networks Crossword Puzzles
Nervous System 2021-09-24
Across
- nerve networks formed from merging of anterior rami with one or more adjacent anterior rami
- transmits impulses to skeletal muscle
- fine filament of connective tissue that extends from conus medullaris
- thin, intermediate layer surrounding brain and spinal cord
- innervates organs and conveys visceral efferent and afferent fibers to and from organs of the body cavities
- saw tooth like fibrous sheets of pia
- outer layer of dura mater formed by periosteum covering internal surface of calvaria
- in or on wall of target organ
- delicate, internal layer surrounding brain and spinal cord
Down
- contains cell bodies of sensory neurons
- tapered inferior end of spinal cord located at L1/L2 vertebral level
- bundle of nerve roots of spinal nerves caudal to L2 vertebra
- enlargement of the subarachnoid space in the dural sac caudal to conus medullaris
- dural infolding between the cerebral hemispheres
- partial partitions of dura between parts of the brain providing support
- tough, thick, external fibrous layer surrounding brain and spinal cord
- dural infolding between the hemispheres of the cerebellum
- dural infolding superior to the cerebellum
- includes sympathetic and parasympathetic divisions
- inner layer of dura mater, strong fibrous membrane continuous at the foramen magnum with dura mater covering spinal cord
20 Clues: in or on wall of target organ • saw tooth like fibrous sheets of pia • transmits impulses to skeletal muscle • contains cell bodies of sensory neurons • dural infolding superior to the cerebellum • dural infolding between the cerebral hemispheres • includes sympathetic and parasympathetic divisions • dural infolding between the hemispheres of the cerebellum • ...
Unit 2/3 Test Review 2021-10-07
Across
- In 1984 _____ introduced the first OS with icons and windows.
- Last name of the man who developed the first computer mouse.
- Moral standards or values
- The program used to find a view web pages.
- A network in close proximity
- A group of 8 bits.
- This feature allows users to comb the internet to find something in particular.
- The abbreviation/name of the first computer built in 1946.
- _____+F allows users to search on a single webpage to find desired text.
- Claiming someone else's work as your own.
- This professor stated computing power doubles approx. every 2 years.
- When one computer/device is connected to another a ____ is created.
- Computers use these to prevent unauthorized network access.
Down
- Pretending to be someone else to open accounts/spend money
- The results of your search are called:
- A group of 1000/1024 bits.
- Powerful computers that host the files found on the internet.
- An message that is unsolicited and often sent to many recipients.
- This lead to rapid computer development in the 1960's.
- The proper name for a link to another webpage.
- We use Windows/File ____ in Windows OS to view/manage files.
- A combination of computer networks that spans the Earth.
- A network covering a large area
23 Clues: A group of 8 bits. • Moral standards or values • A group of 1000/1024 bits. • A network in close proximity • A network covering a large area • The results of your search are called: • Claiming someone else's work as your own. • The program used to find a view web pages. • The proper name for a link to another webpage. • This lead to rapid computer development in the 1960's. • ...
Coding 2021-08-26
Across
- a website used for coding things onto a microbit
- When people create instructions for a computer to do
- statistics collected together for reference or analysis
- wireless network used to send information through radio waves
- A set/collection of telecommunication networks 2w
- _______ means that you are connected to the internet
- A group of servers and computers that are all connected to each other.
- A collection of web pages
- Tells the computer what to do/makes a set of programs for the computer to do
- computers that are only used to provide things for other computers
- a service that translates URLs into IP addresses.
Down
- A set of rules to follow to find the answer to a problem
- the power/knowledge of a computer to help solve a problem.2w
- pieces of your information that you leave on the internet 2w
- items used in our daily lives eg. computers, phones and ipads
- The language that programmers use to instruct a computer on what to do
- A small device used for coding
- easy to remember name for a web page
- A number given to an item that is connected to the internet.2w
- It is normally shown in 1 and 0.
20 Clues: A collection of web pages • A small device used for coding • It is normally shown in 1 and 0. • easy to remember name for a web page • a website used for coding things onto a microbit • A set/collection of telecommunication networks 2w • a service that translates URLs into IP addresses. • When people create instructions for a computer to do • ...
Credit Crossword 2022-03-14
Across
- close ended credit accounts
- when you put a security deposit on your card
- when your loan isnt tied to an asset
- when you owe money
- a credit card reward where you get money back
- the type of credit that is on credit cards
- your history of your credit card spendings and payments
- the money that builds up over time
- interest rate that doesnt change
- loans with extreme interest rates if you dont pay them back in time
Down
- a loan for a vehicle
- a loan you take out for yourself
- things you earn by using your credit card
- what you pay with that takes money directly from your account
- one of the two credit card networks that will issue credit cards
- interest rate that changes
- your rating that you have that credit companies look at before giving you a loan
- the only source of revolving credit
- the credit card set up that allows parents to pay if a student can't
- points that you get for using your credit card
- a loan for your home
- Renting for a car
- what you use to pay for something under $10
- what you take out to get money now
24 Clues: Renting for a car • when you owe money • a loan for a vehicle • a loan for your home • interest rate that changes • close ended credit accounts • a loan you take out for yourself • interest rate that doesnt change • the money that builds up over time • what you take out to get money now • the only source of revolving credit • when your loan isnt tied to an asset • ...
Thulo.ST10095843 2022-03-24
Across
- The maximum capacity data is transmitted over an internet connection, measured in bits per second.
- How many layers are in the OSI model?
- A device that communicates between your phone and the internet.
- The heart of the OSI model
- A word for inconsistency of packets arrival in a network.
- A hardware device used to connect to other devices using ethernet cables.
- What does TCP stand for?
- The ability to continue operation despite component failures.
- A small unit of data sent through IP/TCP networks.
- A set of rules that determine how data is transmitted between devices in a network.
- How much data can be transferred from one location to another in a period of time.
Down
- Physical layer, data link layer and network layer are all part of which model?
- A hardware component that connects the computer to a computer network?
- What is used to transfer data to and from a link adapter?
- A digital pathway used to transfer data between components in a computer, and devices connected to the computer.
- Lag or delay in communication over the internet.
- Packets not reaching their destination.
- What does IP stand for?
- A storage unit for data for an adapter.
- Two or more computer connected together to share resources.
20 Clues: What does IP stand for? • What does TCP stand for? • The heart of the OSI model • How many layers are in the OSI model? • Packets not reaching their destination. • A storage unit for data for an adapter. • Lag or delay in communication over the internet. • A small unit of data sent through IP/TCP networks. • What is used to transfer data to and from a link adapter? • ...
Unit 5 Lab 2022-10-26
Across
- uses very strong magnets and radio waves to create detailed images of your heart on a computer
- Slow
- atrioventricular
- coronary care unit, cardiac care unit
- occurs when something blocks blood supply to part of the brain or when a blood vessel in the brain bursts
- Pumps blood through the system
- Two
- sometimes called a ‘treadmill’ or ‘exercise’ test, is a type of ECG that is done while you are exercising
- atrial fibrillation
- acute coronary syndrome
- Networks of small vessels that perfuse tissues
- Pertaining to
- It gives a picture of your heart using ultrasound, a type of X-ray. It uses a probe either on your chest or down your esophagus (throat)
- a problem with the rate or rhythm of your heartbeat.
Down
- one or more of the valves in your heart doesn't work properly
- happens when a part of the heart muscle doesn't get enough blood
- occurs when the heart muscle doesn't pump blood as well as it should
- Vessels that deliver blood to tissues
- removal
- cardiopulmonary resuscitation
- Vessels that return blood to the heart
- a quick and painless test that records the electrical signals in the heart
- It is a non-invasive test for people who may be experiencing unusual cardiac symptoms
23 Clues: Two • Slow • removal • Pertaining to • atrioventricular • atrial fibrillation • acute coronary syndrome • cardiopulmonary resuscitation • Pumps blood through the system • Vessels that deliver blood to tissues • coronary care unit, cardiac care unit • Vessels that return blood to the heart • Networks of small vessels that perfuse tissues • ...
TECHNOLOGY CROSSWORD PUZZLE 2023-11-27
Across
- A language used to build web pages.
- Used to put images and words from the computer onto paper.
- device Used to put data in the computer.
- A device used to record our voice.
- Used to play music or sounds from the computer.
- A screen used to see images and computer data.
- A networking device that helps in the transfer of data packets between networks.
- A device used to see each other on the screen.
- Used to type on the computer. It has letters and numbers on it.
- Address A unique code used for each computer and device on the internet.
- A program that speaks between a computer and a server.
Down
- A machine used to do many things, such as browse the internet or play video games.
- A computer you can take anywhere.
- Citizenship Being responsible online.
- device Used to get information from the computer.
- A secret code used to log in
- A network that connects millions of computers worlwide.
- in Signing in to a computer.
