networks Crossword Puzzles
NETWORKS 2016-09-07
PLS115 Ch. 2 Vocab 2021-08-31
Across
- _________________ language is communication that eliminates or limits the use of codes and acronyms.
- _________________ information does not need to be divulged to the police or courts due to a special relationship.
- A statement of information about elements of a crime given by a person involved in the crime.
- A person who provides information in a criminal action and whose identity must be protected.
- Totality of ____________.
- The ability of public safety officials to communicate with each other via wireless communications networks.
Down
- A purposeful and voluntary giving up of a known right.
- ______________ questions limit the amount of information a witness can provide.
- A statement which contains information about elements of a crime but falls short of a confession.
- Acronym for the FBI's online real-time transaction-processing database that maintains information on millions of records.
- ____________ questions suggest answers.
- The questioning of a hostile witness or suspect.
- The planned questioning of a witness, victim, informant, or other persons with information.
- A relationship of mutual trust.
- A legal detailed account of events related to a crime.
15 Clues: Totality of ____________. • A relationship of mutual trust. • ____________ questions suggest answers. • The questioning of a hostile witness or suspect. • A purposeful and voluntary giving up of a known right. • A legal detailed account of events related to a crime. • ______________ questions limit the amount of information a witness can provide. • ...
PLS115 Ch. 2 Vocab 2021-08-31
Across
- _________________ language is communication that eliminates or limits the use of codes and acronyms.
- _________________ information does not need to be divulged to the police or courts due to a special relationship.
- A statement of information about elements of a crime given by a person involved in the crime.
- A person who provides information in a criminal action and whose identity must be protected.
- Totality of ____________.
- The ability of public safety officials to communicate with each other via wireless communications networks.
Down
- A purposeful and voluntary giving up of a known right.
- ______________ questions limit the amount of information a witness can provide.
- A statement which contains information about elements of a crime but falls short of a confession.
- Acronym for the FBI's online real-time transaction-processing database that maintains information on millions of records.
- ____________ questions suggest answers.
- The questioning of a hostile witness or suspect.
- The planned questioning of a witness, victim, informant, or other persons with information.
- A relationship of mutual trust.
- A legal detailed account of events related to a crime.
15 Clues: Totality of ____________. • A relationship of mutual trust. • ____________ questions suggest answers. • The questioning of a hostile witness or suspect. • A purposeful and voluntary giving up of a known right. • A legal detailed account of events related to a crime. • ______________ questions limit the amount of information a witness can provide. • ...
Cross Word Puzzle 2021-08-24
Across
- Literacy, being able to understand and use technology
- set of related web pages located under a single domain name, typically produced by a single person or organization.
- theory that says learners construct knowledge rather than just passively take in information.
- recording, reproducing, or broadcasting of moving visual images.
- Practice of taking someone else's work or ideas and passing them off as one's own.
- The evolution of ever-changing learning networks, their complexity, and the role of technology.
Down
- Combination of text, graphics, audio, and video with links and tools that let the user navigate, interact, create, and communicate.
- Intelligence, Computer programs that try to emulate human decision-making capabilities
- The legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy.
- theory of learning based on the idea that all behaviors are acquired through conditioning.
- Theory that focusses on how information is received, organized, stored and retrieved by the mind
- Integration, Implementation of educational technology to accomplish intended learning outcomes.
- Software designated to allow user browse online
- Medium
- Lifeline of today's era.
15 Clues: Medium • Lifeline of today's era. • Software designated to allow user browse online • Literacy, being able to understand and use technology • recording, reproducing, or broadcasting of moving visual images. • Practice of taking someone else's work or ideas and passing them off as one's own. • ...
CROSSWORD 2022-03-29
Across
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- Microsoft is setting up its largest data center in India in this city
- Founder of world wide web - Tim _____ Lee
- Digital dexterity is a term coined by
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- The acronymn for 5 tech stocks that replaced FAANG
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
Down
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- Society 5.0 is an intiative by which country
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Project _____ is BPCL's initiative on the digital front
- India's latest unicorn which is into developing software for OTT networks
- Cloud computing service that provides computing, storage and networking resources on demand
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Radio, Recording, and Popular Music 2022-02-27
Across
- a broadcasting station that aligns itself with a network
- sale of radio or television content to stations on a market-by-market basis
- the illegal recording and sale of copyrighted material
- relaxation of ownership and other rules for radio and television
- total sale of broadcast airtime
- streaming or downloading of audio files recorded and stored on distant servers
- single ownership and management of multiple radio stations in one market
- "radio stations" that can be accessed only over the World Wide Web
Down
- percentage of a market's total population that is reached by a piece of broadcast programming
- a device that translates digital computer information into an analog form so it can be transmitted through telephone lines
- centralized production, distribution, decision-making organizations that links affiliates for the purpose of delivering their audiences to advertisers
- in broadcast regulation, the idea that broadcasters serve as the public's trustees fiduciaries
- the delivery of "radio" over the Internet directly to individual listeners
- predetermined sequence of selected records to be played by a disc jockey
- a radio station's particular sound or programming content
15 Clues: total sale of broadcast airtime • the illegal recording and sale of copyrighted material • a broadcasting station that aligns itself with a network • a radio station's particular sound or programming content • relaxation of ownership and other rules for radio and television • "radio stations" that can be accessed only over the World Wide Web • ...
alex crossword 2013-05-01
Across
- One type of damage of threath security.
- Is a software program that displays advertising on your computer.
- Is a form of attack that prevents users from accessing normal services.
- Is a program written with malicious intent .
- Programming language developed to interact with HTML source code to allow interactive websites.
- Is the protocol suite that is used to control all of the communications on the Internet.
- Is a self-replicating program that is harmful to networks.
- Technology created by Microsoft to control interactivity on web pages.
- Explain his activities is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
- Virus that does not need to be attached to other software.
Down
- The process of removing sensitive data from hardware and software before recycling or discarding.
- Is software designed specifically to detect, disable, and remove viruses.
- Programming language that allows applets to run within a web browser.
- Is a file or program other then a virus that is potentially harmful.
- Is a common tcp/ip atacks.
15 Clues: Is a common tcp/ip atacks. • One type of damage of threath security. • Is a program written with malicious intent . • Is a self-replicating program that is harmful to networks. • Virus that does not need to be attached to other software. • Is a software program that displays advertising on your computer. • ...
5.01 Vocab 2024-04-22
Across
- Computerized storage for information and facts
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- A system of computers connected together by telephone wires, cable wires, or other means
- A navigational system that uses satellite technology to determine location and provide directions
- The use of computer technology to plan, design, test, and alter products
- A mobile phone with advanced capabilities, such as accessing the Internet
- The practical application of science to society and industry
Down
- Technology that allows users to communicate over the Internet rather than through traditional public networks
- Programs that instruct computers to perform specific operations
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- An object placed into orbit by humans; most are used for communications purposes
- Computer software designed to mimic the knowledge of a human expert
- Working from home or a remote location
- Technology that allows users to make telephone calls over the Internet
- A number you choose to gain access to an account
15 Clues: Working from home or a remote location • Computerized storage for information and facts • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
CS Principal Exam Review 2024-04-25
Across
- The idea that some communities or populations have less access to computing than others (2 words)
- A mistake in typed code that violates the rules of the programming language
- A wireless access point that gives unauthorized access to secure networks
- Material created on a computer is the _______ _______ of the creator or an organization.
- _____ _____ issue digital certificates that validate the ownership of encryption keys
- a problem with a yes/no answer
- Add from the end of the array
- composed of 8 bits
Down
- The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items
- Google Maps Route Recommendations are an example of a to a problem
- compression does not lose any data such as Huffman text compression
- Wikipedia is an example of _____
- A lightweight data transport protocol with minimal error checking
- Amount of time to complete the task sequentially divided by the Amount of time to complete the task when run in parallel.
- The data of a data is called ___
15 Clues: composed of 8 bits • Add from the end of the array • a problem with a yes/no answer • Wikipedia is an example of _____ • The data of a data is called ___ • A lightweight data transport protocol with minimal error checking • Google Maps Route Recommendations are an example of a to a problem • compression does not lose any data such as Huffman text compression • ...
Week 10: The Nervous System 2022-11-19
Across
- microscopic branching fiber of a nerve cell that is the first part to receive the nervous impulse.
- collection of spinal nerves below the end of the spinal cord.
- space thru which a nervous impulse travels between nerve cells: means, a point of contact
- connective and supportive tissue of an organ. In the nervous system these are glial cells.
- this nervous system contains nerves that are only found in the digestive system.
- portion of the brain that controls body temperature, sleep, appetite, sexual desire, and emotions such as fear and pleasure.
- largest part of the brain: responsible for voluntary muscular activity, vision, speech, taste, hearing, thought and memory.
Down
- suffix that means seizure
- meninges that means hard mother, in Latin.
- large, interlacing networks of nerves
- neurotransmitter chemical released at the ends of nerve cells.
- suffix that means strength
- relatively sudden loss of consciousness, followed by a spontaneous rapid and complete recovery
- microscopic fiber that is part of a neuron and carries nerve impulses along the nerve cell.
- neurons and nerves, essential distinguishing tissue of the nervous system.
15 Clues: suffix that means seizure • suffix that means strength • large, interlacing networks of nerves • meninges that means hard mother, in Latin. • collection of spinal nerves below the end of the spinal cord. • neurotransmitter chemical released at the ends of nerve cells. • neurons and nerves, essential distinguishing tissue of the nervous system. • ...
computer components 2025-03-28
Across
- a computer's main processing component that controls the flow of data and instructions.
- a temporary storage area that stores frequently accessed data and instructions
- a device that sends and receives data between networks, connecting devices to the internet
- a computer storage device that uses flash memory to store data
- a physical device that stores data
- the main printed circuit board
- a screen that displays information from a computer
Down
- an electronic circuit that processes graphics
- a hardware component that converts alternating current electricity into direct current electricity for a computer
- It's where the data is stored that the computer processor needs to run applications and open files.
- a hand-held device that controls the cursor on a computer screen
- a wireless technology that allows devices to connect and exchange data without wires
- a type of non-volatile computer memory that can store data even when there is no power
- a panel of keys that you press to type letters, numbers, and symbols
- a type of computer memory that stores permanent data and instructions
15 Clues: the main printed circuit board • a physical device that stores data • an electronic circuit that processes graphics • a screen that displays information from a computer • a computer storage device that uses flash memory to store data • a hand-held device that controls the cursor on a computer screen • ...
Techtonic Round 1 Set C 2025-03-26
Across
- A set of rules that define how data is transmitted between devices in a network.
- A type of memory that loses its data when power is turned off.
- A security software designed to detect and remove malicious programs.
- (The smallest unit of digital data, represented as either 0 or 1.
- A computing approach that simulates human intelligence for decision-making.
- A numerical label assigned to a device for identification on a network.
- A cryptographic technique used to convert data into a secure format.
Down
- (A collection of related web pages, usually accessed through a common domain name.
- (A system that prevents unauthorized access to or from a private network.
- (A widely used markup language for creating web pages.
- (A set of programs that manage computer hardware and software resources.
- A network device that forwards data packets between computer networks.
- A process that transforms data into a fixed-length value, commonly used in security.
- A cloud computing service model that provides virtualized computing resources over the internet.
- A widely used operating system known for its open-source nature and flexibility.
15 Clues: (A widely used markup language for creating web pages. • A type of memory that loses its data when power is turned off. • (The smallest unit of digital data, represented as either 0 or 1. • A cryptographic technique used to convert data into a secure format. • A security software designed to detect and remove malicious programs. • ...
Community Development 2018-03-01
Across
- community development process pg. 3
- based on weak relationships among people who do not have a great deal of contact with one another pg. 78
- having the knowledge, skills, and processes or a specialized nature pg. 59
- create mechanisms for specified purpose of providing or enhancing technical assistance pg. 59
- networks of actors engaged in activities associated with a place, or a social process involving residents in working together to improve their quality of life pg. 2
- institutional environment shapes the context and defines the arena where conflict plays out pg. 105
- identifying individual resources, local organizations, and community institutions that can be used as assets in community development plan pg. 75
- focuses on the use of technical knowledge to design and implement a targeted program pg. 16
- What state is MTSU in?
- central to conflict pg. 106
- a method of implementing change possibly through technical assistance or self-help pg. 14
- specified activities such as housing construction, adoption of agriculture innovations or implementing recreational programs pg. 14
- where was Ms. Standridge's conference?
