networks Crossword Puzzles
Networking concept puzzle 2025-06-07
Across
- It is a device that connects two different types of networks with each other.
- This kind of network connects more computers located at distinct places.
Down
- it is the most commonly used network card
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
- the computer in a network is called a NoDe
6 Clues: it is the most commonly used network card • the computer in a network is called a NoDe • This kind of network connects more computers located at distinct places. • It is a device that connects two different types of networks with each other. • It is a network device that is used to connect all the computers in a network with each other. • ...
Networking concept puzzle 2025-06-07
Across
- It is a device that connects two different types of networks with each other.
- This kind of network connects more computers located at distinct places.
Down
- it is the most commonly used network card
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
- the computer in a network is called a NoDe
6 Clues: it is the most commonly used network card • the computer in a network is called a NoDe • This kind of network connects more computers located at distinct places. • It is a device that connects two different types of networks with each other. • It is a network device that is used to connect all the computers in a network with each other. • ...
Internet Terminology 2022-11-19
Across
- The rules of etiquette that apply when communicating over computer networks
- An object, as text or graphics linked through hypertext to a document, another object.
- A website containing a writers or group of writer's own experiences, observations, opinions,
- Also called index page, main page the initial page of a website
Down
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
- engine A computer program that searches documents, especially on the world wide web
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons
- a protocol for specifying addresses on the internet
9 Clues: a protocol for specifying addresses on the internet • A secret word or expression used by authorized persons • Also called index page, main page the initial page of a website • The rules of etiquette that apply when communicating over computer networks • engine A computer program that searches documents, especially on the world wide web • ...
Internet Terminology - 2 2022-11-19
Across
- engine A computer program that searches documents
- An object, as text or graphics linked through hypertext to a document, another object
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions
Down
- Also called index page, main page the initial page of a website, usually containing an introduction
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
- A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons to prove their right to access, information, ect.
9 Clues: engine A computer program that searches documents • The rules of etiquette that apply when communicating over computer networks • A website that allows users to add, delete or revise content by using a web browser. • An object, as text or graphics linked through hypertext to a document, another object • ...
Wireless Router Security Crossword Puzzle By Taheem Bhuiyan 2022-02-11
Across
- This filter keeps port 113 from being scanned by devices from the internet.
- transmitting a packet that will be received by every device on the network
- the security method added to WPA for wireless networks that provides stronger data protection and network access control.
- a single, direct request sent from one host to another
Down
- method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- an arrangement whereby a secure, apparently private network is achieved using encryption over a public network, typically the internet.
- short for Internet Protocol
- an interface that enables the serial (one bit at a time) exchange of data between two devices
9 Clues: short for Internet Protocol • a single, direct request sent from one host to another • transmitting a packet that will be received by every device on the network • This filter keeps port 113 from being scanned by devices from the internet. • method for sending one Internet Protocol (IP) packet simultaneously to multiple hosts • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- An employee must press this button, when he/she receives the suspicious mail.
- Specific agreement and setup that allow an employee to connect a personal device.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Mobile device application that secures users network connectivity and protect a device from malware.
- For Schneider Electric's technical support to complete customer service,contact _____.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- Specific agreement and setup that allow an employee to connect a personal device.
- An employee must press this button, when he/she receives the suspicious mail.
- Schneider Electric cloud-based file collaboration space to store and share company files.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service,contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
Boone Health's Compliance Week Crossword Puzzle 2025-10-06
Across
- Moral principles and values that guide decision-making and professional behavior.
- Intentional deception for unlawful or personal gain, such as false claims or misrepresentation.
- Measures and safeguards that protect patient data, computer systems, and networks from unauthorized access or harm.
- A formal rule or standard that employees must follow to ensure compliance and consistency.
- Doing the right thing even when no one is watching; honesty and strong moral principles.
Down
- Anonymous phone or online system for reporting compliance concerns or suspected wrongdoing safely.
- The right to keep personal and patient information confidential and protected from unauthorized disclosure.
- A situation where personal benefit or outside interest may interfere with work responsibilities or objectivity.
- Mandatory education employees complete each year to stay current with compliance requirements.
9 Clues: Moral principles and values that guide decision-making and professional behavior. • Doing the right thing even when no one is watching; honesty and strong moral principles. • A formal rule or standard that employees must follow to ensure compliance and consistency. • ...
Commerce 2022-11-02
Across
- Pay back.
- Swapping or exchanging one good for another without using coins and notes.
- someone who creates and supplies goods or services
- It is a payment processing networks in the world.
- items that are usually tangible.
- Its actual value of goods.
- Amount of money that households have available for spending and saving after income taxes have been accounted for.
Down
- One that can be used many times
- The business of drawing people's attention to a good or service.
- Good pre-sales and after-sales service makes you feel you are valued customer.
- the standard of something as measured against other things of a similar kind
- What an individual gives up in order to satisfy a need or want
- The variety of items people want cannot be fulfilled because resources are limited.
- The buying and selling of goods and services between individuals and businesses.
- The amount of money that is expected to pay for something. Consumers want the best value for their money.
- The process of exploring, creating, and delivering value to meet the needs of customers.
- An online payment system that makes paying for things online and sending and receiving money safe and secure.
17 Clues: Pay back. • Its actual value of goods. • One that can be used many times • items that are usually tangible. • It is a payment processing networks in the world. • someone who creates and supplies goods or services • What an individual gives up in order to satisfy a need or want • The business of drawing people's attention to a good or service. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- An individual's physical characteristic.
- Rules and Regulatory measures to be followed.
- The secret asset of a user.
- A sequence of operations that ensure protection of data.
- A security technique that regulates who or what can view or use resources in a computing environment.
- Approval, permission, or empowerment for someone or something to do something.
- A node in a computer network, a key single point for data on its way to or from other networks.
- An account that is given a non-restrictive access to the system.
- Process of confirming the correctness of the claimed identity.
Down
- An unauthorized user able to access and misuse information.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Authentication Dictionary.
- A software program that keeps passwords in a secure digital location.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- Rules and Regulatory measures to be followed.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- The secret asset of a user.
- An account that is given a non-restrictive access to the system.
- Authentication Dictionary.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- A security technique that regulates who or what can view or use resources in a computing environment.
Down
- An individual's physical characteristic.
- A node in a computer network, a key single point for data on its way to or from other networks.
- Process of confirming the correctness of the claimed identity.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- A sequence of operations that ensure protection of data.
- Approval, permission, or empowerment for someone or something to do something.
- A software program that keeps passwords in a secure digital location.
- An unauthorized user able to access and misuse information.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
Computer (Ch-1&Ch-2) 2024-06-02
Across
- abbreviation for Unified Payments Interface
- Booking a service
- When multiple mismatched copies of a file are stored on different computers it is called ____________
- Computer network restricted to an organisation
- Computer network that allows controlled access to an information source available on the internet
- It is a device that connect two different types of networks with each other. It also increases the speed of the network
- Duplication of data at multiple places
- Wireless technology used to interconnect mobile phones, computers and printers using short-range wireless connection
Down
- Abbreviation for National Programme on Technology Enhanced Learning
- E-shopping app
- Website used for e-learning
- One of the most common job portals
- When two users have simultaneous conversation why are the internet, it is called ___________
- Certain sets of rules that determine how data should be transferred over network, compressed, presented on screen, and so on
- It works similar to a hub. However, it does not broadcast the message on the entire network
- Each computer in a network is called a _______
- It refers to the layout in which the various components of a network, like nodes, links, peripherals, etc., are connected and communicated with each other
17 Clues: E-shopping app • Booking a service • Website used for e-learning • One of the most common job portals • Duplication of data at multiple places • abbreviation for Unified Payments Interface • Computer network restricted to an organisation • Each computer in a network is called a _______ • Abbreviation for National Programme on Technology Enhanced Learning • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The illegal trade and distribution of drugs is called drug ________
- Illegal networks that distribute drugs internationally
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- Excessive use of drugs can lead to ________, which can be fatal.
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Many drug users experience this mental condition, causing sadness and hopelessness.
- In the long term, drug use leads to ___________, making it hard to stop
Down
- The illegal act of transporting or selling drugs
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- A harmful mental effect caused by drug use, where users see things that aren't real
- Drug users often experience ________, a mental disorder involving intense fear
- The condition of relying on drugs and unable to function without them
- The misuse of substances that affect both physical and mental health
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- Drug users are often involved in illegal ________ acts to support their addictio
- Drug addiction often leads to losing this, impacting economic productivity.
- A fatal consequence of drug use, often from excessive consumption
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Satellite Communication And Networks 2019-03-12
5 Clues: Link between earth station and satellite • Reliability curve in Satellite communication • Combination of transmitter and receiver in satellite • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
computer networks and protocols 2023-02-06
5 Clues: like a set rules • like a big hard drive • the result of joining to or more computers • the pat of the computer which acts as the brain. • the maximum amount of data going to a device like a pipe and water
7th Entrepreneurship & Computer Networks 2022-03-21
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • social media app that recently rebranded • information flow from a global to local scope • type of relationship in which each person is connected in the same way
NFT Crossword 2022-03-30
Across
- an organization that was designed to be automated and decentralized.
- the price of the cheapest NFT in a collection.
- the largest holders.
- the fee you have to pay for minting smart contracts into the blockchain.
- unique cryptographic tokens that exist on a blockchain and cannot be replicated.
- converting digital files into crypto collections or digital assets stored on the blockchain.
- a network of 3D virtual worlds focused on social connection.
- a distribution of cryptocurrency, tokens, or NFTs that are sent to a web3 wallet address for free as a promotion.
- cryptocurrency used on the Polygon network.
Down
- anxiety that an exciting or interesting event may currently be happening elsewhere, often aroused by posts seen on social media.
- a scaling solution that aims to provide multiple tools to improve the speed and reduce the cost and complexities of transactions on blockchain networks.
- fear, uncertainty and doubt.