- A device used to pass documents and images from paper to the computer.
- Giving instructions to a computer.
- Used to select items and move the cursor on the screen.
- The web address of a website.
22 Clues: A secret code used to log in • in Signing in to a computer. • The web address of a website. • A computer you can take anywhere. • A device used to record our voice. • Giving instructions to a computer. • A language used to build web pages. • Citizenship Being responsible online. • device Used to put data in the computer. • A screen used to see images and computer data. • ...
Hiring & Staffing 2023-09-15
Across
- Training while still working or at work
- Filling a vacancy from the existing workforce
- The rate at which employees leave the workforce and get replaced by others
- Formal conversation where on person asks questions while the other provides answers
- Person working for wages or salary
- Employs people
- Process of finding, interviewing, and screening people for a job
- A mention about a certain something, could be from past employers informing new ones about the potential employee
- New employees gain the necessary knowlege, skills, and behaviors to become effective members of their workforce
- Websites that allow users to create and share contact through networks
- Rearranging tasks and responsibilites
- Getting rid of staff positions
Down
- Organizing, managing, and coordinating an organizations employees to carry about the goals of the organization
- The action of opening a vacancy to more candidates instead of picking someone from the already exisiting staff
- Document created to share their background information when trying to find new employment
- Statement including information about credit activity and currect credit
- Raise to a higher position
- An employee's departure from the job, ending their career with that specific employer
- Documents containing details for qualifications and experience
- Reduction in force, getting rid of positions
- Volunteering to leave a position
21 Clues: Employs people • Raise to a higher position • Getting rid of staff positions • Volunteering to leave a position • Person working for wages or salary • Rearranging tasks and responsibilites • Training while still working or at work • Reduction in force, getting rid of positions • Filling a vacancy from the existing workforce • ...
Chapter 6 2019-09-27
Across
- The State shall develop a self-reliant and independent national economy effectively controlled by _____.
- ______ participation is encourage to support children's learning of pro-social activities at home.
- It serves the students' need to learn social responsibility and peacemaking skill.
- Is the peaceful exchangr of information and the sharing of feelings, decisions, and ideas.
- The State shall ensure the ____ of local governments.
- "The distinctive meaning of national security means freedom from foreign _______".
- The separation of ____ and State shall be invioble.
- Artcile II, Declaration of ______ and State Policies.
- The absence of __ does not necessarily mean there is peace.
- National ____ is the requirement to maintain the survival of the state.
Down
- Innovative _____ teaches students to consider the consequences of negative behavior and to solve conflicts peacefully.
- The prime duty of this is to serve and protect the people.
- Is a state without war.
- Collaborative ______ and family-school-community networks implement programs to increase peace.
- The Philippines is a ____ and republican State.
- A _____ to make school a place of piece is one of the ultimate challenges in education.
- War cannot be prevented without changing the ____ itself.
- From Latin diploma, meaning an official document.
- It shall pursue an independent foreign policy.
- It supposed to represent a democratic society with a mission to educate, not to police children.
20 Clues: Is a state without war. • It shall pursue an independent foreign policy. • The Philippines is a ____ and republican State. • From Latin diploma, meaning an official document. • The separation of ____ and State shall be invioble. • The State shall ensure the ____ of local governments. • Artcile II, Declaration of ______ and State Policies. • ...
Crossword 2020-01-08
Across
- Provide short summaries or complete information about the articles cited in various media types.
- Book created by Silvertone in 1997.
- A place wherein literary, musical, information, etc. are found.
- Online general encyclopedia.
- A newspaper covering the three regions of Northern Luzon.
- Composed of million of networks.
- It is the collections of various of facts usually written by different contributors.
- Refers to a group of article.
- It also sends visual images through channels for various purposes.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It allows to easily and instantaneously access several types of information.
Down
- It reaches a large audience through broadcast communication.
- Covers a large variety of articles of up-to-date information.
- It covers an in depth entries of Information.
- A weekly publication of opinion and news from Cordillera.
- Used for looking great deal of information about the topic.
- A weekly newspaper that is created by and for the people of Baguio City.
- It collects and edit articles about current events that is usually published.
- Refers to organized collection of records or the items found in a library.
- Virginia tech’s library catalog also called as _____.
- It is an engineering database.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Crossword 2020-01-08
Across
- Covers a large variety of articles of up-to-date information.
- It is the collections of various of facts usually written by different contributors.
- Online general encyclopedia.
- It reaches a large audience through broadcast communication.
- It is an engineering database.
- Used for looking great deal of information about the topic.
- A newspaper covering the three regions of Northern Luzon.
- Provide short summaries or complete information about the articles cited in various media types.
- Composed of million of networks.
- A place wherein literary, musical, information, etc. are found.
Down
- Virginia tech’s library catalog also called as _____.
- A weekly publication of opinion and news from Cordillera.
- It allows to easily and instantaneously access several types of information.
- It collects and edit articles about current events that is usually published.
- It covers an in depth entries of Information.
- Refers to a group of article.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It also sends visual images through channels for various purposes.
- Refers to organized collection of records or the items found in a library.
- A weekly newspaper that is created by and for the people of Baguio City.
- Book created by Silvertone in 1997.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Crossword 2020-01-08
Across
- A place wherein literary, musical, information, etc. are found.
- Online general encyclopedia.
- It is the surname of author of the book entitle "The American People: Creating a Nation and Society".
- It collects and edit articles about current events that is usually published.
- It is an engineering database.
- Virginia tech’s library catalog also called as _____.
- Provide short summaries or complete information about the articles cited in various media types.
- Book created by Silvertone in 1997.
- A newspaper covering the three regions of Northern Luzon.
- Refers to a group of article.
- It is the collections of various of facts usually written by different contributors.
Down
- A weekly publication of opinion and news from Cordillera.
- Composed of million of networks.
- It covers an in depth entries of Information.
- It reaches a large audience through broadcast communication.
- Covers a large variety of articles of up-to-date information.
- Used for looking great deal of information about the topic.
- It allows to easily and instantaneously access several types of information.
- Refers to organized collection of records or the items found in a library.
- A weekly newspaper that is created by and for the people of Baguio City.
- It also sends visual images through channels for various purposes.
21 Clues: Online general encyclopedia. • Refers to a group of article. • It is an engineering database. • Composed of million of networks. • Book created by Silvertone in 1997. • It covers an in depth entries of Information. • Virginia tech’s library catalog also called as _____. • A weekly publication of opinion and news from Cordillera. • ...
Mental Health 2020-11-17
Across
- / an even distribution of weight enabling someone or something to remain upright and steady.
- or Flight / the instinctive physiological response to a threatening situation, which readies one either to resist forcibly or to run away.
- / interacting with the community and people around you
- / The emotion of feeling mad
- / The ability to bounce back
- / of, affecting, or arising in the mind; related to the mental and emotional state of a person.
- disorder / Another name for manic depression
- / A constant and ongoing feeling of being depressed.
- / the action or practice of meditating.
- / easily agitated or alarmed.
- networks / People and places you can go to for help.
- / make or become less tense or anxious.
- / in a manner relating to the body as opposed to the mind.
Down
- / A constant feeling of being nervous, worried or stressed.
- / relating to a person's emotions.
- / Extreme or irrational fear of entering open or crowded places, of leaving one's own home, or of being in places from which escape is difficult.
- disorder / recurring panic attacks and ongoing fears about experiencing more panic attacks.
- / a written or spoken discourse expressing considered thoughts on a subject.
- Awareness / conscious knowledge of one's own character and feelings.
- Thinking / to have positive thoughts
- / in a manner relating to the mind.
- / a response to pressure or threat
22 Clues: / The emotion of feeling mad • / The ability to bounce back • / easily agitated or alarmed. • / relating to a person's emotions. • / a response to pressure or threat • / in a manner relating to the mind. • Thinking / to have positive thoughts • / the action or practice of meditating. • / make or become less tense or anxious. • ...
Chapter 4 Intro to Networking 2024-08-25
Across
- Amount of time, including delays, for data to travel
- half duplex
- fiber that survives in harsh undersea environments
- sense cable type
- The measure of the transfer of bits across the media
- most common networking media
- how the bit values, “1” and “0” are represented on the physical medium
- fiber used in long distance application
- OSI layer that has the components like NIC
- data encoding method that embeds clock signal
- IEEE 802.15
- Less susceptible to attenuation, and completely immune to EMI/RFI
- material the shield is made of
- used primarily for Internet of Things (IoT) applications
Down
- networking concept of packaging data for transmission
- straight Host to Network Device
- capacity at which a medium can carry data
- the longer the electrical signals have to travel, the weaker they get
- Throughput - traffic overhead
- protect the signal from interference
- noise in a communication channel
- most common type of cabling used in networks today
- 1,000 bps
- Host-to-Host
- common coaxial connector
- Device that provides Wi-Fi connectivity to multiple devices
- the rj-45 is plugged into this
- Better noise protection than UTP
- fiber used in datacenters
- distort and corrupt the data signals
- 1,000 mbps
31 Clues: 1,000 bps • 1,000 mbps • half duplex • IEEE 802.15 • Host-to-Host • sense cable type • common coaxial connector • fiber used in datacenters • most common networking media • Throughput - traffic overhead • the rj-45 is plugged into this • material the shield is made of • straight Host to Network Device • noise in a communication channel • Better noise protection than UTP • ...