- also emphasizes local people working together, nurture their leadership skill and knowledge, and organize their own actions even when they disagree pg. 16
- extensive tracts of land and all that is on them- trees, rivers, mountains, beaches, etc. pg. 37
Down
- concerned with fairness of the process, won't be satisfied with outcome is process wasn't fair pg. 113
- conflict or controversy over land or resources pg. 103
- all rights assigned to you in a social role, defined through written and unwritten rules pg. 103
- response to conflict characterized by high concern for one's own interests, paired with a high concern for the interests of other parties pg. 112
- disagreement between individuals who are important at the community level, often between people of authority pg. 105
- process of effectively communicating or marketing technology's benefits to potential users pg. 57
- strong relationships among individuals who know each other very well pg. 78
- residents in a specific geographic place that act on locally oriented or collective interests pg. 2
- community development outcomes pg. 3
- create policies and programs, control access to federal funds, and influence how or if community development occurs pg.23
- have a vested interest in the conflict, but may not be directly involved pg. 106
- emphasizes people in a community coming together and learning how to address problems on their own pg. 16
- having the power to manipulate resources, knowledge, and information pg. 59
- stresses the importance of social relationships and networks to make community development possible (a.k.a. glue) pg. 72
- having the power to create, legislate, and appropriate resources pg. 59
- perform specific tasks by private consultants pg. 59
31 Clues: What state is MTSU in? • central to conflict pg. 106 • community development process pg. 3 • community development outcomes pg. 3 • where was Ms. Standridge's conference? • perform specific tasks by private consultants pg. 59 • conflict or controversy over land or resources pg. 103 • having the power to create, legislate, and appropriate resources pg. 59 • ...
Web Safety Terms and Definitions 2023-08-22
Across
- Software designed to protect computers from viruses.
- A program designed to prevent, detect, search and remove viruses and other types of malware from the computers drive.
- A relationship between two things or situations, especially where one thing affects the other.
- A communication method/mailing method that uses electronic devices to deliver messages across computer networks
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- The system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties.
- A dishonest scheme; a fraud.
- Collection of computers controlled by users other than their owners to perform automated tasks over the Internet.
- connected to, served by, or available through a system and especially a computer or telecommunications system .
- Ownership of any creative work or invention.
- A person who uses computers to gain unauthorized access to data.
- The act or an instance of taking one's own life voluntarily and intentionally.
- exception to copyright infringement.
- The external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- The sending of sexually explicit messages or images by cell phone.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Down
- A group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.
- bring together or into contact so that a real or notional link is established.
- The use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions.
- The programs and other operating information used by a computer.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- The practice of taking someone else's work or ideas and passing them off as one's own.
- Information such as facts and numbers used to analyze something or make decisions or information in a form that can be processed by a computer.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A secret word or phrase that must be used to gain admission to something.
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Computer device which forwards data packets from one network to another .
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
28 Clues: A dishonest scheme; a fraud. • exception to copyright infringement. • Ownership of any creative work or invention. • Software designed to protect computers from viruses. • The programs and other operating information used by a computer. • A person who uses computers to gain unauthorized access to data. • ...
AI Practical Work 2 2021-12-17
Across
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- Biological correspondent of the weights in an artificial neural network.
- Logic programming language associated with artificial intelligence and computational linguistics.
- Finite sequence of well-defined computer instructions to solve a computation problem.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Elementary unit of an artificial neural network.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- Interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- Interdisciplinary branch of computer science and engineering. It involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Algorithm for supervised learning of artificial neural networks using gradient descent.
Down
- Computerized system composed of multiple interacting intelligent agents.
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Method of inquiry in artificial intelligence for determining whether or not a computer is capable of thinking like a human being.
- simulation of human intelligence processes by machines, especially computer systems.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Algorithm for supervised learning of binary classifiers.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- Artificial Immune Systems: machine learning systems inspired by theoretical immunology.
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each other.
- Adaptive resonance theory: describes a number of neural network models which use supervised and unsupervised learning methods, and address problems such as pattern recognition and prediction.
26 Clues: Elementary unit of an artificial neural network. • Algorithm for supervised learning of binary classifiers. • Computerized system composed of multiple interacting intelligent agents. • Biological correspondent of the weights in an artificial neural network. • simulation of human intelligence processes by machines, especially computer systems. • ...
E-Commerce 2021-08-10
Across
- is process of buying and selling of goods over the internet.
- Commerce use of wireless handheld devices like cellphones and tablets to conduct commercial transactions online.
- businesses allow individuals to sell goods and services to companies.
Down
- is international networks, which helps to doing business all over the globe.
- is when a company markets its products or services directly to other businesses.
5 Clues: is process of buying and selling of goods over the internet. • businesses allow individuals to sell goods and services to companies. • is international networks, which helps to doing business all over the globe. • is when a company markets its products or services directly to other businesses. • ...
Solution Update 2016-04-01
Across
- Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
- Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
- Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
- Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
- Wie lautet der Name der modularen HPE Switches für Software Defined Networks?
5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks? • Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet? • Prevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für….. • ...
Solution Update 2016-04-01
Across
- Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet?
- Was steckt hinter der Abkürzung Cisco CMX?threatprevention Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für?
Down
- Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für…..
- Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware?
- Wie lautet der Name der modularen HPE Switches für Software Defined Networks?
5 Clues: Wie lautet der Name der modularen HPE Switches für Software Defined Networks? • Mit welchem „Wearable“ hat Evolaris bereits einige Industriebetriebe ausgestattet? • Ein wichtiger Part des FireEye Cyber Security Portfolios umfasst Plattformen für….. • Wie heißt die führende Servervirtualisierungsplattform mit konsistentem Betriebsmanagment von VMware? • ...
Networking Concepts 2025-06-04
Across
- Each computer in a network
- These are the certain sets of rules that determine how data should be transferred over networks
- It is a network device used to connect all the computers in network with each other
Down
- It is a wireless technology used to interconnect mobile phones, computer etc
- This kind of network connects two or more computers located at distant places
5 Clues: Each computer in a network • It is a wireless technology used to interconnect mobile phones, computer etc • This kind of network connects two or more computers located at distant places • It is a network device used to connect all the computers in network with each other • ...
AP World Crossword 2023-02-22
Across
- open rebellions against the authorities
- Indian Soldiers serving under British or European orders
- Caused fierce parliamentary debates and press wars
- The british changed their goals to ___ due to the violent conflicts being put into question, and therefore expanding railroad networks
- The European’s ___ developments catapulted the European’s far ahead in the capacity to wage war
- Formed the Indian National Congress movement, which would become important to independence after WWI
- Great Britain sent these, making for a brutal counteroffensive that led to the sepoy bands being crushed
- Leaders often lacked ___ in new industrialized nations when it came to dealing with overproduction and unemployment as a result of economic crises
- Ships Began to rapidly advance after the opening of the _____.
Down
- Often seen as safe valves during industrial slumps and raw material shortages
- Indian rebellions named after its origins in the ranks of British-trained Indian Soldiers.
- one of the main causes why the first mutiny occurred in India
- The new industrialization in Europe created ___ among European Powers
13 Clues: open rebellions against the authorities • Caused fierce parliamentary debates and press wars • Indian Soldiers serving under British or European orders • one of the main causes why the first mutiny occurred in India • Ships Began to rapidly advance after the opening of the _____. • The new industrialization in Europe created ___ among European Powers • ...
Cyber Security 2021-10-07
Across
- ethics being authorized to attempt to gain unauthorized access to a computer,
- scramble,
- the practice of encoding information so only authorized people can read it,
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
- the practice of protecting systems networks, and programs from digital attacks,
- footprint a data trail you unintentionally leave online,
- hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
- the practice of solving and writing encryptions,
- a type of malicious software designed to block access to a computer system until a sum of money is paid,
- hacking to promote a political agenda or social change,
- a form of protection for intellectual property usually applying to artistic works,
- the use of electronic communication to bully a person,
- literacy having the ability to find information evaluate information credibility and use information effectively,
13 Clues: scramble, • the practice of solving and writing encryptions, • the use of electronic communication to bully a person, • hacking to promote a political agenda or social change, • footprint a data trail you unintentionally leave online, • the practice of encoding information so only authorized people can read it, • ...
Computing Technical Terms 2023-05-19
Across
- A software that searches, detects and blocks computer viruses and other malware
- The primary printed circuit board in a computer
- _________ system, the computer's master control program which sets the standards for all application programs
- A system that connects and transmits data between different computer devices
- The address of a page or a file on the Internet
Down
- A computer system in a network that is shared by multiple users and client computers
- Universal interface that connects peripheral devices to a computer
- Unsolicited emails, also called junk mail
- The temporary storage where all program execution and data processing takes place
- A software that blocks traffic into and out of private networks according to configured rules
- A file or set of files that are necessary for the operating system to communicate with a hardware device
- A copy of data on external storage, usually made for security reasons
- The process of initializing the computer and starting to execute instructions
13 Clues: Unsolicited emails, also called junk mail • The primary printed circuit board in a computer • The address of a page or a file on the Internet • Universal interface that connects peripheral devices to a computer • A copy of data on external storage, usually made for security reasons • A system that connects and transmits data between different computer devices • ...
Tech Times Crossword 2023-09-25
Across
- Pink WhatsApp messages are often circulated via these types of links, making them appear trustworthy
- A payment solution that enables real-time small-value payments without a UPI PIN
- The Rupay card variant in which "Empower Her" Debit Card is available
- Under Sampann, access to benefits are extended to the entire __
- As part of the Sampann program, these are provided at a discount and are used in farming
- The technology that UPI Lite X uses for transactions in close proximity
- A cyberattack that locks or encrypts data and demands a ransom for its release
Down
- GBM helps improve customer satisfaction and loyalty through this
- Extended Reality combines the best elements of AR and VR, creating an __ experience
- A security breach where an attacker gains unauthorized access to a system by guessing passwords
- The act of illegally accessing computer systems or networks with malicious intent
- This feature of UPI Lite X allows users to send and receive money
- DPDPA mandates firms to assess data collection, legal basis, and obtain this
13 Clues: Under Sampann, access to benefits are extended to the entire __ • GBM helps improve customer satisfaction and loyalty through this • This feature of UPI Lite X allows users to send and receive money • The Rupay card variant in which "Empower Her" Debit Card is available • The technology that UPI Lite X uses for transactions in close proximity • ...
Technology Crossword 2023-09-19
Across
- a microcomputer designed for use by one person at a time.
- a type of compact disc able to store large amounts of data, especially high-resolution audiovisual material.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- integrated circuit that generates the video signal sent to a computer display.
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a worldwide system of computer networks
Down
- the main printed circuit board (PCB) in a computer.
- all the public websites or pages that users can access on their local computers and other devices through the internet.
- an internal or external computer component that stores data, such as the operating system, applications, and user files
- a mechanism used to connect peripheral devices to computers.
- your computer or laptop's short-term memory
- a type of compact disc that can only be read, not written to
- essentially the brain of the computer.
13 Clues: essentially the brain of the computer. • a worldwide system of computer networks • your computer or laptop's short-term memory • the main printed circuit board (PCB) in a computer. • a microcomputer designed for use by one person at a time. • a mechanism used to connect peripheral devices to computers. • a type of compact disc that can only be read, not written to • ...
AP gov 5.6 2025-03-13
Across
- organizations formed to advocate for specific issues or causes
- a lobbying approach that targets influential community leaders rather than the general public
- a broader and less structured coalition of various groups that influence policy
- large, structured organizations such as businesses or unions that engage in lobbying
- a theory that multiple, competing groups influence policymaking.
- a strategy where lobbyists directly communicate with legislators to influence policies
- public support given to a candidate or policy by an influential organization
Down
- groups that focus on one specific poicy area, sich as gun rights or abortion
- Individuals who benefit from public goods or group activities without contributing
- a form of advocacy that starts from the bottom up, involving regulat citizens in political action
- organizations that work for the common good of society rather than specific interests
- the act of attempting to influence policymaking and legislation
- the relationship among bureaucratic agiencies, interest groups, and congressional committees that shapes policy
13 Clues: organizations formed to advocate for specific issues or causes • the act of attempting to influence policymaking and legislation • a theory that multiple, competing groups influence policymaking. • groups that focus on one specific poicy area, sich as gun rights or abortion • public support given to a candidate or policy by an influential organization • ...
The Answers to Great Wireless 2019-06-17
Across
- You can get as much as 20GB of this each month, with unlimited texting.
- Whether you prefer smart or flip, we offer plenty of these to choose from.
- We keep you connected on the nations largest so you stay in touch everywhere.
Down
- Members of this group enjoy a 5% discount on usage each month.
- Talk as much as you want; for just $20 a month, these are unlimited.
- You won't beat this price for activating your service with Consumer Cellular.
6 Clues: Members of this group enjoy a 5% discount on usage each month. • Talk as much as you want; for just $20 a month, these are unlimited. • You can get as much as 20GB of this each month, with unlimited texting. • Whether you prefer smart or flip, we offer plenty of these to choose from. • ...
Networking concept puzzle 2025-06-07
Across
- It is a device that connects two different types of networks with each other.
- This kind of network connects more computers located at distinct places.
Down
- it is the most commonly used network card
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
- the computer in a network is called a NoDe
6 Clues: it is the most commonly used network card • the computer in a network is called a NoDe • This kind of network connects more computers located at distinct places. • It is a device that connects two different types of networks with each other. • It is a network device that is used to connect all the computers in a network with each other. • ...
TECH_TUES 2024-11-26
4 Clues: – A network device that connects multiple computers in a LAN. • – An algorithm used to scramble data for secure communication. • – The study of protecting systems and networks from digital attacks. • – The process of making predictions or decisions without human intervention.
