networks Crossword Puzzles
Units 5, 6, 10 & 11 2020-09-29
Across
- The exact web address.
- The basic unit in computing.
- ______ + F lets you search for keywords on webpages.
- The powerful computers that store the information presented online.
- The rush that lead to rapid computer development.
- The global combination of computer networks.
- _____ the first name of the man who invented the computer mouse in 1963.
- A grouping of 8 bits.
- The results of a search are called ____.
- _____byte is a group of 1000B
- _____byte is a group of 1000KB
- The first computer, built in 1946.
- This important tech company was founded in 1977.
- The .com/.edu at the end of a web address.
- HDMI High Definition Multimedia _______.
- These are used to store digital information.
Down
- ______ Serial Bus - The 'U' in USB.
- Digital _____ Interface DVI
- This professor stated that computing power doubles approximately every two years.
- The forefather to the laptop, the ____ was first invented in 1983.
- These are used to manage and organize files.
- The exact location of data.
- Video Graphics _______ VGA
- This web browser feature lets you see previously viewed sites
- The 'general' location for stored digital information
- 'Smaller' networks
- This tech company was a precursor to Windows computers established in 1981.
- Common internal storage device.
- Windows _____ is the program used to manage files and folders.
- The programming language using bits.
- This is software used to prevent unauthorized computer access through networks.
- ________ Component Interconnect PCI
32 Clues: 'Smaller' networks • A grouping of 8 bits. • The exact web address. • The exact location of data. • Video Graphics _______ VGA • Digital _____ Interface DVI • The basic unit in computing. • _____byte is a group of 1000B • _____byte is a group of 1000KB • Common internal storage device. • The first computer, built in 1946. • ______ Serial Bus - The 'U' in USB. • ...
fgdg 2024-07-10
9 Clues: Different uses of 5G. • Setting up 5G networks. • Working with others on 5G. • The time delay in a network. • 5G improves device ________. • 5G improves wireless ________. • India is studying 5G ________. • 5G offers faster data ________. • India's contribution to new ideas in 5G.
B.Busch 2023-01-03
Across
- connects network
- device is implemented in inline mode
- no longer supported but still used
- access points provide network access to wireless devices
- in a usb form factor
- receive data from one port then send it out to all other ports
- divide LANs into segments
- responsible for monitoring all end devices in your network
- called power line networking
Down
- connects to Ethernet networks
- used to connect to 802.11 networks
- provides additional security such as vpns and zero day protection
- method of powering devices
- passively monitor traffic on a network
- bridges and hubs are now legacy devices because of
- a place to collect incoming cable runs
- protects data on a network from unauthorized access
- allows network administrators to mange network devices
- extend the distance a signal can travel
19 Clues: connects network • in a usb form factor • divide LANs into segments • method of powering devices • called power line networking • connects to Ethernet networks • used to connect to 802.11 networks • no longer supported but still used • device is implemented in inline mode • passively monitor traffic on a network • a place to collect incoming cable runs • ...
Electronics 2022-06-30
Internet of Things 2024-09-07
Across
- disadvantage of the usage of the internet
- device that become one of the more obvious advantages of the IoT
- manage energy consumption
- advantage of Internet of Things
- coined the phrase “Internet of Things” in 1999
- physical objects
- computer system designed for long-distance data transmissions
- device used to extend network range by receiving a digital signal and re-transmitting it
- specification deployed internally to enable IoT and M2M, intended for carrier networks of wireless, battery-operated things
Down
- Ring doorbell was developed in 2011
- important communications tool
- wireless technology that specializes in short-range communication
- utilizing devices constructed
- used by utility companies to collect information about energy consumption
- shared network
- can keep track of vital signs
- low-power, low-data rate wireless network
- device that measures a physical quantity and converts it into a 'signal'
- Large volumes of information
- provides access to external packet data networks
20 Clues: shared network • physical objects • manage energy consumption • Large volumes of information • important communications tool • utilizing devices constructed • can keep track of vital signs • advantage of Internet of Things • Ring doorbell was developed in 2011 • disadvantage of the usage of the internet • low-power, low-data rate wireless network • ...
Networks A*-B 2013-02-17
Across
- Bunch of devices connected together.
- Network / Too many stops for this network topology.
- The C in CAN.
- Remotely linked devices.
- The I in NIC
- Resources / One of the benefits of having a network.
- Joins networks together.
Down
- A device connected to a network.
- Fancy name for a network layout.
- Amalgamation of technologies in one device.
- Not a hub, this one is nosey.
- This access point prefers radio.
- Devices confined to one area.
- Information sent down a network.
14 Clues: The I in NIC • The C in CAN. • Remotely linked devices. • Joins networks together. • Not a hub, this one is nosey. • Devices confined to one area. • A device connected to a network. • Fancy name for a network layout. • This access point prefers radio. • Information sent down a network. • Bunch of devices connected together. • Amalgamation of technologies in one device. • ...
HARASSMENT 2023-03-19
15 Clues: / banc • /isoler • / laine • / claque • / mordre • / menacer • / blesser • / pirater • / soutenir • / moquerie • / critiquer • / interdire • networks/ réseaux sociaux • / donner un coup de poing • indecent photos / poster des images indécentes
Unit Test Review 2020-10-19
Across
- The exact web address.
- The basic unit in computing.
- ______ + F lets you search for keywords on webpages.
- The powerful computers that store the information presented online.
- The rush that lead to rapid computer development.
- The global combination of computer networks.
- _____ the first name of the man who invented the computer mouse in 1963.
- A grouping of 8 bits.
- The results of a search are called ____.
- _____byte is a group of 1000B
- _____byte is a group of 1000KB
- The first computer, built in 1946.
- This important tech company was founded in 1977.
- The .com/.edu at the end of a web address.
- HDMI High Definition Multimedia _______.
- These are used to store digital information.
Down
- ______ Serial Bus - The 'U' in USB.
- Digital _____ Interface DVI
- This professor stated that computing power doubles approximately every two years.
- The forefather to the laptop, the ____ was first invented in 1983.
- These are used to manage and organize files.
- The exact location of data.
- Video Graphics _______ VGA
- This web browser feature lets you see previously viewed sites
- The 'general' location for stored digital information
- 'Smaller' networks
- This tech company was a precursor to Windows computers established in 1981.
- Common internal storage device.
- Windows _____ is the program used to manage files and folders.
- The programming language using bits.
- This is software used to prevent unauthorized computer access through networks.
- ________ Component Interconnect PCI
32 Clues: 'Smaller' networks • A grouping of 8 bits. • The exact web address. • The exact location of data. • Video Graphics _______ VGA • Digital _____ Interface DVI • The basic unit in computing. • _____byte is a group of 1000B • _____byte is a group of 1000KB • Common internal storage device. • The first computer, built in 1946. • ______ Serial Bus - The 'U' in USB. • ...
Digital Devices 2025-07-04
Across
- Device that performs multiple tasks (e.g., print, scan, copy)
- Stationary personal computer
- GPS-enabled device for directions
- Touchscreen device, larger than a phone
- technology for short-range communication
- Records moving images
- Portable personal computer
- Device for playing video games
- Merging of multiple technologies into one device
- Plays audio and video files
- Input method using fingers or stylus
- Television with internet and app capabilities
- External device like a mouse or printer
Down
- Ease of carrying a device
- Ability to connect to networks or other devices
- Speed and efficiency of a device
- Capacity to save data
- Captures still images
- How users interact with a device
- Wireless internet connectivity
- Powerful computer used by organisations
- Embedded chip that controls devices
- Duration a device runs without charging
- Subscriber Identity Module for mobile networks
- Des is d for specific user needs (e.g., elderly)
- Mobile phone with advanced features
26 Clues: Capacity to save data • Captures still images • Records moving images • Ease of carrying a device • Portable personal computer • Plays audio and video files • Stationary personal computer • Wireless internet connectivity • Device for playing video games • Speed and efficiency of a device • How users interact with a device • GPS-enabled device for directions • ...
Networking 2023-10-21
Across
- A basic networking device that connects multiple devices in a network. It operates at the physical layer of the OSI model.
- A more advanced networking device than a hub, operating at the data link layer. It uses MAC addresses to forward data only to the device it is intended for.
- A smaller network within a larger network. Often used to organize hosts based on location or function.
- The identity of each host on the internet, essential for communication. It consists of 32 bits, divided into four octets and represented as a decimal number.
- A set of rules governing the format of data sent over the internet or other networks. IP addresses are a key component of the Internet Protocol.
- The IP address indicating the origin of a data packet. For example, when a client sends a request to a server, the source IP address is the client's IP address.
- Network of interconnected devices embedded with sensors, software, and other technologies, enabling them to collect and exchange data.
- In the context of IP addresses, refers to the organization of IP addresses into subnets.
- A device that connects different networks and directs traffic between them based on IP addresses. It operates at the network layer of the OSI model.
- A type of grouping of hosts based on shared characteristics or requirements. In networking, logical grouping refers to creating networks where hosts have similar connectivity needs.
Down
- The use of largely automatic systems to perform tasks without human intervention, especially in the context of networking, where automation simplifies and streamlines processes.
- Any device that sends or receives traffic. Examples include computers, laptops, phones, printers, servers, and cloud resources.
- A device that connects and filters traffic between two network segments at the data link layer of the OSI model.
- A unit of data transmitted over a network. It includes the actual data being sent, as well as control information like source and destination IP addresses.
- A type of host that initiates requests. For instance, a computer making a request to a web server.
- A type of host that responds to requests. For example, a web server providing content in response to a client's request.
- The IP address indicating the intended recipient of a data packet. In the context of a client-server interaction, the destination IP address is the server's IP address when the client is making a request. In response, when the server sends data back to the client, the source and destination IP addresses are swapped.
- The process of dividing and assigning IP addresses hierarchically, creating sub-networks or subnets.
- Computing services and resources (e.g., servers, storage, databases) delivered over the internet, often provided by cloud service providers.
- A logical grouping of hosts that share similar connectivity. Networks facilitate the transportation of traffic between hosts.
- A technology that allows devices to connect wirelessly to a local area network (LAN) using radio waves.
- A network device that amplifies and retransmits signals to extend the reach of a network.
- Conceptual framework that standardizes the functions of a communication system into seven abstraction layers, from physical transmission to application.
- Provides internet access to consumers by managing the data exchange between networks.
24 Clues: Provides internet access to consumers by managing the data exchange between networks. • In the context of IP addresses, refers to the organization of IP addresses into subnets. • A network device that amplifies and retransmits signals to extend the reach of a network. • ...