Puzzle 2023-06-06
Across
- Standard communications protocol for electronic exchange of data over short distances
- System that manages and organizes computer's activities and shares resources among all programs
- Temporary storage in computer where it holds data that CPU uses
- Refers to software that is used to protect your computer against unwanted intrusions
- A collection of information stored and accessed electronically
- A high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks
- Number system used in digital electronics and computer programming
- Central Processing Unit
- High-level programming language known for its simple syntax
- Measure of CPU speed
- Part of the computer where most calculations take place
Down
- Part of the computer system that one can physically touch
- A worldwide network of interconnected networks and computers
- A popular open-source relational database
- Cloud computing platform and API offered by Amazon
- Apple's mobile operating system
- A programming language known for its use in web development
- Programming language developed by Sun Microsystems, now owned by Oracle
- A service offered by Google that allows you to store and share files online
- Coding language developed at MIT designed to teach programming concepts to children
- The technology that allows for wireless communication between devices over short distances
- Graphics processing unit
- Personal Computer
23 Clues: Personal Computer • Measure of CPU speed • Central Processing Unit • Graphics processing unit • Apple's mobile operating system • A popular open-source relational database • Cloud computing platform and API offered by Amazon • Part of the computer where most calculations take place • Part of the computer system that one can physically touch • ...
CS Principles Review 2023-04-26
Across
- A ZIP folder uses ______ compression.
- Information about an individual that can be used to uniquely identify them (directly or indirectly).
- The most common type was Ethernet which used MAC addresses to _______ data between computers on the network.
- A small network often in one building
- The technique used to "solve" NP problems
- Basically the use of loops in an algorithm
- is data about data
- the use of "the other type" of code
- The uncringe version of copyright
- Quick and light protocol for transfering data
Down
- ________ Computing; the use of multiple computers to run different parts of a program
- Symmetric key encryption involves ___ key for both encryption and decryption
- Basically the use of if statements in an algorithm
- Analog data has a range of values that change smoothly, rather than in _______ intervals, over time.
- a piece of software or a device that uses software(2 words)
- An attack where a user is tricked into revealing private information, often via a deceptive email.
- Common form of wired connection to the internet
- a wireless access point that gives unauthorized access to secure networks
- Certificate authorities issue digital certificates that validate the _______ of encryption keys used in secure communications and are based on a trust model
- _____ Address; IP but for network
20 Clues: is data about data • _____ Address; IP but for network • The uncringe version of copyright • the use of "the other type" of code • A ZIP folder uses ______ compression. • A small network often in one building • The technique used to "solve" NP problems • Basically the use of loops in an algorithm • Quick and light protocol for transfering data • ...
French 2024-11-22
Across
- home page
- social media/networks
- search engine
- to broadcast/distribute
- to become
- to have the right to...
- addicted
- targeted by
- to stream and watch a movie
- to light up
- to protect
- file
- to remove
- to choose (to)
- to communicate
- to protect oneself
- to send
- private
- connected, trendy, plugged-in
- cyberbullying
- to report
- with difficulty
- smartphone
- risk/danger
- text message
- easily
- an account
- to interact
- unlimited
- data
- to behave
- screen
- an app
- to stay up to date/informed of
- hyperconnected
- cyper-dependant
- to secure/protect one's profile
Down
- addicted
- user
- to save a file
- resource
- to recive
- to belong to/be part of
- to learn
- to protect
- to permit/allow
- respectful
- computer
- to download
- law
- victim
- negative comment
- digital identity
- behavior
- digital footprint
- the world
- to post
- punish
- prudent/careful
- to become
- to transfer a file
- plagairism
- to use
- internet user
- network
- plan
- to forbif/prohibit
- private life
- to prevent
- password
- to have access to
71 Clues: law • user • file • plan • data • victim • punish • to use • easily • screen • an app • to post • to send • private • network • addicted • resource • to learn • computer • addicted • behavior • password • home page • to recive • to become • the world • to remove • to become • to report • unlimited • to behave • to protect • respectful • to protect • plagairism • smartphone • to prevent • an account • to download • targeted by • to light up • risk/danger • to interact • ...
Mobile Phones & Online Banking 2025-01-30
Across
- Mobile phones can also be called _____ phones.
- You can _____ payments to send them automatically at a specified time.
- A wireless technology to connect a phone to other devices.
- Second generation mobiles introduced _____ transmission methods that cinverted voice into binary information.
- You can pay your ____ online.
- This card contains the user's information, the connection data and the phonebook.
- Fingerprints are a type of _____ authentication.
- What can you trade online? (buy and sell shares)
- A bank that doesn't have a web presence is called a brick-and-____ bank.
- Security _____ are microchip-based devices that generate a number for two factor authentication.
Down
- The type of banking where you can use mobile phone networks to perform transactions.
- The Abbreviation of "Universal Mobile Telecommunications System".
- The capability of mobile phones to transfer calls to different base stations is called _____.
- A hands-free kit is useful for having phone calls while _____.
- What do base stations divide the coverage area into?
- Banks that don't have physical branches or ATMs are called ___ banks.
- You can talk without holding the headset if you have a _________.
- The abbreviation for "Global System for Mobile".
- The most common file format for music on the internet.
- A TAN is required for some transactions, it can only be used once.
20 Clues: You can pay your ____ online. • Mobile phones can also be called _____ phones. • The abbreviation for "Global System for Mobile". • Fingerprints are a type of _____ authentication. • What can you trade online? (buy and sell shares) • What do base stations divide the coverage area into? • The most common file format for music on the internet. • ...
Cultural Exchanges and Influences on Trade Routes 2024-10-18
Across
- The pathogen that caused the widespread of disease in history like the "Black Death."
- Oral Historians and musicians in West Africa.
- Groups of peoples that lives away from their homeland.
- A Chinese philosophy that combines Confucian principles with other spiritual ideas.
- Buddhism A form of Buddhism that teaches rebirth in a happy place after death.
- An ancient city known for its impressive earthworks in North America.
- A cultural achievement of the ancient Pueblo peoples in the Southwest.
- Rest stops for merchants and travelers.
- Networks for transporting good and ideas between different regions.
Down
- Traditional boats used for trading on water in Asia.
- Tallest brick tower in Delhi, India.
- An important dynasty in Southeast Asia known for its architectural and cultural legacy.
- Revolution Agricultural advancements that improved farming techniques in Islamic world.
- A language derived from Bantu Roots and was influenced by the Arabic.
- of Exchange An system that allows trade without physical money.
- Trade routes over the water which is used for transporting goods between civilizations.
- A school of Buddhism that focuses on meditation.
- A monumental and a religious temple complex in Cambodia which was dedicate for Hindu Deities.
- A famous traveler who explored the Islamic world and he spent his whole life on traveling.
- Wealthiest king in Mali.
20 Clues: Wealthiest king in Mali. • Tallest brick tower in Delhi, India. • Rest stops for merchants and travelers. • Oral Historians and musicians in West Africa. • A school of Buddhism that focuses on meditation. • Traditional boats used for trading on water in Asia. • Groups of peoples that lives away from their homeland. • ...
vocabulary crossword 2025-03-21
Across
- a historical account of events arranged in order of time usually without analysis or interpretation
- (adj) - impossible to refute; something that can’t be disproved
- a bill prohibiting social networks from allowing strangers to message minors
- (v) - to destroy the resolve or courage of; intimidate
- line (n) - financial considerations (such as cost or profit or loss)
- (n) - a wily subterfuge : trick
- (v) - to refuse abruptly
- (v) - to make an earnest request to (someone) : beg
- overflowing of the land by water.
- (adj) - having the agreement and consent of all
- eagerness and ardent interest in pursuit of something
- (n) - an organization (such as a business or governmental unit) that has an identity separate from those of its members
- disposed to look after civic needs and interests
Down
- the act or an instance of grappling
- causing or tending to cause ruin.
- (adj) - impossible to refute; something that can’t be disproved
- an app being banned by Utah law
- (adj) - involving, imposing, or constituting a burden : troublesome
- (adj) deficient in firmness : not stringent
- (adj) - perfectly typical or representative of a particular kind of person or thing
- an overflowing of the land by water.
