networks Crossword Puzzles
Chapter 10 & 11 Key Terms 2022-02-08
Across
- muscle that compresses the cheek
- muscle-forming stem cell
- to the outside
- bundle of muscle fibers within a skeletal muscle
- striated muscle found in the heart; joined to one another at intercalated discs and under the regulation of pacemaker cells, which contract as one unit to pump blood through the circulatory system. Cardiac muscle is under involuntary control.
- protein that makes up most of the thin myofilaments in a sarcomere muscle fiber
- moves the bone toward the midline
- muscle whose contraction is responsible for producing a particular motion
- formation of blood capillary networks
- muscle that increases the angle at the joint
- swallowing
Down
- muscle that adducts the thigh and flexes the leg at the knee
- regulatory protein that facilitates contraction in smooth muscles
- muscle that, along with the psoas major, makes up the iliopsoas
- broad, tendon-like sheet of connective tissue that attaches a skeletal muscle to another skeletal muscle or to a bone
- skeletal muscle that separates the thoracic and abdominal cavities and is dome-shaped at rest
- replacement of muscle fibers by scar tissue
- fascicles that extend over a broad area and converge on a common attachment site
18 Clues: swallowing • to the outside • muscle-forming stem cell • muscle that compresses the cheek • moves the bone toward the midline • formation of blood capillary networks • replacement of muscle fibers by scar tissue • muscle that increases the angle at the joint • bundle of muscle fibers within a skeletal muscle • muscle that adducts the thigh and flexes the leg at the knee • ...
11.5 Testout Crossword 2023-03-28
Across
- Local area network.
- Passphrase a user enters to access the wireless network.
- Standard for local area networks created by The IEEE-SA.
- Wide area network.
- Technique used by hackers to gain access to a target's computer or online accounts.
- Sequence of characters that identify a WIFI network.
- The conversion of data from a readable format into an encoded format.
- Allows a device to securely connect to a wireless network without entering the PSK.
Down
- Combines two, non-overlapping 20 MHz channels into a single 40 MHz channel.
- Transmission without the use of wires or cables.
- When a caller deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
- Telephone interface that uses a cable of twisted wire pairs.
- Password or identification process.
- Cable consisting of an inner conductor surrounded by a concentric conducting shielding.
- Was developed by Cisco to address security concerns in RADIUS.
- Increases bandwidth by using multiple antennas for both the transmitter and receiver.
- Developed at MIT and is a key component of Windows Active Directory.
- Standardized physical network interface connecting data equipment.
18 Clues: Wide area network. • Local area network. • Password or identification process. • Transmission without the use of wires or cables. • Sequence of characters that identify a WIFI network. • Passphrase a user enters to access the wireless network. • Standard for local area networks created by The IEEE-SA. • Telephone interface that uses a cable of twisted wire pairs. • ...
1.3 Network Connections and Protocols 2025-03-19
Across
- A wireless method for connecting devices to a network
- A global network connecting millions of devices worldwide
- A device that requests information from a server
- A device which provides data or services to other devices
- Online storage and computing services accessed via the internet
- A network that spans a large geographical area, such as the internet(acronym)
- The maximum amount of data that can be transmitted across a network
- A network layout where all devices connect to a central point
- A device that forwards data between networks
- A network layout where each devices connects directly to multiple others
Down
- A device which directs data only to the intended recipient
- A type of network that connects computers in a small area, like a school or office(acronym)
- The system that translates domain names into IP addresses(acronym)
- The arrangement or layout of devices in a network
- A computer in a network that can act as both client and server
- A wired networking technology commonly used in LANS
- A short-range wireless communication technology
- A high-speed internet connection that transmits large amounts of data
18 Clues: A device that forwards data between networks • A short-range wireless communication technology • A device that requests information from a server • The arrangement or layout of devices in a network • A wired networking technology commonly used in LANS • A wireless method for connecting devices to a network • A global network connecting millions of devices worldwide • ...
CS Principles Exam Review 2026-02-13
Across
- A data transport protocol that includes mechanisms for reliably transmitting packets to a destination
- ____ access point gives unauthorized access to secure networks
- making something in code that is based on something from the real world.
- hiding a message in plain sight (rain will not see this)
- Run-Time Error code is ____ but makes an error.
- Cipher where the letters are mixed up somehow
- _____ Error runs but there is a Mistake in how you wrote the code.
- Compressing data in a way that discards some data
- Compressing data in a way that preserves all data
- ____ science Crowdsourcing for science! The participation of volunteers from the public in a scientific research project
- A model in which many online users combine efforts to help fund projects
- data about data
Down
- A lightweight data transport protocol with minimal error checking.
- device/hardware that uses software or the software itself
- A technique that helps an algorithm find a good solution in a hard problem
- ETHERNET used ___ addresses to send data between computers on the network.
- ____ Area Network, A small network often in one building.
- ___ Cipher where every letter is ___ with another letter
18 Clues: data about data • Cipher where the letters are mixed up somehow • Run-Time Error code is ____ but makes an error. • Compressing data in a way that discards some data • Compressing data in a way that preserves all data • hiding a message in plain sight (rain will not see this) • ___ Cipher where every letter is ___ with another letter • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- A security mechanism or virtual trap intended to be compromised to capture attacker data.
- Data describing other data, such as timestamps or authors
- Firewall type that provides unified policy across distributed networks
- Unauthorized email scams that trick users into revealing information
- Potential events or circumstances that can cause harm to an organization's assets.
- Network tool for capturing and analyzing traffic
- A central security resource where multiple virtual traps are monitored (One word).
- Proactive measure that reduces the likelihood of successful cyberattacks, often by scrambling data
- Technology used by NGFW to detect and block malware
Down
- A security mechanism that creates a virtual trap to lure attackers and study their techniques.
- An illegal intrusion into a computer system or network
- The verification procedure to demonstrate that the network meets security requirements
- The 'A' in the CIA triad, ensuring systems and data must be available on demand.
- Legal process of collecting and analyzing digital evidence
- Process of identifying, assessing, and mitigating threats
- Malicious software specifically designed to disrupt or damage computer systems
- Programs designed to record personal information, typically undesired software
- A network of compromised devices controlled by attackers to generate traffic for a DDoS attack
- Software that records keystrokes, potentially capturing sensitive login credentials.
- Deceptive emails or messages impersonating trusted entities to steal sensitive information
20 Clues: Network tool for capturing and analyzing traffic • Technology used by NGFW to detect and block malware • An illegal intrusion into a computer system or network • Data describing other data, such as timestamps or authors • Process of identifying, assessing, and mitigating threats • Legal process of collecting and analyzing digital evidence • ...
Cybersecurity 2024-02-15
Across
- A technique used to trick individuals into revealing sensitive information
- The process of protecting computer systems, networks, and data from theft or damage
- A type of attack that floods a system or network with excessive traffic, causing it to become unavailable
Down
- The practice of verifying the identity of a user or system before granting access
- A program or device used to detect and prevent unauthorized access to a computer or network
- A secret code used to gain access to a computer system, network, or account
- A malicious program that self-replicates and spreads to other computers
7 Clues: A malicious program that self-replicates and spreads to other computers • A technique used to trick individuals into revealing sensitive information • A secret code used to gain access to a computer system, network, or account • The practice of verifying the identity of a user or system before granting access • ...
Internet history 2022-11-10
Across
- the order in which a series of things appears
- to start an activity, especially an organized one
- to understand something or somebody wrongly
- a website where an individual person, or people representing an organization, write regularly about recent events or topics that interest them, usually with photos and links to other websites that they find interesting
Down
- to represent
- an international computer network connecting other networks and computers that allows people to share information around the world
- software such as a virus specifically designed to damage or gain access to a computer system without the user knowing
7 Clues: to represent • to understand something or somebody wrongly • the order in which a series of things appears • to start an activity, especially an organized one • software such as a virus specifically designed to damage or gain access to a computer system without the user knowing • ...
test1 2024-03-01
Exploratory Art: Cumulative Exam Review (#1-19) 2021-05-12
Across
- a device that creates the illusion of movement and was the forerunner to the modern projector.
- provided instant communication and information to a massive audience for the first time.
- creates animation using live footage as guides.
- an application of commercial photography to communicate or establish trends.
Down
- self-contained, self-sustained explosions, fires, flames, and fireworks used in live performances, film, and other forms of entertainment.
- a recording of a motion picture, or television program for playing through a television.
- transparent sheets of film on which objects are drawn or painted for traditional hand drawn animation.
- a standard communications protocol used to connect computer networks around the world.
- a visual series of rough drawings depicting the scenes of action in a story.
- transferring two dimensional images onto a screen for viewing.
10 Clues: creates animation using live footage as guides. • transferring two dimensional images onto a screen for viewing. • a visual series of rough drawings depicting the scenes of action in a story. • an application of commercial photography to communicate or establish trends. • a standard communications protocol used to connect computer networks around the world. • ...
Globalization 2022-11-04
Across
- Money received, especially on a regular basis, for work or through investments.
- Difference in size, degree, circumstances
- The process by which businesses or other organizations develop international influence or start operating on an international scale.
- The action of buying and selling goods and services.
Down
- A friend, or a person who works for someone in authority, especially one who is willing to give and receive dishonest help.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Taking place or progressing slowly or by degrees.
- A society or association formed by people with a common interest or purpose.
- A state or society governed by the wealthy.
- The transfer of a business, industry, or service from public to private ownership and control
10 Clues: Difference in size, degree, circumstances • A state or society governed by the wealthy. • Taking place or progressing slowly or by degrees. • The action of buying and selling goods and services. • A society or association formed by people with a common interest or purpose. • Money received, especially on a regular basis, for work or through investments. • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Crisis Assistance Helping Out On The Streets Acronym
- What region was identified in step one of the asset collection method?
- key asset component
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
Down
- What is Bill 178?
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
- Declared anti-Black Racism as a public health crisis
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- What is our asset organization's acronym?
10 Clues: What is Bill 178? • key asset component • What is our asset organization's acronym? • Crisis Assistance Helping Out On The Streets Acronym • Declared anti-Black Racism as a public health crisis • What region was identified in step one of the asset collection method? • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- Crisis Assistance Helping Out On The Streets Acronym
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- Key asset component
- What is our asset organization's acronym?
Down
- What region was identified in step one of the asset collection method?
- What is Bill 178?
- Declared anti-Black Racism as a public health crisis
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
10 Clues: What is Bill 178? • Key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out On The Streets Acronym • What region was identified in step one of the asset collection method? • ...
Networking Puzzle 2016-04-26
Across
- I am a small network that interconnects computers within a limited area such as a residence, school,lab etc
- I am address assigned to each device (e.g., computer, printer) participating in a computer network
- I am a group of two or more computer systems linked togetherIP.
- Term used to send audio and/or video content to everyone in the network
Down
- I am used to regenerate or replicate a signal.
- is communication between a single sender and a single receiver over a network
- I serve as a central connection for all of your network equipment but i am not intelligent
- I span over a relatively large geographical typically consists of two or more local-area networks (LANs).
- I am also called physical address/hardware address
- I perform the "traffic directing" functions on the Internet
10 Clues: I am used to regenerate or replicate a signal. • I am also called physical address/hardware address • I perform the "traffic directing" functions on the Internet • I am a group of two or more computer systems linked togetherIP. • Term used to send audio and/or video content to everyone in the network • ...
