networks Crossword Puzzles
Risk Management 2023-03-06
Across
- Location that consists of everything that a business needs except computers
- Process of downgrading-undoing a recently applied patch or updated
- Documents that set out how to limit damage and recover quickly from an incident
- Open source tool for penetration testing many aspects of wireless networks
- Contract that defines the services, products, and time frames for the vendor to achieve
Down
- Process of documenting significant changes to the network
- Set of procedures defining actions employees should perform to protect the network's security
- Popular and extremely comprehensive vulnerability testing tool
- Document used to track the collection, handling, and transfer of evidence
- A unique tool that enables a penetration tester to use a massive library of attacks as well as tweak those attacks for unique penetrations
10 Clues: Process of documenting significant changes to the network • Popular and extremely comprehensive vulnerability testing tool • Process of downgrading-undoing a recently applied patch or updated • Document used to track the collection, handling, and transfer of evidence • Open source tool for penetration testing many aspects of wireless networks • ...
HSP3C Exam Review 2023-01-20
Across
- Things like eye color, hair color, and physical attributes are inherited from parents' genes.
- The scientific study of humans, including their origins, behavior; and physical, social, and cultural development.
- the scientific study of social behavior or society, including its origins, development, organization, networks, and institutions.
- to understand human society, culture, actions, attitudes, and behavior.
- Standards of what is important, good, true, and ethical
Down
- Study of bone and stone remains of our ancient ancestors.
- type of learning in which an unconditional stimulus is paired with a neutral stimulus, leading to a conditioned response
- Focuses on life experiences and connections between the conscious and unconscious mind
- The study of the origins and cultures of different races and peoples.
- Feeling that one’s values and lifestyles are superior to others.
10 Clues: Standards of what is important, good, true, and ethical • Study of bone and stone remains of our ancient ancestors. • Feeling that one’s values and lifestyles are superior to others. • The study of the origins and cultures of different races and peoples. • to understand human society, culture, actions, attitudes, and behavior. • ...
Artificial Intelligence 2023-04-26
Across
- a Technique used by AI systems to learn and improve from experience without being explicitly programmed.
- The branch of AI that deals with the design, construction, and operation of robots.
- a type of AI that mimics the structure and function of the human brain.
- the ability of an AI system to understand and interpret human language.
- A set of instructions or rules followed by a computer program to solve a problem.
- The use of AI to enhance human intelligence and decision-making.
Down
- an AI system designed to simulate conversation with human users.
- an AI system that uses knowledge and expertise to solve complex problems.
- a subfield of machine learning that uses neural networks to analyze large amounts of data.
- The ability of an AI system to interpret and understand visual information.
10 Clues: an AI system designed to simulate conversation with human users. • The use of AI to enhance human intelligence and decision-making. • the ability of an AI system to understand and interpret human language. • a type of AI that mimics the structure and function of the human brain. • an AI system that uses knowledge and expertise to solve complex problems. • ...
History of Computers 2020-05-08
Across
- responds to the rhythm of voice commands and delivers wisecracks pre-recorded on 78 rpm records.
- a short story detailing a world where computers, called Logics,
- Created by David Jones and Mike Dailly,
- funds the outfitting of a packet radio research van at SRI to develop standards for a Packet Radio Network (PRNET).
- becoming a major supplier of corporate network services
Down
- emerges as the dominant object-oriented language in the computer industry when Bjarne Stroustrup publishes the book
- connected via to New York over special telephone lines.
- had been a modest experimental network of networks owned by the U.S. government.
- a book has a major influence on research into artificial intelligence and control systems.
- read-only rope memory is launched into space aboard the Apollo 11 mission
10 Clues: Created by David Jones and Mike Dailly, • connected via to New York over special telephone lines. • becoming a major supplier of corporate network services • a short story detailing a world where computers, called Logics, • read-only rope memory is launched into space aboard the Apollo 11 mission • ...
GZ MAG 6 2020-11-06
Across
- softens the dirt within the pores.
- prejudice directed against a person or people groups on the basis of their membership in a particular racial or ethnic group.
- a chemical that improves a person's mood.
- one of the worst things you could apply to your face.
- showing the hole essence of what you are trying to show to the audience.
- putting yourself in a place where people can see how you work.
Down
- practice of defending computers, mobile devices, electronic systems, networks, and data from malicious or cyber-attacks.
- a store with style that inspires young people to feel confident about themselves when dressing up.
- refers to a change or shift along with a curve on a graph of price versus quantity.
- artistry a way to express yourself, boost your confidence, and show it off.
10 Clues: softens the dirt within the pores. • a chemical that improves a person's mood. • one of the worst things you could apply to your face. • putting yourself in a place where people can see how you work. • showing the hole essence of what you are trying to show to the audience. • artistry a way to express yourself, boost your confidence, and show it off. • ...
CMT Crossword 2016-12-20
Across
- - a telephone line built with a solid transmission medium
- - An acronym for World Wide Web
- - A site or area on the Internet that is accessed by its own Internet address.
- - a device that modulates an analog carrier with digital data
- - Sending and receiving electronic messages through a computer network.
- - a company that provides access to the internet for a monthly fee.sending and receiving information electronically between two or more computers.
Down
- - Referring to 'Wireless networks
- - a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio
- - To transfer a file or program from a central computer to a smaller computer or to a computer at a remote location.
- - Software used to view the Internet, it translates the HTML code
10 Clues: - An acronym for World Wide Web • - Referring to 'Wireless networks • - a telephone line built with a solid transmission medium • - a device that modulates an analog carrier with digital data • - Software used to view the Internet, it translates the HTML code • - Sending and receiving electronic messages through a computer network. • ...
Access Network-Crossword 2019-09-26
Across
- A device that connects two or more networks and forwards packets among them
- A means of delivering information to all members in a network.
- A communication channel whose transmission rate is lower than 2 Mbit/s
- Outer part of the optical fiber
- The sum of the service usage, consumption, and recharge fees of a subscriber.
Down
- It is used for splitting and sending optical power to multiple ONUs connected by an optical fiber
- A term that indicates the capacity with enough bandwidth to transmit voice, data and video signals.
- A process in which multiple channels of low-rate signals are multiplexed into one or several channels of required signals.
- A device that terminates the fiber optical network at the customer premises
- A process of transmitting data packets from one source to many destinations.
10 Clues: Outer part of the optical fiber • A means of delivering information to all members in a network. • A communication channel whose transmission rate is lower than 2 Mbit/s • A device that connects two or more networks and forwards packets among them • A device that terminates the fiber optical network at the customer premises • ...
Payments Crossword 2023-07-31
Across
- Payment disbursements made by a business to its various stakeholders, including customers, employees, vendors, suppliers, and channel partners
- Financial intermediary between merchants and card payment networks enabling a merchant to accept card payments
- Card scheme or payment network launched by National Payments Corporation of India
- Accounting process that compares logged financial records with bank entries
- Global payments network
Down
- Process of replacing the payment card account numbers with a unique digital identifier for enhanced data security
- Fund transfer by an issuing bank from the merchant's account to the customer's account when customer raises a payment dispute with the bank
- Global standard for secure payment messaging
- Central bank digital currency launched by RBI in retail & wholesale versions
- Unique identifier for an individual or a business on UPI to enable payment transactions
10 Clues: Global payments network • Global standard for secure payment messaging • Accounting process that compares logged financial records with bank entries • Central bank digital currency launched by RBI in retail & wholesale versions • Card scheme or payment network launched by National Payments Corporation of India • ...
Word Hike 2023-10-09
Across
- A hierarchical data structure consisting of nodes, with each node having child nodes.
- The process of finding and fixing errors or issues in a program.
- A program that translates source code into machine code or bytecode.
- The global network of interconnected computer networks.
- A reusable block of code that performs a specific task or operation.
Down
- A structured collection of data that is organized for efficient retrieval and manipulation.
- A set of instructions written in a programming language that tells a computer what to do.
- A linear data structure that holds a sequence of elements, allowing for dynamic resizing.
- The set of rules that dictate how code should be structured in a programming language.
- Data provided to a program, often entered by a user or from another source.
10 Clues: The global network of interconnected computer networks. • The process of finding and fixing errors or issues in a program. • A program that translates source code into machine code or bytecode. • A reusable block of code that performs a specific task or operation. • Data provided to a program, often entered by a user or from another source. • ...
Stay Safe in the Digital World 2025-03-25
Across
- A strong password should include a mix of these, along with letters and special characters.
- A network that allows you to securely browse the internet
- A method that adds an extra layer of security, requiring both a password and a code
- To make sure your operating system and software are protected from known vulnerabilities, you need to do this
Down
- The digital currency often used in ransomware attacks
- A setting method of limiting who can see your personal details on social media and online platforms.
- The process of saving your important data so you can recover it
- A suspicious email, message, or website designed to steal your personal information.
- software that helps detect and prevent malicious attacks on your computer.
- This tool is essential for protecting your personal information from hackers on public networks.
10 Clues: The digital currency often used in ransomware attacks • A network that allows you to securely browse the internet • The process of saving your important data so you can recover it • software that helps detect and prevent malicious attacks on your computer. • A method that adds an extra layer of security, requiring both a password and a code • ...
DEB 2025-10-10
Across
- – A smartphone’s __________________ is the flat display surface used to view apps, videos, and images.
- – A device used to supply electrical energy to the smartphone’s battery. __________________.
- – __________________ life determines how long a smartphone can run before needing to be charged.
- – The __________________ card is a small chip that allows smartphones to connect to mobile networks.
Down
- – __________________ is a wireless technology used to connect a smartphone with other devices.
- – __________________ sensor allows users to unlock their smartphones securely using their touch.
- – The total amount of data that can be saved on the device is called __________________ capacity.
- – The __________________ is the brain of the smartphone that controls all functions and performance.
- – A smartphone feature used to take photos and record videos is called a __________________.
- – __________________ are software programs installed on smartphones for performing specific tasks.
10 Clues: – A device used to supply electrical energy to the smartphone’s battery. __________________. • – A smartphone feature used to take photos and record videos is called a __________________. • – __________________ is a wireless technology used to connect a smartphone with other devices. • ...
Non-GT Cyber Security Fun Quiz 2025-09-23
Across
- A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet.
- _ _ _ _ _ _ _ _ _ is the process of converting information or data into a code to prevent unauthorized access.
- The term for guessing a person’s password to gain unauthorized access is _ _ _ _ _ _ _ _ _ _ _ _.
- A program designed to spread from one computer to another is called a _ _ _ _ _.
- The act of stealing someone’s personal information and pretending to be them is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
Down
- The practice of protecting systems, networks, and programs from digital attacks is known as _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _.
- _ _ _ _ _ _ _ _ _ _ _ is a fake website set up to look like a real one to steal your information.
- The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _.
- A _ _ _ _ _ _ _ _ _ is a software application used to protect a computer from unauthorized access.
- A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information.
10 Clues: The unauthorized copying of software is called _ _ _ _ _ _ _ _ _ _ _. • A program designed to spread from one computer to another is called a _ _ _ _ _. • A _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ is a secure way to communicate over the internet. • A _ _ _ _ _ _ _ _ is a type of malware that tricks users into giving away personal information. • ...
Task 4 Methodology CRossword 2015-04-24
4 Clues: Overall startegy to treat input. • approach used in the initial online course. • participants are encouraged to develop the kinds of digital _____ skills. • Resource used to build global information sharing networks and foster connectivity for learning purposes.
PLACES 2022-12-20
4 Clues: a worldwide system of computer networks • large retail store operated on a self-service basis • someone who sells goods informally in public places • where buyers and sellers can meet to facilitate buying or selling of goods
Crossword 2022-10-25
4 Clues: That guy who does the EdTalks • A famous poet, a conference room, and lover of swans • Without doubt the best of the Extreme Networks offices • IT Guru. In some places they say his presence alone fixes computers...
INTRODUCING TODAY'S TECHNOLOGIES PART2 2021-09-10
Across
- Wireless communication technology that uses short-range radio signal
- Term used to refer collectively to hard disks and SSDs
- Each electronic document on the web; can contain text, graphics, audio, and video.
- A collection of related webpages and associated items stored on a web server.
- Software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic.
Down
- storage An Internet service that provides remote storage to computer users
- Program designed to make users more productive and/or assist them with personal tasks
- camera A mobile device that allows users to take pictures and store the photographed images digitally
- reader A mobile device that is used primarily for reading e-books and other digital publications.
- A worldwide collection of computer networks
10 Clues: A worldwide collection of computer networks • Term used to refer collectively to hard disks and SSDs • Wireless communication technology that uses short-range radio signal • storage An Internet service that provides remote storage to computer users • A collection of related webpages and associated items stored on a web server. • ...
