networks Crossword Puzzles

Networking concept puzzle 2025-06-07

Networking concept puzzle crossword puzzle
Across
  1. It is a device that connects two different types of networks with each other.
  2. This kind of network connects more computers located at distinct places.
Down
  1. it is the most commonly used network card
  2. Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
  3. It is a network device that is used to connect all the computers in a network with each other.
  4. the computer in a network is called a NoDe

6 Clues: it is the most commonly used network cardthe computer in a network is called a NoDeThis kind of network connects more computers located at distinct places.It is a device that connects two different types of networks with each other.It is a network device that is used to connect all the computers in a network with each other....

Networking concept puzzle 2025-06-07

Networking concept puzzle crossword puzzle
Across
  1. It is a device that connects two different types of networks with each other.
  2. This kind of network connects more computers located at distinct places.
Down
  1. it is the most commonly used network card
  2. Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
  3. It is a network device that is used to connect all the computers in a network with each other.
  4. the computer in a network is called a NoDe

6 Clues: it is the most commonly used network cardthe computer in a network is called a NoDeThis kind of network connects more computers located at distinct places.It is a device that connects two different types of networks with each other.It is a network device that is used to connect all the computers in a network with each other....

Internet Terminology 2022-11-19

Internet Terminology crossword puzzle
Across
  1. The rules of etiquette that apply when communicating over computer networks
  2. An object, as text or graphics linked through hypertext to a document, another object.
  3. A website containing a writers or group of writer's own experiences, observations, opinions,
  4. Also called index page, main page the initial page of a website
Down
  1. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
  2. engine A computer program that searches documents, especially on the world wide web
  3. A website that allows users to add, delete or revise content by using a web browser.
  4. A secret word or expression used by authorized persons
  5. a protocol for specifying addresses on the internet

9 Clues: a protocol for specifying addresses on the internetA secret word or expression used by authorized personsAlso called index page, main page the initial page of a websiteThe rules of etiquette that apply when communicating over computer networksengine A computer program that searches documents, especially on the world wide web...

Internet Terminology - 2 2022-11-19

Internet Terminology - 2 crossword puzzle
Across
  1. engine A computer program that searches documents
  2. An object, as text or graphics linked through hypertext to a document, another object
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions
Down
  1. Also called index page, main page the initial page of a website, usually containing an introduction
  2. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
  3. A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
  4. A website that allows users to add, delete or revise content by using a web browser.
  5. A secret word or expression used by authorized persons to prove their right to access, information, ect.

9 Clues: engine A computer program that searches documentsThe rules of etiquette that apply when communicating over computer networksA website that allows users to add, delete or revise content by using a web browser.An object, as text or graphics linked through hypertext to a document, another object...

Wireless Router Security Crossword Puzzle By Taheem Bhuiyan 2022-02-11

Wireless Router Security Crossword Puzzle By Taheem Bhuiyan crossword puzzle
Across
  1. This filter keeps port 113 from being scanned by devices from the internet.
  2. transmitting a packet that will be received by every device on the network
  3. the security method added to WPA for wireless networks that provides stronger data protection and network access control.
  4. a single, direct request sent from one host to another
Down
  1. method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts
  2. a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  3. an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
  4. short for Internet Protocol
  5. an interface that enables the serial (one bit at a time) exchange of data between two devices

9 Clues: short for Internet Protocola single, direct request sent from one host to anothertransmitting a packet that will be received by every device on the networkThis filter keeps port 113 from being scanned by devices from the internet.method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts...

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Mobile device application that secures users network connectivity and protect a device from malware.
  4. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Specific agreement and setup that allow an employee to connect a personal device.
  5. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  2. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
  3. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  4. Mobile device application that secures users network connectivity and protect a device from malware.
  5. For Schneider Electric's technical support to complete customer service,contact _____.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. Specific agreement and setup that allow an employee to connect a personal device.
  3. An employee must press this button, when he/she receives the suspicious mail.
  4. Schneider Electric cloud-based file collaboration space to store and share company files.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service,contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

Boone Health's Compliance Week Crossword Puzzle 2025-10-06

Boone Health's Compliance Week Crossword Puzzle crossword puzzle
Across
  1. Moral principles and values that guide decision-making and professional behavior.
  2. Intentional deception for unlawful or personal gain, such as false claims or misrepresentation.
  3. Measures and safeguards that protect patient data, computer systems, and networks from unauthorized access or harm.
  4. A formal rule or standard that employees must follow to ensure compliance and consistency.
  5. Doing the right thing even when no one is watching; honesty and strong moral principles.
Down
  1. Anonymous phone or online system for reporting compliance concerns or suspected wrongdoing safely.
  2. The right to keep personal and patient information confidential and protected from unauthorized disclosure.
  3. A situation where personal benefit or outside interest may interfere with work responsibilities or objectivity.
  4. Mandatory education employees complete each year to stay current with compliance requirements.

9 Clues: Moral principles and values that guide decision-making and professional behavior.Doing the right thing even when no one is watching; honesty and strong moral principles.A formal rule or standard that employees must follow to ensure compliance and consistency....

Commerce 2022-11-02

Commerce crossword puzzle
Across
  1. Pay back.
  2. Swapping or exchanging one good for another without using coins and notes.
  3. someone who creates and supplies goods or services
  4. It is a payment processing networks in the world.
  5. items that are usually tangible.
  6. Its actual value of goods.
  7. Amount of money that households have available for spending and saving after income taxes have been accounted for.
Down
  1. One that can be used many times
  2. The business of drawing people's attention to a good or service.
  3. Good pre-sales and after-sales service makes you feel you are valued customer.
  4. the standard of something as measured against other things of a similar kind
  5. What an individual gives up in order to satisfy a need or want
  6. The variety of items people want cannot be fulfilled because resources are limited.
  7. The buying and selling of goods and services between individuals and businesses.
  8. The amount of money that is expected to pay for something. Consumers want the best value for their money.
  9. The process of exploring, creating, and delivering value to meet the needs of customers.
  10. An online payment system that makes paying for things online and sending and receiving money safe and secure.

17 Clues: Pay back.Its actual value of goods.One that can be used many timesitems that are usually tangible.It is a payment processing networks in the world.someone who creates and supplies goods or servicesWhat an individual gives up in order to satisfy a need or wantThe business of drawing people's attention to a good or service....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. An individual's physical characteristic.
  2. Rules and Regulatory measures to be followed.
  3. The secret asset of a user.
  4. A sequence of operations that ensure protection of data.
  5. A security technique that regulates who or what can view or use resources in a computing environment.
  6. Approval, permission, or empowerment for someone or something to do something.
  7. A node in a computer network, a key single point for data on its way to or from other networks.
  8. An account that is given a non-restrictive access to the system.
  9. Process of confirming the correctness of the claimed identity.
Down
  1. An unauthorized user able to access and misuse information.
  2. A malicious activity caused to an organization that comes from within the organization.
  3. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  4. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. The process of converting information or data into a code, especially to prevent unauthorized access.
  6. Authentication Dictionary.
  7. A software program that keeps passwords in a secure digital location.
  8. A software that forms a barrier between the computer and the outside world to prevent intrusion.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  2. Rules and Regulatory measures to be followed.
  3. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. The secret asset of a user.
  5. An account that is given a non-restrictive access to the system.
  6. Authentication Dictionary.
  7. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. A security technique that regulates who or what can view or use resources in a computing environment.
Down
  1. An individual's physical characteristic.
  2. A node in a computer network, a key single point for data on its way to or from other networks.
  3. Process of confirming the correctness of the claimed identity.
  4. A malicious activity caused to an organization that comes from within the organization.
  5. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  6. A sequence of operations that ensure protection of data.
  7. Approval, permission, or empowerment for someone or something to do something.
  8. A software program that keeps passwords in a secure digital location.
  9. An unauthorized user able to access and misuse information.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

Computer (Ch-1&Ch-2) 2024-06-02

Computer (Ch-1&Ch-2) crossword puzzle
Across
  1. abbreviation for Unified Payments Interface
  2. Booking a service
  3. When multiple mismatched copies of a file are stored on different computers it is called ____________
  4. Computer network restricted to an organisation
  5. Computer network that allows controlled access to an information source available on the internet
  6. It is a device that connect two different types of networks with each other. It also increases the speed of the network
  7. Duplication of data at multiple places
  8. Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection
Down
  1. Abbreviation for National Programme on Technology Enhanced Learning
  2. E-shopping app
  3. Website used for e-learning
  4. One of the most common job portals
  5. When two users have simultaneous conversation why are the internet, it is called ___________
  6. Certain sets of rules that determine how data should be transferred over network, compressed, presented on screen, and so on
  7. It works similar to a hub. However, it does not broadcast the message on the entire network
  8. Each computer in a network is called a _______
  9. It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc., are connected and communicated with each other

17 Clues: E-shopping appBooking a serviceWebsite used for e-learningOne of the most common job portalsDuplication of data at multiple placesabbreviation for Unified Payments InterfaceComputer network restricted to an organisationEach computer in a network is called a _______Abbreviation for National Programme on Technology Enhanced Learning...

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The illegal trade and distribution of drugs is called drug ________
  2. Illegal networks that distribute drugs internationally
  3. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  7. Excessive use of drugs can lead to ________, which can be fatal.
  8. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  9. Many drug users experience this mental condition, causing sadness and hopelessness.
  10. In the long term, drug use leads to ___________, making it hard to stop
Down
  1. The illegal act of transporting or selling drugs
  2. The crime of cleaning illegally obtained money, often linked to drug trafficking
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Drug users often experience ________, a mental disorder involving intense fear
  5. The condition of relying on drugs and unable to function without them
  6. The misuse of substances that affect both physical and mental health
  7. Mental health disorder caused by drug use, involving extreme fear and nervousness
  8. Drug users are often involved in illegal ________ acts to support their addictio
  9. Drug addiction often leads to losing this, impacting economic productivity.
  10. A fatal consequence of drug use, often from excessive consumption

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication
Down
  1. Link between earth station and satellite
  2. Part of the celestial sphere directly above the observer
  3. Combination of transmitter and receiver in satellite

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satellitePart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Link between earth station and satellite
Down
  1. Part of the celestial sphere directly above the observer
  2. Combination of transmitter and receiver in satellite
  3. Reliability curve in Satellite communication

5 Clues: Link between earth station and satelliteReliability curve in Satellite communicationCombination of transmitter and receiver in satellitePart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

computer networks and protocols 2023-02-06

computer networks and protocols crossword puzzle
Across
  1. the result of joining to or more computers
Down
  1. the maximum amount of data going to a device like a pipe and water
  2. like a set rules
  3. the pat of the computer which acts as the brain.
  4. like a big hard drive

5 Clues: like a set ruleslike a big hard drivethe result of joining to or more computersthe pat of the computer which acts as the brain.the maximum amount of data going to a device like a pipe and water

7th Entrepreneurship & Computer Networks 2022-03-21

7th Entrepreneurship & Computer Networks crossword puzzle
Across
  1. market
  2. plan
  3. Letter
Down
  1. when you work with someone
  2. something you use for selling things
  3. pitch

6 Clues: planpitchmarketLetterwhen you work with someonesomething you use for selling things

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfsocial media app that recently rebrandedinformation flow from a global to local scopetype of relationship in which each person is connected in the same way

NFT Crossword 2022-03-30

NFT Crossword crossword puzzle
Across
  1. an organization that was designed to be automated and decentralized.
  2. the price of the cheapest NFT in a collection.
  3. the largest holders.
  4. the fee you have to pay for minting smart contracts into the blockchain.
  5. unique cryptographic tokens that exist on a blockchain and cannot be replicated.
  6. converting digital files into crypto collections or digital assets stored on the blockchain.
  7. a network of 3D virtual worlds focused on social connection.
  8. a distribution of cryptocurrency, tokens, or NFTs that are sent to a web3 wallet address for free as a promotion.
  9. cryptocurrency used on the Polygon network.
Down
  1. anxiety that an exciting or interesting event may currently be happening elsewhere, often aroused by posts seen on social media.
  2. a scaling solution that aims to provide multiple tools to improve the speed and reduce the cost and complexities of transactions on blockchain networks.
  3. fear, uncertainty and doubt.
  4. The world's first and largest digital marketplace for NFTs
  5. usually when developers market a project to generate sales and then abandon it, taking the existing profits.
  6. a decentralized, open-source blockchain with smart contract functionality.
  7. We're All Going to Make It
  8. experiencing a significant spike in price and volume.