- (n) - a detailed plan of a scientific or medical experiment, treatment, or procedure
- a professor of child development
23 Clues: (v) - to refuse abruptly • an app being banned by Utah law • (n) - a wily subterfuge : trick • a professor of child development • causing or tending to cause ruin. • overflowing of the land by water. • the act or an instance of grappling • an overflowing of the land by water. • (adj) deficient in firmness : not stringent • (adj) - having the agreement and consent of all • ...
Networking concept and Cyber Ethics 2025-05-19
Across
- The unwanted bulk emails that come from unknown sources are called.
- A computer ion a network.
- Equivalent form of Hacking.
- simplest way to prevent plagiarism.
- Program that disrupts the normal functioning of a computer.
- It is wireless technology.
- Protecting the data and resources from any unauthorized access.
- Refers to criminal activities that involve the use of computer, network and internet.
- Group of computers or other peripheral devices.
- Refers to an illegal intrusion in a computer system or a network.
- It is a legal right granted by law to the creator for his original work.
- Is used to connect a computer to the available internet connection over the existing telephone line.
Down
- Certain sets of rule determine how data should be transferred over networks and so on.
- Refers to being aware of the ethical practices and behaving responsibly appropriately while using the internet.
- Ranges less than 10 meters.
- It is a malicious technique of tricking a web user into clicking on something different from what the user perceive he/she is clicking on.
- Refers to computer network restricted to a organization.
- Group of star figured workstations connected to a linear backbone cable.
- It is a network device that is used to connect all computers to a network.
- Metropolitan Area Network.
20 Clues: A computer ion a network. • It is wireless technology. • Metropolitan Area Network. • Ranges less than 10 meters. • Equivalent form of Hacking. • simplest way to prevent plagiarism. • Group of computers or other peripheral devices. • Refers to computer network restricted to a organization. • Program that disrupts the normal functioning of a computer. • ...
Computer Science Vocab 2023-01-09
Across
- manages the CPU's operations and controls how data and instructions are loaded and executed by the CPU
- physical components of a computer system
- a device that receives, stores, and processes information
- stores or transfers data
- unit of memory data, group of 8 bits
- worldwide system of computer networks, global network of physical cables
- holds components of a computer together so they can interact
- the component of a computer system that controls the interpretation and execution of instructions
- hardware or software that temporarily stores data
- data or programs used to operate computers and execute specific tasks
- interconnected system of webpages accessible through the internet
Down
- provides intuitive and visual elements for interacting with the computer
- short term memory of a computer where the data currently in use is stored
- text document that contains additional formatting information in a language called HTML
- program that accesses a Web page, interprets its content, and displays the page
- allow the computer to receive data and instructions from external sources
- allows the computer to display or broadcast its results
- Internet-enabled computer that stores Web pages and executes software for providing access to the pages
- manages all application programs in a computer
- used by websites to navigate online content, takes the user to another location
20 Clues: stores or transfers data • unit of memory data, group of 8 bits • physical components of a computer system • manages all application programs in a computer • hardware or software that temporarily stores data • allows the computer to display or broadcast its results • a device that receives, stores, and processes information • ...
Digital Technology Final part 1 2023-05-08
Across
- a document created by a program or system
- online journal which creates interaction from readers. They consist of special or common interest groups
- local area network
- type of file that has been created or saved by an application
- the service from Apple that securely stores your photos, files, notes, passwords and other data in the cloud
- acceptable use policy
- Includes computer networks that are connected over the internet for server redundancy or cluster computing purposes
- Something used to hold files or other folders
- the screen that displays the desktop
- a computer file like an image, video or document which can be included in an email and shared
- wide area network
- the physical parts of the computer that store and run written instructions
Down
- website that allows users to add and update content on the site using their own web browser.
- Arranging all folders files and other documents in an organized manner
- free web-based application in which documents and spreadsheets can be edited, created and stored online
- Free cloud storage service that is integrated with the company's other services and systems
- universal serial bus
- everything you see when you start your computer
- a set of digital instructions, data or programs used to operate computers
- computer processing unit
20 Clues: wide area network • local area network • universal serial bus • acceptable use policy • computer processing unit • the screen that displays the desktop • a document created by a program or system • Something used to hold files or other folders • everything you see when you start your computer • type of file that has been created or saved by an application • ...
ICT Related Terms 2025-02-03
Across
- Processing data closer to the source, reducing latency and enhancing performance.
- Software that protects against malware and other threats.
- The ability to use and understand information technology effectively.
- Physical components of a computer system, like the monitor, keyboard, and CPU.
- Wireless technology for connecting to the internet.
- Extremely large datasets that require specialized tools for analysis and processing.
- Computer systems that mimic the structure and function of the human brain.
- Creating copies of data to protect against loss or corruption.
- A system of interconnected documents and resources accessible through the internet.
- Technology that creates immersive, interactive experiences
- A global network connecting computers and devices.
- A device that connects multiple devices to a network
Down
- Programs and instructions that tell hardware what to do.
- Protecting computer systems and networks from unauthorized access and threats.
- The process of examining raw data to extract meaningful insights and patterns.
- Storing and accessing data and applications over the internet.
- Presenting data in a visual format to make it easier to understand and interpret.
- Computer systems capable of performing tasks that typically require human intelligence.
- Online platforms for social interaction and content sharing.
- Using unique biological characteristics, like fingerprints or facial recognition, for security purposes.
20 Clues: A global network connecting computers and devices. • Wireless technology for connecting to the internet. • A device that connects multiple devices to a network • Programs and instructions that tell hardware what to do. • Software that protects against malware and other threats. • Technology that creates immersive, interactive experiences • ...
Islamic Golden Age- By: Stone Hatzfeld 2025-02-25
Across
- A Muslim poet who was famous for the Book of Kings.
- Byzantine buildings that represented Muslim worship and architecture.
- the art of producing beautiful handwriting.
- Also known as Avicenna and was a Persian physician who wrote the Canon on Medicine.
- this road was crucial for trading goods between East Asia and Europe.
- Buildings for social interactions and for group prayers.
- spread of products, cultures and technologies.
- Built vast trading networks and traded for gold.
- a renowned physician who pioneered the study of many diseases.
- This is the Holy book of the Islamic religion.
Down
- These people produced fine goods steel swords and cotton textiles
- a common institution in Muslim lands of forcing people to work.
- Was an Arab thinker who established many principles of many branches of knowledge.
- Was a philosopher and a scientist and also known as Averroes.
- Known as a poet who crafted many quatrains and development of algebra.
- introduction of an Indian number system to Europe number system known as.
- Handicraft manufacturing was organized by these in Muslim cities.
- Him and his successors established Baghdad as the greatest Muslim center of learning.
- The English word check comes from this Arabic word.
- the ability to move up in society.
20 Clues: the ability to move up in society. • the art of producing beautiful handwriting. • spread of products, cultures and technologies. • This is the Holy book of the Islamic religion. • Built vast trading networks and traded for gold. • A Muslim poet who was famous for the Book of Kings. • The English word check comes from this Arabic word. • ...
Islamic Civilization Crossword Puzzle 2025-02-26
Across
- organized handicraft manufacturing and helped improve quality of products
- contributed to the development of algebra and studied the sky to help make the Muslim Calendar
- made fine goods used for art and trade
- thinker who helped create the principles of knowledge for history and economics
- physician who started the study of diseases like measles and smallpox and wrote books about medicine
- developed concepts of algebra and helped to create the earliest maps of the world
- philosopher and scientist who contributed to the study of diseases and sickness and analyzed humans fate
- organized large irrigation projects to help grow crops and help farmers
- being able to improve in society
- united diverse groups and blended traditions to improve civilization
Down
- creating beautiful handwriting
- Muslim poet famous for The Book of Kings and centered his writings around royalty and hero’s
- established Baghdad as the Muslim enter of learning where scholar made advances in many different subjects
- travelers who brought food and goods from settled lands
- places used for religion, education, and social interaction
- honored in Muslim culture and built many trading networks across the world
- wrote books about different medical practices
- produced glassware, furniture, and tapestries
- the works produced by scholars that shaped Muslim culture and civilization
- important route for trade in Europe and Asia
20 Clues: creating beautiful handwriting • being able to improve in society • made fine goods used for art and trade • important route for trade in Europe and Asia • wrote books about different medical practices • produced glassware, furniture, and tapestries • travelers who brought food and goods from settled lands • places used for religion, education, and social interaction • ...
Agribusiness - Ch. 2 Key Terms 2026-01-28
Across
- Predicting future events based on data and trends.
- capital, The value derived from relationships, trust, and networks.
- Convert an asset or activity into revenue.
- capital, Soil, water, air, and ecosystems providing environmental resources.
- function, Guiding, motivating, and supervising employees.
- function, Structuring resources and roles to achieve goals.
- capital, Intangible knowledge assets such as expertise, patents, or systems.
