networks Crossword Puzzles
Crossword Puzzle Constitution Unit Crossword 2021-01-07
Across
- a distant territory belonging to or under the control of a nation
- a shift of political power from the british monarchy to Parliament
- legislative body of government
- a document written by the pilgrims establishing themselves as a political society and setting guidelines for self government
- a charter of liberties agreed to by King John of England
- the first permanent English settlement
- a movement that spread the idea that logic could improve society in the 1700s
- originally called New Netherland
- laws passed in the colonies to control slaves
- a crop that is continuously in demand
Down
- a political meeting at which people make decisions on local issues
- trading networks in which good and slaves moved among England, the American colonies, and Africa
- founded by William Penn and the Quakers
- a colonist who received free passage to North America in exchange for working without pay for a certain number of years
- Jamestown was located here
- James Oglethorpe founded this colony to give debtors a new start
- a religious movement that swept through the colonies in the 1730s & 1740s
- the colonial representative assembly of Virginia
- founded by Roger Williams and the Puritans
- belief in the benefits of profitable trading; commercialism
20 Clues: Jamestown was located here • legislative body of government • originally called New Netherland • a crop that is continuously in demand • the first permanent English settlement • founded by William Penn and the Quakers • founded by Roger Williams and the Puritans • laws passed in the colonies to control slaves • the colonial representative assembly of Virginia • ...
Unit 5 Lab 2022-10-26
Across
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- Slow
- atrioventricular
- coronary care unit, cardiac care unit
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- Pumps blood through the system
- Two
- sometimes called a ‘treadmill’ or ‘exercise’ test, is a type of ECG that is done while you are exercising
- atrial fibrillation
- acute coronary syndrome
- Networks of small vessels that perfuse tissues
- Pertaining to
- It gives a picture of your heart using ultrasound, a type of X-ray. It uses a probe either on your chest or down your esophagus (throat)
- a problem with the rate or rhythm of your heartbeat.
Down
- one or more of the valves in your heart doesn't work properly
- happens when a part of the heart muscle doesn't get enough blood
- occurs when the heart muscle doesn't pump blood as well as it should
- Vessels that deliver blood to tissues
- removal
- cardiopulmonary resuscitation
- Vessels that return blood to the heart
- a quick and painless test that records the electrical signals in the heart
- It is a non-invasive test for people who may be experiencing unusual cardiac symptoms
23 Clues: Two • Slow • removal • Pertaining to • atrioventricular • atrial fibrillation • acute coronary syndrome • cardiopulmonary resuscitation • Pumps blood through the system • Vessels that deliver blood to tissues • coronary care unit, cardiac care unit • Vessels that return blood to the heart • Networks of small vessels that perfuse tissues • ...
Caden Powell-Crossword-2nd Period 2016-10-24
Across
- junk emails.
- small size preview of a larger image.
- uses data from a Local Area Network only allowing certain devices to connect to it.
- wireless access to network.
- medium for transferring data over phone lines.
- What type of storage device has no moving parts.
- programs that run on your computer such as word, google,etc.
- computers connected without going through another computer server.
- small negative programs that can effect your computers memory system.
- device used to connect devices together on a computer network.
- how you treat others over the internet.
- programs that make up an operating system for a computer.
- standard and advanced features in a phone that allows you to take picture,video, etc.
- storing data and programs over the internet on other computer networks that are not on your hard drive.
Down
- uses mechanical arm to read/write storage, usually slow than solid state drive.
- refers to today's desktop/laptop computers.
- area where you can sit down and work on assignments there is normally wifi, computer, etc.
- malicious software.
- most common type of internet access for computers.
- the computer and how to share and communicate things electronically.
- people that try to steal your personal information online using adds.
- central connection for computer in a specific area.
22 Clues: junk emails. • malicious software. • wireless access to network. • small size preview of a larger image. • how you treat others over the internet. • refers to today's desktop/laptop computers. • medium for transferring data over phone lines. • What type of storage device has no moving parts. • most common type of internet access for computers. • ...
Vocabulary: Unit 1,2,3 2019-11-12
Across
- It is a pointing device used to facilitate the handling of a graphic environment on a computer. It is usually made of plastic, and is used with one of the hands.
- It is a science that manages methods, techniques and processes in order to store, process and transmit information and data in digital format.
- video player
- It's a tongue
- natural phenomenon
- is the hardware inside a computer
- it's like the heart of the computer
- It consists of a set of computers connected to each other through various methods to share information and services.
- It is a storage medium used in computers and electronic devices, which allows only the reading of information and not its writing
- device to write on the computer
- device to see what happens on a computer
- device to scan things
- device for cooling the CPU of a computer
Down
- It is a flexible, transparent fiber, made by embedding or extruding glass or plastic in a diameter slightly thicker than that of a human hair
- music listening devices
- school subject
- device to make the voice sound louder
- device to play the music of a device
- It is a card to store things from the computer
- It is a device to have computer images
- digital conversation
21 Clues: video player • It's a tongue • school subject • natural phenomenon • digital conversation • device to scan things • music listening devices • device to write on the computer • is the hardware inside a computer • it's like the heart of the computer • device to play the music of a device • device to make the voice sound louder • It is a device to have computer images • ...
Computer Apps! 2023-12-08
Across
- modulator-demodulator
- Firefox, Chrome, Edge
- Random access memory
- A personal or business website that's regularly updated
- A gateway that passes data between one or more local area networks
- Physical parts of a computer
- To receive data or a file from the Internet on your computer
- Portable document format
- To turn off after restarting
- Hypertext markup language
- Intrusive and malicious software
- Microsoft Bing, Google, Yahoo
- Binary digit
- Divide between those with internet and those without it
- Category of property
- Personal identifiable information
- Domain name system
- Text files with small amounts of data
- A unit of information equal to 220
- A family of wired computer networking technologies
Down
- The numeric codes for the operations that a particular computer can execute directly
- Main printed circuit board
- Provides internet
- Read only memory
- Address of a webpage
- Windows, Linux, Android
- Keyboard, Mouse, Microphone
- Scrambling data
- Operating system and data of a computer
- Monitor, projector, printer
- Network protection, filters and scans data
- Stores data
- Open source software
- A unique series of numbers for every device connected to the internet
- Central processing unit
- Simulated experience
- A group of binary digits
37 Clues: Stores data • Binary digit • Scrambling data • Read only memory • Provides internet • Domain name system • Address of a webpage • Random access memory • Open source software • Simulated experience • Category of property • modulator-demodulator • Firefox, Chrome, Edge • Windows, Linux, Android • Central processing unit • Portable document format • A group of binary digits • Hypertext markup language • ...
Network Requirements 2024-08-13
Across
- security measure for network communication
- the time-sensitive delivery of data packets in a network, crucial for streaming
- it is a special purpose computer systems that are embedded in application environments and provided specialized support
- a network device that connects multiple devices within the same LAN
- a unique hardware identifier assigned to network interfaces
- device that forwards data packets between computer networks
- protocol used for assigning IP addresses to devices on a network
- converting data into a secure format
- connection that allows for multiple devices to share data
Down
- security measure that blocks unauthorized access to a network
- type of network that covers a large geographical area
- technology that allows data to be transmitted over long distances without wires
- this layer in the OSI model is responsible for routing packets
- methods and conventions that dictate the process in which data is transferred over a network
- process of dividing a network into smaller, more manageable segments
- a device that combines or aggregates multiple signals into one
- technology used to connect remote users securely over the internet
- a unique identifier for a device on a network
- a protocol used for translating domain names into IP addresses
- crucial factor determining the network's maximum capacity
20 Clues: converting data into a secure format • security measure for network communication • a unique identifier for a device on a network • type of network that covers a large geographical area • crucial factor determining the network's maximum capacity • connection that allows for multiple devices to share data • a unique hardware identifier assigned to network interfaces • ...
Dieguito 2024-09-14
Across
- Your favourite study location…?
- Your official spot for spritz is …?
- Frecuentaste mucho este lugar en el verano solo para mostrarle los prohibidos a una Chiquita…?
- Where you can find the best deep-fried corn products?
- Paraguay y el mar Boliviano son…?
- When you rent a boat without even knowing how to drive it, but you eat a… and nothing else matters?
- Something really Ecuadorian that can be found only in Genova…?
Down
- Best city of Italy?
- La saga del Bellaqueo, also known as…?
- You honor Italian cuisine, with every rule set, But there’s one thing you crave, you can’t quite forget
- Broth Pokémon, alive but completely seasoned and cooked.
- A good ají has this but Wendy will never return it…? (She did tho)
- What’s another name for your German squirrel?
- Answer the poll or suffer the…?
- …… que peina canas y ablanda el corazón como Old Man y Botafogo, Rico, Lombardo y Macón (tango song)
- El bolon no debe ser…?
- Implementation of graph neuronal networks for reconstruction of …… at the IceCube Real-Time Alert system.
- Human of USFQ that was part of your tango journey…?
- Counting sheep should help, but here’s a new quest: Instead of those sheep, what do you proclaim?
- Best beverage in the world is…?
20 Clues: Best city of Italy? • El bolon no debe ser…? • Your favourite study location…? • Answer the poll or suffer the…? • Best beverage in the world is…? • Paraguay y el mar Boliviano son…? • Your official spot for spritz is …? • La saga del Bellaqueo, also known as…? • What’s another name for your German squirrel? • Human of USFQ that was part of your tango journey…? • ...
Coding 2024-10-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
Edgescan Cybersecurity Crossword 2025-02-20
Across
- Attempt to breach security
- Verifying user identity
- Malware that encrypts files and demands payment
- Deceptive emails trying to steal information
- Relating to computers and networks
- Potential danger to a system
- Checking for vulnerabilities
- Self-replicating malicious code
- Person attempting unauthorized access
- Software update to fix vulnerabilities
- Taking advantage of a vulnerability
- Security event that may indicate a breach
- Review of security controls
- Information stored on a system
- Attack that disrupts service availability
- Restoring data after a loss
- Malware disguised as legitimate software
- Connected computers and devices
- Weakness that can be exploited
- Unsolicited bulk email
Down
- Copy of data for recovery
- Simulated attack to find weaknesses
- Ensuring systems are accessible
- Ensuring data accuracy
- Unauthorized access to data
- Software that hides malware on a system
- Scrambling data to make it unreadable
- Programs that run on a computer
- Software that secretly monitors user activity
- Keeping information secret
- Protecting systems and data
- Secret word for access
- Protecting personal information
- Measures to prevent attacks
- Network of infected computers
- Network security system controlling traffic
- Safeguard from harm
- Malicious software designed to harm systems
- Potential for loss or damage
39 Clues: Safeguard from harm • Ensuring data accuracy • Secret word for access • Unsolicited bulk email • Verifying user identity • Copy of data for recovery • Attempt to breach security • Keeping information secret • Unauthorized access to data • Protecting systems and data • Review of security controls • Measures to prevent attacks • Restoring data after a loss • Potential danger to a system • ...
Computer Network Crossword 2025-04-21
Across
- Time delay algorithm used after a collision in CSMA/CD networks.
- Device that connects devices in a LAN and forwards frames based on MAC addresses.
- Basic unit of communication at the data link layer.
- Lowest layer of the OSI model that handles node-to-node data transfer.
- Protocol that allows multiple frames to be in transit without waiting for acknowledgment.
- Error detection method using polynomial division.
- ARQ protocol that retransmits only the erroneous or lost frames.
- Distance Minimum number of bit changes needed to convert one code to another.
- Protocol used to map IP addresses to MAC addresses.
- Error control protocol that resends all frames after a lost or damaged one.
- Logical segmentation of a LAN into multiple broadcast domains.
- A simple method for error detection using summing of bits.
Down
- Technique where data is divided into fixed-size units for error detection.
- Flow control protocol where sender waits for acknowledgment after each frame.
- Unique identifier assigned to network interfaces for communication.
- Widely used wired LAN technology that uses MAC addressing.
- Mechanism for detecting and correcting transmission errors.
- Bit added for simple error detection in transmitted data.
- Ensures sender does not overwhelm the receiver with data.
- When two frames are transmitted simultaneously and interfere.
20 Clues: Error detection method using polynomial division. • Basic unit of communication at the data link layer. • Protocol used to map IP addresses to MAC addresses. • Bit added for simple error detection in transmitted data. • Ensures sender does not overwhelm the receiver with data. • Widely used wired LAN technology that uses MAC addressing. • ...
Core 1 2025-05-13
Across
- Allows smartphones to make payments via proximity.
- The startup process that checks system hardware
- Device that digitizes printed documents.
- Software that runs virtual machines.
- Special IP address used for testing your own machine.
- Combines multiple disks for redundancy or speed.
- Short-range wireless communication protocol.
- Converts names like google.com into IP addresses.
- Device used to extend a computer display to a wall or screen.
- Software permanently programmed into hardware devices.
- Form factor common in compact desktops.
- High-speed I/O port, common on Macs.
Down
- Encrypts your internet traffic and masks your IP.
- Smartwatch feature that tracks heart rate and steps
- Cloud model for services like Google Docs.
- High-speed storage interface that uses PCIe.
- Smallest replaceable component in a smartphone.
- Files stored online instead of locally.
- Port for connecting printers, mice, and keyboards.
- Type of cloud service that provides virtual machines.
- Common cause of overheating in laptops.
- Carries both video and audio signals digitally.
- Converts AC power to DC inside a PC.
- Common interface for connecting hard drives and optical drives.
- Device to test power supply voltage.
- Device that joins multiple networks together.
- Type of storage with no moving parts.
27 Clues: Software that runs virtual machines. • Converts AC power to DC inside a PC. • Device to test power supply voltage. • High-speed I/O port, common on Macs. • Type of storage with no moving parts. • Files stored online instead of locally. • Common cause of overheating in laptops. • Form factor common in compact desktops. • Device that digitizes printed documents. • ...
angielski zawodowy 2025-05-22
Across
- A unique number identifying a device on a network
- Temporary memory used to store data while the computer is running
- A file that organizes data in rows and columns, often used for calculations
- The positioning of text (left, center, right, justified)
- The way users interact with a computer or software
- The brain of the computer that processes data
- A powerful computer that provides services or resources to other computers
- A specific category of information in a database
Down
- Text style that slants letters to the right
- A device used to store data permanently
- A program used for writing and editing text
- A clickable element that links to another webpage
- A structured collection of data stored electronically
- A program used to find websites and online information
- A group of connected computers that share resources
- A design for text characters used in documents
- A connector on a computer used for data transfer and peripheral devices
- A device that forwards data between computer networks
- A set of data arranged in rows and columns in a database
- A request for data or information from a database
- Text style that makes letters thicker and darker
- A single box in a spreadsheet where you enter data
22 Clues: A device used to store data permanently • Text style that slants letters to the right • A program used for writing and editing text • The brain of the computer that processes data • A design for text characters used in documents • Text style that makes letters thicker and darker • A specific category of information in a database • ...
module 1 2025-07-29
Across
- Holds users responsible for their actions in a networked environment
- The process of claiming an identity before authentication
- Forwards data packets between different networks efficiently
- Data is broken into smaller units and transmitted independently across the network
- Connects devices in a LAN and forwards data based on MAC addresses
- Restricts or permits traffic based on predefined security policies
- A cyberattack that involves unauthorized monitoring without altering data
- Verifies the identity of a user or system before granting access
Down
- A layered security approach using multiple protective measures
- Guarantees that data remains consistent, accurate, and unaltered during transmission or storage
- Ensures systems and services are accessible when needed
- Ensures that sensitive data is not disclosed to unauthorized individuals or systems
- Prevents denial of actions or communications by users
- An attack launched straight from the attacker to the target system
- Automatically assigns IP addresses and configurations to network devices
- Tricks users into revealing confidential information by impersonating trusted sources
- A fully isolated and organization-controlled network
- Translates private IP addresses into public IP addresses for external communication
- Resolves IP addresses to MAC addresses for local communication
- Detects and blocks malicious traffic patterns within the network
20 Clues: A fully isolated and organization-controlled network • Prevents denial of actions or communications by users • Ensures systems and services are accessible when needed • The process of claiming an identity before authentication • Forwards data packets between different networks efficiently • A layered security approach using multiple protective measures • ...