17 Clues: the largest holders.We're All Going to Make Itfear, uncertainty and doubt.cryptocurrency used on the Polygon network.the price of the cheapest NFT in a collection.experiencing a significant spike in price and volume.The world's first and largest digital marketplace for NFTsa network of 3D virtual worlds focused on social connection....

TECHNOLOGY VOCABULARY 2021-08-12

TECHNOLOGY VOCABULARY crossword puzzle
Across
  1. the process in which output of a system is returned to input
  2. a worldwide network of computer networks
  3. the symbolic arrangement of data in a computer program
  4. crime committed using a computer and the internet
  5. the amount of information that can be stored on a disk drive
  6. a set of characters comprising a unit of information
  7. RAM memory that is set aside as a specialized buffer storage
Down
  1. a set of related records kept together
  2. a list of questions that are frequently asked (about a given topic) along with their answers
  3. a failure or defect in a computer program, system,or machine
  4. science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  5. a listing of the computer files stored in memory
  6. an organized body of related information
  7. put into a format that can be read or processed by computers
  8. the exclusive right to sell a work
  9. indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  10. any small compartment

17 Clues: any small compartmentthe exclusive right to sell a worka set of related records kept togetheran organized body of related informationa worldwide network of computer networksa listing of the computer files stored in memorycrime committed using a computer and the interneta set of characters comprising a unit of information...

Digital Technology Final part 1 2023-05-08

Digital Technology Final part 1 crossword puzzle
Across
  1. the physical parts of the computer that store and run written instructions
  2. type of file that has been created or saved by an application
  3. everything you see when you start your computer
  4. wide area network
  5. Arranging all folders files and other documents in an organized manner
  6. a document created by a program or system
  7. Something used to hold files or other folders
Down
  1. a computer file like an image, video or document which can be included in an email and shared
  2. Free cloud storage service that is integrated with the company's other services and systems
  3. Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
  4. a set of digital instructions, data or programs used to operate computers
  5. website that allows users to add and update content on the site using their own web browser.
  6. online journal which creates interaction from readers. They consist of special or common interest groups
  7. free web-based application in which documents and spreadsheets can be edited, created and stored online
  8. local area network
  9. the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
  10. the screen that displays the desktop

17 Clues: wide area networklocal area networkthe screen that displays the desktopa document created by a program or systemSomething used to hold files or other folderseverything you see when you start your computertype of file that has been created or saved by an applicationArranging all folders files and other documents in an organized manner...

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The misuse of substances that affect both physical and mental health
  2. The illegal trade and distribution of drugs is called drug ________
  3. The condition of relying on drugs and unable to function without them
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. In the long term, drug use leads to ___________, making it hard to stop
  7. The crime of cleaning illegally obtained money, often linked to drug trafficking
  8. Drug addiction often leads to losing this, impacting economic productivity.
  9. Illegal networks that distribute drugs internationally
Down
  1. The illegal act of transporting or selling drugs
  2. Many drug users experience this mental condition, causing sadness and hopelessness.
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Mental health disorder caused by drug use, involving extreme fear and nervousness
  5. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  6. Drug users often experience ________, a mental disorder involving intense fear
  7. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  8. Excessive use of drugs can lead to ________, which can be fatal.
  9. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  10. A fatal consequence of drug use, often from excessive consumption
  11. Drug users are often involved in illegal ________ acts to support their addictio

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Marwan crossword 2024-04-17

Marwan crossword crossword puzzle
Across
  1. a symmetric encryption algorithm (block cipher) using 56-bit keys
  2. attack which consists of testing all the words in a list as a keyword
  3. attack which consists of testing all possible password or key solutions.
  4. a public-key cryptosystem, one of the oldest widely used for secure data transmission.
Down
  1. The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
  2. is used to transmit data securely and anonymously over public networks.

6 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keysattack which consists of testing all the words in a list as a keywordis used to transmit data securely and anonymously over public networks.attack which consists of testing all possible password or key solutions....

CSI106 Cross Word - 4 2024-11-05

CSI106 Cross Word - 4 crossword puzzle
Across
  1. A set of rules or procedures that govern the format and transmission of data between two or more devices.
  2. A networking device that forwards data packets between computer networks.
Down
  1. A secret word or phrase that is used to authenticate a user.
  2. A formatted unit of data carried by a packet-switched network.
  3. A connection point on a computer.
  4. A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.

6 Clues: A connection point on a computer.A secret word or phrase that is used to authenticate a user.A formatted unit of data carried by a packet-switched network.A networking device that forwards data packets between computer networks.A set of rules or procedures that govern the format and transmission of data between two or more devices....

Cybersecurity for Schneider Electric 2022-01-09

Cybersecurity for Schneider Electric crossword puzzle
Across
  1. Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
  2. Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
  3. Schneider Electric cloud-based file collaboration space to store and share company files.
  4. An employee must press this button, when he/she receives the suspicious mail.
  5. Mobile device application that secures users network connectivity and protect a device from malware.
  6. Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
  1. Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
  2. For Schneider Electric's technical support to complete customer service, contact _____.
  3. Specific agreement and setup that allow an employee to connect a personal device.

9 Clues: An employee must press this button, when he/she receives the suspicious mail.Specific agreement and setup that allow an employee to connect a personal device.For Schneider Electric's technical support to complete customer service, contact _____.Schneider Electric cloud-based file collaboration space to store and share company files....

What is the Internet? 2022-03-18

What is the Internet? crossword puzzle
Across
  1. Funding a project by raising money from a large number of people via the Internet.
  2. Science that harnesses the problem solving capacity of hundreds or thousands of citizens on the Internet to solve complicated problems is called ______ science.
  3. Is this TRUE or FAKE: Less than 67% of the world uses the Internet.
  4. A group of interconnected computing devices capable of sending and receiving data is called a computer ______.
Down
  1. The Internet has made it much easier to do this.
  2. The global network of networks.
  3. Is this TRUE or FAKE: There are no negative consequences of the Internet.
  4. Personal computers volunteering processing time so that more calculations can be computed is called _______ computing.
  5. Agreed upon set of rules that standardize communication between machines.

9 Clues: The global network of networks.The Internet has made it much easier to do this.Is this TRUE or FAKE: Less than 67% of the world uses the Internet.Is this TRUE or FAKE: There are no negative consequences of the Internet.Agreed upon set of rules that standardize communication between machines....

OCTH 224 Impact of Disability on Participation: Environmental Factors 2021-03-03

OCTH 224 Impact of Disability on Participation: Environmental Factors crossword puzzle
Across
  1. Method of delivering information, includes devices & tech
  2. Climate and weather conditions, geographic and topographic features of the environment
  3. Resources to live and participate in the community across environmental contexts. Includes recessions, cutbacks, systemic subsidy reallocation, changes in benefits
  4. Vehicular travel from one location to another via private and public modes
Down
  1. Architecture, land development, accessibility, noise, crowds, air quality. affects mobility, cognitive, social/communication, sensory accessibility features.
  2. Access to systems to support participation, health care, housing, community, education, employment, police, emergency response, etc.
  3. Specialized tools or modifications to facilitate participation in everyday activities
  4. Positive/negative attitudes, reactions, and treatments that are societally defined on disability. Includes inclusion, enfranchisement, empowerment.
  5. Physical assistance, material support, emotional support, networks, social capital. involves issues of companionship, trust, and relational strain

9 Clues: Method of delivering information, includes devices & techVehicular travel from one location to another via private and public modesSpecialized tools or modifications to facilitate participation in everyday activitiesClimate and weather conditions, geographic and topographic features of the environment...

NSS Chapter 4a 2023-01-31

NSS Chapter 4a crossword puzzle
Across
  1. translate private ipv4 addresses to public ipv4 addresses.
  2. used by Windows DHCP clients to self-configure when no DHCP servers are available.
  3. used on a host to test if tcp/ip is operational.
Down
  1. logical network address that identifies a particular host.
  2. logical 32-bit ipv4 address is hierarchical and is made of two parts.
  3. common blocks of addresses used by most organizations to assign ipv4 addresses to internal hosts.

6 Clues: used on a host to test if tcp/ip is operational.logical network address that identifies a particular host.translate private ipv4 addresses to public ipv4 addresses.logical 32-bit ipv4 address is hierarchical and is made of two parts.used by Windows DHCP clients to self-configure when no DHCP servers are available....

Networking concept puzzle 2025-06-07

Networking concept puzzle crossword puzzle
Across
  1. It is a device that connects two different types of networks with each other.
  2. This kind of network connects more computers located at distinct places.
Down
  1. it is the most commonly used network card
  2. Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
  3. It is a network device that is used to connect all the computers in a network with each other.
  4. the computer in a network is called a NoDe

6 Clues: it is the most commonly used network cardthe computer in a network is called a NoDeThis kind of network connects more computers located at distinct places.It is a device that connects two different types of networks with each other.It is a network device that is used to connect all the computers in a network with each other....

