilization of available frequency bands?
  2. What is densely deployed to improve coverage and handle massive traffic indoors and outdoors?
  3. What is allocated to 5G to support higher data capacities and better coverage?
  4. What type of communication focuses on machine-to-machine interactions?
  5. What term refers to networks that can configure, optimize, and repair themselves automatically?

10 Clues: What type of communication focuses on machine-to-machine interactions?What high-frequency waves are used in 5G to enable ultra-fast data speeds?What is allocated to 5G to support higher data capacities and better coverage?What feature helps to conserve battery life by managing power usage in devices?...

Fun Friday 2024-04-28

Fun Friday crossword puzzle
Across
  1. A device that directs data packets between computer networks.
  2. The measure of data transfer rate over a network.
  3. A device that modulates and demodulates analog signals for transmitting digital data over communication lines.
  4. A security system that monitors and controls incoming and outgoing network traffic.
  5. The process of encoding data to make it unreadable without the proper decryption key.
Down
  1. Software used to access and view websites on the internet.
  2. A set of rules governing the exchange of data between devices on a network.
  3. A virtual private network that creates a secure connection over the internet, often used for remote access to a private network.
  4. A standard system for connecting computers to a local area network (LAN).
  5. Software designed to disrupt, damage, or gain unauthorized access to computer systems.

10 Clues: The measure of data transfer rate over a network.Software used to access and view websites on the internet.A device that directs data packets between computer networks.A standard system for connecting computers to a local area network (LAN).A set of rules governing the exchange of data between devices on a network....

Technology Glossary 2 2025-03-01

Technology Glossary 2 crossword puzzle
Across
  1. A request for data or information from a database.
  2. A sequence of instructions that is continually repeated until a certain condition is reached.
  3. A programming language commonly used to create interactive effects within web browsers.
  4. A device that forwards data packets between computer networks.
  5. learning A field of artificial intelligence that uses statistical techniques to give computers the ability to learn from data.
  6. A word or concept of great significance in programming and searching.
Down
  1. A group of interconnected computers that can communicate with each other.
  2. programming A programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
  3. The process of designing and building an executable computer program to accomplish a specific computing task.
  4. The programs and other operating information used by a computer.

10 Clues: A request for data or information from a database.A device that forwards data packets between computer networks.The programs and other operating information used by a computer.A word or concept of great significance in programming and searching.A group of interconnected computers that can communicate with each other....

Unit 2 Crossword 2024-12-29

Unit 2 Crossword crossword puzzle
Across
  1. Luxury item that was a major trade good on the Silk Road.
  2. Chinese innovation that spread to Europe, transforming military power.
  3. Disease that spread through increased trade, significantly reducing global populations.
  4. A key Silk Road city known for thriving markets and Islamic scholarship.
  5. Religion that spread from India to East Asia via the Silk Road, leading to syncretic forms like Zen Buddhism.
  6. A trading city located at the convergence of major Silk Road routes.
Down
  1. Rest-stops along the Silk Road that provided safety and cultural exchange.
  2. Muslim scholar who traveled extensively through Islamic regions and documented his experiences.
  3. East African civilization that combined Bantu culture with Arabic influences through Islamic trade networks.
  4. A type of rice from Vietnam that led to significant population growth in China.

10 Clues: Luxury item that was a major trade good on the Silk Road.A trading city located at the convergence of major Silk Road routes.Chinese innovation that spread to Europe, transforming military power.A key Silk Road city known for thriving markets and Islamic scholarship.Rest-stops along the Silk Road that provided safety and cultural exchange....

CYBER-BULLYING 2024-07-25

CYBER-BULLYING crossword puzzle
Across
  1. - staying safe online from bullies and hackers
  2. - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
  3. - careful investigation into a crime or mystery
  4. - a witness of the bullying
Down
  1. - an electronic communications network that connects computer networks and organizational computer facilities around the world
  2. - bullying but online
  3. - a secret word or phrase that must be used to gain admission to a place.
  4. - Someone who stands up to the bullies
  5. - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
  6. - the address of a unique resource on the internet

10 Clues: - bullying but online- a witness of the bullying- Someone who stands up to the bullies- staying safe online from bullies and hackers- careful investigation into a crime or mystery- the address of a unique resource on the internet- a secret word or phrase that must be used to gain admission to a place....

Industrial Revolution 2025-11-20

Industrial Revolution crossword puzzle
Across
  1. people in the middle of the social hierarchy
  2. uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
  3. the process of making an area more urban
  4. the process of supplying a military force with modern weapons and vehicles
  5. social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
  6. people who earn wages through labor
  7. a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
  1. the process of making something conform to a standard
  2. system of interconnected routes and relationships that facilitate between different regions and ethnicity
  3. the measure of efficiency of production of goods or services

10 Clues: people who earn wages through laborthe process of making an area more urbanpeople in the middle of the social hierarchythe process of making something conform to a standardthe measure of efficiency of production of goods or servicesthe process of supplying a military force with modern weapons and vehicles...

cyber puzzle 2024-11-15

cyber puzzle crossword puzzle
Across
  1. This word maintain the accuracy and trustworthinessof data over its entire lifecycle
  2. Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
  3. Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
  1. This word ensures that information and resources are accessible to authorized users when needed.
  2. This word ensures that sensitive information is only accessible to authorized individuals.
  3. The state of being protected from danger, theft, or unauthorized use of resources.
  4. A term used to describe anything related to computers, networks, or the internet.

7 Clues: A term used to describe anything related to computers, networks, or the internet.The state of being protected from danger, theft, or unauthorized use of resources.This word maintain the accuracy and trustworthinessof data over its entire lifecycleMeasures or systems designed to protect against threats, damage, or unauthorized access....

network 2024-01-14

network crossword puzzle
Across
  1. determines the best path though the network
  2. represents data to te use, plus encoding and dialog control
Down
  1. control the hardware devices and media that make up the network
  2. supports communication between various devices across diverse networks

4 Clues: determines the best path though the networkrepresents data to te use, plus encoding and dialog controlcontrol the hardware devices and media that make up the networksupports communication between various devices across diverse networks

Information 2013-04-09

Information crossword puzzle
Across
  1. an organization that publishes a newspaper in the USA (three words)
  2. the institution, system, or practice of forbidding information
  3. an organization that publishes a newspaper (two words)
  4. a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising (two words)
Down
  1. any of the means of communication, as television or newspapers, that reach very large numbers of people (two words)
  2. a statement prepared and distributed to the press by Amway (two words)
  3. a vast computer network linking smaller computer networks worldwide

7 Clues: an organization that publishes a newspaper (two words)the institution, system, or practice of forbidding informationan organization that publishes a newspaper in the USA (three words)a vast computer network linking smaller computer networks worldwidea statement prepared and distributed to the press by Amway (two words)...

FIBER OPTICS 2015-03-11

FIBER OPTICS crossword puzzle
Across
  1. In this type of network the peers are computer systems which are connected to each other via the Internet.
  2. FTTB stands for......................
  3. FTTC stands for....................
  4. This technology can increase the capacity of the existing networks without the need for new cable installation, and it uses laser beams and fiber optic media to work.
Down
  1. This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH.
  2. FTTH stands for.......................
  3. Fiber optics is a technology that uses...........or plastic threads to transmit data.

7 Clues: FTTC stands for....................FTTB stands for......................FTTH stands for.......................Fiber optics is a technology that uses...........or plastic threads to transmit data.This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH....

Smart System 2021-06-30

Smart System crossword puzzle
Across
  1. Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
  2. Application that involves wireless sensor and RFID technology,
  3. Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
  1. A maintenance technique that estimates when maintenance should be performed
  2. Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
  3. A sensor that detects movement sensor that detects
  4. Smart system application that reduces global emission

7 Clues: A sensor that detects movement sensor that detectsSmart system application that reduces global emissionApplication that involves wireless sensor and RFID technology,A maintenance technique that estimates when maintenance should be performed...

"WHAT'S IS THE HIDDEN WORDS?" 2023-11-26

"WHAT'S IS THE HIDDEN WORDS?" crossword puzzle
Across
  1. to use machines and computers instead of people to do a job or task.
  2. make changes i something established, especially by introducing new methods, ideas or product.
  3. a portable computer that can work with a battery.
  4. an international computer network connecting other networks and computers that allows people to share information around the world
Down
  1. a person who is enthusiastic about advanced equipments or devices.
  2. a formal discussion on a particular topic in a public meeting or legislative assembly, in which opposing arguments are put forward.
  3. an often small mechanical or electronic device which does something useful.

7 Clues: a portable computer that can work with a battery.a person who is enthusiastic about advanced equipments or devices.to use machines and computers instead of people to do a job or task.an often small mechanical or electronic device which does something useful....

Network Security 2023-06-05

Network Security crossword puzzle
Across
  1. A method used to encode data during storage or transmission (10)
  2. It refers to the right of individuals to determine what information is stored about them and how that information will be used.
  3. The unauthorised accessing of a computer system.
Down
  1. A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
  2. A small piece of software that uses computer networks and security holes to replicate itself. (5)
  3. A type of software used to protect computer systems from viruses.
  4. Another name for electronic junk mail.

7 Clues: Another name for electronic junk mail.The unauthorised accessing of a computer system.A method used to encode data during storage or transmission (10)A type of software used to protect computer systems from viruses.A small piece of software that uses computer networks and security holes to replicate itself. (5)...

MALWARE 2025-04-09

MALWARE crossword puzzle
Across
  1. - Software that automatically displays or downloads advertising material when online.
  2. - A stealthy malware that hides its presence and gives attackers control over a system.
  3. - A self-replicating malware that spreads through networks without user interaction.
  4. - Software that secretly monitors user activity and sends the data to a third party.
Down
  1. - A tool used to record every keystroke typed on a keyboard, often to steal passwords.
  2. - A malicious program that attaches to files and spreads when the file is opened.
  3. - Malware disguised as a harmless file or program to trick users into installing it.

7 Clues: - A malicious program that attaches to files and spreads when the file is opened.- Malware disguised as a harmless file or program to trick users into installing it.- A self-replicating malware that spreads through networks without user interaction.- Software that secretly monitors user activity and sends the data to a third party....

Lesson 7 year 11 crossword 2024-11-04

Lesson 7 year 11 crossword crossword puzzle
Across
  1. A network that connects computers within a small geographical area, such as a building or office.
  2. processor of a computer
  3. A private network that allows authorized external users to access certain parts of an organization's internal system.
Down
  1. The process of double-checking data to ensure its correctness, often through manual review or automated tools.
  2. A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs).
  3. A network that covers large geographical areas, often connecting multiple LANs, typically using third-party providers.
  4. memory of a computer

7 Clues: memory of a computerprocessor of a computerA network that connects computers within a small geographical area, such as a building or office.A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs)....