- capital, The skills, knowledge, and abilities possessed by individuals.
- function, Management function involving measuring performance and correcting deviations.
- The worth of a good or service based on customer satisfaction relative to cost.
- capital, Machinery, buildings, tools, and equipment used in production.
Down
- capital, Money and credit used to fund operations and investments.
- capital, Influence gained through relationships with policymakers or institutions.
- efficiency, Producing maximum output with the least input.
- capital, Community norms, values, traditions, and relationships that influence success.
- function, Setting goals and determining actions needed to achieve them.
- Creating and managing new business ventures while taking on risks.
- A resource owned by a business that has economic value and future benefit.
- on invested capital, Measure of how effectively a business uses invested funds to generate profit.
- Debts or obligations a business owes.
- efficiency, Producing maximum output from a given set of inputs.
21 Clues: Debts or obligations a business owes. • Convert an asset or activity into revenue. • Predicting future events based on data and trends. • function, Guiding, motivating, and supervising employees. • efficiency, Producing maximum output with the least input. • function, Structuring resources and roles to achieve goals. • ...
Chapter 3 and 4 vocab 2025-10-31
Across
- A period of transformation in agriculture within the Muslim world
- Temple that reflects a powerful empire
- A historic city in Mali, West Africa
- Ruler of Mali who gained wealth by controlling the trade of gold
- Major hub for trade and religious ceremonies
- Powerful Buddhist kingdom in the 8th and 9th century
- Philosophical and ethical system in China that was adopted by the Mongol Empure
- Crucial animal to trade in the Arabian Peninsula
- Traveler that also wrote about different countries
Down
- Language that was deeply influenced by Indian Ocean Trade
- Ming dynasty admiral who commanded massive fleets in the navy
- Type of Buddhism favored by Mongolians that are centered on a different leader
- System of paper currency in China. The idea spread to Mongol empire and facilitated trade.
- Allows monks to collect food and eat because they are not allowed to store their own food.
- Hereditary class of professional West African storytellers, musicians, and oral historians
- Indian landmark and victory tower built by the first Sultan of Delhi
- Type of ship that facilitated traded.
- Communities that have dispersed and settled around the world
- Roadside inns that were for travelers. They aided in communication and trade networks.
- School of Buddhism that emphasizes reaching enlightenment
20 Clues: A historic city in Mali, West Africa • Type of ship that facilitated traded. • Temple that reflects a powerful empire • Major hub for trade and religious ceremonies • Crucial animal to trade in the Arabian Peninsula • Traveler that also wrote about different countries • Powerful Buddhist kingdom in the 8th and 9th century • ...
Station 1 – Viet Minh Strengths 2025-11-18
Across
- : Political leader who directed the nationalist struggle and unified the Viet Minh.
- : Three-phase doctrine of mobilisation, guerrilla, and conventional warfare.
- : Viet Minh cadres entering colonial administration to gather information.
- : Province where the Viet Minh displaced French authority in liberated zones.
- : Heavy guns supplied by China and positioned above French positions.
- : Town abandoned after Viet Minh isolated French supply lines in 1951–52.
- : Areas under Viet Minh control where shadow governments replaced French rule.
- : Region where Viet Minh evaded French destruction during Operation Lea in 1947.
- : Nationalist and anti-imperialist education creating unity and discipline.
Down
- : Route Coloniale where French forces collapsed in 1950.
- : Final French defeat in 1954 due to encirclement and artillery dominance.
- : Recognised the DRV on 18 Jan 1950 and provided major military aid.
- : Recognised the DRV on 30 Jan 1950 and provided strategic backing.
- : Early-stage tactic conserving strength while weakening French occupation.
- : Secure cross-border bases in China for training and resupply.
- : Major Viet Minh victory on RC4 in 1950.
- : Informant networks embedded in French-controlled towns and villages.
- : Tens of thousands who carried supplies and artillery across mountains.
- : Strategy emphasising long-term mobilisation and gradual escalation.
- : Commander who led protracted people’s war and major military campaigns.
20 Clues: : Major Viet Minh victory on RC4 in 1950. • : Route Coloniale where French forces collapsed in 1950. • : Secure cross-border bases in China for training and resupply. • : Recognised the DRV on 30 Jan 1950 and provided strategic backing. • : Recognised the DRV on 18 Jan 1950 and provided major military aid. • ...
ETHAN'S CROSSWORD 2025-12-08
Across
- – A set of rules governing data communication on a network.
- – A 32-bit addressing system used for identifying devices on the Internet.
- – A variable used to pass information into a function.
- – A network of infected computers controlled by a hacker.
- – Compression technique that reduces file size without losing data.
- – A tiny electronic switch used to represent bits in a computer.
- – Maximum amount of data transferable per second.
- – A small chunk of data sent across a network.
- – A security system that filters allowed and blocked network traffic.
- – A character encoding system that represents text using numeric codes.
Down
- – Prediction that the number of transistors on a chip doubles roughly every two years.
- – A device that forwards data packets across networks.
- – Compression that removes some data to make a file smaller.
- – A scam that tricks users into giving personal information.
- – Repeating steps or loops within a program.
- – A number system using only 0s and 1s.
- – The delay it takes for data to travel across a network.
- – A data type that can be only true or false.
- – An error that occurs when a value exceeds the maximum amount storable.
- – A step-by-step set of instructions for solving a problem.
20 Clues: – A number system using only 0s and 1s. • – Repeating steps or loops within a program. • – A data type that can be only true or false. • – A small chunk of data sent across a network. • – Maximum amount of data transferable per second. • – A device that forwards data packets across networks. • – A variable used to pass information into a function. • ...
ypdva-y9-CS-unit-1-revision-keywords 2025-12-03
Across
- Tool used on emails and networks to block spam or suspicious traffic
- Prevention method that ensures people know how to spot a cyber trick
- Software designed to protect your device from malware
- Copies of data needed to recover from a ransomware attack
- Attack that floods a server with requests from many sources
- The process used with 2FA to verify a user's identity
- Tempting downloads or USB sticks to trick someone into giving data
- Prevention method for this threat is being aware of who is watching your screen
- General term for malicious software
- Installing these will fix security holes and vulnerabilities
- A social engineering trick where a person tries to obtain information by making up a fake scenario or story
Down
- Security system that monitors and filters network traffic
- Attack that floods a server with requests, often from a single source
- Malware that locks your files and demands payment
- Sending fake emails to trick a user into clicking a link
- Attack that guesses passwords by trying lots of different combinations
- Accessing a computer system without permission
- A secret set of characters used to secure an account
- A dishonest scheme used to trick people
- Type of password that makes brute force attacks take a very long time
20 Clues: General term for malicious software • A dishonest scheme used to trick people • Accessing a computer system without permission • Malware that locks your files and demands payment • A secret set of characters used to secure an account • Software designed to protect your device from malware • The process used with 2FA to verify a user's identity • ...
Unit 7: Mongol Empire 2026-03-05
Across
- A region of the Mongol Empire ruled by a member of Genghis Khan’s family.
- The title meaning the supreme ruler of the Mongol Empire.
- People who move from place to place instead of living in one location.
- A famous traveler who visited the Mongol Empire.
- A technology that spread across regions during Mongol rule.
- Skilled fighters who helped the Mongols conquer new lands.
- The weakening and fall of the Mongol Empire.
- The Chinese dynasty that replaced Mongol rule in China.
- Khan The grandson of Genghis Khan who ruled China.
- Dynasty The dynasty created when the Mongols ruled China.
Down
- Khan The leader who united the Mongol tribes and created the Mongol Empire.
- Taking control of land by force.
- The buying and selling of goods between people or regions.
- A Chinese invention that spread west through Mongol trade networks.
- A group of nomadic warriors from the steppes who built a large empire.
- A large area of land ruled by one government or leader.
- The homeland of the Mongol tribes.
- A Mongol khanate that ruled parts of Russia and Eastern Europe.
- A trade route that connected Asia, the Middle East, and Europe.
- A title used for a Mongol ruler or leader.
20 Clues: Taking control of land by force. • The homeland of the Mongol tribes. • A title used for a Mongol ruler or leader. • The weakening and fall of the Mongol Empire. • A famous traveler who visited the Mongol Empire. • Khan The grandson of Genghis Khan who ruled China. • A large area of land ruled by one government or leader. • ...
Media B4nter 2014-04-23
Across
- Men look for fertile women; women look for men with resources.
- Successful individuals of high status.
- Found that older people were interested in celebrity gossip because it helped them form social networks with other people.
- Course of conduct involving two or more events of harassment.
- Fans with severe deficits in sense of personal identity crave celebrity worship.
- Found that the more people saw a character, the more positive meaning they gave it.
- Given time and repeated exposure we can grow to like most things.
- Children develop an Internal Working Model of relationships in infancy.