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. Hosts that provide information
  2. Private networks in use by just one company
  3. Web pages that groups of people can edit and view together
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Applications can be accessed over the Internet through a subscription.
  6. identify the physical location of intermediary devices and cable installation.
  7. yes
  8. Describes the state of a network when the demand on the network resources exceeds the available capacity
  9. Identify devices, ports, and addressing scheme.
  10. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  11. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  12. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  13. Type of network provides access to users over a large geographical area
  14. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  15. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  16. Real-time communication between two or more people
  17. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  18. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  19. diagram Diagram of a network
  20. splits traffic into packets that are routed over a shared network. Helps create redundancy
  21. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  22. Interactive websites where people create and share user-generated content with friends and family
Down
  1. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  2. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  3. Hosts that request information
  4. allows people to share files with each other without having to store and download them from a central server
  5. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  6. Examples include copper, fiber and wireless
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Audio-based medium that allows people to deliver their recordings to a wide audience
  9. Something that helps people work together on a particular file or piece of software
  10. Provides the physical connection to the network at the PC or other host device
  11. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  12. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  13. Type of network provides access to users over a small geographical area
  14. Having multiple paths to a destination
  15. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  16. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  17. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  18. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  19. Examples include routers, switches and wireless access points

41 Clues: yesdiagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  2. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  3. Type of network provides access to users over a small geographical area
  4. Provides the physical connection to the network at the PC or other host device
  5. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  6. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
  7. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  8. Having multiple paths to a destination
  9. Web pages that groups of people can edit and view together
  10. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  11. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  12. Examples include copper, fiber and wireless
  13. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  14. Something that helps people work together on a particular file or piece of software
  15. splits traffic into packets that are routed over a shared network. Helps create redundancy
  16. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  17. Describes the state of a network when the demand on the network resources exceeds the available capacity
  18. identify the physical location of intermediary devices and cable installation.
Down
  1. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  2. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  3. Audio-based medium that allows people to deliver their recordings to a wide audience
  4. limits the impact of a failure, so that the fewest number of devices are affected.
  5. Identify devices, ports, and addressing scheme.
  6. Examples include routers, switches and wireless access points
  7. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  8. Hosts that provide information
  9. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  10. Private networks in use by just one company
  11. Real-time communication between two or more people
  12. allows people to share files with each other without having to store and download them from a central server
  13. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  14. diagram Diagram of a network
  15. Interactive websites where people create and share user-generated content with friends and family
  16. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  17. Hosts that request information
  18. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  19. Type of network provides access to users over a large geographical area
  20. Applications can be accessed over the Internet through a subscription.
  21. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  22. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology

40 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

Lesson 3 Conputer Vocabulary 2013-09-06

Lesson 3 Conputer Vocabulary crossword puzzle
Across
  1. plug into electric outlets, and can protect against power strikes
  2. a command to test connectivity and isolate hardware problems and any mismatched configurations
  3. instructs the operating system on how to operating specific hardware
  4. a secure process for keeping confidential information private
  5. can cause computers to short circuit, resulting in the loss of data and damage to hardware
Down
  1. a procedure that places a priority on files that would be difficult or impossible to replace or reconstruct if they were lost
  2. a device that ranges from basic kits to ones more sophisticated models designed for desktop computers and networks
  3. are short, fast transfers of electrical voltage, current, or energy
  4. occurs when older systems are discarded and the data is not deleted

9 Clues: a secure process for keeping confidential information privateplug into electric outlets, and can protect against power strikesare short, fast transfers of electrical voltage, current, or energyoccurs when older systems are discarded and the data is not deletedinstructs the operating system on how to operating specific hardware...

Wraparound Puzzle 2022-08-01

Wraparound Puzzle crossword puzzle
Across
  1. Wraparound identifies these to build on and enhance capabilities and skills
  2. Family and youth perspectives are intentionally elicited and prioritized during all phases of the wraparound process
  3. Encourages participation of team mebers drawn from networks of interpersonal community relationships
  4. Wraparound prcess demonstrates respect for and builds on the values preferences beliefs and identify of the child youth and their family
  5. Team members work cooperatively and share responsibility
  6. Despite challenges the team continues working towards the goals until the team reaches agreement that Wraparound process is no longer required
Down
  1. Observable and measurable indicators of succcess monitors progress
  2. team develops a customized set of strategies, supports and services based on this
  3. Least restrictive setting that promotes child and family intergration into home

9 Clues: Team members work cooperatively and share responsibilityObservable and measurable indicators of succcess monitors progressWraparound identifies these to build on and enhance capabilities and skillsLeast restrictive setting that promotes child and family intergration into home...

CyberSecurity 2022-08-25

CyberSecurity crossword puzzle
Across
  1. The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
  2. Detailed report, usually about a person
  3. rules for interacting politely online
  4. files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
  5. the practice of protecting systems, networks, and programs from digital attacks
  6. Someone who intentionally targets people for harm using online chat rooms or social media.
Down
  1. The ability to act in a safe and responsible way on the Internet and other connected environments.
  2. A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
  3. Information about you and what you do online

9 Clues: rules for interacting politely onlineDetailed report, usually about a personInformation about you and what you do onlinethe practice of protecting systems, networks, and programs from digital attacksSomeone who intentionally targets people for harm using online chat rooms or social media....

Internet Terminology - 2 2022-11-19

Internet Terminology - 2 crossword puzzle
Across
  1. engine A computer program that searches documents
  2. An object, as text or graphics linked through hypertext to a document, another object
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions
Down
  1. Also called index page, main page the initial page of a website, usually containing an introduction
  2. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
  3. A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
  4. A website that allows users to add, delete or revise content by using a web browser.
  5. A secret word or expression used by authorized persons to prove their right to access, information, ect.

9 Clues: engine A computer program that searches documentsThe rules of etiquette that apply when communicating over computer networksA website that allows users to add, delete or revise content by using a web browser.An object, as text or graphics linked through hypertext to a document, another object...

Laws of Cybercrime Crossword 2021-06-12

Laws of Cybercrime Crossword crossword puzzle
Across
  1. the process by which criminals attempt to conceal the illicit origin and ownership of the proceeds of their unlawful activities.
  2. Any illegal activity already in the criminal code committed by using a computer.
  3. The use of the computer to sabotage computer networks vital to national welfare.
  4. Area of the law which concerns computers and computer related crime.
  5. manufacture of false money for gain, a kind of forgery in
Down
  1. mailing or electronically transmitting something associated with fraud.
  2. A crime that involves using a computer to steal computer data stored in a digital format.
  3. A crime in which a cyber criminal falsely adopts the identity of another computer user in order to commit fraud.
  4. The communication via computer or other electronic device of false data that damages a person's reputation.
  5. Provides for criminal prosecution of individuals who engage in copyright infringement. electronic theft
  6. Protecting the rights of people's original creative

11 Clues: Protecting the rights of people's original creativemanufacture of false money for gain, a kind of forgery inArea of the law which concerns computers and computer related crime.mailing or electronically transmitting something associated with fraud.Any illegal activity already in the criminal code committed by using a computer....

Workplace Readiness Skills (Professional Skills) 2022-08-14

Workplace Readiness Skills (Professional Skills) crossword puzzle
Across
  1. PlanS personal and professional goals related to education, career, finances, and health
  2. SAFETY Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
  3. Meets organizational expectations regarding work schedule, behavior, appearance, and communication
  4. and interprets workplace documents and writes effectively
  5. Locates information efficiently, evaluates the credibility and relevance of sources and facts
  6. TECHNOLOGY Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
  7. Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
Down
  1. Accepts constructive feedback well and is open to new ideas and ways of doing things
  2. Applies mathematical skills to complete tasks as necessary
  3. Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
  4. Plans, prioritizes, and adapts work goals to manage time and resources effectively
  5. SECURITY Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities

12 Clues: and interprets workplace documents and writes effectivelyApplies mathematical skills to complete tasks as necessaryPlans, prioritizes, and adapts work goals to manage time and resources effectivelyAccepts constructive feedback well and is open to new ideas and ways of doing things...

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for refences or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for refences or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

6th Grade Computers Vocabulary 5 2019-11-13

6th Grade Computers Vocabulary 5 crossword puzzle
Across
  1. a copy of a file or directory on a separate storage device
  2. a string of characters beginning with a period and followed by one or more letters; the optional second part of a PC computer filename
  3. RAM memory that is set aside as a specialized buffer storage
  4. any computer that is hooked up to a computer network
  5. a set of related records kept together
Down
  1. adjusting the parts of a something in relation to each other
  2. a computer providing shared resources to a computer network
  3. a model or standard for making comparisons
  4. security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet
  5. the organization of data according to preset specifications
  6. (computer science) a computer that provides client stations with access to files and printers as shared resources to a computer network

11 Clues: a set of related records kept togethera model or standard for making comparisonsany computer that is hooked up to a computer networka copy of a file or directory on a separate storage devicea computer providing shared resources to a computer networkthe organization of data according to preset specifications...

Abooban 2023-03-12

Abooban crossword puzzle
Across
  1. the making of a judgement about the amount, number, or value of something
  2. a stock or supply of money, materials, staff, and other assets that can be drawn on by a person or organization in order to function effectively
  3. Ability to write without mistakes
  4. verb, when you are the main person in the group you tell them what to do
  5. facts provided or learned about something or someone
  6. the principal method of human communication, consisting of words used in a structured and conventional way and conveyed by speech, writing, or gesture
  7. the imparting or exchanging of information by speaking, writing, or using some other medium
Down
  1. Worldwide system of computer networks
  2. the earth, together with all of its countries and peoples
  3. an organized group of people with a particular purpose, such as a business or a government department
  4. he main means of mass communication (broadcasting, publishing, and the internet) regarded collectively

11 Clues: Ability to write without mistakesWorldwide system of computer networksfacts provided or learned about something or someonethe earth, together with all of its countries and peoplesverb, when you are the main person in the group you tell them what to dothe making of a judgement about the amount, number, or value of something...

Science & Technology After WW2 2013-05-14

Science & Technology After WW2 crossword puzzle
Across
  1. What kind of phone cables were laid in 1956?
  2. Scientist who introduced the polio vaccine in 1955.
  3. How many major broadcasting networks where operationg during the mid-50s?
  4. In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
  5. In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
  6. The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
Down
  1. The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
  2. Perfected a polio vaccine that could be administrated by mouth.
  3. What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
  4. What pace were the improvements in television technology?
  5. In 1951, what transcontinental dialing services were first begun?

11 Clues: What kind of phone cables were laid in 1956?Scientist who introduced the polio vaccine in 1955.What pace were the improvements in television technology?Perfected a polio vaccine that could be administrated by mouth.In 1951, what transcontinental dialing services were first begun?...

Science & Technology After WW2 2013-05-14

Science & Technology After WW2 crossword puzzle
Across
  1. Scientist who introduced the polio vaccine in 1955.
  2. What pace were the improvements in television technology?
  3. The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
Down
  1. The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
  2. In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
  3. In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
  4. What kind of phone cables were laid in 1956?
  5. In 1951, what transcontinental dialing services were first begun?
  6. How many major broadcasting networks where operationg during the mid-50s?
  7. What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
  8. Perfected a polio vaccine that could be administrated by mouth.

11 Clues: What kind of phone cables were laid in 1956?Scientist who introduced the polio vaccine in 1955.What pace were the improvements in television technology?Perfected a polio vaccine that could be administrated by mouth.In 1951, what transcontinental dialing services were first begun?...

E-Commerce 2015-03-12

E-Commerce crossword puzzle
Across
  1. /knowledge communicated or received concerning a particular fact or circumstance; news
  2. /abbreviation: WWW.
  3. /a business model that facilitates an environment where customers can trade with each other.
  4. /a business model in which consumers (individuals) create value and businesses consume that value
  5. /when a business or organisation entity provides products or services to individual customers
  6. /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
  7. /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
  8. /a vast computer network linking smaller computer networks worldwide
Down
  1. /when business entities or organisations participate with other businesses or organisations to do e-commerce
  2. /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
  3. /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another

11 Clues: /abbreviation: WWW./a vast computer network linking smaller computer networks worldwide/knowledge communicated or received concerning a particular fact or circumstance; news/when a business or organisation entity provides products or services to individual customers...

Compliance Crossword 2023 2023-10-25

Compliance Crossword 2023 crossword puzzle
Across
  1. Moral principles and values that guide a person.
  2. When there is a breach of PHI, it is important to notify Compliance .
  3. HDS employees must all suspected or observed improper practices, violations of policies and laws.
  4. The act of intimidating or engaging in behavior against someone for a good faith report of noncompliance or participating in an investigation.
  5. All PHI is to be kept .
Down
  1. The set of measures to ensure that networks, systems, & data breaches are avoided.
  2. Set of standards or rules that guide business behavior in a positive direction. Code of
  3. When HDS contracts services or functions to another entity which involves PHI, a or business associate agreement is needed.
  4. An authorized person viewing protected health information is an example of a reportable incident.
  5. A method of securing access to PHI on your computer, is to it when away from your computer.
  6. All employees will receive upon hire and annually thereafter.