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Link between earth station and satellite
  2. Combination of transmitter and receiver in satellite
  3. Part of the celestial sphere directly above the observer
Down
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satelliteAngle between orbital plane and earth's equatorial planePart of the celestial sphere directly above the observer

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

NSS Chapter 2C 2023-01-09

NSS Chapter 2C crossword puzzle
Across
  1. Amount of time, including delays, for data to travel from one given point to another
  2. The measure of usable data transferred over a given period of time (Goodput = Throughput - traffic overhead)
  3. Braided or foil shield provides EMI/RFI protection
  4. capacity at which a medium can carry data.
Down
  1. the most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
  2. The measure of the transfer of bits across the media over a given period of time
  3. how the bit values, “1” and “0” are represented on the physical medium.
  4. Twisted pairs protect the signal from interference.

8 Clues: capacity at which a medium can carry data.Braided or foil shield provides EMI/RFI protectionTwisted pairs protect the signal from interference.how the bit values, “1” and “0” are represented on the physical medium.The measure of the transfer of bits across the media over a given period of time...

asd 2023-04-21

asd crossword puzzle
Across
  1. a type of software that allows you to find and view websites on the Internet
  2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. a technological process for telling a computer which tasks to perform in order to solve problems
  4. a worldwide system of computer networks
Down
  1. a group of related hardware units or programs or both, especially when dedicated to a single application
  2. a program designed to detect and remove viruses and other kinds of malicious software from your computer
  3. a coding error in a computer program
  4. the action or practice of playing video games

8 Clues: a coding error in a computer programa worldwide system of computer networksthe action or practice of playing video gamesa type of software that allows you to find and view websites on the Interneta technological process for telling a computer which tasks to perform in order to solve problems...

It 2023-05-17

It crossword puzzle
Across
  1. What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
  2. What mobile operating system was developed by Google?
  3. What do you call a group of interconnected computers and devices?
Down
  1. What technology allows devices to connect to a network without using cables or wires?
  2. What type of malware is capable of self-replicating and spreading across networks?
  3. horse Whattype of malware is disguised as a legitimate software program?
  4. What is the process of converting plain text into ciphertext called?
  5. In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?

8 Clues: What mobile operating system was developed by Google?What do you call a group of interconnected computers and devices?What is the process of converting plain text into ciphertext called?horse Whattype of malware is disguised as a legitimate software program?What type of malware is capable of self-replicating and spreading across networks?...

Types of measures to counter security threats. 2022-05-10

Types of measures to counter security threats. crossword puzzle
Across
  1. - involves focusing efforts to prevent threats to the most valuable information
  2. - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
  3. of the system to changes in the environment
  4. methods are based on one principle of information security management;
Down
  1. of additional tasks and requirements for employees of the organization caused by information protection measures
  2. special programs, software packages and information security systems in information systems for various purposes and data processing facilities
  3. tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
  4. - excludes acquaintance of third parties with the means and technology of information protection

8 Clues: of the system to changes in the environmentmethods are based on one principle of information security management;- involves focusing efforts to prevent threats to the most valuable information- excludes acquaintance of third parties with the means and technology of information protection...

ICT keywords 1 2025-03-05

ICT keywords 1 crossword puzzle
Across
  1. used to connect LANs together, connecting different types of network so they act as one single LAN
  2. is public access to a vast collection of computers and networks
  3. is to run both systems together until the new system works properly when the new system works the old system is removed
  4. a private network used in companies and organisations
Down
  1. it is a fraudulent practice of making phone calls/leaving voice messages
  2. it is the system that displays questions for the user to answer, displaying the results
  3. a collection of facts and rules. Created from information provided by experts
  4. this network device connects a LAN to the internet

8 Clues: this network device connects a LAN to the interneta private network used in companies and organisationsis public access to a vast collection of computers and networksit is a fraudulent practice of making phone calls/leaving voice messagesa collection of facts and rules. Created from information provided by experts...

Cyber ethics 2025-06-14

Cyber ethics crossword puzzle
Across
  1. A legal right granted by the law to the creator for his original work.
  2. Purchasing a single lisenced copy of the software and loading it into several computers.
  3. Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
  1. An illegal intrution into a computer system Or network.
  2. Vital information resources under seize.
  3. An act of sending to an user, misleading him to belive that it is from a trusted organisation.
  4. Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
  5. Unwanted bulk emails that comes from unknown sources.

8 Clues: Vital information resources under seize.Unwanted bulk emails that comes from unknown sources.An illegal intrution into a computer system Or network.A legal right granted by the law to the creator for his original work.Purchasing a single lisenced copy of the software and loading it into several computers....

Globalisation and crime 2025-02-07

Globalisation and crime crossword puzzle
Across
  1. A term describing global organised crime networks, as explored in the book by Misha Glenny.
  2. The study of social harm rather than just criminal behaviour.
  3. A sociologist known for his work on the network society and the impact of digital communication.
  4. A term referring to the interconnection between global and local processes.
  5. A sociologist who theorised about risk society and the global implications of modernity.
Down
  1. The idea that all parts of society and the world are linked and influence each other.
  2. A sociologist who describes primary and secondary green crime.
  3. A sociologist who analysed the globalisation of crime and the role of capitalism in shaping criminal activity.

8 Clues: The study of social harm rather than just criminal behaviour.A sociologist who describes primary and secondary green crime.A term referring to the interconnection between global and local processes.The idea that all parts of society and the world are linked and influence each other....

Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16

Computing Careers (Created By: HTHS Business Dept. 2022) crossword puzzle
Across
  1. _____ administrator is responsible for the creation, administration and security of computer networks.
  2. The _____ administrator is responsible for the administration and management of an organization's network.
  3. A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
  1. _____ write new programs, update and modify existing programs/software.
  2. _____ designers create webpage, build and maintain websites for an individual or an organization.
  3. The System _____ main role is to implement a new computerised system or upgrade an existing one.

6 Clues: _____ write new programs, update and modify existing programs/software.A _____ librarian keeps an organization's data files and software up-to-date and organised.The System _____ main role is to implement a new computerised system or upgrade an existing one....

. 2023-11-14

. crossword puzzle
Across
  1. record the address to enable quick access in future
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  3. text files with small pieces of data
  4. a form of social engineering and scam where attackers deceive people into revealing sensitive information
Down
  1. malicious attack that involves injecting harmful code into legitimate online advertising networks
  2. a secret word or phrase that must be used to gain admission to a place

6 Clues: text files with small pieces of datarecord the address to enable quick access in futurea secret word or phrase that must be used to gain admission to a placemalicious attack that involves injecting harmful code into legitimate online advertising networks...

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication
Down
  1. Link between satellite and earth station
  2. Equatorial orbit is sometimes called as
  3. Part of the celestial sphere directly above the observer

5 Clues: Equatorial orbit is sometimes called asLink between satellite and earth stationReliability curve in Satellite communicationPart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

Mass Media 2014-06-11

Mass Media crossword puzzle
Across
  1. Any of the means of communication, as television or newspapers, that reach very large numbers of people.
  2. Modern popular culture transmitted via mass media and aimed particularly at younger people.
  3. Refers to the approach used to attract the attention of consumers and/or to influence their feelings toward the product, service, or cause.
  4. The action or business of promoting and selling products or services, including market research and advertising.
Down
  1. Give or hand over something in exchange for money.
  2. Downloading ideas and trends of older teens onto pre-teens.
  3. The activity or profession of producing advertisements for commercial products or services.
  4. Concerned with or engaged in commerce.
  5. Is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
  6. Obtain in exchange for payment.

10 Clues: Obtain in exchange for payment.Concerned with or engaged in commerce.Give or hand over something in exchange for money.Downloading ideas and trends of older teens onto pre-teens.The activity or profession of producing advertisements for commercial products or services....

Media 2020-05-20

Media crossword puzzle
Across
  1. A digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
  2. Newspapers and magazines
  3. The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them
  4. ​An international computer network connecting other networks and computers from companies, universities, etc
  5. of a circuit or device that represents magnitudes in digits
  6. Instructions that are hidden within a computer program and are designed to cause faults or destroy data
Down
  1. A game in which you press buttons to control and move images on a screen
  2. Talk socially without exchanging too much information
  3. A machine that prints
  4. The flat surface at the front of a television, computer, or other electronic device, on which you see pictures or information

10 Clues: A machine that printsNewspapers and magazinesTalk socially without exchanging too much informationof a circuit or device that represents magnitudes in digitsA game in which you press buttons to control and move images on a screenThe act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them...

community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-07

community-based mental health crisis response to Caribbean African Canadians in Toronto crossword puzzle
Across
  1. What region was identified in step one of the asset collection method?
  2. If we do not see racism in mental health services as a problem, it will be extremely difficult to create a ________
  3. Crisis Assistance Helping Out on The Streets Acronym
  4. Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model
  5. What is our asset organization's acronym?
Down
  1. Key asset component
  2. Category in the socio-ecological model that does not directly impact the individual but exerts both negative and positive interactive forces on the individual such as community contexts and social networks
  3. Declared anti-Black Racism as a public health crisis
  4. __________inequalities highlight the historic principles of modern-day discrimination
  5. The four components of the socio-ecological model include the microsystem, mesosystem, ecosystem and ___________?

10 Clues: Key asset componentWhat is our asset organization's acronym?Declared anti-Black Racism as a public health crisisCrisis Assistance Helping Out on The Streets AcronymWhat region was identified in step one of the asset collection method?__________inequalities highlight the historic principles of modern-day discrimination...

Emtech Reviewer 2025-02-03

Emtech Reviewer crossword puzzle
Across
  1. the chart's horizontal axis which presents the categories being charted, while the vertical axis shows the charted values.
  2. A visual storytelling software alternative to traditional slide-based presentation formats.
  3. It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks.
  4. for Apple devices
  5. Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.
Down
  1. Intellectual Property must also be protected.
  2. Web 3.0 machine must cater all languages as this third generation of web aims to serve diverse users.
  3. an open source operating system developed by Google.
  4. Plays a significant role in a graphic design.
  5. is an umbrella term which covers any communication devices, applications, and systems that people use to interact and connect with others.

10 Clues: for Apple devicesIntellectual Property must also be protected.Plays a significant role in a graphic design.an open source operating system developed by Google.Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.A visual storytelling software alternative to traditional slide-based presentation formats....

Introduction to Machine Learning 2024-12-09

Introduction to Machine Learning crossword puzzle
Across
  1. A type of task where the goal is to predict continuous values like house prices.
  2. A learning type that requires labeled data for training.
  3. A reinforcement learning algorithm that maps states and actions to rewards.
  4. The process of grouping similar data points without predefined labels.
Down
  1. The error due to a model being too sensitive to training data noise.
  2. The error caused by overly simplistic models failing to capture data complexity.
  3. The phase where a machine learning model learns patterns from data.
  4. The broader field of study that includes machine learning and aims to simulate human intelligence.
  5. The specialized subset of ML that uses neural networks with multiple layers for complex tasks.
  6. The subset of AI that focuses on learning from data to make predictions or decisions.