Unit 4 Vocabulary 2021-12-01
16 Clues: icon • click • monitor • cellphone • the mouse • the screen • USB memory • television • to connect • photocopier • the printer • to disconnect • the headphones • the DVD player • social networks • the compact disc player
Social networks 2020-06-18
9 Clues: share opinions • publish content • take photos and chat • personal information • share and upload photos • messages,audio,video and photos • share and watch videos and music • notification the messages or tagged • share stories and photos, send messages
Networks Crossword 2013-03-13
9 Clues: How are LANs linked? • What replaced dial-up? • The name of a protocol • Needed to connect a WAN • Another word for router? • Abbreviation for wide area network • Abbreviation for local area network • If a computer isn't networked, it is? • Controlled by a network operating system
COMPUTER NETWORKS 2025-09-30
Across
- Unique identifier assigned to each device in Layer3
- Protocol used for assigning IPs dynamically
- Protocol used for translating IP addresses
- Table used by routers to make forwarding decisions
- Protocol used by routers to exchange information
Down
- Layer responsible for routing packets
- Protocol used to map IP to MAC address
- IPv4 replacement
- Network ID and host ID are separated by this
9 Clues: IPv4 replacement • Layer responsible for routing packets • Protocol used to map IP to MAC address • Protocol used for translating IP addresses • Protocol used for assigning IPs dynamically • Network ID and host ID are separated by this • Protocol used by routers to exchange information • Table used by routers to make forwarding decisions • ...
Exploring IT Audit Essentials 2025-01-06
Across
- The process of granting users permission to access systems or data based on predefined policies
- The process of verifying the identity of a user, system, or device before granting access
- The evaluation of risks, controls, and compliance to identify weaknesses and areas for improvement
- Policies, procedures, and safeguards to ensure systems operate effectively and securely
- The independent examination of systems, processes, and controls to assess their effectiveness
- The creation and presentation of audit findings, assessments, and recommendations to management or stakeholders
- The practice of dividing duties or responsibilities to reduce the risk of fraud or errors
- Weaknesses or flaws in IT systems that can be exploited by threats to cause harm
- The actions taken to address and correct identified issues, vulnerabilities, or non-compliance
- A controlled, simulated cyberattack to identify vulnerabilities within a system
- The ability of systems and processes to be examined, traced, and verified during an audit
- Protecting computer systems and networks from cyber threats and attacks.
Down
- Adhering to laws, regulations, and company policies.
- The process of converting data into a secure format to prevent unauthorized access
- The set of processes and structures used to direct and manage an organization’s IT
- The ongoing process of observing and tracking the performance, security, and compliance of IT systems and networks
- Records of system events, transactions, and user activities used to track and review operations
- Any event or breach that disrupts IT services or compromises security
- Protection of IT systems, data, and networks from unauthorized access or attacks
- The ability to enter or use IT systems, networks, or data, controlled by permissions
- Information that is stored, processed, and transmitted within IT systems
- The possibility of loss, damage, or any negative impact arising from a potential threat to an organization's IT systems or operations.
- The accuracy, consistency, and reliability of data throughout its lifecycle
- The process of evaluating and verifying the effectiveness of IT systems, controls, and security measures
- Documentation or data collected during an audit to support findings and conclusions
25 Clues: Adhering to laws, regulations, and company policies. • Any event or breach that disrupts IT services or compromises security • Information that is stored, processed, and transmitted within IT systems • Protecting computer systems and networks from cyber threats and attacks. • The accuracy, consistency, and reliability of data throughout its lifecycle • ...
CCNA-3 2024-12-09
Across
- / A protocol used to route data between large networks.
- / Mechanisms managing data flow between devices.
- / The actual data carried in a network packet.
- / The number of bits used in a subnet mask.
- / A technology improving network speed and performance.
- / A group of network protocols working together.
- / A route learned and updated by routing protocols.
- / A table mapping IP addresses to MAC addresses.
- / An IP address manually assigned to a device.
- / The metadata section of an IP packet.
- / Excessive broadcast traffic causing network issues.
- / An advanced routing protocol by Cisco.
- / Protocols used to find network routes dynamically.
- / A part of the network defined by physical connections.
- / An interface for serial communication.
- / Converting numbers to binary format.
- / Devices from different manufacturers working together.
- / A switch operating at the OSI data link layer.
- / A routing rule preventing loops by not sending data back on its source path.
- / An IP address assigned automatically by DHCP.
- / A field in an IP packet limiting its lifetime.
Down
- / Splitting large data packets into smaller units.
- / A table containing network paths.
- / A value ranking the trustworthiness of a routing source.
- / The format of data packets in Ethernet networks.
- / A part of the network defined by logical boundaries.
- / A manually configured network route.
- / A fallback route used when no other route matches.
- / A link-state routing protocol for IP networks.
- / A table mapping MAC addresses to switch ports.
- / A table mapping private IPs to public IPs.
- / A value ensuring data integrity in transmission.
- / A way to represent subnet masks (e.g., /24).
- / A protocol for sending error messages and operational information.
- / A switch with routing capabilities at the network layer.
- / A simple distance-vector routing protocol.
- / A secure network connection over the internet.
- / The device routing traffic to other networks.
- / A method for allocating IP addresses more flexibly.
- / The act of sending data over a network.
- / Techniques for managing network traffic and ensuring performance.
41 Clues: / A table containing network paths. • / A manually configured network route. • / Converting numbers to binary format. • / The metadata section of an IP packet. • / An advanced routing protocol by Cisco. • / An interface for serial communication. • / The act of sending data over a network. • / The number of bits used in a subnet mask. • ...
lesson 3 key terms 2016-03-22
Across
- A company that has a permanent connection to the Internet and can provide temporary access to its customers.
- pair cable Cable commonly used in high-speed wired computer networks.
- A technology that allows electronic devices to exchange data wirelessly.
- Software and hardware that provides services to other computer programs.
- device A device that is either the source or the destination.
- media Transmission media provide a "path" for information to be sent from one computer to another through a network.
- a hardware device or software program that manages the paths.
- cable Cable specifically designed for carrying an electronic signal.
- A collection of LANs that is dispersed over a large geographical area.
- A device that enables computers to interpret data received from a network.
- A network created around an individual’s personal Workspace.
Down
- address Provides a unique identification for a specific computer or network.
- A device that manages the sharing of multiple computers or networks.
- cable A type of cable commonly used in high-speed wired computer networks.
- access point An intermediary device that joins wireless clients to a wired Ethernet network.
- A device that allows a modem to send information.
- A host is a computer that manages tasks, communicates instructions, or delivers specific services.
- optic cable A type of cable made of super-thin filaments of glass or other transparent materials.
- device a component used to connect computers or other electronic devices together.
- A network created for a home or other small geographic area.
20 Clues: A device that allows a modem to send information. • A network created for a home or other small geographic area. • A network created around an individual’s personal Workspace. • a hardware device or software program that manages the paths. • device A device that is either the source or the destination. • ...
Types of network requirements 2024-08-05
Across
- - Wide Area Network; a network that covers a broad area, often across cities or countries.
- Local Area Network - segmenting a network into different sub-networks.
- - A device that forwards data packets between computer networks.
- - Network Address Translation; a method of modifying IP address information in packets.
- - The capacity of a network link (repeated clue for variety).
- - A device that acts as a node between different networks, often with different protocols.
- - The maximum rate of data transfer across a network.
- - A set of rules governing the exchange of data between devices.
- - The time it takes for a data packet to travel from source to destination.
- - Time delay in data transmission (repeated clue for variety).
Down
- - A security system that controls incoming and outgoing network traffic.
- - The physical or logical arrangement of network devices.
- of Service -prioritizing certain types of network traffic.
- - The inclusion of extra components to ensure network reliability.
- - The actual rate of successful data transfer achieved over a network.
- - A network device that connects devices within a network and uses MAC addresses to forward data.
- - The process of converting data into a code to prevent unauthorized access.
- Address - A unique identifier for a device on a network.
- - A segment of a network that is divided into smaller parts. Domain Name System; translates domain names to IP addresses.
19 Clues: - The maximum rate of data transfer across a network. • Address - A unique identifier for a device on a network. • - The physical or logical arrangement of network devices. • of Service -prioritizing certain types of network traffic. • - The capacity of a network link (repeated clue for variety). • - Time delay in data transmission (repeated clue for variety). • ...
October Crossword: Orange Success Story 2025-10-07
Across
- Orange is a leading company in this industry
- The name of the solution used by Orange for managing its new cloud-native networks
- The term for solutions that are transparent and ready for remote deployment
- The type of software Orange used, emphasizing collaboration and transparency
- A key business benefit Orange gained, alongside compliance
Down
- The type of networks Orange is deploying with Rancher Prime
- The concept of ensuring regulatory standards are met
- The type of security platform used alongside Rancher Prime, ensuring container security
- The name of the European framework Orange is using to deploy secure networks
- A primary goal of the project: maintaining control over data and technology
10 Clues: Orange is a leading company in this industry • The concept of ensuring regulatory standards are met • A key business benefit Orange gained, alongside compliance • The type of networks Orange is deploying with Rancher Prime • The term for solutions that are transparent and ready for remote deployment • ...
Trade Networks 2022-10-03
Across
- brought by Europeans to Americas and Siberia
- silver drain
- millions of African slaves transported between Africa and the Americas
- needed because Little Ice Age
Down
- captured from Africa
- mined in the Americas
- able to unify because of silver
- production needed many slaves
- destroyed Native American communities after fur trade
9 Clues: silver drain • captured from Africa • mined in the Americas • production needed many slaves • needed because Little Ice Age • able to unify because of silver • brought by Europeans to Americas and Siberia • destroyed Native American communities after fur trade • millions of African slaves transported between Africa and the Americas
Computer Networks 2025-06-28
Across
- | A set of rules for communication between devices
- | A network that covers a large geographic area
- | A security system that monitors and controls network traffic
- | The amount of data that can be transmitted in a given time
Down
- | Device that forwards data packets between networks
- | A small chunk of data sent over a network
- | A unique address assigned to each device on a network
- | A network that covers a small geographic area
- | Device that connects multiple devices in a LAN
9 Clues: | A small chunk of data sent over a network • | A network that covers a large geographic area • | A network that covers a small geographic area • | Device that connects multiple devices in a LAN • | A set of rules for communication between devices • | Device that forwards data packets between networks • | A unique address assigned to each device on a network • ...