Loy Krathong 2023-11-22
Across
- the round object that moves around the earth and shines at night by light reflected from the sun
- a natural flow of water that continues in a long line across land to the sea
- round stick of wax with that is lit to give light as it burns
- the natural world in which people, animals and plants live
- tropical plant with white or pink flowers that grows on the surface of lakes
- physical or mental pain
Down
- computer network connecting other networks and computers that allows people to share information around the world
- scientific knowledge used in practical ways in industry
- material that is produced by chemical processes and can be formed into shapes
- all the plants, animals and things that exist in the universe that are not made by people
10 Clues: physical or mental pain • scientific knowledge used in practical ways in industry • the natural world in which people, animals and plants live • round stick of wax with that is lit to give light as it burns • a natural flow of water that continues in a long line across land to the sea • tropical plant with white or pink flowers that grows on the surface of lakes • ...
Special Technical ICT Definitions 2024-03-10
Across
- The method by which information is converted into secret code that hides the information's true meaning.
- A list of records linked together using special cryptographic operations across a distributed network of computers⁵.
- A set of rules to be followed in calculations or other problem-solving operations.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Records of events that happen in an operating system or other software.
Down
- The maximum rate of data transfer across a given path.
- A hardware or software component that stores data so future requests for that data can be served faster.
- An identification string that defines a realm of administrative autonomy, authority or control within the internet.
- The loss of signal strength in networking cables or connections⁵.
- A device that forwards data packets along networks.
10 Clues: A device that forwards data packets along networks. • The maximum rate of data transfer across a given path. • The loss of signal strength in networking cables or connections⁵. • Records of events that happen in an operating system or other software. • A set of rules to be followed in calculations or other problem-solving operations. • ...
DS 2025-09-26
Across
- What's the term for a piece of evidence or information that helps solve a mystery?
- What term describes a step-by-step procedure for solving problems in computer science?
- What word describes an elaborately planned theft by a skilled criminal team?
- What metric measures the proportion of correct predictions among total cases examined in classification?
- Which versatile programming language, named after a snake, is used in web dev, data analysis, and AI?
- What acronym represents a technique to reduce dataset dimensionality while preserving information?
Down
- Which ML subset is inspired by the human brain, using neural networks?
- In machine learning evaluation, what three-letter acronym represents a graphical plot illustrating a classifier’s performance across various thresholds?
- a.k.a
- What term describes the money or items demanded by criminals to release victims?
10 Clues: a.k.a • Which ML subset is inspired by the human brain, using neural networks? • What word describes an elaborately planned theft by a skilled criminal team? • What term describes the money or items demanded by criminals to release victims? • What's the term for a piece of evidence or information that helps solve a mystery? • ...
Navigating the Web of Cyber Law 2025-06-05
Across
- A violation of privacy where an individual's data is exposed or stolen.
- A type of digital attack where hackers encrypt a victim's data and demand payment for its release.
- A legal framework that governs the use of electronic signatures in contracts.
- The person responsible for overseeing and enforcing cyber laws in a jurisdiction.
- The unauthorized copying or distribution of software or digital content.
Down
- The process of obtaining a person's sensitive data through fraudulent means, typically via emails.
- The practice of protecting computers, networks, and data from unauthorized access or attacks.
- A method of writing in code so that only authorized parties can access it.
- A type of software designed to gain unauthorized access to systems, steal data, or cause damage.
- The unlawful act of accessing a computer system without authorization.
10 Clues: The unlawful act of accessing a computer system without authorization. • A violation of privacy where an individual's data is exposed or stolen. • The unauthorized copying or distribution of software or digital content. • A method of writing in code so that only authorized parties can access it. • ...
Business technology 2026-02-22
Across
- conferencing-Videoconferencing is a specialized type of teleconferencing that adds real-time video, allowing participants to see facial expressions and share screens.
- technology- refers to the use of all types of business make of information technology
- buying and selling product online
- hardware of a company’s IT system includes the items that you can readily see and touch.
- Teleconferencing is a broad term for any, often audio-only, remote meeting connecting people in different locations.
- the programs inside the computer (like apps).
Down
- running an entire company online.
- banking - managing money through a website / app.
- networks-interconnected systems of devices—such as computers, servers, or components—that communicate via cable, radio, or optical signals to share information, resources, and data.
- storage-savings digital files for later.
10 Clues: running an entire company online. • buying and selling product online • storage-savings digital files for later. • the programs inside the computer (like apps). • banking - managing money through a website / app. • technology- refers to the use of all types of business make of information technology • ...
5G Pillars 2024-11-26
Across
- What feature helps to conserve battery life by managing power usage in devices?
- What high-frequency waves are used in 5G to enable ultra-fast data speeds?
- What network component must be upgraded to handle the large volume of traffic generated by small cells?
- What is improved in 5G to enhance spectral efficiency, energy efficiency, and latency?
- What concept allows the sharing of wireless infrastructure among multiple network operators?
Down
- What technique is used to allow efficient utilization of available frequency bands?
- What is densely deployed to improve coverage and handle massive traffic indoors and outdoors?
- What is allocated to 5G to support higher data capacities and better coverage?
- What type of communication focuses on machine-to-machine interactions?
- What term refers to networks that can configure, optimize, and repair themselves automatically?
10 Clues: What type of communication focuses on machine-to-machine interactions? • What high-frequency waves are used in 5G to enable ultra-fast data speeds? • What is allocated to 5G to support higher data capacities and better coverage? • What feature helps to conserve battery life by managing power usage in devices? • ...
Fun Friday 2024-04-28
Across
- A device that directs data packets between computer networks.
- The measure of data transfer rate over a network.
- A device that modulates and demodulates analog signals for transmitting digital data over communication lines.
- A security system that monitors and controls incoming and outgoing network traffic.
- The process of encoding data to make it unreadable without the proper decryption key.
Down
- Software used to access and view websites on the internet.
- A set of rules governing the exchange of data between devices on a network.
- A virtual private network that creates a secure connection over the internet, often used for remote access to a private network.
- A standard system for connecting computers to a local area network (LAN).
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
10 Clues: The measure of data transfer rate over a network. • Software used to access and view websites on the internet. • A device that directs data packets between computer networks. • A standard system for connecting computers to a local area network (LAN). • A set of rules governing the exchange of data between devices on a network. • ...
Technology Glossary 2 2025-03-01
Across
- A request for data or information from a database.
- A sequence of instructions that is continually repeated until a certain condition is reached.
- A programming language commonly used to create interactive effects within web browsers.
- A device that forwards data packets between computer networks.
- learning A field of artificial intelligence that uses statistical techniques to give computers the ability to learn from data.
- A word or concept of great significance in programming and searching.
Down
- A group of interconnected computers that can communicate with each other.
- programming A programming paradigm based on the concept of objects, which can contain data and code to manipulate that data.
- The process of designing and building an executable computer program to accomplish a specific computing task.
- The programs and other operating information used by a computer.
10 Clues: A request for data or information from a database. • A device that forwards data packets between computer networks. • The programs and other operating information used by a computer. • A word or concept of great significance in programming and searching. • A group of interconnected computers that can communicate with each other. • ...
Unit 2 Crossword 2024-12-29
Across
- Luxury item that was a major trade good on the Silk Road.
- Chinese innovation that spread to Europe, transforming military power.
- Disease that spread through increased trade, significantly reducing global populations.
- A key Silk Road city known for thriving markets and Islamic scholarship.
- Religion that spread from India to East Asia via the Silk Road, leading to syncretic forms like Zen Buddhism.
- A trading city located at the convergence of major Silk Road routes.
Down
- Rest-stops along the Silk Road that provided safety and cultural exchange.
- Muslim scholar who traveled extensively through Islamic regions and documented his experiences.
- East African civilization that combined Bantu culture with Arabic influences through Islamic trade networks.
- A type of rice from Vietnam that led to significant population growth in China.
10 Clues: Luxury item that was a major trade good on the Silk Road. • A trading city located at the convergence of major Silk Road routes. • Chinese innovation that spread to Europe, transforming military power. • A key Silk Road city known for thriving markets and Islamic scholarship. • Rest-stops along the Silk Road that provided safety and cultural exchange. • ...
CYBER-BULLYING 2024-07-25
Across
- - staying safe online from bullies and hackers
- - an information system on the internet which allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.
- - careful investigation into a crime or mystery
- - a witness of the bullying
Down
- - an electronic communications network that connects computer networks and organizational computer facilities around the world
- - bullying but online
- - a secret word or phrase that must be used to gain admission to a place.
- - Someone who stands up to the bullies
- - a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.
- - the address of a unique resource on the internet
10 Clues: - bullying but online • - a witness of the bullying • - Someone who stands up to the bullies • - staying safe online from bullies and hackers • - careful investigation into a crime or mystery • - the address of a unique resource on the internet • - a secret word or phrase that must be used to gain admission to a place. • ...
Industrial Revolution 2025-11-20
Across
- people in the middle of the social hierarchy
- uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
- the process of making an area more urban
- the process of supplying a military force with modern weapons and vehicles
- social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
- people who earn wages through labor
- a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
- the process of making something conform to a standard
- system of interconnected routes and relationships that facilitate between different regions and ethnicity
- the measure of efficiency of production of goods or services
10 Clues: people who earn wages through labor • the process of making an area more urban • people in the middle of the social hierarchy • the process of making something conform to a standard • the measure of efficiency of production of goods or services • the process of supplying a military force with modern weapons and vehicles • ...
cyber puzzle 2024-11-15
Across
- This word maintain the accuracy and trustworthinessof data over its entire lifecycle
- Deliberate actions intended to harm, damage, or disrupt a system, person, or organization.
- Measures or systems designed to protect against threats, damage, or unauthorized access.
Down
- This word ensures that information and resources are accessible to authorized users when needed.
- This word ensures that sensitive information is only accessible to authorized individuals.
- The state of being protected from danger, theft, or unauthorized use of resources.
- A term used to describe anything related to computers, networks, or the internet.
7 Clues: A term used to describe anything related to computers, networks, or the internet. • The state of being protected from danger, theft, or unauthorized use of resources. • This word maintain the accuracy and trustworthinessof data over its entire lifecycle • Measures or systems designed to protect against threats, damage, or unauthorized access. • ...
network 2024-01-14
4 Clues: determines the best path though the network • represents data to te use, plus encoding and dialog control • control the hardware devices and media that make up the network • supports communication between various devices across diverse networks
Information 2013-04-09
Across
- an organization that publishes a newspaper in the USA (three words)
- the institution, system, or practice of forbidding information
- an organization that publishes a newspaper (two words)
- a publication issued at regular and usually close intervals, especially daily or weekly, and commonly containing news, comment, features, and advertising (two words)
Down
- any of the means of communication, as television or newspapers, that reach very large numbers of people (two words)
- a statement prepared and distributed to the press by Amway (two words)
- a vast computer network linking smaller computer networks worldwide
7 Clues: an organization that publishes a newspaper (two words) • the institution, system, or practice of forbidding information • an organization that publishes a newspaper in the USA (three words) • a vast computer network linking smaller computer networks worldwide • a statement prepared and distributed to the press by Amway (two words) • ...
FIBER OPTICS 2015-03-11
Across
- In this type of network the peers are computer systems which are connected to each other via the Internet.