10 Clues: A learning type that requires labeled data for training.The phase where a machine learning model learns patterns from data.The error due to a model being too sensitive to training data noise.The process of grouping similar data points without predefined labels.A reinforcement learning algorithm that maps states and actions to rewards....

AI Crossword Puzzle 2024-12-09

AI Crossword Puzzle crossword puzzle
Across
  1. A set of rules or instructions given to an AI system to help it learn how to solve problems or perform tasks.
  2. Allianz signed this pact committing to responsible AI use.
  3. Name of the new European Union regulation concerning artificial intelligence
  4. Name of the general-purpose AI system developed by Allianz (similar to ChatGPT)
  5. AI-generated media that can convincingly mimic real people.
  6. The risk category for AI systems like spam filters under the EU AI Act.
Down
  1. The dataset used to train an AI model.
  2. An approach where human intervention is part of the AI system's decision-making process.
  3. A subset of machine learning using neural networks with many layers, effective for tasks like image recognition
  4. Systematic errors in AI outputs due to prejudiced assumptions made during the algorithm's development or training process.

10 Clues: The dataset used to train an AI model.Allianz signed this pact committing to responsible AI use.AI-generated media that can convincingly mimic real people.The risk category for AI systems like spam filters under the EU AI Act.Name of the new European Union regulation concerning artificial intelligence...

Neuro Fuzzy 2024-04-18

Neuro Fuzzy crossword puzzle
Across
  1. Method that combines fuzzy logic and neural networks.
  2. A process used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
  3. Technique in neuro-fuzzy systems for modeling uncertain or imprecise information.
  4. Type of algorithm used in neuro-fuzzy systems to adjust parameters based on the error signal.
  5. An approach in neuro-fuzzy systems to adjust parameters based on error signal.
Down
  1. Mathematical model representing knowledge or data in the form of fuzzy rules
  2. The process of converting linguistic information into a form suitable for computation in fuzzy systems.
  3. Term for the output of a fuzzy logic system.
  4. A technique in neuro-fuzzy systems where the system structure and parameters are adjusted simultaneously.
  5. Method used in neuro-fuzzy systems to automatically generate fuzzy rules from data.

10 Clues: Term for the output of a fuzzy logic system.Method that combines fuzzy logic and neural networks.Mathematical model representing knowledge or data in the form of fuzzy rulesAn approach in neuro-fuzzy systems to adjust parameters based on error signal.Technique in neuro-fuzzy systems for modeling uncertain or imprecise information....

4th Grade Social Studies Homework Due 10/13/22 2022-10-10

4th Grade Social Studies Homework Due 10/13/22 crossword puzzle
Across
  1. When the land was no longer fertile, the settlers had to make their first big ________.
  2. The US gets resources from other countries in their ________.
  3. A farmer’s favorite ______ might be their tractor.
  4. Clean water is a precious ________ in many parts of the world.
  5. The Iroquois formed a ________ of tribes that worked together for trade and during times of war.
Down
  1. cost of gasoline can impact the country’s _________.
  2. The Native American ________ would have been located near water.
  3. Jill decides to take the bus to work instead of driving. It takes her 60 minutes to get there on the bus and driving would have been 40, so her _______ is 20 minutes.
  4. Maria is a firm believer in democratic system of __________.
  5. Decisions were often made through _________ in Native American tribes.

10 Clues: A farmer’s favorite ______ might be their tractor.cost of gasoline can impact the country’s _________.Maria is a firm believer in democratic system of __________.The US gets resources from other countries in their ________.Clean water is a precious ________ in many parts of the world.The Native American ________ would have been located near water....

ISA-VESIT CROSSWORD 2022-02-02

ISA-VESIT   CROSSWORD crossword puzzle
Across
  1. What is the name of India’s first indigenous supercomputer developed by CDAC?
  2. Which IIT has transformed an existing nitrogen plant into an oxygen generator?
  3. Which satellite is responsible for communication, meteorological services and television broadcasting in India?
  4. Who is largely responsible for breaking the German Enigma codes and created a test that provided a foundation for artificial intelligence?
  5. The concentric circles on the platter of hard disk are known as _____
Down
  1. Which is the programming language used for backend development of Instagram?
  2. What was the largest social network prior to facebook?
  3. _____ is the generic term for a collection of private computer networks within an organization.
  4. Which is the first telecom company in India that demonstrated the operation of the 5G network?
  5. MOV file extension usually refers to what kind of file?

10 Clues: What was the largest social network prior to facebook?MOV file extension usually refers to what kind of file?The concentric circles on the platter of hard disk are known as _____Which is the programming language used for backend development of Instagram?What is the name of India’s first indigenous supercomputer developed by CDAC?...

G2 - Ambientes computacionais e Conectividade - 04/04/2022 2022-04-05

G2 - Ambientes computacionais e Conectividade - 04/04/2022 crossword puzzle
Across
  1. Um byte é formado por 8.
  2. Local Area Networks, ou Redes Locais.
  3. Tipo de transmissão de dados que ocorre em um único sentido.
  4. Qual camada OSI converte o formato do dados recebido pela camada aplicação em um formato comum a ser usado na transmissão.
  5. Qual topologia descreve o fluxo de dados através da rede.
Down
  1. Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos.
  2. Definem como será feita a transmissão de dados e coloca marcações nos dados que estão sendo transmitidos.
  3. Topologia comum que possui alto poder de expansão.
  4. Topologia de redes que a utilização da comunicação em um único sentido diminuem as chances de colisão e não há a necessidade de roteamento.
  5. Tipo de topologia de redes que geralmente possui um Hub no centro da estrutura.

10 Clues: Um byte é formado por 8.Local Area Networks, ou Redes Locais.Topologia comum que possui alto poder de expansão.Qual topologia descreve o fluxo de dados através da rede.Tipo de transmissão de dados que ocorre em um único sentido.Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos....

DATA TRASMISSION 2022-07-07

DATA TRASMISSION crossword puzzle
Across
  1. a small part of a message / data that is transmitted over a network
  2. stages in a network that can receive and transmit data packets
  3. data that can be sent in both directions at the same time (simultaneously)
Down
  1. the actual data being carried in a data packet
  2. a device that enables data packets to be moved between different networks
  3. data that cant be sent in both directions but not at the same time
  4. data that arrives at the destination with the bits no longer synchronised
  5. a verification method used to check data transferred has been altered or corrupted
  6. data that can be sent on one direction only
  7. a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port

10 Clues: data that can be sent on one direction onlythe actual data being carried in a data packetstages in a network that can receive and transmit data packetsdata that cant be sent in both directions but not at the same timea small part of a message / data that is transmitted over a network...

Business Model Crossword Puzzle 2025-11-13

Business Model Crossword Puzzle crossword puzzle
Across
  1. Which business model is an agreement that details all rules and expectations for both parties?
  2. What do franchisees typically benefit from?
  3. What owner has complete autonomy and control over all aspects of the business, from operations and marketing to pricing and branding?
  4. Managed services is the practice of what?
  5. What does the franchisee usually pay for franchisor an initial startup?
  6. Owning an independent business gives you what type of control?
Down
  1. Franchising allows business owners to expand their business by what?
  2. The franchise business model dates to what century?
  3. What type of business model is outsourced service agreement where a third-party provider takes responsibility for managing and operating specific business functions for a client?
  4. Franchising is often recommended to what type of business owners?

10 Clues: Managed services is the practice of what?What do franchisees typically benefit from?The franchise business model dates to what century?Owning an independent business gives you what type of control?Franchising is often recommended to what type of business owners?Franchising allows business owners to expand their business by what?...

How Aware Are You? 2025-09-12

How Aware Are You? crossword puzzle
Across
  1. Verifying the identity of a user, often using a username and password.
  2. A fake website designed to steal personal information.
  3. The practice of protecting systems and networks from digital attacks.
  4. A program that replicates itself and spreads to other computers.
  5. A software that monitors and blocks unauthorized access to a computer network.
  6. A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
  1. A string of characters used to log in to a system, it should be unique and complex.
  2. Adding a second layer of verification beyond a password, often a code sent to your phone
  3. The"lock" icon in a browser's address bar indicates a secure connection using this .
  4. A type of malware that blocks access to your data until a sum of money is paid.

10 Clues: A fake website designed to steal personal information.A program that replicates itself and spreads to other computers.The practice of protecting systems and networks from digital attacks.Verifying the identity of a user, often using a username and password.A software that monitors and blocks unauthorized access to a computer network....

computer science 2020-12-09

computer science crossword puzzle
Across
  1. give an authority order
  2. a folder or box for holding loose papers that are typically arranged a difference
  3. its a corona that can contact everybody
  4. browser is a software application for accessing information on the world wide web.
  5. the amount of something produced by a person,machine,industry
  6. an island town or city
  7. device is a piece of computer device hardware equipment wich converts information
  8. storage cloud computing model thatstores data and information
  9. a person or thing that provides commonly
  10. something remmembered from the past
  11. annoy or bother someone
  12. local area network is a collection of devices together
  13. software thats designed to dirupt and damage
Down
  1. a small sweet cake typically round and flat and having a crisp flat between chewy textures
  2. wireless fidelity that can connect to a radio using waves without needing to use wires
  3. copy data from a computer system to another typically over internet
  4. devices a piece of equipment used to provide data and control signals into a information processing system as computer
  5. bar a long thin section at the edge of a computer
  6. process in restarting a computer
  7. a wall designed whit fire
  8. network is a group of networks that uses a set of communications
  9. a act or instance of booting a computer

22 Clues: an island town or citygive an authority orderannoy or bother someonea wall designed whit fireprocess in restarting a computersomething remmembered from the pastits a corona that can contact everybodya act or instance of booting a computera person or thing that provides commonlysoftware thats designed to dirupt and damage...

WWI Crossword Puzzle 2022-05-27

WWI Crossword Puzzle crossword puzzle
Across
  1. Nations pride
  2. One of the first countries to surrender
  3. First full-scale offensive with tanks
  4. When all resources are devoted to war
  5. Russian leaving war
  6. Type of warfare with networks
  7. Warfare to sink any ship
  8. Dropping bombs on important places
  9. Continent where fighting was in Egypt
  10. Who went to war
  11. Where fighting of Germans and Russians happened
  12. First aircraft used
  13. Words for deaths
  14. Treaty from Russia to Germany
  15. Where Germans sent Zimmermann note
  16. Note from Germans to Mexico
  17. Goods needed for war
  18. Battle to stop advances of Germans
Down
  1. Big vehicles combating trench warfare
  2. Another word for planes
  3. He stepped down because of revolt in Germany
  4. German submarine
  5. First war that included use of planes
  6. Only country/continent involved
  7. Improved weapon used by soldiers
  8. First US Marines in WWI combat
  9. Where most of the fighting happened
  10. Popular way to recruit
  11. Plan to win
  12. Land between opposing sides
  13. A chemical warfare
  14. To strongly go against
  15. "Big Push" battle
  16. Fire weapon, used in trenches
  17. Longest battle in WWI
  18. Person who offered truce to Germany
  19. US continent
  20. French plan to retake
  21. Who replaced men in factories
  22. Battle for Germans to attack and frighten French

40 Clues: Plan to winUS continentNations prideWho went to warGerman submarineWords for deaths"Big Push" battleA chemical warfareRussian leaving warFirst aircraft usedGoods needed for warLongest battle in WWIFrench plan to retakePopular way to recruitTo strongly go againstAnother word for planesWarfare to sink any shipLand between opposing sides...