Data Communication 2022-04-24
Across
- converts data from analogue to digital and digital to analogue
- a file that can be displayed on the World Wide Web
- the act of transferring information from one place, person or group to another through different mediums
- transferring data from a computer to another device via the internet
- the web address of any file that can be downloaded from the internet
- a computer that runs websites
- the global system of interconnected computer networks that uses the Internet protocol suite
- the transmission of a file from a larger computer system to your persoanl computer via the internet
- a collection of webpages that belong together
Down
- sending or receiving of data or information to and from remote locations through electronic devices
- a method of exchanging messages between people using electronic devices
- connection of at least two computer systems, either by a cable or a wireless connection.
- an application software for accessing the World Wide Web or a local website
13 Clues: a computer that runs websites • a collection of webpages that belong together • a file that can be displayed on the World Wide Web • converts data from analogue to digital and digital to analogue • transferring data from a computer to another device via the internet • the web address of any file that can be downloaded from the internet • ...
AP World Crossword 2023-02-22
Across
- open rebellions against the authorities
- Indian Soldiers serving under British or European orders
- Caused fierce parliamentary debates and press wars
- The british changed their goals to ___ due to the violent conflicts being put into question, and therefore expanding railroad networks
- The European’s ___ developments catapulted the European’s far ahead in the capacity to wage war
- Formed the Indian National Congress movement, which would become important to independence after WWI
- Great Britain sent these, making for a brutal counteroffensive that led to the sepoy bands being crushed
- Leaders often lacked ___ in new industrialized nations when it came to dealing with overproduction and unemployment as a result of economic crises
- Ships Began to rapidly advance after the opening of the _____.
Down
- Often seen as safe valves during industrial slumps and raw material shortages
- Indian rebellions named after its origins in the ranks of British-trained Indian Soldiers.
- one of the main causes why the first mutiny occurred in India
- The new industrialization in Europe created ___ among European Powers
13 Clues: open rebellions against the authorities • Caused fierce parliamentary debates and press wars • Indian Soldiers serving under British or European orders • one of the main causes why the first mutiny occurred in India • Ships Began to rapidly advance after the opening of the _____. • The new industrialization in Europe created ___ among European Powers • ...
AP World Crossword 2023-02-22
Across
- open rebellions against the authorities
- Indian Soldiers serving under British or European orders
- Caused fierce parliamentary debates and press wars
- The british changed their goals to ___ due to the violent conflicts being put into question, and therefore expanding railroad networks
- The European’s ___ developments catapulted the European’s far ahead in the capacity to wage war
- Formed the Indian National Congress movement, which would become important to independence after WWI
- Great Britain sent these, making for a brutal counteroffensive that led to the sepoy bands being crushed
- Leaders often lacked ___ in new industrialized nations when it came to dealing with overproduction and unemployment as a result of economic crises
- Ships Began to rapidly advance after the opening of the _____.
Down
- Often seen as safe valves during industrial slumps and raw material shortages
- Indian rebellions named after its origins in the ranks of British-trained Indian Soldiers.
- one of the main causes why the first mutiny occurred in India
- The new industrialization in Europe created ___ among European Powers
13 Clues: open rebellions against the authorities • Caused fierce parliamentary debates and press wars • Indian Soldiers serving under British or European orders • one of the main causes why the first mutiny occurred in India • Ships Began to rapidly advance after the opening of the _____. • The new industrialization in Europe created ___ among European Powers • ...
Crossword-Ernest 2024-02-21
Across
- a primary circuit board inside a computer that connects all components
- a common interface for video and high-speed peripherals
- one of the small dots or squares that make up an image on a computer screen
- a semiconductor device used to amplify or switch electrical signals and power
- the process by which data transmitted over computer networks is converted from binary code into its original, often text-based format
- The programs and other operating information used by a computer
- the computer's tangible components or delivery systems that store and run the written instructions provided by the software
Down
- a small device that can process data very fast
- the logic circuitry that responds to and processes the basic instructions that drive a computer
- a numbering scheme in which there are only two possible values for each digit -- 0 or 1
- a binary digit, the smallest increment of data on a computer
- To provide or give something to the computer
- where data is permanently kept on your computer
13 Clues: To provide or give something to the computer • a small device that can process data very fast • where data is permanently kept on your computer • a common interface for video and high-speed peripherals • a binary digit, the smallest increment of data on a computer • The programs and other operating information used by a computer • ...
CROSSWORD 2024-07-02
Across
- A step-by-step procedure for solving a problem or accomplishing some end.
- A programming language commonly used to create interactive effects within web browsers.
- A set of rules governing the exchange or transmission of data between devices.
- A linear structure which follows a particular order in which the operations are performed
- A language used in programming and designed for managing data held in a relational database management system.
- The central part of an operating system, managing system resources and communication between hardware and software.
- The delay before a transfer of data begins following an instruction for its transfer.
Down
- A linear data structure which follows a particular order in which the operations are performed.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A system for connecting computers within a local area network (LAN).
- A device that forwards data packets between computer networks.
- A request for information from a database.
- A component that stores data so future requests for that data can be served faster.
13 Clues: A request for information from a database. • A device that forwards data packets between computer networks. • A system for connecting computers within a local area network (LAN). • A step-by-step procedure for solving a problem or accomplishing some end. • A set of rules governing the exchange or transmission of data between devices. • ...
HRM CA 2023-09-14
Across
- The platform where employees can access training materials and courses.
- Platforms that connect professionals for networking, job searching, and industry-specific discussions.
- The final step in the hiring process where a job offer is extended to the chosen candidate.
- This HR software automates payroll processing.
- The document submitted by a job applicant that provides their work history and qualifications.
- The process of assessing an employee's performance and development needs.
- The software that helps HR manage employee records.
- A system used by HR to streamline the recruitment process, including job posting, applicant tracking, and interview scheduling.
Down
- An acronym for a platform that manages online learning and training programs for employees
- The process of integrating a new employee into the company, often facilitated by HR software.
- This software helps HR professionals manage employee data, payroll, benefits, and more
- Strategies and tools used to keep employees engaged and satisfied with their jobs.
- Fit The term for assessing a candidate's cultural fit within the organization.
- A content management system used to organize and distribute HR-related content.
- A system that manages employee data, payroll, and other HR functions.
15 Clues: This HR software automates payroll processing. • The software that helps HR manage employee records. • A system that manages employee data, payroll, and other HR functions. • The platform where employees can access training materials and courses. • The process of assessing an employee's performance and development needs. • ...
CSP Review Puzzle 2025-05-02
Across
- ____ is the study of encryption techniques
- ____ is data about data.
- ____ is the process of finding a path from sender to receiver
- The ____ of a computer network is the maximum amount of data that can be sent in a fixed amount of time.
- A ____ network is a small network often in one building.
- ____ is removing the unimportant details as you capture something in code
- ____ is measuring values of an analog signal at regular intervals
Down
- A ____ error is caused by code that will not compile and run due an error in the code itself
- The ____ is the fact that the wealthy have access to better technology and connectivity than the poor
- A ____ is an agreed-upon set of rules that specify the behavior of a system.
- - A ____ point is a wireless access point that gives unauthorized access to secure networks
- ____ is needed to reduce file size
- ____ contain data and metadata used for routing the ____ between the origin and the destination on the internet
13 Clues: ____ is data about data. • ____ is needed to reduce file size • ____ is the study of encryption techniques • A ____ network is a small network often in one building. • ____ is the process of finding a path from sender to receiver • ____ is measuring values of an analog signal at regular intervals • ...
Cloud Crossword 2025-08-13
Across
- A Microsoft service that is used for automating ETL processes (3 words)
- An AWS fully managed NoSQL database service
- Azure service for securely connecting Azure resources to each other, the internet, and on-premises networks
- A container orchestration service run by AWS to run and manage Docker containers
- Azure service for storing large amounts of unstructured data, such as text or binary data
- An interface that allows different software applications to communicate with each other
Down
- A guarantee from a CSP on the uptime reliability of their cloud service
- Azure service that distributes incoming network traffic across multiple servers to ensure high availability and reliability
- Digital space where businesses can subscribe to computing services like storage, processing, and software over the internet
- AWS service for managing access to resources and services securely
- A platform of cloud services created by Microsoft
- A platform of cloud services created by Amazon
- An AWS service that offers hosting for serverless functions
13 Clues: An AWS fully managed NoSQL database service • A platform of cloud services created by Amazon • A platform of cloud services created by Microsoft • An AWS service that offers hosting for serverless functions • AWS service for managing access to resources and services securely • A guarantee from a CSP on the uptime reliability of their cloud service • ...
network hardware 2022-10-09
Across
- Allows data packets to be routed between different networks eg LAN and WAN
- A protocol used by many wired LANs, uses twisted pairs for transmission medium
- Hardware that connects many devices/computers to form a LAN, broadcast all received packets
- A network point/node that acts as entrance into another network, connect LANs with diff. protocols
- contains the MAC address and allows devices connect to a network eg the internet
Down
- Converts digital data to analogue data and vice versa, modulator demodulator
- boost signals to allow greater distance travel over a network
- Hardware that connects many devices/computers to form a LAN, determines the destination address and sends data to appropriate computer
- connect LAN to LAN that uses same protocol
9 Clues: connect LAN to LAN that uses same protocol • boost signals to allow greater distance travel over a network • Allows data packets to be routed between different networks eg LAN and WAN • Converts digital data to analogue data and vice versa, modulator demodulator • A protocol used by many wired LANs, uses twisted pairs for transmission medium • ...
Electronic Device 2022-10-19
Across
- a small device that is moved by hand across a surface to control the movement
- to make a computer keep data by putting a copy in a location where it will be stored
- an act of looking for information on a computer or on the internet
- an international computer network connecting other networks and computers that allows people to share information around the world
- electronic file that gives information about something
Down
- a small memory device that can be used to store data and to move it from one computer to another
- the flat surface at the front of electronic devices, on which you see pictures or information
- the device that the sound comes out of
- a machine for printing text on paper
9 Clues: a machine for printing text on paper • the device that the sound comes out of • electronic file that gives information about something • an act of looking for information on a computer or on the internet • a small device that is moved by hand across a surface to control the movement • ...
Macro Unit 7 2020-08-23
Across
- international differences in real GDP per capita tend to narrow over time
- the technical means for the production of goods and services
- often referred to simply as productivity, is output per worker
- the amount of output that can be achieved with a given amount of factor inputs
Down
- occurs when the value of an asset is reduced by wear, age, or obsolescence
- consists of human made goods such as buildings and machines used to produce other goods and services
- if it can continue in the face of limited supply of natural resources and the impact of growth on the environment
- the improvement in labor created by the education and knowledge of members of the workforce
- roads, power lines, ports, information networks, and other underpinnings for economic activity
9 Clues: the technical means for the production of goods and services • often referred to simply as productivity, is output per worker • international differences in real GDP per capita tend to narrow over time • occurs when the value of an asset is reduced by wear, age, or obsolescence • the amount of output that can be achieved with a given amount of factor inputs • ...
National Cyber Security Awareness Month 2017-08-09
Across
- A cryptographic algorithm for encryption and decryption.
- Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack?
- What is the term for electronic mail?
- Abbreviation for a physical address; a numeric value that uniquely identifies that network device from every other device on the planet.
Down
- What is the term to describe connecting multiple separate networks together?
- The term used for attacks that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer?
- What is the abbreviation for the University's Technology group on-campus?
- What is it called when someone encrypts your files and asks for money to decrypt them?
- What is the basic communication language or protocol of the Internet?
9 Clues: What is the term for electronic mail? • A cryptographic algorithm for encryption and decryption. • What is the basic communication language or protocol of the Internet? • What is the abbreviation for the University's Technology group on-campus? • What is the term to describe connecting multiple separate networks together? • ...
hardware of the internet 2022-05-03
Across
- copy (data) from one computer system to another, typically over the internet.
- an electronic device for storing and processing data.
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- A router is a networking device that forwards data packets between computer networks
Down
- the chief support of a system or organization.
- a desktop computer or workstation that is capable of obtaining information and applications from a server
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- A server is a fast and powerful computer which is capable of handling a lot of traffic.
- Your ISP is the company who supplies your broadband connection.
9 Clues: the chief support of a system or organization. • an electronic device for storing and processing data. • Your ISP is the company who supplies your broadband connection. • copy (data) from one computer system to another, typically over the internet. • A router is a networking device that forwards data packets between computer networks • ...
Tech Crossword 2024-03-25
Across
- A word or graphic in a document that can be clicked and will take the user to other information.
- A computer whose information is accessible to Internet users.
- Computer pages you can get to through the World Wide Web.
- A word or graphic in a document that can be clicked and will take the user to other information.
Down
- The way that people send and receive written messages over the Internet.
- A personal list that allows users to create a linked list to their favorite sites.
- Lets a user connect to an Internet service provider when using a modem and telephone line or a cable.
- HyperText Markup Language which is the programming language of the World Wide Web.
- A group of computers that are connected.
- The global "network of computer networks" that connects more than 3 million computers, called hosts, in over 160 countries.
10 Clues: A group of computers that are connected. • Computer pages you can get to through the World Wide Web. • A computer whose information is accessible to Internet users. • The way that people send and receive written messages over the Internet. • A personal list that allows users to create a linked list to their favorite sites. • ...