- The world's first and largest digital marketplace for NFTs
- usually when developers market a project to generate sales and then abandon it, taking the existing profits.
- a decentralized, open-source blockchain with smart contract functionality.
- We're All Going to Make It
- experiencing a significant spike in price and volume.
17 Clues: the largest holders. • We're All Going to Make It • fear, uncertainty and doubt. • cryptocurrency used on the Polygon network. • the price of the cheapest NFT in a collection. • experiencing a significant spike in price and volume. • The world's first and largest digital marketplace for NFTs • a network of 3D virtual worlds focused on social connection. • ...
TECHNOLOGY VOCABULARY 2021-08-12
Across
- the process in which output of a system is returned to input
- a worldwide network of computer networks
- the symbolic arrangement of data in a computer program
- crime committed using a computer and the internet
- the amount of information that can be stored on a disk drive
- a set of characters comprising a unit of information
- RAM memory that is set aside as a specialized buffer storage
Down
- a set of related records kept together
- a list of questions that are frequently asked (about a given topic) along with their answers
- a failure or defect in a computer program, system,or machine
- science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- a listing of the computer files stored in memory
- an organized body of related information
- put into a format that can be read or processed by computers
- the exclusive right to sell a work
- indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- any small compartment
17 Clues: any small compartment • the exclusive right to sell a work • a set of related records kept together • an organized body of related information • a worldwide network of computer networks • a listing of the computer files stored in memory • crime committed using a computer and the internet • a set of characters comprising a unit of information • ...
Digital Technology Final part 1 2023-05-08
Across
- the physical parts of the computer that store and run written instructions
- type of file that has been created or saved by an application
- everything you see when you start your computer
- wide area network
- Arranging all folders files and other documents in an organized manner
- a document created by a program or system
- Something used to hold files or other folders
Down
- a computer file like an image, video or document which can be included in an email and shared
- Free cloud storage service that is integrated with the company's other services and systems
- Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
- a set of digital instructions, data or programs used to operate computers
- website that allows users to add and update content on the site using their own web browser.
- online journal which creates interaction from readers. They consist of special or common interest groups
- free web-based application in which documents and spreadsheets can be edited, created and stored online
- local area network
- the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
- the screen that displays the desktop
17 Clues: wide area network • local area network • the screen that displays the desktop • a document created by a program or system • Something used to hold files or other folders • everything you see when you start your computer • type of file that has been created or saved by an application • Arranging all folders files and other documents in an organized manner • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Marwan crossword 2024-04-17
Across
- a symmetric encryption algorithm (block cipher) using 56-bit keys
- attack which consists of testing all the words in a list as a keyword
- attack which consists of testing all possible password or key solutions.
- a public-key cryptosystem, one of the oldest widely used for secure data transmission.
Down
- The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
- is used to transmit data securely and anonymously over public networks.
6 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keys • attack which consists of testing all the words in a list as a keyword • is used to transmit data securely and anonymously over public networks. • attack which consists of testing all possible password or key solutions. • ...
CSI106 Cross Word - 4 2024-11-05
Across
- A set of rules or procedures that govern the format and transmission of data between two or more devices.
- A networking device that forwards data packets between computer networks.
Down
- A secret word or phrase that is used to authenticate a user.
- A formatted unit of data carried by a packet-switched network.
- A connection point on a computer.
- A network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.
6 Clues: A connection point on a computer. • A secret word or phrase that is used to authenticate a user. • A formatted unit of data carried by a packet-switched network. • A networking device that forwards data packets between computer networks. • A set of rules or procedures that govern the format and transmission of data between two or more devices. • ...
Cybersecurity for Schneider Electric 2022-01-09
Across
- Multifactor authentication solution used in Schneider Electric that gives employees secure access to company applications.
- Schneider Electric's standard web filter solution which provides a full security stack with all the in-depth protection.
- Schneider Electric cloud-based file collaboration space to store and share company files.
- An employee must press this button, when he/she receives the suspicious mail.
- Mobile device application that secures users network connectivity and protect a device from malware.
- Firewall protection for Schneider Electric users computers and server's networks that prevents unauthorized traffic.
Down
- Schneider Electric's standard remote access solution and it allows users to work remotely through VPN.
- For Schneider Electric's technical support to complete customer service, contact _____.
- Specific agreement and setup that allow an employee to connect a personal device.
9 Clues: An employee must press this button, when he/she receives the suspicious mail. • Specific agreement and setup that allow an employee to connect a personal device. • For Schneider Electric's technical support to complete customer service, contact _____. • Schneider Electric cloud-based file collaboration space to store and share company files. • ...
What is the Internet? 2022-03-18
Across
- Funding a project by raising money from a large number of people via the Internet.
- Science that harnesses the problem solving capacity of hundreds or thousands of citizens on the Internet to solve complicated problems is called ______ science.
- Is this TRUE or FAKE: Less than 67% of the world uses the Internet.
- A group of interconnected computing devices capable of sending and receiving data is called a computer ______.
Down
- The Internet has made it much easier to do this.
- The global network of networks.
- Is this TRUE or FAKE: There are no negative consequences of the Internet.
- Personal computers volunteering processing time so that more calculations can be computed is called _______ computing.
- Agreed upon set of rules that standardize communication between machines.
9 Clues: The global network of networks. • The Internet has made it much easier to do this. • Is this TRUE or FAKE: Less than 67% of the world uses the Internet. • Is this TRUE or FAKE: There are no negative consequences of the Internet. • Agreed upon set of rules that standardize communication between machines. • ...
OCTH 224 Impact of Disability on Participation: Environmental Factors 2021-03-03
Across
- Method of delivering information, includes devices & tech
- Climate and weather conditions, geographic and topographic features of the environment
- Resources to live and participate in the community across environmental contexts. Includes recessions, cutbacks, systemic subsidy reallocation, changes in benefits
- Vehicular travel from one location to another via private and public modes
Down
- Architecture, land development, accessibility, noise, crowds, air quality. affects mobility, cognitive, social/communication, sensory accessibility features.
- Access to systems to support participation, health care, housing, community, education, employment, police, emergency response, etc.
- Specialized tools or modifications to facilitate participation in everyday activities
- Positive/negative attitudes, reactions, and treatments that are societally defined on disability. Includes inclusion, enfranchisement, empowerment.
- Physical assistance, material support, emotional support, networks, social capital. involves issues of companionship, trust, and relational strain
9 Clues: Method of delivering information, includes devices & tech • Vehicular travel from one location to another via private and public modes • Specialized tools or modifications to facilitate participation in everyday activities • Climate and weather conditions, geographic and topographic features of the environment • ...
NSS Chapter 4a 2023-01-31
Across
- translate private ipv4 addresses to public ipv4 addresses.
- used by Windows DHCP clients to self-configure when no DHCP servers are available.
- used on a host to test if tcp/ip is operational.
Down
- logical network address that identifies a particular host.
- logical 32-bit ipv4 address is hierarchical and is made of two parts.
- common blocks of addresses used by most organizations to assign ipv4 addresses to internal hosts.
6 Clues: used on a host to test if tcp/ip is operational. • logical network address that identifies a particular host. • translate private ipv4 addresses to public ipv4 addresses. • logical 32-bit ipv4 address is hierarchical and is made of two parts. • used by Windows DHCP clients to self-configure when no DHCP servers are available. • ...
Networking concept puzzle 2025-06-07
Across
- It is a device that connects two different types of networks with each other.
- This kind of network connects more computers located at distinct places.
Down
- it is the most commonly used network card
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
- the computer in a network is called a NoDe
6 Clues: it is the most commonly used network card • the computer in a network is called a NoDe • This kind of network connects more computers located at distinct places. • It is a device that connects two different types of networks with each other. • It is a network device that is used to connect all the computers in a network with each other. • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Hosts that provide information
- Private networks in use by just one company
- Web pages that groups of people can edit and view together
- limits the impact of a failure, so that the fewest number of devices are affected.
- Applications can be accessed over the Internet through a subscription.
- identify the physical location of intermediary devices and cable installation.
- yes
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Identify devices, ports, and addressing scheme.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a large geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- Real-time communication between two or more people
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Interactive websites where people create and share user-generated content with friends and family
Down
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Hosts that request information
- allows people to share files with each other without having to store and download them from a central server
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a small geographical area
- Having multiple paths to a destination
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Examples include routers, switches and wireless access points
41 Clues: yes • diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Lesson 3 Conputer Vocabulary 2013-09-06
Across
- plug into electric outlets, and can protect against power strikes
- a command to test connectivity and isolate hardware problems and any mismatched configurations
- instructs the operating system on how to operating specific hardware
- a secure process for keeping confidential information private
- can cause computers to short circuit, resulting in the loss of data and damage to hardware
Down
- a procedure that places a priority on files that would be difficult or impossible to replace or reconstruct if they were lost
- a device that ranges from basic kits to ones more sophisticated models designed for desktop computers and networks
- are short, fast transfers of electrical voltage, current, or energy
- occurs when older systems are discarded and the data is not deleted
9 Clues: a secure process for keeping confidential information private • plug into electric outlets, and can protect against power strikes • are short, fast transfers of electrical voltage, current, or energy • occurs when older systems are discarded and the data is not deleted • instructs the operating system on how to operating specific hardware • ...
Wraparound Puzzle 2022-08-01
Across
- Wraparound identifies these to build on and enhance capabilities and skills
- Family and youth perspectives are intentionally elicited and prioritized during all phases of the wraparound process
- Encourages participation of team mebers drawn from networks of interpersonal community relationships
- Wraparound prcess demonstrates respect for and builds on the values preferences beliefs and identify of the child youth and their family
- Team members work cooperatively and share responsibility
- Despite challenges the team continues working towards the goals until the team reaches agreement that Wraparound process is no longer required
Down
- Observable and measurable indicators of succcess monitors progress
- team develops a customized set of strategies, supports and services based on this
- Least restrictive setting that promotes child and family intergration into home
9 Clues: Team members work cooperatively and share responsibility • Observable and measurable indicators of succcess monitors progress • Wraparound identifies these to build on and enhance capabilities and skills • Least restrictive setting that promotes child and family intergration into home • ...