Down
- Scale that measures three dimensions of celebrity worship.
- Found that gender only accounted for 3% of individual differences.
- Found that resistant types are often very emotional, but have negative views about themselves. Intense celebrity attraction allows development of connection without fear of rejection.
- One sided relationship.
- Showed that female birds were attracted to males with most complex songs.
- The love of novel/new things.
- Exchanging information that is beneficial to keep track of alliances and relationships.
15 Clues: One sided relationship. • The love of novel/new things. • Successful individuals of high status. • Scale that measures three dimensions of celebrity worship. • Course of conduct involving two or more events of harassment. • Men look for fertile women; women look for men with resources. • Given time and repeated exposure we can grow to like most things. • ...
Crossword Puzzle - IT LEC Project 2019-11-16
Across
- is a software that aims to gather information about an organization or a person without his or her knowledge.
- allows users to access web pages and web 2.0 programs.
- us a type of malware that can block access the victims data.
- is the appearance of motion created by displaying a series of still images in sequence.
- adds yours email name and address
- consist of full motion images that are played back at various speeds
- refers to ad-supported programs, games, or utilities that are distributed as adware.
- is a digital representation of nontext information.
Down
- is a business transaction that occurs over an electronic network.
- is the process of receiving information.
- is the process of transferring data in a continuous and even flow.
- refers to any application that combines text with graphics, Animation, Audio, Video and Virtual Reality.
- includes music, speech, or any other sound.
- is a worldwide collection of networks that links millions of business, government, agencies, education institutions and individuals.
- is a real-time typed conversation that takes place on a computer.
15 Clues: adds yours email name and address • is the process of receiving information. • includes music, speech, or any other sound. • is a digital representation of nontext information. • allows users to access web pages and web 2.0 programs. • us a type of malware that can block access the victims data. • is a business transaction that occurs over an electronic network. • ...
1984 Crossword Puzzle 2019-09-10
Across
- Special words or expressions that are used by a particular profession or group.
- Of or characteristic of the middle class, typically with reference to it's perceived.
- Softened or matured by age or experience.
- Showing willingness to allow the existence of opinions or behavior.
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- Offering Nothing that is stimulating or challenging.
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time.
- Intense and eager enjoyment, interest, or approval.
- A secret plan by a group to do something unlawful or harmful.
- Fail to resist pressure, temptation, or some other negative force.
Down
- A political and economic theory of social organization.
- The action subjecting a country or person to one's control, or the fact of being subjected.
- The state of practice of refraining from extramarital, or especially from all, sexual intercourse.
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- Discover or identify the presence or existence of.
15 Clues: Softened or matured by age or experience. • Discover or identify the presence or existence of. • Intense and eager enjoyment, interest, or approval. • Offering Nothing that is stimulating or challenging. • A political and economic theory of social organization. • A secret plan by a group to do something unlawful or harmful. • ...
IT Crossword Puzzle 2020-11-09
Across
- for internet protocol
- electronic device for storing and processing data according to instructions given to it in a variable program
- which is capable of copying itself and has a detrimental effect, such as corrupting the system or destroying data
- person who uses computers to gain unauthorized access to data
- most popular operating system for personal computers
- computer that is portable and suitable for use while traveling
- computer input device in the form of a small panel containing different touch-sensitive areas
- open-source operating system modeled on UNIX
Down
- imagery
- series of coded software instructions to control the operation of a computer or other machine
- nelectronic communications network that connects computer networks and organizational computer facilities around the world
- very powerful computer
- high-level general-purpose programming language, also a type of snake
- structured set of data held in a computer
- printed circuit board containing the components of a computer, with connectors for other circuit boards to be slotted into
15 Clues: imagery • for internet protocol • very powerful computer • structured set of data held in a computer • open-source operating system modeled on UNIX • most popular operating system for personal computers • person who uses computers to gain unauthorized access to data • computer that is portable and suitable for use while traveling • ...
Social media 2023-09-26
Across
- To be seen or heard by people through the media
- Person interested in someone and who follows their evolution especially on social networks.
- Very popular after spreading quickly on the internet.
- The polite way of expressing yourself with other people when you use the internet.
- A word with the symbol # in front of it.
- Where information comes from
- A series of email messages or messages on a forum about a particular subject
- To send a direct message to someone.
Down
- Someone who writes negative and hostile comments on a website in order to provoke people.
- The way news is reported on television or radio or in the newspapers
- People who use social media to promote products so that other people will buy them.
- A series of organized activities designed to achieve a particular social, commercial or political result.
- A link on a website that is designed to catch people's attention.
- An image, video that spreads very quickly on the internet.
- To be frequently mentioned or discussed on the internet, particularly on social media platforms.
15 Clues: Where information comes from • To send a direct message to someone. • A word with the symbol # in front of it. • To be seen or heard by people through the media • Very popular after spreading quickly on the internet. • An image, video that spreads very quickly on the internet. • A link on a website that is designed to catch people's attention. • ...
Information Security in Artificial intelligence 2023-11-27
Across
- The branch of artificial intelligence that enables computer systems to improve their performance through experience
- Physiological or behavioral characteristics of an individual used for authentication
- The practice of protecting networks and computer systems from digital attacks
- The process of algorithmically transforming information to hide its content
- A form of communication used to send and receive electronic messages
- Relates to the concept of protecting personal information from being improperly collected, processed or shared
- A computational model that mimics the structure of the human brain and is used for learning and decision-making in artificial intelligence
Down
- A complex neural network technique that simulates the human learning process
- A person who breaks into a computer system or network
- A set of instructions used in artificial intelligence to solve problems and perform tasks
- Malicious software that can damage a computer or steal data
- Information for machine learning and analytics
- A security system used to prevent unauthorized access to a network system
- A communication channel connecting computers to each other
- Weaknesses in system security that can be exploited
15 Clues: Information for machine learning and analytics • Weaknesses in system security that can be exploited • A person who breaks into a computer system or network • A communication channel connecting computers to each other • Malicious software that can damage a computer or steal data • A form of communication used to send and receive electronic messages • ...
Women,Technology, & Environment Unit 10 Choice Board 2021-05-03
Across
- a document by Elizabeth Cady Stanton that was signed in 1848 by 68 women and 32 men—100 out of some 300 attendees at the first woman's rights convention to be organized by women
- soviets launched sputnik in 1957 and the US created NASA
- chief operating officer of facebook
- first female & third prime minister of india
- research and techniques used in farming to increase food production
- bulky-room sized machines, difficult to use back then
- great britain's first female prime minister
Down
- stood as a symbol on a poster that stated " we can do it" as a symbol for woman in the workforce & women's independence
- female prime minister of pakistan 1988-1990 & 1993-1996
- British political activist and leader of the british suffrage movement that helped women win the right to vote in britain
- I am a female who wants equal rights with men
- movement of people in cities
- first female president of philippine
- connection of computer networks around the world
- primary source for news and global events in the 1950's
15 Clues: movement of people in cities • chief operating officer of facebook • first female president of philippine • great britain's first female prime minister • first female & third prime minister of india • I am a female who wants equal rights with men • connection of computer networks around the world • bulky-room sized machines, difficult to use back then • ...
CROSSWORD 2022-03-29
Across
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- Microsoft is setting up its largest data center in India in this city
- Founder of world wide web - Tim _____ Lee
- Digital dexterity is a term coined by
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- The acronymn for 5 tech stocks that replaced FAANG
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
Down
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- Society 5.0 is an intiative by which country
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Project _____ is BPCL's initiative on the digital front
- India's latest unicorn which is into developing software for OTT networks
- Cloud computing service that provides computing, storage and networking resources on demand
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Shaun Rose 2024-01-09
Across
- a written description of how a command or piece of code works or was developed.
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- NOT, AND, and OR, which evaluate to a Boolean value.
- a named reference to a value that can be used repeatedly throughout a program.
- Finding and fixing problems in an algorithm or program.
- A chunk of data sent over a network.
Down
- a named group of programming instructions.
- A type of computer that forwards data across a network
- the inputs and outputs that allow a user to interact with a piece of software.
- any data that are sent from a program to a device.
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- data about data
- form of program documentation written into the program to be read by people and which do not affect how a program runs.
- an ordered sequence of characters.
- a combination of operators and values that evaluates to a single value
15 Clues: data about data • an ordered sequence of characters. • A chunk of data sent over a network. • a named group of programming instructions. • any data that are sent from a program to a device. • NOT, AND, and OR, which evaluate to a Boolean value. • A type of computer that forwards data across a network • Finding and fixing problems in an algorithm or program. • ...
unit-26-28-ÉFT-12/B 2024-11-26
Across
- self copying programs
- Banks that don't have physical branches are brick-and-... ..
- Electronic equivalent of a ...-wallet for online shopping.