- FTTB stands for......................
- FTTC stands for....................
- This technology can increase the capacity of the existing networks without the need for new cable installation, and it uses laser beams and fiber optic media to work.
Down
- This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH.
- FTTH stands for.......................
- Fiber optics is a technology that uses...........or plastic threads to transmit data.
7 Clues: FTTC stands for.................... • FTTB stands for...................... • FTTH stands for....................... • Fiber optics is a technology that uses...........or plastic threads to transmit data. • This is a system that brings optical fiber cabling and signals to the end user with FTTC or FTTB or FTTH. • ...
Smart System 2021-06-30
Across
- Application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber-attacks.
- Application that involves wireless sensor and RFID technology,
- Smart system application that lead to better diagnostic tools, to better treatment and quality of life for patients.
Down
- A maintenance technique that estimates when maintenance should be performed
- Maintenance of a software product, performed after delivery, to keep a software product usable in a changed or changing environment
- A sensor that detects movement sensor that detects
- Smart system application that reduces global emission
7 Clues: A sensor that detects movement sensor that detects • Smart system application that reduces global emission • Application that involves wireless sensor and RFID technology, • A maintenance technique that estimates when maintenance should be performed • ...
"WHAT'S IS THE HIDDEN WORDS?" 2023-11-26
Across
- to use machines and computers instead of people to do a job or task.
- make changes i something established, especially by introducing new methods, ideas or product.
- a portable computer that can work with a battery.
- an international computer network connecting other networks and computers that allows people to share information around the world
Down
- a person who is enthusiastic about advanced equipments or devices.
- a formal discussion on a particular topic in a public meeting or legislative assembly, in which opposing arguments are put forward.
- an often small mechanical or electronic device which does something useful.
7 Clues: a portable computer that can work with a battery. • a person who is enthusiastic about advanced equipments or devices. • to use machines and computers instead of people to do a job or task. • an often small mechanical or electronic device which does something useful. • ...
Network Security 2023-06-05
Across
- A method used to encode data during storage or transmission (10)
- It refers to the right of individuals to determine what information is stored about them and how that information will be used.
- The unauthorised accessing of a computer system.
Down
- A piece of software, hardware or both that is used to prevent unauthorised access to a computer network.
- A small piece of software that uses computer networks and security holes to replicate itself. (5)
- A type of software used to protect computer systems from viruses.
- Another name for electronic junk mail.
7 Clues: Another name for electronic junk mail. • The unauthorised accessing of a computer system. • A method used to encode data during storage or transmission (10) • A type of software used to protect computer systems from viruses. • A small piece of software that uses computer networks and security holes to replicate itself. (5) • ...
MALWARE 2025-04-09
Across
- - Software that automatically displays or downloads advertising material when online.
- - A stealthy malware that hides its presence and gives attackers control over a system.
- - A self-replicating malware that spreads through networks without user interaction.
- - Software that secretly monitors user activity and sends the data to a third party.
Down
- - A tool used to record every keystroke typed on a keyboard, often to steal passwords.
- - A malicious program that attaches to files and spreads when the file is opened.
- - Malware disguised as a harmless file or program to trick users into installing it.
7 Clues: - A malicious program that attaches to files and spreads when the file is opened. • - Malware disguised as a harmless file or program to trick users into installing it. • - A self-replicating malware that spreads through networks without user interaction. • - Software that secretly monitors user activity and sends the data to a third party. • ...
Lesson 7 year 11 crossword 2024-11-04
Across
- A network that connects computers within a small geographical area, such as a building or office.
- processor of a computer
- A private network that allows authorized external users to access certain parts of an organization's internal system.
Down
- The process of double-checking data to ensure its correctness, often through manual review or automated tools.
- A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs).
- A network that covers large geographical areas, often connecting multiple LANs, typically using third-party providers.
- memory of a computer
7 Clues: memory of a computer • processor of a computer • A network that connects computers within a small geographical area, such as a building or office. • A wired networking technology used for high-speed, reliable data transfer over local area networks (LANs). • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Angle between orbital plane and earth's equatorial plane • Part of the celestial sphere directly above the observer
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
NSS Chapter 2C 2023-01-09
Across
- Amount of time, including delays, for data to travel from one given point to another
- The measure of usable data transferred over a given period of time (Goodput = Throughput - traffic overhead)
- Braided or foil shield provides EMI/RFI protection
- capacity at which a medium can carry data.
Down
- the most common type of cabling used in networks today. It is inexpensive, easy to install, and has low resistance to electrical current flow.
- The measure of the transfer of bits across the media over a given period of time
- how the bit values, “1” and “0” are represented on the physical medium.
- Twisted pairs protect the signal from interference.
8 Clues: capacity at which a medium can carry data. • Braided or foil shield provides EMI/RFI protection • Twisted pairs protect the signal from interference. • how the bit values, “1” and “0” are represented on the physical medium. • The measure of the transfer of bits across the media over a given period of time • ...
asd 2023-04-21
Across
- a type of software that allows you to find and view websites on the Internet
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- a technological process for telling a computer which tasks to perform in order to solve problems
- a worldwide system of computer networks
Down
- a group of related hardware units or programs or both, especially when dedicated to a single application
- a program designed to detect and remove viruses and other kinds of malicious software from your computer
- a coding error in a computer program
- the action or practice of playing video games
8 Clues: a coding error in a computer program • a worldwide system of computer networks • the action or practice of playing video games • a type of software that allows you to find and view websites on the Internet • a technological process for telling a computer which tasks to perform in order to solve problems • ...
It 2023-05-17
Across
- What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
- What mobile operating system was developed by Google?
- What do you call a group of interconnected computers and devices?
Down
- What technology allows devices to connect to a network without using cables or wires?
- What type of malware is capable of self-replicating and spreading across networks?
- horse Whattype of malware is disguised as a legitimate software program?
- What is the process of converting plain text into ciphertext called?
- In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?
8 Clues: What mobile operating system was developed by Google? • What do you call a group of interconnected computers and devices? • What is the process of converting plain text into ciphertext called? • horse Whattype of malware is disguised as a legitimate software program? • What type of malware is capable of self-replicating and spreading across networks? • ...
Types of measures to counter security threats. 2022-05-10
Across
- - involves focusing efforts to prevent threats to the most valuable information
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- of the system to changes in the environment
- methods are based on one principle of information security management;
Down
- of additional tasks and requirements for employees of the organization caused by information protection measures
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- - excludes acquaintance of third parties with the means and technology of information protection
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
ICT keywords 1 2025-03-05
Across
- used to connect LANs together, connecting different types of network so they act as one single LAN
- is public access to a vast collection of computers and networks
- is to run both systems together until the new system works properly when the new system works the old system is removed
- a private network used in companies and organisations
Down
- it is a fraudulent practice of making phone calls/leaving voice messages
- it is the system that displays questions for the user to answer, displaying the results
- a collection of facts and rules. Created from information provided by experts
- this network device connects a LAN to the internet
8 Clues: this network device connects a LAN to the internet • a private network used in companies and organisations • is public access to a vast collection of computers and networks • it is a fraudulent practice of making phone calls/leaving voice messages • a collection of facts and rules. Created from information provided by experts • ...
Cyber ethics 2025-06-14
Across
- A legal right granted by the law to the creator for his original work.
- Purchasing a single lisenced copy of the software and loading it into several computers.
- Refers to the act of using Or inmitating the language and thoughts of another person as one's original work.
Down
- An illegal intrution into a computer system Or network.
- Vital information resources under seize.
- An act of sending to an user, misleading him to belive that it is from a trusted organisation.
- Criminal activities that involve the use of computers, networks, and the internet connection to cause harm to their digital devices.
- Unwanted bulk emails that comes from unknown sources.
8 Clues: Vital information resources under seize. • Unwanted bulk emails that comes from unknown sources. • An illegal intrution into a computer system Or network. • A legal right granted by the law to the creator for his original work. • Purchasing a single lisenced copy of the software and loading it into several computers. • ...
Globalisation and crime 2025-02-07
Across
- A term describing global organised crime networks, as explored in the book by Misha Glenny.
- The study of social harm rather than just criminal behaviour.
- A sociologist known for his work on the network society and the impact of digital communication.
- A term referring to the interconnection between global and local processes.
- A sociologist who theorised about risk society and the global implications of modernity.
Down
- The idea that all parts of society and the world are linked and influence each other.
- A sociologist who describes primary and secondary green crime.
- A sociologist who analysed the globalisation of crime and the role of capitalism in shaping criminal activity.
8 Clues: The study of social harm rather than just criminal behaviour. • A sociologist who describes primary and secondary green crime. • A term referring to the interconnection between global and local processes. • The idea that all parts of society and the world are linked and influence each other. • ...
Computing Careers (Created By: HTHS Business Dept. 2022) 2022-06-16
Across
- _____ administrator is responsible for the creation, administration and security of computer networks.
- The _____ administrator is responsible for the administration and management of an organization's network.
- A _____ librarian keeps an organization's data files and software up-to-date and organised.
Down
- _____ write new programs, update and modify existing programs/software.
- _____ designers create webpage, build and maintain websites for an individual or an organization.
- The System _____ main role is to implement a new computerised system or upgrade an existing one.
6 Clues: _____ write new programs, update and modify existing programs/software. • A _____ librarian keeps an organization's data files and software up-to-date and organised. • The System _____ main role is to implement a new computerised system or upgrade an existing one. • ...
. 2023-11-14
Across
- record the address to enable quick access in future
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- text files with small pieces of data
- a form of social engineering and scam where attackers deceive people into revealing sensitive information
Down
- malicious attack that involves injecting harmful code into legitimate online advertising networks
- a secret word or phrase that must be used to gain admission to a place
6 Clues: text files with small pieces of data • record the address to enable quick access in future • a secret word or phrase that must be used to gain admission to a place • malicious attack that involves injecting harmful code into legitimate online advertising networks • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Equatorial orbit is sometimes called as • Link between satellite and earth station • Reliability curve in Satellite communication • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
Mass Media 2014-06-11
Across
- Any of the means of communication, as television or newspapers, that reach very large numbers of people.
- Modern popular culture transmitted via mass media and aimed particularly at younger people.
- Refers to the approach used to attract the attention of consumers and/or to influence their feelings toward the product, service, or cause.
- The action or business of promoting and selling products or services, including market research and advertising.
Down
- Give or hand over something in exchange for money.
- Downloading ideas and trends of older teens onto pre-teens.
- The activity or profession of producing advertisements for commercial products or services.
- Concerned with or engaged in commerce.
- Is a global system of interconnected computer networks that use the standard Internet protocol suite to link several billion devices worldwide.
- Obtain in exchange for payment.
10 Clues: Obtain in exchange for payment. • Concerned with or engaged in commerce. • Give or hand over something in exchange for money. • Downloading ideas and trends of older teens onto pre-teens. • The activity or profession of producing advertisements for commercial products or services. • ...