CyberSecurity 2022-08-25
Across
- The state of being free from unwanted or undue intrusion or disturbance in one's private life or affairs; freedom to be let alone
- Detailed report, usually about a person
- rules for interacting politely online
- files stored on your computer (cell phone) that tell browsers how to remember your favorites and your previous searches
- the practice of protecting systems, networks, and programs from digital attacks
- Someone who intentionally targets people for harm using online chat rooms or social media.
Down
- The ability to act in a safe and responsible way on the Internet and other connected environments.
- A site or online community where people with like experiences or interests communicate with each other and share information, resources, etc.
- Information about you and what you do online
9 Clues: rules for interacting politely online • Detailed report, usually about a person • Information about you and what you do online • the practice of protecting systems, networks, and programs from digital attacks • Someone who intentionally targets people for harm using online chat rooms or social media. • ...
Internet Terminology - 2 2022-11-19
Across
- engine A computer program that searches documents
- An object, as text or graphics linked through hypertext to a document, another object
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions
Down
- Also called index page, main page the initial page of a website, usually containing an introduction
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users
- A Uniform Resource Locator (URL) : a protocol for specifying addresses on the internet
- A website that allows users to add, delete or revise content by using a web browser.
- A secret word or expression used by authorized persons to prove their right to access, information, ect.
9 Clues: engine A computer program that searches documents • The rules of etiquette that apply when communicating over computer networks • A website that allows users to add, delete or revise content by using a web browser. • An object, as text or graphics linked through hypertext to a document, another object • ...
Laws of Cybercrime Crossword 2021-06-12
Across
- the process by which criminals attempt to conceal the illicit origin and ownership of the proceeds of their unlawful activities.
- Any illegal activity already in the criminal code committed by using a computer.
- The use of the computer to sabotage computer networks vital to national welfare.
- Area of the law which concerns computers and computer related crime.
- manufacture of false money for gain, a kind of forgery in
Down
- mailing or electronically transmitting something associated with fraud.
- A crime that involves using a computer to steal computer data stored in a digital format.
- A crime in which a cyber criminal falsely adopts the identity of another computer user in order to commit fraud.
- The communication via computer or other electronic device of false data that damages a person's reputation.
- Provides for criminal prosecution of individuals who engage in copyright infringement. electronic theft
- Protecting the rights of people's original creative
11 Clues: Protecting the rights of people's original creative • manufacture of false money for gain, a kind of forgery in • Area of the law which concerns computers and computer related crime. • mailing or electronically transmitting something associated with fraud. • Any illegal activity already in the criminal code committed by using a computer. • ...
Workplace Readiness Skills (Professional Skills) 2022-08-14
Across
- PlanS personal and professional goals related to education, career, finances, and health
- SAFETY Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
- Meets organizational expectations regarding work schedule, behavior, appearance, and communication
- and interprets workplace documents and writes effectively
- Locates information efficiently, evaluates the credibility and relevance of sources and facts
- TECHNOLOGY Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
- Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
Down
- Accepts constructive feedback well and is open to new ideas and ways of doing things
- Applies mathematical skills to complete tasks as necessary
- Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
- Plans, prioritizes, and adapts work goals to manage time and resources effectively
- SECURITY Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
12 Clues: and interprets workplace documents and writes effectively • Applies mathematical skills to complete tasks as necessary • Plans, prioritizes, and adapts work goals to manage time and resources effectively • Accepts constructive feedback well and is open to new ideas and ways of doing things • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for refences or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for refences or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
6th Grade Computers Vocabulary 5 2019-11-13
Across
- a copy of a file or directory on a separate storage device
- a string of characters beginning with a period and followed by one or more letters; the optional second part of a PC computer filename
- RAM memory that is set aside as a specialized buffer storage
- any computer that is hooked up to a computer network
- a set of related records kept together
Down
- adjusting the parts of a something in relation to each other
- a computer providing shared resources to a computer network
- a model or standard for making comparisons
- security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet
- the organization of data according to preset specifications
- (computer science) a computer that provides client stations with access to files and printers as shared resources to a computer network
11 Clues: a set of related records kept together • a model or standard for making comparisons • any computer that is hooked up to a computer network • a copy of a file or directory on a separate storage device • a computer providing shared resources to a computer network • the organization of data according to preset specifications • ...
Abooban 2023-03-12
Across
- the making of a judgement about the amount, number, or value of something
- a stock or supply of money, materials, staff, and other assets that can be drawn on by a person or organization in order to function effectively
- Ability to write without mistakes
- verb, when you are the main person in the group you tell them what to do
- facts provided or learned about something or someone
- the principal method of human communication, consisting of words used in a structured and conventional way and conveyed by speech, writing, or gesture
- the imparting or exchanging of information by speaking, writing, or using some other medium
Down
- Worldwide system of computer networks
- the earth, together with all of its countries and peoples
- an organized group of people with a particular purpose, such as a business or a government department
- he main means of mass communication (broadcasting, publishing, and the internet) regarded collectively
11 Clues: Ability to write without mistakes • Worldwide system of computer networks • facts provided or learned about something or someone • the earth, together with all of its countries and peoples • verb, when you are the main person in the group you tell them what to do • the making of a judgement about the amount, number, or value of something • ...
Science & Technology After WW2 2013-05-14
Across
- What kind of phone cables were laid in 1956?
- Scientist who introduced the polio vaccine in 1955.
- How many major broadcasting networks where operationg during the mid-50s?
- In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
- In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
- The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
Down
- The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
- Perfected a polio vaccine that could be administrated by mouth.
- What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
- What pace were the improvements in television technology?
- In 1951, what transcontinental dialing services were first begun?
11 Clues: What kind of phone cables were laid in 1956? • Scientist who introduced the polio vaccine in 1955. • What pace were the improvements in television technology? • Perfected a polio vaccine that could be administrated by mouth. • In 1951, what transcontinental dialing services were first begun? • ...
Science & Technology After WW2 2013-05-14
Across
- Scientist who introduced the polio vaccine in 1955.
- What pace were the improvements in television technology?
- The system that would total 41,000 miles of the roadways, linking one end of the country to the other.
Down
- The upper & lower peninsulas of mishigan are connected by the world's longest suspension bridge. What is it called?
- In the early 50s, one of the world's longest underwater vehicular tunnels, opened, connecting Brooklyn & Manhattan in NYC. What is it called?
- In 1952. a record number of 21,269 cases were reported of the illness caused by poliovirus.
- What kind of phone cables were laid in 1956?
- In 1951, what transcontinental dialing services were first begun?
- How many major broadcasting networks where operationg during the mid-50s?
- What month was the ribbon-cutting ceremony along the first portion of the interstate high-way on the 4th 1958?
- Perfected a polio vaccine that could be administrated by mouth.
11 Clues: What kind of phone cables were laid in 1956? • Scientist who introduced the polio vaccine in 1955. • What pace were the improvements in television technology? • Perfected a polio vaccine that could be administrated by mouth. • In 1951, what transcontinental dialing services were first begun? • ...
E-Commerce 2015-03-12
Across
- /knowledge communicated or received concerning a particular fact or circumstance; news
- /abbreviation: WWW.
- /a business model that facilitates an environment where customers can trade with each other.
- /a business model in which consumers (individuals) create value and businesses consume that value
- /when a business or organisation entity provides products or services to individual customers
- /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
- /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
- /a vast computer network linking smaller computer networks worldwide
Down
- /when business entities or organisations participate with other businesses or organisations to do e-commerce
- /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
- /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
11 Clues: /abbreviation: WWW. • /a vast computer network linking smaller computer networks worldwide • /knowledge communicated or received concerning a particular fact or circumstance; news • /when a business or organisation entity provides products or services to individual customers • ...
Compliance Crossword 2023 2023-10-25
Across
- Moral principles and values that guide a person.
- When there is a breach of PHI, it is important to notify Compliance .
- HDS employees must all suspected or observed improper practices, violations of policies and laws.
- The act of intimidating or engaging in behavior against someone for a good faith report of noncompliance or participating in an investigation.
- All PHI is to be kept .
Down
- The set of measures to ensure that networks, systems, & data breaches are avoided.
- Set of standards or rules that guide business behavior in a positive direction. Code of
- When HDS contracts services or functions to another entity which involves PHI, a or business associate agreement is needed.
- An authorized person viewing protected health information is an example of a reportable incident.
- A method of securing access to PHI on your computer, is to it when away from your computer.
- All employees will receive upon hire and annually thereafter.
11 Clues: All PHI is to be kept . • Moral principles and values that guide a person. • All employees will receive upon hire and annually thereafter. • When there is a breach of PHI, it is important to notify Compliance . • The set of measures to ensure that networks, systems, & data breaches are avoided. • ...
Station 5 2024-05-24
Across
- When acids are added to water, they form positively charged ________ ions
- Forces on materials can cause them to __________ or extend (get longer)
- is a method of exchanging messages and files over the internet
- Liquids and solutions that are able to conduct electricity are called __________
- _______ is a very large global network that consists of many other interconnected networks
Down
- The products of photosynthesis are glucose and ______
- One of the input devices that allow users to enter data or instructions into a computer system
- A thread like structure made of DNA and protein by which hereditary information is passed to next generation.
- is an atom, or atoms, of the same element that have an equal number of protons but a different number of neutrons
- The distance from the undisturbed position to the peak (crest) or trough of a wave
- _______ is a wireless communication technology that allows devices to be connected within a maximum range of about 30 meters
11 Clues: The products of photosynthesis are glucose and ______ • is a method of exchanging messages and files over the internet • Forces on materials can cause them to __________ or extend (get longer) • When acids are added to water, they form positively charged ________ ions • Liquids and solutions that are able to conduct electricity are called __________ • ...