11 Clues: All PHI is to be kept .Moral principles and values that guide a person.All employees will receive upon hire and annually thereafter.When there is a breach of PHI, it is important to notify Compliance .The set of measures to ensure that networks, systems, & data breaches are avoided....

Station 5 2024-05-24

Station 5 crossword puzzle
Across
  1. When acids are added to water, they form positively charged ________ ions
  2. Forces on materials can cause them to __________ or extend (get longer)
  3. is a method of exchanging messages and files over the internet
  4. Liquids and solutions that are able to conduct electricity are called __________
  5. _______ is a very large global network that consists of many other interconnected networks
Down
  1. The products of photosynthesis are glucose and ______
  2. One of the input devices that allow users to enter data or instructions into a computer system
  3. A thread like structure made of DNA and protein by which hereditary information is passed to next generation.
  4. is an atom, or atoms, of the same element that have an equal number of protons but a different number of neutrons
  5. The distance from the undisturbed position to the peak (crest) or trough of a wave
  6. _______ is a wireless communication technology that allows devices to be connected within a maximum range of about 30 meters

11 Clues: The products of photosynthesis are glucose and ______is a method of exchanging messages and files over the internetForces on materials can cause them to __________ or extend (get longer)When acids are added to water, they form positively charged ________ ionsLiquids and solutions that are able to conduct electricity are called __________...

The AI-Q Test 2025-08-11

The AI-Q Test crossword puzzle
Across
  1. (9) A set of rules a computer follows to solve a problem or perform a task.
  2. (15) A subset of AI involving algorithms that improve performance on a task through experience.
  3. (7) An AI-powered conversational interface designed to simulate human conversation.
Down
  1. (11) A subset of machine learning that uses artificial neural networks with many layers to learn from data.
  2. (10) The use of technology to perform tasks with minimal human intervention.
  3. (9) Analytics focused on forecasting future outcomes based on historical data.
  4. (9) AI that mimics human thought processes like understanding and decision-making.
  5. (7) Datasets too large or complex for traditional data processing applications.
  6. (10) AI capable of producing new content, such as text, images, or audio.
  7. (8) The branch of technology that deals with the design, construction, operation, and application of robots.
  8. (9) Machines that are programmed to think and learn like humans in the field of AI.

11 Clues: (10) AI capable of producing new content, such as text, images, or audio.(9) A set of rules a computer follows to solve a problem or perform a task.(10) The use of technology to perform tasks with minimal human intervention.(9) Analytics focused on forecasting future outcomes based on historical data....

Types of Energy 2025-09-26

Types of Energy crossword puzzle
Across
  1. Energy of motion
  2. Stored energy that an object or system has due to its position or state
  3. The faster the particles move/vibrate, the more of this energy they have. It is related to the temperature of an object.
  4. The only type of energy visible to the human eye
  5. Used for transmitting radio and television broadcasts, and for mobile phones and wireless networks (longest wavelengths).
  6. Energy stored in the bonds of atoms and molecules
Down
  1. Energy caused by vibrations traveling through air, water, or a solid
  2. Used in radar, satellite communication, and ovens (which use them to heat food by exciting water molecules).
  3. Energy of the movement of charged particles, like electrons, through a conductor.
  4. Can pass through many objects, including the body, and are used in medical imaging to view internal structures like bones.
  5. Produced by the hottest and most energetic objects in the universe (supernovas and neutron stars) (highest-energy, shortest-wavelength).

11 Clues: Energy of motionThe only type of energy visible to the human eyeEnergy stored in the bonds of atoms and moleculesEnergy caused by vibrations traveling through air, water, or a solidStored energy that an object or system has due to its position or stateEnergy of the movement of charged particles, like electrons, through a conductor....

Cyber Security CrossWord Puzzel 2021-03-02

Cyber Security CrossWord Puzzel crossword puzzle
Across
  1. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. _______________ is any crime perpetrated using computers and networks.
  3. A__________ monitored a network, blocking dangerous content such as viruses.
  4. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. Viruses, trojans and worms are examples of __________________________.
  6. An ethical hacker.
  7. Your favorite teacher.
  8. A statement of an intention to inflict harm or damage .
Down
  1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. Your favorite class.
  3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. The exposure to the possibility of the attacked or harmed.
  5. Actual action that causes harm or damage.
  6. A blend between an ethical hacker and a cracker.
  7. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. An action taken to counteract the threat.
  9. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.

17 Clues: An ethical hacker.Your favorite class.Your favorite teacher.Actual action that causes harm or damage.An action taken to counteract the threat.A blend between an ethical hacker and a cracker.A statement of an intention to inflict harm or damage .The exposure to the possibility of the attacked or harmed....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. A security technique that regulates who or what can view or use resources in a computing environment.
  3. Approval, permission, or empowerment for someone or something to do something.
  4. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
  5. Authentication Dictionary.
  6. A software program that keeps passwords in a secure digital location.
  7. The secret asset of a user.
Down
  1. A malicious activity caused to an organization that comes from within the organization.
  2. Rules and Regulatory measures to be followed.
  3. An individual's physical characteristic.
  4. An account that is given a non-restrictive access to the system.
  5. Process of confirming the correctness of the claimed identity.
  6. A node in a computer network, a key single point for data on its way to or from other networks.
  7. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  8. A sequence of operations that ensure protection of data.
  9. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  10. An unauthorized user able to access and misuse information.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

ARCON - Privileged Access Management 2019-11-06

ARCON - Privileged Access Management crossword puzzle
Across
  1. Rules and Regulatory measures to be followed.
  2. The secret asset of a user.
  3. Authentication Dictionary.
  4. An account that is given a non-restrictive access to the system.
  5. A software that forms a barrier between the computer and the outside world to prevent intrusion.
  6. The process of converting information or data into a code, especially to prevent unauthorized access.
  7. To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
  1. A sequence of operations that ensure protection of data.
  2. An unauthorized user able to access and misuse information.
  3. A malicious activity caused to an organization that comes from within the organization.
  4. A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
  5. Approval, permission, or empowerment for someone or something to do something.
  6. Process of confirming the correctness of the claimed identity.
  7. A node in a computer network, a key single point for data on its way to or from other networks.
  8. A security technique that regulates who or what can view or use resources in a computing environment.
  9. A software program that keeps passwords in a secure digital location.
  10. An individual's physical characteristic.

17 Clues: Authentication Dictionary.The secret asset of a user.An individual's physical characteristic.Rules and Regulatory measures to be followed.A sequence of operations that ensure protection of data.An unauthorized user able to access and misuse information.Process of confirming the correctness of the claimed identity....

Media and Technology: Unit 1 & Unit 2 Vocabulary 2023-03-02

Media and Technology: Unit 1 & Unit 2 Vocabulary crossword puzzle
Across
  1. The information computers get from users, devices, or other computers
  2. Special skill or knowledge about a particular thing
  3. The reason that someone does something; intention
  4. The main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  5. Using media in a way that feels healthy and in balance with other life activities (family, friends, school, hobbies, etc.)
  6. Someone or something that provides information
  7. A machine that works with information
  8. Content (text, audio, images, video) or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
  9. When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
  1. Word or concept of great significance
  2. Behaviors we do often or regularly with digital media and devices
  3. Believable
  4. An attempt to trick someone online, usually with the intention of stealing money or private information
  5. The way we apply scientific knowledge for practical purposes.
  6. Deciding what to include and what to keep out in digital media
  7. The thinking work computers do to turn input into output
  8. The information computers give to users, devices, or other computers

17 Clues: BelievableWord or concept of great significanceA machine that works with informationSomeone or something that provides informationThe reason that someone does something; intentionSpecial skill or knowledge about a particular thingThe thinking work computers do to turn input into outputThe way we apply scientific knowledge for practical purposes....

CLucas - Network Devices 2023-01-03

CLucas - Network Devices crossword puzzle
Across
  1. This kind of router includes a switch and a wireless AP.
  2. IPS does not allow _____ to enter the target system without first being analyzed.
  3. ______ provides higher dedicated bandwidth to each divide on the network.
  4. A cloud-based network controller is a device in the cloud that allows _____ administrators to manage network devices.
  5. What are repeaters also known as?
  6. These are an all-in-one security device.
  7. This is the process of physically isolating legacy systems from other networks and particularly the internet. (2 words)
Down
  1. An endpoint management server can restrict an end device’s ______ to the network.
  2. Does IDS work offline or online?
  3. How many types of NIC cards are there?
  4. Firewalls protect data and equipment on a network from _______ access.
  5. What kind of power do PoE's transfer?
  6. A patch _____ is commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility.
  7. What do bridges divide LANs into?
  8. These are embedded and used to program to perform specific actions.
  9. This kind of switch allows administrators to add security and additional features.
  10. Wireless APs use these to communicate with Wireless NICs. (2 words)

17 Clues: Does IDS work offline or online?What do bridges divide LANs into?What are repeaters also known as?What kind of power do PoE's transfer?How many types of NIC cards are there?These are an all-in-one security device.This kind of router includes a switch and a wireless AP.These are embedded and used to program to perform specific actions....

TTS DRUGS (GROUP 1) 2024-10-24

TTS DRUGS (GROUP 1) crossword puzzle
Across
  1. The misuse of substances that affect both physical and mental health
  2. The illegal trade and distribution of drugs is called drug ________
  3. The condition of relying on drugs and unable to function without them
  4. Drugs cause damage to these parts of the body, like the brain, liver, and lungs
  5. Drugs lower the overall ______ of life for users
  6. In the long term, drug use leads to ___________, making it hard to stop
  7. The crime of cleaning illegally obtained money, often linked to drug trafficking
  8. Drug addiction often leads to losing this, impacting economic productivity.
  9. Illegal networks that distribute drugs internationally
Down
  1. The illegal act of transporting or selling drugs
  2. Many drug users experience this mental condition, causing sadness and hopelessness.
  3. A harmful mental effect caused by drug use, where users see things that aren't real
  4. Mental health disorder caused by drug use, involving extreme fear and nervousness
  5. The government allocates a large _______ to fight drug trafficking and support rehabilitation
  6. Drug users often experience ________, a mental disorder involving intense fear
  7. Drugs are a major trigger for increased _______ rates, such as theft and violen.
  8. Excessive use of drugs can lead to ________, which can be fatal.
  9. Vital part of the body damaged by drug use, such as the brain, liver, and _______
  10. A fatal consequence of drug use, often from excessive consumption
  11. Drug users are often involved in illegal ________ acts to support their addictio

20 Clues: The illegal act of transporting or selling drugsDrugs lower the overall ______ of life for usersIllegal networks that distribute drugs internationallyExcessive use of drugs can lead to ________, which can be fatal.A fatal consequence of drug use, often from excessive consumptionThe illegal trade and distribution of drugs is called drug ________...