Medicare Advantage 2021-06-28
Across
- Medicare Advantage plans include ________ coverage to protect your pearly whites.
- Former Jets quarterback turned Medicare Advantage spokesperson.
- Medicare Advantage plans offer low or $0 _______.
- Your Supplement plan premium will ________ every year, forcing you to pay more regardless of how often you use your plan.
- Medicare Advantage plans have larger ________ than ever, giving you access to more doctors and hospitals.
Down
- These video calls with your doctor are covered by Medicare Advantage.
- You got one as a kid for doing chores; now you can get one from your Medicare Advantage plan to use at the drug store.
- Medicare Advantage plans often include coverage for prescription ________.
- During Annual Enrollment, you can _______ from your current plan to a different plan for 2022.
- Save money on Medicare Advantage by paying as you ________, instead of monthly.
10 Clues: Medicare Advantage plans offer low or $0 _______. • Former Jets quarterback turned Medicare Advantage spokesperson. • These video calls with your doctor are covered by Medicare Advantage. • Medicare Advantage plans often include coverage for prescription ________. • Save money on Medicare Advantage by paying as you ________, instead of monthly. • ...
Message Management System 2019-11-17
Across
- Live, interactive conversations over a public network.
- Using the computer to speed up the performance of existing tasks.
- The user point-of-entry for the required function in client/server computing
- Program code defects or errors.
- A piece of information describing a particular entity.
- A binary digit representing the smallest unit of data in a computer system.
Down
- The coding and scrambling of messages to prevent their being read or accessed without authorization.
- Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use
- Software designed to detect, and often eliminate, computer viruses from an information system.
- Standard for wireless personal area networks that can transmit up to 722 Kbps within a 10-meter area.
10 Clues: Program code defects or errors. • Live, interactive conversations over a public network. • A piece of information describing a particular entity. • Using the computer to speed up the performance of existing tasks. • A binary digit representing the smallest unit of data in a computer system. • ...
Set 3 2022-10-16
Across
- The core building block of a CNN, most of the computation occurs in this layer
- A process of categorizing a given set of data into classes
- A Machine Learning technique that helps in detecting the outliers in data
- An activation functions that does not activate all the neurons at the same time
Down
- A matrix layout that is used to define the performance of a classification algorithm
- Algorithm that maps data to a high-dimensional feature space so that data points can be categorized
- Machine learning is a subset of
- ML Algorithm based on the idea of Bagging
- A regression technique that can process both numeric and categorical input attributes
- The activation function that is most widely used in the output layer of neural networks for multiclass classification
10 Clues: Machine learning is a subset of • ML Algorithm based on the idea of Bagging • A process of categorizing a given set of data into classes • A Machine Learning technique that helps in detecting the outliers in data • The core building block of a CNN, most of the computation occurs in this layer • ...
Globalisation 2024-02-24
Across
- The action of buying and selling goods and services.
- The degree to which places are connected or linked by communication networks.
- To package goods in large standardised containers for efficient shipping.
- Exchanging of information by speaking, writing or using some other medium.
- Process by which people become interconnected around the world, both in ideas and activities.
Down
- Relating to or including more than one country
- A company operating in several countries.
- To take or carry (people or goods) from one place to another using vehicle, aircraft, or ship
- A term which refers to the rapid rate of globalisation that has made the world feel smaller, more connected to people on the other side of the world
- The system of trade and industry by which the wealth of a country is made and used
10 Clues: A company operating in several countries. • Relating to or including more than one country • The action of buying and selling goods and services. • To package goods in large standardised containers for efficient shipping. • Exchanging of information by speaking, writing or using some other medium. • ...
Middleware And Protocols Of IOT 2024-04-06
Across
- It Defines Input and the output of Apis
- To provide an internet connection, and connect devices to a local network
- Is a software that sits b/w the Hardware and applications layer in iot
- composed of several key components that work together to deliver high-speed wireless communication
- a standardized set of rules for formatting and processing data.
Down
- A standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks
- It sometimes arrives that some sensors have items that belong or not to them.
- composed of an interrogator (reader) and at least one transponder (tag
- The Protocol services include Who-IS,Who-Has,I-Have,I-Am which are used for device and object Discovery
- The End devices can have multiple Eps
10 Clues: The End devices can have multiple Eps • It Defines Input and the output of Apis • a standardized set of rules for formatting and processing data. • composed of an interrogator (reader) and at least one transponder (tag • Is a software that sits b/w the Hardware and applications layer in iot • ...
STEM Careers 2023-04-17
Across
- someone who designs buildings and overlooks construction.
- engineer that develop, test, manufacture and maintain systems and products that use ________ technology
- an engineer that is associated with biology and technology for the research and development of new products
- engineer who deals with the design, development, and maintenance of software applications
Down
- measures and gather data about the individuals or elements of a sample, then analyze data to generate stats
- engineer that focuses on advances in technology and medicine to develop new equipment for improving human health
- someone who overlooks technological purposes to ensure the protection of cybersystems or networks
- engineer that develop, and test aircrafts, satellites, and missiles
- scientists that define the computational principles that are basis of all software
- engineer that designs, builds, supervises, constructs, and maintains infrastructure projects
10 Clues: someone who designs buildings and overlooks construction. • engineer that develop, and test aircrafts, satellites, and missiles • scientists that define the computational principles that are basis of all software • engineer who deals with the design, development, and maintenance of software applications • ...
Data Transmission 2022-07-13
Across
- the actual data being carried in a data packet
- a device that enables data packets to be moved between different networks
- data that can be sent in one direction only
- a horizontal and vertical parity check on a block of data being transmitted
Down
- data that can be sent in both directions but not at the same time
- data that can be sent in both direction simultaneously
- stages in a network that can receive and transmit data packets such as routers
- a bit either 0 or 1 added to a byte of data in the most significant bit position
- a number in a data packet header used used to stop data packets that never reach their destination from clogging up the data paths
- data that arrives at the destination with bits no longer synchronised
10 Clues: data that can be sent in one direction only • the actual data being carried in a data packet • data that can be sent in both direction simultaneously • data that can be sent in both directions but not at the same time • data that arrives at the destination with bits no longer synchronised • a device that enables data packets to be moved between different networks • ...
Data Transmission 2022-07-13
Across
- data that can be sent in both direction but not at the same time
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths
- a small part of a message that is transmitted over a network
- the actual data being carried in a data packet
Down
- data that arrives at the destination with the bits no longer synchronised
- a verification method used to check if data transferred has been altered or corrupted
- a horizontal and vertical parity check on a block of data being transmitted
- a device that enables data packets to be moved between networks
- stages in a network that can receive and transmit data
- data that can be sent on one direction only
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data • a small part of a message that is transmitted over a network • a device that enables data packets to be moved between networks • data that can be sent in both direction but not at the same time • ...
THE INTERNET & SURVEILANCE QUIZ 2025-02-19
Across
- a global network of interconnected computers and servers that communicate with each other using standardized protocols.
- A system used for tracking movement
- A short-range wireless standard for exchanging data between devices and creating personal area networks.
- a malicious and deliberate attempt by an individual or organization to breach the information system
- an organization that provides myriad services related to accessing, using, managing, or participating in the Internet.
Down
- The act of secretly listening to conversation
- a specific area where someone or something lacks the necessary technical skills, knowledge, or capability to perform a task effectively.
- The system used to link alphabetical website names to numeric internet protocol addresses
- The access of stored data without the permission of those holding it
- a network security device that blocks IP addresses
10 Clues: A system used for tracking movement • The act of secretly listening to conversation • a network security device that blocks IP addresses • The access of stored data without the permission of those holding it • The system used to link alphabetical website names to numeric internet protocol addresses • ...
Business Technology 2026-02-19
Across
- Programs and applications that run on a computer to perform tasks.
- Buying and selling goods or services online.
- The use of technology (like computers and software) to improve business operations and productivity.
- The physical parts of a computer, such as the monitor, keyboard, and CPU.
- A meeting between people in different locations using live video and audio.
Down
- Running business processes (like sales, customer service, and management) through the internet.
- networks Connected systems of computers or devices that share information electronically (like the Internet).
- Banking services accessed through the internet, such as checking balance or transferring money.
- Saving digital information on devices such as hard drives or cloud systems for future use.
- A meeting held over the telephone or network where people in different places communicate by audio.
10 Clues: Buying and selling goods or services online. • Programs and applications that run on a computer to perform tasks. • The physical parts of a computer, such as the monitor, keyboard, and CPU. • A meeting between people in different locations using live video and audio. • Saving digital information on devices such as hard drives or cloud systems for future use. • ...
Industrial Revolution 2025-11-20
Across
- people in the middle of the social hierarchy
- uses heat to convert liquid water to steam, which then powers mechanical devices like turbines or engines
- the process of making an area more urban
- the process of supplying a military force with modern weapons and vehicles
- social categorization if its people into groups based on socioeconomic factors, like wealth,income,race,education, gender, and occupation
- people who earn wages through labor
- a method of manufacturing where goods are mass produced in a centralized location using machinery and a division of labor
Down
- the process of making something conform to a standard
- system of interconnected routes and relationships that facilitate between different regions and ethnicity
- the measure of efficiency of production of goods or services
10 Clues: people who earn wages through labor • the process of making an area more urban • people in the middle of the social hierarchy • the process of making something conform to a standard • the measure of efficiency of production of goods or services • the process of supplying a military force with modern weapons and vehicles • ...
Business technology 2026-02-22
Across
- conferencing-Videoconferencing is a specialized type of teleconferencing that adds real-time video, allowing participants to see facial expressions and share screens.
- technology- refers to the use of all types of business make of information technology
- buying and selling product online
- hardware of a company’s IT system includes the items that you can readily see and touch.
- Teleconferencing is a broad term for any, often audio-only, remote meeting connecting people in different locations.
- the programs inside the computer (like apps).
Down
- running an entire company online.
- banking - managing money through a website / app.
- networks-interconnected systems of devices—such as computers, servers, or components—that communicate via cable, radio, or optical signals to share information, resources, and data.
- storage-savings digital files for later.
10 Clues: running an entire company online. • buying and selling product online • storage-savings digital files for later. • the programs inside the computer (like apps). • banking - managing money through a website / app. • technology- refers to the use of all types of business make of information technology • ...
Business Technology 2026-02-23
Across
- – Using the internet to run and manage business activities.
- – A meeting held over the phone where people in different locations talk to each other.
- Storage – The process of saving information on a computer or digital device for future use.
- – The physical parts of a computer that you can see and touch, like the keyboard and monitor.
- Conferencing – A virtual meeting where participants can see and hear each other through the internet.
Down
- – Buying and selling goods or services online.
- Banking – Managing your bank account and making transactions through the internet.
- Technology – The use of computers and digital tools to help companies operate and manage work efficiently.
- Networks – Systems that connect computers and devices so they can share information.
- – The programs and applications that tell a computer what to do.
10 Clues: – Buying and selling goods or services online. • – Using the internet to run and manage business activities. • – The programs and applications that tell a computer what to do. • Banking – Managing your bank account and making transactions through the internet. • Networks – Systems that connect computers and devices so they can share information. • ...
crossword inquizitive 2018-04-20
4 Clues: / Number of non-zero singular values. • / Method to train deep neural networks. • / The concept used to check the continuity of a function at a point. • / Layer that uses a gating mechanism to control the information flow.
Emerging and Future Technology 2021-11-26
Across
- Theory of computer systems able to perform tasks requiring human intelligence
- Machines that use the properties of quantum physics to and perform computations
- network of objects that are embedded with technologies for the purpose of connecting and exchanging data with other devices over the internet.
- Fifth generation technology standard for broadband cellular networks
Down
- Branch of computer science which focuses on the use of data and algorithms to imitate the way that humans learn
- A computer-generated simulation of an environment
- System in which a record of transactions made in a cryptocurrency are maintained across several linked computers
- Technology that is used for automating jobs
8 Clues: Technology that is used for automating jobs • A computer-generated simulation of an environment • Fifth generation technology standard for broadband cellular networks • Theory of computer systems able to perform tasks requiring human intelligence • Machines that use the properties of quantum physics to and perform computations • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Internet crossword puzzle 2014-04-30
Across
- a reference to a published source.
- network etiquette; following the rules online,being a good digital citizen.
- text or graphics that,when clicked,will connect the user to a new web page or another place on the same page.
- the unauthorized use,reproduction,distribution,or transmission of copyrighted material (like pirates-its stealing)
- a restricted computer network;a private network created using a world wide web software,example:Hays CISD network.
- A group of connected computers
Down
- a bully who operates online, in cyberspace; to bully online
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
8 Clues: A group of connected computers • a reference to a published source. • a bully who operates online, in cyberspace; to bully online • network etiquette; following the rules online,being a good digital citizen. • text or graphics that,when clicked,will connect the user to a new web page or another place on the same page. • ...