The AI-Q Test 2025-08-11
Across
- (9) A set of rules a computer follows to solve a problem or perform a task.
- (15) A subset of AI involving algorithms that improve performance on a task through experience.
- (7) An AI-powered conversational interface designed to simulate human conversation.
Down
- (11) A subset of machine learning that uses artificial neural networks with many layers to learn from data.
- (10) The use of technology to perform tasks with minimal human intervention.
- (9) Analytics focused on forecasting future outcomes based on historical data.
- (9) AI that mimics human thought processes like understanding and decision-making.
- (7) Datasets too large or complex for traditional data processing applications.
- (10) AI capable of producing new content, such as text, images, or audio.
- (8) The branch of technology that deals with the design, construction, operation, and application of robots.
- (9) Machines that are programmed to think and learn like humans in the field of AI.
11 Clues: (10) AI capable of producing new content, such as text, images, or audio. • (9) A set of rules a computer follows to solve a problem or perform a task. • (10) The use of technology to perform tasks with minimal human intervention. • (9) Analytics focused on forecasting future outcomes based on historical data. • ...
Types of Energy 2025-09-26
Across
- Energy of motion
- Stored energy that an object or system has due to its position or state
- The faster the particles move/vibrate, the more of this energy they have. It is related to the temperature of an object.
- The only type of energy visible to the human eye
- Used for transmitting radio and television broadcasts, and for mobile phones and wireless networks (longest wavelengths).
- Energy stored in the bonds of atoms and molecules
Down
- Energy caused by vibrations traveling through air, water, or a solid
- Used in radar, satellite communication, and ovens (which use them to heat food by exciting water molecules).
- Energy of the movement of charged particles, like electrons, through a conductor.
- Can pass through many objects, including the body, and are used in medical imaging to view internal structures like bones.
- Produced by the hottest and most energetic objects in the universe (supernovas and neutron stars) (highest-energy, shortest-wavelength).
11 Clues: Energy of motion • The only type of energy visible to the human eye • Energy stored in the bonds of atoms and molecules • Energy caused by vibrations traveling through air, water, or a solid • Stored energy that an object or system has due to its position or state • Energy of the movement of charged particles, like electrons, through a conductor. • ...
Cyber Security CrossWord Puzzel 2021-03-02
Across
- Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
- _______________ is any crime perpetrated using computers and networks.
- A__________ monitored a network, blocking dangerous content such as viruses.
- _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
- Viruses, trojans and worms are examples of __________________________.
- An ethical hacker.
- Your favorite teacher.
- A statement of an intention to inflict harm or damage .
Down
- Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
- Your favorite class.
- __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
- The exposure to the possibility of the attacked or harmed.
- Actual action that causes harm or damage.
- A blend between an ethical hacker and a cracker.
- __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
- An action taken to counteract the threat.
- ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.
17 Clues: An ethical hacker. • Your favorite class. • Your favorite teacher. • Actual action that causes harm or damage. • An action taken to counteract the threat. • A blend between an ethical hacker and a cracker. • A statement of an intention to inflict harm or damage . • The exposure to the possibility of the attacked or harmed. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- The process of converting information or data into a code, especially to prevent unauthorized access.
- A security technique that regulates who or what can view or use resources in a computing environment.
- Approval, permission, or empowerment for someone or something to do something.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
- Authentication Dictionary.
- A software program that keeps passwords in a secure digital location.
- The secret asset of a user.
Down
- A malicious activity caused to an organization that comes from within the organization.
- Rules and Regulatory measures to be followed.
- An individual's physical characteristic.
- An account that is given a non-restrictive access to the system.
- Process of confirming the correctness of the claimed identity.
- A node in a computer network, a key single point for data on its way to or from other networks.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- A sequence of operations that ensure protection of data.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- An unauthorized user able to access and misuse information.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
ARCON - Privileged Access Management 2019-11-06
Across
- Rules and Regulatory measures to be followed.
- The secret asset of a user.
- Authentication Dictionary.
- An account that is given a non-restrictive access to the system.
- A software that forms a barrier between the computer and the outside world to prevent intrusion.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- To collect and analyse information to detect suspicious behavior or unauthorised system changes.
Down
- A sequence of operations that ensure protection of data.
- An unauthorized user able to access and misuse information.
- A malicious activity caused to an organization that comes from within the organization.
- A code made up of numbers separated by three dots that identifies a particular computer on the Internet.
- Approval, permission, or empowerment for someone or something to do something.
- Process of confirming the correctness of the claimed identity.
- A node in a computer network, a key single point for data on its way to or from other networks.
- A security technique that regulates who or what can view or use resources in a computing environment.
- A software program that keeps passwords in a secure digital location.
- An individual's physical characteristic.
17 Clues: Authentication Dictionary. • The secret asset of a user. • An individual's physical characteristic. • Rules and Regulatory measures to be followed. • A sequence of operations that ensure protection of data. • An unauthorized user able to access and misuse information. • Process of confirming the correctness of the claimed identity. • ...
Media and Technology: Unit 1 & Unit 2 Vocabulary 2023-03-02
Across
- The information computers get from users, devices, or other computers
- Special skill or knowledge about a particular thing
- The reason that someone does something; intention
- The main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- Using media in a way that feels healthy and in balance with other life activities (family, friends, school, hobbies, etc.)
- Someone or something that provides information
- A machine that works with information
- Content (text, audio, images, video) or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
- When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
- Word or concept of great significance
- Behaviors we do often or regularly with digital media and devices
- Believable
- An attempt to trick someone online, usually with the intention of stealing money or private information
- The way we apply scientific knowledge for practical purposes.
- Deciding what to include and what to keep out in digital media
- The thinking work computers do to turn input into output
- The information computers give to users, devices, or other computers
17 Clues: Believable • Word or concept of great significance • A machine that works with information • Someone or something that provides information • The reason that someone does something; intention • Special skill or knowledge about a particular thing • The thinking work computers do to turn input into output • The way we apply scientific knowledge for practical purposes. • ...
CLucas - Network Devices 2023-01-03
Across
- This kind of router includes a switch and a wireless AP.
- IPS does not allow _____ to enter the target system without first being analyzed.
- ______ provides higher dedicated bandwidth to each divide on the network.
- A cloud-based network controller is a device in the cloud that allows _____ administrators to manage network devices.
- What are repeaters also known as?
- These are an all-in-one security device.
- This is the process of physically isolating legacy systems from other networks and particularly the internet. (2 words)
Down
- An endpoint management server can restrict an end device’s ______ to the network.
- Does IDS work offline or online?
- How many types of NIC cards are there?
- Firewalls protect data and equipment on a network from _______ access.
- What kind of power do PoE's transfer?
- A patch _____ is commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility.
- What do bridges divide LANs into?
- These are embedded and used to program to perform specific actions.
- This kind of switch allows administrators to add security and additional features.
- Wireless APs use these to communicate with Wireless NICs. (2 words)
17 Clues: Does IDS work offline or online? • What do bridges divide LANs into? • What are repeaters also known as? • What kind of power do PoE's transfer? • How many types of NIC cards are there? • These are an all-in-one security device. • This kind of router includes a switch and a wireless AP. • These are embedded and used to program to perform specific actions. • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Social Networks Crossword Puzzle 2022-04-28
5 Clues: collection of connected nodes • online page that represents yourself • information flow from a global to local scope • old name of a social media app that recently rebranded • type of relationship in which each person is connected in the same way
Satellite Communication And Networks 2019-03-12
5 Clues: Equatorial orbit is sometimes called as • Link between satellite and earth station • Reliability curve in Satellite communication • Part of the celestial sphere directly above the observer • Angle between orbital plane and earth's equatorial plane
Vocabulary 4 2012-09-18
Across
- The main international standards organization for the world wide web
- strands of optically pure glass
Down
- a program accessible on the web which has a catalog of scanned websites in a large data base
- protocol devised and implemented to help researchers share information across a diverse computer network
- directs packets between separate local area networks by reading each packet header and directing it into the fastest direction
- the address of a document or other resource available on the inernet
6 Clues: strands of optically pure glass • The main international standards organization for the world wide web • the address of a document or other resource available on the inernet • a program accessible on the web which has a catalog of scanned websites in a large data base • ...
3D AJ 2021-04-29
Across
- local area network
- Is a networking device that forwards data packets between computer networks
- consists of multiple devices that communicate with one another
Down
- device, such as a wireless router, that allows wireless devices to connect to a network.
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- the service of providing the computer equipment and software for a website on the internet and making it available for people to see
6 Clues: local area network • consists of multiple devices that communicate with one another • Is a networking device that forwards data packets between computer networks • device, such as a wireless router, that allows wireless devices to connect to a network. • ...
Media Tech Crossword 2022-04-13
Across
- a platform that allows you to create servers and talk to people from around the world. It’s great for gamers!
- a scam made to trick you into revealing your personal info.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- A service that encrypts your data and makes you less vulnerable to tracking
- a set of data that describes and gives information about other data.
- a matching game set in a magical kingdom your parents probably play.
- a platform that allows you to post videos and comment on others videos
Down
- the footprint a person leaves online after posting something.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
9 Clues: a scam made to trick you into revealing your personal info. • the footprint a person leaves online after posting something. • a set of data that describes and gives information about other data. • a matching game set in a magical kingdom your parents probably play. • a platform that allows you to post videos and comment on others videos • ...
Internet Terminology 2022-11-19
Across
- A secret word or expression used by authorized persons
- An object, as text or graphics linked through hypertext to a document, another object.
- A website that allows users to add, delete or revise content by using a web browser.
- Also called index page, main page the initial page of a website
- engine A computer program that searches documents, especially on the world wide web
Down
- A practice of using fraudulent emails and comprises of legitimate websites to extract financial data from computer users for the purposes of identity theft.