Media 2020-05-20
Across
- A digital recording (as of a movie) on an optical disk that can be played on a computer or a television set
- Newspapers and magazines
- The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them
- An international computer network connecting other networks and computers from companies, universities, etc
- of a circuit or device that represents magnitudes in digits
- Instructions that are hidden within a computer program and are designed to cause faults or destroy data
Down
- A game in which you press buttons to control and move images on a screen
- Talk socially without exchanging too much information
- A machine that prints
- The flat surface at the front of a television, computer, or other electronic device, on which you see pictures or information
10 Clues: A machine that prints • Newspapers and magazines • Talk socially without exchanging too much information • of a circuit or device that represents magnitudes in digits • A game in which you press buttons to control and move images on a screen • The act of making illegal copies of DVDs, computer programs, books, etc., in order to sell them • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-07
Across
- What region was identified in step one of the asset collection method?
- If we do not see racism in mental health services as a problem, it will be extremely difficult to create a ________
- Crisis Assistance Helping Out on The Streets Acronym
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model
- What is our asset organization's acronym?
Down
- Key asset component
- Category in the socio-ecological model that does not directly impact the individual but exerts both negative and positive interactive forces on the individual such as community contexts and social networks
- Declared anti-Black Racism as a public health crisis
- __________inequalities highlight the historic principles of modern-day discrimination
- The four components of the socio-ecological model include the microsystem, mesosystem, ecosystem and ___________?
10 Clues: Key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out on The Streets Acronym • What region was identified in step one of the asset collection method? • __________inequalities highlight the historic principles of modern-day discrimination • ...
Emtech Reviewer 2025-02-03
Across
- the chart's horizontal axis which presents the categories being charted, while the vertical axis shows the charted values.
- A visual storytelling software alternative to traditional slide-based presentation formats.
- It is malicious program that usually transfer from one device to another with the aid of the Internet and local networks.
- for Apple devices
- Our currently used web browsers, and HTML files cannot support the idea of Web 3.0.
Down
- Intellectual Property must also be protected.
- Web 3.0 machine must cater all languages as this third generation of web aims to serve diverse users.
- an open source operating system developed by Google.
- Plays a significant role in a graphic design.
- is an umbrella term which covers any communication devices, applications, and systems that people use to interact and connect with others.
10 Clues: for Apple devices • Intellectual Property must also be protected. • Plays a significant role in a graphic design. • an open source operating system developed by Google. • Our currently used web browsers, and HTML files cannot support the idea of Web 3.0. • A visual storytelling software alternative to traditional slide-based presentation formats. • ...
Introduction to Machine Learning 2024-12-09
Across
- A type of task where the goal is to predict continuous values like house prices.
- A learning type that requires labeled data for training.
- A reinforcement learning algorithm that maps states and actions to rewards.
- The process of grouping similar data points without predefined labels.
Down
- The error due to a model being too sensitive to training data noise.
- The error caused by overly simplistic models failing to capture data complexity.
- The phase where a machine learning model learns patterns from data.
- The broader field of study that includes machine learning and aims to simulate human intelligence.
- The specialized subset of ML that uses neural networks with multiple layers for complex tasks.
- The subset of AI that focuses on learning from data to make predictions or decisions.
10 Clues: A learning type that requires labeled data for training. • The phase where a machine learning model learns patterns from data. • The error due to a model being too sensitive to training data noise. • The process of grouping similar data points without predefined labels. • A reinforcement learning algorithm that maps states and actions to rewards. • ...
AI Crossword Puzzle 2024-12-09
Across
- A set of rules or instructions given to an AI system to help it learn how to solve problems or perform tasks.
- Allianz signed this pact committing to responsible AI use.
- Name of the new European Union regulation concerning artificial intelligence
- Name of the general-purpose AI system developed by Allianz (similar to ChatGPT)
- AI-generated media that can convincingly mimic real people.
- The risk category for AI systems like spam filters under the EU AI Act.
Down
- The dataset used to train an AI model.
- An approach where human intervention is part of the AI system's decision-making process.
- A subset of machine learning using neural networks with many layers, effective for tasks like image recognition
- Systematic errors in AI outputs due to prejudiced assumptions made during the algorithm's development or training process.
10 Clues: The dataset used to train an AI model. • Allianz signed this pact committing to responsible AI use. • AI-generated media that can convincingly mimic real people. • The risk category for AI systems like spam filters under the EU AI Act. • Name of the new European Union regulation concerning artificial intelligence • ...
Neuro Fuzzy 2024-04-18
Across
- Method that combines fuzzy logic and neural networks.
- A process used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
- Technique in neuro-fuzzy systems for modeling uncertain or imprecise information.
- Type of algorithm used in neuro-fuzzy systems to adjust parameters based on the error signal.
- An approach in neuro-fuzzy systems to adjust parameters based on error signal.
Down
- Mathematical model representing knowledge or data in the form of fuzzy rules
- The process of converting linguistic information into a form suitable for computation in fuzzy systems.
- Term for the output of a fuzzy logic system.
- A technique in neuro-fuzzy systems where the system structure and parameters are adjusted simultaneously.
- Method used in neuro-fuzzy systems to automatically generate fuzzy rules from data.
10 Clues: Term for the output of a fuzzy logic system. • Method that combines fuzzy logic and neural networks. • Mathematical model representing knowledge or data in the form of fuzzy rules • An approach in neuro-fuzzy systems to adjust parameters based on error signal. • Technique in neuro-fuzzy systems for modeling uncertain or imprecise information. • ...
4th Grade Social Studies Homework Due 10/13/22 2022-10-10
Across
- When the land was no longer fertile, the settlers had to make their first big ________.
- The US gets resources from other countries in their ________.
- A farmer’s favorite ______ might be their tractor.
- Clean water is a precious ________ in many parts of the world.
- The Iroquois formed a ________ of tribes that worked together for trade and during times of war.
Down
- cost of gasoline can impact the country’s _________.
- The Native American ________ would have been located near water.
- Jill decides to take the bus to work instead of driving. It takes her 60 minutes to get there on the bus and driving would have been 40, so her _______ is 20 minutes.
- Maria is a firm believer in democratic system of __________.
- Decisions were often made through _________ in Native American tribes.
10 Clues: A farmer’s favorite ______ might be their tractor. • cost of gasoline can impact the country’s _________. • Maria is a firm believer in democratic system of __________. • The US gets resources from other countries in their ________. • Clean water is a precious ________ in many parts of the world. • The Native American ________ would have been located near water. • ...
ISA-VESIT CROSSWORD 2022-02-02
Across
- What is the name of India’s first indigenous supercomputer developed by CDAC?
- Which IIT has transformed an existing nitrogen plant into an oxygen generator?
- Which satellite is responsible for communication, meteorological services and television broadcasting in India?
- Who is largely responsible for breaking the German Enigma codes and created a test that provided a foundation for artificial intelligence?
- The concentric circles on the platter of hard disk are known as _____
Down
- Which is the programming language used for backend development of Instagram?
- What was the largest social network prior to facebook?
- _____ is the generic term for a collection of private computer networks within an organization.
- Which is the first telecom company in India that demonstrated the operation of the 5G network?
- MOV file extension usually refers to what kind of file?
10 Clues: What was the largest social network prior to facebook? • MOV file extension usually refers to what kind of file? • The concentric circles on the platter of hard disk are known as _____ • Which is the programming language used for backend development of Instagram? • What is the name of India’s first indigenous supercomputer developed by CDAC? • ...
G2 - Ambientes computacionais e Conectividade - 04/04/2022 2022-04-05
Across
- Um byte é formado por 8.
- Local Area Networks, ou Redes Locais.
- Tipo de transmissão de dados que ocorre em um único sentido.
- Qual camada OSI converte o formato do dados recebido pela camada aplicação em um formato comum a ser usado na transmissão.
- Qual topologia descreve o fluxo de dados através da rede.
Down
- Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos.
- Definem como será feita a transmissão de dados e coloca marcações nos dados que estão sendo transmitidos.
- Topologia comum que possui alto poder de expansão.
- Topologia de redes que a utilização da comunicação em um único sentido diminuem as chances de colisão e não há a necessidade de roteamento.
- Tipo de topologia de redes que geralmente possui um Hub no centro da estrutura.
10 Clues: Um byte é formado por 8. • Local Area Networks, ou Redes Locais. • Topologia comum que possui alto poder de expansão. • Qual topologia descreve o fluxo de dados através da rede. • Tipo de transmissão de dados que ocorre em um único sentido. • Tipo de transmissão que ocorre no mesmo meio físico, mas nos dois sentidos. • ...
DATA TRASMISSION 2022-07-07
Across
- a small part of a message / data that is transmitted over a network
- stages in a network that can receive and transmit data packets
- data that can be sent in both directions at the same time (simultaneously)
Down
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that cant be sent in both directions but not at the same time
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check data transferred has been altered or corrupted
- data that can be sent on one direction only
- a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data packets • data that cant be sent in both directions but not at the same time • a small part of a message / data that is transmitted over a network • ...
Business Model Crossword Puzzle 2025-11-13
Across
- Which business model is an agreement that details all rules and expectations for both parties?
- What do franchisees typically benefit from?
- What owner has complete autonomy and control over all aspects of the business, from operations and marketing to pricing and branding?
- Managed services is the practice of what?
- What does the franchisee usually pay for franchisor an initial startup?
- Owning an independent business gives you what type of control?
Down
- Franchising allows business owners to expand their business by what?
- The franchise business model dates to what century?
- What type of business model is outsourced service agreement where a third-party provider takes responsibility for managing and operating specific business functions for a client?
- Franchising is often recommended to what type of business owners?
10 Clues: Managed services is the practice of what? • What do franchisees typically benefit from? • The franchise business model dates to what century? • Owning an independent business gives you what type of control? • Franchising is often recommended to what type of business owners? • Franchising allows business owners to expand their business by what? • ...
How Aware Are You? 2025-09-12
Across
- Verifying the identity of a user, often using a username and password.
- A fake website designed to steal personal information.
- The practice of protecting systems and networks from digital attacks.
- A program that replicates itself and spreads to other computers.
- A software that monitors and blocks unauthorized access to a computer network.
- A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
- A string of characters used to log in to a system, it should be unique and complex.
- Adding a second layer of verification beyond a password, often a code sent to your phone
- The"lock" icon in a browser's address bar indicates a secure connection using this .
- A type of malware that blocks access to your data until a sum of money is paid.
10 Clues: A fake website designed to steal personal information. • A program that replicates itself and spreads to other computers. • The practice of protecting systems and networks from digital attacks. • Verifying the identity of a user, often using a username and password. • A software that monitors and blocks unauthorized access to a computer network. • ...
computer science 2020-12-09
Across
- give an authority order
- a folder or box for holding loose papers that are typically arranged a difference
- its a corona that can contact everybody
- browser is a software application for accessing information on the world wide web.
- the amount of something produced by a person,machine,industry
- an island town or city
- device is a piece of computer device hardware equipment wich converts information
- storage cloud computing model thatstores data and information
- a person or thing that provides commonly
- something remmembered from the past
- annoy or bother someone
- local area network is a collection of devices together
- software thats designed to dirupt and damage
Down
- a small sweet cake typically round and flat and having a crisp flat between chewy textures
- wireless fidelity that can connect to a radio using waves without needing to use wires
- copy data from a computer system to another typically over internet
- devices a piece of equipment used to provide data and control signals into a information processing system as computer
- bar a long thin section at the edge of a computer
- process in restarting a computer
- a wall designed whit fire
- network is a group of networks that uses a set of communications
- a act or instance of booting a computer
22 Clues: an island town or city • give an authority order • annoy or bother someone • a wall designed whit fire • process in restarting a computer • something remmembered from the past • its a corona that can contact everybody • a act or instance of booting a computer • a person or thing that provides commonly • software thats designed to dirupt and damage • ...