Tech Terms 2022-11-28

Tech Terms crossword puzzle
Across
  1. To copy data from one system to another
  2. Portable Document Format
  3. A storage device containing a read-write mechanism
  4. a way to back up your hard drive
  5. unique address that identifies a device on the internet or a local network
  6. any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit
  7. starting a computer system again
  8. short for malicious software
  9. instructions that enable the hardware to perform tasks
  10. small files including unique identifiers that web servers send to browsers
  11. networking device that forwards data packets between computer networks.
  12. An example of this is Bing or Yahoo
  13. a family of wired computer networking technologies
  14. An example of this is Firefox or Google Chrome
  15. A security device that monitors traffic to and from your network
Down
  1. Monitor or speakers
  2. Mouse and keyboard
  3. A group of bits
  4. Central Processing Unit, The Brains
  5. to start a computer system
  6. The physical components of a computer
  7. Uniform Resource Locator
  8. HyperText Markup Language
  9. the software that supports a computer's basic functions.
  10. a device that converts signals produced by one type of device.
  11. equal to around 1 million bytes
  12. A binary digit

27 Clues: A binary digitA group of bitsMouse and keyboardMonitor or speakersPortable Document FormatUniform Resource LocatorHyperText Markup Languageto start a computer systemshort for malicious softwareequal to around 1 million bytesa way to back up your hard drivestarting a computer system againCentral Processing Unit, The Brains...

Technical Concepts Crossword 2020-09-04

Technical Concepts Crossword crossword puzzle
Across
  1. a computer program that modifies another computer program and executes its own code
  2. a semiconductor device used to amplify or switch electronic signals and electrical power.
  3. Evil software
  4. the method by which information is converted into a secret code that hides the information
  5. a software application for accessing the information on the World Wide Web
  6. local area network
  7. a small amount of data sent over a network
  8. A connected set of networks
  9. A mutually agreed on the method of communication
Down
  1. a numeric system that only uses two digits — 0 and 1.
  2. software with malicious behavior that aims to gather information about a person or organization
  3. the programs and other operating information used by a computer.
  4. pretends to be one thing, usually legit software but hides malware inside
  5. transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
  6. a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
  7. Crawler a script that explores the web
  8. types of malware; ads start popping up
  9. an interpreted, high-level and general-purpose programming language
  10. Smart Messaging Service(Can use satellites, emails) also known as message
  11. Internet service provider

20 Clues: Evil softwarelocal area networkInternet service providerA connected set of networksCrawler a script that explores the webtypes of malware; ads start popping upa small amount of data sent over a networkA mutually agreed on the method of communicationa numeric system that only uses two digits — 0 and 1....

Chemistry Chapters 1-9 General Review Part 2 2020-02-10

Chemistry Chapters 1-9 General Review Part 2 crossword puzzle
Across
  1. an intermolecular force created by the polar ends of some molecules
  2. the number of protons in an atom
  3. the heat required to cause a unit rise in the temperature of a unit mass of a given substance
  4. property used to predict whether a bond is primarily ionic or primarily covalent
  5. the rule that seems to drive bonding; involves the number 8
  6. the principle that states that the momentum and position cannot be measured simultaneously
  7. heat is given off or lost to the surroundings
  8. when the pressure on a gas increases, its volume _?_
  9. 0 K or -273.15 C
  10. the sharing of four electrons (2 pairs)
  11. type of bond created when electrons are unequally shared between two atoms
  12. a relatively strong force associated with hydrogen bonded to N, O, or F
Down
  1. valence shells form from a sea of delocalized electrons
  2. includes hard substances like diamonds, quartz, and silicon carbide
  3. PV = nRT
  4. physical combinations of different substances
  5. the transfer of electrons from one atom to another
  6. characterized by the sharing of a pair or pairs of electrons
  7. substances made from a combination of atoms chemically joined together
  8. a weak force that exist between all molecules

20 Clues: PV = nRT0 K or -273.15 Cthe number of protons in an atomthe sharing of four electrons (2 pairs)physical combinations of different substancesheat is given off or lost to the surroundingsa weak force that exist between all moleculesthe transfer of electrons from one atom to anotherwhen the pressure on a gas increases, its volume _?_...

43. 2021-03-19

43. crossword puzzle
Across
  1. It's about old currency notes (7)
  2. GRASS Crazy King George behind American plant (3-5)
  3. Old dinasaur from Craggy Hill behind Knock (6)
  4. Hit mound behind junction (5)
  5. Sets up sailor bar in American city with first cousin - a man-eater (8)
  6. It's about former times and a meal we enjoyed then (6)
  7. Youngster with ape developed a pulse (8)
  8. One hour with ape misbehaving is a delight (8)
  9. Clean up what's beneath and behind American city (7)
  10. NETWORKS Old connections?
  11. Finishes with alternative comic and works in The Garden with mimics (6)
  12. Lack of flesh? Not so much, when it's about former queen (8)
  13. Listen to writer going to American city with worthless old money (8)
  14. It's about old message to renew old connections (6)
Down
  1. Bird approaches hill behind American city with mimic (8)
  2. Part of hunt to persecute someone behind American news (8)
  3. Colonise Pluto with ape, perhaps (8)
  4. GEAR Special equipment for police in South American city with great rampaging (4,4)
  5. ALL In spite of everything, being behind American lines
  6. Gather outside South American city with lower ranking (8)
  7. Wall provided a role with mimic in it
  8. Renew old school ties
  9. Two presidents behind American attacks (8)
  10. Little weight behind American news report (8)

24 Clues: Renew old school tiesNETWORKS Old connections?Hit mound behind junction (5)It's about old currency notes (7)Colonise Pluto with ape, perhaps (8)Wall provided a role with mimic in itYoungster with ape developed a pulse (8)Two presidents behind American attacks (8)Little weight behind American news report (8)...

Coding 2021-08-26

Coding crossword puzzle
Across
  1. a website used for coding things onto a microbit
  2. When people create instructions for a computer to do
  3. statistics collected together for reference or analysis
  4. wireless network used to send information through radio waves
  5. A set/collection of telecommunication networks 2w
  6. _______ means that you are connected to the internet
  7. A group of servers and computers that are all connected to each other.
  8. A collection of web pages
  9. Tells the computer what to do/makes a set of programs for the computer to do
  10. computers that are only used to provide things for other computers
  11. a service that translates URLs into IP addresses.
Down
  1. A set of rules to follow to find the answer to a problem
  2. the power/knowledge of a computer to help solve a problem.2w
  3. pieces of your information that you leave on the internet 2w
  4. items used in our daily lives eg. computers, phones and ipads
  5. The language that programmers use to instruct a computer on what to do
  6. A small device used for coding
  7. easy to remember name for a web page
  8. A number given to an item that is connected to the internet.2w
  9. It is normally shown in 1 and 0.

20 Clues: A collection of web pagesA small device used for codingIt is normally shown in 1 and 0.easy to remember name for a web pagea website used for coding things onto a microbitA set/collection of telecommunication networks 2wa service that translates URLs into IP addresses.When people create instructions for a computer to do...

Coding 2021-08-26

Coding crossword puzzle
Across
  1. a website used for coding things onto a microbit
  2. When people create instructions for a computer to do
  3. statistics collected together for reference or analysis
  4. wireless network used to send information through radio waves
  5. A set/collection of telecommunication networks 2w
  6. _______ means that you are connected to the internet
  7. A group of servers and computers that are all connected to each other.
  8. A collection of web pages
  9. Tells the computer what to do/makes a set of programs for the computer to do
  10. computers that are only used to provide things for other computers
  11. a service that translates URLs into IP addresses.
Down
  1. A set of rules to follow to find the answer to a problem
  2. the power/knowledge of a computer to help solve a problem.2w
  3. pieces of your information that you leave on the internet 2w
  4. items used in our daily lives eg. computers, phones and ipads
  5. The language that programmers use to instruct a computer on what to do
  6. A small device used for coding
  7. easy to remember name for a web page
  8. A number given to an item that is connected to the internet.2w
  9. It is normally shown in 1 and 0.

20 Clues: A collection of web pagesA small device used for codingIt is normally shown in 1 and 0.easy to remember name for a web pagea website used for coding things onto a microbitA set/collection of telecommunication networks 2wa service that translates URLs into IP addresses.When people create instructions for a computer to do...

M1.4 2023-03-25

M1.4 crossword puzzle
Across
  1. Help to access a computer over unsecured networks safely
  2. Allows user to view or manage software, for the hardware
  3. A id for a devices over the network or internet, usually in a string number or alphanumeric string
  4. A delay
  5. Help identify a service
  6. Allow the sending and receiving of data packets over the network and internet
  7. pieces of information sent to website to hep keep track of users activity and web traffic.
  8. testing the Wifi speed
  9. Saves data and information for later use when revisiting a website, which helps increase your web browning speed
  10. The Name for the devices connected to a network or system
Down
  1. Make computer resources available over the internet from a paid services
  2. A program or application that help to edit and compile code
  3. Allows to connect and print paper from the printer wirelessly
  4. Keeps track of how much life of the battery is left
  5. Isolating an environment or an application from other running programs
  6. Administrative command used to diagnose network issue
  7. A testing or sample field of a product before release to the public
  8. Helps hardware to communicate with each other
  9. Connects to the internet
  10. A command that allows user to trace network connections in hops

20 Clues: A delaytesting the Wifi speedHelp identify a serviceConnects to the internetHelps hardware to communicate with each otherKeeps track of how much life of the battery is leftAdministrative command used to diagnose network issueHelp to access a computer over unsecured networks safelyAllows user to view or manage software, for the hardware...

FITAVocab.HBM 2013-05-15

FITAVocab.HBM crossword puzzle
Across
  1. presentation software program similar to Keynote and Powerpoint, but more abstract
  2. a file created by a software application
  3. Example: Windows
  4. rules and behaviors made to keep individuals safe when online
  5. an opening in a computer that allows to have more plug-ins
  6. part of the computer that processes everything
  7. main circuit board of a computer
  8. protecting information on computer systems/networks
  9. Example: printer
  10. legal means of protecting an author's work
  11. file format made by WORD that has a smaller chance of getting a virus
  12. digital, online, accesible on the digital world
  13. selection of editing and drawing/art tools on your computer
  14. file format made by Microsoft that can't be viewed by all programs
Down
  1. a file that serves as a starting place for a new document
  2. a software that runs on your computer
  3. the short term memory of a computer
  4. to start up a computer
  5. collection of data stored in one unit
  6. code of positive conduct online
  7. a piece of equipment that provides input and output for the computer
  8. a web-based program that saves your photos, docs, and music
  9. data transmission
  10. Example: keyboard
  11. file format made by ADOBE that is viewable by all programs

25 Clues: Example: WindowsExample: printerdata transmissionExample: keyboardto start up a computercode of positive conduct onlinemain circuit board of a computerthe short term memory of a computera software that runs on your computercollection of data stored in one unita file created by a software applicationlegal means of protecting an author's work...