CW 12 2024-08-03
Across
- Violations of the criminal law committed by persons of respectability and high social status in the course of their occupation
- ideas, inventions, and creative expressions of people and companies
- Unlawful activities of a highly organized group engaged in supplying illegal goods/services
Down
- Group of individuals with an identifiable hierarchy, and extensive supporting networks, engaged in significant criminal activity
- prohibits monopolies
- A violation of a criminal statute either by a corporate entity or by its executives, employees, or agents acting on behalf of and for the benefit of the corporation, partnership, or other form of business entity
- prohibits mergers that may result in monopolies
- The process by which illegal gains are disguised as legal income
- Specifically targets activities of organized crime
9 Clues: prohibits monopolies • prohibits mergers that may result in monopolies • Specifically targets activities of organized crime • The process by which illegal gains are disguised as legal income • ideas, inventions, and creative expressions of people and companies • Unlawful activities of a highly organized group engaged in supplying illegal goods/services • ...
Module 2 Review 2025-09-17
Across
- these methods are used to prove that a user is who they say they are
- the process of taking plaintext data and converting it to ciphertext
- these methods are used to allow each account access to only necessary functions for their job
- hardware or software that provides a barrier between connected networks/devices to enforce security policies
Down
- an intrusion _____ system sits in the flow of data and can take active measures to stop an attack while it is happening
- device that determines the best path for forwarding data to its destination
- a computer or system is physically isolated and incapable of connection
- a computer or device that runs centralized applications or manages network resources
- the three pillars of information security
9 Clues: the three pillars of information security • these methods are used to prove that a user is who they say they are • the process of taking plaintext data and converting it to ciphertext • a computer or system is physically isolated and incapable of connection • device that determines the best path for forwarding data to its destination • ...
Δίκτυα Υπολογιστών (Computer Networks) 2020-04-23
Across
- Οι υπολογιστές και οι συσκευές (εκτυπωτές, τερματικά, δρομολογητές και δορυφόροι) που συνδέονται σε ένα δίκτυο,ονομάζονται τερματικές συσκευές ή αλλιώς...
- Παίζει το ρόλο του πομπού ή του δέκτη σε ένα δίκτυο και ονομάζεται υπολογιστής ...
- Τα δίκτυα που καλύπτουν μία μικρή έκταση, συνδέοντας συσκευές που βρίσκονται σε ένα δωμάτιο ή σε ένα κτίριο ή συγκρότημα κτιρίων ονομάζονται...
Down
- Στην τοπολογία αυτή, υπάρχει μια γραμμή (καλώδιο) που αποτελεί́ τη ραχοκοκαλιά του δικτύου και όλες οι συσκευές είναι συνδεδεμένες σε αυτήν.Είναι η τοπολογία...
- Το δίκτυο καλωδιακής τηλεόρασης είναι ένα ... δίκτυο
5 Clues: Το δίκτυο καλωδιακής τηλεόρασης είναι ένα ... δίκτυο • Παίζει το ρόλο του πομπού ή του δέκτη σε ένα δίκτυο και ονομάζεται υπολογιστής ... • Τα δίκτυα που καλύπτουν μία μικρή έκταση, συνδέοντας συσκευές που βρίσκονται σε ένα δωμάτιο ή σε ένα κτίριο ή συγκρότημα κτιρίων ονομάζονται... • ...
Unit 5 Vocabulary Activity 2022-02-17
Across
- refer to how well a country is doing economically and socially on a spectrum from less developed to more developed; levels of...
- the large-scale production of crops for sale; ...agriculture
- in short
- a category used to describe countries that have transitioned or are transitioning in to the industrialization process, having created more economic activities, shown increasing wealth and improving standards of living; ...industrialized
- an economic activity that produces services rather than goods and includes activities such as transportation, entertainment, banking, repair work, retail, etc.; ...industry
- an economic activity that is derived from knowledge-based service areas such as information processing, information technology, research and development, higher levels of education, consultation, etc.
- activities that involve the mass production of finished goods for sale; commercial...
- the value of the goods and production in an economy for a given year; in short
- an economic activity activity in which natural resources are extracted from the earth, such as fishing, farming, mining, etc.
- a category used to describe countries that have higher levels of economic development, greater wealth and higher standard of living; ...developed
- the cultivation of plants and animals to produce items such as food, biofuels, medicines, wool, etc.
- resources that can be replaced or replenished naturally over time, such as wood
- occurs where people raise enough food to feed or support their own family; ...agriculture
- a tool composed of statistics and data, such as life expectancy, education and income indices, used to rank countries' social and economic well-being
Down
- resources that cannot be replaced at a natural rate that matches its consumption; examples include fossil fuels such as petroleum and coal
- an economic activity that processes natural resources into finished products and includes activities such as manufacturing and refining of resources
- a measure of the population aged 145 and older that can read and write; ...rate
- a category used to describe countries that have lower levels of economic development, much poverty and lower standards of living; ...developed
- any job, activity or process that could be performed by employees within a company, but is contracted or subcontracted out to a third party
- the level or degree of access to wealth, necessities, comfort and material goods in a society; standard of...
- the basic parts or systems that support a place or economy, including items such as electrical grid, transportation networks, communication networks, hospitals and schools
- an economic activity that provides services
- activities in which goods are produced in a home or in a small workshop near the home, limited technology; ...industries
- a geographic area in which goods may be traded free of tariffs or quotas (taxes) and may range in scope from an international association to an airport or seaport; free...zone
- unique regions in China that allow limited free market activities; special economic...
- producing goods either by hand or with machines for sale in large numbers
26 Clues: in short • an economic activity that provides services • the large-scale production of crops for sale; ...agriculture • producing goods either by hand or with machines for sale in large numbers • the value of the goods and production in an economy for a given year; in short • a measure of the population aged 145 and older that can read and write; ...rate • ...
computer vocabulary 2014-02-02
Across
- the main computer in an network which provides files and services that are used by the other computer.
- drive Holds info and stores most of yours files. It stores your Computer software.
- computing the practice of storing regularly used computer data on multiple servers that can be accessed though the internet.
- Gives instructions to the hardware and tells it what to do and how to do it.
- a unit of a computers info that is equal to eight bits.
- system Files,folders,and buttons that let you interact with the computer.
- connected to a computer, but not an essential part of it.
- is hierarchical distributed naming system for computers, services, or any resources connected to the internet or a private network.
- An area or window on a computer screen in which small pictures (called icons) are arranged like objects on top of a desk.
- port a port is a standard cable connection interface on personal computers and consumers electronics. it allows stand alone electronic devices to connected via cables to a computer.
- a computer program used for accessing sites or info on a network.
- It is the global address of documents and other resources of the world wide web.
Down
- a file that may be added to your computer when you visit a web site and that contains info about you.
- a setting,option,etc., that a computer uses if you do not choose a different one.
- Are used in the computer to remember stuff. For storing temporary things like a menu.
- The main circuit board of a computer.
- Parts of the computer that you can touch. Sometimes to put into into the computer.
- address the numeric of a computer on the internet.
- sources is a software that can be freely used, changed, and shared.
- Are used in the computer to remember stuff. It holds on to things that the computer needs permanently.
- a part of a computer's memory where info is kept so that the computer can find it very quickly.
- an electronic communication networks that connects computer networks and organizational computer facilities around the world.
- is a program pre-installed on window-based computers uses to start up.
- A system of computers and other devices (such as a printer) that are connected to each other.
- to start up the operating system of the computer or to begin operating a computer.
- Computers brain. It works with the computers memory. It tells all the other parts what to do.
- an internet service provider, also called telephone companies or other telecommunication providers, provides services such as internet access, internet transit,domain name registration and hosting, dial up access, leased line access & colocation
- Code a code or language of 1 and 0. Past around in the computer through many different parts.
28 Clues: The main circuit board of a computer. • address the numeric of a computer on the internet. • a unit of a computers info that is equal to eight bits. • connected to a computer, but not an essential part of it. • a computer program used for accessing sites or info on a network. • sources is a software that can be freely used, changed, and shared. • ...
Vocabulary Lesson 2 Maria 2017-03-03
Across
- is a common measure of data speed for computer modems and transmission carriers
- is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations
- program instructions
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- is an input device that scans documents and images, which can be imported into a computer
- a person who uses computers to gain unauthorized access to data.
- refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, storage devices, and computer network resources.
- a format for compressing image files.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems
- is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network
Down
- a unit of memory or data equal to 1,024 (210) bytes.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- Domain name system the internet's system for converting alphabetic names into numeric IP addresses.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- the process of converting information or data into a code, especially to prevent unauthorized access
- is the intersection between a row and a column on a spreadsheet that starts with cell A1.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- the introductory page of a website, typically serving as a table of contents for the site
- is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible
- is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings
- is a telecommunications network which allows nodes to share resources
- a defined structure for the processing, storage, or display of data.
- is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web
25 Clues: program instructions • a format for compressing image files. • a unit of memory or data equal to 1,024 (210) bytes. • a person who uses computers to gain unauthorized access to data. • a defined structure for the processing, storage, or display of data. • is a telecommunications network which allows nodes to share resources • ...
Artificial Intelligence 2024-10-21
Across
- AI - AI systems designed to perform specific tasks, such as facial recognition or language translation.
- Learning - A technique where a model developed for one task is reused for another related task.
- Process Automation - The use of software robots to automate routine tasks typically performed by humans.
- - Referring to systems or robots that can operate independently without human intervention.
- Computing - A computing model that processes data near the source rather than relying on a centralized data center.
- Ethics - The study of moral implications and responsibilities associated with the development and use of AI.
- Analytics - Techniques that use statistical algorithms to predict future outcomes based on historical data.
- Learning - A learning paradigm where agents learn to make decisions by receiving rewards or penalties.
- Learning - A type of machine learning that uses multiple layers of neural networks to analyze complex data.
- - A software application that simulates conversation with users, often using natural language processing.
- - The branch of technology dealing with the design and application of robots for various tasks.
- Language Processing - A field of AI focused on the interaction between computers and human language.
- Set - A dataset used to evaluate the performance of a machine learning model during training.
- Learning - A type of machine learning that identifies patterns in data without predefined labels.
- Network - A computational model inspired by the human brain, used to recognize patterns and make decisions.
- AI - A hypothetical form of AI that can understand, learn, and apply intelligence across a wide range of tasks.
- Extraction - The process of selecting and transforming raw data into a format suitable for machine learning.
Down
- Vision - An area of AI that enables machines to interpret and understand visual information from the world.
- - The process of using a trained model to make predictions or decisions based on new data.
- Adversarial Network - A class of machine learning frameworks where two neural networks compete to improve their output.
- Learning - A type of machine learning where the model is trained on labeled data.
- Learning - A subset of AI that enables systems to learn and improve from experience without being explicitly programmed.
- Web - An extension of the World Wide Web that enables data to be shared and reused across applications.
- - A modeling error that occurs when a machine learning model learns noise in the training data instead of the actual pattern.
- Analysis - The use of natural language processing to determine the emotional tone behind a series of words.
- Set - A collection of data used to train a machine learning model.
- AI - AI systems designed to provide human-understandable explanations for their decisions and actions.
- - A step-by-step procedure or formula for solving a problem or performing a task.
- Mining - The process of discovering patterns and knowledge from large amounts of data.
- - Basic units in a neural network that process input data and pass on signals to other neurons.
30 Clues: Set - A collection of data used to train a machine learning model. • Learning - A type of machine learning where the model is trained on labeled data. • - A step-by-step procedure or formula for solving a problem or performing a task. • Mining - The process of discovering patterns and knowledge from large amounts of data. • ...
VOCABULARY 2.01 2018-05-22
Across
- Programs that instruct computers to perform specific operations
- Working from home or a remote location
- Computerized storage for information and facts
- Computer software designed to mimic the knowledge of a human expert
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- The practical application of science to society and industry
- Technology that allows users to communicate over the Internet rather than through traditional public networks
Down
- A navigational system that uses satellite technology to determine location and provide directions
- The use of computer technology to plan, design, test, and alter products
- A mobile phone with advanced capabilities, such as accessing the Internet
- A number you choose to gain access to an account
- Technology that allows users to make telephone calls over the Internet
- A system of computers connected together by telephone wires, cable wires, or other means
- An object placed into orbit by humans; most are used for communications purposes
15 Clues: Working from home or a remote location • Computerized storage for information and facts • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
Software Piracy and Copyright Crossword 2012-12-07
Across
- Software piracy can cause original product not to be put on ___ at all.
- Software piracy is a form of ______.
- Uploading a copyrighted file illegally to places like YouTube or ______ sharing networks is illegal, and could result in heavy fines. (3 words)
- There are laws on downloading and uploading under the Copyright ___ of Canada.
- Protects an original work from unauthorized copying.
- In order to copyright anything, it must be an ___ work, not a copy already.
- The work being copyrighted must be a ___thing, for example a book, recording, software, etc.
Down
- To copyright something in Canada the creator must be a ___ of Canada or another country that’s part of an international agreement with Canada.
- The global software piracy rate is ___% (number)
- Software piracy rates are growing quickly in ___ nations.
- People buy pirated works because they are _____ than the legal copies.
- The number of illegal copies of DVDs bought is ___ than the number of legal copies.
- Software piracy is the _______ copying or sharing of copyrighted software.
- The number of international copyright agreements that have been signed by Canada.