Chapter 7 Crossword CEH 2026-03-02
Across
- Malware changing behavior dynamically
- Network traffic analysis tool
- Attacker spreading across networks
- Multiple layered security strategy
- Compressing malware to hide code
- Indicator showing compromise evidence
- Malware operating primarily in memory
- Infrastructure controlling infected systems
- Isolated environment for safe execution
- Windows executable file format
- Detecting threats by activity patterns
- Security model requiring verification
- Malware requiring user execution to spread
- macOS executable format
- Linux executable format
- Tool tracking system processes
- Malware Malware using artificial intelligence techniques
- Gaining higher system permissions
- Examining malware without execution
- Endpoint detection and response security
- Secure hashing algorithm for identification
Down
- Extended threat detection platform
- Proactive search for attackers
- Executing code inside running processes
- Using system scripting tools maliciously
- Small payload executed in memory
- Command showing network connections
- Social engineering used to deliver malware
- Technique allowing malware survival after reboot
- Startup registry location abused by malware
- Dedicated malware inspection system
- Converting binaries into assembly code
- Software designed to damage systems or steal data
- Studying malware behavior during execution
- Making code difficult to analyze
- Creating digital fingerprint of files
- Self replicating malware spreading automatically
- Code abusing system vulnerability
- Automated execution used for persistence
- Startup program monitoring utility
40 Clues: macOS executable format • Linux executable format • Network traffic analysis tool • Proactive search for attackers • Windows executable file format • Tool tracking system processes • Small payload executed in memory • Compressing malware to hide code • Making code difficult to analyze • Code abusing system vulnerability • Gaining higher system permissions • ...
LPG CROSSWORD 2026-03-26
Across
- Process of replenishing fuel reserves
- Government initiative providing modern homes with LPG networks.
- Adherence to established procedural expectations
- System ensuring uniformity in technical requirements
- Device that measures LPG usage.
- Key factor influencing affordability across households
- National plan guiding LPG expansion in Kenya.
- Influence behavioral change at the community level
- By products reduced when clean energy replaces biomass.
- End user of a regulated product or service
- Authority tasked with regulation and enforcement of Technical LPG aspects
- Continuous supply chain activity involving fuel movement
Down
- Designed to endure environmental and socioeconomic changes
- Protection measure against lightning or static discharge
- Disperse resources or commodities to multiple destinations
- Government set principles steering petroleum sector actions.
- Fuel that reduces indoor air pollution.
- LPG piped system installed in buildings.
- VALUECHAIN Series of linked LPG steps from production to consumer usage.
- Government-developed rules that structure LPG sector operations.
- Formal evaluation of processes, safety, or performance
- Quantifying consumption at the point of use
- Ability for populations to reach essential services or fuels
- Containers used to store LPG.
- Process of building capability through applied learning
- Core priority in installation of LPG systems in institutions.
- Device used to detect LPG Leakage
27 Clues: Containers used to store LPG. • Device that measures LPG usage. • Device used to detect LPG Leakage • Process of replenishing fuel reserves • Fuel that reduces indoor air pollution. • LPG piped system installed in buildings. • End user of a regulated product or service • Quantifying consumption at the point of use • National plan guiding LPG expansion in Kenya. • ...
ESTI: April 2021 Newsletter 2021-04-09
4 Clues: A phase in the human sleep cycle • A computer program that mimics the human brain • Chemical messengers in the brain that transmit signals between neurons • The ability of neural networks to change based on external experiences.
SECURITY TERMINOLOGY 2020-05-24
Across
- The unauthorized disclosure of which, could be expected to cause Serious Damage to National Security
- _______________ Assistance Program
- Used on official government information that should be withheld from the public
- The ability and opportunity to obtain knowledge of classified sensitive information
- Given the name “Purple Dragon”
- Reportable action (two words)
- A criterion used in security procedures that requires the custodians of classified information to establish, prior to disclosure (three words)
- Any person with authorized access to any U.S. Government (USG) resource, to include personnel, facilities, information, equipment, networks, or systems
- You are required to ____________ suspicious behavior
Down
- Not authorized special accesses such as COMSEC
- The unauthorized disclosure of which, could be expected to cause Exceptionally Grave Damage to National Security
- Devotion or loyalty to a person, group, cause, or country
- Goal of an Insider Threat Program
- Data derived from friendly detectable actions and open-source information that adversaries can use to reach conclusions or estimates of critical information concerning friendly intentions, capabilities, or activities
- An adversary having the intent, capability, and opportunity to cause loss or damage
15 Clues: Reportable action (two words) • Given the name “Purple Dragon” • Goal of an Insider Threat Program • _______________ Assistance Program • Not authorized special accesses such as COMSEC • You are required to ____________ suspicious behavior • Devotion or loyalty to a person, group, cause, or country • ...
Workplace Tech 2021-08-31
Across
- machinery and equipment developed from the application of scientific knowledge.
- world's largest network; worldwide collection of LANs and WANs
- machines which allow people to make copies of duplicates of papers
- a machine for printing text or pictures onto paper
- a local or restricted communications network, especially a private network created using World Wide Web software.
- a device that scans documents and converts them into digital data.
- any software that is copyrighted and bears limits against use, distribution and modification.
- an electronic device for storing and processing data
- Telephones transmitting pieces of paper electronically through telephone lines
Down
- physical components of a computer such as a monitor, hard drive, and printer
- number of computers connected together to share data, software, and hardware
- consists of programs controlling the operations of a computer and its devices
- refers to something people can modify and share because its design is publicly accessible
- portion of the internet consisting of computer sites containing billions of documents called web pages
- an internet connection that's shared with multiple devices in a home or business via a wireless router.
- series of instructions telling computerhardware what to do
16 Clues: a machine for printing text or pictures onto paper • an electronic device for storing and processing data • series of instructions telling computerhardware what to do • world's largest network; worldwide collection of LANs and WANs • machines which allow people to make copies of duplicates of papers • ...
Cross Word Puzzle 2021-08-24
Across
- Medium
- Software designated to allow user browse online
- Lifeline of today's era.
- Theory that focusses on how information is received organized, stored and retrieved by the mind
- Computer programs that try to emulate human decision-making capabilities
- Combination of text, graphics, audio, and video with links and tools that let the user navigate, interact, create, and communicate.
- recording, reproducing, or broadcasting of moving visual images.
Down
- Implementation of educational technology to accomplish intended learning outcomes.
- The legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy.
- being able to understand and use technology
- theory that says learners Construct knowledge rather than just passively take in information.
- set of related web pages located under a single domain name, typically produced by a single person or organization.
- theory of learning based on the idea that all behaviors are acquired through conditioning.
- The evolution of ever-changing learning networks their complexity, and the role of technology.
- Practice of taking someone else's work or ideas and passing them off as one's own.
15 Clues: Medium • Lifeline of today's era. • being able to understand and use technology • Software designated to allow user browse online • recording, reproducing, or broadcasting of moving visual images. • Computer programs that try to emulate human decision-making capabilities • Implementation of educational technology to accomplish intended learning outcomes. • ...
Jair Jesus Capitan Cortes 2013-05-01
Across
- Also known as junk mail, is unsolicited e-mail.
- A form of attack that prevents users from accessing normal services, such as e-mail and a web server.
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank.
- Should be fully erased to prevent the possibility of recovery using specialized software.
- Is a program written with malicious intent and sent out by attackers.
- Is a software program that displays advertising on your computer.
- Is a file or program other then a virus that is potentially harmful.
Down
- Is the protocol suite that is used to control all of the communications on the Internet.
- A __________ engineer is a person who is able to gain access to equipment.
- Is similar to adware.
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring.
- Technically a worm.
- Programming language that allows applets to run within a web browser.
- Is a self-replicating program that is harmful to networks.
- Destruction is the process of removing sensitive data from hardware and software before recycling or discarding.
15 Clues: Technically a worm. • Is similar to adware. • Also known as junk mail, is unsolicited e-mail. • Is a self-replicating program that is harmful to networks. • Is a software program that displays advertising on your computer. • Is a file or program other then a virus that is potentially harmful. • Programming language that allows applets to run within a web browser. • ...
HSIE - Globalisation 2013-02-20
Across
- The act or process of buying, selling, or exchanging commodities, at either wholesale or retail, within a country or between countries
- A privilege of a public nature conferred on an individual, group, or company by a government
- The quality or state of being sovereign
- The behaviors and beliefs characteristic of a particular social, ethnic, or age group
- Going beyond national boundaries or interests
- The investing of money or capital in order to gain profitable returns, as interest, income, or appreciation in value.
- A person or thing that consumes
- The basic, underlying framework or features of a system or organization
- The management of the resources of a community, country, etc., especially with a view to its productivity.
- The process or act of migrating
Down
- A vast computer network linking smaller computer networks worldwide
- A device designed to be launched into orbit around the earth
- An act or instance of combining into an integral whole
- The act of globalizing, or extending to other or all parts of the world
- To convey (cargo) in standard-sized containers
15 Clues: A person or thing that consumes • The process or act of migrating • The quality or state of being sovereign • Going beyond national boundaries or interests • To convey (cargo) in standard-sized containers • An act or instance of combining into an integral whole • A device designed to be launched into orbit around the earth • ...
The Black Death 2014-05-20
Across
- this rule never recovered after The Black Death ended
- a disease that spreads quickly through a population
- a terrible edidemic and deadly infection that spread through Europe (two words, no space)
- this person ordered that Jews shouldnt be forced to convert during the Black death
- during the plauge the town council ordered jews to convert to what religion
- The Black Death shook this world
Down
- terrified people during the plauge looked for a person to blame for there problems even if they didnt do it. What is this type of person called?
- the plauge tore apart this society
- what the plauge was caused by (two words, no space)
- about how many Europeans died between 1347 and 1352 when the first wave of the plauge ran its course (a fraction, written with letters)
- where the epidemic began (two words, no space)
- Another name for The Black Death (two words, no space)
- The Black Death ended what (two words, no space)
- the epidemic spread slowly along these networks
- during the plauge, what kind of people fled the towns taking doctors with them
15 Clues: The Black Death shook this world • the plauge tore apart this society • where the epidemic began (two words, no space) • the epidemic spread slowly along these networks • The Black Death ended what (two words, no space) • a disease that spreads quickly through a population • what the plauge was caused by (two words, no space) • ...
Radio, Recording, and Popular Music 2022-02-27
Across
- predetermined sequence of selected records to be played by a disc jockey
- a broadcasting station that aligns itself with a network
- single ownership and management of multiple radio stations in one market
- streaming or downloading of audio files recorded and stored on distant servers
- percentage of a market's total population that is reached by a piece of broadcast programming
- model, in broadcast regulation, the idea that broadcasters serve as the public's trustees fiduciaries
- radio, the delivery of "radio" over the Internet directly to individual listeners
- total sale of broadcast airtime
- a radio station's particular sound or programming content
Down
- the illegal recording and sale of copyrighted material
- relaxation of ownership and other rules for radio and television
- sale of radio or television content to stations on a market-by-market basis
- a device that translates digital computer information into an analog form so it can be transmitted through telephone lines
- "radio stations" that can be accessed only over the World Wide Web
- centralized production, distribution, decision-making organizations that links affiliates for the purpose of delivering their audiences to advertisers
15 Clues: total sale of broadcast airtime • the illegal recording and sale of copyrighted material • a broadcasting station that aligns itself with a network • a radio station's particular sound or programming content • relaxation of ownership and other rules for radio and television • "radio stations" that can be accessed only over the World Wide Web • ...
Networking 2022-03-19
Across
- a group or system of interconnected people or things.
- Optic consisting of or using thin flexible fibres with a glass core through which light signals.
- a computer or computer program which manages access to a centralized resource or service in a network.
- transmits power or data between devices or positions.
- rate the ratio of retransmitted packets to the total number of packets in a conversation
- Address a series of numbers that identifies any device on a network.
- the delay before a transfer of data begins following an instruction for its transfer.
Down
- a device that connects two or more packet-switched networks.
- rate/collisions s the result of two devices on the same Ethernet network attempting to transmit data at exactly the same time.
- a system for connecting a number of computer systems to form a local area network.
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- set of rules that determine how data is transmitted.
- translates human readable domain names.
- a small segment of a larger message.
- stands for wireless fidelity.
15 Clues: stands for wireless fidelity. • a small segment of a larger message. • translates human readable domain names. • set of rules that determine how data is transmitted. • a group or system of interconnected people or things. • transmits power or data between devices or positions. • a device that connects two or more packet-switched networks. • ...
OP 8 - Exploration Vocab 2024-01-11
Across
- A conquistador who launched an invasion of modern-day Mexico with 500 men.
- Exchange The regular exchange between the Eastern and Western hemispheres into global networks.
- To travel all around the world.
- A light ship with triangular sails.
- Spanish navigator that led an expedition to be the first to circumnavigate the world.
- Portuguese explorer that sailed around Africa to India to prove it was possible.
Down
- Spanish soldiers and adventurers who led the conquest of the Americas.
- A conquistador that set off for South America and its gold.
- The group of people who were conquered by Pizarro and his men.
- The group of people who were conquered by Cortes and his men.
- Spanish navigator that was the first to cross through Panama with his crew.
- A system in which the government protects and regulates trade to create wealth.
- Gama Portuguese navigator explored the east African coast and India to bring back Asian spices and knowledge of sea routes.
- A navigator who had a historic voyage to the Americas.
- of Tordesillas Established a boundary that passed vertically through the Atlantic Ocean and Brazil.
15 Clues: To travel all around the world. • A light ship with triangular sails. • A navigator who had a historic voyage to the Americas. • A conquistador that set off for South America and its gold. • The group of people who were conquered by Cortes and his men. • The group of people who were conquered by Pizarro and his men. • ...
Artiom P. Period 1 2024-02-06
Across
- A short-range of wireless interconnection between mobile phones, computers, and other electronic devices
- Another word for the internet
- A type of image file that is constantly being used on the internet
- To transfer data into a file and or a program
- A collection of instructions, programs, and data that communicates to a computer on how to perform specific tasks
- Refers to the physical elements of a computer
- A cloud storage which allows you to create files and store files online.
Down
- To copy data, transfer, or move files from a website to other electronic devices.
- A worldwide networks that links computers
- Text files with minimal pieces of data
- An online cloud storage service that is from the Microsoft program which uses commonly used softwares
- The address of a web page
- A type of computer file format, for the compression and storage of digital images
- An application for being able to get on websites and the Internet
- A wireless networking technology that uses radio waves that allows electronic devices to connect to the internet
15 Clues: The address of a web page • Another word for the internet • Text files with minimal pieces of data • A worldwide networks that links computers • To transfer data into a file and or a program • Refers to the physical elements of a computer • An application for being able to get on websites and the Internet • ...