VOCAB REVIEW 2016-02-25

VOCAB REVIEW crossword puzzle
Across
  1. maximum particle size
  2. pattern: commonly encountered drainage pattern
  3. load: streams carry dissolved substances
  4. velocity: frictional force combined with the buoyant force exactly balance the gravitational force
  5. slow flow
  6. leaping movement of sand
  7. separate from the drainage basin of another by a imaginary line
  8. flat area about level with top of the channel
  9. fast flow
  10. tangled networks
  11. basin: land area that contributes water to a river system
Down
  1. when streams diverge from a central area likes pokes from the hub of a wheel
  2. place where the ground slopes up/down
  3. load: fine particles suspended in water
  4. level: most streams is global sea level
  5. loop-like bend in a stream channel
  6. quantity of water passing by a point on the steamboat
  7. absorbed by plants, which the release it into the atmosphere
  8. maximum load
  9. bank:river cliff
  10. cycle: unending circulation of H2O
  11. the rate of rainfall exceeds earth's ability to absorb
  12. pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
  13. process by which liquid water changer into water vapour
  14. gen. term for sediment deposited by streams
  15. and corner frequency
  16. pattern: exhibits many right angle bends
  17. bars:arcuate deposit of sand along the in inside of bend
  18. load: course particles move along streambed

29 Clues: slow flowfast flowmaximum loadbank:river clifftangled networksand corner frequencymaximum particle sizeleaping movement of sandloop-like bend in a stream channelcycle: unending circulation of H2Oplace where the ground slopes up/download: fine particles suspended in waterlevel: most streams is global sea levelload: streams carry dissolved substances...

DigiCit Vocab Crossword Puzzle- Ariana & Evelyn 2016-05-27

DigiCit Vocab Crossword Puzzle- Ariana & Evelyn crossword puzzle
Across
  1. A law to protect your creative work
  2. accept or admit the existence or truth of.
  3. Standards on which you judge
  4. Unexpected/ unknown identity
  5. media digitized content that can be transmitted over the internet or computer networks.
  6. Who are you
  7. a general statement or concept obtained by inference from specific cases.
  8. To make something bigger than it actually is
  9. To carefully examine
  10. Repetitive behaviors to hurt someone
  11. Drawings, Illustrations, symbols
  12. speech Verbal attack against race, appearance, religion, ability, gender, sexual orientation
Down
  1. use Ability to use a small amount of copyrighted work with no permission
  2. A website or program that collects related items of content and display them or link to them
  3. The result of your choices/ actions
  4. What you identify as; male, female, fluent
  5. Unsuitable; not proper
  6. All Caps
  7. Understand and can feel the emotion of what someone is experiencing
  8. Someone who witnessed cyberbullying and does nothing about it
  9. A regularly updated website or webpage, typically one run by an individual or small group, that is written in an informal or conversational style
  10. An icon or figure representing a particular person in a computer game
  11. work anything you have originated
  12. Trick, lie
  13. a settled or regular tendency or practice, especially one that is hard to give up.

25 Clues: All CapsTrick, lieWho are youTo carefully examineUnsuitable; not properStandards on which you judgeUnexpected/ unknown identityDrawings, Illustrations, symbolswork anything you have originatedA law to protect your creative workThe result of your choices/ actionsRepetitive behaviors to hurt someoneaccept or admit the existence or truth of....

Jose Daniel Saenz Serna 2022-05-09

Jose Daniel Saenz Serna crossword puzzle
Across
  1. is a programming language and computing platform
  2. a hyperlink or hyperlink.
  3. physical network interface.
  4. es el conjunto de programas de un sistema informático que gestiona los recursos de hardware.
  5. is a computer peripheral output device that enables a permanent range of text or graphic documents to be produced.
  6. logical digital equipment interconnection device.
  7. It is the main social network that exists in the world.
  8. intelligence expressed by machines.
Down
  1. is a computer application designed to be run on smartphones.
  2. It is a unique identifier that each manufacturer assigns to the network card of its devices.
  3. It is a computer network that allows communication and data exchange.
  4. a device that allows networks to interconnect with a different prefix in its IP address.
  5. is a Bitcoin block exploration service
  6. Memory for reading only, nothing can be recorded in this memory and its information is already recorded at the factory.
  7. set of all machines that have been created.
  8. Science that studies the management of information with electronic means.
  9. To write in text in Windows we use the program.
  10. tangible part of the computer.
  11. It is a Windows XP program.
  12. It is a set of computers capable of attending to the requests of a client and returning a response.

20 Clues: a hyperlink or hyperlink.physical network interface.It is a Windows XP program.tangible part of the computer.intelligence expressed by machines.is a Bitcoin block exploration serviceset of all machines that have been created.To write in text in Windows we use the program.is a programming language and computing platform...

Credit Crossword 2022-03-14

Credit Crossword crossword puzzle
Across
  1. when the bank takes possession of your house
  2. a loan for your home
  3. loans with extreme interest rates if you dont pay them back in time
  4. when you owe money
  5. things you earn by using your credit card
  6. the money that builds up over time
  7. the type of credit that is on credit cards
  8. what you pay with that takes money directly from your account
  9. your history of your credit card spendings and payments
  10. close ended credit accounts
  11. Renting for a car
Down
  1. a credit card reward where you get money back
  2. one of the two credit card networks that will issue credit cards
  3. when your loan isnt tied to an asset
  4. interest rate that doesnt change
  5. a loan for a vehicle
  6. interest rate that changes
  7. what you take out to get money now
  8. the only source of revolving credit
  9. what you use to pay for something under $10
  10. your rating that you have that credit companies look at before giving you a loan
  11. a loan you take out for yourself
  12. points that you get for using your credit card
  13. when you put a security deposit on your card
  14. the credit card set up that allows parents to pay if a student can't

25 Clues: Renting for a carwhen you owe moneya loan for your homea loan for a vehicleinterest rate that changesclose ended credit accountsinterest rate that doesnt changea loan you take out for yourselfwhat you take out to get money nowthe money that builds up over timethe only source of revolving creditwhen your loan isnt tied to an asset...

Unit 5 Lab 2023-10-23

Unit 5 Lab crossword puzzle
Across
  1. Cardiovascular disease.
  2. A test that is done while you are exercising.
  3. Root word for small vessels.
  4. Cardiac rhythm management
  5. Any abnormal rhythm of the heart: too slow, too fast, or at an irregular beat or tempo.
  6. Peripheral vascular disease
  7. This reads your heart’s electrical impulses.
  8. This gives a picture of your heart using ultrasound, a type of X-ray
  9. Root word for heart.
  10. Networks of small vessels that perfuse tissues.
  11. Thin folds of the endocardium with a core of dense connective tissue.
  12. Used to measure the substances and show if, and how much of, your heart muscle has been damaged.
  13. Pumps blood through the cardiovascular system.
Down
  1. Vessels that deliver blood to tissues.
  2. A special dye is injected into your coronary arteries and an X-ray is taken.
  3. The heart not pumping blood as well as it should.
  4. Occurs because of blockage in a blood vessel that delivers blood and oxygen to the brain.
  5. The term for diseases of the heart muscle.
  6. Root word for aorta.
  7. When the heart muscle is cut off from the oxygen it needs to operate.
  8. Vessels that return blood to the heart.
  9. Transient ischemic attack
  10. Atrial fibrillation
  11. Root word for disease.
  12. Root word for artery.

25 Clues: Atrial fibrillationRoot word for aorta.Root word for heart.Root word for artery.Root word for disease.Cardiovascular disease.Cardiac rhythm managementTransient ischemic attackPeripheral vascular diseaseRoot word for small vessels.Vessels that deliver blood to tissues.Vessels that return blood to the heart.The term for diseases of the heart muscle....

RU ITEC411 Failures and Errors in Computer Systems 2023-12-01

RU ITEC411 Failures and Errors in Computer Systems crossword puzzle
Across
  1. A person who writes and develops computer programs, using a programming language.
  2. Outdated computer systems, software, or technology that is still used.
  3. Manipulation or setup in a way to achieve a specific outcome.
  4. Standardized rules and conventions that govern communication between systems.
  5. The process of verifying the identity of a user or device.
  6. An individual who interacts with a computer system.
  7. Potential dangers or risks to computer systems, networks, and data.
  8. The complete breakdown or malfunction of a computer system.
  9. The process of managing and overseeing operations and maintenance of computer systems.
  10. Additional devices connected to a computer, such as printers, scanners, or external drives.
Down
  1. An expert or specialist in the field of computers.
  2. A design or system that incorporates measures to prevent the impact of a mistake.
  3. A flaw or unintended error in a software program that causes weird behavior.
  4. Information used to verify the identity of a user.
  5. A structured collection of data, often used for efficient data management.
  6. Technique used by attackers to take advantage of vulnerabilities in a system.
  7. A person who has acquired knowledge and skills through formal education.
  8. Systems whose failures could result in great harm.
  9. The unauthorized use of someone else's personal information.
  10. A Mistake or fault in a computer program.

20 Clues: A Mistake or fault in a computer program.An expert or specialist in the field of computers.Information used to verify the identity of a user.Systems whose failures could result in great harm.An individual who interacts with a computer system.The process of verifying the identity of a user or device....

Networking n.1 2023-11-29

Networking n.1 crossword puzzle
Across
  1. It can be Variable length or fixed length
  2. It happens when transmissions occur at the same time
  3. The amount of data that can be transferred from one point to another in a given time period
  4. Third parameter of the Cisco command for entering static routes
  5. A tool to check network connectivity
  6. Cisco command to deactivate an interface on the router
  7. Device that forwards data packets to the appropriate parts of a computer network
  8. Cisco command for changing the name of a device
  9. A device for connecting multiple network devices and multiple segments
  10. Automatic switching to a backup computer system in the event of system failure
Down
  1. It can be MAC or IP
  2. Formatted unit of data sent across networks
  3. When it becomes zero, the packet is discarded
  4. Medium Access Protocol, which can be of the CA (Collision Avoidance) or CD (Collision Detection) type
  5. Device which converts between digital and analogue signals, e.g. telephone line to computer
  6. Software or hardware that requests services from a server
  7. IP .... Cisco command for entering static routes
  8. Ethernet procedure used to handle collisions during transmissions
  9. A set of rules or standards that control communication between devices
  10. Software that provides services to a client, or the hardware that is running it

20 Clues: It can be MAC or IPA tool to check network connectivityIt can be Variable length or fixed lengthFormatted unit of data sent across networksWhen it becomes zero, the packet is discardedCisco command for changing the name of a deviceIP .... Cisco command for entering static routesIt happens when transmissions occur at the same time...