Science and Technology in the 2000s 2023-03-24
Across
- Mobile devices used for communication and accessing the Internet
- Electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Websites and applications that enable users to create and share content or to participate in social networking.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks
Down
- The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- Tech company best known for its extensive search engine and other products
- Among the most popular mobile phone distributor
- Largest online shopping/delivery company
8 Clues: Largest online shopping/delivery company • Among the most popular mobile phone distributor • Mobile devices used for communication and accessing the Internet • Tech company best known for its extensive search engine and other products • Websites and applications that enable users to create and share content or to participate in social networking. • ...
COMPUTER 2018-09-22
Across
- It is the term short for "emotion icon.”
- It is also called a notebook computer or small portable personal computer.
- It is defined as the transmission of messages over communications networks.
- It is a particular way that information is encoded for storage in a computer file.
Down
- It is a global wide area network that connects computer systems across the world.
- It is a specific typeface of a certain size and style.
- It is a typewriter-style device which uses an arrangement of buttons or keys to act as mechanical levers or electronic switches.
- It refers to moving an icon or other image on a display screen.
8 Clues: It is the term short for "emotion icon.” • It is a specific typeface of a certain size and style. • It refers to moving an icon or other image on a display screen. • It is also called a notebook computer or small portable personal computer. • It is defined as the transmission of messages over communications networks. • ...
Crossword Li5 2023-12-28
Across
- Name the annual economic document presented by the Government of India detailing the state of the economy.
- Identify the Indian financial regulation act that governs non-banking financial companies and microfinance institutions.
- Founder of a very famous Indian multinational corporation?
- India's central public sector enterprise under the Ministry of Finance, involved in tax collection?
- Name the Indian government program launched to connect rural areas with high-speed internet networks.
Down
- Indian regulatory authority is responsible for the regulation and supervision of the insurance sector?
- Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017?
- Indian government's crop insurance scheme to protect farmers against crop failure?
8 Clues: Founder of a very famous Indian multinational corporation? • Which Indian public sector bank was merged with Bharatiya Mahila Bank in 2017? • Indian government's crop insurance scheme to protect farmers against crop failure? • India's central public sector enterprise under the Ministry of Finance, involved in tax collection? • ...
Internet 2020-11-23
Across
- to write about your activities or opinions on the net, an online diary
- an international computer network connecting other networks and computers from companies,universities, different organizations etc.
- to use the Internet while looking for information
- an area on the Internet where you can communicate with each other
Down
- a person who writes an online diary
- a place connected to the Internet where a company, an organization or an individual puts information
- a secret word or a phrase that you need to kmow to be allowed to use a computer system
- a way of sending messages and information by means of computers connected in a network
8 Clues: a person who writes an online diary • to use the Internet while looking for information • an area on the Internet where you can communicate with each other • to write about your activities or opinions on the net, an online diary • a secret word or a phrase that you need to kmow to be allowed to use a computer system • ...
Types of measures to counter security threats. 2022-05-10
Across
- - excludes acquaintance of third parties with the means and technology of information protection
- - involves focusing efforts to prevent threats to the most valuable information
- of additional tasks and requirements for employees of the organization caused by information protection measures
Down
- of the system to changes in the environment
- tools are special mathematical and algorithmic means of protecting information transmitted over communication networks
- special programs, software packages and information security systems in information systems for various purposes and data processing facilities
- - involves predicting the actions of the attacker, the development and implementation of advanced protective measures
- methods are based on one principle of information security management;
8 Clues: of the system to changes in the environment • methods are based on one principle of information security management; • - involves focusing efforts to prevent threats to the most valuable information • - excludes acquaintance of third parties with the means and technology of information protection • ...
Chapter 7 - Individual and Collective Economic Empowerment (pg. 279 - 316) 2023-05-25
Across
- the institution of (blank) coerced Blacks into playing a major role in generating pre-Civil War economic growth in the U.S.
- prioritizing the application of entrepreneurial and other business principle to solve social problems
- Black(blank)entrepreneurship, Black majority ownership and decision-making power
Down
- difference in income that has narrowed down over the years, but still exists
- a vehicle to teach the black entrepreneur how to tap into the billions of dollars generated by Blacks
- a movement to describe the effort to establish economic networks
- (1929-1933) took it's tool in the number of Black businesses that failed
- measure of everything a household owns (assets), minus everything owed to creditors (liabilities).
8 Clues: a movement to describe the effort to establish economic networks • (1929-1933) took it's tool in the number of Black businesses that failed • difference in income that has narrowed down over the years, but still exists • Black(blank)entrepreneurship, Black majority ownership and decision-making power • ...
Educational Inequality Crossword 2025-11-25
Across
- Policies, laws, and institutions that reproduce racial inequalities.
- Daily, commonplace insults and racial slights that cumulatively affect the psychological well-being of people of color.
- The power of a socially dominant group to make its preferences, tastes, and norms appear to be superior to those of the nondominant group.
- Cultural resources that offer social and other benefits.
Down
- The unequal distribution of resources, opportunities, and outcomes in education
- Relationships and networks that offer social and other benefits.
- The disparate educational outcomes of White, Asian, Black, Latinx, and Native American People.
- Theory that multiple social categories like race, gender, class, and sexuality can overlap to create unique systems of discrimination or privilege.
8 Clues: Cultural resources that offer social and other benefits. • Relationships and networks that offer social and other benefits. • Policies, laws, and institutions that reproduce racial inequalities. • The unequal distribution of resources, opportunities, and outcomes in education • ...
Daniela Carballido 2013-05-01
Across
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization
- Is a self-replicating program that is harmful to networks
- Web ... is important because so many people visit the World Wide Web every day
- Is a program written with malicious intent and sent out by attackers
- Is a software program that displays advertising on your computer
Down
- Is technically a worm, does not need to be attached to other software
- Organizations also make ... aware of the dangers of opening e-mail attachments that may contain a virus or a worm
- It is distributed without any user intervention or knowledge
- Is a file or program other then a virus that is potentially harmful
- Events or attacks that remove, corrupt, deny access,allow access or steal imformation
10 Clues: Is a self-replicating program that is harmful to networks • It is distributed without any user intervention or knowledge • Is a software program that displays advertising on your computer • Is a file or program other then a virus that is potentially harmful • Is a program written with malicious intent and sent out by attackers • ...
11.2 2014-03-21
Across
- selling television programs to individual stations, not networks
- an illegal payment by record labels to radio stations to persuade them to play the label's record
- in film distribution, target audience after a film has been in first run at theaters
- previews of upcoming movies shown before they are released
Down
- total income from sales before costs, expenses, and taxes are deducted
- a catchy tune or song that promotes a product or comapny
- a promotional plan that combines selling advertising, public relations, and the use of different media to reach target market.
- in film distribution, the target audience, which is the theaters that show films in first release.
- the schedule, or times, for broadcasting shows on televison, or radio.
- theaters that sell tickets and show films to an audience
10 Clues: a catchy tune or song that promotes a product or comapny • theaters that sell tickets and show films to an audience • previews of upcoming movies shown before they are released • selling television programs to individual stations, not networks • total income from sales before costs, expenses, and taxes are deducted • ...
Basics In Networking 2015-02-10
Across
- It is a connectionless service used by DHCP.A connection network service at the Transport layer
- _________ allows a user to connect to a remote host in terminal mode
- To send a signal in all directions at the same time
- Length of this address is 128 bits -
- It is a 15 bit number used for identifying a wireless system
Down
- These are used to tie multiple networks together and analyze the data being sent over a network, change how it is packaged, and send it to another network.
- A network device that connects two different systems, using direct and systematic translation between protocols
- ___ determines the network portion of an IP address
- one-to-many approach to network address translation
- A computer or device that links two similar LANs based on the same protocol
10 Clues: Length of this address is 128 bits - • ___ determines the network portion of an IP address • one-to-many approach to network address translation • To send a signal in all directions at the same time • It is a 15 bit number used for identifying a wireless system • _________ allows a user to connect to a remote host in terminal mode • ...
internet dangers 2021-03-15
Across
- computer program that replicates itself in order to spread to other computers.
- a malicious piece of computer code designed to spread from device to device.
- collection of instructions and data that tell the computer how to work
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
Down
- attack will send multiple requests to the attacked web resource – with the aim of exceeding the website's
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- the protection of computer systems and networks from information disclosure,
- aimed at causing the network connection to fail.
- any malware which misleads users of its true intent
- messages transmitted and received by digital computers through a network
10 Clues: aimed at causing the network connection to fail. • any malware which misleads users of its true intent • collection of instructions and data that tell the computer how to work • messages transmitted and received by digital computers through a network • the protection of computer systems and networks from information disclosure, • ...
community-based mental health crisis response to Caribbean African Canadians in Toronto 2021-03-06
Across
- Declared anti-Black Racism as a public health crisis
- Crisis Assistance Helping Out On The Streets Acronym
- What is Bill 178?
- What is our asset organization's acronym?
Down
- Percentage of medical students who held false beliefs regarding pain tolerance (write out the full number)
- Poet and civil rights activist who said, "Do the best you can until you know better. Then when you know better, do better”
- key asset component
- What region was identified in step one of the asset collection method?
- Personal experiences and biological characteristics that shape how an individual views society illustrated in the socio-ecological model.
- Category in the socio-ecological model that does not directly impact the individual, but exerts both negative and positive interactive forces on the individual such as community contexts and social networks.
10 Clues: What is Bill 178? • key asset component • What is our asset organization's acronym? • Declared anti-Black Racism as a public health crisis • Crisis Assistance Helping Out On The Streets Acronym • What region was identified in step one of the asset collection method? • ...
Data Transmission 2022-07-13
Across
- a verification method used to check if data transferred has been altered or corrupted
- stages in a network that can receive and transmit data
- a device that enables data packets to be moved between networks
- a small part of a message that is transmitted over a network
- data that can be sent on one direction only
Down
- data that arrives at the destination with the bits no longer synchronised
- the actual data being carried in a data packet
- a number in a data packet header used to stop data packets that never reach their destination from 'clogging up' the data paths
- data that can be sent in both direction but not at the same time
- a horizontal and vertical parity check on a block of data being transmitted
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • stages in a network that can receive and transmit data • a small part of a message that is transmitted over a network • a device that enables data packets to be moved between networks • data that can be sent in both direction but not at the same time • ...
Cailey Mustafa - HIring and Staffing 2023-09-14
Across
- advance or raise (someone) to a higher position or rank.
- a form employers use to collection information about you to see if you are a good fit for the position
- the action of finding new people to join an organization or support a cause.
- a statement that has information about your credit activity and current credit situation
- make (a company or organization) smaller by eliminating staff positions.
Down
- hiring someone from within your existing business structure
- a person, company, or organization that pays people to work for them. My employer is rude.
- a person employed for wages or salary, especially at non executive level
- interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- filling a job vacancy with an employee from outside the company
10 Clues: advance or raise (someone) to a higher position or rank. • hiring someone from within your existing business structure • filling a job vacancy with an employee from outside the company • a person employed for wages or salary, especially at non executive level • make (a company or organization) smaller by eliminating staff positions. • ...
Artificial Intelligence and Finance 2023-09-21
Across
- The process of transforming unstructured financial data (e.g., news articles) into structured data for analysis (2 words)
- A measure of model performance in machine learning, often used to evaluate banking risk models
- The organization responsible for regulating financial markets in the United States
- A measure of the overall stock market's performance
- The technique in NLP that converts words or phrases into numerical representations
Down
- Boosting method popularly used in Wells Fargo
- The process of spreading investments across various asset classes to reduce risk.
- A machine learning technique that involves training multiple models and combining their predictions, commonly used in credit scoring
- A type of account that earns interest and has no fixed maturity date
- An advanced AI technique used in banking to model complex financial systems, often involving recurrent neural networks
10 Clues: Boosting method popularly used in Wells Fargo • A measure of the overall stock market's performance • A type of account that earns interest and has no fixed maturity date • The process of spreading investments across various asset classes to reduce risk. • The organization responsible for regulating financial markets in the United States • ...
Cisco Chapter 11 2016-06-07
Across
- malicious code that presents itself as something it is not
- someone who steals your personal information
- someone trying to gain control of your system by trying to crack the password
- after looking at your data, they change the data
- the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- communication between you and your friend but someone else is monitoring you
- allows traffic that originated from inside the local network to return through the firewall from outside the network
- network attack involves the disabling or corruption of networks, systems, or services
- network attack that replicated and attacks other computers
10 Clues: someone who steals your personal information • after looking at your data, they change the data • malicious code that presents itself as something it is not • network attack that replicated and attacks other computers • communication between you and your friend but someone else is monitoring you • ...