Automation 2024-04-11
Across
- Acronym for the practice of increasing the quantity and quality of traffic to your website through organic search engine results.
- Networks that can be utilized by automation tools to engage with a broad audience.
- Series of structured activities for marketing a product are known as what?
- Potential customers or clients in the marketing funnel.
- A common form of communication that can be automated to nurture leads.
- The measurement and optimization of marketing activities is known as what?
- What system allows marketers to automate repetitive tasks?
- A defined series of tasks within a marketing automation system to process leads.
Down
- Customizing marketing messages for individual recipients through automation.
- Acronym for Return On Investment, a key performance metric in marketing.
- What system is used to manage a company’s interactions with current and potential customers?
- A critical component of marketing that can be distributed automatically through various channels.
- The term for turning a lead into a customer.
- Dividing market into sub-groups with similar characteristics is known as what?
- An automated tool used on websites for instant customer interaction.
15 Clues: The term for turning a lead into a customer. • Potential customers or clients in the marketing funnel. • What system allows marketers to automate repetitive tasks? • An automated tool used on websites for instant customer interaction. • A common form of communication that can be automated to nurture leads. • ...
crossword 4 2024-09-23
Across
- A set of rules governing the exchange of data between devices.
- The delivery of computing services like storage, servers, and databases over the internet.
- A security system that controls network traffic based on predetermined rules.
- The software that supports a computer's basic functions, such as managing hardware and running applications
- A software application used to access and navigate the internet.
- A device that forwards data packets between computer networks.
Down
- A smaller, faster memory that stores copies of frequently accessed data.
- A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- A small file stored on a user's computer that tracks website activity.
- The address used to access resources on the internet.
- A computer
- The system that translates domain names to IP addresses for easier browsing.
- The process of converting information into a code to prevent unauthorized access.
- A set of rules or instructions designed to solve a problem or complete a task in computing.
- The amount of data that can be transferred over an internet connection in a given time.
15 Clues: A computer • The address used to access resources on the internet. • A set of rules governing the exchange of data between devices. • A device that forwards data packets between computer networks. • A software application used to access and navigate the internet. • A small file stored on a user's computer that tracks website activity. • ...
Unit 32 How networks can be attacked 2013-11-28
Across
- Also known for advertising supported software
- Know as malicious software
- Is when an attacker tries to be someone or something else (a website etc) in order gain access or steal information
- force Is a nonstop method used to obtain information such as a user password or personal identification number (PIN) to get in the account, this happens when it goes through a dictionary or regularly used username and passwords
- Programs that are masked as a real program, but instead inflicts, harm or damage your computer
Down
- of service It attempts to make a user or organisation lose its services
- Usually these are statistical analyses that attempt to discover keys
- door Is a method where any virus such Trojan, Malware can get through all security procedures
- Is a type of malicious software that is activated each time your system boots up
- Is a software that gathers information about a person or organisation without their knowledge
- They travel by themselves because they don’t need to attach themselves to something else such a s a file etc. They also don’t need human interaction to be activated
11 Clues: Know as malicious software • Also known for advertising supported software • Usually these are statistical analyses that attempt to discover keys • of service It attempts to make a user or organisation lose its services • Is a type of malicious software that is activated each time your system boots up • ...
Medical Terminology 2021-03-21
Across
- Root word that represents something that you hear with your ears
- Suffix that represents another phrase for bigger than normal
- Root word that represents the largest organ in the body
- Commonly known as a heart attack
- instrument to measure pressure
- Root word that represents something that your body builds when you lift weights
- Vessels that deliver blood to tissues
- test that uses ultrasound to look at the heart and its vessels
- Abbreviation for what you breathe
- Abbreviation for where a doctor completes surgery
- Abbreviation for how fast your heart is beating
- an artery has a weakened wall
- Two layered sac that encloses the heart
Down
- The complete stopping of the heart
- meaning process of recording
- procedure using x-ray dye and a tiny tube called a catheter
- Narrowing in the arteries surrounding the heart
- networks of small vessels that perfuse tissues.
- Abbreviation for where you go when there is a medical emergency
- Suffix that represents what you feel when you get hurt
- a procedure done in a specialized area of radiology
- vessels that return blood to the heart.
- Heart is not efficiently pumping from the left ventricle
- Pumps blood to the rest of the body
24 Clues: meaning process of recording • an artery has a weakened wall • instrument to measure pressure • Commonly known as a heart attack • Abbreviation for what you breathe • The complete stopping of the heart • Pumps blood to the rest of the body • Vessels that deliver blood to tissues • vessels that return blood to the heart. • Two layered sac that encloses the heart • ...
Crossword Puzzle Constitution Unit Crossword 2021-01-07
Across
- a movement that spread the idea that logic could improve society in the 1700s
- laws passed in the colonies to control slaves
- a distant territory belonging to or under the control of a nation
- a shift of political power from the british monarchy to Parliament
- the first permanent English settlement
- a crop that is continuously in demand
- legislative body of government
- a charter of liberties agreed to by King John of England
- founded by Roger Williams and the Puritans
- a political meeting at which people make decisions on local issues
Down
- a colonist who received free passage to North America in exchange for working without pay for a certain number of years
- the colonial representative assembly of Virginia
- originally called New Netherland
- belief in the benefits of profitable trading; commercialism
- a document written by the pilgrims establishing themselves as a political society and setting guidelines for self government
- James Oglethorpe founded this colony to give debtors a new start
- Jamestown was located here
- trading networks in which good and slaves moved among England, the American colonies, and Africa
- founded by William Penn and the Quakers
- a religious movement that swept through the colonies in the 1730s & 1740s
20 Clues: Jamestown was located here • legislative body of government • originally called New Netherland • a crop that is continuously in demand • the first permanent English settlement • founded by William Penn and the Quakers • founded by Roger Williams and the Puritans • laws passed in the colonies to control slaves • the colonial representative assembly of Virginia • ...
Review 2020-04-13
Across
- Factors that need to be considered when calculating the optimal level of stock
- outsourcing outside the home country
- unpredictable event occurs and threatens to harm the organizations and its stakeholders
- Measure of the efficiency of production
- help improve quality BUT still you need to innovate
- Existing transport networks for people and products
- technical development of products or processes
- legal right of the owner of intellectual property
- an innovation so important that it may change the industry itself
- how efficient the facility is
- a natural event such as a flood, earthquake, or hurricane that causes great damage or loss of life.
- is developing responses in advance for various situations that might impact business
Down
- building from many components and building something bigger (TVs, cars)
- an innovation in the use or perception of a new product or service
- buying large quantities of raw material and turning them into smaller end products (paper mills, slaughterhouses)
- occur due to certain acts on the part of workers.
- an unfortunate incident that happens unexpectedly and unintentionally, typically resulting in damage or injury.
- wide system of connected organizations, information, resources, and operations
- granting of a property right by a sovereign authority to an inventor
- The practice of employing another business to perform some peripheral activities
20 Clues: how efficient the facility is • outsourcing outside the home country • Measure of the efficiency of production • technical development of products or processes • occur due to certain acts on the part of workers. • legal right of the owner of intellectual property • help improve quality BUT still you need to innovate • Existing transport networks for people and products • ...
SMAC/JMC INTRAMS 2020-10-15
Across
- connection of networks
- mathematician who wrote "Discourse on Method"
- study of numbers, its properties & operations
- derived from the Greek word nominal and poly
- the owner of "Bing" web search engine
- used as epoxy resins
- stalk of the flower
- relationship bet. two dissimilar beings
- used to measure current in a circuit
- an element common to all acids
- major ingredient of leather
- a science that quantifies reality
- science of directing a craft to its position
Down
- a mineral used in pencils
- device that processes data & converts info
- unit to measure the amplitude of sound
- inter. of species w/c results positive effect
- represents a part of a whole
- destroy vital data & make problems to targets
- a number of times a no. multiplied by itself
- longest side of a right-angled triangle
- a quantity w/c assumes any of a set of values
- deals w/ symbols & rules to manipulate symbol
- part of a flower to which a stalk is attached
- can input graphical images for a computer
- metals w/c forms algams to other metals
- a number in a decimal system
- a force of attraction w/c exists bet.2 masses
- area where plants/animals work together
- study of the universe
30 Clues: stalk of the flower • used as epoxy resins • study of the universe • connection of networks • a mineral used in pencils • major ingredient of leather • represents a part of a whole • a number in a decimal system • an element common to all acids • a science that quantifies reality • used to measure current in a circuit • the owner of "Bing" web search engine • ...
WiFi 2020-11-08
Across
- _____ is handled at the MAC layer
- WiFi stands for wireless_________
- Mode that the device is active in the piconet
- WiFi uses ______ prism architecture
- A wireless network uses ___ waves to transmit signals.
- An added layer of Internet security
- Connect two networks to form a single network at the data-link layer over Wi-Fi.
- Access to the transmission medium is controlled by _________ function.
- Forwards data packets from one network to another
- The adaptation is done at the ______ layer in WiFi
- A low-power-consumption mode
- Devices share their Internet connection using ad-hoc
Down
- Mode that communicate with each other by first going through an Access Point.
- Mode that is no longer a memberof the piconet, but remains synchronized
- The future for Wi-Fi is
- Increasing the number of Wi-Fi access points for a network
- Mode in which the ACL traffic of a device is stopped for a certain period
- Signal sent from a user device to other nearby devices.
- Mode that communicate with each other directly instead of access point
- When a station receives multiple signals on a channel at the same time
- _____uses different techniques (DSSS, CCK, OFDM)
- State that the station cannot either transmit or receive
- The kind of multiplexing WiFi uses
23 Clues: The future for Wi-Fi is • A low-power-consumption mode • _____ is handled at the MAC layer • WiFi stands for wireless_________ • The kind of multiplexing WiFi uses • WiFi uses ______ prism architecture • An added layer of Internet security • Mode that the device is active in the piconet • _____uses different techniques (DSSS, CCK, OFDM) • ...
Journey Inside 2021-11-25
Across
- Temporary computer memory used directly by the CPU.
- 4. Information sent through the networks are broken into small parts.
- The smallest unit of visual information.
- The binary code used to represent letters, numbers, and characters on keyboard.
- A light bulb is an example of a ______ in a circuit.
- The negatively charged particles in an atom.
- Materials that allow the flow of electrons.
- 9. The microprocessor goes three steps to process info, fetch, _______________, and execute.
- The four functions of a computer is input, processing, output, and ___________.
- The number system made up of 0s and 1s.
- Materials that does not conduct electrical current like plastic, rubber, and glass.
- An electronic switch with no moving parts.
Down
- The opposition of the flow of electricity.
- The language used to create web pages.
- The most important part of the computer.
- An output device that outputs sound.
- unit used for small measurements and is equal to .0001 of a centimeter
- The centre of an atom.
- Another term describing a web address.
- The width of the path that data travels through the Internet and affects downloading time.
- A device responsible for directing in a file to the correct location on a network.
- The mother of computer programming
22 Clues: The centre of an atom. • The mother of computer programming • An output device that outputs sound. • The language used to create web pages. • Another term describing a web address. • The number system made up of 0s and 1s. • The most important part of the computer. • The smallest unit of visual information. • The opposition of the flow of electricity. • ...
A-Z of ICT Crossword 2017-06-25
Across
- Online learning tool starting with the letter 'Q'
- A unit of information equal to one sextillion
- A network that connects computers and other devices in a relatively small area
- A collection of physical parts of a computer system
- Examples include Facebook
- A group of computers linked together
- Supplies a device with mechanical of electrical energy
- One of the main search engines
- A type of high speed internet connection.
- A video sharing website
- A unit of information equal to one million bytes
- A mark up language much like HTML
- A software program that infects computers
- Controlled by of connected to a computer
- A object on a computer that stores data, information and settings
Down
- A software developed by Microsoft to allow users to calculate data using a spreadsheet
- A worldwide system of computer networks
- The science of application of knowledge for practical purposes
- A programming language
- A mobile phone that preforms many functions of a computer
- A part of the computer system commonly referred to as the "Brains of a computer
- Random Access Memory
- A panel of keys that operate a computer or typewriter
- Uniform resource locater
- A computer suitable for use at an ordinary 'desk'
- A facility allowing devices to connect to the internet
26 Clues: Random Access Memory • A programming language • A video sharing website • Uniform resource locater • Examples include Facebook • One of the main search engines • A mark up language much like HTML • A group of computers linked together • A worldwide system of computer networks • Controlled by of connected to a computer • A type of high speed internet connection. • ...
Computer Vocabulary 2017-06-21
Across
- graphic representation on a screen of a program, option , or window
- a handheld device that is used to move a cursor on the screen
- flash drive an external flash drive that can be used if it has a USB port
- occurs when a software application stops functioning properly and exits
- a storage space that many files can placed into
- malicious software program
- the primary display screen of a graphical user interface
- device for observing or checking
- System the software that supports a computer’s basic functions
- restart
- collection of physical parts of a computer
Down
- a folder organizing loose articles
- device or program that enables a computer to transmit data
- a computer program that manages access to a central resource
- client software program that runs against a webserver
- distinguishes something that is merely conceptual from something that has physical reality
- practice of sending unwanted email messages
- receive data from a remote system
- an electronic device for storing and processing dataCPU-central processing unit
- a panel of keys that operate a computer
- global system of interconnected computer networks
- Drive storage device containing a read-write mechanism
- information system on the internet that allows the user search and use files
23 Clues: restart • malicious software program • device for observing or checking • receive data from a remote system • a folder organizing loose articles • a panel of keys that operate a computer • collection of physical parts of a computer • practice of sending unwanted email messages • a storage space that many files can placed into • ...
VOCAB REVIEW 2016-02-25
Across
- separate from the drainage basin of another by a imaginary line
- basin: land area that contributes water to a river system
- pattern: commonly encountered drainage pattern
- maximum load
- tangled networks
- level: most streams is global sea level
- when streams diverge from a central area likes pokes from the hub of a wheel
- loop-like bend in a stream channel
- the rate of rainfall exceeds earth's ability to absorb
- maximum particle size
- and corner frequency
- velocity: frictional force combined with the buoyant force exactly balance the gravitational force
- gen. term for sediment deposited by streams
Down
- load: fine particles suspended in water
- pattern: a rectangular pattern in which tributary streams are nearly parallel to one another
- load: streams carry dissolved substances
- cycle: unending circulation of H2O
- pattern: exhibits many right angle bends
- flat area about level with top of the channel
- absorbed by plants, which the release it into the atmosphere
- slow flow
- process by which liquid water changer into water vapour
- fast flow
- load: course particles move along streambed
- leaping movement of sand
- quantity of water passing by a point on the steamboat
- place where the ground slopes up/down
- bank:river cliff
- bars:arcuate deposit of sand along the in inside of bend
29 Clues: slow flow • fast flow • maximum load • tangled networks • bank:river cliff • and corner frequency • maximum particle size • leaping movement of sand • cycle: unending circulation of H2O • loop-like bend in a stream channel • place where the ground slopes up/down • load: fine particles suspended in water • level: most streams is global sea level • load: streams carry dissolved substances • ...