Social Networks Crossword Puzzle 2022-04-28

Social Networks Crossword Puzzle crossword puzzle
Across
  1. type of relationship in which each person is connected in the same way
  2. information flow from a global to local scope
  3. collection of connected nodes
Down
  1. old name of a social media app that recently rebranded
  2. online page that represents yourself

5 Clues: collection of connected nodesonline page that represents yourselfinformation flow from a global to local scopeold name of a social media app that recently rebrandedtype of relationship in which each person is connected in the same way

Satellite Communication And Networks 2019-03-12

Satellite Communication And Networks crossword puzzle
Across
  1. Angle between orbital plane and earth's equatorial plane
  2. Reliability curve in Satellite communication
Down
  1. Equatorial orbit is sometimes called as
  2. Link between satellite and earth station
  3. Part of the celestial sphere directly above the observer

5 Clues: Equatorial orbit is sometimes called asLink between satellite and earth stationReliability curve in Satellite communicationPart of the celestial sphere directly above the observerAngle between orbital plane and earth's equatorial plane

Vocabulary 4 2012-09-18

Vocabulary 4 crossword puzzle
Across
  1. The main international standards organization for the world wide web
  2. strands of optically pure glass
Down
  1. a program accessible on the web which has a catalog of scanned websites in a large data base
  2. protocol devised and implemented to help researchers share information across a diverse computer network
  3. directs packets between separate local area networks by reading each packet header and directing it into the fastest direction
  4. the address of a document or other resource available on the inernet

6 Clues: strands of optically pure glassThe main international standards organization for the world wide webthe address of a document or other resource available on the inerneta program accessible on the web which has a catalog of scanned websites in a large data base...

3D AJ 2021-04-29

3D AJ crossword puzzle
Across
  1. local area network
  2. Is a networking device that forwards data packets between computer networks
  3. consists of multiple devices that communicate with one another
Down
  1. device, such as a wireless router, that allows wireless devices to connect to a network.
  2. any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
  3. the service of providing the computer equipment and software for a website on the internet and making it available for people to see

6 Clues: local area networkconsists of multiple devices that communicate with one anotherIs a networking device that forwards data packets between computer networksdevice, such as a wireless router, that allows wireless devices to connect to a network....

Media Tech Crossword 2022-04-13

Media Tech Crossword crossword puzzle
Across
  1. a platform that allows you to create servers and talk to people from around the world. It’s great for gamers!
  2. a scam made to trick you into revealing your personal info.
  3. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. A service that encrypts your data and makes you less vulnerable to tracking
  5. a set of data that describes and gives information about other data.
  6. a matching game set in a magical kingdom your parents probably play.
  7. a platform that allows you to post videos and comment on others videos
Down
  1. the footprint a person leaves online after posting something.
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

9 Clues: a scam made to trick you into revealing your personal info.the footprint a person leaves online after posting something.a set of data that describes and gives information about other data.a matching game set in a magical kingdom your parents probably play.a platform that allows you to post videos and comment on others videos...

Internet Terminology 2022-11-19

Internet Terminology crossword puzzle
Across
  1. A secret word or expression used by authorized persons
  2. An object, as text or graphics linked through hypertext to a document, another object.
  3. A website that allows users to add, delete or revise content by using a web browser.
  4. Also called index page, main page the initial page of a website
  5. engine A computer program that searches documents, especially on the world wide web
Down
  1. A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
  2. a protocol for specifying addresses on the internet
  3. The rules of etiquette that apply when communicating over computer networks
  4. A website containing a writers or group of writer's own experiences, observations, opinions,

9 Clues: a protocol for specifying addresses on the internetA secret word or expression used by authorized personsAlso called index page, main page the initial page of a websiteThe rules of etiquette that apply when communicating over computer networksengine A computer program that searches documents, especially on the world wide web...

Cyber Crossword 2021-04-26

Cyber Crossword crossword puzzle
Across
  1. media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
  2. Electronic device most students own at home and is square and mostly portable.
  3. the use of technology to harass, threaten, embarrass, or target another person.
Down
  1. A result or effect, typically one that is unwelcome or unpleasant.
  2. An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
  3. A repetitive action toward another human purposely causing harm or intimidation.
  4. safety, The act of protecting ones self or others from harm or intimidation online.
  5. An individual who causes harm or stress to another human intentionally and repetitively.
  6. Having firm belief or reliability in someone.

9 Clues: Having firm belief or reliability in someone.A result or effect, typically one that is unwelcome or unpleasant.Electronic device most students own at home and is square and mostly portable.the use of technology to harass, threaten, embarrass, or target another person.A repetitive action toward another human purposely causing harm or intimidation....

Finance Cross 2023-11-23

Finance Cross crossword puzzle
Across
  1. Open banking technology aims to create new routes between customers' bank accounts and these.
  2. Former Nationwide chief executive who led the review.
  3. The review calls for the payment sector to use this technology for creating new routes.
  4. The country that should develop strategies to challenge card network dominance.
  5. Digital wallets, including Google Pay and Apple Pay, account for this percentage of UK retail payments.
Down
  1. A service at risk of falling behind and needing an alternative.
  2. A widely used service in the UK, taking 70-80 seconds on average.
  3. The time alternative methods in Brazil, India, and Sweden take to process a transaction.
  4. Visa and Mastercard together accounted for this percentage of all debit and credit card payments in the UK in 2021.
  5. Card networks facing a probe into cross-border interchange fees.

10 Clues: Former Nationwide chief executive who led the review.A service at risk of falling behind and needing an alternative.Card networks facing a probe into cross-border interchange fees.A widely used service in the UK, taking 70-80 seconds on average.The country that should develop strategies to challenge card network dominance....

IS-95 CHANNELS 2023-09-25

IS-95 CHANNELS crossword puzzle
Across
  1. How does Power Control in IS-95 help improve system capacity?
  2. Which channel is used for initial access and call setup procedures in IS-95?
  3. What channel is used by the mobile device to send data and voice to the base station in IS-95?
  4. What is the typical unit of measurement for power control adjustments in IS-95?
Down
  1. What is the primary purpose of the Reverse Traffic Channel in IS-95?
  2. Why is power control important in IS-95 CDMA networks?
  3. What type of power control is used in IS-95 to maintain signal quality?
  4. What is the primary purpose of the Forward Traffic Channel in IS-95?
  5. Which channel notifies the mobile device to adjust its power level in IS-95?
  6. What key function does Power Control serve in IS-95 CDMA?
  7. In IS-95, which channel carries voice and data from the base station to the mobile device?

11 Clues: Why is power control important in IS-95 CDMA networks?What key function does Power Control serve in IS-95 CDMA?How does Power Control in IS-95 help improve system capacity?What is the primary purpose of the Reverse Traffic Channel in IS-95?What is the primary purpose of the Forward Traffic Channel in IS-95?...

Social Customer Service 2019-05-21

Social Customer Service crossword puzzle
Across
  1. A type of automated artificial intelligence tool used to converse with users
  2. A prediction of the net profit attributed to the entire future relationship with a customer
  3. An app that enables users to message each other instantaneously – usually on a smartphone
Down
  1. Tracking conversations online for mentions of your product, brand, or competitors
  2. A social media user with a large audience who can drive awareness about a topic, product, or service
  3. The interaction between people and brands on social networks.
  4. A social media user who makes offensive or annoying postings which provoke other users
  5. Someone who talks favorably about a brand or product, and passes on positive word-of-mouth to other people.
  6. The potential audience that a message can reach

9 Clues: The potential audience that a message can reachThe interaction between people and brands on social networks.A type of automated artificial intelligence tool used to converse with usersTracking conversations online for mentions of your product, brand, or competitors...

Paws, Pandas, and Predictions 2025-12-12

Paws, Pandas, and Predictions crossword puzzle
Across
  1. In Data Science, it's a collection of decisions; in the living room, it’s what the cat climbs and destroys
  2. A structure for organizing data, or what a dog chases but never catches
  3. The only reptile allowed in our tech stack.
  4. In the code, they break production; on the dog, they require a special collar
  5. When the model fits the training data perfectly, or when the sweater is way too tight on the Pug
Down
  1. Essential for tracking web sessions; highly requested by "Good Boys."
  2. What we do to neural networks and naughty puppies
  3. What you have to do to a messy dataset AND a used litter box
  4. How we build a model when the legacy code fails, or what the cat does to the new sofa

9 Clues: The only reptile allowed in our tech stack.What we do to neural networks and naughty puppiesWhat you have to do to a messy dataset AND a used litter boxEssential for tracking web sessions; highly requested by "Good Boys."A structure for organizing data, or what a dog chases but never catches...

Techology Crossword Puzzle 2016-08-09

Techology Crossword Puzzle crossword puzzle
Across
  1. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
  2. symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
  3. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  4. a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  5. a computer that handles requests for data, email, file transfers, and other network services from other computers.
  6. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
  7. unsolicited email messages sent for marketing purposes.
  8. A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
  1. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  2. A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  3. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  4. refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  5. usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
  6. is a device that allows computers to transmit information to each other via ordinary telephone lines.
  7. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.

15 Clues: unsolicited email messages sent for marketing purposes.any type of illegal activity that is undertaken (or relies heavily) on a computer.is a device that allows computers to transmit information to each other via ordinary telephone lines.A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte....

Techology Crossword Puzzle 2016-08-09

Techology Crossword Puzzle crossword puzzle
Across
  1. unsolicited email messages sent for marketing purposes.
  2. a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
  3. a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
  4. A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
  5. refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
  6. is a device that allows computers to transmit information to each other via ordinary telephone lines.
  7. the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
Down
  1. a computer that handles requests for data, email, file transfers, and other network services from other computers.
  2. a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
  3. A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
  4. Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
  5. any type of illegal activity that is undertaken (or relies heavily) on a computer.
  6. symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
  7. Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
  8. usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.

15 Clues: unsolicited email messages sent for marketing purposes.any type of illegal activity that is undertaken (or relies heavily) on a computer.is a device that allows computers to transmit information to each other via ordinary telephone lines.A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte....

Showtime 2019-03-22

Showtime crossword puzzle
Across
  1. Showtime has this many commercial free channels (Write out the number).
  2. This series stars NY 'Fixer' Liev Schreiber.
  3. This hit comedy series stars Frankie Shaw as a single mom struggling in Boston to make ends meet.
  4. What series airs on Sundays at 9PM.
  5. This movie premieres April 20th.
  6. This is Showtime's first Late-Night Talk Show.
  7. This hit showtime series stars Claire Danes as a CIA operative.
  8. This iconic Hip-Hop group has a docu-series premiering in May.
  9. This movie premieres on April 6th.
Down
  1. This Showtime series stars Jim Carrey in his first lead TV role in over 20 years.
  2. This Showtime Sports documentary is based on what NBA All-Star?
  3. This 4-part Sports Doc is based on professional sports gambling.
  4. Watch 1000s of hours of Showtime content through your set top box via what feature?
  5. What Showtime App allows 2 Live Feeds and Download Capabilities?
  6. This series takes place on the day of the worst stock market crash in U.S. History.
  7. What Original Series premieres April 7th?
  8. This series is the #1 Comedy on a premium network.
  9. How much is the Showtime Cash Back Offer? (Write out the number).
  10. How many additional networks are included in a Showtime Subscription? (Write out the number).

19 Clues: This movie premieres April 20th.This movie premieres on April 6th.What series airs on Sundays at 9PM.What Original Series premieres April 7th?This series stars NY 'Fixer' Liev Schreiber.This is Showtime's first Late-Night Talk Show.This series is the #1 Comedy on a premium network.This iconic Hip-Hop group has a docu-series premiering in May....