Powered Up 2024-02-01

Powered Up crossword puzzle
Across
  1. see energy from the sun.
  2. a generic term for non-renewable energy sources such as coal, coal products, natural gas, derived gas, crude oil, petroleum products and non-renewable wastes
  3. a pipe or hole through which water or gas may escape.
  4. A standard desktop computer
  5. to produce electricity.
  6. a computer where information is stored that’s connected to a network of other computers.
  7. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  8. changes the electric current’s direction.
  9. a worldwide system of computer networks
  10. a person who designs, builds, or maintains engines, machines, or public works.
Down
  1. make smaller or less in amount, degree, or size.
  2. Light from the sunel
  3. the atoms that make up the material’s surface.
  4. is too remote to access electricity from the regular power grid.
  5. a way of generating electricity by harnessing the sun’s rays.
  6. a form of electric current that flows in only one direction.
  7. a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
  8. the devices that would convert sunlight into electricity.
  9. a form of energy resulting from the existence of charged
  10. not by means of the internet or other computer network.

20 Clues: Light from the sunelto produce electricity.see energy from the sun.A standard desktop computera worldwide system of computer networkschanges the electric current’s direction.the atoms that make up the material’s surface.make smaller or less in amount, degree, or size.a pipe or hole through which water or gas may escape....

Internet Business Associate 2024-02-27

Internet Business Associate crossword puzzle
Across
  1. A public key encryption algorithm
  2. A server that mediates traffic between a protected network and the Internet.
  3. A machine that shares its resources among clients
  4. a concept or collection of symbols associated with a product, service or person
  5. The practice of categorizing online content through tags
  6. An encrypted file transfer protocol
  7. A web page that integrates content and scripts from multiple web sites to create new applications
  8. A computing paradigm in which users can use software over the Internet
  9. A worldwide network of interconnected networks
  10. A web... who creates the overview plan of a sites development
  11. Data processed by protocols so it can be sent across a network
  12. Encrypting and decrypting email messages
Down
  1. A system that maps uniquely hierarchical names to specific Internet addresses
  2. A Web 2.0 programming language that consists of existing technologies
  3. A set of instructions or rules
  4. A problem solving model in which a task is given to a group of people rather than one.
  5. A measurement of memory needed to store one 8 bit character
  6. a computing language used to program Web 1.0
  7. An individual computer on a network
  8. Modulator Demodulator
  9. The integration of telephony and data technologies
  10. A circuit board that enables a computer to connect to a network
  11. Outgoing mail server

23 Clues: Outgoing mail serverModulator DemodulatorA set of instructions or rulesA public key encryption algorithmAn encrypted file transfer protocolAn individual computer on a networkEncrypting and decrypting email messagesa computing language used to program Web 1.0A worldwide network of interconnected networks...

Unit 4 Review APCSP 2024-03-26

Unit 4 Review APCSP crossword puzzle
Across
  1. Method of encryption that does not require a secure channel to exchange keys
  2. Pop Up Advertisements
  3. Identifying and correcting errors and inconsistencies in data
  4. Attempt to trick a user into divulging their private information
  5. software intended to damage a computing system or to take partial control over its operation
  6. Steals data and sends it back to malware creators
  7. Social Media,Phones, Laptops, WWW, email are all types of...
  8. Name, birthday, social security, address, etc.
  9. System that monitors incoming and outgoing network traffic
  10. What people look for when analyzing big data?
Down
  1. Exhausting all possible combinations
  2. Wireless access point that gives unauthorized access to secure networks.
  3. Finding solutions to problems that would otherwise take forever to solve using only human capabilities
  4. Practice of engaging a group for a common goal
  5. Pair of keys used to encrypt and decrypt
  6. Protects a computer by scanning files and identifying malware
  7. The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  8. Holding an computer hostage by encrypting data
  9. Attacks that cause a website to slow down by flooding it with requests
  10. Authentication that requires at least two steps to unlock protected information

20 Clues: Pop Up AdvertisementsExhausting all possible combinationsPair of keys used to encrypt and decryptWhat people look for when analyzing big data?Practice of engaging a group for a common goalHolding an computer hostage by encrypting dataName, birthday, social security, address, etc.Steals data and sends it back to malware creators...

ICT Related Terms 2025-02-03

ICT Related Terms crossword puzzle
Across
  1. Processing data closer to the source, reducing latency and enhancing performance.
  2. Software that protects against malware and other threats.
  3. The ability to use and understand information technology effectively.
  4. Physical components of a computer system, like the monitor, keyboard, and CPU.
  5. Wireless technology for connecting to the internet.
  6. Extremely large datasets that require specialized tools for analysis and processing.
  7. Computer systems that mimic the structure and function of the human brain.
  8. Creating copies of data to protect against loss or corruption.
  9. A system of interconnected documents and resources accessible through the internet.
  10. Technology that creates immersive, interactive experiences
  11. A global network connecting computers and devices.
  12. A device that connects multiple devices to a network
Down
  1. Programs and instructions that tell hardware what to do.
  2. Protecting computer systems and networks from unauthorized access and threats.
  3. The process of examining raw data to extract meaningful insights and patterns.
  4. Storing and accessing data and applications over the internet.
  5. Presenting data in a visual format to make it easier to understand and interpret.
  6. Computer systems capable of performing tasks that typically require human intelligence.
  7. Online platforms for social interaction and content sharing.
  8. Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.

20 Clues: A global network connecting computers and devices.Wireless technology for connecting to the internet.A device that connects multiple devices to a networkPrograms and instructions that tell hardware what to do.Software that protects against malware and other threats.Technology that creates immersive, interactive experiences...

IITA List of Programme KPIs -(2024 - 2030) 2025-03-17

IITA List of Programme KPIs -(2024 - 2030) crossword puzzle
Across
  1. Number of people trained in group trainings on IITA products, including researchers, farmers, and others.
  2. Number of proposals developed to support gender, youth, and social participation.
  3. Number of active partnerships with NARES and external agricultural research institutes.
  4. Number of IITA products incorporated into product catalogs (e.g., TAAT, AICCRA).
  5. Number of outreach events promoting collaboration with NGOs, IFIs, etc.
  6. Percentage of IITA products adopted by partners for large-scale implementation.
  7. Number of new or improved crop varieties released.
  8. Annual rate of genetic improvement in crops, measured as a percentage.
  9. Scientific publications and findings contributing to agricultural knowledge.
  10. Participation in global discussions, conferences, and research networks.
  11. Evaluating the influence of IITA’s projects on agricultural development.
Down
  1. Percentage of projects that address diet, health, and nutrition-related objectives.
  2. Number of peer-reviewed papers made available through open-access repositories.
  3. Research products or services reaching end-users effectively.
  4. Ensuring long-term viability of agricultural innovations and research.
  5. Number of students trained, disaggregated by qualification type (M.Sc. or Ph.D.) and gender.
  6. The core field of IITA’s research, focused on food security and development.
  7. Number of papers published in journals with an impact factor greater than 10.
  8. Number of plant genetic accessions available and safely duplicated by crop.
  9. Amount of financial resources secured for research and product delivery.

20 Clues: Number of new or improved crop varieties released.Research products or services reaching end-users effectively.Ensuring long-term viability of agricultural innovations and research.Annual rate of genetic improvement in crops, measured as a percentage.Number of outreach events promoting collaboration with NGOs, IFIs, etc....

Chapter 10 Communication 2025-09-28

Chapter 10 Communication crossword puzzle
Across
  1. — Everyone sees who was copied.
  2. — Any unsolicited email sent over the internet.
  3. — A worldwide collection of interconnected networks.
  4. — Websites that allow any user to create and edit pages with a web browser.
  5. networking sites — Sites for building online communities with shared interests and activities.
  6. — The address of a web page on the WWW.
  7. — Personal internet journals with observations and links.
  8. — The recipient’s name is hidden from everyone else.
  9. — A computer network based on internet technology but for internal organisational needs.
  10. — A part of the internet which users can access using web browser software.
  11. — Sends the original message and all previous history to a new person.
  12. — Software that displays a web page on a computer screen.
Down
  1. — The language used in emails should follow an acceptable code of practice.
  2. — Online discussion boards moderated by an administrator.
  3. — Allow intranets to be extended outside the organisation.
  4. — Send out multiple emails if addresses are grouped together under a single name.
  5. — A company that provides internet access, usually for a monthly fee.
  6. — Contain a combination of letters, numbers, and other symbols (e.g., Sy12@#TT90kj=0).
  7. — A shortened form of the phrase "internet etiquette," meaning respect and courtesy online.
  8. — The file is visible and available for the recipient to download.

20 Clues: — Everyone sees who was copied.— The address of a web page on the WWW.— Any unsolicited email sent over the internet.— A worldwide collection of interconnected networks.— The recipient’s name is hidden from everyone else.— Online discussion boards moderated by an administrator.— Personal internet journals with observations and links....

Rykov's Crossword 2025-06-07

Rykov's Crossword crossword puzzle
Across
  1. Tech reducing human effort in business
  2. Fixing errors in software
  3. First line of defense in security
  4. Driving force behind tech and business merging
  5. Directs traffic in enterprise networks
  6. Provides managed services
  7. Tracks health or security activity
  8. Growing media startup format
  9. Concern in surveillance debates
  10. Merging systems for seamless function
  11. Virtual boundary for location alerts
  12. Writes code for software solutions
  13. Pending tasks in Agile development
  14. Key to user-friendly design
  15. Formalizes service expectations
  16. Scramble data for protection
  17. Society embracing new tech
  18. Extending a service agreement
  19. Risk in digital transactions
Down
  1. Plan for project milestones
  2. Safeguard against data loss
  3. When systems are unexpectedly offline
  4. Radical change from new tech adoption
  5. Combined power of converging industries
  6. Modern way to watch television
  7. Pocket-sized tech revolutionizing life
  8. Consequence for missing SLA terms
  9. Mobile payments speeding up retail
  10. King in digital media
  11. Backbone of data centers
  12. Threat to banking and data safety
  13. Bridge between phone and laptop
  14. Device reading barcodes in stores
  15. Measuring user interaction
  16. Blocks unauthorized network access
  17. Remote doctor visits via tech
  18. Data capacity of a network
  19. Meeting regulations in healthcare
  20. Critical project milestone
  21. Billing for services rendered

40 Clues: King in digital mediaBackbone of data centersFixing errors in softwareProvides managed servicesMeasuring user interactionData capacity of a networkCritical project milestoneSociety embracing new techPlan for project milestonesSafeguard against data lossKey to user-friendly designGrowing media startup formatScramble data for protection...