Cisco Chapter 11 2016-06-07
Across
- malicious code that presents itself as something it is not
- network attack involves the disabling or corruption of networks, systems, or services
- allows traffic that originated from inside the local network to return through the firewall from outside the network
- someone who steals your personal information
- network attack that replicated and attacks other computers
Down
- communication between you and your friend but someone else is monitoring you
- after looking at your data, they change the data
- the duplication of critical components or functions of a system with the intention of increasing reliability of the system
- someone trying to gain control of your system by trying to crack the password
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
10 Clues: someone who steals your personal information • after looking at your data, they change the data • malicious code that presents itself as something it is not • network attack that replicated and attacks other computers • communication between you and your friend but someone else is monitoring you • ...
Station 1 2024-05-23
Across
- Plants and algae make ______ using light energy, water and carbon dioxide in the process of photosynthesis
- Objects made from _____ density materials typically have a _____ mass
- The computer's "brain" responsible for processing instructions entered into the computer
- The random motion of tiny particles in a fluid is known as _______ motion
- A type of memory where data is lost when the computer is switched off
- Programs that control the operation of a computer or the processing of electronic data
- All substances are made of tiny particles of matter called ______ which are the building blocks of all matter
Down
- Liquids and solutions that are able to conduct electricity are called __________
- Used to connect two networks or network segments to create a single larger network
- Moving images with or without sound, used for entertainment, education, or promotional purposes
10 Clues: Objects made from _____ density materials typically have a _____ mass • A type of memory where data is lost when the computer is switched off • The random motion of tiny particles in a fluid is known as _______ motion • Liquids and solutions that are able to conduct electricity are called __________ • ...
Network Attack 2024-10-01
Across
- A covert method of secretly intercepting data during sensitive transmissions
- A self-replicating malware that spreads through networks in a rapid manner
- A deceptive scheme using fraudulent emails to trick users into revealing sensitive information
- A dangerous technique that exploits vulnerable systems by inserting malicious code
- A devastating form of malware that locks files and demands a substantial payment for access
Down
- A stealthy technique for capturing valuable network packets to gather information
- A deceptive form of malware disguised as trustworthy software to trick users
- A massive attack that floods a target with excessive traffic to disrupt service
- A malicious tactic that disguises the attacker's identity as a legitimate source to gain unauthorized access
- A destructive piece of code that attaches itself to innocent files and spreads
10 Clues: A self-replicating malware that spreads through networks in a rapid manner • A covert method of secretly intercepting data during sensitive transmissions • A deceptive form of malware disguised as trustworthy software to trick users • A destructive piece of code that attaches itself to innocent files and spreads • ...
Cloud Computing 2025-03-06
Across
- Provide ways of moving data within the cloud or between networks and resources.
- network model in which data, applications, and processing power are managed by servers on the internet
- Refers to cloud functions that process data in some way
- Services delivered by a third-party provider
- cloud computing platform offered by Oracle as a rebranding of their existing On Demand services
- caused by poor routing, insufficient bandwidth, or a bottleneck
Down
- virtual—meaning logical or even imaginary—version of something rather than the actual, or physical, version
- When company delivers cloud services to their own employees through the use of virtualization technologies
- a logical computer running an operating system that borrows hardware resources from its physical host computer and otherwise functions as a completely independent system.
- computing arm of Microsoft’s enterprise
10 Clues: computing arm of Microsoft’s enterprise • Services delivered by a third-party provider • Refers to cloud functions that process data in some way • caused by poor routing, insufficient bandwidth, or a bottleneck • Provide ways of moving data within the cloud or between networks and resources. • ...
Technology and Digital Literacy 2025-04-14
Across
- : Measures taken to protect computers, networks, and data from attacks or damage.
- : The process of converting information into a secret code to prevent unauthorized access.
- : A secret word or phrase used to gain access to a system or service.
- : A model or program that imitates real-world processes or systems for study or training.
- : Programs and operating information used by a computer.
- : A set of step-by-step instructions used to solve a problem or perform a task.
Down
- : A computer that provides data and services to other computers over a network.
- : A new idea, method, or device that brings improvement or change.
- : A group of connected computers or devices that share resources and information.
- : Information, often in the form of facts or numbers, that is collected and used for analysis.
10 Clues: : Programs and operating information used by a computer. • : A new idea, method, or device that brings improvement or change. • : A secret word or phrase used to gain access to a system or service. • : A computer that provides data and services to other computers over a network. • : A set of step-by-step instructions used to solve a problem or perform a task. • ...
Set A-Deep Learning 2025-07-23
Across
- This neural network type uses convolution operations and is popular in image recognition tasks.
- A type of learning where the system infers patterns without labeled outcomes.
- A visual representation extracted from audio to train music genre classifiers.
- The function used to introduce non-linearity in a neural network, commonly ReLU or sigmoid.
- An unsupervised model that learns efficient representations by encoding and decoding input data.
- A type of neural network suitable for sequential data like text or time series.
Down
- A method that involves normalizing input values across a batch during training.
- The phenomenon where a model performs well on training data but poorly on new data.
- The method by which neural networks are trained, adjusting weights to reduce error.
- This mechanism in RNNs helps retain long-term dependencies.
10 Clues: This mechanism in RNNs helps retain long-term dependencies. • A type of learning where the system infers patterns without labeled outcomes. • A visual representation extracted from audio to train music genre classifiers. • A method that involves normalizing input values across a batch during training. • ...
Business technology 2026-02-22
Across
- conferencing-Videoconferencing is a specialized type of teleconferencing that adds real-time video, allowing participants to see facial expressions and share screens.
- technology- refers to the use of all types of business make of information technology
- buying and selling product online
- hardware of a company’s IT system includes the items that you can readily see and touch.
- Teleconferencing is a broad term for any, often audio-only, remote meeting connecting people in different locations.
- the programs inside the computer (like apps).
Down
- running an entire company online.
- banking - managing money through a website / app.
- networks-interconnected systems of devices—such as computers, servers, or components—that communicate via cable, radio, or optical signals to share information, resources, and data.
- storage-savings digital files for later.
10 Clues: running an entire company online. • buying and selling product online • storage-savings digital files for later. • the programs inside the computer (like apps). • banking - managing money through a website / app. • technology- refers to the use of all types of business make of information technology • ...
Business technology 2026-02-22
Across
- conferencing-Videoconferencing is a specialized type of teleconferencing that adds real-time video, allowing participants to see facial expressions and share screens.
- technology- refers to the use of all types of business make of information technology
- buying and selling product online
- hardware of a company’s IT system includes the items that you can readily see and touch.
- Teleconferencing is a broad term for any, often audio-only, remote meeting connecting people in different locations.
- the programs inside the computer (like apps).
Down
- running an entire company online.
- banking - managing money through a website / app.
- networks-interconnected systems of devices—such as computers, servers, or components—that communicate via cable, radio, or optical signals to share information, resources, and data.
- storage-savings digital files for later.
10 Clues: running an entire company online. • buying and selling product online • storage-savings digital files for later. • the programs inside the computer (like apps). • banking - managing money through a website / app. • technology- refers to the use of all types of business make of information technology • ...
Network 2012-11-30
Across
- items like printers that can be used by many different users on network
- device that connects two or more networks together
- most basic and cheapest device that connects all computers on network
- this computer does not rely heavily on server yet still uses resources on network
- most common way to connect computers on network without using cables
- unique number built into virtually every network device,it is stored on ROM
- fastest type of cable,limited to speed of light
- networkt hat may spread over several countries and continents
Down
- sender and receiver synchronise times & agree on transfer rate
- type of cable that is used to connect computers on network
- each machine is given this,it is used to identify it uniquely on network
- identifies services available on network computers
- a rule that deals with ensuring that data is send & received on network
- company that provides access to internet
- computer which connects to network & uses its resources
- device that carries out tasks on network and provides other computers with access to resources
- network within small area
- set of rules about how to dos omething,communication on a network would not bepossible without it
- assigns blocks of addresses to countries
- series of high speed cables which provides network over large geographical area
20 Clues: network within small area • company that provides access to internet • assigns blocks of addresses to countries • fastest type of cable,limited to speed of light • identifies services available on network computers • device that connects two or more networks together • computer which connects to network & uses its resources • ...
Unit 2 Vocabulary Crossword 2012-10-02
Across
- the programs and other operating information used by a computer
- the systematic knowledge of the physical or material world gained through observation and experimentation
- a system of interlinked hypertext documents contained on the Internet
- a camera that captures and stores videos digitally
- the link for a hypertext file to another location
- programs on a computer with a user interface
- the exchanging of information
- the key component of a computer's system
- an international computer network that lets you access educational institutions, government agencies, and industry
Down
- a program that accesses files on the internet and other networks
- the physical components of a computer
- combing words using and, or, not, near to define your internet search
- the application of scientific knowledge for practical purposes
- the act of copying data from one computer system to another
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- stands for hypertext markup language
- to send messages through the internet on the computer
- to browse the Internet; look around casually and randomly, without seeking anything in particular
- a camera that captures and stores images digitally
- a location or address identifying where documents can be found on the Internet
20 Clues: the exchanging of information • stands for hypertext markup language • the physical components of a computer • the key component of a computer's system • programs on a computer with a user interface • the link for a hypertext file to another location • a camera that captures and stores videos digitally • a camera that captures and stores images digitally • ...
The Islamic World 2013-03-12
Across
- Core of Islam for scholars
- Center of commercial networks
- Spanish Muslim Poet
- Allowed Islam cities to become syncretistic
- highly influential thinker and rationalist
- Caused spread of the Quran
- language of science, literature and religion
- Smallest population in world at this time
- What brought the masses to Islam
- time when Islam became the peoples faith
- tax for none Muslims
- Where Arabic is primary langue
- Vehicle once believed to be capable to unite Islamic world
- Mystical movement in Islam
- Turks who conquered the Shiite's
- City Mongol's attacked in 1258
Down
- One of the three things embraced by the Islam Culture
- Area lead by caliphs
- Areas Sufi had carried religion to
- Uniting group of Orthodox and unorthodox Muslims
- Sufi order made Islam this
- Religion which spoke to the common folk
- people who were the educated class
- Founder of the Mevlevi Sufi order
- System made to protect the religious minorities
- Time when a unified Islam seemed just a dream
- Where Islam had spread to by 1300's
- Muslims became the majority of people
- The major religion Islam fought against
- Allowed for many cultures to flourish
- Was politically fractured during this time period
31 Clues: Spanish Muslim Poet • Area lead by caliphs • tax for none Muslims • Core of Islam for scholars • Sufi order made Islam this • Caused spread of the Quran • Mystical movement in Islam • Center of commercial networks • Where Arabic is primary langue • City Mongol's attacked in 1258 • What brought the masses to Islam • Turks who conquered the Shiite's • Founder of the Mevlevi Sufi order • ...
Digital Literacy and Responsibility 2014-10-21
Across
- storage of music on digital audio players
- something you can add to a software
- known as an app
- the use of letters and punctuation that indicates a emotion
- physical parts of a computer
- content and media that combines
- representing the thoughts of an author as your own
- receiving data, such as music, or videos
- like google and bing
- electronic mail
- system that stores enormous amounts of data
- a camera for real-time video footage
- sending data on a website
Down
- Rights given to someone who creates the original work
- a cell phone that is smart
- the location of the website
- to harm someone online
- your computer network has been broken into
- network which links smaller computer networks together
- world wide web
- area where a cell phone doesn't receive a signal
- Media like Facebook and twitter
- address of a website
- Processing Unit Brain of the computer called CPU
- software that displays advertisement.
- act of quoting providing the specific source of the material
- a device that is used for reading electronic books
- theft fraud when someone pretends to be you
- computer software designed to harm a computer
- you can get this at places to get on the internet
30 Clues: world wide web • known as an app • electronic mail • address of a website • like google and bing • to harm someone online • a cell phone that is smart • sending data on a website • the location of the website • physical parts of a computer • content and media that combines • Media like Facebook and twitter • something you can add to a software • a camera for real-time video footage • ...