- The exchange of goods and services over the WEB.
- Many people belive they have been offered a special gift only to find out later they have been decived.
- Programs that spread by attaching themselfs to executable files.
- Crackers try to find a way to copy the latest game or computer program.
- A ... gateway, an interface between the website and the bank that accepts the electronic payment.
- The type off banking where you can use mobile phone networks to platform transactions.
Down
- Software created by crakers.
- One of the best methods of identifying the user of a bank account is ... authentication, the use of a finger print or faceID.
- Companies whose activity is centered on the Internet.
- One fo the programs used to help shoppers while ordering on the Internet is called ... cart program.
- Most online banks have introduced the concept of two-factor ...
- Bank fraud to get banking information such as passwords.
15 Clues: self copying programs • Software created by crakers. • The exchange of goods and services over the WEB. • Companies whose activity is centered on the Internet. • Bank fraud to get banking information such as passwords. • Electronic equivalent of a ...-wallet for online shopping. • Banks that don't have physical branches are brick-and-... .. • ...
Cloud Tecnology 2025-05-13
Across
- – The system’s capacity to automatically adjust resources according to workload.
- – Cloud environment open to multiple organizations and managed by a third-party provider.
- – A cloud infrastructure operated solely for one organization.
- – A combination of public and private cloud systems working together.
- – The ability of a system to grow or shrink to meet demand.
Down
- – A facility that houses computer systems and related components like storage and networking.
- – Online storage model in which data is stored on remote servers accessed via the internet.
- – Software that is delivered and accessed over the internet, usually on a subscription basis.
- – The maximum data transfer rate of a network or internet connection.
- – The creation of virtual versions of physical components like servers or networks.
- – A model for enabling on-demand access to shared computing resources over the Internet.
- – Cloud service that provides virtualized computing infrastructure over the internet.
- – The amount of time a system or service is available and running.
- – The time delay between a user action and the response from the system.
- – Cloud service that offers a platform for developers to build, test, and deploy applications.
15 Clues: – The ability of a system to grow or shrink to meet demand. • – A cloud infrastructure operated solely for one organization. • – The amount of time a system or service is available and running. • – The maximum data transfer rate of a network or internet connection. • – A combination of public and private cloud systems working together. • ...
Networking Concept 2025-06-03
Across
- one benefit of computer networking as shared resources like printers and files can lower expenses.
- device in a Local Network.
- network structure combining characteristics of star and bus topology often used in large organisation.
- a type of network that spans a city or large campus larger than a LAN but smaller than a VAN.
- device or point in a network that can send receive or forward data.
- send data between computer networks.
- a global network of connected computers.
Down
- and technology is used to protect data and resources in a network from unauthorized access.
- network setup where is devices connected to other forming a circular pathway.
- a group of computers linked together.
- physical media used to connect network devices such as Ethernet or fibre optic.
- a network connect two or more computers located at distant places.
- a small network like in a school.
- Central device that connect multiple computer in a network and sent started to all of them.
- connect a home or school network to the internet.
15 Clues: device in a Local Network. • a small network like in a school. • send data between computer networks. • a group of computers linked together. • a global network of connected computers. • connect a home or school network to the internet. • a network connect two or more computers located at distant places. • ...
Internal Audit Newsletter 2022-04-01
Across
- Founder of world wide web - Tim _____ Lee
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital dexterity is a term coined by
- Society 5.0 is an intiative by which country
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- Cloud computing service that provides computing, storage and networking resources on demand
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- The acronymn for 5 tech stocks that replaced FAANG
Down
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- India's latest unicorn which is into developing software for OTT networks
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- Project _____ is BPCL's initiative on the digital front
- Microsoft is setting up its largest data center in India in this city
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Networking Basics 2023-01-26
Across
- A network device that moves traffic within an IP network
- A device, usually located on a building wall, that provides a port where a network cable can be connected.
- LAN is what type of area network?
- A cable that provides connectivity between network devices. "Network ____________"
- The principal communications protocol in the internet protocol suite that is used to route information over the internet. "Internet _______ "
- WAN is what type of area network?
- A network device that moves traffic between two different IP networks
Down
- What type of address is a unique, burned-into read-only memory address of a network interface?
- A computer component that provides a port where a network cable can be connected. "Network __________"
- A network of interconnected LANs across a large geographical location.
- group of networked computers that are physically close together, usually in the same building.
- Organizations that provide many services for accessing and using the Internet. "Internet Service _______"
- Short for modulator/demodulator
- Determines the range that an IP address falls within. "Default Address _______"
- An address assigned by software and, as such, can be changed
15 Clues: Short for modulator/demodulator • LAN is what type of area network? • WAN is what type of area network? • A network device that moves traffic within an IP network • An address assigned by software and, as such, can be changed • A network device that moves traffic between two different IP networks • ...
Industrial Revolution Vocabulary 2021-02-11
Across
- the movement of either people or animals from one area to another
- a boat that moves by steam power
- an instrument designed for the simultaneous transmission and reception of the human voice
- productive work (especially physical work done for wages)
- a powered rail vehicle used for pulling trains
- a person who migrates to another country, usually for permanent residence
- a refusal to work organised by a group of employees as a form of protest to gain a concession
- communication by transmitting signals over a wire
Down
- a system where businesses and services are mainly run by private people rather than the government
- a market structure characterized by a single seller, selling a unique product in the market
- an economy is transformed from a primary agriculture one to one based on the manufacturing of goods
- the money that a person or company has left after expenses have been paid
- networks of iron rails on which steam locomotives pulled long trains at high speeds
- an organized association of workers formed to protect and further their rights and interests
- a building where goods are made
15 Clues: a building where goods are made • a boat that moves by steam power • a powered rail vehicle used for pulling trains • communication by transmitting signals over a wire • productive work (especially physical work done for wages) • the movement of either people or animals from one area to another • ...
C4 How to Review the Literature and Develop Research Qs 2021-05-26
Across
- prediction or educated guess; formal statement of the researcher's prediction of the relationship that exists among the variable under investigation
- database containing entries from Psychological Abstracts
- education issue or problem within a broad topic area
- systematic review or integration of qualitative reesarch findings into a literature summary article
- question about the relationship that exists between two or more variables
- broad subject matter area to be investigated
- database containing information from Current Index to Journals in education and resources in education
Down
- research that relies primarily on the collection of qualitative data
- statement of researcher's intent or objective of the study
- database containing entries from all areas of business
- database containing entries from Sociological Abstracts
- quantitative technique that is used to integrate and describe the results of a large number of studies
- explanation or explanatory system that discusses how a phenomenon opeates and why it opeates as it does
- statement of the specific question the reseacher seeks to answer via empicial research
- network of networks consisting of millions of computers and tens of millions of users all world the world
15 Clues: broad subject matter area to be investigated • education issue or problem within a broad topic area • database containing entries from all areas of business • database containing entries from Sociological Abstracts • database containing entries from Psychological Abstracts • statement of researcher's intent or objective of the study • ...
Bubbles 2021-07-30
Across
- The primary grapes in Cava are Macabeu, Parellada, and _____.
- What term is used for sparkling wines from French regions other than Champagne, such as Alsace and the Loire?
- Traditional method sparkling wine from Northern Italy
- Sparkling wine gets it's bubbles by adding ____ and and sugar to the still wine, starting a secondary fermentation.
- The final sweetness level of Champagne is determined by the “dosage”. What does the label say when wine is bone dry/has little residual sugar?
- What do you call a bottling of wines from several different years?
- What is the term for sparkling wine made in Germany?
Down
- French Champagne house that produces Domaine Carneros in California
- In Champagne, large brands, known as ______, purchase many of their grapes from
- A sparkling wine produced with only white grapes is called _____?
- Sparking wine from Spain
- The three major grapes of champagne are Chardonnay, Pinot Noir, and _____
- Prosecco is made primarily with this grape?
- Before it is released, a vintage Champagne must be aged a minimum of how many years, according to French law?
- of smaller growers; and many smaller estates
15 Clues: Sparking wine from Spain • Prosecco is made primarily with this grape? • of smaller growers; and many smaller estates • What is the term for sparkling wine made in Germany? • Traditional method sparkling wine from Northern Italy • The primary grapes in Cava are Macabeu, Parellada, and _____. • A sparkling wine produced with only white grapes is called _____? • ...
Cyber Security 2021-07-20
Across
- Gaining unauthorised access to or control of a computer system.
- A self replicating malware that modifies code and programs.
- A group or person who is interested in creating disruptions or embarrassment through hacking.
- An attack where the perpetrator invents a story to convince the victim into providing money or data.
- ________ is created when data is processed and meaningful.
- Malware that infects a computer and spams the user with adds.
- Automated programs that perform tasks repeatedly.
- Multiple computers send packets or data to a system in an attempt to overload the network.