WWI Crossword Puzzle 2022-05-27
Across
- Nations pride
- One of the first countries to surrender
- First full-scale offensive with tanks
- When all resources are devoted to war
- Russian leaving war
- Type of warfare with networks
- Warfare to sink any ship
- Dropping bombs on important places
- Continent where fighting was in Egypt
- Who went to war
- Where fighting of Germans and Russians happened
- First aircraft used
- Words for deaths
- Treaty from Russia to Germany
- Where Germans sent Zimmermann note
- Note from Germans to Mexico
- Goods needed for war
- Battle to stop advances of Germans
Down
- Big vehicles combating trench warfare
- Another word for planes
- He stepped down because of revolt in Germany
- German submarine
- First war that included use of planes
- Only country/continent involved
- Improved weapon used by soldiers
- First US Marines in WWI combat
- Where most of the fighting happened
- Popular way to recruit
- Plan to win
- Land between opposing sides
- A chemical warfare
- To strongly go against
- "Big Push" battle
- Fire weapon, used in trenches
- Longest battle in WWI
- Person who offered truce to Germany
- US continent
- French plan to retake
- Who replaced men in factories
- Battle for Germans to attack and frighten French
40 Clues: Plan to win • US continent • Nations pride • Who went to war • German submarine • Words for deaths • "Big Push" battle • A chemical warfare • Russian leaving war • First aircraft used • Goods needed for war • Longest battle in WWI • French plan to retake • Popular way to recruit • To strongly go against • Another word for planes • Warfare to sink any ship • Land between opposing sides • ...
Tech Terms 2022-11-28
Across
- To copy data from one system to another
- Portable Document Format
- A storage device containing a read-write mechanism
- a way to back up your hard drive
- unique address that identifies a device on the internet or a local network
- any low-level programming language, consisting of machine language instructions, which are used to control a computer's central processing unit
- starting a computer system again
- short for malicious software
- instructions that enable the hardware to perform tasks
- small files including unique identifiers that web servers send to browsers
- networking device that forwards data packets between computer networks.
- An example of this is Bing or Yahoo
- a family of wired computer networking technologies
- An example of this is Firefox or Google Chrome
- A security device that monitors traffic to and from your network
Down
- Monitor or speakers
- Mouse and keyboard
- A group of bits
- Central Processing Unit, The Brains
- to start a computer system
- The physical components of a computer
- Uniform Resource Locator
- HyperText Markup Language
- the software that supports a computer's basic functions.
- a device that converts signals produced by one type of device.
- equal to around 1 million bytes
- A binary digit
27 Clues: A binary digit • A group of bits • Mouse and keyboard • Monitor or speakers • Portable Document Format • Uniform Resource Locator • HyperText Markup Language • to start a computer system • short for malicious software • equal to around 1 million bytes • a way to back up your hard drive • starting a computer system again • Central Processing Unit, The Brains • ...
Technical Concepts Crossword 2020-09-04
Across
- a computer program that modifies another computer program and executes its own code
- a semiconductor device used to amplify or switch electronic signals and electrical power.
- Evil software
- the method by which information is converted into a secret code that hides the information
- a software application for accessing the information on the World Wide Web
- local area network
- a small amount of data sent over a network
- A connected set of networks
- A mutually agreed on the method of communication
Down
- a numeric system that only uses two digits — 0 and 1.
- software with malicious behavior that aims to gather information about a person or organization
- the programs and other operating information used by a computer.
- pretends to be one thing, usually legit software but hides malware inside
- transmission control protocol/Internet protocol used to govern the connection of computer systems to the Internet.
- a word, phrase, or image that you can click on to jump to a new document or a new section within the current document
- Crawler a script that explores the web
- types of malware; ads start popping up
- an interpreted, high-level and general-purpose programming language
- Smart Messaging Service(Can use satellites, emails) also known as message
- Internet service provider
20 Clues: Evil software • local area network • Internet service provider • A connected set of networks • Crawler a script that explores the web • types of malware; ads start popping up • a small amount of data sent over a network • A mutually agreed on the method of communication • a numeric system that only uses two digits — 0 and 1. • ...
Chemistry Chapters 1-9 General Review Part 2 2020-02-10
Across
- an intermolecular force created by the polar ends of some molecules
- the number of protons in an atom
- the heat required to cause a unit rise in the temperature of a unit mass of a given substance
- property used to predict whether a bond is primarily ionic or primarily covalent
- the rule that seems to drive bonding; involves the number 8
- the principle that states that the momentum and position cannot be measured simultaneously
- heat is given off or lost to the surroundings
- when the pressure on a gas increases, its volume _?_
- 0 K or -273.15 C
- the sharing of four electrons (2 pairs)
- type of bond created when electrons are unequally shared between two atoms
- a relatively strong force associated with hydrogen bonded to N, O, or F
Down
- valence shells form from a sea of delocalized electrons
- includes hard substances like diamonds, quartz, and silicon carbide
- PV = nRT
- physical combinations of different substances
- the transfer of electrons from one atom to another
- characterized by the sharing of a pair or pairs of electrons
- substances made from a combination of atoms chemically joined together
- a weak force that exist between all molecules
20 Clues: PV = nRT • 0 K or -273.15 C • the number of protons in an atom • the sharing of four electrons (2 pairs) • physical combinations of different substances • heat is given off or lost to the surroundings • a weak force that exist between all molecules • the transfer of electrons from one atom to another • when the pressure on a gas increases, its volume _?_ • ...
43. 2021-03-19
Across
- It's about old currency notes (7)
- GRASS Crazy King George behind American plant (3-5)
- Old dinasaur from Craggy Hill behind Knock (6)
- Hit mound behind junction (5)
- Sets up sailor bar in American city with first cousin - a man-eater (8)
- It's about former times and a meal we enjoyed then (6)
- Youngster with ape developed a pulse (8)
- One hour with ape misbehaving is a delight (8)
- Clean up what's beneath and behind American city (7)
- NETWORKS Old connections?
- Finishes with alternative comic and works in The Garden with mimics (6)
- Lack of flesh? Not so much, when it's about former queen (8)
- Listen to writer going to American city with worthless old money (8)
- It's about old message to renew old connections (6)
Down
- Bird approaches hill behind American city with mimic (8)
- Part of hunt to persecute someone behind American news (8)
- Colonise Pluto with ape, perhaps (8)
- GEAR Special equipment for police in South American city with great rampaging (4,4)
- ALL In spite of everything, being behind American lines
- Gather outside South American city with lower ranking (8)
- Wall provided a role with mimic in it
- Renew old school ties
- Two presidents behind American attacks (8)
- Little weight behind American news report (8)
24 Clues: Renew old school ties • NETWORKS Old connections? • Hit mound behind junction (5) • It's about old currency notes (7) • Colonise Pluto with ape, perhaps (8) • Wall provided a role with mimic in it • Youngster with ape developed a pulse (8) • Two presidents behind American attacks (8) • Little weight behind American news report (8) • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
M1.4 2023-03-25
Across
- Help to access a computer over unsecured networks safely
- Allows user to view or manage software, for the hardware
- A id for a devices over the network or internet, usually in a string number or alphanumeric string
- A delay
- Help identify a service
- Allow the sending and receiving of data packets over the network and internet
- pieces of information sent to website to hep keep track of users activity and web traffic.
- testing the Wifi speed
- Saves data and information for later use when revisiting a website, which helps increase your web browning speed
- The Name for the devices connected to a network or system
Down
- Make computer resources available over the internet from a paid services
- A program or application that help to edit and compile code
- Allows to connect and print paper from the printer wirelessly
- Keeps track of how much life of the battery is left
- Isolating an environment or an application from other running programs
- Administrative command used to diagnose network issue
- A testing or sample field of a product before release to the public
- Helps hardware to communicate with each other
- Connects to the internet
- A command that allows user to trace network connections in hops
20 Clues: A delay • testing the Wifi speed • Help identify a service • Connects to the internet • Helps hardware to communicate with each other • Keeps track of how much life of the battery is left • Administrative command used to diagnose network issue • Help to access a computer over unsecured networks safely • Allows user to view or manage software, for the hardware • ...
FITAVocab.HBM 2013-05-15
Across
- presentation software program similar to Keynote and Powerpoint, but more abstract
- a file created by a software application
- Example: Windows
- rules and behaviors made to keep individuals safe when online
- an opening in a computer that allows to have more plug-ins
- part of the computer that processes everything
- main circuit board of a computer
- protecting information on computer systems/networks
- Example: printer
- legal means of protecting an author's work
- file format made by WORD that has a smaller chance of getting a virus
- digital, online, accesible on the digital world
- selection of editing and drawing/art tools on your computer
- file format made by Microsoft that can't be viewed by all programs
Down
- a file that serves as a starting place for a new document
- a software that runs on your computer
- the short term memory of a computer
- to start up a computer
- collection of data stored in one unit
- code of positive conduct online
- a piece of equipment that provides input and output for the computer
- a web-based program that saves your photos, docs, and music
- data transmission
- Example: keyboard
- file format made by ADOBE that is viewable by all programs
25 Clues: Example: Windows • Example: printer • data transmission • Example: keyboard • to start up a computer • code of positive conduct online • main circuit board of a computer • the short term memory of a computer • a software that runs on your computer • collection of data stored in one unit • a file created by a software application • legal means of protecting an author's work • ...
VOCAB REVIEW 2016-02-25
Across
- maximum particle size
- pattern: commonly encountered drainage pattern
- load: streams carry dissolved substances
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- slow flow
- leaping movement of sand
- separate from the drainage basin of another by a imaginary line
- flat area about level with top of the channel
- fast flow
- tangled networks
- basin: land area that contributes water to a river system
Down
- when streams diverge from a central area likes pokes from the hub of a wheel
- place where the ground slopes up/down
- load: fine particles suspended in water
- level: most streams is global sea level
- loop-like bend in a stream channel
- quantity of water passing by a point on the steamboat
- absorbed by plants, which the release it into the atmosphere
- maximum load
- bank:river cliff
- cycle: unending circulation of H2O
- the rate of rainfall exceeds earth's ability to absorb
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- process by which liquid water changer into water vapour
- gen. term for sediment deposited by streams
- and corner frequency
- pattern: exhibits many right angle bends
- bars:arcuate deposit of sand along the in inside of bend
- load: course particles move along streambed
29 Clues: slow flow • fast flow • maximum load • bank:river cliff • tangled networks • and corner frequency • maximum particle size • leaping movement of sand • loop-like bend in a stream channel • cycle: unending circulation of H2O • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
DigiCit Vocab Crossword Puzzle- Ariana & Evelyn 2016-05-27
Across
- A law to protect your creative work
- accept or admit the existence or truth of.
- Standards on which you judge
- Unexpected/ unknown identity
- media digitized content that can be transmitted over the internet or computer networks.
- Who are you
- a general statement or concept obtained by inference from specific cases.