Computer Components 2021-10-06

Computer Components crossword puzzle
Across
  1. disruptive online messages.
  2. local area network, gives network to buildings.
  3. it controls the flow of the data from one computer to another.
  4. a website developed by many people and it allows you to add and edit content.
  5. stands for solid-state drive, a storage device that contains semiconductor chips.
  6. the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work.
  7. one of the most main parts of a computer system.
  8. WAN stands for wide area network, a telecommunication network that stretches over a large geographic area.
  9. use reasonable use of copyrighted material.
  10. a set of rules made to protect integrity.
Down
  1. it stands for random-access memory, it’s where data is stored.
  2. to take/copy someone’s work and not give them credit.
  3. pertaining to, or situated in.
  4. a part of an electric system or part of a mechanical system.
  5. stands for hard disk drive, a storage device that contains one or more spinning magnetic hard disks.
  6. the rules of kindness that apply when communicating over computer networks.
  7. gain information without the permission from the person you are hacking.
  8. Drive a very small, solid-state hard drive that can be plugged into a USB port.
  9. universal serial bus, to connect peripheral devices to a computer.

19 Clues: disruptive online messages.pertaining to, or situated in.a set of rules made to protect integrity.use reasonable use of copyrighted material.local area network, gives network to buildings.one of the most main parts of a computer system.to take/copy someone’s work and not give them credit.a part of an electric system or part of a mechanical system....

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. transfer out of a database or document
  2. something reduced in volume to its full volume
  3. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  4. decompress
  5. the exclusive right to sell a work
  6. a facial expression represented by a sequence of characters
  7. a worldwide network of computer networks
  8. transfer a file or program to a smaller computer
  9. put into a format that can be read or processed by computers
Down
  1. set up for a particular purpose
  2. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  3. the activity of converting data or information into code
  4. crime committed using a computer and the internet
  5. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  6. a listing of the computer files stored in memory
  7. an organized body of related information
  8. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  9. (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  10. a short line of text that a web site puts on your computer's hard drive when you access the web site
  11. locate and correct errors in a computer program
  12. the symbolic arrangement of data in a computer program

21 Clues: decompressset up for a particular purposethe exclusive right to sell a worktransfer out of a database or documentan organized body of related informationa worldwide network of computer networkssomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

NATURAL NAVIGATION 2024-02-25

NATURAL NAVIGATION crossword puzzle
Across
  1. Covered with clouds; lacking clear skies.
  2. The star at the center of our solar system that provides light and heat to Earth.
  3. A visual representation of an area, typically showing geographical features, roads, and other landmarks.
  4. Parallel to the horizon; flat or level.
  5. Half of the Earth, usually divided into Northern and Southern Hemispheres or Eastern and Western Hemispheres.
  6. after To take care of or watch over someone or something.
  7. To recognize the value or significance of something; to be grateful for.
  8. for: To look for something by making an effort to find it.
Down
  1. The natural satellite of Earth that orbits around it.
  2. A course along which someone or something moves or points.
  3. Having balanced proportions; exhibiting symmetry.
  4. Divisions or offshoots of a tree or plant.
  5. Used to emphasize a statement or confirm its truth.
  6. Confused or lost in terms of direction or understanding.
  7. Networks of threads spun by spiders and other insects to catch prey.
  8. The region of the atmosphere above the Earth; where the sun, moon, stars, and clouds are seen.
  9. Those from whom a person is descended, typically one's parents or grandparents.
  10. Having a moderate degree of heat; opposite of cold.
  11. To set up or create something, typically an organization, system, or set of rules.

19 Clues: Parallel to the horizon; flat or level.Covered with clouds; lacking clear skies.Divisions or offshoots of a tree or plant.Having balanced proportions; exhibiting symmetry.Used to emphasize a statement or confirm its truth.Having a moderate degree of heat; opposite of cold.The natural satellite of Earth that orbits around it....

Carrington Event 2025-02-07

Carrington Event crossword puzzle
Across
  1. A powerful burst of solar plasma and magnetic field from the Sun.
  2. The protective magnetic field around Earth that helps shield us from solar storms.
  3. A sudden explosion of energElectromagnetic radiationoften associated with CMEs.
  4. The ability to recover from a disaster like a major solar storm.
  5. Devices in space that could be damaged by a strong CME.
  6. A disturbance in Earth’s magnetic field caused by solar activity.
  7. Steps taken to protect against future CMEs.
  8. Energy released from the Sun in the form of light and waves.
  9. The environmental conditions in space that can affect technology on Earth.
  10. A loss of electricity over a large area.
  11. The systems (power lines, roads, communication networks) that support society.
Down
  1. The modern electrical system that could fail in a future solar storm.
  2. A navigation system that could stop working if ais solar storm disrupts satellites.
  3. Used for emergency services and aviation, which could be affected by solar activity.
  4. A massive solar storm that occurred in 1859, causing global telegraph failures.
  5. Natural light displays in the sky caused by solar particles interacting with Earth’s atmosphere.
  6. The main communication network in 1859, which the Carrington Event disrupted.
  7. A disturbance on the Sun that can send energy and particles toward Earth.
  8. on Society

19 Clues: on SocietyA loss of electricity over a large area.Steps taken to protect against future CMEs.Devices in space that could be damaged by a strong CME.Energy released from the Sun in the form of light and waves.The ability to recover from a disaster like a major solar storm.A powerful burst of solar plasma and magnetic field from the Sun....

Cyberpesten 2013-12-18

Cyberpesten crossword puzzle
Across
  1. Cyberpesten is pesten. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
  2. uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
  3. Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
  4. Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
  5. Opslagplaats voor wapens
Down
  1. Naamloos, ongenoemd, wie of wat je niet kent.
  2. Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
  3. Zoals Facebook, Twitter, Netlog, Google+, MySpace.
  4. Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
  5. Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
  6. Developmental Issues in Cyberbullying amongst Adolescents.

11 Clues: Opslagplaats voor wapensNaamloos, ongenoemd, wie of wat je niet kent.Zoals Facebook, Twitter, Netlog, Google+, MySpace.Developmental Issues in Cyberbullying amongst Adolescents.Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.Vaardigheden die te maken hebben met wat je wel en niet kan doen online....

Cyberpesten 2013-12-18

Cyberpesten crossword puzzle
Across
  1. Naamloos, ongenoemd, wie of wat je niet kent.
  2. Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
  3. Opslagplaats voor wapens
  4. Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
  5. Zoals Facebook, Twitter, Netlog, Google+, MySpace.
  6. Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
Down
  1. uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
  2. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
  3. Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
  4. Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
  5. Developmental Issues in Cyberbullying amongst Adolescents.

11 Clues: Opslagplaats voor wapensNaamloos, ongenoemd, wie of wat je niet kent.Zoals Facebook, Twitter, Netlog, Google+, MySpace.Developmental Issues in Cyberbullying amongst Adolescents.Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.Vaardigheden die te maken hebben met wat je wel en niet kan doen online....

Quinlan K. 2015-04-30

Quinlan K. crossword puzzle
Across
  1. To renew or revitalize; To reload a webpage on the internet
  2. a list of citations that appear at the end of a paper, article, chapter or book.
  3. A system of connected computers that allows the sharing of files and equipment
  4. TABS The name for a way to display information on websites
Down
  1. An unauthorized person who secretly gains access to computer files
  2. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text
  3. TABS The name for a way to display information on websites
  4. the unauthorized use, reproduction, distribution, or transmission of copyrighted
  5. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  6. Software program that is designed to damage files on a computer that receives it.
  7. A collaborative website which can be directly edited by anyone with access to it
  8. Originally known as Web Log.

12 Clues: Originally known as Web Log.TABS The name for a way to display information on websitesTABS The name for a way to display information on websitesTo renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer filesA system of connected computers that allows the sharing of files and equipment...

Functions & Characteristics of Money 2017-11-28

Functions & Characteristics of Money crossword puzzle
Across
  1. Since we use money on a daily basis, it should be _______ and easy to use.
  2. To avoid mistakes during monetary transactions, money should have this characteristic.
  3. A function of money that allows value to b
  4. Money should be __________________ (3 words)to deter to ability to create counterfeit bills.
  5. A function of money that allows comparisons of the value of various goods and services; also called standard unit of account.
  6. The main function of money, allowing the exchange of goods and services.
Down
  1. Another term for measure of value.
  2. The ease with which an asset can be used to make
  3. This characteristic of money allows for facilitation of both small and large purchases.
  4. Money in electronic networks, or cash cards that can be used by consumers.
  5. As money is passed from hand to hand countless times and is stored in wallets and purses and used in vending machines it needs to be ________________.

11 Clues: Another term for measure of value.A function of money that allows value to bThe ease with which an asset can be used to makeThe main function of money, allowing the exchange of goods and services.Since we use money on a daily basis, it should be _______ and easy to use.Money in electronic networks, or cash cards that can be used by consumers....

Artificial Intelligence Crossword 2024-02-17

Artificial Intelligence Crossword crossword puzzle
Across
  1. The person who coined the term Artificial Intelligence
  2. A many valued logic in which truth values of variable may be any real number between 0 and 1
  3. A logic programming language associated with AI and computational linguistics made in 1972
  4. A machine that defeated world chess champion Garry Kasparov
  5. The branch of AI that deals with the interaction between computers and human language enabling computers to understand, interpret and generate human language
  6. A subset of machine learning that consists of three or more layers of neural network
Down
  1. ------ Network is a computational model inspired by the structure and function of human brain
  2. An AI chatboat that uses natural language processing to create human like conversational dialogue
  3. Test used to determine whether or not a computer can think intelligently like humans
  4. The company that owns Chat GPT
  5. Neural networks require large amount of ------- to make accurate decisions

11 Clues: The company that owns Chat GPTThe person who coined the term Artificial IntelligenceA machine that defeated world chess champion Garry KasparovNeural networks require large amount of ------- to make accurate decisionsTest used to determine whether or not a computer can think intelligently like humans...

ICT crosswords Aurelia 2023-03-28

ICT crosswords Aurelia crossword puzzle
Across
  1. sharing Two or more employees doing the same job but working at different times is called
  2. work time When a person is employed to work fewer hours than the normal working week, this is called
  3. type of virus that can record the activities of the user, such as password, and transmit this information to the person who wrote the malware
  4. computer software with malicious intent
  5. learning new skills outside of the worker's existing skillset
  6. The act of compromising digital devices and networks by gaining unauthorized access to an account or computer system
Down
  1. The safe and responsible use of technology
  2. work When employees work the full normal hours in a week but work at times which
  3. work When an employee works the full normal hours in a week but works fewer days, this is called
  4. Loss of skills that an employee or group of employees once had
  5. them and the employer, this is called

11 Clues: them and the employer, this is calledcomputer software with malicious intentThe safe and responsible use of technologylearning new skills outside of the worker's existing skillsetLoss of skills that an employee or group of employees once hadwork When employees work the full normal hours in a week but work at times which...

Cyber Intelligence (Medium) 2023-06-01

Cyber Intelligence (Medium) crossword puzzle
Across
  1. The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
  2. An individual or group that carries out cyber attacks for political or ideological reasons.
  3. A technique used to gather intelligence by infiltrating target networks or systems.
  4. A technique used to gather intelligence by monitoring and analyzing public sources of information.
  5. A covert technique used to gain unauthorized access to a computer system.
  6. A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
  7. The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
  1. The process of identifying and mapping potential vulnerabilities in a system or network.
  2. a centralized team responsible for monitoring and responding to security incidents.
  3. A software program that disguises itself as a legitimate program but performs malicious activities.
  4. The proactive search for indicators of compromise and potential threats within a network or system.