ING1 Company Life 2016-12-06
Across
- a business that is owned or controlled by another larger company
- After a long discussion, they all reached agreement, so the motion was carried ______.
- The English word for "un cadre" is an ________.
- Having lost a lot of money over the last year, they decided to ____ the company.
- the state of being without enough money to pay what you owe
- We need to ____ ____ a policy concerning access to social networks during office hours.
- The French word for "the balance sheet" is le ________.
- The Managing Director is going to _____ next month's AGM.
- English word for "compte-rendu de la réunion"
Down
- the authority that you give to someone to do something for you when you cannot do it yourself
- another term meaning "headquarters"
- French acronym, equivalent to "private limited liability company"
- English word for "actionnaire"
- two-word expression meaning "être introduit en bourse"
- There are eight people on the ____ of Directors.
- the list of points to be discussed at a meeting
- The English word for "un associé" is a _______.
- a skilled person, especially one who makes beautiful things by hand
- person who officially examines the business and financial records of a company
- Let's take a break for now. We'll _____ the meeting at 10.30.
20 Clues: English word for "actionnaire" • another term meaning "headquarters" • English word for "compte-rendu de la réunion" • The English word for "un cadre" is an ________. • the list of points to be discussed at a meeting • The English word for "un associé" is a _______. • There are eight people on the ____ of Directors. • ...
Actividades de ocio 2019-04-25
Across
- (to) rest/relax at home
- yoga (to) practice yoga
- (to) gossip
- un museo (to) visit/go to a museum
- (to) surf the internet/web
- (to) swim
- (to) dance
- (to) organize; arrange; put in order
- to drive (a vehicle)
- (to) pray
- (to) sing
- (to) travel
- (to) watch movies
- (to) do the shopping
- (to) sleep
- (to) draw, sketch
- (to) go out with friends
- (to) show
- (to) use social media/networks
- (to) clean
- (to) take photos
- (to) eat
- (to) go camping
- (to) take care of
- la guitarra (to) play the guitar
Down
- un instrumento (to) play an instrument
- (to) ski
- (to) chat with friends
- (to) do homework
- (to) learn
- (to) talk on the phone
- (to) joke around
- (to) dine in restaurants
- (to) demonstrate, protest
- (to) text (someone)
- (to) paint
- (to) lift weights
- (to) exercise
- (to) take a hike
- (to) run
- en monopatín (to) skateboard
- (to) meditate; (to) contemplate
- (to) cook
- (to) window shop
- (to) act in a play
- (to) walk
- (to) recycle
- (to) attend
- to study
- free time/spare time
- (to) sunbathe, tan
- (to) help/assist people
52 Clues: (to) ski • (to) run • to study • (to) eat • (to) swim • (to) cook • (to) pray • (to) sing • (to) walk • (to) show • (to) learn • (to) paint • (to) dance • (to) sleep • (to) clean • (to) gossip • (to) travel • (to) attend • (to) recycle • (to) exercise • (to) go camping • (to) do homework • (to) joke around • (to) take a hike • (to) window shop • (to) take photos • (to) lift weights • (to) watch movies • (to) draw, sketch • ...
FITCvocab.GJK 2013-05-15
Across
- Flat disc used to store data
- one page document about your life
- protection of info. on the Internet
- Serves information to other computers
- 1000 bytes
- a slot where you can put head phones
- Internet/Online
- internet rules to keep you safe
- An official catch phrase of a company or brand
- Stands for ISP
- who is asking? what are they asking? Why do they want it?
- 1000 kilobytes
- Slots for hardware
- for connecting keyboards and mouses
- don't plagiarize
- Service set identification name signed to wifi networks
Down
- Data stored in a computers memory
- EX.headphones
- 1000 Gigabytes
- Stands for CPU
- Official picture of a company
- Piece of written matter
- Long term memory
- Search engine that take you to other search engines
- Selection of editing tools
- Stands for RAM
- front of the program
- rich text format
- Smallest piece of information
- Visual display used in devices
- DSL,Cable
- protect users form people phising
- program stored on internet servers
- No wire
- EX.mouse
- how you act online
- The second smallest device that stores information(8 Bits)
- 1000 megabytes
- Wireless Fidelity
- one canvas you can put anything on
- Document
41 Clues: No wire • EX.mouse • Document • DSL,Cable • 1000 bytes • EX.headphones • 1000 Gigabytes • Stands for CPU • Stands for RAM • Stands for ISP • 1000 kilobytes • 1000 megabytes • Internet/Online • Long term memory • rich text format • don't plagiarize • Wireless Fidelity • how you act online • Slots for hardware • front of the program • Piece of written matter • Selection of editing tools • ...
hs web definitions 2013-09-03
Across
- Short for "Web Log," this term refers to a list of journal entries posted on a Web page.
- a mobile phone that includes advanced functionality beyond making phone calls and sending text messages.
- World Wide Web
- media a collection of Internet-based communities that allow users to interact with each other online.
- used to verify that a human, rather than a computer,
- "computer screen"
- the primary user interface of a computer. When you boot up your computer
- spreads across the globe and consists of countless networks and computers
- The term computer file management refers to the manipulation of documents and data in files on a computer.
- An instance of a relief pitcher saving a game.
- Uniform (or universal) resource locator, the address of a World Wide Web page.
Down
- The mouse
- is the program people use to access the World Wide Web
- a marker for a Web site
- Google, Excite, Lycos, AltaVista, Infoseek, and Yahoo are all ?
- Short for "Wireless Fidelity
- Information Communication Technology
- address In computing, a Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies where an identified resource is...
- is the embodiment of a person or idea.
- junk e-mail or irrelevant postings to a newsgroup or bulletin board.
20 Clues: The mouse • World Wide Web • "computer screen" • a marker for a Web site • Short for "Wireless Fidelity • Information Communication Technology • is the embodiment of a person or idea. • An instance of a relief pitcher saving a game. • used to verify that a human, rather than a computer, • is the program people use to access the World Wide Web • ...
BoB's crossword, the most useful crossword of all time !! 2015-09-20
Across
- has more turns on the secondary coil and so it increases voltage
- where current splits or join in a circuit
- the high-pressure steam is forced through a turbine making it turn
- a path for electrical charge to pass through
- things that uses electromagnets in a door bell
- instrument to measure the flow of electricity
- an electric current that always flows in one direction
- electricity is transported across the country by vast networks of pylons
- when electricity is passed through a coil of wire, the coil has a magnetic field around it
- the region around a magnet where it has a magnetic effect
- stored energy
- unit of energy
Down
- fossil fuels are burnt to heat and water
- an electric current that is constantly changing direction
- a safety device that protects an electric cable from overheating so that the insulation doesn't catch fire
- when energy spreads out into the surroundings
- the rate at which an electrical appliance uses electrical energy
- has fewer turns on the secondary coil and so decreases voltage
- can be used to change the voltage of AC
- joules per second
- the turbine is attached to a generator which turns to generate electricity
- how good a device is at changing energy from one form to another
22 Clues: stored energy • unit of energy • joules per second • can be used to change the voltage of AC • fossil fuels are burnt to heat and water • where current splits or join in a circuit • a path for electrical charge to pass through • when energy spreads out into the surroundings • instrument to measure the flow of electricity • things that uses electromagnets in a door bell • ...
Programming 2015-01-21
Across
- performs logical and arithmetical operations on the data as specified in the instructions
- A global system of interconnected computer networks
- software that manages computer hardware and software resources and provides common services for computer programs
- A type of software that is used for programming
- allows data items to be read and written in roughly the same amount of time
- represents numeric values using two different symbols
- A programming environment made by microsoft
- a diagrammatic representation of an algorithm
- What is used to browse the internet
- a character-encoding scheme, Originally based on the English alphabet
- a positional numeral system with a radix
- A widely used general-purpose, high-level programming language
- What you write programming statements with
Down
- intended for human reading rather than machine reading
- Display device used for computers
- The other inventor of the world wide web
- One of the two inventors of the world wide web
- a system of interlinked hypertext documents that are accessed via the Internet
- the set of well defined instruction in sequence to solve a program
- a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user
- The company that buit .net framework
21 Clues: Display device used for computers • What is used to browse the internet • The company that buit .net framework • The other inventor of the world wide web • a positional numeral system with a radix • What you write programming statements with • A programming environment made by microsoft • a diagrammatic representation of an algorithm • ...
Internet Citation Terms 2016-09-05
Across
- If I electronically send you a letter that is called ___.
- If I am speaking internet language, I would use the term ____ instead of period for this symbol (.)
- The first page a visitor will encounter on a web site is called the _________page.
- www is the most common
- Google is an example of a _____.
- .edu
- personal website where you record opinions
- .gov
- .net
- used to mark a website so you can look at it later.
- If I am on a website and then I “jump” to another website, I have probably selected a _____.
- use of convincing-looking emails to lure you into typing your account numbers and passwords.
Down
- .mil
- kind of tracking number assigned to computers and phones
- Addresses on the internet have different results depending on whether the letters are capital or lower case. This is called ___
- .com
- The domain of a URL is usually only ___ letters long
- If I lived on the internet, my address would be called a
- malicious software
- If I were to take the file cabinets in this room and put them on the computer, they would become a ______.
- .org
- allows collaborative editing of its content and structure by its users.
22 Clues: .mil • .com • .edu • .org • .gov • .net • malicious software • www is the most common • Google is an example of a _____. • personal website where you record opinions • used to mark a website so you can look at it later. • The domain of a URL is usually only ___ letters long • kind of tracking number assigned to computers and phones • ...
Medical Terminology 2024-04-27
Across
- / records the hearts electrical activity
- / damage in the heart major blood vessels
- attack / happens when part of the heart is blocked by a blood clot
- / one of the meaning of the heart
- / A device placed in the body connected to the heart to help control the rhythm
- / network tubes of where the blood is pumped through the body
- / vessels that deliver blood to tissues
- / largest artery in the body
- / strong tissue that protects bones and joints
- / Gives a picture of the heart using a ultrasound
- / vessels that return blood to the heart
- / condition when irregularities in heartbeat
Down
- / condition when narrow blood vessels reduce or block blood flow to the limbs
- MRI / uses radio waves, magnets, and computer to create a picture
- Failure / condition where the heart don't pump blood right
- angiogram / used to examine coronary arteries supplying blood to heart muscle
- / an interruption in the flow of blood to cells in the brain
- / transport fluid to and from every organ in the body
- / networks of small vessels that perfuse tissues
- / temporary blockage of blood flow to the brain
- scan / detailed pictures of the heart
- / pumps blood through your body
- / carry oxygen and blood to and from your heart
- blood pressure / condition of pressure of the blood is too high
- / Damage from the brain stop its blood supply
25 Clues: / largest artery in the body • / pumps blood through your body • / one of the meaning of the heart • scan / detailed pictures of the heart • / vessels that deliver blood to tissues • / records the hearts electrical activity • / vessels that return blood to the heart • / damage in the heart major blood vessels • / condition when irregularities in heartbeat • ...
social media 2024-04-05
Across
- reinforcing behavior
- A uncontrollable behavior
- division into two sharply contrasting groups or sets of opinions or beliefs
- good feeling after a pleasant experience
- a set of rules and signals that rank content on a social platform
- a difficult situation or problem
- relating to or deriving from psychometry or psychometrics
- comedy series
- Comparing two versions of a webpage or app
- impossible to perceive
- field of study in artificial intelligence concerned with the development and study of statistical algorithms
- Using creative, low cost strategies to help companies get customers
- not true
- Profit-making incentive, and arose as advertising companies
- critical point in a situation, process, or system beyond which a significant and often unstoppable
- how people are interacting with your social media accounts and content
Down
- morally bad
- emotions expressed by friends, via online social networks, influence our own moods
- a person who is a member of a group, organization, society, etc
- Process or set or rules
- Attention,Interest,Desire(or, in some variations, Decision) and Action
- Technique that loads more content and allows the user to view more content
- Branch on knowledge that deals with moral principles
- branch of computer science
- person who uses or operates something, especially a computer or other machine.
25 Clues: not true • morally bad • comedy series • reinforcing behavior • impossible to perceive • Process or set or rules • A uncontrollable behavior • branch of computer science • a difficult situation or problem • good feeling after a pleasant experience • Comparing two versions of a webpage or app • Branch on knowledge that deals with moral principles • ...
monoploy 2024-10-12
Across
- Lightweight process
- Topology where each device connects to a central hub
- Java feature to close resources automatically
- Constants in C++ are also known as
- Protocol for assigning IP addresses dynamically
- Device that forwards data between networks
- Class to compile regular expressions in Java
- Protocol ensuring reliable data transmission
- Delay in data transmission
- Committee standardizing C language
- Procedure for switching between processes
- Fundamental unit of data transfer in a network
- Stores data in a swap file on hard drive
- Command to send signals in UNIX
- OS that reads and reacts to actual time
- Data type that stores different types in the same memory location
Down
- Device that prevents unauthorized network access
- OOP concept where a class derives from another
- Most optimal CPU scheduling algorithm
- Process of moving data between main memory and disk
- Data structure used for recursion in C
- Scheduling command in UNIX
- List of processes prepared to execute in OS
- Command interpreter in UNIX
- Keyword that preserves variable value across function calls
- Empty pointer in C
- Function to copy memory blocks in C
- Keyword for a variable that may change at any time
- Concept converting real-world objects into class
- A variable storing memory address in C
30 Clues: Empty pointer in C • Lightweight process • Scheduling command in UNIX • Delay in data transmission • Command interpreter in UNIX • Command to send signals in UNIX • Constants in C++ are also known as • Committee standardizing C language • Function to copy memory blocks in C • Most optimal CPU scheduling algorithm • Data structure used for recursion in C • ...
PuzzlE 2023-06-06
Across
- Part of the computer system that one can physically touch
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- A programming language known for its use in web development
- A collection of information stored and accessed electronically
- Graphics processing unit
- Coding language developed at MIT designed to teach programming concepts to children
- A popular open-source relational database
- High-level programming language known for its simple syntax
- Central Processing Unit
Down
- Programming language developed by Sun Microsystems, now owned by Oracle
- Measure of CPU speed
- A service offered by Google that allows you to store and share files online
- A worldwide network of interconnected networks and computers
- Number system used in digital electronics and computer programming
- Refers to software that is used to protect your computer against unwanted intrusions
- Personal Computer
- Temporary storage in computer where it holds data that CPU uses
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- The technology that allows for wireless communication between devices over short distances
- Cloud computing platform and API offered by Amazon
- Part of the computer where most calculations take place
- Apple's mobile operating system
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
WWI Crossword 2022-05-12
Across
- country that received Zimmermann note
- fighting between Gremans and Russians happened
- plan to win
- fire weapon, used in trenches
- type of warfare with networks
- dropping bombs on important places
- battle to stop advances in Germany
- treaty from Russia to Germany
- handheld weapon used in trenches
- first aircraft used
- big vehicles combating trench warfare
- a chemical warfare
- who replaced men in factories
- goods needed for war
- one of the first countries to surrender
- note from Germans to Mexico
- first US marines in WWI combat
- french plan to retake
Down
- only country/continent involved
- who went to war
- weapon/warfare used to sink any ship
- where most of the fighting happened
- word for deaths
- continent where fighting was in Egypt
- when a country leaves the war peacefully
- to strongly go against
- battle for German to frighten French
- Big Push battle
- German submarine
- person who offered truce to Germany
- country where Woodrow Wilson lived
- when all resources are devoted to war
- popular way to recruit
- first full scale offensive battle with tanks
- he stepped down of revolt in Germany
- nations pride
- longest battle
- land between opposing sides
- first war that included use of planes
39 Clues: plan to win • nations pride • longest battle • who went to war • word for deaths • Big Push battle • German submarine • a chemical warfare • first aircraft used • goods needed for war • french plan to retake • to strongly go against • popular way to recruit • note from Germans to Mexico • land between opposing sides • fire weapon, used in trenches • type of warfare with networks • ...
separation The first clause in the Bill of Rights states assures this between church and state. 2023-06-02
Across
- Frank ______,commander of the Apollo 8 mission.