- a protocol for specifying addresses on the internet
- The rules of etiquette that apply when communicating over computer networks
- A website containing a writers or group of writer's own experiences, observations, opinions,
9 Clues: a protocol for specifying addresses on the internet • A secret word or expression used by authorized persons • Also called index page, main page the initial page of a website • The rules of etiquette that apply when communicating over computer networks • engine A computer program that searches documents, especially on the world wide web • ...
Cyber Crossword 2021-04-26
Across
- media, A computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities.
- Electronic device most students own at home and is square and mostly portable.
- the use of technology to harass, threaten, embarrass, or target another person.
Down
- A result or effect, typically one that is unwelcome or unpleasant.
- An emotion one might feel after being cyberbullied by a friend and telling someone they trust.
- A repetitive action toward another human purposely causing harm or intimidation.
- safety, The act of protecting ones self or others from harm or intimidation online.
- An individual who causes harm or stress to another human intentionally and repetitively.
- Having firm belief or reliability in someone.
9 Clues: Having firm belief or reliability in someone. • A result or effect, typically one that is unwelcome or unpleasant. • Electronic device most students own at home and is square and mostly portable. • the use of technology to harass, threaten, embarrass, or target another person. • A repetitive action toward another human purposely causing harm or intimidation. • ...
Finance Cross 2023-11-23
Across
- Open banking technology aims to create new routes between customers' bank accounts and these.
- Former Nationwide chief executive who led the review.
- The review calls for the payment sector to use this technology for creating new routes.
- The country that should develop strategies to challenge card network dominance.
- Digital wallets, including Google Pay and Apple Pay, account for this percentage of UK retail payments.
Down
- A service at risk of falling behind and needing an alternative.
- A widely used service in the UK, taking 70-80 seconds on average.
- The time alternative methods in Brazil, India, and Sweden take to process a transaction.
- Visa and Mastercard together accounted for this percentage of all debit and credit card payments in the UK in 2021.
- Card networks facing a probe into cross-border interchange fees.
10 Clues: Former Nationwide chief executive who led the review. • A service at risk of falling behind and needing an alternative. • Card networks facing a probe into cross-border interchange fees. • A widely used service in the UK, taking 70-80 seconds on average. • The country that should develop strategies to challenge card network dominance. • ...
IS-95 CHANNELS 2023-09-25
Across
- How does Power Control in IS-95 help improve system capacity?
- Which channel is used for initial access and call setup procedures in IS-95?
- What channel is used by the mobile device to send data and voice to the base station in IS-95?
- What is the typical unit of measurement for power control adjustments in IS-95?
Down
- What is the primary purpose of the Reverse Traffic Channel in IS-95?
- Why is power control important in IS-95 CDMA networks?
- What type of power control is used in IS-95 to maintain signal quality?
- What is the primary purpose of the Forward Traffic Channel in IS-95?
- Which channel notifies the mobile device to adjust its power level in IS-95?
- What key function does Power Control serve in IS-95 CDMA?
- In IS-95, which channel carries voice and data from the base station to the mobile device?
11 Clues: Why is power control important in IS-95 CDMA networks? • What key function does Power Control serve in IS-95 CDMA? • How does Power Control in IS-95 help improve system capacity? • What is the primary purpose of the Reverse Traffic Channel in IS-95? • What is the primary purpose of the Forward Traffic Channel in IS-95? • ...
Social Customer Service 2019-05-21
Across
- A type of automated artificial intelligence tool used to converse with users
- A prediction of the net profit attributed to the entire future relationship with a customer
- An app that enables users to message each other instantaneously – usually on a smartphone
Down
- Tracking conversations online for mentions of your product, brand, or competitors
- A social media user with a large audience who can drive awareness about a topic, product, or service
- The interaction between people and brands on social networks.
- A social media user who makes offensive or annoying postings which provoke other users
- Someone who talks favorably about a brand or product, and passes on positive word-of-mouth to other people.
- The potential audience that a message can reach
9 Clues: The potential audience that a message can reach • The interaction between people and brands on social networks. • A type of automated artificial intelligence tool used to converse with users • Tracking conversations online for mentions of your product, brand, or competitors • ...
Paws, Pandas, and Predictions 2025-12-12
Across
- In Data Science, it's a collection of decisions; in the living room, it’s what the cat climbs and destroys
- A structure for organizing data, or what a dog chases but never catches
- The only reptile allowed in our tech stack.
- In the code, they break production; on the dog, they require a special collar
- When the model fits the training data perfectly, or when the sweater is way too tight on the Pug
Down
- Essential for tracking web sessions; highly requested by "Good Boys."
- What we do to neural networks and naughty puppies
- What you have to do to a messy dataset AND a used litter box
- How we build a model when the legacy code fails, or what the cat does to the new sofa
9 Clues: The only reptile allowed in our tech stack. • What we do to neural networks and naughty puppies • What you have to do to a messy dataset AND a used litter box • Essential for tracking web sessions; highly requested by "Good Boys." • A structure for organizing data, or what a dog chases but never catches • ...
Techology Crossword Puzzle 2016-08-09
Across
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- unsolicited email messages sent for marketing purposes.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Techology Crossword Puzzle 2016-08-09
Across
- unsolicited email messages sent for marketing purposes.
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
Down
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Showtime 2019-03-22
Across
- Showtime has this many commercial free channels (Write out the number).
- This series stars NY 'Fixer' Liev Schreiber.
- This hit comedy series stars Frankie Shaw as a single mom struggling in Boston to make ends meet.
- What series airs on Sundays at 9PM.
- This movie premieres April 20th.
- This is Showtime's first Late-Night Talk Show.
- This hit showtime series stars Claire Danes as a CIA operative.
- This iconic Hip-Hop group has a docu-series premiering in May.
- This movie premieres on April 6th.
Down
- This Showtime series stars Jim Carrey in his first lead TV role in over 20 years.
- This Showtime Sports documentary is based on what NBA All-Star?
- This 4-part Sports Doc is based on professional sports gambling.
- Watch 1000s of hours of Showtime content through your set top box via what feature?
- What Showtime App allows 2 Live Feeds and Download Capabilities?
- This series takes place on the day of the worst stock market crash in U.S. History.
- What Original Series premieres April 7th?
- This series is the #1 Comedy on a premium network.
- How much is the Showtime Cash Back Offer? (Write out the number).
- How many additional networks are included in a Showtime Subscription? (Write out the number).
19 Clues: This movie premieres April 20th. • This movie premieres on April 6th. • What series airs on Sundays at 9PM. • What Original Series premieres April 7th? • This series stars NY 'Fixer' Liev Schreiber. • This is Showtime's first Late-Night Talk Show. • This series is the #1 Comedy on a premium network. • This iconic Hip-Hop group has a docu-series premiering in May. • ...
Computer Components 2021-10-06
Across
- disruptive online messages.
- local area network, gives network to buildings.
- it controls the flow of the data from one computer to another.
- a website developed by many people and it allows you to add and edit content.
- stands for solid-state drive, a storage device that contains semiconductor chips.
- the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work.
- one of the most main parts of a computer system.
- WAN stands for wide area network, a telecommunication network that stretches over a large geographic area.
- use reasonable use of copyrighted material.
- a set of rules made to protect integrity.
Down
- it stands for random-access memory, it’s where data is stored.
- to take/copy someone’s work and not give them credit.
- pertaining to, or situated in.
- a part of an electric system or part of a mechanical system.
- stands for hard disk drive, a storage device that contains one or more spinning magnetic hard disks.
- the rules of kindness that apply when communicating over computer networks.
- gain information without the permission from the person you are hacking.
- Drive a very small, solid-state hard drive that can be plugged into a USB port.
- universal serial bus, to connect peripheral devices to a computer.
19 Clues: disruptive online messages. • pertaining to, or situated in. • a set of rules made to protect integrity. • use reasonable use of copyrighted material. • local area network, gives network to buildings. • one of the most main parts of a computer system. • to take/copy someone’s work and not give them credit. • a part of an electric system or part of a mechanical system. • ...
Technology vocabulary 2021-03-16
Across
- transfer out of a database or document
- something reduced in volume to its full volume
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- decompress
- the exclusive right to sell a work
- a facial expression represented by a sequence of characters
- a worldwide network of computer networks
- transfer a file or program to a smaller computer
- put into a format that can be read or processed by computers
Down
- set up for a particular purpose
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- the activity of converting data or information into code
- crime committed using a computer and the internet
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- a listing of the computer files stored in memory
- an organized body of related information
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- locate and correct errors in a computer program
- the symbolic arrangement of data in a computer program
21 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • transfer out of a database or document • an organized body of related information • a worldwide network of computer networks • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
NATURAL NAVIGATION 2024-02-25
Across
- Covered with clouds; lacking clear skies.
- The star at the center of our solar system that provides light and heat to Earth.
- A visual representation of an area, typically showing geographical features, roads, and other landmarks.
- Parallel to the horizon; flat or level.
- Half of the Earth, usually divided into Northern and Southern Hemispheres or Eastern and Western Hemispheres.
- after To take care of or watch over someone or something.
- To recognize the value or significance of something; to be grateful for.
- for: To look for something by making an effort to find it.
Down
- The natural satellite of Earth that orbits around it.
- A course along which someone or something moves or points.
- Having balanced proportions; exhibiting symmetry.
- Divisions or offshoots of a tree or plant.
- Used to emphasize a statement or confirm its truth.
- Confused or lost in terms of direction or understanding.
- Networks of threads spun by spiders and other insects to catch prey.
- The region of the atmosphere above the Earth; where the sun, moon, stars, and clouds are seen.
- Those from whom a person is descended, typically one's parents or grandparents.
- Having a moderate degree of heat; opposite of cold.
- To set up or create something, typically an organization, system, or set of rules.
19 Clues: Parallel to the horizon; flat or level. • Covered with clouds; lacking clear skies. • Divisions or offshoots of a tree or plant. • Having balanced proportions; exhibiting symmetry. • Used to emphasize a statement or confirm its truth. • Having a moderate degree of heat; opposite of cold. • The natural satellite of Earth that orbits around it. • ...