VOCAB REVIEW 2016-02-25
Across
- maximum particle size
- pattern: commonly encountered drainage pattern
- load: streams carry dissolved substances
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- slow flow
- leaping movement of sand
- separate from the drainage basin of another by a imaginary line
- flat area about level with top of the channel
- fast flow
- tangled networks
- basin: land area that contributes water to a river system
Down
- when streams diverge from a central area likes pokes from the hub of a wheel
- place where the ground slopes up/down
- load: fine particles suspended in water
- level: most streams is global sea level
- loop-like bend in a stream channel
- quantity of water passing by a point on the steamboat
- absorbed by plants, which the release it into the atmosphere
- maximum load
- bank:river cliff
- cycle: unending circulation of H2O
- the rate of rainfall exceeds earth's ability to absorb
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- process by which liquid water changer into water vapour
- gen. term for sediment deposited by streams
- and corner frequency
- pattern: exhibits many right angle bends
- bars:arcuate deposit of sand along the in inside of bend
- load: course particles move along streambed
29 Clues: slow flow • fast flow • maximum load • bank:river cliff • tangled networks • and corner frequency • maximum particle size • leaping movement of sand • loop-like bend in a stream channel • cycle: unending circulation of H2O • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
unit 7 terms 2015-12-16
Across
- burned creates electricity.
- finished goods including processing and construction.
- of physical infracsture and emergence of social/political elite.
- advanced gas
- cost associated with the establishment transportation networks accessible from a specific place.
- industries that cater to the general population and businesses.
- of comparative advantages in international trade.
- flow of water on a wheel, is contained and reused as power.
- trade/continues to open themselves to foreign investment and international markets.
Down
- or harvests products from the earth including production from raw materials and basic foods.
- purpose is to facilitate the other businesses.
- purpose is to provide services to individual consumers who desire them and can afford to pay for them.
- 2 atoms are mixed together to make more power
- wind to create electricity
- resulting from the unique characteristics of a location.
- that absorb sunlight and turn it into electricity
- triggered by external influence, interests, or markets.
- in manufacturing exceeds 10%of national income; development of modern social, economic, and political institutions.
- an atom splits or collides turning it into nuclear energy
- to provide security and protection for citizens and businesses.
20 Clues: advanced gas • wind to create electricity • burned creates electricity. • 2 atoms are mixed together to make more power • purpose is to facilitate the other businesses. • that absorb sunlight and turn it into electricity • of comparative advantages in international trade. • finished goods including processing and construction. • ...
COSC 100 2016-02-15
Across
- Display of HTML tags found on the World Wide Web
- Sending and receiving occur at different times
- Tool used for making slideshows that include pictures, video, music, and so on
- Known as local area network or when computers are geographically close
- Web servers and their files (WWW)
- Composed of HTML tags and multimedia files
- Using about half the words as the control condition
- Software that allows you to create a web page with only text
Down
- Sender and receiver are active at the same time
- Pictures, movies, graphics, etc. embedded in a web page
- Using neutral rather than subjective, boastful, or exaggerated language
- The main technology for local area networks, also used for connecting all the computers in a lab or building
- Gaining unauthorized access/data to a website or system
- The codes or tags that browsers use to create web pages
- The idea certain short files or media can be used without permission or payment from the holder
- False identifying yourself
- A site designed to read and write through the use of digital storytelling
- Legal right or permission to publish, use, perform, etc. another's material
- Areas to store memory to speed up the process of retrievals
- A group of information on a computer that can be software programs or data
20 Clues: False identifying yourself • Web servers and their files (WWW) • Composed of HTML tags and multimedia files • Sending and receiving occur at different times • Sender and receiver are active at the same time • Display of HTML tags found on the World Wide Web • Using about half the words as the control condition • Pictures, movies, graphics, etc. embedded in a web page • ...
rspl 2015-12-04
Across
- programming Language is exclusive used for Artificial Intelligence.
- Destroy System slow down and very harmful.
- Transmission of data in scrambled form.
- A gateway that limits access between networks in accordance with local security policy.
- Only way to share data across Android Application.
- Name of latest Android OS.
- Low power data transfer.
- Founder of Finder.
- Re-referenced by software during operation to increase the overall speed of software program.
- First Female Engineer hired Facebook.
- Step by step formula for solving problem.
- Test to make sure that you are Human.
- A set of functions , procedures, methods, classes or protocols that an os, library or a service provides to support request made by program.
- A technology dynamic boundries which uses GPS and can be RFID.e.g. notify me when i m at office.
Down
- A program successfully masquerades as another bu falsing data.
- Founder of Apple Inc.
- Protected character string used to authenticate the identity of computer user or system to access resources.
- A programmer with no long term contract.
- Visual Presentation of information Architecture model.
- Name of one of the founder of android.
- Visible light High Speed still wireless and very latest.
- Reusable standard document.
- Social media with 140 character limit.
23 Clues: Founder of Finder. • Founder of Apple Inc. • Low power data transfer. • Name of latest Android OS. • Reusable standard document. • First Female Engineer hired Facebook. • Test to make sure that you are Human. • Name of one of the founder of android. • Transmission of data in scrambled form. • Social media with 140 character limit. • A programmer with no long term contract. • ...
Computer Science- Mathieu CHAUVIN 2016-05-31
Across
- what a programmer needs to work all night
- to break into computers or computers networks by exploiting their weaknesses
- you write a lot of this when you're a programmer
- a bar, often at the top of the screen, where you can select an action
- you don't want to have it on your PC
- something you execute to fill a task
- the only equipment a programmer needs to work
- we often oppose it to hardware
- combinaison of keys to make some tasks quicker
- some part of your code which take parameters and gives you a result
- it is useful to interact with your program
- a crucial step to avoid errors
- it gives you access directely to a memory case
Down
- 418 : "I'm a ..."
- it is used to connect several computers each other
- '... world ! ' : the output of your first program
- the first place you go when you got a bug
- a data structure where you can select an element by its index
- the most-used operating system
- a way of programming based on 'objects' and 'classes'
- it is used to write text, or code in a file
- a way of communicating instructions to a machine
- the first name of the man who created Linux
23 Clues: 418 : "I'm a ..." • the most-used operating system • we often oppose it to hardware • a crucial step to avoid errors • you don't want to have it on your PC • something you execute to fill a task • what a programmer needs to work all night • the first place you go when you got a bug • it is useful to interact with your program • it is used to write text, or code in a file • ...
Modern World History 2020-06-01
Across
- Development in machine production
- Having a common national, racial, linguistic, religious or cultural tradition
- Moral principles or standards
- Is a business owned by stockholders who share in its profits but are not personally responsible for its debts
- The racial or national group to which one belongs
- The creation of identical copies of DNA
- A person who organizes, manages and takes risk of business
- the shift beginning in England during the 18th century, from making goods by hand to making them by machine
Down
- Spread and diffusion of economic or cultural influences
- All the financial interactions that croos international boundaries
- Movement of people to cities
- A certain right of ownership
- The voluntary linkage of computer networks around the world
- An economic system in which all means of production are owned by the people, private property does not exist, and all goods and services are shared equally
- The customs, ideas, art, etc. of a particular civilization, society or social group
- A government controlled by religious leader
- A new intellectual movement that stressed reason and thought and the power of individuals to solve problems.
- An economic system based on private ownership
- the elimination of trade barriers
- A difference in culture, nationality, race, religion, etc.
- A believe in a worship of god or gods
21 Clues: Movement of people to cities • A certain right of ownership • Moral principles or standards • Development in machine production • the elimination of trade barriers • A believe in a worship of god or gods • The creation of identical copies of DNA • A government controlled by religious leader • An economic system based on private ownership • ...
Technical Concepts 2020-09-03
Across
- a unit of data that is eight binary digits long
- a software program that runs on your computer
- physical parts of a computer
- a set of networks
- a small amount of data sent over a network
- a suite of communication protocols used to interconnect network devices on the internet
- the number of transistors on a microchip doubles about every two years
- when a packet is passed from one network segment to the next
- the smallest unit of measurement used to quantify computer data
Down
- an organization that provides services for using the internet
- tools for storing, managing, using and gathering data in an organization
- a tool that enables users to locate info on the web
- a computer program that automatically searches docs on the web
- instructions that tell a computer how to work
- a way to access information of the web
- a numerical label assigned to each device
- a set of rules that determine how data is transmitted between different devices
- a device used to amplify its electrical input
- text or image within a file that you can click that gives you access to another doc or image
- a formatting system for displaying material retrieved over the internet
20 Clues: a set of networks • physical parts of a computer • a way to access information of the web • a numerical label assigned to each device • a small amount of data sent over a network • instructions that tell a computer how to work • a software program that runs on your computer • a device used to amplify its electrical input • a unit of data that is eight binary digits long • ...
AP VOCAB Imanol Juarez 2nd 2019-04-29
Across
- the percentage of people who can read and write
- sites dispersed around a city
- redrawing legislative boundaries
- territory that is legally tied to another country
- interconnected nodes without a center
- total value of goods and services produced
- an official count or survey of a population
- culture traditionally practiced by a small group
- improvement in material conditions
- factories built by US
- group of cities close to each other
- site factors
- housing provided by low-income households
- agreement between US, Mexico, and Canada
- discarded electronic devices
Down
- a disease prevalent over a whole country
- refers to the physical gap
- the arrangement of something across earth's surface
- trade alternative to international trade
- association of sovereign states
- widespread occurrence
- feature or trend from one place to another
- relation between the number of people on earth
- utilized in the production of iron and steel
- relatively short-term feeling of disorientation
- incorporation of a territory
- drawing lines on a map
- physical character of a place
- permanent collection of buildings
- vocabulary that is used by a specific group of people
- principle city in a country or state
- amount of labor needed
- process of less dominant cultures
- state of being banned
- traditional regional food
35 Clues: site factors • widespread occurrence • factories built by US • state of being banned • drawing lines on a map • amount of labor needed • traditional regional food • refers to the physical gap • incorporation of a territory • discarded electronic devices • sites dispersed around a city • physical character of a place • association of sovereign states • redrawing legislative boundaries • ...
MLCrossword 2020-09-12
Across
- the machine learning task of learning a function with labels' prior
- arrange (things) in sets or groups
- a neural network model whose goal is to predict the input itself
- a function that can be "ON" (1) or "OFF" (0) depending on input
- an apparatus using mechanical power and having several parts
- notice taken of someone or something
- an algorithm to efficiently calculate the gradients in a neural network
- a regularization technique for neural networks that prevents overfitting
- Generative Adversarial Network
- a function derived from two given functions by integration
Down
- rectified linear unit
- in contrast to feedback
- happens when models fit exactly to a particular set of data and may therefore fail to fit additional data or predict future observations reliably
- a technique used in CNN by compressesing the input representation into a lower-dimensional representation
- the process of partitioning a digital image into multiple segments
- involving or characterized by conflict or opposition
- a group or system of interconnected people or things
- the act or process of normalizing
- the process of adding information in order to solve an ill-posed problem or to prevent overfitting
- An open source machine learning framework that accelerates the path from research prototyping to production deployment
20 Clues: rectified linear unit • in contrast to feedback • Generative Adversarial Network • the act or process of normalizing • arrange (things) in sets or groups • notice taken of someone or something • involving or characterized by conflict or opposition • a group or system of interconnected people or things • a function derived from two given functions by integration • ...
Conquer and Conqueste 2024-04-29
Across
- name of the desert the silk road crosses
- People who don't stay and live in one specific area
- Grandson to Genghis Khan who was just as strong a ruler as him
- Something that made traders predicted on the monsoon marketplace that made travel easier
- The main disease the mongols brought to the rest of the world
- A new discovery in warfare that gave the mongols an advantage in battle
- A portable tent
- Animals that helped traders cross the silk road
- A stretch of land across Asia that is mostly grassland
- The main animal nomads used for everything
Down
- A monotheistic religion started in Asia that spread due to the silk road
- The mongol ruler who made great discoveries and conquests
- the fabric that made the Chinese wealthy
- The item Mansa Musa spread so much of it caused an economic crash
- a series of trade networks across water
- The silk road was the first type of this kind of trade route
- Something that Ghengis Khan catapulted into cities to cause diseases
- The reason why Mansa Musa was traveling to Mecca
- A monotheistic religion started in the middle east spreading due to trade on the silk road
- The system the Mongols constructed that unified Asia, we still us it today
20 Clues: A portable tent • a series of trade networks across water • name of the desert the silk road crosses • the fabric that made the Chinese wealthy • The main animal nomads used for everything • Animals that helped traders cross the silk road • The reason why Mansa Musa was traveling to Mecca • People who don't stay and live in one specific area • ...
Media and Technology 2023-11-28
Across
- - Promoting products or services using digital channels like social media and email.
- - A mobile phone with advanced features like internet access and app capabilities.
- - A digital audio or video file that is available for streaming or downloading.
- - Online platforms for sharing content and connecting with others.
- - Storing and accessing data and programs over the internet instead of a computer's hard drive.
- - Analyzing large sets of data to discover patterns and information.
- - Overlaying digital information onto the real world through technology.
- - Measures taken to protect computer systems and networks from cyber attacks.
- - A seminar conducted over the internet.
- - Sending multimedia content in a continuous stream.