Networking and cyber ethics 2025-05-26

Networking and cyber ethics crossword puzzle
Across
  1. : Unique address assigned to each device on a network
  2. : Rules for correct and safe behavior on the internet
  3. : A program that detects and removes viruses
  4. : Malicious software
  5. : A person who gains unauthorized access to computer systems
  6. : A device that connects different networks together
  7. required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
  8. : A private network used within an organization
  9. : Unauthorized duplication of digital content
  10. : The physical layout of a computer network
  11. : Temporary storage for recently accessed data
  12. : Device used to connect to the internet
  13. : Online act of bullying or harassment
Down
  1. : Network that covers a small geographic area like a home or office
  2. : A global network connecting millions of computers
  3. Networking and Cyber Ethics
  4. how to do it using Crossword Labs:
  5. : Communication over a network in real time
  6. : Protecting personal and sensitive information online
  7. : Security measure requiring username and password
  8. : Process of converting data into a secure format
  9. the following format into the Crossword Labs input box:
  10. : A scam to trick users into revealing personal information
  11. : Lawful and responsible use of technology

24 Clues: : Malicious softwareNetworking and Cyber Ethicshow to do it using Crossword Labs:: Online act of bullying or harassment: Device used to connect to the internet: Lawful and responsible use of technology: Communication over a network in real time: The physical layout of a computer network: A program that detects and removes viruses...

communication apps assignment 2026-02-19

communication apps assignment crossword puzzle
Across
  1. a personal email center hats made by microsoft
  2. it a instant app another way to send a message through a computer
  3. review networks people share out their view on stuff
  4. its designed for virtual meets and online events
  5. its a AI powered cloud base
  6. messages your close friends on a app
  7. send mssaes through a app so you can chat and call with your friends if you cant use normal messenger
  8. help do calls for work ect
  9. it helps make posters assignment media posts
  10. its a friendly business app
  11. a message that turns into a word or printed form
  12. sends instant messages to people
  13. it designs stuff for websites
Down
  1. network sites helps you find your talents
  2. help yo find things out searches things for you
  3. where you send a message through not your number
  4. its a open source management system
  5. finds people with similar thing and to make new friends
  6. for messaging and audio talk
  7. another call app that shows your face except its for more phones
  8. a apple app that helps you call people while showing your face
  9. sends messages through your computer
  10. another showing face call app but for all phones not just apple
  11. a website builder

24 Clues: a website builderhelp do calls for work ectits a AI powered cloud baseits a friendly business appfor messaging and audio talkit designs stuff for websitessends instant messages to peopleits a open source management systemmessages your close friends on a appsends messages through your computerit helps make posters assignment media posts...

Foundation of Security and Cybercrime 2024-11-19

Foundation of Security and Cybercrime crossword puzzle
Across
  1. anticipation of security incidents and planning for measures to be taken.
  2. an individualwho breaks into computer systems to steal, change, or destroy information
  3. unauthorized access of or interference with computer systems, servers, or other information and communication systems
  4. the use of electronic communication to bully a person
  5. an act or instance of using/closely imitating the language and thoughts of another author without authorization
  6. personnel, hardware, programs, networks, and data
  7. malicious program disguised as or embedded within legitimate software
  8. state of wel-being of information or infrastructure
  9. action taken in advance to protect the system against potential threats or dangers.
Down
  1. common type of online fraud
  2. applications on the computers and operating systems
  3. fraudulent practice of sending emails purporting to be someone reputable
  4. ensuring that the information is accessible to authorized persons when required without delay
  5. includes creating backup copies, malware management, and ensuring sufficient space and memory.
  6. malicious software
  7. wireless fidelity
  8. an assurance for which someone cannot deny something
  9. an action or event with potential to compromise and/or violate security.
  10. exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
  11. mass distribution of unsolicited messages, advertisements, and/or pornogaphy

20 Clues: wireless fidelitymalicious softwarecommon type of online fraudpersonnel, hardware, programs, networks, and dataapplications on the computers and operating systemsstate of wel-being of information or infrastructurean assurance for which someone cannot deny somethingthe use of electronic communication to bully a person...

The Internet 2025-02-07

The Internet crossword puzzle
Across
  1. The amount of data that can be sent over an internet connection in a given time.
  2. A high-speed internet connection that is always on.
  3. A device that connects multiple devices to the internet.
  4. The process of converting data into a secret code to protect it.
  5. A company that provides internet access.
  6. Software that secretly collects information from a device.
  7. A security system that blocks unauthorized access to a network.
  8. A system that translates website names into IP addresses.
Down
  1. Protection of internet-connected systems from attacks.
  2. Breach When private data is accessed without permission.
  3. Backbone The high-speed global infrastructure that connects networks and data centers.
  4. Authentication A security process requiring two steps to log in.
  5. Small files stored on a device to track user activity online.
  6. A service that encrypts internet connections for privacy.
  7. Malicious software designed to harm or steal information.
  8. A device that connects to the internet through a service provider.
  9. Address A unique number assigned to each device on the internet.
  10. A scam where attackers trick users into revealing personal information.
  11. A wireless network that allows devices to connect to the internet.
  12. Computing Storing and accessing data over the internet instead of a local device.

20 Clues: A company that provides internet access.A high-speed internet connection that is always on.Protection of internet-connected systems from attacks.Breach When private data is accessed without permission.A device that connects multiple devices to the internet.A service that encrypts internet connections for privacy....

Chapter 3 2025-02-25

Chapter 3 crossword puzzle
Across
  1. public Wifi network called _____
  2. systems use analog techniques to encode binary
  3. point to point topologies are used with wireless networks called _____
  4. The error checking code in an Ethernet Frame's trailer
  5. installed in a physical bus
  6. ___access method, in which an acknowledgment is required for every packet sent
  7. when electricity bounces off the end of a cable and back in the other direction
  8. occurs if two or more devices on the same medium transmit simultaneously
  9. signals arriving at different times
  10. the actual application to application data transfer speed is the ___
Down
  1. solid objects absorb radio signals, causing them to ___
  2. The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, known as ____
  3. cabling used to communicate between LANs or between switches
  4. ______ Ethernet, defined by IEEE 802.3i
  5. the path data travels between computers on a network is considered the network’s ____
  6. the simplest topology
  7. transmission method sends digital signals in which each bit of data is a pulse of electricity
  8. wireless networking, known as Wireless Fidelity
  9. network technology provides reliable transport of data, slow to current standards
  10. The 802.11n standard takes much of what works in the earlier standards and improves on it by adding ____ antennas

20 Clues: the simplest topologyinstalled in a physical buspublic Wifi network called _____signals arriving at different times______ Ethernet, defined by IEEE 802.3isystems use analog techniques to encode binarywireless networking, known as Wireless FidelityThe error checking code in an Ethernet Frame's trailer...

Tech Terms 3 2025-04-16

Tech Terms 3 crossword puzzle
Across
  1. Wide Web Interconected public webpages
  2. Right protecting creations from theft
  3. Computer programming language
  4. Global network of billions of devices
  5. Program manages access to a resource
  6. Read-only memory
  7. Smallest unit of data
  8. File that lets you share documents
  9. Gap of who has internet access and who doesn't
  10. Open Source Software
  11. start or restarting a computer
  12. Data that is 8 binary digits long
  13. 1 million bytes
  14. Random access memory
  15. Language for creating web pages
  16. Files of imformation that web server send to web browser
  17. Regularly updated website
  18. Sending from one device to another
  19. Converting data into a code
  20. Internal or External componet that stores data
Down
  1. 3-dimentional environment
  2. Connects 2 or more networks
  3. local area network
  4. Block unauthorized access
  5. What a computer does
  6. that manages hardware and software resources
  7. Web browser
  8. Central processing unit
  9. Network address for you computer
  10. Output Device
  11. Search engine
  12. Backup information on a computer
  13. Domain name system
  14. Converts data from digital format to one that is suitable for an analog transmission
  15. Main printed circuit board
  16. Input Device
  17. program to prevent viruses
  18. Address of resource on the internet
  19. Information used to trace indentities

39 Clues: Web browserInput DeviceOutput DeviceSearch engine1 million bytesRead-only memorylocal area networkDomain name systemWhat a computer doesOpen Source SoftwareRandom access memorySmallest unit of dataCentral processing unit3-dimentional environmentBlock unauthorized accessRegularly updated websiteMain printed circuit boardprogram to prevent viruses...

Chapter 7 Security Plus 2024-10-03

Chapter 7 Security Plus crossword puzzle
Across
  1. An access control scheme that is the least restrictive
  2. injects stolen username and password across multiple websites
  3. Granting or denying approval to use specific resources
  4. The ability of systems to exchange information
  5. small device that looks like a thumb drive which can be used for verification
  6. enables users to access a network resource through a directory service
  7. small number of passwords used when trying several different user accounts
  8. Adding a random string to a hash algorithm for enhanced security
  9. A key pair “burned” into a security key
  10. features and characteristics of the individual
  11. Removing user accounts
  12. An access control scheme that is the most restrictive
  13. password attack attempting thousands of combinations per second
Down
  1. Single sign-on for networks owned by different organizations
  2. software designed to break passwords
  3. Using more than one type of authentication credential
  4. Requiring the user to provide proof that they are the unique user.
  5. Granting access that is limited
  6. key stretching algorithms
  7. Standard preconfigured passwords
  8. evidence or proof of something
  9. allows secure web domains to exchange user authentication and authorization data
  10. The point in time when a password is no longer valid
  11. An open-source federation framework
  12. provide control over user validation and the resources that may be accessed

25 Clues: Removing user accountskey stretching algorithmsevidence or proof of somethingGranting access that is limitedStandard preconfigured passwordsAn open-source federation frameworksoftware designed to break passwordsA key pair “burned” into a security keyThe ability of systems to exchange informationfeatures and characteristics of the individual...

Electrical 2024-07-24

Electrical crossword puzzle
Across
  1. The generation of an electromotive force (EMF) in a conductor due to changes in magnetic field.
  2. Booster, Transformer used to control real power on parallel networks.
  3. Group, Defines the phase difference primary to secondary
  4. Cosine rule states what? divided by the hypotenuse
  5. A law which says current is the voltage divided by the resistance
  6. √2 divided by RMS Voltage
  7. The opposition to AC current
  8. (left Rule) Magnetic field points away, current direction is 90 degrees right, which direction is the FORCE
  9. Describes generation such as wind and hydro
  10. Physicist who said the sum of currents into a node equal the sum of currents leaving the node
  11. Changer, Mechanism which adjusts turns ratio in a transformer
  12. Odd multiples of the 3rd harmonic
Down
  1. Type of fault with zero resistance between conductors
  2. Normal direction of phase rotation
  3. Sinusoidal wave an Integer multiple of the fundamental
  4. Percentage change in output voltage from no load to full load
  5. Voltage measured between live and neutral
  6. Factor Term describes the ratio between active and apparent power
  7. Type of fault through a normally insulating medium, has resistance
  8. Factor, The rise (ratio) phase-to-ground voltage (healthy phases) during ground fault
  9. Name for power that is true/real and measured in watts

21 Clues: √2 divided by RMS VoltageThe opposition to AC currentOdd multiples of the 3rd harmonicNormal direction of phase rotationVoltage measured between live and neutralDescribes generation such as wind and hydroCosine rule states what? divided by the hypotenuseType of fault with zero resistance between conductors...