- Saint who said, "You have made us for yourself O Lord, and our heart is restless until it rests in you."
- Travis Jackson's interview with NASA took place at this historic venue.
- Connor Jordan built these for his Eagle Scout project
- Charles ______, only Catholic signer of the Declaration of Independence.
- Worn by early ascetics, a form of self punishment.
- Travis Jackson witnessed almost all of these space missions.
- Saint born in 1195 in Lisbon, Portugal.
- The Desert Mothers developed early networks of women that emerged as early forms of these.
- "Our Faith can move ______." Matthew 17:20
- kept away from the outside world, as in a monastery.
- Birthplace of the St. Francis.
Down
- Italian countryside and popular travel destination.
- An exotic ice cream flavor popular in Belize.
- University where Tom Hubert was a student.
- The first clause in the Bill of Rights assures this between church and state.
- Jack ______, former deacon of St. Michael's.
- St. Michael's makes a yearly mission trip here.
- The final prayer of the day.
- Latin for mother.
- a mental state achieved by focusing one's awareness on the present moment.
- The rope that girds the waist of Franciscan monks has three of these.
- David Nichols dream boat.
23 Clues: Latin for mother. • David Nichols dream boat. • The final prayer of the day. • Birthplace of the St. Francis. • Saint born in 1195 in Lisbon, Portugal. • University where Tom Hubert was a student. • "Our Faith can move ______." Matthew 17:20 • Jack ______, former deacon of St. Michael's. • An exotic ice cream flavor popular in Belize. • ...
END VIOLENCE AGAINST CHILDREN 2024-11-25
Across
- Violence can severely impact a child’s physical and mental ___
- The United Nations agency working for child protection and development
- Therapy provided to children who have experienced violence
- Governments must enforce ___ to protect children from harm
- Strong ___ networks can help protect children from abuse
- Measures taken to stop violence before it occurs
- The use of children in armed conflict
- Failure to meet a child’s basic needs like food and shelter
- A child's well-being
Down
- a form of non-physical abuse that affects a child's well-being
- Speaking out and taking action to protect children's rights
- The act of intentionally causing physical harm to a child
- Access to ___ can empower children and reduce vulnerability to violence
- Repeated aggressive behavior intended to harm a child physically or emotionally
- Corporal ___ is a harmful practice that can lead to abuse
- Children have the right to ___ from violence and abuse
- Promoting gender ___ helps reduce violence against girls
- Offering ___ to victims of violence can aid their recovery
- A condition that increases the risk of violence against children
- Raising ___ about child protection issues helps prevent abuse
- Teaching children their ___ can empower them to report abuse
- Emotional and psychological damage caused by abuse or violence
- A form of abuse where children are used for labor
23 Clues: A child's well-being • The use of children in armed conflict • Measures taken to stop violence before it occurs • A form of abuse where children are used for labor • Children have the right to ___ from violence and abuse • Promoting gender ___ helps reduce violence against girls • Strong ___ networks can help protect children from abuse • ...
UNIT 5 CROSSWORD 2025-04-29
Across
- Neural networks for advanced AI tasks
- AI learns from rewards and penalties
- Conversational AI chatbot by OpenAI
- Reduces human error in decisions
- Converts spoken language to text
- Natural Language Processing
- Python library for data visualization
- Google's multimodal AI model
- AI that creates text, images, or videos
- Allows tuning of AI models for specific needs
- Tools usable from anywhere via cloud
- Reduces human effort in repetitive tasks
- Tensor Processing Unit used in Google AI
- AI-powered content generation tool
- Automate customer service interactions
- Reinforcement Learning from Human Feedback
- Running apps and storing data online
Down
- Ability to handle large data and computations
- Identifying unusual patterns in data
- High-level API for building TensorFlow models
- Computer vision and image processing library
- Suggests items based on user behavior
- Cloud-based Jupyter notebook platform
- AI that runs on local devices without cloud
- Gaining insights from data using AI
- Deep learning framework developed by Meta
- Forecasting future trends using data
- Making data easier to understand using plots
- Extremely large data sets analyzed by AI
- Statistical data visualization library based on Matplotlib
- Open-source machine learning framework by Google
- Structure used in deep learning models
32 Clues: Natural Language Processing • Google's multimodal AI model • Reduces human error in decisions • Converts spoken language to text • AI-powered content generation tool • Conversational AI chatbot by OpenAI • Gaining insights from data using AI • Identifying unusual patterns in data • AI learns from rewards and penalties • Forecasting future trends using data • ...
Empires Crossword 2025-08-13
Across
- Major African export in regional and global trade networks.
- Southern African kingdom with strong indigenous traditions.
- Policy of limiting foreign contact and influence.
- Forced transport of enslaved Africans to the Americas.
- West African empire controlling trans-Saharan trade routes.
- Songhai city and center of trade and Islamic scholarship.
- Valued African export traded with Europe and Asia.
- Caravan trade route exchanging gold, salt, and goods.
- Powerful West African empire active in the Transatlantic Slave Trade.
- Religion founded in Punjab that challenged Mughal authority.
- East African trade network linking Africa, Arabia, and Asia.
- Central African kingdom that adopted Christianity.
- Muslim-ruled states in southern India before Mughal dominance.
Down
- Branch of Christianity practiced in Ethiopia.
- Coastal outposts in Africa and Asia for European trade.
- Warrior class of feudal Japan.
- Japanese military government enforcing a closed-country policy.
- Manchu-led dynasty, China’s last imperial house.
- Overland trade network connecting East Asia to the Mediterranean.
- Chinese dynasty known for expansion, trade, and cultural achievements.
- Belief system that attributes spiritual essence to natural objects.
- Indian empire blending Islamic and Hindu traditions.
- Islamic empire spanning Europe, Asia, and Africa, lasting into the 20th century.
- Songhai ruler who promoted Islam and expanded the empire.
- Military ruler of Japan with real political power.
25 Clues: Warrior class of feudal Japan. • Branch of Christianity practiced in Ethiopia. • Manchu-led dynasty, China’s last imperial house. • Policy of limiting foreign contact and influence. • Valued African export traded with Europe and Asia. • Military ruler of Japan with real political power. • Central African kingdom that adopted Christianity. • ...
COMPUTER 2025-01-13
Across
- Writing instructions that a computer can execute.
- Related to systems that run computer hardware.
- A global network of interconnected computers.
- Measures to protect computers and networks from attacks.
- The process of finding and fixing errors in code.
- A boundary for interaction between systems or humans and computers.
- An input device used to type text into a computer.
- A step-by-step procedure to solve a specific problem.
- The component that executes instructions in a computer.
- Connecting computers to share resources and information.
- Hardware that interacts with a computer, like printers or scanners.
Down
- Devices or media where digital data is saved.
- Related to non-natural intelligence developed by humans.
- Creating a virtual version of hardware, software, or resources.
- Programs and operating information used by a computer.
- A system designed to block unauthorized access to a network.
- A collection of organized data stored electronically.
- The physical components of a computer system.
- The process of converting data into a secure format.
- Software that converts code into machine language.
- Visual data generated and displayed by a computer.
- Hardware that stores data temporarily or permanently.
- A combination of hardware and software working together.
- The ability of machines to mimic human cognitive functions.
24 Clues: Devices or media where digital data is saved. • A global network of interconnected computers. • The physical components of a computer system. • Related to systems that run computer hardware. • Writing instructions that a computer can execute. • The process of finding and fixing errors in code. • Software that converts code into machine language. • ...
Security Crossword 2025-01-23
Across
- The process of managing updates for software applications and technologies.
- Intermediary server for network requests.
- Unauthorized data access incident.
- A firewall that monitors and filters traffic between a web application and the internet.
- Attempt to obtain sensitive information.
- Testing a system for vulnerabilities by simulating attacks.
- Algorithm for performing encryption or decryption.
- A collection of tools used by an attacker to maintain access to a system while hiding their presence.
- Strategies to identify and prevent unsafe or inappropriate sharing, transfer, or use of sensitive data.
Down
- Measures taken to protect the integrity and usability of networks.
- Running programs in a controlled environment to prevent them from affecting the host system.
- A formal document outlining how security measures are implemented within an organization.
- Protection measures applied to end-user devices like computers and mobile devices.
- A framework for managing digital certificates and public-key encryption.
- A systematic evaluation of the security of a company’s information system.
- An entity that issues digital certificates for secure communications.
- Protocol for establishing an encrypted link between a server and a client.
- Permissions granted to users regarding what they can do with resources on a system.
- A type of malware that replicates itself to spread to other computers without user intervention.
- Software that secretly collects user information.
20 Clues: Unauthorized data access incident. • Attempt to obtain sensitive information. • Intermediary server for network requests. • Software that secretly collects user information. • Algorithm for performing encryption or decryption. • Testing a system for vulnerabilities by simulating attacks. • Measures taken to protect the integrity and usability of networks. • ...
Unit 3 Vocab - On Track 2025-01-13
Across
- - Happening right away or very quickly.
- - Feeling very worried or in trouble, willing to do anything.
- - In the middle or halfway.
- - To go away or not be seen anymore.
- - Held tightly in place.
- - Words or actions that warn of harm or danger.
- - Locked up in prison.
- - Real, legal, or following the rules.
- - Facts or details about something.
- - A very smart or talented person.
- - To think again and maybe change your mind.
- - Fun or exciting experiences, sometimes risky.
- - So full that it spills over.
- - Special glasses to protect your eyes.
- - A secret word or code to open or use something.
Down
- - A deep understanding of something.
- - Not known or familiar.
- - Followed or found where something came from.
- - A planned activity or task.
- - A tool or machine made for a specific purpose.
- - To give something to help others.
- - To talk or work with other people.
- - Half awake and half asleep.
- - Breaking into computers or networks without permission.
- - An animal or person that hunts or hurts others.
- - Checking to make sure something is correct.
- - Being free from danger or harm.
- - Paying close attention to one thing.
- - Paying attention to avoid mistakes or harm.
29 Clues: - Locked up in prison. • - Not known or familiar. • - Held tightly in place. • - In the middle or halfway. • - A planned activity or task. • - Half awake and half asleep. • - So full that it spills over. • - Being free from danger or harm. • - A very smart or talented person. • - To give something to help others. • - Facts or details about something. • ...
ASEANAPOL Crossword Puzzle 2025-09-22
Across
- : The act of working together toward a common goal
- : Fundamental entitlements and freedoms of people
- : Working jointly, especially by sharing information or resources
- : Information especially secret or confidential used for strategic purposes
- : Crime that crosses digital networks
- : Formal agreement or rules governing behavior
- : International police organization
- : Association of Southeast Asian Nations
- : An area or part of the world
- : Countries that belong to a group
- : Capital city where many ASEANAPOL meetings are held
- : Teaching or preparing members in skills or knowledge
- : The carrying out of planned tasks or missions
- : Efforts to stop acts of terror
- : Official inquiries or probes
- : The action of transporting illegal goods or people
- : The legal authority to make decisions or judgments
Down
- : Material proof presented in legal cases
- : Abbreviation for ASEAN Police — ASEAN____
- : The systematic process of gathering, documenting, and using data in investigations
- : Illegally importing or exporting goods
- : State of being free from danger or threats
- : Relating to boundaries between countries
- : Efforts to stop bad things before they happen
- : A planned set of actions toward achieving something
- : Illegal drug production, distribution, or use
- : Across multiple nations
- : Ability, skills, or resources that allow action
- : Crime involving money-based wrongdoing
- : Large-scale criminal enterprises (plural)
30 Clues: : Across multiple nations • : An area or part of the world • : Official inquiries or probes • : Efforts to stop acts of terror • : Countries that belong to a group • : International police organization • : Crime that crosses digital networks • : Illegally importing or exporting goods • : Association of Southeast Asian Nations • : Crime involving money-based wrongdoing • ...
WWI Terms 2025-10-17
Across
- this was the assassin who killed the Austrian archduke
- strong level of patriotism
- the US president at the start of WWI
- calling young men into service (first used in 1917 for US troops)
- most of the fighting took place in these
- the development of and ramping up of weapons and troops
- a place that people could grow food to help the war effort
- _____________ note - a telegram sent by Germany to Mexico
- Britain, France, and Russia (and later the US) in WWI
- a piece of legislation that made it illegal to speak against the government or the War
Down
- these networks directly contributed to the start of WWI because countries were connected
- the British ocean liner sunk by German U-boats
- biased communication to the public
- the country that Germany went through to get to France
- a new weapon in WWI used to move troops and get over trenches
- chemical used in Europe in the trenches
- this man was assassinated and it sparked WWI
- a system that ensured people got enough food at home during the war
- large-scale movement or hundreds of thousands of southern African Americans to cities in the North.
- the system of empire and colonialism
- Germany, Austria-Hungary, and the Ottoman Empire
21 Clues: strong level of patriotism • biased communication to the public • the US president at the start of WWI • the system of empire and colonialism • chemical used in Europe in the trenches • most of the fighting took place in these • this man was assassinated and it sparked WWI • the British ocean liner sunk by German U-boats • Germany, Austria-Hungary, and the Ottoman Empire • ...
Putting It All Together 2025-12-19
Across
- | Strong networks of people who help reduce relapse risk
- | DBT skill focused on awareness
- | The body and this are interconnected
- | Exercise releases this natural brain chemical
- | Skill that involves fully hearing others
- | The brain’s ability to heal and rewire itself
- | Brain’s pleasure pathway altered by substances
- | Cravings rise and fall like these
- | Brain area responsible for decision-making and impulse control
- | Healthy relationships are built on trust, safety, and this
- | A sense of purpose or direction in life
- | Clear limits that protect recovery
- | Building a life worth protecting is the goal of this process
- | Communication style that is confident and respectful
Down
- | Macronutrient that supports brain repair
- | Long-term drive that values provide for recovery
- | Strong urges to use that come and go
- | Emotions are data, not these
- | Noticing without this is a DBT skill
- | Repairing relationships requires time and this
- | People, places, or things that activate old patterns
- | Balanced meals help stabilize mood and energy
- | These guide decisions and habits
- | Dehydration can feel like this or irritability
- | Recovery is more than stopping this
- | Brain system tied to emotions and survival
- | Risk that increases when supports are missing
- | Many people ask, “Who am I without substances?” This concept
- | This restores emotional regulation
29 Clues: | Emotions are data, not these • | DBT skill focused on awareness • | These guide decisions and habits • | Cravings rise and fall like these • | This restores emotional regulation • | Clear limits that protect recovery • | Recovery is more than stopping this • | Strong urges to use that come and go • | The body and this are interconnected • ...