Down
- - Buying and selling goods and services over the internet.
- - The process of converting data into a code to prevent unauthorized access.
- - The simulation of human intelligence in computers.
- - Computer-generated simulation of a three-dimensional image or environment.
- - Playing electronic games, often on a computer or console.
- - Content that spreads rapidly on the internet.
- (Internet of Things) - Interconnected devices that can communicate and exchange data.
- - Bullying that takes place using electronic communication.
- - Small digital images used to express an idea or emotion in electronic communication.
- - A set of rules followed by a computer to solve problems or perform tasks.
20 Clues: - A seminar conducted over the internet. • - Content that spreads rapidly on the internet. • - The simulation of human intelligence in computers. • - Sending multimedia content in a continuous stream. • - Buying and selling goods and services over the internet. • - Playing electronic games, often on a computer or console. • ...
RiddleRealm 2024-02-16
Across
- Testing to ensure existing functionalities still work after changes.
- Storage and retrieval system that uses keys for efficient data access.
- Base-2 number system used in computing.
- Quick check to verify basic functionalities are working.
- Subset of artificial intelligence where systems learn and improve from data.
- Sequence of steps to test a specific functionality.
- AI-powered program designed to simulate conversation with users.
- Document detailing discovered issues during testing.
- Rules governing the structure of code.
- Likes to chase mice
- A versatile programming language known for its platform independence.
- The practice of identifying and removing defects or errors in software
- The process of performing tasks without human intervention, often used in testing.
- Flying mammal
Down
- Protection of computer systems, networks, and data from cyber threats.
- A pre-built structure for developing software.
- Confirming that the software meets specified requirements.
- Software component relied upon by another.
- Interface for interacting with software components.
- Interconnected network of devices communicating and sharing data.
- Step-by-step procedure for solving a problem.
- Detailed instructions for executing a specific test.
- Decentralized and distributed ledger technology.
- Has a trunk
- Large marsupial
- A distributed version control system widely used in software development.
- A set of instructions that performs a specific task in programming.
27 Clues: Has a trunk • Flying mammal • Large marsupial • Likes to chase mice • Rules governing the structure of code. • Base-2 number system used in computing. • Software component relied upon by another. • Step-by-step procedure for solving a problem. • A pre-built structure for developing software. • Decentralized and distributed ledger technology. • ...
CYBER AWARENESS 2023-01-27
Across
- wide area network
- type of phishing attack that targets specific individuals or organizations typically through malicious emails
- networking hardware that connects devices on a computer network by using packet switching
- type of cyber-attack
- designed to harm or exploit a computer system
- A number (0-9) and/or symbol (such as !, #, or %)
- metropolitan area network
- is a software or program that generates various ads from different websites
- type of malware
- is a node that broadcasts data to every computer or Ethernet-based device connected to it
- safeguarding personal data from unauthorized access, use, or disclosure
- an essential component for any Wi-Fi network
Down
- the process of converting information or data into a code, especially to prevent unauthorized access
- type of malware
- virtual private network
- a phishing cyber-attack targeting CEOs
- is an identity and access management security method that requires two forms of identification to access resources and data
- can be used to identify an individual, such as name, address, phone number, email address, and financial information
- local area network
- type of malware
- involves flooding a website or network with traffic to make it unavailable to users
- networks of hijacked computer devices used to carry out various scams and cyberattacks
- of software that is designed to replicate itself and spread from one computer to another
23 Clues: type of malware • type of malware • type of malware • wide area network • local area network • type of cyber-attack • virtual private network • metropolitan area network • a phishing cyber-attack targeting CEOs • an essential component for any Wi-Fi network • designed to harm or exploit a computer system • A number (0-9) and/or symbol (such as !, #, or %) • ...
CS Principles Review 2023-04-26
Across
- A ZIP folder uses ______ compression.
- Information about an individual that can be used to uniquely identify them (directly or indirectly).
- The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
- A small network often in one building
- The technique used to "solve" NP problems
- Basically the use of loops in an algorithm
- is data about data
- the use of "the other type" of code
- The uncringe version of copyright
- Quick and light protocol for transfering data
Down
- ________ Computing; the use of multiple computers to run different parts of a program
- Symmetric key encryption involves ___ key for both encryption and decryption
- Basically the use of if statements in an algorithm
- Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
- a piece of software or a device that uses software(2 words)
- An attack where a user is tricked into revealing private information, often via a deceptive email.
- Common form of wired connection to the internet
- a wireless access point that gives unauthorized access to secure networks
- Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
- _____ Address; IP but for network
20 Clues: is data about data • _____ Address; IP but for network • The uncringe version of copyright • the use of "the other type" of code • A ZIP folder uses ______ compression. • A small network often in one building • The technique used to "solve" NP problems • Basically the use of loops in an algorithm • Quick and light protocol for transfering data • ...
Puzzle 2023-06-06
Across
- Part of the computer system that one can physically touch
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- A programming language known for its use in web development
- A collection of information stored and accessed electronically
- Graphics processing unit
- Coding language developed at MIT designed to teach programming concepts to children
- A popular open-source relational database
- High-level programming language known for its simple syntax
- Central Processing Unit
Down
- Programming language developed by Sun Microsystems, now owned by Oracle
- Measure of CPU speed
- A service offered by Google that allows you to store and share files online
- A worldwide network of interconnected networks and computers
- Number system used in digital electronics and computer programming
- Refers to software that is used to protect your computer against unwanted intrusions
- Personal Computer
- Temporary storage in computer where it holds data that CPU uses
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- The technology that allows for wireless communication between devices over short distances
- Cloud computing platform and API offered by Amazon
- Part of the computer where most calculations take place
- Apple's mobile operating system
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
Intro to Television 2021-12-15
Across
- TO MAKE FALSE OR ACCUSATORY REMARKS
- the speed of delivery or presentation timing; includes the use of pauses and
- which are used for computer networks
- USED TO ILLUSTRATE HOW INFO SHOULD BE ARRANGED IN A NEWS STORY
- the rising and falling of the voice, consists of creating an alternate pitch or tone,
- REFERS TO THE PROCESS OF RECORDING MOVING INAGES ON ELECTRONIC MEDIA
- Protocol Television a system where a digital television service is delivered by the same
- AN ACRONYM FOR PHASE ALTERING LINE
- VIEW THE CAMERA IS POSITION HIGH ABOVE THE ACTION
Down
- MICROPHONES ETERNALLY ATTACHED TO HAND-HELD CAMERAS
- TO INFLUENCE IN AN UNFAIR OR SUBJECTIVE WAY
- LARGE OVERHEAD MICROPHONES ATTACHED TO A POLE
- THE CAMERA IS POSITIONED TO INCREASE THE SENSE OF HEIGHT FO AN INDIVIDUAL OR GVE A SENSE OF SPEED MOTION
- delivery and presentation
- THE COLOR STANDARD USED TO CREAT IMAGES IN TELEVISION BROADCASTING
- THE CAMERA IS ELEVATED ABOVE THE ACTION USING A CRANE TO PROVIDE A GENERAL OVERVIEW OF A SCENE
- GRAPHIC ORGANIZER TO ILLUSTRATE A SERIES OF EVENTS
- the quality of a person’s voice
- speaking or pronouncing words in an articulate style
- TO MAKE A CLAIM, BUT AVOID THE APPEARANCE OF SUBSTANTIATED PROOF
- the property of sound which creates variation
21 Clues: delivery and presentation • the quality of a person’s voice • AN ACRONYM FOR PHASE ALTERING LINE • TO MAKE FALSE OR ACCUSATORY REMARKS • which are used for computer networks • TO INFLUENCE IN AN UNFAIR OR SUBJECTIVE WAY • LARGE OVERHEAD MICROPHONES ATTACHED TO A POLE • the property of sound which creates variation • VIEW THE CAMERA IS POSITION HIGH ABOVE THE ACTION • ...
Cybersecurity Crossword 2021-05-06
Across
- The use of ____ off-the-shelf products have weakened security of ICS.
- Network device designed to control the flow of traffic between networks.
- Support component that contributes to ICS vulnerabilities.
- Total amount of loss or damage that can be expected from a successful attack
- Four-step process of taking action to reduce or eliminate risk.
- Doing ____ is not a viable option for securing ICS.
- has led to workforce downsizing and cost reducing measures in ICS.
- Intrusion, attack, and ____ are the three stages of an attack.
- The majority of attackers are _____.
Down
- Weakness in a system that can be exploited.
- The equation for ____ is threat x vulnerability x consequence
- A copy of your password should NOT be left on your ___.
- _____ should be at least 8 alphanumeric characters long.
- The most common social engineering method.
- The possibility for an insider with authorized access or understanding of an organization to use that access or knowledge to harm that organization.
- Along with intent and opportunity, ____ is needed for threats to succeed.
- 22% of breaches involved some form of ___ ___.
- ____% of attacks are financially motivated.
- _____ is rummaging through business or residential trash for the purpose of finding useful information.
- An attack that is used to make computer resources unavailable.
- Malicious software.
21 Clues: Malicious software. • The majority of attackers are _____. • The most common social engineering method. • Weakness in a system that can be exploited. • ____% of attacks are financially motivated. • 22% of breaches involved some form of ___ ___. • Doing ____ is not a viable option for securing ICS. • A copy of your password should NOT be left on your ___. • ...
IT Newsletter WordSearch #2 2025-02-25
Across
- A server that acts as an intermediary between a user and the internet.
- A popular web security and performance company protecting websites.
- The number of bits transmitted per second in a digital signal.
- The process of verifying a user's identity in security systems.
- A methodology combining software development and IT operations.
- A process of converting data into a fixed-length string for security.
- Gains unauthorized access to computer systems for various purposes.
- A value used to verify the integrity of data during transmission.
- A program that translates source code into machine code.
- Software embedded into hardware, often for low-level control functions.
- A facility that houses critical IT infrastructure, such as servers.
Down
- A cyber scam where attackers trick users into providing sensitive information.
- A malicious attempt to gain access to or damage computer systems.
- A program that initializes the operating system when a computer starts.
- A revolutionary computing method using quantum bits (qubits) instead of traditional binary.
- A method of packaging software and dependencies for deployment.
- A wired networking technology for local area networks (LANs).
- A decentralized and tamper-proof digital ledger technology.
- Fake media created by the manipulation of real media by AI.
- An architectural approach where applications are built as small, independent services.
20 Clues: A program that translates source code into machine code. • A decentralized and tamper-proof digital ledger technology. • Fake media created by the manipulation of real media by AI. • A wired networking technology for local area networks (LANs). • The number of bits transmitted per second in a digital signal. • ...
Unit 5 Lab - Medical Terminology 2023-10-24
Across
- vessels that deliver blood to tissues
- specialized body fluid
- Disorders of the aorta-the main artery that supplies blood from the heart
- networks of small vessels that perfuse tissues
- an imaging test that uses X-rays to look at the structures and organs in your chest
- a problem with the rate or rhythm of your heartbeat
- computerized x-ray imaging procedure in which a narrow beam of x-rays is aimed at a patient and quickly rotated around the body\
- a scan used to look at the heart and nearby blood vessels
- blood
- pumps blood through the system
- arteries
Down
- one of the simplest and fastest tests used to evaluate the heart
- Antiarrhythmics Versus Implantable Defibrillators Study
- a method for evaluating heart function and blood flow
- Antitachycardia pacing
- heart
- Coronary artery disease
- a condition that develops when your heart doesn't pump enough blood for your body's needs
- Antiarrhythmic
- lump, clot
- cell
- Atrial fibrillation
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- vessels that return blood to the heart.
- happens when the flow of blood that brings oxygen to a part of your heart muscle suddenly becomes blocked
25 Clues: cell • heart • blood • arteries • lump, clot • Antiarrhythmic • Atrial fibrillation • Antitachycardia pacing • specialized body fluid • Coronary artery disease • pumps blood through the system • vessels that deliver blood to tissues • vessels that return blood to the heart. • networks of small vessels that perfuse tissues • a problem with the rate or rhythm of your heartbeat • ...
Commerce, Culture, and Trade Bhatt pd 7 2024-10-18
Across
- Became a symbol of monks rather than a daily activity
- Widely traveled Arab scholar, merchant, and public official
- Largest religious structure in the premodern world which sought to express the Hindu understanding of the cosmos
- A time with increased food production, population growth, urbanization, and industrial development across the Islamic world.
- Bacteria responsible for the start of the Black Death
- A kind contract promising payment
- A chinese dynastic title the Mongols gave themselves which suggested a new beginning in Chinese history.
- Major process of settlement and societal organization
- Located in central Java-an agriculturally rich region allied with Srivijaya
Down
- Provided rapid communication across the empire and fostered trade.