Crossword Sidi 2019-11-12
27 Clues: IT • RAM • DVD • ROM • CPU • Óptic • Torre • Anglès • Xarxes • Teclat • Ratolí • Escàner • Xatejar • Magnètic • Pantalla • Micròfon • Altaveus • Traçador • Placa base • Impressora • Auriculars • Ventilador • Assignatura • Teclat tàctil • Ordenador central • Agenda electrónica • Roda de desplaçament
Puzzle Marketing 2021-04-02
Across
- ผู้ค้าปลีก
- สถานที่จัดจำหน่าย
- การศึกษายอดขายของผลิตภัณฑ์สินค้าหรือบริการของบริษัทหรือองค์กร
- ส่งเสริมการขาย
- ตัวแทนจำหน่าย
- การโฆษณา
- กำหนดราคา
- สถานที่สำหรับวาง,จัดเก็บ,พัก,กระจายสินค้าคงคลัง
- เครือข่ายสังคมออนไลน์
Down
- กระบวนการเคลื่อนย้ายผลิตภัณฑ์จากตลาดที่ซึ่งผลิตภัณฑ์อยู่ในมือผู้บริโภคแล้วและถูกนำกลับมาทำลาย
- คุณค่าของผลิตภัณฑ์
- ตำแหน่งผลิตภัณฑ์
- กระบวนการจัดการสินค้าย้อนกลับจากลูกค้ามายังผู้ผลิต
- ส่วนแบ่งทางการตลาด
- ห่วงโซ่อุปทาน
- การดูแลรักษาและเคลื่อนย้ายสินค้า
- การขนส่ง
- ความพึงพอใจของลูกค้า
- อัตราการเติบโตของยอดขาย
- กระบวนการในการแบ่งหรือแยกลูกค้าออกเป็นกลุ่มย่อยๆ
- ออกแบบผลิตภัณฑ์(สินค้าบริการ)
- การผลักสินค้าออกไปหาลูกค้า
22 Clues: การขนส่ง • การโฆษณา • กำหนดราคา • ผู้ค้าปลีก • ห่วงโซ่อุปทาน • ตัวแทนจำหน่าย • ส่งเสริมการขาย • ตำแหน่งผลิตภัณฑ์ • สถานที่จัดจำหน่าย • คุณค่าของผลิตภัณฑ์ • ส่วนแบ่งทางการตลาด • ความพึงพอใจของลูกค้า • เครือข่ายสังคมออนไลน์ • อัตราการเติบโตของยอดขาย • การผลักสินค้าออกไปหาลูกค้า • ออกแบบผลิตภัณฑ์(สินค้าบริการ) • การดูแลรักษาและเคลื่อนย้ายสินค้า • สถานที่สำหรับวาง,จัดเก็บ,พัก,กระจายสินค้าคงคลัง • ...
Shana Jackson 12/02/2024 2024-12-03
Across
- A document that describes the rules governing access to an organizations information resources, enforcement of these rules and steps taken if rules are breached.
- is a series of letters, numbers and special characters that
- A Server role that makes it possible for administrators to take control of Microsoft product updates.
- Someone who wants to send encrypted data must apply for a _____ from a certification Authority.
- Backup only backs up files that have changed since the last full backup.
- Attackers who dont report problems but instead disseminate the information.
- Allows passwords of 128 characters.
- sell cetificates to companies that want to have secure communications sessions across public networks.
- Enables administrators to control who has access to the network.
- a Framework for other protocols that provide encryption and authentication.
Down
- Passwords policies for a single window computer can be set in the local secirity policy console found in ____
- ____ Firewall creates a barrier between networks so that potentially harmful packets cant enter or leave the protected networks.
- Creates a barrier between two entitles.
- Testers who are paid to probe network and report vulnerablities.
- Requires a user to supply 2 or more types of authentication.
- What users can do after they are logged on to the network.
- used in a windows domain enviroment and provides mutual authentication.
- An industry standard client protocol that offers centralizes control.
- The most widely used method for encrypting data is______
- prevents people from using eavesdropping Technology.
20 Clues: Allows passwords of 128 characters. • Creates a barrier between two entitles. • prevents people from using eavesdropping Technology. • The most widely used method for encrypting data is______ • What users can do after they are logged on to the network. • is a series of letters, numbers and special characters that • ...
Technical quiz 2023-10-04
Across
- Software with freely available source code.
- The smallest unit of a digital image.
- Using disk space as an extension of RAM.
- High-speed storage for frequently accessed data.
- A versatile programming language.
Down
- Delay in data transmission.
- A method for training neural networks.
- Software that serves web pages to users.
- The virtual environment of computer networks.
- A variable that stores a memory address.
- perations that don't require synchronization.
11 Clues: Delay in data transmission. • A versatile programming language. • The smallest unit of a digital image. • A method for training neural networks. • Software that serves web pages to users. • A variable that stores a memory address. • Using disk space as an extension of RAM. • Software with freely available source code. • The virtual environment of computer networks. • ...
Neurodiversity 2023-10-25
Across
- A group of people whose minds vary from eachother
- An individual whose brain works differently from the neuromajority
- The opposite of fitting in
- UDL principle relating to multiple ways of accessing the "why" networks in the brain
- One benefit of impulsivity
- The preferred term for "a person with autism"
- An approach to education; stems from the idea that variability is the norm.
- UDL principle relating to multiple ways of accessing the "how" networks in the brain
- The double empathy problem describes communication breakdowns between different neurotypes as being
Down
- The inherent variability in human neurocognition (brain function)
- The urge to hide one's neurodivergent traits in order to be accepted by the neurotypical majority in society
- UDL principle relating to multiple ways of accessing the "what" networks in the brain
- Nothing about us ___ us; the premise of the Disability Rights Movement
- The skills of reflecting on, knowing and understanding one's own strengths, abilities, limitations and differences and how to use these unique attributes
- The model of disability that normalises "the right to be disabled" and focuses on societal barriers
- The model of disability that considers within-person deficits/disorders and focuses on ways to "fix" the person
- An individual who is not neurodivergent
17 Clues: The opposite of fitting in • One benefit of impulsivity • An individual who is not neurodivergent • The preferred term for "a person with autism" • A group of people whose minds vary from eachother • The inherent variability in human neurocognition (brain function) • An individual whose brain works differently from the neuromajority • ...
AI 2023-10-12
Across
- Vision Computer Vision aims to mimic human vision by electronically perceiving and interpreting an image or a sequence of images. It is a key technology for fields like autonomous vehicles, medical imaging, and face recognition.
- Has a trunk
- Learning: Deep Learning is a type of machine learning that utilizes neural networks with many layers to analyze data and derive conclusions. It is especially adept at processing large amounts of unstructured data, such as images and text.
- Language Processing (NLP):** NLP is a field of AI that focuses on the interaction between computers and humans through natural language. The ultimate objective is to read, decipher, understand, and make sense of human language in a valuable way.
- Large marsupial
- Man's best friend
- Networks These are computational models inspired by the human brain. They consist of interconnected nodes or "neurons" that process information and identify patterns in data. They are the backbone of deep learning.
- Likes to chase mice
- Neural Networks (RNNs):** RNNs are a type of deep learning model designed to recognize patterns in sequences of data, making them particularly effective for tasks such as language modeling and speech recognition.
- General Intelligence (AGI):** AGI refers to a type of artificial intelligence that has the ability to understand, learn, and apply its intelligence to any intellectual task that a human being can do.
- Learning (ML) Machine Learning, a crucial subset of AI, leverages algorithms and statistical models to enable machines to improve their performance over time through experience and training. It's essentially about teaching computers to learn from data.
- Intelligence (AI) AI is a subfield of computer science that aims to create systems capable of performing tasks typically requiring human intelligence. These tasks include learning, reasoning, problem-solving, perception, and language understanding.
Down
- Flying mammal
- Neural Networks (CNNs):** CNNs are a type of deep learning model primarily used for image processing. They have proven to be highly effective in areas such as face recognition and image and video recognition.
- Unsupervised Learning involves training an AI model using data that is neither classified nor labeled, enabling the model to identify patterns and structures within the data on its own.
- Learning A type of machine learning where an 'agent' learns to make decisions by taking actions in an environment to maximize some notion of cumulative reward
- in AI: Bias in AI refers to situations where AI systems may systematically produce outcomes that are unfair or discriminatory, typically as a result of biases present in the training data or the design of the algorithms.
- Adversarial Networks (GANs):GANs are a class of machine learning systems invented by Ian Goodfellow and his colleagues in 2014. Two neural networks contest with each other in a game, with one network (the generator) making data instances to fool the other network (the discriminator).
- In Supervised Learning, an AI model is trained using labeled data. It involves the model learning to map input data to the correct output using feedback from a 'teacher'.
- Extraction:** This refers to the process of transforming raw data into a set of input features that can be handled by a machine learning algorithm. This process can dramatically improve the p
- Learning:** Transfer Learning is a machine learning method where a pre-trained model is adapted for a new, different data set. It's a powerful technique when there's a lack of labeled data for the task at hand.
21 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Learning A type of machine learning where an 'agent' learns to make decisions by taking actions in an environment to maximize some notion of cumulative reward • ...
Network Theory 2019-11-28
Across
- _______ network is a system of coupled networks where nodes of one or more networks depend on nodes in other networks
- a>b is an example of ______ relation
- Network optimization is the study of ____research and computational complex
- is the meaning of the first W in WWW
- is a type of network theory that has extensive applications
Down
- ______ optimization is a topic that consists of finding an optimal objects
- Network optimization involves finding an optimal object from a ______ set of objects
- is the representation between discrete objects
- 1=0 & 0=1 is a ________ relation
- a part of graph that involves computer science and _______ science
10 Clues: 1=0 & 0=1 is a ________ relation • a>b is an example of ______ relation • is the meaning of the first W in WWW • is the representation between discrete objects • is a type of network theory that has extensive applications • a part of graph that involves computer science and _______ science • ______ optimization is a topic that consists of finding an optimal objects • ...
Network Basics and Other Things! 2014-03-25
Across
- The destination of communication between devices relies on this
- The destination of communication between devices relies on this because it is smarter
- Our connection is centralized. Our central connection is very important, please don't fail.
- It is the central of things and provides resources to printers and access to the Internet
- It secures all networks and prevent unauthorized users
- Used to link large computer networks
- This network enjoys "The lesser the better" philosophy with no strict security
- You need to have enough of this to stay in connection .If you go too far you might lose the connection…sorry
- This is the larger network of internet
Down
- Simple and small connection is the way to do it
- It's radio signals can be interrupted by walls or pipes when it's in use causing the signals to slow down
- It can be wired or wireless while sharing a single network connection among several computers
- This can reach speeds up to 33 megabytes per second
- It is used every day but does not need a wire to connect
- This cable is reliable technology and said to be more convenient than it's no wire competitor
- In order to link computers you have to have NICK's permission card
- The physical connection among devices and the systems of networks
- They all belong to a circle of connections
18 Clues: Used to link large computer networks • This is the larger network of internet • They all belong to a circle of connections • Simple and small connection is the way to do it • This can reach speeds up to 33 megabytes per second • It secures all networks and prevent unauthorized users • It is used every day but does not need a wire to connect • ...
Sur mon écran (no spaces or accents) 2022-11-28
15 Clues: tablet • emojis • laptop • online • screen • bullying • computer • geocache • cell phone • technology • I think that • search engine • cyber bullying • social media (social networks) • app (application, abbreviation)
Chapter 3 Activity 2024-09-11
Across
- Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
- A harmful program that resides in the active memory of the computer and duplicates itself
- The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
- What organization is mentioned as a resource for cybersecurity guidance?
- An attack on an information system that takes advantage of a particular system vulnerability
- Software that generates and grades tests that humans can pass but computer programs cannot
- The process of scrambling messages or data in such a way that only authorized parties can read it
- What federal agency is responsible for protecting U.S. cyber infrastructure?
- Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
- Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
- The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
- A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
- An attack that occurs before the security community is aware of a vulnerability
- Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
- Federal Laws: Addresses fraud and related activities in association with computers
Down
- Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
- A specific sequence of bytes that indicates the presence of a previously identified virus
- What type of phishing specifically targets an organization's employees?
- Malware that encrypts data and demands a ransom
- What does BYOD mean?
- A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
- What type of attack floods a target with data requests to make a site unavailable?