Carrington Event 2025-02-07
Across
- A powerful burst of solar plasma and magnetic field from the Sun.
- The protective magnetic field around Earth that helps shield us from solar storms.
- A sudden explosion of energElectromagnetic radiationoften associated with CMEs.
- The ability to recover from a disaster like a major solar storm.
- Devices in space that could be damaged by a strong CME.
- A disturbance in Earth’s magnetic field caused by solar activity.
- Steps taken to protect against future CMEs.
- Energy released from the Sun in the form of light and waves.
- The environmental conditions in space that can affect technology on Earth.
- A loss of electricity over a large area.
- The systems (power lines, roads, communication networks) that support society.
Down
- The modern electrical system that could fail in a future solar storm.
- A navigation system that could stop working if ais solar storm disrupts satellites.
- Used for emergency services and aviation, which could be affected by solar activity.
- A massive solar storm that occurred in 1859, causing global telegraph failures.
- Natural light displays in the sky caused by solar particles interacting with Earth’s atmosphere.
- The main communication network in 1859, which the Carrington Event disrupted.
- A disturbance on the Sun that can send energy and particles toward Earth.
- on Society
19 Clues: on Society • A loss of electricity over a large area. • Steps taken to protect against future CMEs. • Devices in space that could be damaged by a strong CME. • Energy released from the Sun in the form of light and waves. • The ability to recover from a disaster like a major solar storm. • A powerful burst of solar plasma and magnetic field from the Sun. • ...
Cyberpesten 2013-12-18
Across
- Cyberpesten is pesten. Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
- uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
- Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
- Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
- Opslagplaats voor wapens
Down
- Naamloos, ongenoemd, wie of wat je niet kent.
- Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
- Zoals Facebook, Twitter, Netlog, Google+, MySpace.
- Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
- Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
- Developmental Issues in Cyberbullying amongst Adolescents.
11 Clues: Opslagplaats voor wapens • Naamloos, ongenoemd, wie of wat je niet kent. • Zoals Facebook, Twitter, Netlog, Google+, MySpace. • Developmental Issues in Cyberbullying amongst Adolescents. • Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven. • Vaardigheden die te maken hebben met wat je wel en niet kan doen online. • ...
Cyberpesten 2013-12-18
Across
- Naamloos, ongenoemd, wie of wat je niet kent.
- Sites op het internet die ons online doen communiceren met anderen, voorbeeld datingssites.
- Opslagplaats voor wapens
- Vaardigheden die te maken hebben met wat je wel en niet kan doen online.
- Zoals Facebook, Twitter, Netlog, Google+, MySpace.
- Het is niet meer of niet minder dan het samen bijsturen van onze kinderen.
Down
- uitingen van persoonlijke ervaringen of van zakelijke bezigheden, ze vertonen ook eigenschappen van social networks zoals Tubmlr.
- Het is een vorm van pesten die gebruikmaakt van informatie- en communicatietechnologieën, zoals het internet, de gsm en de sociale netwerken.
- Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven.
- Een aanpak waarin de dader niet als slechterik wordt bestempeld en ligt de nadruk op herstelgerichte handelingen en dialoog, en stoot men wel door naar het kwetsbare stuk.
- Developmental Issues in Cyberbullying amongst Adolescents.
11 Clues: Opslagplaats voor wapens • Naamloos, ongenoemd, wie of wat je niet kent. • Zoals Facebook, Twitter, Netlog, Google+, MySpace. • Developmental Issues in Cyberbullying amongst Adolescents. • Gebouwautomatisering, bouwers van assistieve producten, ICT-bedrijven. • Vaardigheden die te maken hebben met wat je wel en niet kan doen online. • ...
Quinlan K. 2015-04-30
Across
- To renew or revitalize; To reload a webpage on the internet
- a list of citations that appear at the end of a paper, article, chapter or book.
- A system of connected computers that allows the sharing of files and equipment
- TABS The name for a way to display information on websites
Down
- An unauthorized person who secretly gains access to computer files
- ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text
- TABS The name for a way to display information on websites
- the unauthorized use, reproduction, distribution, or transmission of copyrighted
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
- Software program that is designed to damage files on a computer that receives it.
- A collaborative website which can be directly edited by anyone with access to it
- Originally known as Web Log.
12 Clues: Originally known as Web Log. • TABS The name for a way to display information on websites • TABS The name for a way to display information on websites • To renew or revitalize; To reload a webpage on the internet • An unauthorized person who secretly gains access to computer files • A system of connected computers that allows the sharing of files and equipment • ...
Functions & Characteristics of Money 2017-11-28
Across
- Since we use money on a daily basis, it should be _______ and easy to use.
- To avoid mistakes during monetary transactions, money should have this characteristic.
- A function of money that allows value to b
- Money should be __________________ (3 words)to deter to ability to create counterfeit bills.
- A function of money that allows comparisons of the value of various goods and services; also called standard unit of account.
- The main function of money, allowing the exchange of goods and services.
Down
- Another term for measure of value.
- The ease with which an asset can be used to make
- This characteristic of money allows for facilitation of both small and large purchases.
- Money in electronic networks, or cash cards that can be used by consumers.
- As money is passed from hand to hand countless times and is stored in wallets and purses and used in vending machines it needs to be ________________.
11 Clues: Another term for measure of value. • A function of money that allows value to b • The ease with which an asset can be used to make • The main function of money, allowing the exchange of goods and services. • Since we use money on a daily basis, it should be _______ and easy to use. • Money in electronic networks, or cash cards that can be used by consumers. • ...
Artificial Intelligence Crossword 2024-02-17
Across
- The person who coined the term Artificial Intelligence
- A many valued logic in which truth values of variable may be any real number between 0 and 1
- A logic programming language associated with AI and computational linguistics made in 1972
- A machine that defeated world chess champion Garry Kasparov
- The branch of AI that deals with the interaction between computers and human language enabling computers to understand, interpret and generate human language
- A subset of machine learning that consists of three or more layers of neural network
Down
- ------ Network is a computational model inspired by the structure and function of human brain
- An AI chatboat that uses natural language processing to create human like conversational dialogue
- Test used to determine whether or not a computer can think intelligently like humans
- The company that owns Chat GPT
- Neural networks require large amount of ------- to make accurate decisions
11 Clues: The company that owns Chat GPT • The person who coined the term Artificial Intelligence • A machine that defeated world chess champion Garry Kasparov • Neural networks require large amount of ------- to make accurate decisions • Test used to determine whether or not a computer can think intelligently like humans • ...
ICT crosswords Aurelia 2023-03-28
Across
- sharing Two or more employees doing the same job but working at different times is called
- work time When a person is employed to work fewer hours than the normal working week, this is called
- type of virus that can record the activities of the user, such as password, and transmit this information to the person who wrote the malware
- computer software with malicious intent
- learning new skills outside of the worker's existing skillset
- The act of compromising digital devices and networks by gaining unauthorized access to an account or computer system
Down
- The safe and responsible use of technology
- work When employees work the full normal hours in a week but work at times which
- work When an employee works the full normal hours in a week but works fewer days, this is called
- Loss of skills that an employee or group of employees once had
- them and the employer, this is called
11 Clues: them and the employer, this is called • computer software with malicious intent • The safe and responsible use of technology • learning new skills outside of the worker's existing skillset • Loss of skills that an employee or group of employees once had • work When employees work the full normal hours in a week but work at times which • ...
Cyber Intelligence (Medium) 2023-06-01
Across
- The process of collecting, analyzing, and interpreting data to identify and counter cyber threats.
- An individual or group that carries out cyber attacks for political or ideological reasons.
- A technique used to gather intelligence by infiltrating target networks or systems.
- A technique used to gather intelligence by monitoring and analyzing public sources of information.
- A covert technique used to gain unauthorized access to a computer system.
- A technique used to deceive individuals into revealing sensitive information through fraudulent communications.
- The process of analyzing and interpreting data to identify patterns and detect potential cyber threats.
Down
- The process of identifying and mapping potential vulnerabilities in a system or network.
- a centralized team responsible for monitoring and responding to security incidents.
- A software program that disguises itself as a legitimate program but performs malicious activities.
- The proactive search for indicators of compromise and potential threats within a network or system.
11 Clues: A covert technique used to gain unauthorized access to a computer system. • a centralized team responsible for monitoring and responding to security incidents. • A technique used to gather intelligence by infiltrating target networks or systems. • The process of identifying and mapping potential vulnerabilities in a system or network. • ...
Chapter Vocabulary Review Extension 2023-12-04
Across
- waste produced from nuclear fission or in a nuclear reactor
- the energy that holds protons toghether & neutrons alike in the nucleus of an atom.
- a type of mining in which layers of surface soil & rock are removed from large areas to expose a resources.
- an energy surce that CAN'T be replentished ina short time.
- a kind of mining pollutionthay results from rainwater entering caves with iron sulfide & draining out
- a rock containing hydrocarbons.
- reeducing eergy use to prolong the time it takes for us to run out of fossil fuels.
Down
- a type of mining which involves digging deep shafts and networks of horizonta tunnels are made, either by blasting or mining to find resurces.
- an ice-like solid that consists of molecules of methane within a crystal network of molecules.
- an energy source that's repeatedly avaliable is self-replentishing, or can be replaced in a relatively short time
- a liquid fossil fuel(contains hydrocarbns)
11 Clues: a rock containing hydrocarbons. • a liquid fossil fuel(contains hydrocarbns) • an energy surce that CAN'T be replentished ina short time. • waste produced from nuclear fission or in a nuclear reactor • the energy that holds protons toghether & neutrons alike in the nucleus of an atom. • ...
AV Lesson 5 2024-03-10
Across
- The act of compelling observance of or compliance with a law or rule.
- Existing or occurring in a digital environment, often simulated or computer-generated.
- Designed to be easily understood and operated by ordinary people.