Chapter 6 - Innovation through Artificial Intelligence 2024-07-11

Chapter 6 - Innovation through Artificial Intelligence crossword puzzle
Across
  1. Filtering AI algorithms filtering emails to protect users.
  2. Language Processing (NLP) Deals with computer-human interaction using language.
  3. Assistant A type of personal assistant powered by AI.
  4. Essential for machine learning to identify patterns and make decisions.
  5. A context where AI can predict traffic conditions.
  6. Recognition: Siri is an example of this technology.
  7. A concern regarding AI's impact on human employment.
  8. systems: Utilize human knowledge to solve problems requiring expertise.
  9. Impacted by AI, as discussed in the lecture on AI's societal effects.
  10. What expert systems aim to improve in workplaces.
  11. An essential component of AI where systems improve from experience.
  12. Vision: Allows computers to interpret visual information.
Down
  1. Google's AI for search query analysis.
  2. Learning A technique that automates analytical model building.
  3. The next lecture topic following Innovation through AI.
  4. Using AI to monitor environments through video.
  5. A wide use of AI systems in various industries.
  6. Text Technology that suggests words during typing.
  7. Building machines that perform physical tasks.
  8. A company behind RankBrain and major advancements in AI.
  9. Networks: A type of network involved in machine learning.
  10. Media Services enhanced by AI for better user engagement.
  11. A robot assisting with social media interaction and health reminders.
  12. Facebook's facial recognition technology.
  13. Therapy Can be administered through expert systems.

25 Clues: Google's AI for search query analysis.Facebook's facial recognition technology.Building machines that perform physical tasks.Using AI to monitor environments through video.A wide use of AI systems in various industries.What expert systems aim to improve in workplaces.Text Technology that suggests words during typing....

crossword for AP world vocab 2025-10-31

crossword for AP world vocab crossword puzzle
Across
  1. paper money
  2. an agricultural expression of hinduism and largest religious structure in the premodern world
  3. inns located along the trade routes from east med to china
  4. encompassed 25000 square miles and linked some 150 outlying settlements to the main centers
  5. Swahili civilization participated in the larger Indian ocean
  6. like Malacca and the fronteir of expanding the Islamic world
  7. widely traveled Arab scholar, Marchant, and public official
  8. traveling poets. musicians, and storytellers who maintain oral tradition of west africa
  9. a symbol than daily activity
Down
  1. a north American chiefdom that lay at the center of widespread trading networks
  2. increased food production and led to population growth and organization
  3. ruler of Mali and possibly the richest man ever
  4. had their own neighborhoods in the city which act as intermediaries between government and the foreign merchants
  5. rejected the religous aspects of Buddhism and daoism but appreciated the might moral standards
  6. amitabna ensured rebirth as a heavenly realm
  7. captain that sought to enroll distant people and states
  8. commerate the beginning of Islamic rule in the region after defeating the last Hindu ruler
  9. used their triangular sails sewing boards of hull together
  10. could go 10 days without water and cross the Sahara better
  11. the Chinese chan school of Buddhism became zen in japan

20 Clues: paper moneya symbol than daily activityamitabna ensured rebirth as a heavenly realmruler of Mali and possibly the richest man evercaptain that sought to enroll distant people and statesthe Chinese chan school of Buddhism became zen in japaninns located along the trade routes from east med to china...

Technology in education 2025-10-13

Technology in education crossword puzzle
Across
  1. Using devices students bring from home to school
  2. Storing and accessing files remotely rather than locally.
  3. Short for Artificial Intelligence
  4. Remote delivery of audio/video lessons in real time or recorded
  5. Popular format of online courses often open to many learners
  6. Digital place where students collect evidence of learning
  7. Core term for information transmitted via networks — the global network
  8. Skills for finding, evaluating, using digital information
  9. Use of data to improve teaching and learning
  10. Practice of making learning fun with game elements.
  11. Learning model where students watch lectures at home, do activities in class.
  12. Teaching/learning through the internet — two words often hyphenated
Down
  1. Measurement of student performance; tests and feedback.
  2. Connecting and working together online; team learning.
  3. School system software that manages student records
  4. Platform schools use to host courses, materials, grades
  5. Technology-driven physical machines used in STEM learning.
  6. Technology that overlays digital info on the real world
  7. Course material delivered as downloadable, editable files
  8. Online collections of openly licensed teaching materials
  9. Hands-on mix of science, tech, engineering, arts and math in education.
  10. Process of turning lessons into short video/audio clips teachers can share.
  11. Small software programs on phones; short for applications
  12. Programming activity often taught to students
  13. Using simulated environments for immersive learning

25 Clues: Short for Artificial IntelligenceUse of data to improve teaching and learningProgramming activity often taught to studentsUsing devices students bring from home to schoolSchool system software that manages student recordsPractice of making learning fun with game elements.Using simulated environments for immersive learning...

ASEANPOL 2025-09-22

ASEANPOL crossword puzzle
Across
  1. Efforts to stop acts of terror
  2. The systematic process of gathering, documenting, and using data in investigations
  3. Illegal drug production, distribution, or use
  4. Working jointly, especially by sharing information or resources
  5. Abbreviation for ASEAN Police — ASEAN____
  6. Crime involving money-based wrongdoing
  7. Fundamental entitlements and freedoms of people
  8. Information especially secret or confidential used for strategic purposes
  9. Association of Southeast Asian Nations
  10. Illegally importing or exporting goods
  11. Teaching or preparing members in skills or knowledge
  12. Large-scale criminal enterprises (plural)
  13. Efforts to stop bad things before they happen
  14. The act of working together toward a common goal
Down
  1. Crime that crosses digital networks
  2. Official inquiries or probes
  3. An area or part of the world
  4. Countries that belong to a group
  5. Ability, skills, or resources that allow action
  6. The carrying out of planned tasks or missions
  7. Across multiple nations
  8. Relating to boundaries between countries
  9. The legal authority to make decisions or judgments
  10. A planned set of actions toward achieving something
  11. Material proof presented in legal cases
  12. International police organization
  13. The action of transporting illegal goods or people
  14. State of being free from danger or threats
  15. Capital city where many ASEANAPOL meetings are held
  16. Formal agreement or rules governing behavior

30 Clues: Across multiple nationsOfficial inquiries or probesAn area or part of the worldEfforts to stop acts of terrorCountries that belong to a groupInternational police organizationCrime that crosses digital networksCrime involving money-based wrongdoingAssociation of Southeast Asian NationsIllegally importing or exporting goods...

Cyber Crossword 2025-10-30

Cyber Crossword crossword puzzle
Across
  1. crime investigation; comes after “digital”
  2. attack stage involving traversal between systems
  3. slang term for “hacked”
  4. attack component that performs the target malicious action
  5. to gain attacker presence on a system
  6. field focusing on protecting computers
  7. attack stage where NMAP may be used
  8. facility whose analysts may use a SIEM
  9. investigation of system and network records
  10. principle of least ___
  11. phrase an attacker says after gaining access
  12. network layer protocol with pings
  13. THE defensive cyber club
  14. fancy term for Google-fu
  15. smartcards using close-proximity communication
  16. fun term for a CDRU member
  17. evidence of malicious activity
  18. evil computer program
Down
  1. short form of “covered writing”
  2. comes before “base” or “science”
  3. a tantalizing trap for attackers
  4. engineering type that works on people
  5. act of sending a malicious email
  6. the shield to red’s sword
  7. authorized cyberattack to identify vulnerabilities
  8. proactive defense, or our theme this semester
  9. bypassing physical security devices without a key
  10. IT person in charge of organization computers
  11. act of smuggling data from a system
  12. common term for offensive security person
  13. short form of “secret writing”
  14. often a network packet filter
  15. collections of connected computers
  16. either 0 or 1

34 Clues: either 0 or 1evil computer programprinciple of least ___slang term for “hacked”THE defensive cyber clubfancy term for Google-futhe shield to red’s swordfun term for a CDRU memberoften a network packet filtershort form of “secret writing”evidence of malicious activityshort form of “covered writing”comes before “base” or “science”...

urmumsbum 2021-10-29

urmumsbum crossword puzzle
Across
  1. what is the acronym for Plain Old Telephone Service?
  2. what is re-booting a device either with a cold or warm boot called?
  3. what is the type of file that organises other files in a hierarchal structure?
  4. what is it called when you turn off a computer by pressing and holding down the power button until the system turns off? (two words)
  5. what is the acronym for 'post office protocol'?
  6. what is the device that routes traffic between networks?
Down
  1. what is a one-to-one connection? (3words)
  2. what is the interface on the computer or device where a device is connected?
  3. what is the acronym for pages per minute?
  4. what is the one piece of data along with a destination address used in a packet switching network called?

10 Clues: what is a one-to-one connection? (3words)what is the acronym for pages per minute?what is the acronym for 'post office protocol'?what is the acronym for Plain Old Telephone Service?what is the device that routes traffic between networks?what is re-booting a device either with a cold or warm boot called?...

Mich Security 2013-05-01

Mich Security crossword puzzle
Across
  1. Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
  2. tool Programming language that allows applets to run within a web browser.
  3. Technology created by Microsoft to control interactivity on web pages.
  4. Is a program written with malicious intent and sent out by attackers.
  5. Is a software program that displays advertising on your computer.
Down
  1. Also known as junk mail, is unsolicited e-mail.
  2. A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
  3. Gains access to resources on devices by pretending to be a trusted computer.
  4. Or malware is a file or program other then a virus that is potentially harmful.
  5. Is a self-replicating program that is harmful to networks.

10 Clues: Also known as junk mail, is unsolicited e-mail.Is a self-replicating program that is harmful to networks.Is a software program that displays advertising on your computer.Is a program written with malicious intent and sent out by attackers.Technology created by Microsoft to control interactivity on web pages....

ISM221 2023-03-02

ISM221 crossword puzzle
Across
  1. Combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
  2. Innovation type that changes made to make a process more efficient.
  3. A set of instructions, data or programs used to operate computers and execute specific tasks
  4. ____is a computer program application used to improve a company's decision-making capabilities.
Down
  1. Full lifecycle of a product or process, including material sourcing, production, consumption and disposal/recycling processes
  2. Mode of computer data storage in which digital data is stored on servers in off-site locations.
  3. The way materials and other goods are brought into a company
  4. all the physical parts that make up a computer.
  5. ____is a collection of facts
  6. A type of management support system that facilitates and supports senior executive information and decision-making needs

10 Clues: ____is a collection of factsall the physical parts that make up a computer.The way materials and other goods are brought into a companyInnovation type that changes made to make a process more efficient.A set of instructions, data or programs used to operate computers and execute specific tasks...