Ethan Crossword 2025-12-08
Across
- : A security system that filters network traffic
- : A small unit of data sent across a network
- : A value passed into a function to customize its behavior
- : An error that occurs when a value exceeds the maximum amount storable
- : The quality, accuracy, trustworthiness, and reliability of data
- : A data type with only two values, true or false
- : A set of rules governing how data is transmitted on a network
- : Compression that reduces file size without losing any data
Down
- : A group of infected computers controlled by an attacker
- : A step-by-step procedure for solving a problem
- : A number system using only 0s and 1s
- : A 32-bit numerical addressing system for devices on the Internet
- : A tiny electronic switch used to represent bits in a computer
- : A character encoding system that represents text using numeric codes
- : The repeated execution of a set of instructions
- : The idea that transistor counts roughly double every two years
- : The maximum amount of data transferable per second
- : The delay it takes for data to travel over a network
- : A device that directs data packets between networks
- : Compression that removes some data to make a file smaller
- : A scam that tricks users into revealing personal information
21 Clues: : A number system using only 0s and 1s • : A small unit of data sent across a network • : A step-by-step procedure for solving a problem • : A security system that filters network traffic • : The repeated execution of a set of instructions • : A data type with only two values, true or false • : The maximum amount of data transferable per second • ...
Criminology Final 2021-01-14
Across
- What step in the criminal justice process involves capital punishment, probation and parole
- What type of police organization assigns officers to a particular role within a specialized unit
- A member of a fire department who tries to extinguish fires
- Deliberate and criminal starting of fires
Down
- The legal process where a judge reviews evidence and legal reasoning from opposing parties to determine their rights and obligations
- A cyberattack that redirects a website's traffic to a different fake website
- Which level of law enforcement has statewide authority to conduct law enforcement and criminal investigations
- A criminal act that involves theft, destruction of information, computer networks and the Internet
8 Clues: Deliberate and criminal starting of fires • A member of a fire department who tries to extinguish fires • A cyberattack that redirects a website's traffic to a different fake website • What step in the criminal justice process involves capital punishment, probation and parole • ...
Chapter 2 vocab 2022-08-30
Across
- repeatability of results
- describe the conditions of your study so that someone else can reproduce your findings.
- are networks of interdependent components and processes, with materials and energy flowing from one component of the system to another.
Down
- ability of system to recover from disturbance
- a severe disturbance in which the system does not return to normal but instead results in significant changes in some of its state variables
- the energy and matter that flow into, through, and out of a system.
- dynamic state in which system is stable over time (homeostasis)
- periodic destructive events such as fire or flood that destabilize or change the system.
8 Clues: repeatability of results • ability of system to recover from disturbance • dynamic state in which system is stable over time (homeostasis) • the energy and matter that flow into, through, and out of a system. • describe the conditions of your study so that someone else can reproduce your findings. • ...
Crossword Marwan 2024-04-17
Across
- is used to transmit data securely and anonymously over public networks.
- attack which consists of testing all possible password or key solutions.
- attack which consists of testing all the words in a list as a keyword
- a symmetric encryption algorithm (block cipher) using 56-bit keys
Down
- malware that infects your PC or mobile device and collects information
- The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
- a public-key cryptosystem, one of the oldest widely used for secure data transmission.
- attack that makes a server inaccessible in order to cause an outage
8 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keys • attack that makes a server inaccessible in order to cause an outage • attack which consists of testing all the words in a list as a keyword • malware that infects your PC or mobile device and collects information • is used to transmit data securely and anonymously over public networks. • ...
Types of Digital forensics 2023-08-08
Across
- Collecting evidence from computer networks or devices.
- It collects raw data from system memory (RAM, cache, and system registers).
- Deals with the inspection and evaluation of phones and smartphones and aids in retrieving contacts, call logs, incoming and outgoing SMS, and other available data.
- Focuses on researching and analyzing databases and the associated metadata.
Down
- Monitoring and examining computer network traffic.
- It is concerned with locating suspicious code and researching viruses, worms, etc.
- Emails, including deleted emails, calendars, and contacts, are discussed along with their recovery and analysis.
- Deals with locating active, updated, or deleted files in order to extract raw data from the device's primary or secondary storage.
8 Clues: Monitoring and examining computer network traffic. • Collecting evidence from computer networks or devices. • It collects raw data from system memory (RAM, cache, and system registers). • Focuses on researching and analyzing databases and the associated metadata. • It is concerned with locating suspicious code and researching viruses, worms, etc. • ...
Discovery 2025-03-24
Across
- The Internet is a series of computer _______ that connect with each other to allow the exchange of information.
- The space rover's mission was to ______ the surface of Mars.
- Explorers push their _______ sometimes for the benefit of all humankind.
- Some Sherpa people from Nepal work as guides helping climbers _______ up Mount Everest.
- Astronauts who go to the ISS, ________ into space from Baikonur Cosmodrome in Kazakhstan.
Down
- To prove her _____ , the scientist carried out research for five years.
- It requires a great deal of _______ for humans to spend any length of time in space.
- Sir Alexander Fleming's accidental discovery that penicillin kills bacteria was an important ______ in medicine.
8 Clues: The space rover's mission was to ______ the surface of Mars. • To prove her _____ , the scientist carried out research for five years. • Explorers push their _______ sometimes for the benefit of all humankind. • It requires a great deal of _______ for humans to spend any length of time in space. • ...
Introduction Technology 2025-08-01
Across
- A structured collection of data, typically stored electronically on a computer system, that can be easily accessed, managed, and updated.
- A display device that outputs visual information from a computer or other electronic system
- A global network that allows communication and access to information.
- Protecting computer systems and networks from unauthorized access or cyberattacks.
Down
- A piece of computer hardware that displays or produces the results of computer processing.
- Physical objects or machines designed for specific functions.
- Computer programs that provide instructions for hardware to operate.
- Refers to the act of putting something into a system or process, or the thing that is put in
8 Clues: Physical objects or machines designed for specific functions. • Computer programs that provide instructions for hardware to operate. • A global network that allows communication and access to information. • Protecting computer systems and networks from unauthorized access or cyberattacks. • ...
3rd 2023-05-17
Across
- What is the process of converting plain text into ciphertext called?
- What mobile operating system was developed by Google?
- What is the main printed circuit board (PCB) found in computers that holds many of the crucial components of the system?
Down
- What technology allows devices to connect to a network without using cables or wires?
- What type of malware is disguised as a legitimate software program?
- What do you call a group of interconnected computers and devices?
- What type of malware is capable of self-replicating and spreading across networks?
- In computer science, what is a structured set of data held in a computer, especially one that is accessible in various ways?
8 Clues: What mobile operating system was developed by Google? • What do you call a group of interconnected computers and devices? • What type of malware is disguised as a legitimate software program? • What is the process of converting plain text into ciphertext called? • What type of malware is capable of self-replicating and spreading across networks? • ...
Basics of Health Insurance 2020-12-10
Across
- A health insurance plan that provides integrated care and a potential for lower costs, but limits coverage to in-network providers.
- An upfront fee for insurance coverage.
- The official process of signing up for health insurance.
- Proof of insurance.
- The different types of health insurance options, made up of networks and benefits.
- A group of providers who have chosen to contract with the insurance company.
- The portion of medical and hospital expenses that are covered by insurance.
Down
- Amount a member is responsible for before insurance begins paying for health services.
- A contract or special arrangement in which a person pays a company to provide some sort of protection or reimbursement for monies paid or lost in regard to healthcare.
- The percentage of a bill a member must pay after the deductible is satisfied.
- A person or company that provides a healthcare service to individuals.
- A government sponsored health insurance plan that provides comprehensive coverage but has an age or disability requirement.
- Flat fee a member pays for medical services.
13 Clues: Proof of insurance. • An upfront fee for insurance coverage. • Flat fee a member pays for medical services. • The official process of signing up for health insurance. • A person or company that provides a healthcare service to individuals. • The portion of medical and hospital expenses that are covered by insurance. • ...
Business 4.1 2022-10-04
Across
- measure of quality of life using factors like life expectancy, literacy, access to clean water, income, etc.
- GDP divided by population
- Acronym for emerging economies including India
- The percentage of a country's people who can read and write
- the total market value of all final goods and services produced in an economy over a specific period of time
- Acronym for emerging economies including Indonesia
- electricity supply, rail/road networks & waste disposal facilities
- A good or service produced in the home country and sold in another country.
Down
- Value of each country's GDP is altered to take account of differences in the cost of living
- An investment into a country by a company from another country.
- Nations with business activity in the process of rapid growth and industrialization
- bring (goods or services) into a country from abroad for sale.
- dishonest or fraudulent conduct by those in power, typically involving bribery.
13 Clues: GDP divided by population • Acronym for emerging economies including India • Acronym for emerging economies including Indonesia • The percentage of a country's people who can read and write • bring (goods or services) into a country from abroad for sale. • An investment into a country by a company from another country. • ...
Key Internet Terms 2020-09-10
Across
- Unsolicited messages sent to large numbers of people via email for the purpose of commercial advertising or non commercial info
- A programming language used to create a web page and it stands for hypertext markup language
- An example of a web browser
- A set of documents on the Internet formatted in HTML
- An Internet service used to send and receive electronic letters
- one or more web pages that relate to a common theme, such as a person, business, organization or a subject, such as sports
Down
- An example of a search engine
- Sound, video, animation and 3D interactive video put together
- A program that is used to view web pages on the World Wide Web
- an electronic document written in a computer language called HTML (Hypertext Markup Language
- the address of a specific web site or file on the Internet that stands for Uniform Resource Locator
- A global system of interconnected computer networks
- A short term for internet service provider like xfinity,Verizon FIOS, Spectrum
13 Clues: An example of a web browser • An example of a search engine • A global system of interconnected computer networks • A set of documents on the Internet formatted in HTML • Sound, video, animation and 3D interactive video put together • A program that is used to view web pages on the World Wide Web • An Internet service used to send and receive electronic letters • ...
Basic Internet Terms 2020-09-10
Across
- Unsolicited messages sent to large numbers of people via email for the purpose of commercial advertising or non commercial info
- A programming language used to create a web page and it stands for hypertext markup language
- An example of a web browser
- A set of documents on the Internet formatted in HTML
- An Internet service used to send and receive electronic letters
- one or more web pages that relate to a common theme, such as a person, business, organization or a subject, such as sports
Down
- An example of a search engine
- Sound, video, animation and 3D interactive video put together
- A program that is used to view web pages on the World Wide Web
- an electronic document written in a computer language called HTML (Hypertext Markup Language
- the address of a specific web site or file on the Internet that stands for Uniform Resource Locator
- A global system of interconnected computer networks
- A short term for internet service provider like xfinity,Verizon FIOS, Spectrum
13 Clues: An example of a web browser • An example of a search engine • A global system of interconnected computer networks • A set of documents on the Internet formatted in HTML • Sound, video, animation and 3D interactive video put together • A program that is used to view web pages on the World Wide Web • An Internet service used to send and receive electronic letters • ...
CS Principles Review 2023-04-26
Across
- it is the maximum amount of data that can be sent in a fixed amount of time.
- a form of compression which removes all subtle colour variations
- process of finding a path from sender to receiver
- data about data
- a wireless access point that gives unauthorized access to secure networks(three words no spaces)
- a solution which is good enough
- why a certain thing or product was made
Down
- scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who Contribute relevant data to research using their own computing devices.(two words no spaces)
- the use of digital data to approximate real world things
- contain a chunk of data and _metadata__ used for routing the packet between the origin and the destination
- data have values that change smoothly, rather than in discrete intervals, over time.
- agreed-upon set of rules that specify the behavior of a system
- what something does
13 Clues: data about data • what something does • a solution which is good enough • why a certain thing or product was made • process of finding a path from sender to receiver • the use of digital data to approximate real world things • agreed-upon set of rules that specify the behavior of a system • a form of compression which removes all subtle colour variations • ...
Group and formal organization crossword 2025-09-25
Across
- one person does something for another, expects favor in return
- and predictability
- individuals forced to give in to the will of others; often expressed subtly through social pressure
- very efficient with dealing with the needs of industrial societies; promotion based on merit; cost efficient;
- help us evaluate ourselves and form identities; don’t necessarily have to be a member, only aspire to become member
- group toward which in-group members feel opposition, antagonism, or competition
Down
- Groups within a formal organization in which people are guided by norms and rituals
- individuals work against one another for larger share of rewards
- behavior that matches group expectations; allows for uniformity,
- difficulty of going against the decisions made by the group; exists when thinking in a group is self-deceptive; based on conformity to group beliefs; discourages members from expressing concern
- impersonal, people are treated like a number
- How much can you learn about someone just by identifying the groups and social networks they belong to?
- Composed of people who are close
- one person does something for another, expects favor in return
14 Clues: and predictability • Composed of people who are close • impersonal, people are treated like a number • one person does something for another, expects favor in return • one person does something for another, expects favor in return • individuals work against one another for larger share of rewards • behavior that matches group expectations; allows for uniformity, • ...
Modern HR 2026-03-06
Across
- The type of HRM that aligns human capital with long-term business goals.
- A model assessing if a graduate possesses the skills and attributes to be productive.
- A labor market characterized by short-term contracts and digital platform work.
- Independent workers who offer services to multiple clients rather than one employer.
- The process of defining how jobs are structured and the challenges of employee autonomy.
Down
- A major impact on the workforce when global hiring is restricted
- The political trend causing a reduction in international talent movement.
- The HR response to "reduced international movement" by training existing local staff.
- The early "Evolution of HRM" stage focused primarily on record-keeping.
- The expertise HR needs to navigate specific regional laws and cultural norms.
- Global networks now facing disruption and labor rights challenges due to shifting borders.
- A shift toward more localized and inward-looking economic policies.
- The type of HRM focused on day-to-day administrative tasks like payroll.
13 Clues: A major impact on the workforce when global hiring is restricted • A shift toward more localized and inward-looking economic policies. • The early "Evolution of HRM" stage focused primarily on record-keeping. • The type of HRM that aligns human capital with long-term business goals. • The type of HRM focused on day-to-day administrative tasks like payroll. • ...
Family 2024-10-14
Across
- living together in an intimate relationship without formal legal or religious sanctioning
- kin networks that extend outside or beyond the nuclear family
- familial form consisting of a father, a mother, and their children
- women's responsibility for housework and child care- everything from cooking dinner to doing laundry, bathing children, reading bedtime stories, and sewing Halloween costumes.
- marriage to someone outside one's social group
- the practice of having multiple husbands simultaneously
- marriage from within
- the practice of having multiple wives simultaneously
Down
- the notion that true womanhood centers on domestic responsibility and child-rearing
- the technical term for interracial marriage, literally meaning "a mixing of kinds"; it is politically and historically charged, and sociologists generally prefer the term exogamy or outmarriage.
- strings of relationships between people related by blood and co-residence (i.e., marriage)
- the practice of having more than one sexual partner or spouse at a time
- the practice of having only one sexual partner or spouse at a time
13 Clues: marriage from within • marriage to someone outside one's social group • the practice of having multiple wives simultaneously • the practice of having multiple husbands simultaneously • kin networks that extend outside or beyond the nuclear family • familial form consisting of a father, a mother, and their children • ...