- To make something bigger than it actually is
- To carefully examine
- Repetitive behaviors to hurt someone
- Drawings, Illustrations, symbols
- speech Verbal attack against race, appearance, religion, ability, gender, sexual orientation
Down
- use Ability to use a small amount of copyrighted work with no permission
- A website or program that collects related items of content and display them or link to them
- The result of your choices/ actions
- What you identify as; male, female, fluent
- Unsuitable; not proper
- All Caps
- Understand and can feel the emotion of what someone is experiencing
- Someone who witnessed cyberbullying and does nothing about it
- A regularly updated website or webpage, typically one run by an individual or small group, that is written in an informal or conversational style
- An icon or figure representing a particular person in a computer game
- work anything you have originated
- Trick, lie
- a settled or regular tendency or practice, especially one that is hard to give up.
25 Clues: All Caps • Trick, lie • Who are you • To carefully examine • Unsuitable; not proper • Standards on which you judge • Unexpected/ unknown identity • Drawings, Illustrations, symbols • work anything you have originated • A law to protect your creative work • The result of your choices/ actions • Repetitive behaviors to hurt someone • accept or admit the existence or truth of. • ...
Jose Daniel Saenz Serna 2022-05-09
Across
- is a programming language and computing platform
- a hyperlink or hyperlink.
- physical network interface.
- es el conjunto de programas de un sistema informático que gestiona los recursos de hardware.
- is a computer peripheral output device that enables a permanent range of text or graphic documents to be produced.
- logical digital equipment interconnection device.
- It is the main social network that exists in the world.
- intelligence expressed by machines.
Down
- is a computer application designed to be run on smartphones.
- It is a unique identifier that each manufacturer assigns to the network card of its devices.
- It is a computer network that allows communication and data exchange.
- a device that allows networks to interconnect with a different prefix in its IP address.
- is a Bitcoin block exploration service
- Memory for reading only, nothing can be recorded in this memory and its information is already recorded at the factory.
- set of all machines that have been created.
- Science that studies the management of information with electronic means.
- To write in text in Windows we use the program.
- tangible part of the computer.
- It is a Windows XP program.
- It is a set of computers capable of attending to the requests of a client and returning a response.
20 Clues: a hyperlink or hyperlink. • physical network interface. • It is a Windows XP program. • tangible part of the computer. • intelligence expressed by machines. • is a Bitcoin block exploration service • set of all machines that have been created. • To write in text in Windows we use the program. • is a programming language and computing platform • ...
Credit Crossword 2022-03-14
Across
- when the bank takes possession of your house
- a loan for your home
- loans with extreme interest rates if you dont pay them back in time
- when you owe money
- things you earn by using your credit card
- the money that builds up over time
- the type of credit that is on credit cards
- what you pay with that takes money directly from your account
- your history of your credit card spendings and payments
- close ended credit accounts
- Renting for a car
Down
- a credit card reward where you get money back
- one of the two credit card networks that will issue credit cards
- when your loan isnt tied to an asset
- interest rate that doesnt change
- a loan for a vehicle
- interest rate that changes
- what you take out to get money now
- the only source of revolving credit
- what you use to pay for something under $10
- your rating that you have that credit companies look at before giving you a loan
- a loan you take out for yourself
- points that you get for using your credit card
- when you put a security deposit on your card
- the credit card set up that allows parents to pay if a student can't
25 Clues: Renting for a car • when you owe money • a loan for your home • a loan for a vehicle • interest rate that changes • close ended credit accounts • interest rate that doesnt change • a loan you take out for yourself • what you take out to get money now • the money that builds up over time • the only source of revolving credit • when your loan isnt tied to an asset • ...
Unit 5 Lab 2023-10-23
Across
- Cardiovascular disease.
- A test that is done while you are exercising.
- Root word for small vessels.
- Cardiac rhythm management
- Any abnormal rhythm of the heart: too slow, too fast, or at an irregular beat or tempo.
- Peripheral vascular disease
- This reads your heart’s electrical impulses.
- This gives a picture of your heart using ultrasound, a type of X-ray
- Root word for heart.
- Networks of small vessels that perfuse tissues.
- Thin folds of the endocardium with a core of dense connective tissue.
- Used to measure the substances and show if, and how much of, your heart muscle has been damaged.
- Pumps blood through the cardiovascular system.
Down
- Vessels that deliver blood to tissues.
- A special dye is injected into your coronary arteries and an X-ray is taken.
- The heart not pumping blood as well as it should.
- Occurs because of blockage in a blood vessel that delivers blood and oxygen to the brain.
- The term for diseases of the heart muscle.
- Root word for aorta.
- When the heart muscle is cut off from the oxygen it needs to operate.
- Vessels that return blood to the heart.
- Transient ischemic attack
- Atrial fibrillation
- Root word for disease.
- Root word for artery.
25 Clues: Atrial fibrillation • Root word for aorta. • Root word for heart. • Root word for artery. • Root word for disease. • Cardiovascular disease. • Cardiac rhythm management • Transient ischemic attack • Peripheral vascular disease • Root word for small vessels. • Vessels that deliver blood to tissues. • Vessels that return blood to the heart. • The term for diseases of the heart muscle. • ...
RU ITEC411 Failures and Errors in Computer Systems 2023-12-01
Across
- A person who writes and develops computer programs, using a programming language.
- Outdated computer systems, software, or technology that is still used.
- Manipulation or setup in a way to achieve a specific outcome.
- Standardized rules and conventions that govern communication between systems.
- The process of verifying the identity of a user or device.
- An individual who interacts with a computer system.
- Potential dangers or risks to computer systems, networks, and data.
- The complete breakdown or malfunction of a computer system.
- The process of managing and overseeing operations and maintenance of computer systems.
- Additional devices connected to a computer, such as printers, scanners, or external drives.
Down
- An expert or specialist in the field of computers.
- A design or system that incorporates measures to prevent the impact of a mistake.
- A flaw or unintended error in a software program that causes weird behavior.
- Information used to verify the identity of a user.
- A structured collection of data, often used for efficient data management.
- Technique used by attackers to take advantage of vulnerabilities in a system.
- A person who has acquired knowledge and skills through formal education.
- Systems whose failures could result in great harm.
- The unauthorized use of someone else's personal information.
- A Mistake or fault in a computer program.
20 Clues: A Mistake or fault in a computer program. • An expert or specialist in the field of computers. • Information used to verify the identity of a user. • Systems whose failures could result in great harm. • An individual who interacts with a computer system. • The process of verifying the identity of a user or device. • ...
Networking n.1 2023-11-29
Across
- It can be Variable length or fixed length
- It happens when transmissions occur at the same time
- The amount of data that can be transferred from one point to another in a given time period
- Third parameter of the Cisco command for entering static routes
- A tool to check network connectivity
- Cisco command to deactivate an interface on the router
- Device that forwards data packets to the appropriate parts of a computer network
- Cisco command for changing the name of a device
- A device for connecting multiple network devices and multiple segments
- Automatic switching to a backup computer system in the event of system failure
Down
- It can be MAC or IP
- Formatted unit of data sent across networks
- When it becomes zero, the packet is discarded
- Medium Access Protocol, which can be of the CA (Collision Avoidance) or CD (Collision Detection) type
- Device which converts between digital and analogue signals, e.g. telephone line to computer
- Software or hardware that requests services from a server
- IP .... Cisco command for entering static routes
- Ethernet procedure used to handle collisions during transmissions
- A set of rules or standards that control communication between devices
- Software that provides services to a client, or the hardware that is running it
20 Clues: It can be MAC or IP • A tool to check network connectivity • It can be Variable length or fixed length • Formatted unit of data sent across networks • When it becomes zero, the packet is discarded • Cisco command for changing the name of a device • IP .... Cisco command for entering static routes • It happens when transmissions occur at the same time • ...
Powered Up 2024-02-01
Across
- see energy from the sun.
- a generic term for non-renewable energy sources such as coal, coal products, natural gas, derived gas, crude oil, petroleum products and non-renewable wastes
- a pipe or hole through which water or gas may escape.
- A standard desktop computer
- to produce electricity.
- a computer where information is stored that’s connected to a network of other computers.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- changes the electric current’s direction.
- a worldwide system of computer networks
- a person who designs, builds, or maintains engines, machines, or public works.
Down
- make smaller or less in amount, degree, or size.
- Light from the sunel
- the atoms that make up the material’s surface.
- is too remote to access electricity from the regular power grid.
- a way of generating electricity by harnessing the sun’s rays.
- a form of electric current that flows in only one direction.
- a container consisting of one or more cells, in which chemical energy is converted into electricity and used as a source of power.
- the devices that would convert sunlight into electricity.
- a form of energy resulting from the existence of charged
- not by means of the internet or other computer network.
20 Clues: Light from the sunel • to produce electricity. • see energy from the sun. • A standard desktop computer • a worldwide system of computer networks • changes the electric current’s direction. • the atoms that make up the material’s surface. • make smaller or less in amount, degree, or size. • a pipe or hole through which water or gas may escape. • ...
Internet Business Associate 2024-02-27
Across
- A public key encryption algorithm
- A server that mediates traffic between a protected network and the Internet.
- A machine that shares its resources among clients
- a concept or collection of symbols associated with a product, service or person
- The practice of categorizing online content through tags
- An encrypted file transfer protocol
- A web page that integrates content and scripts from multiple web sites to create new applications
- A computing paradigm in which users can use software over the Internet
- A worldwide network of interconnected networks
- A web... who creates the overview plan of a sites development
- Data processed by protocols so it can be sent across a network
- Encrypting and decrypting email messages
Down
- A system that maps uniquely hierarchical names to specific Internet addresses
- A Web 2.0 programming language that consists of existing technologies
- A set of instructions or rules
- A problem solving model in which a task is given to a group of people rather than one.
- A measurement of memory needed to store one 8 bit character
- a computing language used to program Web 1.0
- An individual computer on a network
- Modulator Demodulator
- The integration of telephony and data technologies
- A circuit board that enables a computer to connect to a network
- Outgoing mail server
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Unit 4 Review APCSP 2024-03-26
Across
- Method of encryption that does not require a secure channel to exchange keys
- Pop Up Advertisements
- Identifying and correcting errors and inconsistencies in data
- Attempt to trick a user into divulging their private information
- software intended to damage a computing system or to take partial control over its operation
- Steals data and sends it back to malware creators
- Social Media,Phones, Laptops, WWW, email are all types of...
- Name, birthday, social security, address, etc.
- System that monitors incoming and outgoing network traffic
- What people look for when analyzing big data?
Down
- Exhausting all possible combinations
- Wireless access point that gives unauthorized access to secure networks.
- Finding solutions to problems that would otherwise take forever to solve using only human capabilities
- Practice of engaging a group for a common goal
- Pair of keys used to encrypt and decrypt
- Protects a computer by scanning files and identifying malware
- The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- Holding an computer hostage by encrypting data
- Attacks that cause a website to slow down by flooding it with requests
- Authentication that requires at least two steps to unlock protected information
20 Clues: Pop Up Advertisements • Exhausting all possible combinations • Pair of keys used to encrypt and decrypt • What people look for when analyzing big data? • Practice of engaging a group for a common goal • Holding an computer hostage by encrypting data • Name, birthday, social security, address, etc. • Steals data and sends it back to malware creators • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
IITA List of Programme KPIs -(2024 - 2030) 2025-03-17
Across
- Number of people trained in group trainings on IITA products, including researchers, farmers, and others.
- Number of proposals developed to support gender, youth, and social participation.