- Many organizations use this to monitor, manage, and maintain their computer and network security
- Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
- Perpetrators: An individual whose goal is to promote a political ideology
- Confidentiality, Integrity, Availability
- Federal Laws: Defines cyberterrorism and associated penalties
- Phishing using SMS
- A networking device that connects multiple networks and transmits data packets between networks
- What type of malware disguises itself as legitimate software?
30 Clues: Phishing using SMS • What does BYOD mean? • Confidentiality, Integrity, Availability • Malware that encrypts data and demands a ransom • Federal Laws: Defines cyberterrorism and associated penalties • What type of malware disguises itself as legitimate software? • What type of phishing specifically targets an organization's employees? • ...
Vocabulario de la familia 2023-09-15
Across
- consumerism
- illiterate person, uneducated
- social networks
- Popular markets
- resources, means
- cultural influence
- to restrict, to limit
- economic development
- environment
Down
- nonprofit organization
- adolescent, teenager
- marketing
- educated, literate
- to track, to follow the trail
- tool
- unemployment
- to spread, broadcast
- repression
- internet user
- to influence
20 Clues: tool • marketing • repression • consumerism • environment • unemployment • to influence • internet user • social networks • Popular markets • resources, means • educated, literate • cultural influence • adolescent, teenager • to spread, broadcast • economic development • to restrict, to limit • nonprofit organization • illiterate person, uneducated • to track, to follow the trail
Samir's Crosswords 2019-11-12
27 Clues: CPU • DVD • XAT • RAM • ROM • Torre • Xarxa • Teclat • Òptica • Ratolí • Inglès • Mini Pc • Altaveu • Escaner • Micròfon • Pantalla • magnètic • Servidors • Placa Base • Ventilador • Impressora • Auriculars • INFORMÀTICA • Assignatura • Teclat tàctil • Ratolí de bola • Traçador gràfica
Unit 3: Networks 2024-03-27
Across
- When 2 or more computers are linked together
- This compression removes data, it is irreversible, and when used some data can be lost
- Uses algorithm to reduce file size, Reversible. when used no data can be lost
- computer system or software application that requests a services from a server connected to the same network
Down
- A unit of information suitable for travel through computer networks.
- Network that covers more distance than LAN, and often uses multiple routers
- A device that can connect multiple networks and serves as an intermediary between them
- A device that is a connection point for devices on a single network
- Man's best friend
- A globally connected network system
- a computer system or a software application that provides a service to other computer systems on the same network
- Networks that covers a single building or collection of buildings
12 Clues: Man's best friend • A globally connected network system • When 2 or more computers are linked together • Networks that covers a single building or collection of buildings • A device that is a connection point for devices on a single network • A unit of information suitable for travel through computer networks. • ...
Networks of exchange 2022-02-10
Jacob McGowan Networks 2019-12-12
Across
- (_*_) topology: Highly reliable and easy to add new machines. If the server fails the network fails
- (_*_) protocol: An agreed set of rules for sending and receiving data on a network
- to enable a range of portable devices to connect to each other through pairing, that are close to proximity
- The BIGGEST network in the world
- A private network owned and managed by an organisation accessible only to employees
- The amount of data which can be transmitted in a given time
- A device which allows the LAN to connect to the internet
Down
- This is used in Bus topology and is the most important cable
- A device which provides a single connection point for a group of computers
- This covers a small geographical area
- Stops the signal returning or bouncing back down the backbone cable
- (_*_) Squatter: A person who buys up web domain names
- Sends and receives radio waves via a wireless router
- (_*_) Fibre: Uses light and consists of glass or plastic wires/cores or filaments bundled together and encased in a jacket
14 Clues: The BIGGEST network in the world • This covers a small geographical area • Sends and receives radio waves via a wireless router • (_*_) Squatter: A person who buys up web domain names • A device which allows the LAN to connect to the internet • The amount of data which can be transmitted in a given time • This is used in Bus topology and is the most important cable • ...
network system 2014-04-23
Across
- is a device or program that enables a computer to transmit data over, for example, telephone or cable lines.
- A device that forwards data packets along networks. A router is connected to at least two networks and are located at gateways.
- is an identifier for devices on a TCP/IP network. Networks using TCP/IP route messages based on the IP address of the destination.
- In networks, a device that filters and forwards packets between LAN segments.
- is the hardware component which is used to connect two or more network segments which are physically separated.
- A common connection point for devices in a network. Can be used to connect segments of a LAN
Down
- Computer networks facilitate communication between computers through an address system, packets of digital data and cabling.
- computer network where there is no physical wired connection between sender and receive
8 Clues: In networks, a device that filters and forwards packets between LAN segments. • computer network where there is no physical wired connection between sender and receive • A common connection point for devices in a network. Can be used to connect segments of a LAN • ...
Unidad 5 Desafío 2 2024-02-26
22 Clues: file • mouse • screen • report • copier • to copy • to save • message • printer • computer • keyboard • computer • to click • download • Internet • document • to print • program / app • to post/upload • CD player = ________ de CD • social networks/social media • to surf the web = ________ por Internet
NSS Chapter 4b 2023-01-31
Across
- C supports small networks with a maximum of 254 hosts.
- a message for me
- supports extremely large networks.
- something for everyone.
Down
- responsible for allocating IP addresses to ISPs who provide IPv4 address blocks to smaller ISPs and organizations.
- IPv4 addresses allocated on any address bit boundary.
- just for this group.
- supports the needs of moderate to large size networks.
8 Clues: a message for me • just for this group. • something for everyone. • supports extremely large networks. • IPv4 addresses allocated on any address bit boundary. • C supports small networks with a maximum of 254 hosts. • supports the needs of moderate to large size networks. • ...
Cruxword 2016-10-18
Across
- Canadian syrup, national symbol
- missional
- platter
- Jonathan
- parish pet
- franchise
- Japanese pickled plum
- C.M.
- Word above all words
- first bishop
Down
- famous Texas massacre
- Movement
- and Foreign Missionary Society
- Jezebel's
- for Missional Relationships
- digital
- time interim
- missional
- supermarket checkout clerk
- holy women and holy
- missional
- vinegar
22 Clues: C.M. • platter • digital • vinegar • Movement • Jonathan • Jezebel's • missional • missional • franchise • missional • parish pet • time interim • first bishop • holy women and holy • Word above all words • famous Texas massacre • Japanese pickled plum • supermarket checkout clerk • for Missional Relationships • and Foreign Missionary Society • Canadian syrup, national symbol
SOCIAL MEDIA vocabulary 2021-03-21
Across
- Rautezeichen #
- blockieren
- entfreunden
- nicht mehr folgen
- Benachrichtigungen
- aktualisieren
- bedrohen
- auf Gefällt mir klicken
- belästigen
- Meinung
- falsche Informationen
- aktualisieren
- Nachteil
- soziale Medien
Down
- markieren
- Werbung
- Online-Mobbing
- herunterladen
- Profilbild
- verschicken
- Kommentare
- hochladen
- Netzwerke
- Vorteil
- posten
- teilen
- Sucht
27 Clues: Sucht • posten • teilen • Werbung • Vorteil • Meinung • bedrohen • Nachteil • markieren • hochladen • Netzwerke • Profilbild • blockieren • Kommentare • belästigen • verschicken • entfreunden • herunterladen • aktualisieren • aktualisieren • Rautezeichen # • Online-Mobbing • soziale Medien • nicht mehr folgen • Benachrichtigungen • falsche Informationen • auf Gefällt mir klicken
abigail chalfont 2019-02-26
21 Clues: war • alien • thief • public • danger • website • channel • to show • to kill • game show • interview • soap opera • sports show • police show • to be bored • horror movie • cartoon show • to be arrested • social networks • to be in love with • the star of the show
Network Basics and Other Things! 2014-03-25
Across
- Our connection is centralized.Our central connection is very important, please don't fail.
- This cable is reliable technology and said to be more convenient than it's no wire competitor
- This network enjoys "The lesser the better" philosophy with no strict security
- It can be wired or wireless while sharing a single network connection among several computers
- It secures all networks and prevent unauthorized users
- This can reach speeds up to 33 megabytes per second
- The destination of communication between devices relies on this because it is smarter
- In order to link computers you have to have NICK's permission card
Down
- Simple and small connection is the way to do it
- You need to have enough of this to stay in connection.If you go to far you might lose the connection..sorry
- It is the central of things and provides resources to printers and access to the Internet
- Used to link large computer networks
- It's radio signals can be interrupted by walls or pipes when it's in use causing the signals to slow down
- The destination of communication between devices relies on this
- This is the larger network of internet
- They all belong to a circle of connections
- The physical connection among devices and the systems of networks
- It is used everyday but does not need a wire to connect
18 Clues: Used to link large computer networks • This is the larger network of internet • They all belong to a circle of connections • Simple and small connection is the way to do it • This can reach speeds up to 33 megabytes per second • It secures all networks and prevent unauthorized users • It is used everyday but does not need a wire to connect • ...
NSS Chapter 4b 2023-01-31
Across
- C supports small networks with a maximum of 254 hosts.
- a message for me
- supports extremely large networks.
- something for everyone.
Down
- responsible for allocating IP addresses to ISPs who provide IPv4 address blocks to smaller ISPs and organizations.
- IPv4 addresses allocated on any address bit boundary.
- just for this group.
- supports the needs of moderate to large size networks.
8 Clues: a message for me • just for this group. • something for everyone. • supports extremely large networks. • IPv4 addresses allocated on any address bit boundary. • C supports small networks with a maximum of 254 hosts. • supports the needs of moderate to large size networks. • ...
Networks and Topologies 2022-09-13
Across
- A device that is connected to a network
- Small box that links nodes on a network
- transfers data between networks
- A way of connecting devices that includes a center point that the devices are connected too
- Found inside every device that can connect to a network
- Like a hub but more secure
- A network that covers a large area
- A network that spreads over a small area
Down
- A way of laying out a network so that all devices are connected to all other devices with no center point
- a transmission media made of glass
- If one connection fails it does not affect any other users it can be called?
- A company that provides a connection to the internet
- it is easy to make larger
- How a network is layed out
14 Clues: it is easy to make larger • How a network is layed out • Like a hub but more secure • transfers data between networks • a transmission media made of glass • A network that covers a large area • A device that is connected to a network • Small box that links nodes on a network • A network that spreads over a small area • A company that provides a connection to the internet • ...
Computing Networks Crossworks 2025-05-05
Across
- a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
- a person or organization using the services of a lawyer or other professional person or company.
- the physical and logical arrangement of nodes and connections in a network.
- a network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet.
- a person responsible for carrying out the administration of a business or organization.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network
Down
- a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km.
- an arrangement of intersecting horizontal and vertical lines.
- the original draft of a diplomatic document, especially of the terms of a treaty agreed to in conference and signed by the parties.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- connection points on a desktop that allow you to interface with external devices
- a range of frequencies within a given band, in particular that used for transmitting a signal.
- a local or restricted communications network, especially a private network created using World Wide Web software.
14 Clues: an arrangement of intersecting horizontal and vertical lines. • the physical and logical arrangement of nodes and connections in a network. • connection points on a desktop that allow you to interface with external devices • a person responsible for carrying out the administration of a business or organization. • ...