- A penalty or coercive measure imposed to ensure compliance with a law or rule.
- To bring legal action against someone, typically in a court of law.
Down
- To introduce new methods or ideas, especially to promote change or improvement.
- To make a process or system operate automatically, reducing the need for human intervention.
- The practice of protecting computer systems, networks, and programs from digital attacks.
- The status of being a member of a particular country and having the rights and duties associated with it.
- Transmitting signals without the need for physical connection, typically using radio waves.
- To officially require or authorize something, often by law or command.
11 Clues: Designed to be easily understood and operated by ordinary people. • To bring legal action against someone, typically in a court of law. • The act of compelling observance of or compliance with a law or rule. • To officially require or authorize something, often by law or command. • A penalty or coercive measure imposed to ensure compliance with a law or rule. • ...
STEM 2023-01-19
Across
- use the principles of engineering, soil science, biology, and chemistry to develop solutions to environmental problems.
- studies the solid, liquid, and gaseous matter that constitutes Earth and other terrestrial planets, as well as the processes that shape them
- a person who works with theoretical or applied statistics
- Plan and conduct complex projects in basic and applied research.
Down
- research, design, develop, build, and test mechanical and thermal sensors and devices, including tools, engines, and machines.
- helps businesses make critical financial decisions by collecting, tracking, and correcting the company's finances.
- create the computer applications that allow users to do specific tasks and the underlying systems that run the devices or control networks
- responsible for analyzing financial statements and predicting the future performance of the company.
- application of principles and design concepts to medicine and biology for healthcare purposes.
- an expert in or student of mathematics.
- Conduct scientific studies of behavior and brain function
11 Clues: an expert in or student of mathematics. • Conduct scientific studies of behavior and brain function • a person who works with theoretical or applied statistics • Plan and conduct complex projects in basic and applied research. • application of principles and design concepts to medicine and biology for healthcare purposes. • ...
Networking and the Internet 2022-06-27
Across
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- The process of transferring data between two or more digital devices
- Facts and statistics collected together for reference or analysis.
- A global computer network consisting of multiple interconnected networks.
- The study and practice of protecting computers and programs from unwanted access and theft of data.
Down
- The ability of computers and the Internet to consistently perform to the expectations of their designed function.
- The speed and resource usage involved in collecting, manipulating, and analyzing data.
- The preservation of accuracy and consistency of a data set over the course of its analysis.
- A numerical label assigned to each computing device on a network.
- A series of interconnected computers and devices that share resources and exchange data with each other.
- The rate at which data is communicated from the Internet to a computer and vice versa.
11 Clues: A numerical label assigned to each computing device on a network. • Facts and statistics collected together for reference or analysis. • The process of transferring data between two or more digital devices • A global computer network consisting of multiple interconnected networks. • ...
RUSH HOUR 2 2013-02-11
Across
- - Every sale has five basic obstacles: no need, no money, no hurry, no _____, no trust. (6)
- - Save money. Live better. Slogan of __ (7)
- - Surveying a small group of a population to gain research insights(8)
- - the most effective ____ know that listening is the most important part of their job (11)
- - Distribution __________. How a business gets its products to the end(7)
- - I have seen the future and it is very much like the present, only longer. (8)
Down
- - A glorified cash register, something that helps improve the efficiency of your retail business. (11)
- - Marketing promotion that relies on word-of-mouth or online networks to spread the message.(5)
- - A lack of precision is dangerous when the ____ of error is small.(6)
- - It’s just called ‘The Bible’ now. We dropped the word ‘holy’ to give it a more _____ appeal.(famous quote)(10)
- - Product or brand with a high share of a mature or declining market (4,3)
11 Clues: - Save money. Live better. Slogan of __ (7) • - A lack of precision is dangerous when the ____ of error is small.(6) • - Surveying a small group of a population to gain research insights(8) • - Distribution __________. How a business gets its products to the end(7) • - Product or brand with a high share of a mature or declining market (4,3) • ...
E-Commerce 2015-03-12
Across
- business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
- a business or organisation entity provides products or services to individual customers
- WWW.
- business entities or organisations participate with other businesses or organisations to do e-commerce
- individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
Down
- communicated or received concerning a particular fact or circumstance; news
- business model that facilitates an environment where customers can trade with each other.
- give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
- vast computer network linking smaller computer networks worldwide
- person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
- business model in which consumers (individuals) create value and businesses consume that value
11 Clues: WWW. • vast computer network linking smaller computer networks worldwide • communicated or received concerning a particular fact or circumstance; news • a business or organisation entity provides products or services to individual customers • business model that facilitates an environment where customers can trade with each other. • ...
E-Commerce 2015-03-12
Across
- /a business model in which consumers (individuals) create value and businesses consume that value
- /knowledge communicated or received concerning a particular fact or circumstance; news
- /a business model that facilitates an environment where customers can trade with each other.
- /when business entities or organisations participate with other businesses or organisations to do e-commerce
- /to give or interchange thoughts, feelings, information, or the like, by writing, speaking, etc.
- /abbreviation: WWW.
Down
- /a vast computer network linking smaller computer networks worldwide
- /a person, partnership, or corporation engaged in commerce, manufacturing, or a service; profit-seeking enterprise or concern.
- /a business deal : an occurrence in which goods, services, or money are passed from one person, account, etc., to another
- /the individual who is purchasing the goods or services from the Merchant and using a credit card to pay.
- /when a business or organisation entity provides products or services to individual customers
11 Clues: /abbreviation: WWW. • /a vast computer network linking smaller computer networks worldwide • /knowledge communicated or received concerning a particular fact or circumstance; news • /when a business or organisation entity provides products or services to individual customers • ...
Industrial Revolution 2020-11-10
Across
- Networks of iron rails that were used to transport goods.
- Many children worked on farms, small businesses mills and factories.
- An economic system based on private ownership of capital
- An organization formed by workers to strive for better wages and working conditions
- 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
Down
- Along with Robert R Livingston, put the first steamboats into service in 1807
- Communication by transmitting signals over a wire.
- An increase in the percentage and in the number of people living in urban settlements.
- A system in which society, owns and controls the means of production.
- The drive for voting rights for women that took place in the United States from 1890 to 1920.
- A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
11 Clues: Communication by transmitting signals over a wire. • An economic system based on private ownership of capital • Networks of iron rails that were used to transport goods. • Many children worked on farms, small businesses mills and factories. • A system in which society, owns and controls the means of production. • ...
Technology_Tsutsu 2021-04-22
Across
- Device or system capable of performing a predetermined, well-defined, variable sequence of operations
- A household appliance, the speed of heating in which is ensured by the use of microwave microwaves. ..microwave
- A machine that converts some form of energy into mechanical work, which sets something in motion
- A set of phenomena in which the existence, movement and interactions (by means of an electromagnetic field) of charged particles are detected
- Unmanned spacecraft that is launched into Earth orbit by a launch vehicle
- A method of wirelessly transmitting and receiving sounds and signs over a distance using electromagnetic waves transmitted by special stations
Down
- Worldwide information computer network that connects both users of computer networks and users of individual computers to exchange information
- ...intellect
- mobile...
- A simple machine invented in the fourth century BC
- Without the invention would not have been the Age of of Discovery
11 Clues: mobile... • ...intellect • A simple machine invented in the fourth century BC • Without the invention would not have been the Age of of Discovery • Unmanned spacecraft that is launched into Earth orbit by a launch vehicle • A machine that converts some form of energy into mechanical work, which sets something in motion • ...
26 2024-01-08
Across
- Work Working from a location other than the central office, often from home.
- Disturbance or problems that interrupt an event, activity, or process.
- A digital or virtual form of currency that uses cryptography for security.
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- The activity of exploiting genetic material experimentally without regard to ethical considerations.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
Down
- Commercial transactions conducted electronically on the Internet.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
- Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
- Including all or everyone; not excluding any particular group or individual.
12 Clues: Commercial transactions conducted electronically on the Internet. • Disturbance or problems that interrupt an event, activity, or process. • A digital or virtual form of currency that uses cryptography for security. • Work Working from a location other than the central office, often from home. • ...
SCHOOL SUBJECTS 2024-09-06
Across
- study of computer systems, software, and networks, often involving programming, coding, and data management
- is the study of past events and human affairs, often involving research, analysis, and interpretation of historical sources
- Education study of physical fitness, health, and sports, often involving exercise, training, and team building
- study of language, literature, and writing, often involving grammar, vocabulary, and composition
- study of physical phenomena like the motion of matter and energy and force
Down
- study of the Earth’s physical features, climate, and human populations, often involving maps, charts, and data analysis
- study of numbers, quantities, and shapes, often involving arithmetic, algebra, and geometry
- study of living organisms and their interactions with the environment, often involving anatomy, physiology, and genetics
- creation or performance of music, often involving singing, playing instruments, or composing
- study of the natural world and its phenomena, often involving experimentation, observation, and analysis
- study of the properties and behavior of matter
11 Clues: study of the properties and behavior of matter • study of physical phenomena like the motion of matter and energy and force • study of numbers, quantities, and shapes, often involving arithmetic, algebra, and geometry • creation or performance of music, often involving singing, playing instruments, or composing • ...
Cybersecurity 2024-09-09
Across
- A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
- A weakness in a system that could be exploited.
- Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- A piece of software or technique used to take advantage of a vulnerability.
- A measure of the extent to which an entity is threatened by a potential circumstance or event.
- Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
- The part of malware that performs malicious actions once a system is compromised.
- Previously unknown vulnerabilities that can be exploited before a patch is available.
- A potential danger to a system or organization.
- Measures taken to protect against attacks and mitigate risks.
- An attempt to exploit a vulnerability to compromise a system.
11 Clues: A potential danger to a system or organization. • A weakness in a system that could be exploited. • Measures taken to protect against attacks and mitigate risks. • An attempt to exploit a vulnerability to compromise a system. • A piece of software or technique used to take advantage of a vulnerability. • ...