- Consequences for copyright infringement can be either civil or ___.
15 Clues: Software piracy is a form of ______. • The global software piracy rate is ___% (number) • Protects an original work from unauthorized copying. • Software piracy rates are growing quickly in ___ nations. • Consequences for copyright infringement can be either civil or ___. • People buy pirated works because they are _____ than the legal copies. • ...
TECHNOLOGY CROSSWORD PUZZLE 2021-02-16
Across
- the ability to link to and communicate with other computer systems, electronic devices, software, or the internet
- services that entities provide to users of technology products or services
- a device, such as a wireless router, that allows wireless devices to connect to a network
- a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules
- a global wide area network that connects computer systems across the world
- a device in a computer network that connects other devices together
Down
- moves data fast and safe
- networking device that forwards data packets between computer networks
- a term synonymous with gateway
- a set of instructions, data or programs used to operate computers and execute specific tasks
- set of commands, instructions, and other syntax use to create a software program
- period when a system is not available
- storing and accessing data and programs over the internet instead of your computer's hard drive
- technology that allows us to communicate without using cables or wires
- information processed or stored by a computer
15 Clues: moves data fast and safe • a term synonymous with gateway • period when a system is not available • information processed or stored by a computer • a device in a computer network that connects other devices together • networking device that forwards data packets between computer networks • technology that allows us to communicate without using cables or wires • ...
Unit 1 Second half 2021-01-27
Across
- which microprocessor have internal read and writable memory.
- _________ API allows us to control electronic components
- All of the following accurately describe Hadoop, EXCEPT ____________
- __________ can best be described as a programming model used to develop Hadoop-based
- which systems are suitable for solutions based on wireless sensor networks, in which the data involved is big and the analysis requirements are computationally intensive.
- HOW MANY COMMUNICATION PROTOCOL IN IOT?
- Which systems are suitable for solutions where multiple nodes are required, the data involved is big and the analysis requirements are computationally intensive.
- computing addresses a real paradigm in the way in which the system is deployed.
- with big data technologies like Hadoop?
Down
- and represents them as _______resources to users.
- Embedded system software can be as simple as lighting controls running using an _________ microcontroller.
- that can process massive amounts of data.
- Cloud computing is a kind of abstraction which is based on the notion of combining physical
- According to analysts, for what can traditional IT systems provide a foundation when they’re
- An_________device generally runs as a single application.
15 Clues: HOW MANY COMMUNICATION PROTOCOL IN IOT? • with big data technologies like Hadoop? • that can process massive amounts of data. • and represents them as _______resources to users. • _________ API allows us to control electronic components • An_________device generally runs as a single application. • which microprocessor have internal read and writable memory. • ...
The Nervous System 2022-11-19
Across
- nervous system cranial nerves, spinal nerves, plexuses, and peripheral nerves throughout the body
- the outermost membrane of the meninges
- the uppermost portion of the brainstem
- part of the brain that plays a major role in maintaining levels of awareness and consciousness
- contains neurons that control body temperature, sleep, appetite, sexual desire, and emotions
- connects the spinal cord with the rest of the brain
- nervous system brain and spinal cord
- the branching fibers of the neuron
Down
- cell that forms the myelin sheath in the CNS
- the third layer of the meninges, closest to the brain and spinal cord
- cell that is star-like in appearance and transports water and salts between capillaries and neurons
- a large network of nerves in the PNS; networks of intersecting blood vessels (vascular) and lymphatic vessels
- (motor) nerves travel from the spinal cord and brain to muscles of the body, telling them how to respond
- (sensory) nerves that carry messages related to changes in the environment toward the spinal cord and brain
- "bridge;" contains nerve fiber tracts that connect the cerebellum and cerebrum with the rest of the brain
15 Clues: the branching fibers of the neuron • nervous system brain and spinal cord • the outermost membrane of the meninges • the uppermost portion of the brainstem • cell that forms the myelin sheath in the CNS • connects the spinal cord with the rest of the brain • the third layer of the meninges, closest to the brain and spinal cord • ...
American Revolution Crossword 2023-09-28
Across
- German soldiers hired by the British to fight during the American Revolution.
- Groups of merchants, shopkeepers, and craftsmen who successfully opposed the Stamp Act by establishing networks to boycott British goods.
- An act that was passed in 1764 on an ingredient used to produce rum.
- The document declaring U.S. independence from Great Britain.
- When the colonists dumped 342 crates into the ocean.
- Military force made up of local citizens to help protect their town, land, or nation.
- An act passed in 1765 taxing all printed goods/materials.
Down
- Someone who took a midnight ride to warn the militias that the British are coming.
- The author of "Common Sense".
- An objection or reason to complain.
- An act where British soldiers can stay in colonist's houses.
- An act passed in 1767 taxing tea, glass, paper, lead & paint.
- A lawyer who served as counsel for the defense in trial of 8 British soldiers accused of murder during a riot in Boston.
- An American colonist who supported the right of the American colonies to govern themselves.
- An event that took place in 1770 when 5 Bostonians died.
15 Clues: The author of "Common Sense". • An objection or reason to complain. • When the colonists dumped 342 crates into the ocean. • An event that took place in 1770 when 5 Bostonians died. • An act passed in 1765 taxing all printed goods/materials. • An act where British soldiers can stay in colonist's houses. • The document declaring U.S. independence from Great Britain. • ...
Broden Kasic & Mason Deml 2024-01-09
Across
- A chunk of data sent over a network. Larger messages are divided into sections of data.
- a computer network consisting of interconnected networks that use, open communication instructions.
- a command that executes the code within a certain function
- bias data that does not accurately reflect the full population or phenomenon being studied
- Collection of statements, runs and executes one at a time.
- Address The unique number assigned to each device on the Internet.
Down
- 8 bits placed next to one another
- Data that are sent to a computer for processing by a program
- the use of the words NOT, AND, and OR, which evaluate to a Boolean value.
- Program documentation, can be written in the code without affecting end result.
- data about data
- the practice of obtaining input or information from a large number of people via the Internet.
- An option of representing information using ten different symbols.
- A way of representing information using only two different symbols.
- a combination of operators and values that evaluates to a single value
15 Clues: data about data • 8 bits placed next to one another • a command that executes the code within a certain function • Collection of statements, runs and executes one at a time. • Data that are sent to a computer for processing by a program • An option of representing information using ten different symbols. • ...
Crossword Puzzle 2019-09-10
Across
- The state of practice of refraining from extramarital, or especially from all, sexual intercourse.
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time.
- Of or characteristic of the middle class, typically with reference to it's perceived.
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- Showing willingness to allow the existence of opinions or behavior.
Down
- Fail to resist pressure, temptation, or some other negative force.
- The action subjecting a country or person to one's control, or the fact of being subjected.
- Intense and eager enjoyment, interest, or approval.
- A secret plan by a group to do something unlawful or harmful.
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- Special words or expressions that are used by a particular profession or group.
- A political and economic theory of social organization.
- Softened or matured by age or experience.
- Discover or identify the presence or existence of.
- Offering Nothing that is stimulating or challenging.
15 Clues: Softened or matured by age or experience. • Discover or identify the presence or existence of. • Intense and eager enjoyment, interest, or approval. • Offering Nothing that is stimulating or challenging. • A political and economic theory of social organization. • A secret plan by a group to do something unlawful or harmful. • ...
Andy-Virus 2019-11-05
Across
- As software that is used to damage, and then steal any data
- A person who uses coding to steal unauthorized data and information.
- A computer worm that is sent to email that says I love you and if opened it would infect your computer.
- short of internet information services.
- Programs and other operating information used by a computer.
- Someone who tries to take you information by disguising themselves as a trustworthy person.
- Short for Distributed Denial of services.
Down
- network security system.
- messages distributed electronic from one computer user to another via a network.
- IS a malicious self replicating program that can spread through networks.
- a type of malicious software or malware designed to deny access until ransom is paid.
- Is a fast spreading macro virus that is sent by email and also infects computer when opened.
- Is a malware that is disguised as one thing and misleads users.
- A virus that damages machinare by damaging the software of the machine.
- A code that to corrupt systems, and destroy data.
15 Clues: network security system. • short of internet information services. • Short for Distributed Denial of services. • A code that to corrupt systems, and destroy data. • As software that is used to damage, and then steal any data • Programs and other operating information used by a computer. • Is a malware that is disguised as one thing and misleads users. • ...
Cs Principles Exam 2024-04-25
Across
- Material created on a computer is the _______ _______ of the creator or an organization.
- Wikipedia is an example of _____
- Add from the end of the array
- The data of a data is called ___
- The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items
- Amount of time to complete the task sequentially divided by the Amount of time to complete the task when run in parallel.
- The idea that some communities or populations have less access to computing than others (2 words)
- A wireless access point that gives unauthorized access to secure networks
Down
- composed of 8 bits
- a problem with a yes/no answer
- _____ _____ issue digital certificates that validate the ownership of encryption keys
- A lightweight data transport protocol with minimal error checking
- Google Maps Route Recommendations are an example of a to a problem
- A mistake in typed code that violates the rules of the programming language
- compression does not lose any data such as Huffman text compression
15 Clues: composed of 8 bits • Add from the end of the array • a problem with a yes/no answer • Wikipedia is an example of _____ • The data of a data is called ___ • A lightweight data transport protocol with minimal error checking • Google Maps Route Recommendations are an example of a to a problem • compression does not lose any data such as Huffman text compression • ...
Future of Technology 2024-05-03
Across
- (Information Technology): The use of computers, software, networks, and other electronic devices to store, retrieve, transmit, and manipulate data.
- Individuals responsible for overseeing and directing the work of others in an organization.
- The state of being free from unauthorized intrusion or observation.
- Factors or aspects that are unfavorable or harmful.
- Paid positions of regular employment.
- media: Online platforms and websites that enable users to create, share, and interact with content and connect with others.
- Abilities or proficiencies developed through training, practice, or experience.
- Structured periods of instruction or learning, often led by a teacher or instructor.
Down
- Tools, machines, systems, or methods used to solve problems or achieve specific objectives.
- Legal protection granted to the creator of original works, giving them exclusive rights to reproduce, distribute, and display the work.
- The process of acquiring knowledge, skills, values, beliefs, and habits.
- The practice of using someone else's work or ideas without proper acknowledgment.
- The costs incurred in the course of doing business or carrying out activities.
- The state of being intricate, involved, or difficult to understand.
- An excessive or overwhelming amount of work or information.
15 Clues: Paid positions of regular employment. • Factors or aspects that are unfavorable or harmful. • An excessive or overwhelming amount of work or information. • The state of being free from unauthorized intrusion or observation. • The state of being intricate, involved, or difficult to understand. • ...
Business Essential-Technology Key Terms 2024-03-11
Across
- (CAD): The use of computer technology to plan, design, test, and alter products
- Programs that instruct computers to perform specific operations
- The practical application of science to society and industry
- An object placed into orbit by humans; most are used for communications purposes
- (VoIP)Technology that allows users to make telephone calls over the Internet
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- Computerized storage for information and facts
- A system of computers connected together by telephone wires, cable wires, or other means
- Technology that allows users to communicate over the Internet rather than through traditional public networks
- Working from home or a remote location
Down
- (PIN): A number you choose to gain access to an account
- (GPS): A navigational system that uses satellite technology to determine location and provide directions
- A mobile phone with advanced capabilities, such as accessing the Internet
- (CAM): The use of computer software to control machines, tools, and processes involved in manufacturing products
- Computer software designed to mimic the knowledge of a human expert
15 Clues: Working from home or a remote location • Computerized storage for information and facts • (PIN): A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
Telecommunications 2023-06-20
Across
- A device that connects two or more networks and transmit data
- A device that receives wireless signals through an antenna
- An object launched into space for communication that is far away from the ground
- A portable computing device with a screen for consuming various contents
- A device that receives audio and video signals and displays them on a TV monitor
- A multi-purpose mobile electronic device that can be used for making phone calls, texting, and internet access
- A global computer network that connects multiple computers to share information
- Communication device that allows you to talk to someone
Down
- A wireless technology that allows for the exchange of data between devices in close proximity
- A remote communication technology that does not require wiring through the use of electrical signals
- Technology with a wide bandwidth that allows for fast data transfer
- A device that converts digital signals to analog signals for communication
- A device for storing, processing, and displaying data
- A device used for receiving wireless signals or transmitting radio waves
- Wiring made of copper or optical fiber, used for electrical communication
15 Clues: A device for storing, processing, and displaying data • Communication device that allows you to talk to someone • A device that receives wireless signals through an antenna • A device that connects two or more networks and transmit data • Technology with a wide bandwidth that allows for fast data transfer • ...
Telecommunications 2023-06-20
Across
- A multi-purpose mobile electronic device that can be used for making phone calls, texting, and internet access
- A remote communication technology that does not require wiring through the use of electrical signals
- A wireless technology that allows for the exchange of data between devices in close proximity
- A device used for receiving wireless signals or transmitting radio waves
- A device that connects two or more networks and transmit data
- A device that receives audio and video signals and displays them on a TV monitor
- Communication device that allows you to talk to someone
Down
- A portable computing device with a screen for consuming various contents
- Wiring made of copper or optical fiber, used for electrical communication
- A device for storing, processing, and displaying data
- A device that converts digital signals to analog signals for communication
- Technology with a wide bandwidth that allows for fast data transfer
- A global computer network that connects multiple computers to share information
- An object launched into space for communication that is far away from the ground
- A device that receives wireless signals through an antenna
15 Clues: A device for storing, processing, and displaying data • Communication device that allows you to talk to someone • A device that receives wireless signals through an antenna • A device that connects two or more networks and transmit data • Technology with a wide bandwidth that allows for fast data transfer • ...