11 Clues: A covert technique used to gain unauthorized access to a computer system.a centralized team responsible for monitoring and responding to security incidents.A technique used to gather intelligence by infiltrating target networks or systems.The process of identifying and mapping potential vulnerabilities in a system or network....

Chapter Vocabulary Review Extension 2023-12-04

Chapter Vocabulary Review Extension crossword puzzle
Across
  1. waste produced from nuclear fission or in a nuclear reactor
  2. the energy that holds protons toghether & neutrons alike in the nucleus of an atom.
  3. a type of mining in which layers of surface soil & rock are removed from large areas to expose a resources.
  4. an energy surce that CAN'T be replentished ina short time.
  5. a kind of mining pollutionthay results from rainwater entering caves with iron sulfide & draining out
  6. a rock containing hydrocarbons.
  7. reeducing eergy use to prolong the time it takes for us to run out of fossil fuels.
Down
  1. a type of mining which involves digging deep shafts and networks of horizonta tunnels are made, either by blasting or mining to find resurces.
  2. an ice-like solid that consists of molecules of methane within a crystal network of molecules.
  3. an energy source that's repeatedly avaliable is self-replentishing, or can be replaced in a relatively short time
  4. a liquid fossil fuel(contains hydrocarbns)

11 Clues: a rock containing hydrocarbons.a liquid fossil fuel(contains hydrocarbns)an energy surce that CAN'T be replentished ina short time.waste produced from nuclear fission or in a nuclear reactorthe energy that holds protons toghether & neutrons alike in the nucleus of an atom....

AV Lesson 5 2024-03-10

AV Lesson 5 crossword puzzle
Across
  1. The act of compelling observance of or compliance with a law or rule.
  2. Existing or occurring in a digital environment, often simulated or computer-generated.
  3. Designed to be easily understood and operated by ordinary people.
  4. A penalty or coercive measure imposed to ensure compliance with a law or rule.
  5. To bring legal action against someone, typically in a court of law.
Down
  1. To introduce new methods or ideas, especially to promote change or improvement.
  2. To make a process or system operate automatically, reducing the need for human intervention.
  3. The practice of protecting computer systems, networks, and programs from digital attacks.
  4. The status of being a member of a particular country and having the rights and duties associated with it.
  5. Transmitting signals without the need for physical connection, typically using radio waves.
  6. To officially require or authorize something, often by law or command.

11 Clues: Designed to be easily understood and operated by ordinary people.To bring legal action against someone, typically in a court of law.The act of compelling observance of or compliance with a law or rule.To officially require or authorize something, often by law or command.A penalty or coercive measure imposed to ensure compliance with a law or rule....

STEM 2023-01-19

STEM crossword puzzle
Across
  1. use the principles of engineering, soil science, biology, and chemistry to develop solutions to environmental problems.
  2. studies the solid, liquid, and gaseous matter that constitutes Earth and other terrestrial planets, as well as the processes that shape them
  3. a person who works with theoretical or applied statistics
  4. Plan and conduct complex projects in basic and applied research.
Down
  1. research, design, develop, build, and test mechanical and thermal sensors and devices, including tools, engines, and machines.
  2. helps businesses make critical financial decisions by collecting, tracking, and correcting the company's finances.
  3. create the computer applications that allow users to do specific tasks and the underlying systems that run the devices or control networks
  4. responsible for analyzing financial statements and predicting the future performance of the company.
  5. application of principles and design concepts to medicine and biology for healthcare purposes.
  6. an expert in or student of mathematics.
  7. Conduct scientific studies of behavior and brain function

11 Clues: an expert in or student of mathematics.Conduct scientific studies of behavior and brain functiona person who works with theoretical or applied statisticsPlan and conduct complex projects in basic and applied research.application of principles and design concepts to medicine and biology for healthcare purposes....

Networking and the Internet 2022-06-27

Networking and the Internet crossword puzzle
Across
  1. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
  2. The process of transferring data between two or more digital devices
  3. Facts and statistics collected together for reference or analysis.
  4. A global computer network consisting of multiple interconnected networks.
  5. The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
  1. The ability of computers and the Internet to consistently perform to the expectations of their designed function.
  2. The speed and resource usage involved in collecting, manipulating, and analyzing data.
  3. The preservation of accuracy and consistency of a data set over the course of its analysis.
  4. A numerical label assigned to each computing device on a network.
  5. A series of interconnected computers and devices that share resources and exchange data with each other.
  6. The rate at which data is communicated from the Internet to a computer and vice versa.

11 Clues: A numerical label assigned to each computing device on a network.Facts and statistics collected together for reference or analysis.The process of transferring data between two or more digital devicesA global computer network consisting of multiple interconnected networks....

RUSH HOUR 2 2013-02-11

RUSH HOUR 2 crossword puzzle
Across
  1. - Every sale has five basic obstacles: no need, no money, no hurry, no _____, no trust. (6)
  2. - Save money. Live better. Slogan of __ (7)
  3. - Surveying a small group of a population to gain research insights(8)
  4. - the most effective ____ know that listening is the most important part of their job (11)
  5. - Distribution __________. How a business gets its products to the end(7)
  6. - I have seen the future and it is very much like the present, only longer. (8)
Down
  1. - A glorified cash register, something that helps improve the efficiency of your retail business. (11)
  2. - Marketing promotion that relies on word-of-mouth or online networks to spread the message.(5)
  3. - A lack of precision is dangerous when the ____ of error is small.(6)
  4. - It’s just called ‘The Bible’ now. We dropped the word ‘holy’ to give it a more _____ appeal.(famous quote)(10)
  5. - Product or brand with a high share of a mature or declining market (4,3)

11 Clues: - Save money. Live better. Slogan of __ (7)- A lack of precision is dangerous when the ____ of error is small.(6)- Surveying a small group of a population to gain research insights(8)- Distribution __________. How a business gets its products to the end(7)- Product or brand with a high share of a mature or declining market (4,3)...

E-Commerce 2015-03-12

E-Commerce crossword puzzle
Across
  1. business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
  2. a business or organisation entity provides products or services to individual customers
  3. WWW.
  4. business entities or organisations participate with other businesses or organisations to do e-commerce
  5. individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
Down
  1. communicated or received concerning a particular fact or circumstance; news
  2. business model that facilitates an environment where customers can trade with each other.
  3. give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
  4. vast computer network linking smaller computer networks worldwide
  5. person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
  6. business model in which consumers (individuals) create value and businesses consume that value

11 Clues: WWW.vast computer network linking smaller computer networks worldwidecommunicated or received concerning a particular fact or circumstance; newsa business or organisation entity provides products or services to individual customersbusiness model that facilitates an environment where customers can trade with each other....

E-Commerce 2015-03-12

E-Commerce crossword puzzle
Across
  1. /a business model in which consumers (individuals) create value and businesses consume that value
  2. /knowledge communicated or received concerning a particular fact or circumstance; news
  3. /a business model that facilitates an environment where customers can trade with each other.
  4. /when business entities or organisations participate with other businesses or organisations to do e-commerce
  5. /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
  6. /abbreviation: WWW.
Down
  1. /a vast computer network linking smaller computer networks worldwide
  2. /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
  3. /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
  4. /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
  5. /when a business or organisation entity provides products or services to individual customers

11 Clues: /abbreviation: WWW./a vast computer network linking smaller computer networks worldwide/knowledge communicated or received concerning a particular fact or circumstance; news/when a business or organisation entity provides products or services to individual customers...

Industrial Revolution 2020-11-10

Industrial Revolution crossword puzzle
Across
  1. Networks of iron rails that were used to transport goods.
  2. Many children worked on farms, small businesses mills and factories.
  3. An economic system based on private ownership of capital
  4. An organization formed by workers to strive for better wages and working conditions
  5. 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
Down
  1. Along with Robert R Livingston, put the first steamboats into service in 1807
  2. Communication by transmitting signals over a wire.
  3. An increase in the percentage and in the number of people living in urban settlements.
  4. A system in which society, owns and controls the means of production.
  5. The drive for voting rights for women that took place in the United States from 1890 to 1920.
  6. A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793

11 Clues: Communication by transmitting signals over a wire.An economic system based on private ownership of capitalNetworks of iron rails that were used to transport goods.Many children worked on farms, small businesses mills and factories.A system in which society, owns and controls the means of production....

Technology_Tsutsu 2021-04-22

Technology_Tsutsu crossword puzzle
Across
  1. Device or system capable of performing a predetermined, well-defined, variable sequence of operations
  2. A household appliance, the speed of heating in which is ensured by the use of microwave microwaves. ..microwave
  3. A machine that converts some form of energy into mechanical work, which sets something in motion
  4. A set of phenomena in which the existence, movement and interactions (by means of an electromagnetic field) of charged particles are detected
  5. Unmanned spacecraft that is launched into Earth orbit by a launch vehicle
  6. A method of wirelessly transmitting and receiving sounds and signs over a distance using electromagnetic waves transmitted by special stations
Down
  1. Worldwide information computer network that connects both users of computer networks and users of individual computers to exchange information
  2. ...intellect
  3. mobile...
  4. A simple machine invented in the fourth century BC
  5. Without the invention would not have been the Age of of Discovery

11 Clues: mobile......intellectA simple machine invented in the fourth century BCWithout the invention would not have been the Age of of DiscoveryUnmanned spacecraft that is launched into Earth orbit by a launch vehicleA machine that converts some form of energy into mechanical work, which sets something in motion...

26 2024-01-08

26 crossword puzzle
Across
  1. Work Working from a location other than the central office, often from home.
  2. Disturbance or problems that interrupt an event, activity, or process.
  3. A digital or virtual form of currency that uses cryptography for security.
  4. A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
  5. The activity of exploiting genetic material experimentally without regard to ethical considerations.
  6. The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
Down
  1. Commercial transactions conducted electronically on the Internet.
  2. A step-by-step procedure or formula for solving a problem or accomplishing a task.
  3. Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
  4. The remote diagnosis and treatment of patients by means of telecommunications technology.
  5. Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
  6. Including all or everyone; not excluding any particular group or individual.

12 Clues: Commercial transactions conducted electronically on the Internet.Disturbance or problems that interrupt an event, activity, or process.A digital or virtual form of currency that uses cryptography for security.Work Working from a location other than the central office, often from home....

SCHOOL SUBJECTS 2024-09-06

SCHOOL SUBJECTS crossword puzzle
Across
  1. study of computer systems, software, and networks, often involving programming, coding, and data management
  2. is the study of past events and human affairs, often involving research, analysis, and interpretation of historical sources
  3. Education study of physical fitness, health, and sports, often involving exercise, training, and team building
  4. study of language, literature, and writing, often involving grammar, vocabulary, and composition
  5. study of physical phenomena like the motion of matter and energy and force
Down
  1. study of the Earth’s physical features, climate, and human populations, often involving maps, charts, and data analysis
  2. study of numbers, quantities, and shapes, often involving arithmetic, algebra, and geometry
  3. study of living organisms and their interactions with the environment, often involving anatomy, physiology, and genetics
  4. creation or performance of music, often involving singing, playing instruments, or composing
  5. study of the natural world and its phenomena, often involving experimentation, observation, and analysis
  6. study of the properties and behavior of matter

11 Clues: study of the properties and behavior of matterstudy of physical phenomena like the motion of matter and energy and forcestudy of numbers, quantities, and shapes, often involving arithmetic, algebra, and geometrycreation or performance of music, often involving singing, playing instruments, or composing...