English Activity 2021-11-04
Across
- the activity of promoting goods in order to try to sell them
- all the people who are about the same age
- using an electronic system that changes sounds or images into numbers before it stores or sends them
Down
- knowledge, equipment, and methods that are used in science and industrydigital digital
- a worldwide system of computer networks used to exchange information
5 Clues: all the people who are about the same age • the activity of promoting goods in order to try to sell them • a worldwide system of computer networks used to exchange information • knowledge, equipment, and methods that are used in science and industrydigital digital • ...
Networking concept 2 2025-05-23
Across
- connect two networks and make routing decisions — often mistaken for a switch.
- the silent guardian that decides what enters or leaves your network.
- ensure your messages don’t collide on a shared medium; I listen before I speak.
Down
- translate names like “google.com” into IP addresses so computers can understand.
- assign IP addresses dynamically on demand — who am I?
5 Clues: assign IP addresses dynamically on demand — who am I? • the silent guardian that decides what enters or leaves your network. • connect two networks and make routing decisions — often mistaken for a switch. • ensure your messages don’t collide on a shared medium; I listen before I speak. • ...
Beware, Become Cyber Aware! 2025-05-23
Across
- To imitate a legitimate sender’s address in order to trick you.
- The practice of protecting systems, networks, and data from digital threats.
Down
- To imitate a legitimate sender's email address in order to trick the recipient
- What you should do via a different communication channel when in doubt about a suspicious email
- ___________, Don't Delete: Best option for handling suspicious emails
5 Clues: To imitate a legitimate sender’s address in order to trick you. • ___________, Don't Delete: Best option for handling suspicious emails • The practice of protecting systems, networks, and data from digital threats. • To imitate a legitimate sender's email address in order to trick the recipient • ...
Brian Knowles Key Terms 2017-10-18
Across
- any device used to send data from a computer to another device
- completed partially or entirely by using a computer
- a portable computing device such as a smartphone or tablet computer
- a method of banking where transactions are conducted electronically
- a computer that is portable and suitable for use while traveling
- a camera that records and stores digital images
- expected to be transported during normal usage aka cellphone
- generally smaller than a briefcase that can easily be transported
- the software that supports a computer's basic functions
- person or thing that develops something
- appears on the recipient's screen as soon as it is transmitted
- a mobile phone incorporating a digital camera
- the single worldwide computer network that interconnects other networks
- a visual way of interacting with a computer using items such as windows
- an arrangement of intersecting horizontal and vertical lines
- include such things as database programs
- facts and statistics collected together for reference or analysis
- capable of transmitting an analog or digital signal
- a social media site to which a user makes short
- mobile electronic device designed to read digital e-books
- a piece of computer hardware equipment
- place or fix
- online platform which people use to build social networks
- a global computer network providing a variety of information
- a computer designed for use by one person at a time
Down
- the environmentally responsible and eco-friendly use of computers
- computer software used to satisfy the needs of an organization
- a palmtop computer that acts as a personal organizer and provides email or Internet access
- designed primarily for accessing Internet-based applications
- a process by which individual investors and traders buy and sell securities online
- a list of questions and answers relating to a particular subject
- tools, machinery
- A person traveling with a smartphone
- the central processing unit and primary memory of a computer
- personal computer that fits on or under a desk
- controlled by or connected to another computer or to a network
- dedicated function within a larger mechanical or electrical system
- run by an individual or small group
- brain of the computer
- an electronic version of a printed book that can be read on a computer
- is the ability to use computers and related technology efficiently
- the faculty by which the mind stores and remembers information
- ability to use information and communication technologies to find
- in any manner detectable by an observer
- that can conveniently be stored in a pocket
- A specialized desktop computer used to play video games
- facts provided or learned about something
- encompasses all the various types of enterprise software
- carry out or put into effect
- the process or state of converging
- a family member that uses a computer
51 Clues: place or fix • tools, machinery • brain of the computer • carry out or put into effect • the process or state of converging • run by an individual or small group • A person traveling with a smartphone • a family member that uses a computer • a piece of computer hardware equipment • person or thing that develops something • in any manner detectable by an observer • ...
information security 2018-05-17
Across
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- All malicious software, including viruses, Trojan horses, and worms
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Property of accuracy and completeness
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- A string of characters that allows access to a computer, interface, or system.
Down
- The fear of being without a mobile device, or beyond mobile phone contact
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A humorous or malicious deception
- the ability to control information about oneself
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- An autonomous and malicious software program propagating among computer networks
- The person that a software program or hardware device is designed for.
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Measure of the criticality of a situation--the likelihood of something being attacked
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
information security 2018-05-17
Across
- A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- A humorous or malicious deception
- Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- The person that a software program or hardware device is designed for.
- Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- Property of being accessible and usable on demand by an authorized entity
- Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- Potential cause of an unwanted incident, which can result in harm to a system or organization
- The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- An autonomous and malicious software program propagating among computer networks
Down
- Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- Property of accuracy and completeness
- the ability to control information about oneself
- The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- All malicious software, including viruses, Trojan horses, and worms
- A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- The fear of being without a mobile device, or beyond mobile phone contact
- Measure of the criticality of a situation--the likelihood of something being attacked
- A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- A software that detects and cleans comp
- A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- A string of characters that allows access to a computer, interface, or system.
28 Clues: A humorous or malicious deception • Property of accuracy and completeness • A software that detects and cleans comp • the ability to control information about oneself • All malicious software, including viruses, Trojan horses, and worms • The person that a software program or hardware device is designed for. • ...
Chapter 3; Network Topologies and Technologies 2025-03-08
Across
- 100 Mbps Ethernet using baseband signaling that runs Category 5+ UTP cabling using two of four wire pairs. It is the most commonly used Ethernet variety.
- The weakening of a signal as it travels across network media
- ____ ratio; A ratio that measures the amount of valid signal compared with the amount of noise in a network transmission.
- Carrier Sense Multiple Access with Collison____; An access control method used by Wi-Fi networks in which an acknowledgement is required for every packet sent to avoid most possibilities of collision.
- (MU) MIMO; a technology that uses a process called ‘beamforming’ to send data to multiple clients simultaneously
- ____ topology; The path that data travels between computers on a network. The most common logical topologies are switched, bus, and ring.
- extended ____ topology;
- __ __ mode; A wireless mode of operation typically used in small or temporary installations. There’s no central device, so the data travels through one device to another to reach the destination.
Down
- A type of signaling where each bit of data is represented by a pulse of electricity or light that takes over the medium’s entire bandwidth. Common to LAN technologies.
- 100 Mbps Ethernet using baseband signaling over two strands of fiber-optic cabling.
- 10 Gigabit ethernet using baseband signaling that runs over four pairs of Category 6a UTP cabling
- point-to-____ topology; a topology in which a central device communicates with two for more other devices, with all communication going through the central device. It’s often used in WANs.
- The result of electricity bouncing off the end of a cable and back in the other direction. It causes corruption of data as the bouncing signal collides with signals behind it
- Cyclic ____ Check; The error-checking code in an Ethernet frame’s trailer that is calculated pre and post-departure; if the calculation on the destination device doesnt match the calculation in the frame, it indicates the data was altered.
- A type of signaling that moves data through mediums in waves rather than discrete pulses of electricity. Particular frequencies represent a ‘channel’ of data which allows them to stack and carry multiple streams of data on a single wire.
- the amount of information in a network transmission that isn’t part of the application data. This could include headers, acknowledgements, and retransmissions.
- ____ mode; An operational mode for Wi-fi networks in which wireless stations connect through a wireless access point before they can begin communicating with other devices.
- The actual application-to-application speed data transfer speed
- The result of two or more devices on the same medium transmitting simultaneously when CSMA/CD is the media access method in use.
- ____ topology; A network topology in which each device is connected to every other device, providing multiple pathways in the event of a device or cable failure.
20 Clues: extended ____ topology; • The weakening of a signal as it travels across network media • The actual application-to-application speed data transfer speed • 100 Mbps Ethernet using baseband signaling over two strands of fiber-optic cabling. • 10 Gigabit ethernet using baseband signaling that runs over four pairs of Category 6a UTP cabling • ...
Y11/12 CompSci AS Level Review 2025-01-06
Across
- Collections of pre-written code that can be used by other programs.
- Software whose source code is publicly available and can be modified.
- A logical operation that returns true if the inputs are different.
- A part of an instruction that specifies the operation to be performed.
- A network topology that combines elements of multiple topologies.
- Temporary storage areas used to hold data while it is being transferred.
- A type of storage medium that uses magnetism to store data.
- A unique hardware address used to identify network devices.
- A part of the CPU responsible for performing arithmetic and logical operations.
- Another term for the decimal number system.
- A feature of an IDE where it formats the code or data to make it more readable.
- A method for error detection in data transmission using parity bits.
- Legal protection granted to the creators of original works.
- A network of remote servers used to store and manage data online.
- Software designed to help manage and tune computer resources.
- Self-replicating malicious software that spreads across networks without user intervention.
- A cryptographic method used to verify the authenticity of digital messages.
- The practice of dividing a network into smaller, more manageable sub-networks.
- Software that is available for use at no cost.
- The part of the CPU that directs operations within the computer.
Down
- the Vonn Neumann Cycle.
- Malicious software disguised as legitimate software to deceive users.
- Legal rights to creations of the mind, such as inventions and trademarks.
- A type of data compression where some data is lost to reduce size.
- A storage technology that uses light to read and write data, such as CDs and DVDs.
- A cyber attack where multiple systems overwhelm a target with traffic.
- Software that is distributed for free with the option to purchase after a trial period.
- The process of ensuring that input data is correct and reasonable.
- A communication system where data can flow in both directions simultaneously.
- Small, fast storage locations within a CPU used to store data temporarily.
- The process of checking that a system or product meets specified requirements.
- (Duplicate) Another term for the decimal number system.
- The process of tracking the status or performance of a system.
- Malicious software that replicates itself and spreads to other computers.
- Signals that halt the current process to handle a different task.
- A method of addressing memory directly by its exact location.
- A storage technology that uses flash memory instead of mechanical parts.
- A register that holds the address of the next instruction to be executed.
- The most recent version of the Internet Protocol addressing scheme.
- A software tool used for writing and testing code.
- A company that provides access to the internet.
- A protocol and address of your network
- A method of addressing memory by adding an index to a base address.
43 Clues: the Vonn Neumann Cycle. • A protocol and address of your network • Another term for the decimal number system. • Software that is available for use at no cost. • A company that provides access to the internet. • A software tool used for writing and testing code. • (Duplicate) Another term for the decimal number system. • ...
Engineering Tech Crossword 2025-04-30
Across
- The core part of an operating system that manages system resources.
- Measures taken to protect computers and networks from unauthorized access.
- The server-side logic and database layer of a software application.
- A set of rules for data communication over a network.
- The standard language for creating web pages.
- Network of physical objects embedded with sensors and software.
- A device that converts digital signals for internet transmission over telephone lines.
- Temporary storage that speeds up access to frequently used data.
- A set of practices combining development and IT operations.
- A tiny semiconductor used to perform specific functions in electronics.
- The main circuit board that connects all components in a computer.
- Permanent software programmed into hardware devices.
- Information that can be processed or analyzed by a computer.
- The data transfer capacity of a network connection.
- Number system consisting only of 0s and 1s.
- Technology that creates virtual versions of hardware, servers, or operating systems.
- A complete path through which electric current flows.
- The physical components of a computer or electronic system.
- A version control system for tracking code changes in software development.
- A device that detects and responds to physical inputs like heat or motion.
- A professional who designs, builds, and tests technological systems.
- The process of converting data into a secure, unreadable format.
- Technology that performs tasks with minimal human input.
Down
- A processor designed to accelerate graphics rendering.
- A collection of connected computers or devices that share resources.
- A command-line interface used to interact with a computer system.
- A wired network protocol commonly used in local area networks (LANs).
- A set of integrated circuits that manage data flow between components.
- A secure, distributed ledger system used for tracking digital transactions.
- A program that translates code from high-level to machine language.
- The arrangement of components or settings within a system.
- A remote-controlled or autonomous flying device.
- A lightweight, portable unit that packages software and its dependencies.
- A storage location for code and project files, often managed by version control.
- The number of bits processed per unit of time, often in streaming.
- A device or software that distributes network traffic across multiple servers.
- A versatile, object-oriented programming language used in many applications.
- The point of interaction between hardware, software, or users.
- Internet-based services for data storage, computing, and software delivery.
- To identify and fix bugs or errors in a program.
- Interface allowing different software applications to communicate with each other.
- A precise set of rules or instructions for solving a computational problem.
- A beginner-friendly, high-level programming language with readable syntax.
- A file containing code written to automate tasks.
- Central Processing Unit; executes instructions in a computer.
45 Clues: Number system consisting only of 0s and 1s. • The standard language for creating web pages. • A remote-controlled or autonomous flying device. • To identify and fix bugs or errors in a program. • A file containing code written to automate tasks. • The data transfer capacity of a network connection. • Permanent software programmed into hardware devices. • ...
COSC 100 2016-02-15
Across
- Display of HTML tags found on the World Wide Web
- Sending and receiving occur at different times
- Tool used for making slideshows that include pictures, video, music, and so on
- Known as local area network or when computers are geographically close
- Web servers and their files (WWW)
- Composed of HTML tags and multimedia files
- Using about half the words as the control condition
- Software that allows you to create a web page with only text
Down
- Sender and receiver are active at the same time
- Pictures, movies, graphics, etc. embedded in a web page
- Using neutral rather than subjective, boastful, or exaggerated language
- The main technology for local area networks, also used for connecting all the computers in a lab or building
- Gaining unauthorized access/data to a website or system
- The codes or tags that browsers use to create web pages
- The idea certain short files or media can be used without permission or payment from the holder
- False identifying yourself
- A site designed to read and write through the use of digital storytelling
- Legal right or permission to publish, use, perform, etc. another's material
- Areas to store memory to speed up the process of retrievals
- A group of information on a computer that can be software programs or data
20 Clues: False identifying yourself • Web servers and their files (WWW) • Composed of HTML tags and multimedia files • Sending and receiving occur at different times • Sender and receiver are active at the same time • Display of HTML tags found on the World Wide Web • Using about half the words as the control condition • Pictures, movies, graphics, etc. embedded in a web page • ...
Networking Review 2016-11-22
Across
- server used to authenticate based on user profile database
- layer of the OSI model IPsec operates in
- programmers develop these to fix any problems after a release
- requires private key and public key pairs
- relies on tickets to grant access to resources
- encapsulating one protocol within another
- computer controlled by third party
- virus that affects both the boot sector & files
- a network where only authorized users have access to the data
- attacker simply drives around scanning for networks
- standard allows you to create a private network on intranet
Down
- actively replicates itself without intervention
- uses two databases and TCP to authenticate users
- VPN protocol created by Microsoft
- acronym for Data Encryption Standard & type of public key encrypt
- hacker can use to intercept traffic on your network
- attack that prevents users from accessing the system
- authentication, authorization and ______
- defines the appropriate response to a security event
- people try to call or email for personal information
- process that encodes and decodes data
- type of antivirus scan even with no definition for it
- outdated and compromised security mechanism
- minimum length of passwords
- how often you should update antivirus software
- wireless access point installed without your knowledge
26 Clues: minimum length of passwords • VPN protocol created by Microsoft • computer controlled by third party • process that encodes and decodes data • layer of the OSI model IPsec operates in • authentication, authorization and ______ • requires private key and public key pairs • encapsulating one protocol within another • outdated and compromised security mechanism • ...