Media Key Terms 2023-04-20
Across
- main means of communication, such as broadcasting, publishing, the internet, all collectively
- The study of how rhetorical devices can be used to convince people of the value of any given position
- reform-minded journalists sought to expose corruption in big business and government
- mandated that broadcast networks devote time to contrasting views on issues of public importance
- journalism that present little to no legitimate, well-researched news
- the portion of a filtering system that separates unwanted particles from the substance being filtered.
- focuses on events or incidents that are considered to be timely and consequential
Down
- often creates false narratives or ‘fake news’ around characteristics of difference such as class, race,etc.
- A news agency that provides syndicated news to newspaper, radio, and television stations
- centers on the lives of individuals and has little urgency
- A political system that resembles coverage of...
- statement bias
- when news content suggests to the news audience that they ought to use specific issues as benchmarks
- laws statutes that provide journalists either a qualified privilege to refuse to disclose sources used
- cheap, tabloid style newspapers
15 Clues: statement bias • cheap, tabloid style newspapers • A political system that resembles coverage of... • centers on the lives of individuals and has little urgency • journalism that present little to no legitimate, well-researched news • focuses on events or incidents that are considered to be timely and consequential • ...
Cultural 2022-12-06
Across
- ________ networks are interconnected communication systems that allow users to exchange information.
- Cultural ______ is a modification of a society.
- Cultural ________ is the spread or advance of one culture that replaces and destroys the previous culture.
- Media is spread around ______.
- Cultures are constantly changing and ________.
- This is the idea that cultural change occurs from within the culture itself.
Down
- This is when the news or Internet content providers translate there content to fit the local differences of a culture.
- This is a term that describes a total way of life held by a group of people.
- This is the process of adopting some aspect of another culture.
- This is the extension of reality through global electronic means of communication.
- This is the idea that two different cultures can be combined.
- In South Dakota, what group of people would be an example of cultural interia?
- The ______-space compression is the increasingly rapid movement of information.
- Personal ______ have become more affordable and more useful.
- This is how various aspects of cultures spread out from their origin.
15 Clues: Media is spread around ______. • Cultures are constantly changing and ________. • Cultural ______ is a modification of a society. • Personal ______ have become more affordable and more useful. • This is the idea that two different cultures can be combined. • This is the process of adopting some aspect of another culture. • ...
VPNs 2025-03-21
Across
- Type of VPN that uses a protocol suite to create a secure, encrypted connection.
- Type of VPN that can be used to provide a secure connection between an employee's device working from home and the company's HQ
- Type of VPN that can be used to create a secure connection between two different locations of the same organization
- Providing a secure communication channel by encapsulating one protocol inside of another
- Mode used to provide secure communication between two hosts.
- What VPN stands for.
- Mode used to provide secure communication between networks
- Suite of protocols that provide security for VPNs called.
Down
- Protocol that provides authentication and integrity, but NOT confidentiality
- In cybersecurity, this tool is used to provided confidentiality
- Protocol used to negotiate connections and manage security associations through the use of cryptographic keys
- Type of VPN that uses TLS or its predecessor to provide an secure connection
- Tunneling protocol that references the Data Link layer of the OSI model
- a Tool that can be used for authentication of remote users, and also provide accounting and authorization.
- Protocol that provides authentication, encryption, and integrity?
15 Clues: What VPN stands for. • Suite of protocols that provide security for VPNs called. • Mode used to provide secure communication between networks • Mode used to provide secure communication between two hosts. • In cybersecurity, this tool is used to provided confidentiality • Protocol that provides authentication, encryption, and integrity? • ...
CompSci 10 2025-04-09
Across
- digital circuits that performs basic logical operations on binary inputs
- an identity and access management security method that requires two forms of identification
- international character encoding standard
- a microchip on the motherboard that manages high-speed communication between the CPU, RAM
- a chipset component on a motherboard that handles input/output
- a device that uses lasers to read and/or write data
- Basic Input/Output System
Down
- a small, fast storage location within the CPU
- a crucial part of the CPU that performs arithmetic and logical operations on data.
- any software designed to harm computer systems, networks, or data
- a type of storage device that uses integrated circuits (flash memory) to store data persistently
- software programs designed to assist in managing, maintaining, and optimizing the functionality of a computer system
- a temporary storage area
- system system software that manages computer hardware and software resources, and provides common services for computer programs
- a shared pathway, or set of wires, that allows different computer components and devices to communicate and transfer data
15 Clues: a temporary storage area • Basic Input/Output System • international character encoding standard • a small, fast storage location within the CPU • a device that uses lasers to read and/or write data • a chipset component on a motherboard that handles input/output • any software designed to harm computer systems, networks, or data • ...
Basic Puzzle 2025-04-09
Across
- any software designed to harm, exploit, or compromise devices, networks, or data.
- cybercrime where attackers, posing as legitimate entities, use deceptive methods, often through email or text
- State Hard Drive
- a data storage device that uses integrated circuits to store data
- Basic Input/Output System
- a semiconductor device used to amplify or switch electrical signals and power
- Engineering the term used for a broad range of malicious activities accomplished through human interactions
- a hardware or software component that stores frequently accessed data
- refers to the frequency at which a processor's clock generator pulses
Down
- cycle fundamental process by which a CPU processes instructions, consisting of fetching the instruction from memory,
- character encoding standard for electronic communication
- a fundamental component of a computer's central processing unit
- type of malware that encrypts the victim's personal data until a ransom is paid
- a standard encoding system that assigns a unique numeric value to every character, regardless of the platform, program, or language
- gate a fundamental electronic circuit that performs a basic logical operation on one or more binary inputs
15 Clues: State Hard Drive • Basic Input/Output System • character encoding standard for electronic communication • a fundamental component of a computer's central processing unit • a data storage device that uses integrated circuits to store data • a hardware or software component that stores frequently accessed data • ...
Crossword Puzzle 2023-01-20
Across
- standard markup language for creating Web pages
- software development lifecycle (SDLC) model used for risk management that combines the iterative development process model with elements of the Waterfall model.
- the ability of a machine to display human-like capabilities such as reasoning, learning, planning and creativity
- set of instructions for solving a problem or accomplishing a task.
- a type of automated machine that can execute specific tasks with little or no human intervention
- special program that translates a programming language's source code into machine code
- an organized collection of structured information, or data
- A collection of web pages and media over the internet
Down
- the ability of an object to take on many forms
- the gaining of unauthorized access to data in a system
- small Java applications which can be accessed on an Internet server
- Linux-based mobile operating system that primarily runs on smartphones and tablets
- network of networks
- collection of items of same data type stored at contiguous memory locations.
- the main circuit board of a computer that holds together many of the important components of a computer
15 Clues: network of networks • the ability of an object to take on many forms • standard markup language for creating Web pages • A collection of web pages and media over the internet • the gaining of unauthorized access to data in a system • an organized collection of structured information, or data • set of instructions for solving a problem or accomplishing a task. • ...
Cybersecurity Crossword 2023-01-17
Across
- Software that monitors user activities and reports them to a third party
- A test that outlines the steps to restoring data after a severe setback
- A successful hack to gain control of a network and leak its data
- A scan hackers use to detect areas of weakness via sending messages to identify activity
- a type of computer network device that interconnects with other networks using the same protocol
- An intermediary server between a user and the internet that protects the enterprise from outside intrusion
- The practice of adhering to standards and regulatory requirements
Down
- An AI-manipulated video in someone’s likeness to spread misleading information
- Malicious software often in the form of spam emails
- A misleading computer program with a name deriving from Greek history
- A scam perpetrated by a hacker posing as a legitimate
- A small update to fix bugs in existing programs
- A special code to protect your digital information
- An internal computer network closed to outsiders
- A network that disguises users’ IP addresses with its own to deter hackers
15 Clues: A small update to fix bugs in existing programs • An internal computer network closed to outsiders • A special code to protect your digital information • Malicious software often in the form of spam emails • A scam perpetrated by a hacker posing as a legitimate • A successful hack to gain control of a network and leak its data • ...
Wireless Technologies Part 1 2025-10-06
Across
- This wireless technology enables devices to communicate over short distances, often used for headsets and smartwatches.
- A wireless network that allows devices to connect within a local area, such as in a home or office.
- A wireless network that covers a large geographic area using cellular towers.
- Measurement that defines the range of wireless transmission
- Organization that develops 802.11 wireless standards
- A disadvantage of WLAN where signals can be affected by walls or other obstacles.
- Amount of data transmitted over a network in a given time
Down
- Common device that broadcasts wireless signal in a network.
- The type of broadband that uses mobile carrier networks like 4G or 5G.
- One of the main advantages of WLAN compared to wired LAN.
- This technology provides Internet access from orbiting communication devices.
- A type of network that connects devices within a short range, typically using Bluetooth.
- Unique network name used to identify a WLAN
- Process of converting data into secure code in WLAN
- This wireless technology provides broadband access over long distances using microwave signals.
15 Clues: Unique network name used to identify a WLAN • Process of converting data into secure code in WLAN • Organization that develops 802.11 wireless standards • One of the main advantages of WLAN compared to wired LAN. • Amount of data transmitted over a network in a given time • Common device that broadcasts wireless signal in a network. • ...
The internet 2023-03-15
Across
- a server on a network where central files and other data are stored. They can be accessed by a user logged onto the network.
- network covering a very large geographical area.
- wireless connectivity that uses radio waves in the 2.45GHz frequency band.
- device used to boost a signal on both wired and wireless networks.
- (also known as domain name system) is a system for finding IP addresses for a domain name given in a URL. (3 words)
- network covering a small area such as a single building.
- device that connects LANs which use different protocols.
- type of cable in which two wires of a single circuit are twisted together. Several twisted pairs make up a single cable.
- remember a user’s log in details (so that they can authenticate the user’s browser). They are stored on the hard drive of a user’s computer until the expiry date is reached or the user deletes it. (2 words)
- are software that allow users to access and display web pages on their device screens. (2 words)
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to all devices on the network (LAN).
- method of data storage where data is stored on off-site servers.
- are used, for example, when making online purchases. They keep a user’s items in a virtual shopping basket.(2 words)
- network made up of a combination of other network topologies.
Down
- hardware used to connect together a number of devices to form a LAN that directs incoming data packets to a specific destination address only.
- network which is larger than a LAN but smaller than a WAN, which can cover several buildings in a single city, such as a university campus.
- wireless LAN.
- modulator demodulator. A device that converts digital data to analogue data (to be sent down a telephone wire); conversely it also converts analogue data to digital data (which a computer can process).
- wireless connectivity that uses radio waves, microwaves. Implements IEEE 802.11 protocols.
- – network that uses separate dedicated servers and specific client workstations. All client computers are connected to the dedicated servers.
- situation in which the same data is stored on several servers in case of maintenance or repair.(2 words)
- device which enables data packets to be routed between different networks (for example, can join LANs to form a WAN).
- These cards allow devices to connect to a network/internet (usually associated with a MAC address set at the factory.
- network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
- are small files or code stored on a user’s computer. They are sent by a web server to a browser on a user’s computer.
25 Clues: wireless LAN. • network covering a very large geographical area. • network covering a small area such as a single building. • device that connects LANs which use different protocols. • network made up of a combination of other network topologies. • method of data storage where data is stored on off-site servers. • ...
choice board column b 2022-12-12
Across
- (Internet of Things)things”—that are embedded with sensors, software, and other technologies for the ...
- video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
- theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling ...
- or digital citizenship Digital citizenship refers to the ability to think critically, behave safely, and participate responsibly in our digital world.
- websites and applications that enable users to create and share content or to participate in social networking.
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- Use the right to use a copyrighted work under certain conditions without permission of the copyright owner. Firewall a fire-resistant barrier used to prevent the spread of fire. Firewalls are built between or through buildings, structures, or electrical ...
- footprint refers to the trail of data you leave when using the internet.
- Trafficking Traffickers increasingly use internet technologies to advertise the services resulting from their victims' ex- ploitation
- is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their ...
Down
- Hat Hacker: is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
- the correct or acceptable way of communicating on the internet
- an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public.
- the pratice of deploying people
- Intelligence is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence .
- the practice of attacking and robbing ships at sea.
- wide web s an information system enabling documents and other web resources to be accessed over the Internet.
- technologies that are currently developing, or that are expected to be available within the next five to ten years,
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
- . The application of science to the identification, collection, examination, and analysis, of data
25 Clues: the pratice of deploying people • the practice of attacking and robbing ships at sea. • the correct or acceptable way of communicating on the internet • footprint refers to the trail of data you leave when using the internet. • . The application of science to the identification, collection, examination, and analysis, of data • ...