- Number of active partnerships with NARES and external agricultural research institutes.
- Number of IITA products incorporated into product catalogs (e.g., TAAT, AICCRA).
- Number of outreach events promoting collaboration with NGOs, IFIs, etc.
- Percentage of IITA products adopted by partners for large-scale implementation.
- Number of new or improved crop varieties released.
- Annual rate of genetic improvement in crops, measured as a percentage.
- Scientific publications and findings contributing to agricultural knowledge.
- Participation in global discussions, conferences, and research networks.
- Evaluating the influence of IITA’s projects on agricultural development.
Down
- Percentage of projects that address diet, health, and nutrition-related objectives.
- Number of peer-reviewed papers made available through open-access repositories.
- Research products or services reaching end-users effectively.
- Ensuring long-term viability of agricultural innovations and research.
- Number of students trained, disaggregated by qualification type (M.Sc. or Ph.D.) and gender.
- The core field of IITA’s research, focused on food security and development.
- Number of papers published in journals with an impact factor greater than 10.
- Number of plant genetic accessions available and safely duplicated by crop.
- Amount of financial resources secured for research and product delivery.
20 Clues: Number of new or improved crop varieties released. • Research products or services reaching end-users effectively. • Ensuring long-term viability of agricultural innovations and research. • Annual rate of genetic improvement in crops, measured as a percentage. • Number of outreach events promoting collaboration with NGOs, IFIs, etc. • ...
Chapter 10 Communication 2025-09-28
Across
- — Everyone sees who was copied.
- — Any unsolicited email sent over the internet.
- — A worldwide collection of interconnected networks.
- — Websites that allow any user to create and edit pages with a web browser.
- networking sites — Sites for building online communities with shared interests and activities.
- — The address of a web page on the WWW.
- — Personal internet journals with observations and links.
- — The recipient’s name is hidden from everyone else.
- — A computer network based on internet technology but for internal organisational needs.
- — A part of the internet which users can access using web browser software.
- — Sends the original message and all previous history to a new person.
- — Software that displays a web page on a computer screen.
Down
- — The language used in emails should follow an acceptable code of practice.
- — Online discussion boards moderated by an administrator.
- — Allow intranets to be extended outside the organisation.
- — Send out multiple emails if addresses are grouped together under a single name.
- — A company that provides internet access, usually for a monthly fee.
- — Contain a combination of letters, numbers, and other symbols (e.g., Sy12@#TT90kj=0).
- — A shortened form of the phrase "internet etiquette," meaning respect and courtesy online.
- — The file is visible and available for the recipient to download.
20 Clues: — Everyone sees who was copied. • — The address of a web page on the WWW. • — Any unsolicited email sent over the internet. • — A worldwide collection of interconnected networks. • — The recipient’s name is hidden from everyone else. • — Online discussion boards moderated by an administrator. • — Personal internet journals with observations and links. • ...
Rykov's Crossword 2025-06-07
Across
- Tech reducing human effort in business
- Fixing errors in software
- First line of defense in security
- Driving force behind tech and business merging
- Directs traffic in enterprise networks
- Provides managed services
- Tracks health or security activity
- Growing media startup format
- Concern in surveillance debates
- Merging systems for seamless function
- Virtual boundary for location alerts
- Writes code for software solutions
- Pending tasks in Agile development
- Key to user-friendly design
- Formalizes service expectations
- Scramble data for protection
- Society embracing new tech
- Extending a service agreement
- Risk in digital transactions
Down
- Plan for project milestones
- Safeguard against data loss
- When systems are unexpectedly offline
- Radical change from new tech adoption
- Combined power of converging industries
- Modern way to watch television
- Pocket-sized tech revolutionizing life
- Consequence for missing SLA terms
- Mobile payments speeding up retail
- King in digital media
- Backbone of data centers
- Threat to banking and data safety
- Bridge between phone and laptop
- Device reading barcodes in stores
- Measuring user interaction
- Blocks unauthorized network access
- Remote doctor visits via tech
- Data capacity of a network
- Meeting regulations in healthcare
- Critical project milestone
- Billing for services rendered
40 Clues: King in digital media • Backbone of data centers • Fixing errors in software • Provides managed services • Measuring user interaction • Data capacity of a network • Critical project milestone • Society embracing new tech • Plan for project milestones • Safeguard against data loss • Key to user-friendly design • Growing media startup format • Scramble data for protection • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital content
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
communication apps assignment 2026-02-19
Across
- a personal email center hats made by microsoft
- it a instant app another way to send a message through a computer
- review networks people share out their view on stuff
- its designed for virtual meets and online events
- its a AI powered cloud base
- messages your close friends on a app
- send mssaes through a app so you can chat and call with your friends if you cant use normal messenger
- help do calls for work ect
- it helps make posters assignment media posts
- its a friendly business app
- a message that turns into a word or printed form
- sends instant messages to people
- it designs stuff for websites
Down
- network sites helps you find your talents
- help yo find things out searches things for you
- where you send a message through not your number
- its a open source management system
- finds people with similar thing and to make new friends
- for messaging and audio talk
- another call app that shows your face except its for more phones
- a apple app that helps you call people while showing your face
- sends messages through your computer
- another showing face call app but for all phones not just apple
- a website builder
24 Clues: a website builder • help do calls for work ect • its a AI powered cloud base • its a friendly business app • for messaging and audio talk • it designs stuff for websites • sends instant messages to people • its a open source management system • messages your close friends on a app • sends messages through your computer • it helps make posters assignment media posts • ...
Foundation of Security and Cybercrime 2024-11-19
Across
- anticipation of security incidents and planning for measures to be taken.
- an individualwho breaks into computer systems to steal, change, or destroy information
- unauthorized access of or interference with computer systems, servers, or other information and communication systems
- the use of electronic communication to bully a person
- an act or instance of using/closely imitating the language and thoughts of another author without authorization
- personnel, hardware, programs, networks, and data
- malicious program disguised as or embedded within legitimate software
- state of wel-being of information or infrastructure
- action taken in advance to protect the system against potential threats or dangers.
Down
- common type of online fraud
- applications on the computers and operating systems
- fraudulent practice of sending emails purporting to be someone reputable
- ensuring that the information is accessible to authorized persons when required without delay
- includes creating backup copies, malware management, and ensuring sufficient space and memory.
- malicious software
- wireless fidelity
- an assurance for which someone cannot deny something
- an action or event with potential to compromise and/or violate security.
- exclusive legal right to print, publish, perform, film, or record, and to authorize others to do the same.
- mass distribution of unsolicited messages, advertisements, and/or pornogaphy
20 Clues: wireless fidelity • malicious software • common type of online fraud • personnel, hardware, programs, networks, and data • applications on the computers and operating systems • state of wel-being of information or infrastructure • an assurance for which someone cannot deny something • the use of electronic communication to bully a person • ...
The Internet 2025-02-07
Across
- The amount of data that can be sent over an internet connection in a given time.
- A high-speed internet connection that is always on.
- A device that connects multiple devices to the internet.
- The process of converting data into a secret code to protect it.
- A company that provides internet access.
- Software that secretly collects information from a device.
- A security system that blocks unauthorized access to a network.
- A system that translates website names into IP addresses.
Down
- Protection of internet-connected systems from attacks.
- Breach When private data is accessed without permission.
- Backbone The high-speed global infrastructure that connects networks and data centers.
- Authentication A security process requiring two steps to log in.
- Small files stored on a device to track user activity online.
- A service that encrypts internet connections for privacy.
- Malicious software designed to harm or steal information.
- A device that connects to the internet through a service provider.
- Address A unique number assigned to each device on the internet.
- A scam where attackers trick users into revealing personal information.
- A wireless network that allows devices to connect to the internet.
- Computing Storing and accessing data over the internet instead of a local device.
20 Clues: A company that provides internet access. • A high-speed internet connection that is always on. • Protection of internet-connected systems from attacks. • Breach When private data is accessed without permission. • A device that connects multiple devices to the internet. • A service that encrypts internet connections for privacy. • ...
Chapter 3 2025-02-25
Across
- public Wifi network called _____
- systems use analog techniques to encode binary
- point to point topologies are used with wireless networks called _____
- The error checking code in an Ethernet Frame's trailer
- installed in a physical bus
- ___access method, in which an acknowledgment is required for every packet sent
- when electricity bounces off the end of a cable and back in the other direction
- occurs if two or more devices on the same medium transmit simultaneously
- signals arriving at different times
- the actual application to application data transfer speed is the ___
Down
- solid objects absorb radio signals, causing them to ___
- The extra 5 MB comes in the form of packet and frame headers, acknowledgments, and retransmissions, known as ____
- cabling used to communicate between LANs or between switches
- ______ Ethernet, defined by IEEE 802.3i
- the path data travels between computers on a network is considered the network’s ____
- the simplest topology
- transmission method sends digital signals in which each bit of data is a pulse of electricity
- wireless networking, known as Wireless Fidelity
- network technology provides reliable transport of data, slow to current standards
- The 802.11n standard takes much of what works in the earlier standards and improves on it by adding ____ antennas
20 Clues: the simplest topology • installed in a physical bus • public Wifi network called _____ • signals arriving at different times • ______ Ethernet, defined by IEEE 802.3i • systems use analog techniques to encode binary • wireless networking, known as Wireless Fidelity • The error checking code in an Ethernet Frame's trailer • ...
Tech Terms 3 2025-04-16
Across
- Wide Web Interconected public webpages
- Right protecting creations from theft
- Computer programming language
- Global network of billions of devices
- Program manages access to a resource
- Read-only memory
- Smallest unit of data
- File that lets you share documents
- Gap of who has internet access and who doesn't
- Open Source Software
- start or restarting a computer
- Data that is 8 binary digits long
- 1 million bytes
- Random access memory
- Language for creating web pages
- Files of imformation that web server send to web browser
- Regularly updated website
- Sending from one device to another
- Converting data into a code
- Internal or External componet that stores data
Down
- 3-dimentional environment
- Connects 2 or more networks
- local area network
- Block unauthorized access
- What a computer does
- that manages hardware and software resources
- Web browser
- Central processing unit
- Network address for you computer
- Output Device
- Search engine
- Backup information on a computer
- Domain name system
- Converts data from digital format to one that is suitable for an analog transmission
- Main printed circuit board
- Input Device
- program to prevent viruses
- Address of resource on the internet
- Information used to trace indentities
39 Clues: Web browser • Input Device • Output Device • Search engine • 1 million bytes • Read-only memory • local area network • Domain name system • What a computer does • Open Source Software • Random access memory • Smallest unit of data • Central processing unit • 3-dimentional environment • Block unauthorized access • Regularly updated website • Main printed circuit board • program to prevent viruses • ...
Chapter 7 Security Plus 2024-10-03
Across
- An access control scheme that is the least restrictive
- injects stolen username and password across multiple websites
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
- small device that looks like a thumb drive which can be used for verification
- enables users to access a network resource through a directory service
- small number of passwords used when trying several different user accounts
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- features and characteristics of the individual
- Removing user accounts
- An access control scheme that is the most restrictive
- password attack attempting thousands of combinations per second
Down
- Single sign-on for networks owned by different organizations
- software designed to break passwords
- Using more than one type of authentication credential
- Requiring the user to provide proof that they are the unique user.