Crossword Across Boarders 2025-09-11
Across
- – Skills and expertise gained through assignments
- – Type of research method used in the study
- – Motivation and values developed through work experience
- – Career self-concept shaped by motivations and values
- – Employee working abroad on international assignment
- – Resource developed through knowledge, motivation, and networks
- – Environment where new knowledge and skills are applied
- – Professional networks and relationships built on assignment
- - Movement of skills and knowledge back to home organization
- – Kind of knowledge learned implicitly on assignments
Down
- – Worker returning home after assignment abroad
- – Swedish automaker studied in the case
- – Connections and relationships formed during assignments
- – Analytical process of categorizing interview data
- – Country where Volvo expanded and sent expatriates
- – Driving force behind career choices and assignment goals
- – Work placement abroad for knowledge transfer and experience
- – Chinese company that acquired Volvo in 2010
- – Long-term trajectory of skills, roles, and growth
19 Clues: – Swedish automaker studied in the case • – Type of research method used in the study • – Chinese company that acquired Volvo in 2010 • – Worker returning home after assignment abroad • – Skills and expertise gained through assignments • – Analytical process of categorizing interview data • – Country where Volvo expanded and sent expatriates • ...
Networking Terms 2016-08-30
Across
- Technology platform standardized across the state of Colorado
- - Global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide
- It is used for connection-oriented transmissions
- Fictional artificial intelligence in the Terminator franchise and serves as the franchise's main antagonist.
- Block unauthorized access while permitting outward communication
Down
- is a network protocol that builds a logical loop-free topology for Ethernet networks
- Responsible for all IP public addresses
- The media that networks use to communicate
- - What you are doing now to solve this puzzle
9 Clues: Responsible for all IP public addresses • The media that networks use to communicate • - What you are doing now to solve this puzzle • It is used for connection-oriented transmissions • Technology platform standardized across the state of Colorado • Block unauthorized access while permitting outward communication • ...
CYBER CROSSWORD 2021-09-05
Across
- The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- An individual who subscribes to a kind of ideology about new technologies, such as the Internet.
- A switching device for networks, which is able to route network packets, based on their addresses, to other networks or devices.
- Any piece of technology that connects people and machines with each other or with information.
- The conversion of text, pictures, or sound into a digital form that can be processed by a computer.
- The unauthorized use, copying or distribution of copyrighted software
Down
- The notional environment in which communication over computer networks occurs.
- The unauthorized registration and use of Internet domain names that are identical or similar to trademarks, service marks, company names, or personal names.
- is the process of developing, promoting and possibly mandating standards-based and compatible technologies and processes within a given industry.
- This provides legal recognition for transactions that are carried out by means of electronic data interchange.
10 Clues: The unauthorized use, copying or distribution of copyrighted software • The notional environment in which communication over computer networks occurs. • Any piece of technology that connects people and machines with each other or with information. • An individual who subscribes to a kind of ideology about new technologies, such as the Internet. • ...
Networks Ava.S 2022-03-22
Across
- The amount of data that can be transference at once
- A unique number assigned to every device connected to the internet
- how lost packets can be resent
Down
- the number of collisions in high network traffic
- determines how data is transmitted between different devices in the same network
- the speed that data travels during transfer
- Short for Domain name System
- data split into pieces to travel the internet is called…
- Data is sent through radio waves
9 Clues: Short for Domain name System • how lost packets can be resent • Data is sent through radio waves • the speed that data travels during transfer • the number of collisions in high network traffic • The amount of data that can be transference at once • data split into pieces to travel the internet is called… • ...
Networks -Josh 2019-05-17
9 Clues: -Colour • -Flames • -Personal network • -Very big network • -Local Area Network • -What crisps come in • -Computer that holds data to be shared • -Getting into a computer without authorisation • -A device for connecting computers and other devices together to make a network
Social Networks 2024-10-29
Across
- a person who is not under anyone's authority, control
- something that connects two facts, ideas, et
- the main ways that large numbers of people receive information and entertainment, that is television, radio, newspapers and the internet
Down
- an Internet user who has a small channel, website or page
- a user account on a social network, which is logged in using a login
- a broad concept that includes means of communication, methods of information exchange
- the act of communicated with somebody, especially regulary
- take a closer look at something
- bringing together people with the same interests and goals
9 Clues: take a closer look at something • something that connects two facts, ideas, et • a person who is not under anyone's authority, control • an Internet user who has a small channel, website or page • the act of communicated with somebody, especially regulary • bringing together people with the same interests and goals • ...
CN crossword puzzle 2024-09-11
Across
- - System that translates domain names to IP addresses.
- - Device that forwards data packets between networks.
- - Protocol used to map IP addresses to MAC addresses.
- - Protocol responsible for addressing and routing data packets.
- - Routing that adjusts automatically to network changes
- - Unique address assigned to network devices.
- - Subdivision of an IP network.
- - The limit on packet lifetime, measured in hops.
Down
- - An access point that connects different networks.
- - Each step a packet takes from one router to another.
- - Sending data to all devices in a network.
- - Protocol for automatically assigning IP addresses.
- - Type of routing that requires manual configuration.
- - Defines the subnet within an IP address.
- - Translates private IP addresses to a public address.
15 Clues: - Subdivision of an IP network. • - Defines the subnet within an IP address. • - Sending data to all devices in a network. • - Unique address assigned to network devices. • - The limit on packet lifetime, measured in hops. • - An access point that connects different networks. • - Protocol for automatically assigning IP addresses. • ...
Cyber Security 2023-06-07
Across
- it with a flood of traffic from a team of computers.
- often by using emails or fake websites that look like they are from trusted organizations.
- until it is decrypted using a secret key.
- The amount of data that can pass through a network or part of a network per second.
- programs.
- A distributed denial of service attack attempts to make an online service, like a website, unavailable by
Down
- Software designed to block malware from entering protected networks.
- Consists of code written in a programming language that instructs computers to perform specific tasks.
- The process of using codes to make readable information unreadable. Encrypted information cannot be
- Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other
- effort to draw attention to political or social issues.
- Attempting to trick people into revealing sensitive information, such as passwords and credit card
- Someone who uses computers and computer networks to disrupt services or share secret information in
13 Clues: programs. • until it is decrypted using a secret key. • it with a flood of traffic from a team of computers. • effort to draw attention to political or social issues. • Software designed to block malware from entering protected networks. • The amount of data that can pass through a network or part of a network per second. • ...
ICT 2024-10-26
15 Clues: news • theft • divide • consent • of trust • networks • breaches • addiction • attention span • from social media • loss from automation • opinion manipulation • relationship impacts • economy exploitation • face-to-face interactions
Deep Learning Techniques 2025-03-31
Across
- function used to introduce non-linearity into the output of a neuron
- A modeling error that occurs when a function is too closely fit to a limited set of data points.
- computational model inspired by the way biological neural networks
- A regularization technique where randomly selected neurons are ignored during training
Down
- A layer in a neural network that applies convolution operations to the input.
- Descent An optimization algorithm used to minimize the loss function in neural networks.
- One complete pass
- An open-source software library for dataflow and differentiable programming across a range of tasks.
- A popular activation function that stands for Rectified Linear Unit.
- algorithm used to train neural networks by adjusting weights
10 Clues: One complete pass • algorithm used to train neural networks by adjusting weights • computational model inspired by the way biological neural networks • function used to introduce non-linearity into the output of a neuron • A popular activation function that stands for Rectified Linear Unit. • ...
Tech Talk:A Crossword on Networking 2025-06-09
Across
- A device that connects networks
- Provides internet access to devices
- A small network,often in homes or schools
- A set of rules in data communication
- A main computer in a network
- A large network connecting countries
- Address A unique number identifying a device on a network
- A area where two devices exchange data
Down
- This protects networks from threats
- A network device that is used to connect all the computer in a network with each other
- A address identifying websites
- A type of cable used in weird connections
- Connects multiple devices in a network
- A wireless internet technology
- A computer network that is mainly created for an individual person
15 Clues: A main computer in a network • A address identifying websites • A wireless internet technology • A device that connects networks • This protects networks from threats • Provides internet access to devices • A large network connecting countries • A set of rules in data communication • Connects multiple devices in a network • A area where two devices exchange data • ...
Cyber attacks 2025-12-19
Across
- malicious act of collecting and publishing and individuals private info
- trying many passwords until one works
- fake emails or messages that trick users into giving information
- force trying many passwords until one works
- malicious code that attaches to legitimate files
- networks of infected devices controlled by an attacker
- phishing via text messages
- recoding keystrokes to steal credentials
- a cyber-enabled attack that involves sending a SWAT team to unsuspecting victim
Down
- displays unwanted ads, often tracking user behavior
- malware disguised as legitimate software
- pretending to be a trusted device by faking an IP address
- encrypts files and demands payment
- luring victims with something enticing
- self replicating malware that spreads across networks
- phishing via phone calls
16 Clues: phishing via phone calls • phishing via text messages • encrypts files and demands payment • trying many passwords until one works • luring victims with something enticing • malware disguised as legitimate software • recoding keystrokes to steal credentials • force trying many passwords until one works • malicious code that attaches to legitimate files • ...
The Internet and World Wide Web Crossword - Complete to play games! 2018-05-21
Across
- THE MOSTLY USED SOCIAL NETWORK PAGE
- THE CODE USED TO WRITE WEB PAGES
- THE NAME GIVEN TO CAUSING EMOTIONAL DISTRESS VIA THE INTERNET
- USED TO CONNECT NETWORKS TOGETHER
- USED TO LOOK AT CONTENT ON THE WEB
- HOW COMPUTERS ARE FOUND ON THE INTERNET
- THE ABBREVIATION FOR THE NAME OF A LARGE NETWORK
- SPREADS VIA THE INTERNET AND DAMAGES YOUR COMPUTER
- THE INTERCONNECTED NETWORK OF NETWORKS
Down
- THE NAME OF A CRIMINAL WHO BREAKS INTO COMPUTER SYSTEMS
- THE SUPER POWERFUL COMPUTER USED TO STORE WEB PAGES
- THE NAME FOR USERS OF THE WEB BROWSING PAGES
- THE GUY THAT INVENTED THE WWW
- PRESIDENT TRUMP'S FAVOURITE
- THE TECHNICAL TERM FOR A WEB ADDRESS
- THE ABBREVIATION FOR THE NAME OF A SMALL NETWORK
- THE TECHNICAL NAME FOR A NETWORK CABLE
- THE EARLY VERSION OF THE INTERNET
- USED TO COMMUNICATE WITH OTHERS VIA THE INTERNET
19 Clues: PRESIDENT TRUMP'S FAVOURITE • THE GUY THAT INVENTED THE WWW • THE CODE USED TO WRITE WEB PAGES • USED TO CONNECT NETWORKS TOGETHER • THE EARLY VERSION OF THE INTERNET • USED TO LOOK AT CONTENT ON THE WEB • THE MOSTLY USED SOCIAL NETWORK PAGE • THE TECHNICAL TERM FOR A WEB ADDRESS • THE TECHNICAL NAME FOR A NETWORK CABLE • THE INTERCONNECTED NETWORK OF NETWORKS • ...