Childhood Development 2025-01-22
Across
- What type of play is it when hand actions are combined with words or singing to help engage a child
- Babies will understand more words than they can
- What motor skill is typically refered as the "large muscle"
- What motor skill is typically refered as the "small muscle"
- How much does the baby's brain grow in the first year
- Children between the ages of 2-5 slowly learn how to manage their____ which includes anger, sadness, happiness etc.
Down
- Messages are passed between neurons at connections called
- By the age of 6 months, the child should visibly demonstrate an attachment to the primary
- When playing a game of peek-a-boo, what type of play does it stimulate
- At what stage of a babies life span has very limited emotions at first
- Networks of specialized nerve cells that communicate with one another
11 Clues: Babies will understand more words than they can • How much does the baby's brain grow in the first year • Messages are passed between neurons at connections called • What motor skill is typically refered as the "large muscle" • What motor skill is typically refered as the "small muscle" • Networks of specialized nerve cells that communicate with one another • ...
Year 10 Summer 2025 Revision 2025-05-12
Across
- when attackers send scam emails (or text messages) that contain links to malicious websites
- Going against the law of a country or jurisdiction
- Tricking people into revealing confidential information, like passwords or PINs.
- helps prevent bots from overwhelming websites by creating fake accounts or posting spam.
- A biometric scan used in place of a password
Down
- Copying a game from a website free that you should be paying for
- After entering your password, you might need to enter a code sent to your phone
- The practices and technologies used to protect systems, networks, programs, and data from cyber attacks and unauthorized access
- a type of cyberattack where scammers use phone calls or voice messages to trick individuals into revealing sensitive information
- The gaining of unauthorised access to data in a system or computer.
- An intellectual property right that protects original creative works, granting the author exclusive control over how their work is used
11 Clues: A biometric scan used in place of a password • Going against the law of a country or jurisdiction • Copying a game from a website free that you should be paying for • The gaining of unauthorised access to data in a system or computer. • After entering your password, you might need to enter a code sent to your phone • ...
Networking protocols Kennert, Mattias 2020-10-14
Across
- protocol specifies how routers communicate with each other to distribute information that enables them to select routes between any two nodes on a computer network.
- Protocol the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
- is the process of "stealing" bits from the HOST part of an IP address in order to divide the larger network into smaller sub-networks called subnets.
- is the process of selecting a path for traffic in a network or between or across multiple networks.
- The highest OS Protocol layer.
Down
- is a logical subdivision of an IP network.
- is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices.
- characteristics or information, usually numerical, that are collected through observation.
- In software engineering, ... is the process of adapting software for the purpose of achieving some form of execution in a computing environment
- is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
- In networking, a ... is a standardized set of rules for formatting and processing data.
- The lowes OS Protocol layer.
- an Hyprid protocol
13 Clues: an Hyprid protocol • The lowes OS Protocol layer. • The highest OS Protocol layer. • is a logical subdivision of an IP network. • In networking, a ... is a standardized set of rules for formatting and processing data. • characteristics or information, usually numerical, that are collected through observation. • ...
Tech Terms 2022-04-13
Across
- the information about a person that is on the internet from their online activity.
- Using encryption to provide secure access to a remote computer over the internet.
- sending emails disguised to look from companies to make people reveal personal information, like passwords
- a set of data that describes and gives information about other data.
- something baiting you into clicking on it, used to make money from each click
- a social media app/website where you post and watch 15-second videos and infinitely scroll
Down
- websites and applications that enable users to create and share content or to participate in social networking.
- a global computer network providing lots of information and communication ways, made of interconnected networks
- a network made up of social interactions and personal relationships.
- software that is made to disrupt, damage, or gain unauthorized access to a computer system.
- a micro-blogging social media site to share news and other things
11 Clues: a micro-blogging social media site to share news and other things • a network made up of social interactions and personal relationships. • a set of data that describes and gives information about other data. • something baiting you into clicking on it, used to make money from each click • ...
FUN DAY-ESC TRIVIA 2018-01-05
Across
- 3.Charter Partnered with___________ Channel to connect veterans with their communities.
- 8.Philo Farnsworth battled with ________, Zworykin to be called the "father of television."
- 6.The National Cable & __________ Association (NCTA), the principal trade association for the U.S. cable industry.
- 1.One of our key necessities is expanding access to ___________. This is a necessity to compete.
- 2.How many business units do we service?
- 10.Thomas____________ The Director, President, and Chief Executive Officer of Charter Communications
Down
- 7.The Second Largest Cable Provider in the U.S.
- Benefits 11. Which team handles repayment agreements for medical deductions
- 4.If I receive one of these packages and want more information that assist with the move. Charlie and Jason are definitely the experts.
- 9.Charter, Time Warner Cable and _________ house networks combined in 2016.
- 5.If I am out on workman’s compensation, my updates are completed by the _________ team.
11 Clues: 2.How many business units do we service? • 7.The Second Largest Cable Provider in the U.S. • Benefits 11. Which team handles repayment agreements for medical deductions • 9.Charter, Time Warner Cable and _________ house networks combined in 2016. • 3.Charter Partnered with___________ Channel to connect veterans with their communities. • ...
Australian Deportation Laws 2018-11-13
Across
- a relationship in which a person or thing is linked or associated with something else.
- an arrangement of intersecting horizontal and vertical lines. Or interact with others to exchange information and develop professional or social contacts.
- person or thing regarded as perfect. Or a standard or principle to be aimed at.
- of or involving the agreement or cooperation of two political parties that usually oppose each other's policies.
Down
- the state of being famous or well known for some bad quality or deed.
- concerned with or seeking to promote human welfare.
- acting or done in the same way over time, especially so as to be fair or accurate.
- the expression of disapproval of someone or something on the basis of perceived faults or mistakes.
- done or existing alone.
- the mental and moral qualities distinctive to an individual.
- showing or motivated by susceptibility to bribery; corrupt.
11 Clues: done or existing alone. • concerned with or seeking to promote human welfare. • showing or motivated by susceptibility to bribery; corrupt. • the mental and moral qualities distinctive to an individual. • the state of being famous or well known for some bad quality or deed. • person or thing regarded as perfect. Or a standard or principle to be aimed at. • ...
Psychological Distress 2015-11-09
Across
- Name of the theorist
- Another determining factor for how you may deal with stress, this has to do with the people and networks around you
- A determining factor of how you deal with stress, has to do with how well you are able to respond to stress
- According to the Psychological Distress theory, distress helps lead to this
- Pearlin says that life is less of this, and more of a continuous journey
- Distress is a _____ that requires a psychological response
Down
- Theory suggests life is a _____ course of change
- Individual _______________ are some of the determining factors in how you respond to stress/distress, examples include race, gender, age, etc.
- Different ____s of stress will determine its impact
- If stress happens all at once or over a period of ____, the impact would be different
- An individual develops in order to respond to this
11 Clues: Name of the theorist • Theory suggests life is a _____ course of change • An individual develops in order to respond to this • Different ____s of stress will determine its impact • Distress is a _____ that requires a psychological response • Pearlin says that life is less of this, and more of a continuous journey • ...
cyberbullying 2023-10-23
Across
- type of Cyberbullying involves spreading false statements about people
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- a feeling of worry, nervousness, or unease about something with an uncertain outcome
- done or chosen in accordance with wisdom or prudence; likely to be of benefit
- an area on the internet or other computer network where users can communicate, typically one dedicated to a particular topic
- a person who has come to feel helpless and passive in the face of misfortune or ill-treatment
Down
- the action of stopping something from happening or arising
- the action of supervising someone or something
- the action or practice of sending text messages
- aggressive pressure or intimidation, can be done online
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
11 Clues: the action of supervising someone or something • the action or practice of sending text messages • aggressive pressure or intimidation, can be done online • the action of stopping something from happening or arising • type of Cyberbullying involves spreading false statements about people • ...
Chapter Vocabulary Review Extension 2023-12-15
Across
- a type of mining in which layers of soil & roch (both at the surface) are removed from large areas to expose a resource
- a kind of minig pollution that results from rain water draining out of mines with iron sulfide
- the energy that holds protons together & neutrons together in the nucleus of an atom
- waste produced from nuclear fission
- a fossil fuel mostly made up of hydrocarbons, liquid
- an energy source that can't be replentished in a short amount of time
- a kind of mining eich involves digginy deep shafys & networks of horizontal tunnels are made either by blasting or mining to find resource
Down
- a solid that consists of molecules of methane within a crystal network of water molecules, ice-like
- hydrocarbon - containing rock
- an energy source that's repeatedly available, is self-replentishing, or can be replaced/made in a relatively short time
- reducing energy use to prolong the use of fossil fuels
11 Clues: hydrocarbon - containing rock • waste produced from nuclear fission • a fossil fuel mostly made up of hydrocarbons, liquid • reducing energy use to prolong the use of fossil fuels • an energy source that can't be replentished in a short amount of time • the energy that holds protons together & neutrons together in the nucleus of an atom • ...
Artificial Lexicon 2023-12-02
Across
- The field of study that enables computers to interpret visual information from the world.
- The delivery of computing services, including storage and processing power, over the internet.
- The interdisciplinary field that uses scientific methods, processes, and algorithms to extract insights from data.
- A machine learning approach where the algorithm is trained on labeled data.
- A computer system modeled after the human brain, used for tasks like image recognition.
- An AI program designed to simulate conversation with human users.
Down
- Extremely large and complex datasets that traditional data processing applications can't handle.
- The interdisciplinary field that involves the design, construction, operation, and use of robots.
- A subset of machine learning that involves neural networks with many layers.
- An open-source machine learning library developed by Google.
- A set of rules or steps followed to solve a problem or perform a task in AI.
11 Clues: An open-source machine learning library developed by Google. • An AI program designed to simulate conversation with human users. • A machine learning approach where the algorithm is trained on labeled data. • A subset of machine learning that involves neural networks with many layers. • ...