CS101 Exam 2 Vocab Review 2022-11-28
Across
- A user who has more privileges than others
- The ability of a robot or machine to act without human control or intervention
- The three v's of big data are __, velocity, and variety
- The three d's of robotics are dull, ___, and dangerous
- An unreliable transmission protocol
- A type of supervised learning with discrete labels
- A herd of computers controlled to perform a task without the user's permission
- The devices that allow a robot to manipulate its surroundings
- An individual computer on a network
- Governs what an authenticated user is allowed to do
- The type of encryption key that is known only to the user and is never shared
- The decision-making component of a robot
- The rate at which information can be sent and received across a network connection
- The practice of hiding the existence of a message
- The internet protocol layer whose goal it is to deliver packages from source port to destination port
- A type of device that can translate signals between different types of networks
- The name of a confirmation signal used in the ARQ algorithm
- A type of machine learning that uses neural networks
- The portion of data used to train a machine learning model before validating
- When the real world is entirely replaced with a digital environment, its ____ reality
- A term formed from the phrase malicious software
- The subsystem that allows a robot to move and interact with objects in the environment
- Training a model to correspond too closely or exactly to a particular set of data
Down
- A type of machine learning based on rewards and punishments
- A single element in a neural network. It has inputs, weights, an activation function, and an output
- The factor that determines whether a machine learning model should use the information it already has
- Applying a mathematical one-way function to create a "signature" of the input
- Level 3 autonomy, decisions and movements are approved by a supervisor
- The speed at which information changes in big data
- A device that amplifies and forwards a signal
- The type of node needed as the center of a star topography
- The subsystem that allows a robot to sense and understand itself and its environment
- Data science at the intersection between computer science, domain expertise and ___
- Malware that pretends to only do a legitimate task while also breaching security
- Occurs when two messages are sent at the same time on a shared communication line
- A device smarter than a repeater that has knowledge about the nodes on each bus or LAN
- The values that describe the data in ML
- The process of verifying that you really are the person who has the right to access a given computer
- Used to store data for transactional purposes
- A reliable transmission protocol
40 Clues: A reliable transmission protocol • An unreliable transmission protocol • An individual computer on a network • The values that describe the data in ML • The decision-making component of a robot • A user who has more privileges than others • A device that amplifies and forwards a signal • Used to store data for transactional purposes • ...
Chapter 12 key terms 2025-02-18
Across
- the way things are shaped and used to provide comfort.
- -a surgical procedure in which a surgeon uses preoperative and intraoperative images to guide or direct the surgery
- -Documents created by word processing
- mail -Communication: use of a network or the Internet to communicate
- device should be used. The computer is plugged into the UPS, which has a surge protector and a battery backup
- information exchange-allows all health care agencies to readily transfer patient electronic health records
- -an online teaching and learning environment that uses computers and the Internet to allow teachers to present information and activities
- -is educational computer programming designed for individualized use. It is user paced, user friendly, and proceeds intai an orderly, organized fashion from topic to topic
- -or personal digital assistant
- stress test -used for patients who cannot exercise; a medication that simulates the effect of exercise is given to increase the blood flow and heart rate; physician can determine how heart responds to stress
- -for electronic data with unlimited storage space.
- -medical care via electronic communication.
- - a type of imaging.
- a mechanical device that is computer controlled
- aided design -systems that use artificial intelligence to aid in a action
- -secure online websites
- -used to transfer the records trand the compatibility of the software systems used by different health care agencies to interpret the data
- -contains patient records are access limited or password protected to maintain patient confidentiality.security of the information. Most databases that contain patient records are access limited or password
- -individuals who use the Internet or networks to obtain unauthorized access to computers.
- system that produces visual pictures on a computer monitor and a printout of the electrical activity of a patient's heart;
- -uses technology to direct ultrahigh-frequency sound waves through the chest wall and into the heart; a computer then converts the reflection of the waves into an image of the heart
Down
- -a basic understanding of how a computer works
- -a computerized
- health record -a computerized version of a patient's medical information that may include statistical data (name, address, telephone number, insurance information, etc.)
- -used for patients who cannot exercise
- -protective programs that limit the ability of other computers to access a computer
- -the online access of a computer.
- -a small amount of a radioactive substance such as thallium is given intravenously
- -a power that is strong enough to destroy the carious lesion but preserve the healthy tooth tissue.
- -noninvasive, computerized X-ray
- -electronic mail, telemedicine
- -high-frequency sound waves that bounce back as an echo when they hit different tissues.
- -compiled data
- imaging -a type of imaging
- -Different types of computers are used in health care, and they vary in size
- -another name for database
- stress test -usually involves walking "a treadmill or riding an exercise bike until a target heart rate is reached
37 Clues: -compiled data • -a computerized • - a type of imaging. • -secure online websites • -another name for database • -or personal digital assistant • -electronic mail, telemedicine • -noninvasive, computerized X-ray • imaging -a type of imaging • -the online access of a computer. • -Documents created by word processing • -used for patients who cannot exercise • ...
IT246 - Ch2 Network Hardware Essentials 2025-02-24
Across
- A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.
- A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes called a multiport repeater.
- A communication mode in which a device can send or receive data but can’t do both simultaneously. Hubs operate only in half-duplex mode; switches can operate in both half-duplex and full-duplex modes.
- Service set identifier. The name assigned to a wireless network that is configured on the wireless access point.
- ________ gateway. The address configured in a computer’s IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.
- Access point. A wireless device that serves as the central connection point of a wireless LAN and mediates communication between wireless computers.
- A network device used to interconnect multiple computers; it reads the destination MAC address of an incoming frame to determine on which switch port the destination device is located.
- ________ frame. A network message addressed to only one computer on the LAN.
- Bandwidth ________. A network design in which interconnecting devices allow only one connected device to transmit data at a time, thus requiring devices to share available bandwidth.
- A designated port on a hub or switch used to connect to another hub or switch without using a crossover cable.
Down
- A device that enables LANs to communicate with one another by forwarding packets from one LAN to another. Routers also forward packets from one router to another when LANs are separated by multiple routers.
- Broadcast ________. A network message intended to be processed by all devices on a LAN; it has the destination address FF:FF:FF:FF:FF:FF.
- Network ________.The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second.
- A communication mode in which a device can simultaneously transmit and receive data on the same cable connection. Switches can operate in full-duplex mode, but hubs can’t.
- _________ bandwidth. A property of switches in which each port’s bandwidth is dedicated to the devices connected to the port.
- Making a connection between devices such as two switches, usually for the purpose of expanding a network.
- Request to send. A signal used in wireless networks indicating that a computer has data ready to send on the network.
- Broadcast ________. The scope of devices to which broadcast frames are forwarded. Router interfaces delimit broadcast domains because they don’t forward broadcasts, whereas switches and hubs do.
- Clear to send. A signal an AP generates in response to a request-to-send signal. A CTS signal indicates that the computer that sent an RTS can transmit data.
- Network Interface Card. A device that creates and mediates the connection between a computer and the network medium.
20 Clues: ________ frame. A network message addressed to only one computer on the LAN. • Making a connection between devices such as two switches, usually for the purpose of expanding a network. • A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network. • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
TECH_TUES 2024-11-26
4 Clues: – A network device that connects multiple computers in a LAN. • – An algorithm used to scramble data for secure communication. • – The study of protecting systems and networks from digital attacks. • – The process of making predictions or decisions without human intervention.
Training Crossword 2012-07-04
Across
- We provide services to 1.3 ____ people
- Our logo is a symbol that represents a ____ (3 words)
- Provides water and wastewater services to 5 local government areas (3 words)
- Type of Pumping Stations we operate (2 words)
- Word that reflects the fact we provide town water and wastewater services in each region
- QUU has been set up as a result of ____ changes (2 words)
- Services the Moreton Bay, Sunshine Coast areas
- It is our challenge to give our customers ____ that our precious resource (water) is in good hands
- We manage and maintain $4.4 ____ of infrastructure assets, water supply mains and sewer networks
- Along with QUU and Unitywater, is one of the Local Government owned statutory authorities (2 words)
Down
- We buy water from this State-Government owned body (3 words)
- A specialised service we provide to a number of businesses (2 words)
- The SEQ Water Grid Manager purchases bulk water from them
- As part of our services we ____ sewage (3 words)
- We prepare and issue accounts for household and commercial water and sewerage services and ____ (3 words)
- We deliver this type of customer service to people and businesses
- Acronym for our Shareholding Councils
17 Clues: Acronym for our Shareholding Councils • We provide services to 1.3 ____ people • Type of Pumping Stations we operate (2 words) • Services the Moreton Bay, Sunshine Coast areas • As part of our services we ____ sewage (3 words) • Our logo is a symbol that represents a ____ (3 words) • The SEQ Water Grid Manager purchases bulk water from them • ...
murder most horrid keywords 2012-03-21
Across
- and pin security method to reduce card fraud
- mail a form of communication where text based messages are exchanged by using computers attached to a network.
- a thing that holds information
- connecting to the Internet or the World-Wide-Web by using an old-fashioned analogue modem.
- This is an example of a new type of web site that has arrived on the Internet only recently, namely the 'Social Networking' sites
- A filter removes or hides unwanted items.
Down
- keys when you label
- pieces of information
- a set of questions
- means to illegally access other people's computer systems in order to destroy, disrupt or carry out something illegal
- door a secret way of getting into the system and by-passing the security checks.
- view when you look for a creation to make your presentation better
- view you dont like what the data sheet looks like you can sort it out
- gateway converts the data passing between dissimilar networks so that each side can communicate with each other. i.e the gateway converts data into the correct network protocol
- when you are confused
- merge when you get a mail message
- are on spread sheets
17 Clues: a set of questions • keys when you label • are on spread sheets • pieces of information • when you are confused • a thing that holds information • merge when you get a mail message • A filter removes or hides unwanted items. • and pin security method to reduce card fraud • view when you look for a creation to make your presentation better • ...
TECHNOLOGY VOCABULARY 2021-06-16
Across
- a compact disk that is used with a computer
- the amount of information that can be stored on a disk drive
- of or pertaining to a number system having 2 as its base
- a facial expression represented by a sequence of characters
- an organized body of related information
- a unit of measurement of information
- the activity of converting data or information into code
- RAM memory that is set aside as a specialized buffer storage
Down
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- art ready-made pieces of computerized graphic art that can be used to decorate a document
- any computer that is hooked up to a computer network
- adjusting the parts of something in relation to each other
- a worldwide network of computer networks
- the symbolic arrangement of data in a computer program configure set up for a particular purpose
- transfer a file or program to a smaller computer
- a sequence of data processed as a single unit of information
- locate and correct errors in a computer program code
17 Clues: a unit of measurement of information • a worldwide network of computer networks • an organized body of related information • a compact disk that is used with a computer • transfer a file or program to a smaller computer • any computer that is hooked up to a computer network • locate and correct errors in a computer program code • ...
Networking key terms revision 2021-11-29
Across
- The range of frequencies that can be transmitted across a network connection
- ?? rate is the frequency at which bits can be transmitted
- A ?? is used as the network uses a different protocol from the Internet
- bits can only detect errors not correct them
- the process of directing packets of data between networks
- The delay between an action being instigated and its effect being noticed
- hardware or software for protecting against unauthorised access to a network
- ?? Address - a unique code that identifies a particular device on a network.
- the name of a wireless network
- a method for transmitting packets of data via the quickest route on a network.(2 words)
Down
- can correct errors that occur during transmission (2 words)
- a model of software deployment where an application is hosted as a service provided to customers across the internet.
- set of rules
- in a network where resources, processing power and storage capacity are distributed between the server and the client computers. (2 words)
- the name given to a packet of data being transmitted using the websocket protocol
- ?? rate is the number of signal changes (which may occur) in a given period of time
- a block of data being transmitted
17 Clues: set of rules • the name of a wireless network • a block of data being transmitted • bits can only detect errors not correct them • the process of directing packets of data between networks • ?? rate is the frequency at which bits can be transmitted • can correct errors that occur during transmission (2 words) • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The illegal trade and distribution of drugs is called drug ________
- Illegal networks that distribute drugs internationally
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- Excessive use of drugs can lead to ________, which can be fatal.
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Many drug users experience this mental condition, causing sadness and hopelessness.
- In the long term, drug use leads to ___________, making it hard to stop
Down
- The illegal act of transporting or selling drugs
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- A harmful mental effect caused by drug use, where users see things that aren't real
- Drug users often experience ________, a mental disorder involving intense fear
- The condition of relying on drugs and unable to function without them
- The misuse of substances that affect both physical and mental health
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- Drug users are often involved in illegal ________ acts to support their addictio
- Drug addiction often leads to losing this, impacting economic productivity.
- A fatal consequence of drug use, often from excessive consumption
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Crossword Puzzle Servo Edition 2025-01-06
Across
- integrates with Xenia for energy savings, keymanagement, and usage reporting.
- guests can check in online, make payments, receive room-specific QR codes, and create their own keys at lobby kiosks.
Down
- a firewall appliance by Servo offering robustnetwork security.
- a type of device that bridges wired andwireless networks, enabling multiple connections.
- delivers guest folios, dynamic broadcasted messages, and housekeeping updates via TV.