Windows Operating System 2024-10-08
Across
- - Known for its friendly interface and reliability.
- - Designed for home networks to manage data.
- - A version of Vista designed for business users.
- - The latest version with a new interface and features.
- - Combines desktop and mobile features with regular updates.
- - A professional version of Windows 10 with advanced features.
- - The first graphical operating system for PCs.
- - Improved internet features and hardware support.
- - An update to Windows 8 with improved usability.
- - A professional OS designed for networks and servers.
Down
- - A business-oriented version of Windows XP.
- - Early version with better graphics and multitasking.
- - Designed for server management and networking.
- - A version of Windows for server management.
- - A stable version aimed at businesses and professionals.
- - Better performance and user-friendly design than Vista.
- - Introduced the Start menu and a new user interface.
- - Introduced a touchscreen-friendly, tile-based interface.
- - Featured enhanced visuals and security improvements.
- - Focused on home users with multimedia features.
20 Clues: - A business-oriented version of Windows XP. • - Designed for home networks to manage data. • - A version of Windows for server management. • - The first graphical operating system for PCs. • - Designed for server management and networking. • - A version of Vista designed for business users. • - An update to Windows 8 with improved usability. • ...
Computer Network 2025-09-16
Across
- of dividing large IP packets into smaller pieces. (FRAGMENT)
- of virtual circuit, a connectionless model. (DATAGRAM)
- routing protocol that uses areas. (OSPF)
- of breaking messages into smaller units for transmission. (PACKETIZING)
- method for delivering data to multiple receivers. (MULTICAST)
- gateway protocol for inter-domain routing. (BGP)
- multiple networks together. (INTERNETWORKING)
- network service model. (VC)
- protocol of the internet for addressing and routing. (IP)
- used for error reporting and diagnostics. (ICMP)
Down
- by the network to applications, defines performance and guarantees. (SERVICE)
- path forwarding multicast routing protocol. (DVMRP)
- to evaluate the “cost” of a route in routing algorithms. (METRICS)
- that assigns IP addresses dynamically. (DHCP)
- internet protocol with larger address space. (IPV6)
- vector routing protocol used in small networks. (RIP)
- used to map IP to MAC addresses. (ARP)
17 Clues: network service model. (VC) • used to map IP to MAC addresses. (ARP) • routing protocol that uses areas. (OSPF) • that assigns IP addresses dynamically. (DHCP) • multiple networks together. (INTERNETWORKING) • gateway protocol for inter-domain routing. (BGP) • used for error reporting and diagnostics. (ICMP) • path forwarding multicast routing protocol. (DVMRP) • ...
7th Entrepreneurship & Computer Networks 2022-03-21
Across
- an amount of money that is made from
- a plan to improve your business
- a goal that you had for your market
- a letter to contact a prospective employer
- a sale of a unit of items
- losing all your money mostly by lowns
- where your total revenue equals your total cost
- when you make a product and sell it
- Something you benefit and get money from
Down
- someone who makes the finished project
- a thing that is legal separate from its owners
- a place to store data
- an idea that you are making for your business
- sharing thing with other business people or groups
- a job that has lots of professionals
- Making a product and putting a price
- Something you fill out to get a job
- someone that sells the things that you produce
- something that is almost owned by one compony
- A place to buy things
- something you do with someone else
21 Clues: a place to store data • A place to buy things • a sale of a unit of items • a plan to improve your business • something you do with someone else • a goal that you had for your market • Something you fill out to get a job • when you make a product and sell it • an amount of money that is made from • a job that has lots of professionals • Making a product and putting a price • ...
Data Communications & Networks I 2012-10-07
Across
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- The fundamental analog signal is called a ___________.
- Ethernet LANs use___________ for signaling.
- The input and output connections on a multiplexer are called:
- T-1 systems use ___________ for signaling.
- DS stands for:
- The smallest element of data.
- A ________ pathway between two nodes or devices.
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- Is used to "wake" the receiver.
- ASCII, Extended ASCII and Unicode are examples of:
- signal When we speak into a standard telephone today our voice is represented by
- Particular format of electrical pulses.
Down
- The frequency range required for transmitting.
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
- A simple waveform used internally in digital electronic equipment and personal computers is:
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- What kind of sign transmits light pulses over a glass fiber?
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- The most common technique for voice digitization is called:______ Modulation
- When a pulse has the same polarity as the preceding pulse this is called______
- The gradual loss of a transmission signal as it travels over a distance is called:
- A transmission mode in which information can only be transmitted in one direction.
- The most common topology used in LAN implementation is the?
- The device/process used to convert analog signals into digital signals is called a:
- A set of specific rules and procedures for the control of communications in a network is called a:
27 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • A ________ pathway between two nodes or devices. • ASCII, Extended ASCII and Unicode are examples of: • ...
Data Communications & Networks II 2012-10-07
Across
- At the TCP/IP network access layer, the protocol data unit is called a ___________.
- At this layer, speed and latency are of the utmost concer...
- Another name for CIDR is:
- A short range device used for ID cards, security devices and can replace UPC code.
- A condition when a communications link, path or network experiences a load that exceeds it's capacity is ___________.
- MAN stands for:
- UDP Protocol is ___________ technology.
- Which harware device might be found in the access layer of the Cisco model?
- Acronym for Classless Inter-Domain Routing
- PING stands for __________.
- The TCP/IP Internet layer corresponds to the OSI ___ layer.
- Acronym for Wide Area Network
- The first 48 bits of an Ethernet frame is the ________.
- If multiple errors are detected in an ATM packet the packet is:
- Bandwidth is typically represented in bits per ________.
Down
- At the TCP/IP host-to-host layer the protocol data unit is called a ____________.
- At the TCP/IP internet layer the protocol data unit is called a __________.
- CSU stands for:
- The TCP/IP host-to-host layer corresponds to the OSI____ layer.
- ATM stands for:
- Implementing dynamic NAT automatically creates a __________ between your internal network and outside networks.
- Filtering, flooding and transmitting frames is the function of a _____________.
- A disadvantage of satellite communication is a ______ delay
- The transmission of light pulses over glass fiber is called _________ signaling.
- TCP Protocol is ________ circuit technology.
- Particular format of electrical pulses.
- An example of a routed protocol would be ____.
- The inter-network processor that is an interface between two different or dissimilar networks.
- An increasingly popular method of distributing network at home is the _ _ _ _.
- Older network designs always placed the router at the ______ of the network.
30 Clues: CSU stands for: • ATM stands for: • MAN stands for: • Another name for CIDR is: • PING stands for __________. • Acronym for Wide Area Network • UDP Protocol is ___________ technology. • Particular format of electrical pulses. • Acronym for Classless Inter-Domain Routing • TCP Protocol is ________ circuit technology. • An example of a routed protocol would be ____. • ...
OCR Computer Science Networks 2024-04-16
Across
- Techniques to exploit humans on a computer network
- When a cable is used by multiple connections
- Hardware number for each device
- Attack type where a network is overloaded with lots of traffic
- Bluetooth is an example of this
- Attack type where lots of possibilities to a login is attempted
- Connection type where each device hosts services
- Software that causes harm to a computer
- Network device that connects multiple devices together
- A device's location on a network
- Connection type where one device hosts all services
Down
- Protocol for converting URLs into IP Addresses
- Piece of hardware that allows a computer to connect to a network
- A very large WAN
- A type of network with devices spread over a large geographical area
- Connection to a network when you are on another network on the internet
- A device that connects two networks together
- A device that hosts files/services
- Topology where there is one central device
- Small piece of data that is transmitted over a network
- Connection type that is more secure and faster
- Portion of the internet that stores web pages
- Software that renders web pages
- Topology where each device connects to multiple other devices
- COnnection type where is is easier to add another device
- A device that connects to a server
- The rate at which data is transmitted on a network
27 Clues: A very large WAN • Hardware number for each device • Bluetooth is an example of this • Software that renders web pages • A device's location on a network • A device that hosts files/services • A device that connects to a server • Software that causes harm to a computer • Topology where there is one central device • When a cable is used by multiple connections • ...
Computer 2025-05-28
Across
- | Any device connected to a network
- | A unique number given to every device on a network
- | Software used to explore websites
- | Changes website names into numerical addresses
- | A set of rules for digital communication
- | A wireless method of connecting to a network
- | Connects multiple devices within a network
- | A small area network, used at home or in offices
Down
- | A computer that provides data or services to others
- | Directs data between different networks
- | Protects a network from unauthorised access
- | Maximum amount of data that can be transferred
- | A common wired connection for local networks
- | Device that connects computers to the internet via telephone lines
- | A network covering a large geographical area
15 Clues: | Any device connected to a network • | Software used to explore websites • | Directs data between different networks • | A set of rules for digital communication • | Connects multiple devices within a network • | Protects a network from unauthorised access • | A common wired connection for local networks • | A wireless method of connecting to a network • ...
Tech Talk:A Crossword on Networking 2025-06-09
Across
- A device that connects networks
- Provides internet access to devices
- A small network,often in homes or schools
- A set of rules in data communication
- A main computer in a network
- A large network connecting countries
- Address A unique number identifying a device on a network
- A area where two devices exchange data
Down
- This protects networks from threats
- A network device that is used to connect all the computer in a network with each other
- A address identifying websites
- A type of cable used in weird connections
- Connects multiple devices in a network
- A wireless internet technology
- A computer network that is mainly created for an individual person
15 Clues: A main computer in a network • A address identifying websites • A wireless internet technology • A device that connects networks • This protects networks from threats • Provides internet access to devices • A large network connecting countries • A set of rules in data communication • Connects multiple devices in a network • A area where two devices exchange data • ...
Networking Concepts 2025-06-07
Across
- : Converts digital data into signals for transmission
- : Internet-based storage and computing services
- : Unauthorized access to or manipulation of computer systems
- : Software designed to detect and remove malicious software
- : Wireless networking technology
- : Fraudulent attempt to obtain sensitive information
- : Principles that govern behavior in digital environments
- : Local Area Network, usually within a building
- : Malicious software intended to harm or exploit systems
- : Device that forwards data packets between networks
Down
- : Process of converting data into code to protect it
- : Secret word or phrase to access a system or data
- Address : Unique number assigned to each device on a network
- : Security system that controls incoming and outgoing traffic
- : Global system of interconnected networks
15 Clues: : Wireless networking technology • : Global system of interconnected networks • : Internet-based storage and computing services • : Local Area Network, usually within a building • : Secret word or phrase to access a system or data • : Process of converting data into code to protect it • : Fraudulent attempt to obtain sensitive information • ...
social networks 2013-11-21
Across
- to keep your things safe
- fake profiles
- your own things
- where you type in facebook
Down
- to contact people where they can see your face
- the thing to tell your information to close friends
- its what you press you block sombody from seeing your things or messaging you
- a social network that is often what peadifiles use
- the thing you use to log in or to contact humans
9 Clues: fake profiles • your own things • to keep your things safe • where you type in facebook • to contact people where they can see your face • the thing you use to log in or to contact humans • a social network that is often what peadifiles use • the thing to tell your information to close friends • its what you press you block sombody from seeing your things or messaging you
Computer Networks 2019-03-01
Across
- data is split into... and sent across the network
- What you desperately need every time you go on social media
- a procedure or rule
- how much data can be processed at a time
- connecting a number of computers to form a local network
- Domain names server
Down
- many computers connected together
- a number given to any computer with internet access
- used to connect things together
9 Clues: a procedure or rule • Domain names server • used to connect things together • many computers connected together • how much data can be processed at a time • data is split into... and sent across the network • a number given to any computer with internet access • connecting a number of computers to form a local network • ...