Cybersecurity 2024-09-09

Cybersecurity crossword puzzle
Across
  1. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
  2. A weakness in a system that could be exploited.
  3. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. A piece of software or technique used to take advantage of a vulnerability.
  2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
  3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
  4. The part of malware that performs malicious actions once a system is compromised.
  5. Previously unknown vulnerabilities that can be exploited before a patch is available.
  6. A potential danger to a system or organization.
  7. Measures taken to protect against attacks and mitigate risks.
  8. An attempt to exploit a vulnerability to compromise a system.

11 Clues: A potential danger to a system or organization.A weakness in a system that could be exploited.Measures taken to protect against attacks and mitigate risks.An attempt to exploit a vulnerability to compromise a system.A piece of software or technique used to take advantage of a vulnerability....

Childhood Development 2025-01-22

Childhood Development crossword puzzle
Across
  1. What type of play is it when hand actions are combined with words or singing to help engage a child
  2. Babies will understand more words than they can
  3. What motor skill is typically refered as the "large muscle"
  4. What motor skill is typically refered as the "small muscle"
  5. How much does the baby's brain grow in the first year
  6. Children between the ages of 2-5 slowly learn how to manage their____ which includes anger, sadness, happiness etc.
Down
  1. Messages are passed between neurons at connections called
  2. By the age of 6 months, the child should visibly demonstrate an attachment to the primary
  3. When playing a game of peek-a-boo, what type of play does it stimulate
  4. At what stage of a babies life span has very limited emotions at first
  5. Networks of specialized nerve cells that communicate with one another

11 Clues: Babies will understand more words than they canHow much does the baby's brain grow in the first yearMessages are passed between neurons at connections calledWhat motor skill is typically refered as the "large muscle"What motor skill is typically refered as the "small muscle"Networks of specialized nerve cells that communicate with one another...

Year 10 Summer 2025 Revision 2025-05-12

Year 10 Summer 2025 Revision crossword puzzle
Across
  1. when attackers send scam emails (or text messages) that contain links to malicious websites
  2. Going against the law of a country or jurisdiction
  3. Tricking people into revealing confidential information, like passwords or PINs.
  4. helps prevent bots from overwhelming websites by creating fake accounts or posting spam.
  5. A biometric scan used in place of a password
Down
  1. Copying a game from a website free that you should be paying for
  2. After entering your password, you might need to enter a code sent to your phone
  3. The practices and technologies used to protect systems, networks, programs, and data from cyber attacks and unauthorized access
  4. a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information
  5. The gaining of unauthorised access to data in a system or computer.
  6. An intellectual property right that protects original creative works, granting the author exclusive control over how their work is used

11 Clues: A biometric scan used in place of a passwordGoing against the law of a country or jurisdictionCopying a game from a website free that you should be paying forThe gaining of unauthorised access to data in a system or computer.After entering your password, you might need to enter a code sent to your phone...

Networking protocols Kennert, Mattias 2020-10-14

Networking protocols Kennert, Mattias crossword puzzle
Across
  1. protocol​ specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network.
  2. Protocol the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.​
  3. is the process of "stealing" bits from the HOST part of an IP address in order to divide the larger network into smaller sub-networks called subnets.
  4. is the process of selecting a path for traffic in a network or between or across multiple networks.
  5. The highest OS Protocol layer.
Down
  1. is a logical subdivision of an IP network.
  2. is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
  3. characteristics or information, usually numerical, that are collected through observation.
  4. In software engineering, ... is the process of adapting software for the purpose of achieving some form of execution in a computing environment
  5. is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
  6. In networking, a ... is a standardized set of rules for formatting and processing data.
  7. The lowes OS Protocol layer.
  8. an Hyprid protocol

13 Clues: an Hyprid protocolThe lowes OS Protocol layer.The highest OS Protocol layer.is a logical subdivision of an IP network.In networking, a ... is a standardized set of rules for formatting and processing data.characteristics or information, usually numerical, that are collected through observation....

Tech Terms 2022-04-13

Tech Terms crossword puzzle
Across
  1. the information about a person that is on the internet from their online activity.
  2. Using encryption to provide secure access to a remote computer over the internet.
  3. sending emails disguised to look from companies to make people reveal personal information, like passwords
  4. a set of data that describes and gives information about other data.
  5. something baiting you into clicking on it, used to make money from each click
  6. a social media app/website where you post and watch 15-second videos and infinitely scroll
Down
  1. websites and applications that enable users to create and share content or to participate in social networking.
  2. a global computer network providing lots of information and communication ways, made of interconnected networks
  3. a network made up of social interactions and personal relationships.
  4. software that is made to disrupt, damage, or gain unauthorized access to a computer system.
  5. a micro-blogging social media site to share news and other things

11 Clues: a micro-blogging social media site to share news and other thingsa network made up of social interactions and personal relationships.a set of data that describes and gives information about other data.something baiting you into clicking on it, used to make money from each click...

FUN DAY-ESC TRIVIA 2018-01-05

FUN DAY-ESC TRIVIA crossword puzzle
Across
  1. 3.Charter Partnered with___________ Channel to connect veterans with their communities.
  2. 8.Philo Farnsworth battled with ________, Zworykin to be called the "father of television."
  3. 6.The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
  4. 1.One of our key necessities is expanding access to ___________. This is a necessity to compete.
  5. 2.How many business units do we service?
  6. 10.Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
Down
  1. 7.The Second Largest Cable Provider in the U.S.
  2. Benefits 11. Which team handles repayment agreements for medical deductions
  3. 4.If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
  4. 9.Charter, Time Warner Cable and _________ house networks combined in 2016.
  5. 5.If I am out on workman’s compensation, my updates are completed by the _________ team.

11 Clues: 2.How many business units do we service?7.The Second Largest Cable Provider in the U.S.Benefits 11. Which team handles repayment agreements for medical deductions9.Charter, Time Warner Cable and _________ house networks combined in 2016.3.Charter Partnered with___________ Channel to connect veterans with their communities....

Australian Deportation Laws 2018-11-13

Australian Deportation Laws crossword puzzle
Across
  1. a relationship in which a person or thing is linked or associated with something else.
  2. an arrangement of intersecting horizontal and vertical lines. Or interact with others to exchange information and develop professional or social contacts.
  3. person or thing regarded as perfect. Or a standard or principle to be aimed at.
  4. of or involving the agreement or cooperation of two political parties that usually oppose each other's policies.
Down
  1. the state of being famous or well known for some bad quality or deed.
  2. concerned with or seeking to promote human welfare.
  3. acting or done in the same way over time, especially so as to be fair or accurate.
  4. the expression of disapproval of someone or something on the basis of perceived faults or mistakes.
  5. done or existing alone.
  6. the mental and moral qualities distinctive to an individual.
  7. showing or motivated by susceptibility to bribery; corrupt.

11 Clues: done or existing alone.concerned with or seeking to promote human welfare.showing or motivated by susceptibility to bribery; corrupt.the mental and moral qualities distinctive to an individual.the state of being famous or well known for some bad quality or deed.person or thing regarded as perfect. Or a standard or principle to be aimed at....

Psychological Distress 2015-11-09

Psychological Distress crossword puzzle
Across
  1. Name of the theorist
  2. Another determining factor for how you may deal with stress, this has to do with the people and networks around you
  3. A determining factor of how you deal with stress, has to do with how well you are able to respond to stress
  4. According to the Psychological Distress theory, distress helps lead to this
  5. Pearlin says that life is less of this, and more of a continuous journey
  6. Distress is a _____ that requires a psychological response
Down
  1. Theory suggests life is a _____ course of change
  2. Individual _______________ are some of the determining factors in how you respond to stress/distress, examples include race, gender, age, etc.
  3. Different ____s of stress will determine its impact
  4. If stress happens all at once or over a period of ____, the impact would be different
  5. An individual develops in order to respond to this

11 Clues: Name of the theoristTheory suggests life is a _____ course of changeAn individual develops in order to respond to thisDifferent ____s of stress will determine its impactDistress is a _____ that requires a psychological responsePearlin says that life is less of this, and more of a continuous journey...

cyberbullying 2023-10-23

cyberbullying crossword puzzle
Across
  1. type of Cyberbullying involves spreading false statements about people
  2. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  3. a feeling of worry, nervousness, or unease about something with an uncertain outcome
  4. done or chosen in accordance with wisdom or prudence; likely to be of benefit
  5. an area on the internet or other computer network where users can communicate, typically one dedicated to a particular topic
  6. a person who has come to feel helpless and passive in the face of misfortune or ill-treatment
Down
  1. the action of stopping something from happening or arising
  2. the action of supervising someone or something
  3. the action or practice of sending text messages
  4. aggressive pressure or intimidation, can be done online
  5. the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

11 Clues: the action of supervising someone or somethingthe action or practice of sending text messagesaggressive pressure or intimidation, can be done onlinethe action of stopping something from happening or arisingtype of Cyberbullying involves spreading false statements about people...

Chapter Vocabulary Review Extension 2023-12-15

Chapter Vocabulary Review Extension crossword puzzle
Across
  1. a type of mining in which layers of soil & roch (both at the surface) are removed from large areas to expose a resource
  2. a kind of minig pollution that results from rain water draining out of mines with iron sulfide
  3. the energy that holds protons together & neutrons together in the nucleus of an atom
  4. waste produced from nuclear fission
  5. a fossil fuel mostly made up of hydrocarbons, liquid
  6. an energy source that can't be replentished in a short amount of time
  7. a kind of mining eich involves digginy deep shafys & networks of horizontal tunnels are made either by blasting or mining to find resource
Down
  1. a solid that consists of molecules of methane within a crystal network of water molecules, ice-like
  2. hydrocarbon - containing rock
  3. an energy source that's repeatedly available, is self-replentishing, or can be replaced/made in a relatively short time
  4. reducing energy use to prolong the use of fossil fuels

11 Clues: hydrocarbon - containing rockwaste produced from nuclear fissiona fossil fuel mostly made up of hydrocarbons, liquidreducing energy use to prolong the use of fossil fuelsan energy source that can't be replentished in a short amount of timethe energy that holds protons together & neutrons together in the nucleus of an atom...

Artificial Lexicon 2023-12-02

Artificial Lexicon crossword puzzle
Across
  1. The field of study that enables computers to interpret visual information from the world.
  2. The delivery of computing services, including storage and processing power, over the internet.
  3. The interdisciplinary field that uses scientific methods, processes, and algorithms to extract insights from data.
  4. A machine learning approach where the algorithm is trained on labeled data.
  5. A computer system modeled after the human brain, used for tasks like image recognition.
  6. An AI program designed to simulate conversation with human users.
Down
  1. Extremely large and complex datasets that traditional data processing applications can't handle.
  2. The interdisciplinary field that involves the design, construction, operation, and use of robots.
  3. A subset of machine learning that involves neural networks with many layers.
  4. An open-source machine learning library developed by Google.
  5. A set of rules or steps followed to solve a problem or perform a task in AI.

11 Clues: An open-source machine learning library developed by Google.An AI program designed to simulate conversation with human users.A machine learning approach where the algorithm is trained on labeled data.A subset of machine learning that involves neural networks with many layers....