5 Clues: a firewall appliance by Servo offering robustnetwork security. • integrates with Xenia for energy savings, keymanagement, and usage reporting. • delivers guest folios, dynamic broadcasted messages, and housekeeping updates via TV. • a type of device that bridges wired andwireless networks, enabling multiple connections. • ...
Secret to Learning English! 2013-09-02
Across
- a large computer network linking smaller computer networks worldwide
- the condition of desiring and wanting something
- an art of sound in time that expresses ideas and emotions in significant forms through the elements of rhythm, melody, harmony, and color.
- a motion picture; a film
- the habits, attitudes, tastes, moral standards, economic level, etc., that together constitute the mode of living of an individual or group.
- a small device that transits sounds and people speak to one over through
Down
- to involve deeply; absorb, to be completely surrounded by something
- showing much interest and high energy for something
- the broadcasting of a still or moving image via radiowaves to receivers that project a view of the image on a picture tube.
- a publication containing daily news and information
- the behaviors and beliefs characteristic of a particular social, ethnic, or age group
- a handwritten or printed work of fiction or nonfiction, usually on sheets of paper fastened or bound together within covers.
- a person attached to another by feelings of affection or trust
13 Clues: a motion picture; a film • the condition of desiring and wanting something • showing much interest and high energy for something • a publication containing daily news and information • a person attached to another by feelings of affection or trust • to involve deeply; absorb, to be completely surrounded by something • ...
Digital Literacy 2025-12-16
Across
- When a person pretends to be a someone or company that you trust.
- the kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
- a computer program that can perform tasks that typically require human intelligence
- Texts and emails that you don't want to receive.
- A set of rules or instructions that a computer follows to solve a problem.
- computers, social networks, video games
Down
- A the trail of data left from online activities, including posts, searches, and website visits, built both actively (you post) and passively (cookies track you)
- the kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
- A type of Fake News meant to make money from advertising.
- Small files that websites store on your computer to remember information about you.
- Copying someone else's work and calling i
- Fake or misleading information presented as news.
- Using digital media safely, responsibly, and ethically
- protect a person's creative work
14 Clues: protect a person's creative work • computers, social networks, video games • Copying someone else's work and calling i • Texts and emails that you don't want to receive. • Fake or misleading information presented as news. • Using digital media safely, responsibly, and ethically • A type of Fake News meant to make money from advertising. • ...
Unit 32 How networks can be attacked 2013-11-28
Across
- Is a type of malicious software that is activated each time your system boots up
- Know as malicious software
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- of service It attempts to make a user or organisation lose its services
- Also known for advertising supported software
- force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
Down
- Usually these are statistical analyses that attempt to discover keys
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
- Is a software that gathers information about a person or organisation without their knowledge
- door Is a method where any virus such Trojan, Malware can get through all security procedures
11 Clues: Know as malicious software • Also known for advertising supported software • Usually these are statistical analyses that attempt to discover keys • of service It attempts to make a user or organisation lose its services • Is a type of malicious software that is activated each time your system boots up • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Interactive websites where people create and share user-generated content with friends and family
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- limits the impact of a failure, so that the fewest number of devices are affected.
- Web pages that groups of people can edit and view together
- Hosts that request information
- identify the physical location of intermediary devices and cable installation.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Hosts that provide information
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Identify devices, ports, and addressing scheme.
- Applications can be accessed over the Internet through a subscription.
Down
- Real-time communication between two or more people
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Something that helps people work together on a particular file or piece of software
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Examples include routers, switches and wireless access points
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Private networks in use by just one company
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Having multiple paths to a destination
- Type of network provides access to users over a large geographical area
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Type of network provides access to users over a small geographical area
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- allows people to share files with each other without having to store and download them from a central server
- diagram Diagram of a network
38 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Elijah Chapter 9 2024-05-06
Across
- A multiplexor that un-multiplexes the data stream and delivers the individual streams to the appropriate devices
- A number indicating a protocol's reliability
- A multiplexing technique where binary 1s and 0s are replaced with larger, unique binary sequences to allow multiple user to share a common set of frequencies
- A set of unused frequencies between 2 channels on a frequency division multiplexed system
- A adaptive routing technique in which routing tables react to network fluctuations when calculating the best paths between networks
- A second Generation mobile telephone technology that is based on a form of time division multiplexing
- A transitional cellular network technology between 3G and 4G that takes advantage of some improved 4G technologies to exceed 3G speeds
- A type of routing protocol that enables routers to share performance and status information about their connected links with routers throughout the network
- The device that combines multiple input signals for transmission over a single medium and then demultiplexes the composite signal back into multiple signals
- An expensive form of wavelength division multiplexing that involves the transfer of a large number of data streams over a single optical fiber using multiple lasers emitting light of different wavelengths
- Assigning non-overlapping frequency ranges to different signals or to each user of a medium
- The use of one or more fixed routes manually added to the routing table, often when the network is installed
- 4th generation mobile phone service characterized by an all-IP network for both data and voice transmission
- A path vector routing protocol that is the only routing protocol used on the open Internet
- A compression technique that offers lossless compression by creating a dictionary of character strings and associated codes
- A compression technique in which data is compressed and then decompressed but doesn't return the original data
- A compression technique in which data is compressed and the decompressed such that the original data is returned
- Early cellular phone networks
Down
- The multiplexing of multiple data streams onto a single fiber-optic cable through the use of lasers emitting lights of varying wavelength
- The simplest type of routing protocols; used to determine the best route for data based on the distance to a destination
- A form of multiplexing that relies on multiple antennae transmitting and receiving in different locations so that signals are separated by some distance in space
- A multiplexing technique that gives each incoming source a turn to transmit, proceeding through the sources in round-robin fashion
- A technique commonly used to compress images
- A path or connection typically supporting one user
- The process of a network reconfiguring itself if a network failure is detected
- A compression technique in which a commonly occurring symbol in a data set is replaced with a simpler character and a count of how many times that symbol occurs
- A database stored in a router's memory that maintains information about the location of hosts and networks and the best paths for forwarding messages between them
- A link state routing protocol that uses a best-path algorithm
- A routing protocols that exhibits characteristics of both distance vector and link state routing protocols
- distance vector protocols that use hop count as their routing metric and only allow up to 15 hops
- Modern multiplexing technology technology that combines FDM and TDM techniques and takes advantage of mathematical manipulation of wavelengths to compress multiple signals within a smaller bandwidth
- The application of multiplexing in the support of many users at one time
- Techniques used to decrease the demand on limited WAN resources and increase the effective speed of data transmissions over WAN connections
- 3rd generation mobile phone service released in the early 2000s that supported up to 384 Kbps
- A form of time division multiplexing in which the multiplexor creates a data packet of only those devices that have something to transmit
- A multiplexing technique in which the sharing of a signal is accomplished by dividing the available transmissions on a medium among the medium's users
- A compression/encryption technique that allows a high quality audio sample to be reduced to a much smaller sized file
- A link state routing protocol that improves on some of the limitations of RIP and con coexist with RIP on a network
- An advanced distance vector routing protocol developed by Cisco that combines some of the features of a link state routing protocols and so is sometimes referred to as a hybrid protocol
39 Clues: Early cellular phone networks • A number indicating a protocol's reliability • A technique commonly used to compress images • A path or connection typically supporting one user • A link state routing protocol that uses a best-path algorithm • The application of multiplexing in the support of many users at one time • ...
Intermolecular Forces 2023-02-16
Across
- IMF that holds non-polar things together
- rings of water molecules surrounding ions
- when electrons are free to fly around from atom to atom
- combination of more than one type metal atom together
- forces between molecules in a "bead"
- when molecules evaporate and condense continually; it never stops
- type of alloy where atoms are placed between metal atoms
- other than carbon networks, this is the only other substance to exhibit covalent network bonding
- molecules that have h-bonding or dipole-dipole are this
- hydrogen bonds between massive molecules in the body give this
- graph that shows how temp and pressure are related to phase changes
- almost perfect crystal
- happens to an adjacent non-polar molecule when the electron cloud is uneven in another
- the energy required to vaporize 1 mole of stuff at 1 atm
- force that holds water molecules around an ion
- liquid above its boiling point (rare)
- a molecule that is separate; not actually part of other molecules
- forces between the molecules in the "bead" and the surface it is on
- non-polar things are this when they have lots of electrons
- change from liquid to gas below boiling point
- when vapor pressure equals atmospheric pressure
- resistance to flow
- when something evaporates very easily
- capillary action is stronger when tubes are of a _______ ______
Down
- when electrons are trapped between atoms
- sheets of carbon networks that slide easily on each other
- forces "in" molecules
- a misnomer; the way to describe how a water strider walks on water
- between an H that is attached to an N, O, or F, and a really electronegative atom on another molecule
- general force that hold polar things together
- IMF that hold metal atoms together
- take thousands of degrees to melt
- water moving up a tube because of IMFs
- have molecules at the lattice points
- type of crystal that is perfect
- have ions at the lattice points
- force that hold atoms together in quartz, glass or diamond
- describes the structure of a crystal
- hydrogen bonds make this molecules "zip" together
- thing we eat that has a super high viscosity
- type of substance that has nuclei swimming in a sea of elctrons
- liquid below its freezing point (rare)
- cute way of remembering h-bonding
- equally and oppositely opposed tetrahedral covalent bonds
- forces "between" molecules
- not crystalline solid; no real repeating structure
- liquids exhibit this when the forces between the moleculues are stronger than the forces between the molecules and the surface it is on
- the pressure a liquid puts on the atmosphere
- happens when you "catch" the electron cloud on a non-polar molecule to one side
- type of alloy where atoms are replaced by other atoms
- the surface a "bead" is on
- tubes in a tree that use capillary action to drink
52 Clues: resistance to flow • forces "in" molecules • almost perfect crystal • forces "between" molecules • the surface a "bead" is on • type of crystal that is perfect • have ions at the lattice points • take thousands of degrees to melt • cute way of remembering h-bonding • IMF that hold metal atoms together • forces between molecules in a "bead" • have molecules at the lattice points • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Provides the physical connection to the network at the PC or other host device
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Real-time communication between two or more people
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- identify the physical location of intermediary devices and cable installation.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Hosts that request information
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Something that helps people work together on a particular file or piece of software
- Type of network provides access to users over a small geographical area
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Applications can be accessed over the Internet through a subscription.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Hosts that provide information
- hello
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
Down
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Examples include copper, fiber and wireless
- Private networks in use by just one company
- Identify devices, ports, and addressing scheme.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- diagram Diagram of a network
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Having multiple paths to a destination
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Type of network provides access to users over a large geographical area
- limits the impact of a failure, so that the fewest number of devices are affected.
- allows people to share files with each other without having to store and download them from a central server
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Examples include routers, switches and wireless access points
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- lol
- Web pages that groups of people can edit and view together
41 Clues: lol • hello • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Something that helps people work together on a particular file or piece of software
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a large geographical area
- Having multiple paths to a destination
- Hosts that provide information
- Applications can be accessed over the Internet through a subscription.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Down
- Hosts that request information
- limits the impact of a failure, so that the fewest number of devices are affected.
- Web pages that groups of people can edit and view together
- Type of network provides access to users over a small geographical area
- Examples include routers, switches and wireless access points
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- diagram Diagram of a network
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Examples include copper, fiber and wireless
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Real-time communication between two or more people
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Identify devices, ports, and addressing scheme.
- Provides the physical connection to the network at the PC or other host device
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- allows people to share files with each other without having to store and download them from a central server
- Private networks in use by just one company
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Interactive websites where people create and share user-generated content with friends and family
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
39 Clues: diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Hardware 2020-08-02
Across
- memory refers to a device that is used to store information for immediate use in a computer or related computer hardware device.
- a set of computer instructions in firmware which control input and output operations.
- a data storage device that includes flash memory with an integrated USB interface.
Down
- an output device that displays information in pictorial form
- A router is a networking device that forwards data packets between computer networks.
- a panel of keys that operate a computer or typewriter.
6 Clues: a panel of keys that operate a computer or typewriter. • an output device that displays information in pictorial form • a data storage device that includes flash memory with an integrated USB interface. • A router is a networking device that forwards data packets between computer networks. • ...
The internet 2023-06-06
Across
- - a place, person, or thing from which something originates or can be obtained
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Down
- - relating to the present or recent times as opposed to the remote past
- - the earth, together with all of its countries and peoples
- - facts provided or learned about something or someone
- main thing is the most important one of several similar things in a particular situation.
6 Clues: - facts provided or learned about something or someone • - the earth, together with all of its countries and peoples • - relating to the present or recent times as opposed to the remote past • - a place, person, or thing from which something originates or can be obtained • ...
Crypto Review 2023-11-09
Across
- a one way cryptographic function that converts a some text like "I like cats" into a scrambled looking thing like"sdkf83ru39ijflku"
- money system that is backed up by a central bank and/or government
- a distributed ledger of transactions that are linked together through a cryptographic hash
- people that sell crypto are often like this
Down
- a decentralized money system that uses peer to peer networks and encryption
- files and transactions of a crypto system are replicated all over the internet
6 Clues: people that sell crypto are often like this • money system that is backed up by a central bank and/or government • a decentralized money system that uses peer to peer networks and encryption • files and transactions of a crypto system are replicated all over the internet • ...