Colonizing in America 2017-05-20
Across
- The colony in Pennsylvania was founded for religious freedom for ________.
- Name of the King at the time of the Colonization era.
- Colonists in the 13 Colonies came from this country.
- Mother country gets rich at expense of colonies.
- The first English colony (lost colony).
- Document written in 1620.
- Fundamental Orders of __________.
- Another name for the Middle Colonies.
- This person was kicked out of Massachusetts and then went to Rhode Island.
- This person led the First Great Awakening.
- First permanent colony in America.
Down
- The New England Colonies did ________ farming.
- Africa and the Colonies traded ______ in the Middle Passage.
- Southern’s cash crops were tobacco, rice, indigo, and ______.
- Founder of Rhode Island.
- Published “Poor Richard’s Almanack" (famous colonial person).
- The New England, Middle, and Southern colonies all did ____ _________ with little government control.
- Trading networks between England, the Colonies, and Africa.
- The people from Plymouth moved to America for ________ _______.
- Founder of Virginia.
- Founder of New York and Delaware.
- This person helped to establish the idea of freedom of the press.
- These religious people lived in Maryland.
- Plantation owners first used ________ servants and then slaves for their labor force.
- Formed as a debtor colony and buffer zone between Spanish Florida and English colonies.
25 Clues: Founder of Virginia. • Founder of Rhode Island. • Document written in 1620. • Fundamental Orders of __________. • Founder of New York and Delaware. • First permanent colony in America. • Another name for the Middle Colonies. • The first English colony (lost colony). • These religious people lived in Maryland. • This person led the First Great Awakening. • ...
The Effects of ICT 2013-03-20
Across
- Books which can be accessed electronicaly.
- The use of machines to make a job more efficient.
- The vision of an office without the use of any paper instead, replying on computers.
- The negative view of ICT.
- People which create software for computers.
- These people create and update websites.
- These people use CAD software rather than pencil and paper on a drawing board.
- These people maintain and control large networks in companies.
- automated computer systems have replaced ___ exchange as it does not require any man power or skill.
- The introduction of ATMs have significantly reduced the number of these people.
- When one works away from an everyday office, eg: at home.
Down
- The positive view of ICT.
- ___ have been replaced by computers who can organise files virtually.
- The layout for a large amount of people typign the same document.
- A small CPU piece built into a single UI chip used in a computer.
- These people design and make new high-tech computer parts.
- To reduce the time needed to do a process while maintaining minimum costs.
- ___ work can now be done online as there are online stores such as amazon or ebay.
- e-books and online libraries have repleaced ___ work.
- These people are responsible for creating new ICT systems.
20 Clues: The positive view of ICT. • The negative view of ICT. • These people create and update websites. • Books which can be accessed electronicaly. • People which create software for computers. • The use of machines to make a job more efficient. • e-books and online libraries have repleaced ___ work. • When one works away from an everyday office, eg: at home. • ...
Internet Business Associate 2013-02-19
Across
- A public key encryption algorithm
- Data processed by protocols so it can be sent across a network
- A set of instructions or rules
- A machine that shares its resources among clients
- A computing paradigm in which users can use software over the Internet
- a concept or collection of symbols associated with a product, service or person
- A web page that integrates content and scripts from multiple web sites to create new applications
- A server that mediates traffic between a protected network and the Internet.
- A web... who creates the overview plan of a sites development
- A measurement of memory needed to store one 8 bit character
- A worldwide network of interconnected networks
- A system that maps uniquely hierarchical names to specific Internet addresses
Down
- An encrypted file transfer protocol
- Outgoing mail server
- A Web 2.0 programming language that consists of existing technologies
- Modulator Demodulator
- The practice of categorizing online content through tags
- Encrypting and decrypting email messages
- A problem solving model in which a task is given to a group of people rather than one.
- The integration of telephony and data technologies
- An individual computer on a network
- a computing language used to program Web 1.0
- A circuit board that enables a computer to connect to a network
23 Clues: Outgoing mail server • Modulator Demodulator • A set of instructions or rules • A public key encryption algorithm • An encrypted file transfer protocol • An individual computer on a network • Encrypting and decrypting email messages • a computing language used to program Web 1.0 • A worldwide network of interconnected networks • ...
Careers 2014-05-01
Across
- Alleviates pain and stress using touch.
- Works independently of physicians when treating patients. Income about $89,960.00
- Helps patients with physical, mental, and developmental disabilities to assimilate into society.
- - Competition strong. Assists attorneys with research and clients.
- Patience and problem solving skills with weddings and conventions.
- Plays middleman between two married people, with problems.
- Assists veterinarian with animals in office and surgery.
- Works under doctor's supervision. Income about $62,430-$124,770.00
- Plant trees and shrubs. Maintains and designs landscape
- Sells health, auto, and life insurance
Down
- Rewrites, debugs, and maintains software.Income about $78.000.00
- Skin care specialist
- Hardest job on construction site. Plans, budgets, and oversees project.
- developer May design computer software games such as Candy Crush.
- Monitors security of computer networks for companies and government.
- Advises clients on food and nutrition. Income about $56,000.00
- Helps patients regain strength.
- Essential professionals installs, inspects, and repairs pipes.
- Cleans teeth.
- Interpretes language in schools and courtrooms.
- 8.6% employment growth in repairing and maintaining cars.
- Assists clients with finding real property
- Investigates causes of diseases, researches ways to prevent spread. $65,000.0
- - Responsible for cutting and installing glasswork on buildings.
- Industry made 7.4 billion dollars in 2012 by painting these.
- - Designs office buildings and libraries.
26 Clues: Cleans teeth. • Skin care specialist • Helps patients regain strength. • Sells health, auto, and life insurance • Alleviates pain and stress using touch. • - Designs office buildings and libraries. • Assists clients with finding real property • Interpretes language in schools and courtrooms. • Assists veterinarian with animals in office and surgery. • ...
ouiaklon 2014-02-19
Across
- Domain Name System.
- a code system using The binary digits 0 and 1 to represent a letter.
- A program with a graphical user interface.
- A string of numbers separated by periods.
- The practice of using the network of remote servers.
- a set of computer instructions in firmware that control input and output operations.
- Something inserted on to a rom chip can only be read, not removed.
- A group of people or things.
- A collection of items.
- Denoting software.
- Rigid, Slotted board were parts connect.
- A website's own style.
- The number of bits used to encode a single character of text.
- In a network.
Down
- The program and other operating information.
- A system that responds to requests acrossed a computer network.
- Random Access memory.
- The software that supports a computers info.
- Small enough to fit on a desk.
- port Universal serial bus.
- The host of a web page.
- Central Processing Unit.
- A device.
- A small piece of data sent from a website.
- A computer network consisting of worldwide networks of computer.
- The mechanical, magnetic, electronic, on your computer.
- A disk drive containing a hard disk.
- To load the first piece of software that starts a computer.
- Internet Service provider.
29 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • port Universal serial bus. • Internet Service provider. • A group of people or things. • Small enough to fit on a desk. • A disk drive containing a hard disk. • ...
Computer Vocab Crossword. 2014-02-19
Across
- A program with a graphical user interface.
- Something inserted on to a rom chip can only be read, not removed.
- The practice of using the network of remote servers.
- To load the first piece of software that starts a computer.
- In a network.
- A website's own style.
- Domain Name System.
- Central Processing Unit.
- The program and other operating information.
- A string of numbers separated by periods.
- Denoting software.
- a set of computer instructions in firmware that control input and output operations.
Down
- Internet Service provider.
- a code system using The binary digits 0 and 1 to represent a letter.
- The mechanical, magnetic, electronic, on your computer.
- Rigid, Slotted board were parts connect.
- A collection of items.
- The software that supports a computers info.
- A device.
- A group of people or things.
- The host of a web page.
- The number of bits used to encode a single character of text.
- Small enough to fit on a desk.
- A computer network consisting of worldwide networks of computer.
- A disk drive containing a hard disk.
- A small piece of data sent from a website.
- A system that responds to requests acrossed a computer network.
- Random Access memory.
- port Universal serial bus.
29 Clues: A device. • In a network. • Denoting software. • Domain Name System. • Random Access memory. • A collection of items. • A website's own style. • The host of a web page. • Central Processing Unit. • Internet Service provider. • port Universal serial bus. • A group of people or things. • Small enough to fit on a desk. • A disk drive containing a hard disk. • ...
Programming Crossword 2014-11-05
Across
- a step by step procedure for calculations
- a global system of interconnected computer networks that are linked several billion devices worldwide.
- Cascading Style Sheet, a language used for describing look and format of a document written in markup language
- a simplified programming language
- Hypertext Markup Language a standardized system to achieve Special Effects on World Wide Web pages
- Putting a plan into action
- a system of interlinked hypertext documents that are accessed via the Internet, they can be accessed from your computer via Web Browser
- Software Development Life Cycle
- Used for Android Operating System and allows web plug-ins
- A high level server side for websites and mobile apps, easy for beginners to understand
Down
- a program used to write coding for Java and other programming languages
- How a computer performs instructions
- a personal computer
- a framework created by Microsoft that typically runs on windows it is the easiest way to build Apps
- Circuit board that allows the hardware of a PC to communicate
- Random Access Memory used by the system to store data
- graphical representation of a computer program
- a data type which represents some finite subset of the mathematical integers,
- How programmers solve problems
- Used for both Web-Based and GUI-Based Applications
20 Clues: a personal computer • Putting a plan into action • How programmers solve problems • Software Development Life Cycle • a simplified programming language • How a computer performs instructions • a step by step procedure for calculations • graphical representation of a computer program • Used for both Web-Based and GUI-Based Applications • ...
Introduction to Programming (Michael Spoehr) 2014-11-05
Across
- - an object-oriented programming language that has been around since 1983.
- - translates human-readable source code into executable machine code.
- - Computers store data in ones and ___________
- - An IDE that supports many languages, including Java, C++, and HTML, that is sponsored by oracle.
- - code that is written to explain how a program works, not to be interpreted by a computer.
- - the most basic unit of information in computing
- - one of the world's first operational packet switching networks, and the first to implement TCP/IP.
- - One reason the .NET Framework is used is to create some ____________ across devices
- - programming language developed by oracle
- - one of the initial steps in computer programming
- - the process of removing bugs from code
- - webpages are written in this language.
Down
- - A popular IDE for C# and Java
- - The .NET Framework was created by _________
- - the most important step in computer programming
- - an object-oriented programming language developed by Microsoft.
- - translates a web address (like www.example.com) into an IP address.
- - IDE Stands for ___________ Development Environment
- - an internet connected computer that sends web pages to other computers
- - a process or set of rules to be followed in calculations or other problem-solving operations
- - this language is used to style webpages.
21 Clues: - A popular IDE for C# and Java • - the process of removing bugs from code • - webpages are written in this language. • - this language is used to style webpages. • - programming language developed by oracle • - The .NET Framework was created by _________ • - Computers store data in ones and ___________ • - the most important step in computer programming • ...
CTDI Fun Facts 2015-01-23
Across
- Don Parsons' wife.
- This customer recently purchased Time Warner Cable.
- Mascot of the university Leo Parsons attended.
- One of this division's responsibilities is material staging, kitting, turn-up and testing.
- European headquarters is located in this country.
- This Parsons family member has an MBA from Villanova University.
- Number of Parsons family members currently employed.
- Don Parsons was an engineer at this company for 27 years before creating CTDI in his garage.
- ____ Engineering, Repair and Logistics.
- Since 2009, cable companies moved channels to this format.
Down
- City in which the global headquarters is located today.
- Last name of first non-Parsons employee hired at CTDI.
- Electronic Tracking Ordering System.
- This division is responsible for our wireless, wireline, routers and gateways, CPE and tablets, cellsites, data networks, switching, optical broadband and DSL, enterprise and transport
- Wireless division usess this device to test up to 10 tablets at a time using CTDI developed Apps.
- Latest division to join CTDI.
- CTDI moved to this location in 1976.
- This saint is also celebrated on the anniversary of CTDI.
- ____ Road (Street where the "CTDI" garage is located)
- Last name of the first engineer hired at CTDI.
- Number of months spent in the garage creating CTDI prior to moving to the basement of a building nearby.
21 Clues: Don Parsons' wife. • Latest division to join CTDI. • Electronic Tracking Ordering System. • CTDI moved to this location in 1976. • ____ Engineering, Repair and Logistics. • Mascot of the university Leo Parsons attended. • Last name of the first engineer hired at CTDI. • European headquarters is located in this country. • This customer recently purchased Time Warner Cable. • ...
Nervous System 2021-09-24
Across
- nerve networks formed from merging of anterior rami with one or more adjacent anterior rami
- transmits impulses to skeletal muscle
- fine filament of connective tissue that extends from conus medullaris
- thin, intermediate layer surrounding brain and spinal cord
- innervates organs and conveys visceral efferent and afferent fibers to and from organs of the body cavities
- saw tooth like fibrous sheets of pia
- outer layer of dura mater formed by periosteum covering internal surface of calvaria
- in or on wall of target organ
- delicate, internal layer surrounding brain and spinal cord
Down
- contains cell bodies of sensory neurons
- tapered inferior end of spinal cord located at L1/L2 vertebral level
- bundle of nerve roots of spinal nerves caudal to L2 vertebra
- enlargement of the subarachnoid space in the dural sac caudal to conus medullaris
- dural infolding between the cerebral hemispheres
- partial partitions of dura between parts of the brain providing support
- tough, thick, external fibrous layer surrounding brain and spinal cord
- dural infolding between the hemispheres of the cerebellum
- dural infolding superior to the cerebellum
- includes sympathetic and parasympathetic divisions
- inner layer of dura mater, strong fibrous membrane continuous at the foramen magnum with dura mater covering spinal cord
20 Clues: in or on wall of target organ • saw tooth like fibrous sheets of pia • transmits impulses to skeletal muscle • contains cell bodies of sensory neurons • dural infolding superior to the cerebellum • dural infolding between the cerebral hemispheres • includes sympathetic and parasympathetic divisions • dural infolding between the hemispheres of the cerebellum • ...
Unit 2/3 Test Review 2021-10-07
Across
- In 1984 _____ introduced the first OS with icons and windows.
- Last name of the man who developed the first computer mouse.
- Moral standards or values
- The program used to find a view web pages.
- A network in close proximity
- A group of 8 bits.
- This feature allows users to comb the internet to find something in particular.
- The abbreviation/name of the first computer built in 1946.
- _____+F allows users to search on a single webpage to find desired text.
- Claiming someone else's work as your own.
- This professor stated computing power doubles approx. every 2 years.
- When one computer/device is connected to another a ____ is created.
- Computers use these to prevent unauthorized network access.
Down
- Pretending to be someone else to open accounts/spend money
- The results of your search are called:
- A group of 1000/1024 bits.
- Powerful computers that host the files found on the internet.
- An message that is unsolicited and often sent to many recipients.
- This lead to rapid computer development in the 1960's.
- The proper name for a link to another webpage.
- We use Windows/File ____ in Windows OS to view/manage files.
- A combination of computer networks that spans the Earth.
- A network covering a large area
23 Clues: A group of 8 bits. • Moral standards or values • A group of 1000/1024 bits. • A network in close proximity • A network covering a large area • The results of your search are called: • Claiming someone else's work as your own. • The program used to find a view web pages. • The proper name for a link to another webpage. • This lead to rapid computer development in the 1960's. • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