- Emphasized salvation by faith, without arduous study or intensive meditation
- Allowed people to make a long trek across the arid Sahara.
- Ruler of Mali, who undertook the hajj accompanied by enormous quantities of gold.
- Foreign merchants came and permanently settled, forming thesecommunities.
- Intellectual center of islamic learning
- Grammatically an African tongue with an Arabic script
- Advanced ships made and used by the Arabs and Chinese
- Inns or guesthouses that large camel caravans stopped at
- Great chinese admiral who commanded a huge fleet of ships in a series of voyages
- Became the center of the trading networks and had highly stratified societies
20 Clues: A kind contract promising payment • Intellectual center of islamic learning • Became a symbol of monks rather than a daily activity • Grammatically an African tongue with an Arabic script • Bacteria responsible for the start of the Black Death • Advanced ships made and used by the Arabs and Chinese • Major process of settlement and societal organization • ...
Unit 5 Activity 2 2024-10-24
Across
- The pair of spongy, pinkish-gray organs in your chest.
- Root word that means “little vessel.”
- The abbreviation for Arteries
- Networks of small vessels that perfuse tissues.
- inflammation of the inside lining of the heart chambers and heart valves
- produces a black-and-white image that shows the organs in your chest.
- chronic heart failure
- type of portable electrocardiogram (ECG).
- The abbreviation for blood vessels
- atrial fibrillation
- A test to record the electrical signals in the heart.
Down
- central nervous system
- _____ occurs when the heart muscle doesn't pump blood as well as it should.
- Medical condition in which poor blood flow to the brain causes cell death.
- Vessels that deliver blood to tissues.
- Any cardiovascular disease process involving one or more of the four valves of the heart.
- The abbreviation for Blood
- Vessels that return blood to the heart.
- Improper beating of the heart, whether irregular, too fast, or too slow.
- The abbreviation for heart
- A scan used to look at the heart and nearby blood vessels.
- tests A test done on a sample of blood to measure the amount of certain substances in the blood or to count different types of blood cells.
- Pumps blood through the system.
- electrocardiogram
- coronary heart disease
25 Clues: electrocardiogram • atrial fibrillation • chronic heart failure • central nervous system • coronary heart disease • The abbreviation for Blood • The abbreviation for heart • The abbreviation for Arteries • Pumps blood through the system. • The abbreviation for blood vessels • Root word that means “little vessel.” • Vessels that deliver blood to tissues. • ...
health systems final 2024-04-02
Across
- The most commonly used benchmark in pharmacy purchasing of drugs:
- What is the fixed dollar amount the beneficiary must pay entirely out of pocket before insurance begins to pay.
- What do the NAM, IHI, and NCQA focus on?
- This type of adherence involves unplanned behavior that is not commonly linked to beliefs or cognition.
- Medical errors are the ___ leading cause of death per year.
- Medicare is a part of what public payer?
- The US policy operates through:
- This report was the start of high medical education costs:
- This law established the average manufacture price (AWP).
- What is the largest healthcare entity?
- In managed care, negotiation is all about:
Down
- Tier 4 contains what type of medications?
- Integrated Delivery Networks (IDNs) are defined into a geographic ____.
- This has led to large advances in rural medicine:
- Do not overlook ___ health policy.
- List of drugs that are covered by insurance and details of how those drugs are covered:
- What is the retrospective discount off the cost of brand drugs?
- The political, policy cycle is a convoluted and ______ process.
- What is the extent to which the patient follows the recommendations of the provider?
- What is the largest sector of health care workers?
20 Clues: The US policy operates through: • Do not overlook ___ health policy. • What is the largest healthcare entity? • What do the NAM, IHI, and NCQA focus on? • Medicare is a part of what public payer? • Tier 4 contains what type of medications? • In managed care, negotiation is all about: • This has led to large advances in rural medicine: • ...
Thulo.ST10095843 2022-03-24
Across
- Two or more computer connected together to share resources.
- How much data can be transferred from one location to another in a period of time.
- The maximum capacity data is transmitted over an internet connection, measured in bits per second.
- How many layers are in the OSI model?
- Packets not reaching their destination.
- What does TCP stand for?
- The ability to continue operation despite component failures.
- Lag or delay in communication over the internet.
- What is used to transfer data to and from a link adapter?
Down
- A hardware component that connects the computer to a computer network?
- A storage unit for data for an adapter.
- A set of rules that determine how data is transmitted between devices in a network.
- What does IP stand for?
- Physical layer, data link layer and network layer are all part of which model?
- A device that communicates between your phone and the internet.
- A small unit of data sent through IP/TCP networks.
- A word for inconsistency of packets arrival in a network.
- The heart of the OSI model
- A hardware device used to connect to other devices using ethernet cables.
- A digital pathway used to transfer data between components in a computer, and devices connected to the computer.
20 Clues: What does IP stand for? • What does TCP stand for? • The heart of the OSI model • How many layers are in the OSI model? • A storage unit for data for an adapter. • Packets not reaching their destination. • Lag or delay in communication over the internet. • A small unit of data sent through IP/TCP networks. • A word for inconsistency of packets arrival in a network. • ...
Technology 2025-07-03
Across
- A common interface used for connecting devices to computers.
- A widely-used programming language often used for web and mobile apps.
- An error or flaw in software code.
- A device that forwards data packets between computer networks.
- Short for application, a software program designed for a specific task.
- A security system that controls incoming and outgoing network traffic.
- A step-by-step procedure for solving a problem or performing a task.
- An input device used to type text into a computer.
- A technology that allows electronic devices to connect to a wireless LAN.
- A memory location that stores frequently accessed data for quick access.
Down
- A computer that provides data or services to other computers.
- The smallest unit of data in a computer.
- A software application used to access websites.
- The smallest unit of a digital image.
- Remote servers used to store, manage, and process data online.
- A device that connects a computer to the internet via telephone or cable lines.
- A method of exchanging digital messages over the internet.
- A popular high-level programming language known for its readability.
- Temporary memory that helps your computer run programs quickly.
- A small graphical representation of a program or file.
20 Clues: An error or flaw in software code. • The smallest unit of a digital image. • The smallest unit of data in a computer. • A software application used to access websites. • An input device used to type text into a computer. • A small graphical representation of a program or file. • A method of exchanging digital messages over the internet. • ...
Technology and the Law 2025-07-17
Across
- This individual must approve an account takeover warrant.
- Online harassment, especially common among young people.
- A social media platform linked to online risks for young users.
- Disruption A type of warrant that allows modification of criminal data.
- Traditional crime increasingly committed online via scams and deception.
- A major police task force mentioned in the SLAID Act announcement.
- A common mental health impact of online abuse.
- Predatory behaviour targeting children online.
- The law enforcement agency given enhanced powers under the SLAID Act.
- Government centre that investigates online child exploitation.
Down
- Malicious software used to damage or gain access to systems.
- The dark ______ is often used by criminal networks.
- Criminal offences committed using computers or the internet.
- A type of scam where attackers trick victims into revealing information.
- A requirement before a warrant can be issued: reasonable ________.
- A common cybercrime involving unauthorised access to systems.
- The legislation gives power to take over a person's online ________.
- Acronym of the 2021 legislation allowing AFP to “hack back” against cybercriminals.
- ACCC-run program that tracks and reports financial scams.
- The SLAID Act targets ______ criminal activity online.
- Encrypted communication network targeted by Operation Ironside.
- Commissioner responsible for regulating online safety in Australia.
22 Clues: A common mental health impact of online abuse. • Predatory behaviour targeting children online. • The dark ______ is often used by criminal networks. • The SLAID Act targets ______ criminal activity online. • Online harassment, especially common among young people. • This individual must approve an account takeover warrant. • ...
Tissues, Organs, and Organ Systems 2022-11-21
Across
- a liquid-tissue which transports oxygen and other nutrients to cells
- muscle that helps your body move and is consciously controlled
- tissue that helps connect networks of cells together
- the organ system composed of ovaries and testes responsible for fertilization of an embryo
- the organ that pumps blood through the body
- the organ that digests food
- tissue that protects the body or lines organs
- the organ system responsible for supplying blood and oxygen to the body
- a group of two or more tissues working together
Down
- the organ system that protects the body from infection
- the organ that processes information from the nervous system
- the organ system responsible for absorbing nutrients from food into the body
- muscle that moves food through your digestive tract and is not consciously controlled
- the organ system responsible for secreting hormones to control bodily functions
- the organ that captures oxygen from the atmosphere
- a group of two or more organs working together
- a group of cells working together
- a chemical messenger used to control bodily functions
- the organ system used for sensing the world around us through sight, touch, smell, hearing, etc.
- the muscle that makes your heart beat
- the organ that absorbs nutrients from food
21 Clues: the organ that digests food • a group of cells working together • the muscle that makes your heart beat • the organ that absorbs nutrients from food • the organ that pumps blood through the body • tissue that protects the body or lines organs • a group of two or more organs working together • a group of two or more tissues working together • ...
Station 1 – Viet Minh Strengths 2025-11-18
Across
- : Political leader who directed the nationalist struggle and unified the Viet Minh.
- : Three-phase doctrine of mobilisation, guerrilla, and conventional warfare.
- : Viet Minh cadres entering colonial administration to gather information.
- : Province where the Viet Minh displaced French authority in liberated zones.
- : Heavy guns supplied by China and positioned above French positions.
- : Town abandoned after Viet Minh isolated French supply lines in 1951–52.
- : Areas under Viet Minh control where shadow governments replaced French rule.
- : Region where Viet Minh evaded French destruction during Operation Lea in 1947.
- : Nationalist and anti-imperialist education creating unity and discipline.
Down
- : Route Coloniale where French forces collapsed in 1950.
- : Final French defeat in 1954 due to encirclement and artillery dominance.
- : Recognised the DRV on 18 Jan 1950 and provided major military aid.
- : Recognised the DRV on 30 Jan 1950 and provided strategic backing.
- : Early-stage tactic conserving strength while weakening French occupation.
- : Secure cross-border bases in China for training and resupply.
- : Major Viet Minh victory on RC4 in 1950.
- : Informant networks embedded in French-controlled towns and villages.
- : Tens of thousands who carried supplies and artillery across mountains.
- : Strategy emphasising long-term mobilisation and gradual escalation.
- : Commander who led protracted people’s war and major military campaigns.
20 Clues: : Major Viet Minh victory on RC4 in 1950. • : Route Coloniale where French forces collapsed in 1950. • : Secure cross-border bases in China for training and resupply. • : Recognised the DRV on 30 Jan 1950 and provided strategic backing. • : Recognised the DRV on 18 Jan 1950 and provided major military aid. • ...
Networking and cyber ethics 2025-05-26
Across
- : Unique address assigned to each device on a network
- : Rules for correct and safe behavior on the internet
- : A program that detects and removes viruses
- : Malicious software
- : A person who gains unauthorized access to computer systems
- : A device that connects different networks together
- required crossword generation library isn't available in this environment. However, I can provide you with a formatted text version that you can paste into Crossword Labs or Discovery Puzzlemaker, which will generate the puzzle and let you download it as a PDF or image.
- : A private network used within an organization
- : Unauthorized duplication of digital contens
- : The physical layout of a computer network
- : Temporary storage for recently accessed data
- : Device used to connect to the internet
- : Online act of bullying or harassment
Down
- : Network that covers a small geographic area like a home or office
- : A global network connecting millions of computers
- Networking and Cyber Ethics
- how to do it using Crossword Labs:
- : Communication over a network in real time
- : Protecting personal and sensitive information online
- : Security measure requiring username and password
- : Process of converting data into a secure format
- the following format into the Crossword Labs input box:
- : A scam to trick users into revealing personal information
- : Lawful and responsible use of technology
24 Clues: : Malicious software • Networking and Cyber Ethics • how to do it using Crossword Labs: • : Online act of bullying or harassment • : Device used to connect to the internet • : Lawful and responsible use of technology • : Communication over a network in real time • : The physical layout of a computer network • : A program that detects and removes viruses • ...
DECRYPT THE GRID 2025-10-29
Across
- Software intentionally designed to harm, disrupt, or gain unauthorized access to a system.
- Safety copy of your important data- your best friend during a crash.
- A storage location for code or data, often used in DevOps.
- Temporary storage that helps apps or browsers load faster.
- Malicious software that locks or encrypts data until payment is made.
- A person who manages system or network configurations.
- A security barrier that filters traffic between networks.
- A major platform where oversharing can cause security risks.
- A scam where fake emails or messages trick users into giving away personal information.
- Finding and fixing errors in code.
Down
- Username and password combination used to access accounts.
- A piece of code that takes advantage of a software vulnerability.
- Storing and accessing data over the internet instead of your hard drive.