Wireless Networks 2020-10-24
technology 2023-05-08
Across
- perceiving, synthesizing, and inferring information
- describes a wide range of technologies that reduce human intervention in processes
- the activity of electronically buying or selling
- a set of computer programs and associated documentation and data
- the use of computers to create,process, store, retrieve and exchange all kinds of data and information.
Down
- includes the physical parts of a computer
- is the protection of computer systems and networks from attack by malicious actors
- a family of wireless network protocols based on the IEEE 802.11 family of standards
- the transfer of information between two or more points without the use of an electrical conductor.
- a database is an organized collection of data stored and accessed electronically.
- the global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
- is the most important processor in a given computer.
- a device that accepts information (in the form of digitalized data)
- a scientific and engineering discipline that studies and applies the principles of physics to design, create, and operate devices that manipulate electrons and other charged particles.
- the application of scientific knowledge for practical purposes, especially in industry.
15 Clues: includes the physical parts of a computer • the activity of electronically buying or selling • perceiving, synthesizing, and inferring information • is the most important processor in a given computer. • a set of computer programs and associated documentation and data • a device that accepts information (in the form of digitalized data) • ...
JCromwell - Network Devices 2023-01-04
Across
- A generic name for all-in-one security appliance
- passively monitors traffic on the network
- Is a type of NIC that is used to connect to 802.11 wireless networks.
- introduced to divide LANs into segments, it keeps a record of all the devices on each segment it can also then filter network traffic between LAN segments.
- an access point provides network access to wireless devices, such as laptops and tablets.
- can have all the functionality of a switch or a wireless AP.
- _______ switches come with additional features that the network administrator can configure to improve the functionality and security of the network.
- ___________ network controller is a device in the cloud that allows administrators to manage network devices.
- Is primarily used to regenerate weak signals.
Down
- legacy systems have ________ microchips
- responds immediately and does not allow any malicious traffic to pass
- protects data and equipment on a network from unauthorized access
- This type of NIC is connected to the usb slot and is used to access networks.
- extends the reach of a network because it regenerates the electrical signal.
- This type of NIC is used to connect to Ethernet networks.
- _____ panels can be powered or unpowered.
- _________ switches are less complicated and expensive.
- is a method for powering devices that don’t have a battery or a access to a power outlet.
- an endpoint management server can _______ an end devices connection to the network.
19 Clues: legacy systems have ________ microchips • passively monitors traffic on the network • _____ panels can be powered or unpowered. • Is primarily used to regenerate weak signals. • A generic name for all-in-one security appliance • _________ switches are less complicated and expensive. • This type of NIC is used to connect to Ethernet networks. • ...
nweg crossword 2024-08-13
Across
- - Clue: "A device that forwards data packets between computer networks."
- - Clue: "A hardware component that allows a computer to connect to a network."
- - Clue: "A system that translates domain names into IP addresses."
- - Clue: "The amount of data processed by a system in a given amount of time."
- Address - Clue: "A unique string of numbers separated by periods that identifies each computer using the Internet Protocol."
- - Clue: "A service that encrypts your internet traffic and protects your online identity."
- - Clue: "A device that connects devices in a network and uses packet switching to forward data."
- - Clue: "A unit of data that is routed between an origin and a destination on the internet or other networks."
- - Clue: "The maximum rate of data transfer across a given path."
- Balancing - Clue: "Distributing network or application traffic across multiple servers."
- - Clue: "A server that acts as an intermediary for requests from clients seeking resources from other servers."
Down
- - Clue: "The variability in packet arrival times."
- - Clue: "The delay before a transfer of data begins following an instruction."
- - Clue: "The practice of dividing a network into two or more smaller networks."
- - Clue: "The process of converting information into a code to prevent unauthorized access."
- - Clue: "A network security system that monitors and controls incoming and outgoing network traffic."
- - Clue: "The time taken for a data packet to travel from source to destination."
- - Clue: "A unique name that identifies a wireless network."
- - Clue: "A network management protocol used to dynamically assign IP addresses."
- - Clue: "A mechanism that ensures the efficient use of network resources."
20 Clues: - Clue: "The variability in packet arrival times." • - Clue: "A unique name that identifies a wireless network." • - Clue: "The maximum rate of data transfer across a given path." • - Clue: "A system that translates domain names into IP addresses." • - Clue: "A device that forwards data packets between computer networks." • ...
Mixed: Intermediate/Advanced 95 2024-02-09
BYTETRAIL 13 2025-02-25
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
BYTETRAIL 13 2025-02-25
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
Network Devices P Savelle 2023-01-03
Across
- in larger networks, administrators typically use managed switches so it can be configured with a ____ and port security
- air gapping is the process of physically _______ legacy systems from other networks and the internet
- this device provides network access to wireless devices like laptops
- firewalls use ___ to determine what is permitted and what is denied from network access
- this network interface card connects to 802.11 WIFI standard
- switches uses the switching ____ to determine which port to use to reach the MAC address
- this device extends how far a signal can travel
- _____ systems provide dedicated input and output instructions to a specialized device
Down
- this device is used as a place to collect incoming cable runs from various networking devices throughout a facility
- ______ switches don't have a management interafce
- hubs regenerate the electrical signal which extends the reach of the _____
- this operation responds immediately and does not let malicious traffic to pass
- bridges reduce the amount of _____ between devices
- ___ is a method for giving power to devices that dont have a bettery or dont have access to a power outlet
- in larger networks, this device connects to switches which then connects to LAN's
- endpoint management servers can _____ end devices connection to a network if it does not meet the criteria
- this device includes all of the functionality of IDS/IPS as well as firewall services
- what other form factor are NIC's available in?
- this operation passivley monitors traffic on a network
19 Clues: what other form factor are NIC's available in? • this device extends how far a signal can travel • ______ switches don't have a management interafce • bridges reduce the amount of _____ between devices • this operation passivley monitors traffic on a network • this network interface card connects to 802.11 WIFI standard • ...
Data Communications & Networks I 2012-10-07
Across
- T-1 systems use ___________ for signaling.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- A transmission mode in which information can only be transmitted in one direction.
- When a pulse has the same polarity as the preceding pulse this is called______
- The device/process used to convert analog signals into digital signals is called a:
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- ASCII, Extended ASCII and Unicode are examples of:
- FHSS is an important feature of this.
- DS stands for:
- The most common topology used in LAN implementation is the?
- The most common technique for voice digitization is called:______ Modulation
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- What kind of sign transmits light pulses over a glass fiber?
- A simple waveform used internally in digital electronic equipment and personal computers is:
Down
- Is used to "wake" the receiver.
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- A ________ pathway between two nodes or devices.
- The smallest element of data.
- signal When we speak into a standard telephone today our voice is represented by
- The input and output connections on a multiplexer are called:
- Ethernet LANs use___________ for signaling.
- The frequency range required for transmitting.
- A set of specific rules and procedures for the control of communications in a network is called a:
- A PAN protocol that is popular in home automation controls.
- The gradual loss of a transmission signal as it travels over a distance is called:
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- The fundamental analog signal is called a ___________.
- Particular format of electrical pulses.
- What is the acronym for Personal Area Network?
30 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • FHSS is an important feature of this. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • What is the acronym for Personal Area Network? • ...
Careers at eGov Jamaica Limited 2025-01-22
Across
- Install, configure, and maintain organizations’ computer networks and systems
- Define, develop, test, analyze, and maintain new software applications in support of the achievement of business requirements
- Preserving of the integrity, accuracy and privacy of all records
Down
- Creating or updating layouts of a specific space using software
- Use data to form business insights and recommend changes in businesses and other organizations
- Build the systems used to protect computer systems and networks and track incidents
- Support, troubleshoot, and maintain computer servers and networks
- Build, maintain and strengthen a company's relationship with a client
- Sources and purchases goods and services on behalf of their organization
- A person authorized to review and verify the accuracy of records
10 Clues: Creating or updating layouts of a specific space using software • Preserving of the integrity, accuracy and privacy of all records • A person authorized to review and verify the accuracy of records • Support, troubleshoot, and maintain computer servers and networks • Build, maintain and strengthen a company's relationship with a client • ...
COSC CrossWord 2016-02-24
Across
- stands for Hypertext Markup Language
- a group of information on a computer that can be opened by programs
- suffix added to a file to indicate the name of the app to run
- preferred type of language when writing for the web
- preferred type of navigational system
- agency that governs fair use
- networks that are not geographically close
- stands for domain name system
- HTML indicator that labels a format
- reference to a resource on the internet
Down
- can be embedded in web pages
- networks that are geographically close
- legal permission to produce or copy a product
- used to view web pages
14 Clues: used to view web pages • can be embedded in web pages • agency that governs fair use • stands for domain name system • HTML indicator that labels a format • stands for Hypertext Markup Language • preferred type of navigational system • networks that are geographically close • reference to a resource on the internet • networks that are not geographically close • ...
Priya's NWEG Crossword Puzzle 2023-08-29
Across
- Converting data into a secure code to prevent unauthorized access during transmission.
- Devices that direct data packets between networks, determining optimal paths for transmission.
- Verifying the identity of users, devices, or systems accessing the network.
- The ability of a network to handle increased traffic and growth without performance degradation.
- The flow of data packets through a network, varying in volume and type.
- The speed, efficiency, and effectiveness of network operations and data transmission.
- The ability of devices to establish and maintain connections within a network.
Down
- The time delay between sending and receiving data across a network, affecting response time.
- Establishes secure connections over public networks, ensuring privacy.
- The underlying framework and components that support network operations.
- Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
- The consistency and stability of network operations and services.
- Converting data into a secure code to prevent unauthorized access during transmission.
- Duplication of critical network components to ensure availability in case of failures.
- The capacity of a network to transmit data quickly, often measured in bits per second.
- Security devices that control incoming and outgoing network traffic based on predefined rules.
- Devices that connect devices within a local network and facilitate data exchange.
- Measures to protect network data from unauthorized access, breaches, and cyber threats.
- Continuous observation of network activities and performance for troubleshooting and optimization.
- The amount of data that can be transmitted successfully over a network in a given time.
20 Clues: The consistency and stability of network operations and services. • Establishes secure connections over public networks, ensuring privacy. • The flow of data packets through a network, varying in volume and type. • The underlying framework and components that support network operations. • ...
byte trail 0 2025-03-05
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
Computer Networking Quiz 2023-02-06
Across
- Email is the exchange of computer-stored messages from one user to one or more recipients via the internet.