- Granting access that is limited
- key stretching algorithms
- Standard preconfigured passwords
- evidence or proof of something
- allows secure web domains to exchange user authentication and authorization data
- The point in time when a password is no longer valid
- An open-source federation framework
- provide control over user validation and the resources that may be accessed
25 Clues: Removing user accounts • key stretching algorithms • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • software designed to break passwords • A key pair “burned” into a security key • The ability of systems to exchange information • features and characteristics of the individual • ...
Electrical 2024-07-24
Across
- The generation of an electromotive force (EMF) in a conductor due to changes in magnetic field.
- Booster, Transformer used to control real power on parallel networks.
- Group, Defines the phase difference primary to secondary
- Cosine rule states what? divided by the hypotenuse
- A law which says current is the voltage divided by the resistance
- √2 divided by RMS Voltage
- The opposition to AC current
- (left Rule) Magnetic field points away, current direction is 90 degrees right, which direction is the FORCE
- Describes generation such as wind and hydro
- Physicist who said the sum of currents into a node equal the sum of currents leaving the node
- Changer, Mechanism which adjusts turns ratio in a transformer
- Odd multiples of the 3rd harmonic
Down
- Type of fault with zero resistance between conductors
- Normal direction of phase rotation
- Sinusoidal wave an Integer multiple of the fundamental
- Percentage change in output voltage from no load to full load
- Voltage measured between live and neutral
- Factor Term describes the ratio between active and apparent power
- Type of fault through a normally insulating medium, has resistance
- Factor, The rise (ratio) phase-to-ground voltage (healthy phases) during ground fault
- Name for power that is true/real and measured in watts
21 Clues: √2 divided by RMS Voltage • The opposition to AC current • Odd multiples of the 3rd harmonic • Normal direction of phase rotation • Voltage measured between live and neutral • Describes generation such as wind and hydro • Cosine rule states what? divided by the hypotenuse • Type of fault with zero resistance between conductors • ...
Chapter 6 - Innovation through Artificial Intelligence 2024-07-11
Across
- Filtering AI algorithms filtering emails to protect users.
- Language Processing (NLP) Deals with computer-human interaction using language.
- Assistant A type of personal assistant powered by AI.
- Essential for machine learning to identify patterns and make decisions.
- A context where AI can predict traffic conditions.
- Recognition: Siri is an example of this technology.
- A concern regarding AI's impact on human employment.
- systems: Utilize human knowledge to solve problems requiring expertise.
- Impacted by AI, as discussed in the lecture on AI's societal effects.
- What expert systems aim to improve in workplaces.
- An essential component of AI where systems improve from experience.
- Vision: Allows computers to interpret visual information.
Down
- Google's AI for search query analysis.
- Learning A technique that automates analytical model building.
- The next lecture topic following Innovation through AI.
- Using AI to monitor environments through video.
- A wide use of AI systems in various industries.
- Text Technology that suggests words during typing.
- Building machines that perform physical tasks.
- A company behind RankBrain and major advancements in AI.
- Networks: A type of network involved in machine learning.
- Media Services enhanced by AI for better user engagement.
- A robot assisting with social media interaction and health reminders.
- Facebook's facial recognition technology.
- Therapy Can be administered through expert systems.
25 Clues: Google's AI for search query analysis. • Facebook's facial recognition technology. • Building machines that perform physical tasks. • Using AI to monitor environments through video. • A wide use of AI systems in various industries. • What expert systems aim to improve in workplaces. • Text Technology that suggests words during typing. • ...
crossword for AP world vocab 2025-10-31
Across
- paper money
- an agricultural expression of hinduism and largest religious structure in the premodern world
- inns located along the trade routes from east med to china
- encompassed 25000 square miles and linked some 150 outlying settlements to the main centers
- Swahili civilization participated in the larger Indian ocean
- like Malacca and the fronteir of expanding the Islamic world
- widely traveled Arab scholar, Marchant, and public official
- traveling poets. musicians, and storytellers who maintain oral tradition of west africa
- a symbol than daily activity
Down
- a north American chiefdom that lay at the center of widespread trading networks
- increased food production and led to population growth and organization
- ruler of Mali and possibly the richest man ever
- had their own neighborhoods in the city which act as intermediaries between government and the foreign merchants
- rejected the religous aspects of Buddhism and daoism but appreciated the might moral standards
- amitabna ensured rebirth as a heavenly realm
- captain that sought to enroll distant people and states
- commerate the beginning of Islamic rule in the region after defeating the last Hindu ruler
- used their triangular sails sewing boards of hull together
- could go 10 days without water and cross the Sahara better
- the Chinese chan school of Buddhism became zen in japan
20 Clues: paper money • a symbol than daily activity • amitabna ensured rebirth as a heavenly realm • ruler of Mali and possibly the richest man ever • captain that sought to enroll distant people and states • the Chinese chan school of Buddhism became zen in japan • inns located along the trade routes from east med to china • ...
Technology in education 2025-10-13
Across
- Using devices students bring from home to school
- Storing and accessing files remotely rather than locally.
- Short for Artificial Intelligence
- Remote delivery of audio/video lessons in real time or recorded
- Popular format of online courses often open to many learners
- Digital place where students collect evidence of learning
- Core term for information transmitted via networks — the global network
- Skills for finding, evaluating, using digital information
- Use of data to improve teaching and learning
- Practice of making learning fun with game elements.
- Learning model where students watch lectures at home, do activities in class.
- Teaching/learning through the internet — two words often hyphenated
Down
- Measurement of student performance; tests and feedback.
- Connecting and working together online; team learning.
- School system software that manages student records
- Platform schools use to host courses, materials, grades
- Technology-driven physical machines used in STEM learning.
- Technology that overlays digital info on the real world
- Course material delivered as downloadable, editable files
- Online collections of openly licensed teaching materials
- Hands-on mix of science, tech, engineering, arts and math in education.
- Process of turning lessons into short video/audio clips teachers can share.
- Small software programs on phones; short for applications
- Programming activity often taught to students
- Using simulated environments for immersive learning
25 Clues: Short for Artificial Intelligence • Use of data to improve teaching and learning • Programming activity often taught to students • Using devices students bring from home to school • School system software that manages student records • Practice of making learning fun with game elements. • Using simulated environments for immersive learning • ...
ASEANPOL 2025-09-22
Across
- Efforts to stop acts of terror
- The systematic process of gathering, documenting, and using data in investigations
- Illegal drug production, distribution, or use
- Working jointly, especially by sharing information or resources
- Abbreviation for ASEAN Police — ASEAN____
- Crime involving money-based wrongdoing
- Fundamental entitlements and freedoms of people
- Information especially secret or confidential used for strategic purposes
- Association of Southeast Asian Nations
- Illegally importing or exporting goods
- Teaching or preparing members in skills or knowledge
- Large-scale criminal enterprises (plural)
- Efforts to stop bad things before they happen
- The act of working together toward a common goal
Down
- Crime that crosses digital networks
- Official inquiries or probes
- An area or part of the world
- Countries that belong to a group
- Ability, skills, or resources that allow action
- The carrying out of planned tasks or missions
- Across multiple nations
- Relating to boundaries between countries
- The legal authority to make decisions or judgments
- A planned set of actions toward achieving something
- Material proof presented in legal cases
- International police organization
- The action of transporting illegal goods or people
- State of being free from danger or threats
- Capital city where many ASEANAPOL meetings are held
- Formal agreement or rules governing behavior
30 Clues: Across multiple nations • Official inquiries or probes • An area or part of the world • Efforts to stop acts of terror • Countries that belong to a group • International police organization • Crime that crosses digital networks • Crime involving money-based wrongdoing • Association of Southeast Asian Nations • Illegally importing or exporting goods • ...
Cyber Crossword 2025-10-30
Across
- crime investigation; comes after “digital”
- attack stage involving traversal between systems
- slang term for “hacked”
- attack component that performs the target malicious action
- to gain attacker presence on a system
- field focusing on protecting computers
- attack stage where NMAP may be used
- facility whose analysts may use a SIEM
- investigation of system and network records
- principle of least ___
- phrase an attacker says after gaining access
- network layer protocol with pings
- THE defensive cyber club
- fancy term for Google-fu
- smartcards using close-proximity communication
- fun term for a CDRU member
- evidence of malicious activity
- evil computer program
Down
- short form of “covered writing”
- comes before “base” or “science”
- a tantalizing trap for attackers
- engineering type that works on people
- act of sending a malicious email
- the shield to red’s sword
- authorized cyberattack to identify vulnerabilities
- proactive defense, or our theme this semester
- bypassing physical security devices without a key
- IT person in charge of organization computers
- act of smuggling data from a system
- common term for offensive security person
- short form of “secret writing”
- often a network packet filter
- collections of connected computers
- either 0 or 1
34 Clues: either 0 or 1 • evil computer program • principle of least ___ • slang term for “hacked” • THE defensive cyber club • fancy term for Google-fu • the shield to red’s sword • fun term for a CDRU member • often a network packet filter • short form of “secret writing” • evidence of malicious activity • short form of “covered writing” • comes before “base” or “science” • ...
urmumsbum 2021-10-29
Across
- what is the acronym for Plain Old Telephone Service?
- what is re-booting a device either with a cold or warm boot called?
- what is the type of file that organises other files in a hierarchal structure?
- what is it called when you turn off a computer by pressing and holding down the power button until the system turns off? (two words)
- what is the acronym for 'post office protocol'?
- what is the device that routes traffic between networks?
Down
- what is a one-to-one connection? (3words)
- what is the interface on the computer or device where a device is connected?
- what is the acronym for pages per minute?
- what is the one piece of data along with a destination address used in a packet switching network called?
10 Clues: what is a one-to-one connection? (3words) • what is the acronym for pages per minute? • what is the acronym for 'post office protocol'? • what is the acronym for Plain Old Telephone Service? • what is the device that routes traffic between networks? • what is re-booting a device either with a cold or warm boot called? • ...
Mich Security 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- tool Programming language that allows applets to run within a web browser.
- Technology created by Microsoft to control interactivity on web pages.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
Down
- Also known as junk mail, is unsolicited e-mail.
- A type of grayware, is similar to adware. It is distributed without any user intervention or knowledge.
- Gains access to resources on devices by pretending to be a trusted computer.
- Or malware is a file or program other then a virus that is potentially harmful.
- Is a self-replicating program that is harmful to networks.
10 Clues: Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a program written with malicious intent and sent out by attackers. • Technology created by Microsoft to control interactivity on web pages. • ...
ISM221 2023-03-02
Across
- Combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
- Innovation type that changes made to make a process more efficient.
- A set of instructions, data or programs used to operate computers and execute specific tasks
- ____is a computer program application used to improve a company's decision-making capabilities.
Down
- Full lifecycle of a product or process, including material sourcing, production, consumption and disposal/recycling processes
- Mode of computer data storage in which digital data is stored on servers in off-site locations.
- The way materials and other goods are brought into a company
- all the physical parts that make up a computer.
- ____is a collection of facts
- A type of management support system that facilitates and supports senior executive information and decision-making needs
10 Clues: ____is a collection of facts • all the physical parts that make up a computer. • The way materials and other goods are brought into a company • Innovation type that changes made to make a process more efficient. • A set of instructions, data or programs used to operate computers and execute specific tasks • ...