- The process of converting data into code to prevent unauthorized access.
- The process of verifying the identity of a user or device.
- Installing the latest version of software to fix bugs or vulnerabilities.
- A group of connected computers that share resources and data.
- A person who gains unauthorized access to systems sometimes ethical, sometimes not.
- Systematic review of systems and logs to check for compliance.
- Risk posed by employees or trusted individuals misusing access.
20 Clues: Finding and fixing errors in code. • A person who manages system or network configurations. • A security barrier that filters traffic between networks. • Username and password combination used to access accounts. • The process of verifying the identity of a user or device. • A storage location for code or data, often used in DevOps. • ...
Computer Vocab Crossword. 2014-02-12
Across
- The number of bits used to encode a single character of text.
- A computer network consisting of worldwide networks of computer.
- a code system using The binary digits 0 and 1 to represent a letter.
- A device.
- Denoting software.
- A collection of items.
- A string of numbers separated by periods.
- The practice of using the network of remote servers.
- The program and other operating information.
- A system that responds to requests acrossed a computer network.
- A group of people or things.
- A website's own style.
Down
- A program with a graphical user interface.
- Rigid, Slotted board were parts connect.
- A small piece of data sent from a website.
- Domain Name System.
- Central Processing Unit.
- The software that supports a computers info.
- Internet Service provider.
- drive A disk drive containing a hard disk.
- Random Access memory.
- port Universal serial bus.
- To load the first piece of software that starts a computer.
- a set of computer instructions in firmware that control input and output operations.
- In a network.
- Small enough to fit on a desk.
- The host of a web page.
- Something inserted on to a rom chip can only be read, not removed.
28 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • Internet Service provider. • port Universal serial bus. • A group of people or things. • Small enough to fit on a desk. • Rigid, Slotted board were parts connect. • ...
BTT10o-F 2014-06-09
Across
- where a row and column intersect
- multiplication sign in excel.
- business letters are prepared on a ________
- two dollar signs used in a formula
- controls how objects move onto, off, and around your slides
- a ______ is the smallest unit of data a computer can use.
- the_____ is a wide area network, and connects to computers and networks around the world.
- The 4 parts of the ribbon are; font groups, buttons ______ and dialog box launcher
- a device that accepts input, processes data, stores data, and produces out
Down
- the certain amount of white space around all sides of the paper that doesn't contain any print
- direct the flow of data from one point to another.
- the state of one object being near another
- if your page lists the author and institution that published the page and provides a way of contacting him/her and...
- an application which allows users to perform calculations.
- lists different ways the word you want to use can be replaced.
- insert text that is already shadowed textured, coloured and contains interesting effects
- any numerical data entered into a worksheet
- used in large organizations where many people need access to the same data
- ________devices shows you what a computer is doing.
- _______lines of the paragraph starts typing from the centre.
20 Clues: multiplication sign in excel. • where a row and column intersect • two dollar signs used in a formula • the state of one object being near another • business letters are prepared on a ________ • any numerical data entered into a worksheet • direct the flow of data from one point to another. • ________devices shows you what a computer is doing. • ...
The Black Death crossword 2013-04-23
Across
- another word for rich
- a method of hurling deceased corpse' to infect opposition
- a numerous amount of people
- another word for remedies
- who many looked up to be cured from the plague
- famous group who tortured themselves for God’s forgiveness
- poisonous air produced by dead corpse
- were allegedly accused of being evil
- the head of the church during the time of the Black Death
- famous play proving equality in the Black Death
- the plague bacterium
- was heavily impacted through Black Death
- the large rash beneath arm pits
- another word for crisis
- cause of the Black Death
- Pope's self-protection from the Black Death
- religious group accused of spreading Black Death
Down
- British zoologist believed that some Black Death victims had this
- played an important role in treating the sick
- provided trading networks for exchange between other countries
- where plague bacteria infected the lungs
- Swis microbiologist who identified the plague bacterium
- another word for through the world
- beginning of Black Death
- where plague bacteria infect the bloodstream
- creatures used to suck out "bad" blood
- animal that spread the disease
- cure for illness
- 10 years in difference
- symptom of Black Death when body temperature rises
30 Clues: cure for illness • the plague bacterium • another word for rich • 10 years in difference • another word for crisis • beginning of Black Death • cause of the Black Death • another word for remedies • a numerous amount of people • animal that spread the disease • the large rash beneath arm pits • another word for through the world • were allegedly accused of being evil • ...
Internet Business Associate 2013-02-19
Across
- A public key encryption algorithm
- A server that mediates traffic between a protected network and the Internet.
- A machine that shares its resources among clients
- a concept or collection of symbols associated with a product, service or person
- The practice of categorizing online content through tags
- An encrypted file transfer protocol
- A web page that integrates content and scripts from multiple web sites to create new applications
- A computing paradigm in which users can use software over the Internet
- A worldwide network of interconnected networks
- A web... who creates the overview plan of a sites development
- Data processed by protocols so it can be sent across a network
- Encrypting and decrypting email messages
Down
- A system that maps uniquely hierarchical names to specific Internet addresses
- A Web 2.0 programming language that consists of existing technologies
- A set of instructions or rules
- A problem solving model in which a task is given to a group of people rather than one.
- A measurement of memory needed to store one 8 bit character
- a computing language used to program Web 1.0
- An individual computer on a network
- Modulator Demodulator
- The integration of telephony and data technologies
- A circuit board that enables a computer to connect to a network
- Outgoing mail server
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Unit 8 Crossword Puzzle #2 2014-12-15
Across
- the internet began here
- use of violence against people/property to force changes
- a nation that has industrialized
- businesses with offices in many countries
- a nation in the process of becoming industrialized
- United Nations
- all the financial interactions involving people, businesses, and governments
- _________ helps spread popular culture
- hacking networks or spreading viruses
- India split into _______ & India upon gaining independence
- this country mainly has Shia Muslims
- Association of Southeast Asian Nations
Down
- switching from a colony to an independent country
- interdependency amongst all countries of the world
- elements reflecting a group's common background and changing interests
- named an independent country in 1948 by the United Nations
- introducing new genes to an organism to give it new traits
- India has a ________ minority
- revolution of using new technology to increase food production globally
- one of the main sources of energy
- weapons of mass destruction
- led Indians on the Salt March
- India was controlled by this country before independence
- the African Congress Party leader who pushed for South African freedom
- organization of countries that export oil
- European Union
- this country experienced extreme racial segregation
- this country mainly has Sunni Muslims
- India has a ________ majority
29 Clues: United Nations • European Union • the internet began here • weapons of mass destruction • India has a ________ minority • led Indians on the Salt March • India has a ________ majority • a nation that has industrialized • one of the main sources of energy • this country mainly has Shia Muslims • hacking networks or spreading viruses • this country mainly has Sunni Muslims • ...
Computer/Web Crossword 2015-09-28
Across
- Network where computers are geographically close
- A group of information on a computer that can be software programs or data
- a permanently fixed original work
- used to view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks
- Related group of networked computers
- Type of writing known as "marketese"
- Main technology used for local area networks
- Caching system that uses caching servers to store content closer to end users.
- Translates the hierarchical, human-readable names into four-number IP addresses
Down
- Unauthorized access to another person's or company's data.
- Type of communication where sender and receiver are active at the same time
- a MAC text editor
- a video, audio, graphical, or icon creation
- Google service that orders links by relevance to user
- Business which provides internet service
- the code or tags that browsers use to create web pages
- a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive
- Visits sites on the internet, discovering web pages and building an index to the web's content based on keywords
- Type of language using neutral words
- a PC text Editor
20 Clues: a PC text Editor • a MAC text editor • a permanently fixed original work • Related group of networked computers • Type of writing known as "marketese" • Type of language using neutral words • Business which provides internet service • a video, audio, graphical, or icon creation • Main technology used for local area networks • Network where computers are geographically close • ...
PART 1 CROSSWORD 2016-02-22
Across
- Type of storage that provides remote storage to computer users
- A keyword or term that is assigned to a piece of information
- Primary type of communication system for the internet
- Type of text with about half the word count as control condition
- The main technology for local area networks
- A modifier of an HTML element type
- Social bookmarking for teachers where they can create free student accounts.
- A specialized form of computer memory designed to speed up the user experience
Down
- Web tool for creating slideshows that includes,video,images,music,and more.
- Acronym for local area network
- A related group of networked computers
- Interfere with UT IT resources or other users
- Legal doctrine that permits limited use of copyrighted material(2 words)
- Exclusive legal right to material
- A computer dedicated to providing services to other computers and devices connected together
- A group of information on a computer that can be software programs or data
- Using neutral language rather than subjective, boastful, or exaggerated
- Interfere with the security mechanisms
- An application used to access and view websites.
- A duplicate of content on a storage medium that you can use in case the original is lost
- The codes or tags that browsers use to create web pages
21 Clues: Acronym for local area network • Exclusive legal right to material • A modifier of an HTML element type • A related group of networked computers • Interfere with the security mechanisms • The main technology for local area networks • Interfere with UT IT resources or other users • An application used to access and view websites. • ...
Unit 7 terms 2015-12-16
Across
- wind to create electricity
- trade/continues to open themselves to foreign investment and international markets.
- flow of water on a wheel, is contained and reused as power.
- of comparative advantages in international trade.
- cost associated with the establishment transportation networks accessible from a specific place.
- finished goods including processing and construction.
- industries that cater to the general population and businesses.
- resulting from the unique characteristics of a location.
- an atom splits or collides turning it into nuclear energy
- 2 atoms are mixed together to make more power
- burned creates electricity.
Down
- of physical infracsture and emergence of social/political elite.
- or harvests products from the earth including production from raw materials and basic foods.
- advanced gas
- triggered by external influence, interests, or markets.
- to provide security and protection for citizens and businesses.
- purpose is to facilitate the other businesses.
- in manufacturing exceeds 10%of national income; development of modern social, economic, and political institutions.
- purpose is to provide services to individual consumers who desire them and can afford to pay for them.
- that absorb sunlight and turn it into electricity
20 Clues: advanced gas • wind to create electricity • burned creates electricity. • 2 atoms are mixed together to make more power • purpose is to facilitate the other businesses. • of comparative advantages in international trade. • that absorb sunlight and turn it into electricity • finished goods including processing and construction. • ...
Chapter 10 2017-04-27
Across
- electronic disturbance which degrades communications
- network that uses no physical wires
- transmits multiple signals simultaneously
- device which transmits data to its correct destination on a network
- an always-on physical connected between 2 communications devices
- set of standards for digital transmission of data over standard copper phone lines
- initiates instructions and information
- uses fiber-optic cable providing extremely high-speed Internet access
- a collection of computers and devices connected together
- the amount of data, instructions, and information that can travel over transmission media
- simple, inexpensive network that connects less than 10 computer, used for very small businesses and home users
Down
- radio waves that provide a high-speed signal transmission
- network that covers a large geographic area
- also called a switch, device which provides a central point for cables in a network
- high-speed network that connects local area networks in a metropolitan area
- network standard that specifies no central computer
- time it takes a signal to travel from one location to another on a network
- accepts the transmission of data, instructions, and information
- connects computers/devices in a limited geographical area
- connects devices in an individual's workspace using wired and wireless technology
- refers to the layout of the computers and devices in a communications network
21 Clues: network that uses no physical wires • initiates instructions and information • transmits multiple signals simultaneously • network that covers a large geographic area • network standard that specifies no central computer • electronic disturbance which degrades communications • a collection of computers and devices connected together • ...
REVIEW 2020-04-13
Across
- is it being used to its maximum capacity
- Laws: labor laws, health and safety regulations, rules on advertising, restrictions on sales . Laws do change.
- all these needed by a business to produce goods or services for the consumer
- managers will need to act promptly
- initial order, usage pattern, recorder level, lead time
- this has become a major source of concern for major record companies and film producers
- product onnovation, process innovation, positioning innovation and paradign innovation
- the 4 factors for contingency planning
- is important to all businesses
- there are split into two general forms
- Measure of the efficiency of production
- senior managers will need to communicate in an objective way
Down
- enables the organization to focus on its core activity.Could help cut costs
- It is about being prepared
- two forms of creativity
- systematic steps and efforts by the organization to limit the damage from sudden crisis
- market, final product, stock, infrastructure, finance, human resources
- Existing transport networks for people and products
- reduce costs,Increase market share, Extension strategies and use defensive strategies
- Consider the type of workers available and balance this with the skills and qualifications needed for all the business operations
20 Clues: two forms of creativity • It is about being prepared • is important to all businesses • managers will need to act promptly • the 4 factors for contingency planning • there are split into two general forms • Measure of the efficiency of production • is it being used to its maximum capacity • Existing transport networks for people and products • ...