- a series of numbers that identifies any device on a network
- a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
- a worldwide system of computer networks
- a set of computers sharing resources to communicate
- a basic unit of data that's grouped together and transferred over a computer network,
- A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
Down
- the transfer of data from one digital device to another.
- Where you physical plug your computer or a docking station into a wall jack.
- computer networks that are not connected by cables of any kind.
- a measure of the data transfer rate or capacity of a given network.
- a computer program or device that provides a service to another computer program.
- An established set of rules that determine how data is transmitted between different devices in the same network.
- Networking hardware used to connect one network device to other network devices.
- a physical or virtual appliance that passes information between two or more packet-switched computer networks.
- A set of physical or network devices that are essential for communication.
16 Clues: a worldwide system of computer networks • a set of computers sharing resources to communicate • the transfer of data from one digital device to another. • a series of numbers that identifies any device on a network • computer networks that are not connected by cables of any kind. • a measure of the data transfer rate or capacity of a given network. • ...
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
World Wide Web and Applications of Computers 2024-03-30
Across
- Users
- finances
- process to convey information
- research
- connects computer networks
- teachers
- written questions
- process in web
- Surfing
- storage of websites
- an operation
Down
- doctors
- input data and instructions
- farm
- Designs and Build
- used to sell products
- drawing conclusions
- soldiers
- a technological device
- products and services
20 Clues: farm • Users • doctors • Surfing • finances • research • soldiers • teachers • an operation • process in web • Designs and Build • written questions • drawing conclusions • storage of websites • used to sell products • products and services • a technological device • connects computer networks • input data and instructions • process to convey information
Times 2 by Kerry Simpson 2013-02-22
Across
- The IP address of the original computer.
- Uses short-range radio links.
- A set of protocols defined by 7 layers.
- What happen when you have identical IP's on two different networks.
- Network address ranges are divided into A,B,C.
- Appended to the data before transmission.
- Uses only 10% of the software of Bluetooth.
- Extends the range of traditional Ethernet wirelines
- The most commonly used twisted pair wire.
- The NAT that maps unregistered IP's to registered IP's.
- A type of network use as campus LAN.
- Used to control un-acknowledged data segments.
- A high level route representing many lower level routes.
- The ports that can be duplicate without respect to the application
- A device where every port is it's own separate segment.
- The number that can be sub netted when using CIDR.
Down
- Uses SMTP
- Acts on behalf of another device.
- Makes interconnection possible for networks.
- The IP address of the receiving computer.
- This layer provides mechanical interface.
- Guaranteed bandwidth between and two locations.
- A type of switch most commonly found in large WAN networks
- Exceeds load capacity.
- This layer does data reformatting
- Each wire of a 4-pair UTP.
- Converts layer 3 IP to layer 2 MAC address.
- The type of address that are 32 bits long and 4 bits at a time.
- Confined to line of sight.
- Covers unlimited geographical area.
- Maintains and/or terminates connections.
- Cuts communication on or off between two computers.
- Uses the digits 0 and 1
33 Clues: Uses SMTP • Exceeds load capacity. • Uses the digits 0 and 1 • Each wire of a 4-pair UTP. • Confined to line of sight. • Uses short-range radio links. • Acts on behalf of another device. • This layer does data reformatting • Covers unlimited geographical area. • A type of network use as campus LAN. • A set of protocols defined by 7 layers. • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
study crossword 2019-10-11
Across
- advanced research projects agency network
- made for computers to communicate seamlessly
- global system of interconnected computer networks
- defense advanced research project agency
- application software
Down
- small bits of data sent from a file
- blocks data until ransom is paid
- operating software by Microsoft
- way to check if website is good
9 Clues: application software • operating software by Microsoft • way to check if website is good • blocks data until ransom is paid • small bits of data sent from a file • defense advanced research project agency • advanced research projects agency network • made for computers to communicate seamlessly • global system of interconnected computer networks
Computer Science-Networks 2019-05-17
Across
- computer on a network
- gaining unauthorised access to a computer or data
- connects computers to form a network
- network of your own devices
- wireless technology for transmitting data
- computers that cover a small area
Down
- network that spans across countries
- system to protect against unauthorised access
- cable used to connect computers to the network
- hardware used to connect multiple devices
- computer that holds data to be shared with other computers
- data sent between devices
- rules for how messages are sent across network
13 Clues: computer on a network • data sent between devices • network of your own devices • computers that cover a small area • network that spans across countries • connects computers to form a network • hardware used to connect multiple devices • wireless technology for transmitting data • system to protect against unauthorised access • cable used to connect computers to the network • ...
IB ITGS - Networks 2012-11-30
Across
- a connection with much greater bandwidth than modems have
- a network where the computers are close to each other
- a type of network that uses high speed fiber optics to transfer data
- is a method of connecting LAN's or connecting a device to the internet wirelessly
- a netwrok spread over a large area, like the Internet
- fake sites that try to retrieve the user information by tricking the user to believe that it is the real site, they are usually opened because of a type-o
Down
- blocks unauthorized data transfers
- messages that people do not want, that waste their time
- is a way for devices to comunicate with each other wirelessly, mostly used with accessories
- broadcasts messages to all devices
- a user of a network also called a node
- improved version of a hub, can carry multiple messages of the network
- enables every computer to be the client and the server on the network
13 Clues: blocks unauthorized data transfers • broadcasts messages to all devices • a user of a network also called a node • a network where the computers are close to each other • a netwrok spread over a large area, like the Internet • messages that people do not want, that waste their time • a connection with much greater bandwidth than modems have • ...
TV Production Chapter 1 Vocab 2024-10-15
Across
- What type of tv is used to communicate relevant information to a specific audience.
- Home Video records ____________events and activites
- Franklin Delano Roosevelt delivered the first ___________________ speech in 1939.
- Closed circuit TV (CCTV) is where the signal is sent through wires and serves only extremely small, private, ________________________ area.
- One of the most famous examples of home video is the Zapruder film of the assassination of President ________________.
- Commercial broadcast television is a type of tv production facility is for profit but the signal is sent through an ____________________
- TV that aims to inform the public is ___________________ television
- A tv ad for a product or service
Down
- Small scale video production companies mainly produce ______________ events and commercials for local businesses.
- A broadcast station that plays content of a specific network
- Subscriber television fee for service programming where customers pay scheduled fees and the signals are transported by _______________ transmission or underground cables
- The process of making a specified number of program episodes available for lease to other networks for a fee.
- The television signal travels through the air from one antenna to another antenna
- Local origination is programming made in a specific ______________________ area.
- A corporation that bundles programming and makes it available to affiliates .
- Large scale video production companies produce multi camera large budget programming gor broadcast ______________ or cable networks.
- A form of CCTV that is usually used for security
17 Clues: A tv ad for a product or service • A form of CCTV that is usually used for security • Home Video records ____________events and activites • A broadcast station that plays content of a specific network • TV that aims to inform the public is ___________________ television • A corporation that bundles programming and makes it available to affiliates . • ...
Las redes sociales 2017-01-26
15 Clues: too • users • I post • laptop • a post • message • to post • networks • to share • a tablet • connection • email (6-11) • to send (e...) • to send (m...) • chatrooms (4/2/4)
Unidad 2: La ciencia y tecnología 2025-04-26
Across
- Scientist
- To download
- Progress
- Invention
- Surgery
- Connections
- sociales Social networks
- electrónicos Electronic devices
- Advancement
- Password
- Thread
- Physiology
- To access
- Physics
- Report
- Biology
- Computer science
- To charge
Down
- Survey
- Innovation
- Graphics
- Engineer
- Wireless
- Research/investigation
- Data
- Access
- Statistics
- Link
- Surgeon
29 Clues: Data • Link • Survey • Access • Thread • Report • Surgery • Physics • Surgeon • Biology • Progress • Graphics • Engineer • Wireless • Password • Scientist • Invention • To access • To charge • Innovation • Statistics • Physiology • To download • Connections • Advancement • Computer science • Research/investigation • sociales Social networks • electrónicos Electronic devices
Word Wall 2021-08-25
20 Clues: list • nanny • goals • scrape • ration • increase • affection • authorized • evaluation • abnormality • better suited • possibilities • immune response • allergic reaction • clear and distinct • injury caused by heat • learning through listening • most advanced stage of HIV • functional neural networks • suitable for a particular age
Chapter 5 - Networks 2021-07-15
Across
- used to surf the Internet
- device required to connect to the ISP
- a device used to provide a wired connection to wireless devices in a network
- a computer that shares its resources with connected devices
- connects 2 different networks
- a type of cable
- an ISP in Sri Lanka
Down
- method used to identify a device on a network
- when two or more computers are connected togther and communication and sharing of resources take place
- a devices address on the Internet
- they transfer data in the form of light
- a devices used to connect multiple wired devices in a network
- any device that wants to connect to a network needs this component
13 Clues: a type of cable • an ISP in Sri Lanka • used to surf the Internet • connects 2 different networks • a devices address on the Internet • device required to connect to the ISP • they transfer data in the form of light • method used to identify a device on a network • a computer that shares its resources with connected devices • ...
intro to networks 2024-01-10
Across
- network which is larger than a LAN but smaller than a WAN,which can cover several buildings in a single city, such as a university campus.
- is a network client which is a device or software that can work both online and offline
- network covering a small area such as a single building.
- a network owned by single company or organization
- network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
- wireless local area network
Down
- network that is centered around a person or their workspace.
- which allows a device to access a LAN without a wired connection.
- is a group of two or more computers connected with one another for the purpose of sharing data and resources
- a network owned by communication carrier eg telecoms such as China mobile, china telecom, china Unicom.
- network that uses separate dedicated servers and specific client workstations.All client computers are connected to the dedicated servers.
- is a network client dependent on access to server for constant access to files and to allow apps run uninterrupted
- network covering a very large geographical area such as a country or continent.
13 Clues: wireless local area network • a network owned by single company or organization • network covering a small area such as a single building. • network that is centered around a person or their workspace. • which allows a device to access a LAN without a wired connection. • network covering a very large geographical area such as a country or continent. • ...
Data Communication Networks 2023-11-06
13 Clues: OSI • LAN • TCP/IP • IEEE802.11 • IEEE 802.22 • IEEE 802.16 • Set of Rules • Mbps to Gbps • Wireless LAN Technology • Energy Efficient Metrics • Perfomance,Relaiability,Security • Elelctroncis Industries Association • Test, Evaluate and standardize new technologies
Internet Hardware 2022-10-03
Across
- local area network
- a computer system that hosts websites
- Wide area network
- This is a cable that is used to connect multiple devices
- A boxy device that directs traffic between networks and devices
- multiple devices that communicate with each other
Down
- Where multiple devices are connected to a central hub
- A boxy device that connects a device to the internet
- A network of routers that create a single wireless network connection
- wireless access point
- This is a physical or software barrier between secured networks and outside connections
- network interface card
12 Clues: Wide area network • local area network • wireless access point • network interface card • a computer system that hosts websites • multiple devices that communicate with each other • A boxy device that connects a device to the internet • Where multiple devices are connected to a central hub • This is a cable that is used to connect multiple devices • ...