- ____ is raw fact and figures.
Down
- An attack where the victim receives and email disguised to resemble an official email.
- An attack where the attacker is watching the victim while they provide sensitive information.
- a form of virus that encrypts users data and requests payments to decrypt the data.
- A large collection of malware infected devices called zombies.
- A self replicating malware that spreads through the networks and uses system resources.
- A piece of malware that disguises itself to appear as a useful program.
15 Clues: ____ is raw fact and figures. • Automated programs that perform tasks repeatedly. • ________ is created when data is processed and meaningful. • A self replicating malware that modifies code and programs. • Malware that infects a computer and spams the user with adds. • A large collection of malware infected devices called zombies. • ...
1984 Crossword Puzzle 2019-09-10
Across
- Discover or identify the presence or existence of.
- Systems that propel cylindrical containers through networks of tubes by compressed air or by partial vacuum.
- Of or characteristic of the middle class, typically with reference to it's perceived.
- Intense and eager enjoyment, interest, or approval.
- Information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view.
- Fail to resist pressure, temptation, or some other negative force.
Down
- Showing willingness to allow the existence of opinions or behavior.
- The acceptance of or mental capacity to accept contrary opinions or beliefs at the same time.
- The state of practice of refraining from extramarital, or especially from all, sexual intercourse.
- The action subjecting a country or person to one's control, or the fact of being subjected.
- A secret plan by a group to do something unlawful or harmful.
- A political and economic theory of social organization.
- Offering Nothing that is stimulating or challenging.
- Special words or expressions that are used by a particular profession or group.
- Softened or matured by age or experience.
15 Clues: Softened or matured by age or experience. • Discover or identify the presence or existence of. • Intense and eager enjoyment, interest, or approval. • Offering Nothing that is stimulating or challenging. • A political and economic theory of social organization. • A secret plan by a group to do something unlawful or harmful. • ...
IT Era 2019-11-11
Across
- refers to the use of equipment such as machines or computers to accomplish previously human-exclusive taskq
- the appearance of motion created by displaying a series of still images in sequence
- a software that aims to gather information about an organization or a person without his or her knowledge
- a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals
- a real-time typed conversation that takes place on a computer
- a small version of a larger graphic
- consists of full-motion images that are played back at various speeds
- an online area in which users have written discussions about a particular subject
Down
- a serious phenomenon brought about by social media
- a type of malware that can block access to the victim's data
- includes music, speech, of any other sound
- a combination of the words internet and etiquette
- a digital representation of nontext information
- the process of transferring data in a continuous and even flow
- hardware devices that have the capability to measure an event, object, or any physical quality that is happening
15 Clues: a small version of a larger graphic • includes music, speech, of any other sound • a digital representation of nontext information • a combination of the words internet and etiquette • a serious phenomenon brought about by social media • a type of malware that can block access to the victim's data • a real-time typed conversation that takes place on a computer • ...
Business crossword 2023-11-01
Across
- Technology that allows users to make telephone calls over the Internet.
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem).
- Programs that instruct computers to perform specific operations.
- Computerized storage for information and facts.
- Computer software designed to mimic the knowledge of a human expert.
- A number you choose to gain access to an account.
- Working from home or a remote location.
- A navigational system that uses satellite technology to determine location and provide directions.
Down
- Technology that allows users to communicate over the Internet rather than through traditional public networks.
- The use of computer technology to plan, design, test, and alter products.
- A mobile phone with advanced capabilities, such as accessing the Internet.
- An object placed into orbit by humans; most are used for communications purposes.
- The use of computer software to control machines, tools, and processes involved in manufacturing products.
- Technology that allows users to make telephone calls over the Internet.
- The practical application of science to society and industry.
- A system of computers connected together by telephone wires, cable wires, or other means.
16 Clues: Working from home or a remote location. • Computerized storage for information and facts. • A number you choose to gain access to an account. • The practical application of science to society and industry. • Programs that instruct computers to perform specific operations. • Computer software designed to mimic the knowledge of a human expert. • ...
HC U3 Vocab 2023-09-21
Across
- attraction between oppositely charged particles
- when 2 atoms share two pairs of electrons
- measure of its ability to respond to an electric field and acquire an electric dipole moment
- formed when electrons are shared between 2 atoms
- the 3- dimensional structure or arrangement of atoms in a molecule
- composed of atoms covalently bonded together into a 3- dimensional network or layers of 2- dimensional networks
- points toward the more electronegative element/ atom in the structure of molecule
Down
- region in which electrons are most likely to be found (bonding or non bonding)
- energy required to convert one mole of an ionic solid into gaseous ionic constituents
- formed by the transferring of electrons
- no integer charge value when measured in elementary charge units
- valence shell electron pair repulsion
- tendency of atoms to prefer to have eight electrons in the valence shell
- process by which ions are formed by gain or loss of an electron from an atom or molecule
- ability of a material to conduct heat from its one side to the other
15 Clues: valence shell electron pair repulsion • formed by the transferring of electrons • when 2 atoms share two pairs of electrons • attraction between oppositely charged particles • formed when electrons are shared between 2 atoms • no integer charge value when measured in elementary charge units • the 3- dimensional structure or arrangement of atoms in a molecule • ...
CROSSWORD PUZZLE!! 2024-05-16
Across
- This is platform, object-oriented programming language.
- This covers all technical means used to handle information and aid communication.
- It specifies accessibility to changing variables, methods, and classes.
- A style or method of cooking, especially as characteristics of a particular country, region, or establishment.
- This is an issue that can have significant impact on the individual's mental and emotional well being.
- This can be frustrating to people.
Down
- A compulsive need to spend a lot of time in the internet.
- The various of methods used to prepare food.
- A variable that has been allocated "Statically"; This only declares with a "static" keyword.
- An illness caused by bacteria or other toxins in food.
- A list of dishes available in a restaurant.
- This is a type of access modifier that allows access inside the class, subclass, or other classes of the same package as the modifier.
- It is a global computer network.
- Having to do cooking in the kitchen.
- This is the practice of protecting systems, networks, and programs from digital attacks.
15 Clues: It is a global computer network. • This can be frustrating to people. • Having to do cooking in the kitchen. • A list of dishes available in a restaurant. • The various of methods used to prepare food. • An illness caused by bacteria or other toxins in food. • This is platform, object-oriented programming language. • ...
1990s 2024-03-28
Across
- technology company created by Steve Jobs that creates computer and phone hardware
- in which the storing, organizing, and processing of data became the most important industries of all
- North American Free Trade Agreement
- wealthy Saudi and leader of Al Qaeda terrorist cell
- North Atlantic Treaty Organization, US's defensive military alliance
- First Lady in the 1990s behind healthcare reform efforts and later Senator and Secretary of State and first woman to win the popular vote for President of the US
- Clinton signed reductions of this in 1996
Down
- Clinton's impeachment centered around lies he made about this
- modern trade and tech have made the world more connected
- Dream of self-rule for Palestinian people living in Israel in the West Bank or Gaza
- Family and Medical Leave Law, allows protected time for new parents without pay
- technology company created by Bill Gates that creates computer software
- Republican agenda in the 1990s
- invention at the heart of the information age that allows people to connect on computer networks
- World Trade Organization, successor to GATT
15 Clues: Republican agenda in the 1990s • North American Free Trade Agreement • Clinton signed reductions of this in 1996 • World Trade Organization, successor to GATT • wealthy Saudi and leader of Al Qaeda terrorist cell • modern trade and tech have made the world more connected • Clinton's impeachment centered around lies he made about this • ...
Business technology 2024-02-27
Across
- computer-based networks and applications that help managers make informed decisions.
- any process that a business organization conducts over a computer-mediated network.
- all the technical means used to handle information and aid communication.
- a machine that dispenses cash or performs other banking services when an account holder inserts a bank card.
- tools, machinery, and other durable equipment.
- an 'automated' banking platform that does not require any banking representative/teller or a human cashier.
- a process that uses computers to create 2D drawings and 3D models of products.
- any electronic object or system that helps employees accomplish tasks.
Down
- a live meeting between two or more people in different locations.
- the use of telecommunication devices to hold discussions between participants in different locations.
- a system of interconnected electronic components or circuits.
- the programs and other operating information used by a computer.
- a way to conduct financial transactions electronically through a bank's website or mobile app.
- the process of organizing and preserving digital information for future access and retrieval.
- commercial transaction conducted electronically on the internet
15 Clues: tools, machinery, and other durable equipment. • a system of interconnected electronic components or circuits. • commercial transaction conducted electronically on the internet • the programs and other operating information used by a computer. • a live meeting between two or more people in different locations. • ...
5.04 BE 2024-09-17
Across
- Programs that instruct computers to perform specific operations
- A system of computers connected together by telephone wires, cable wires, or other means
- Technology that allows users to make telephone calls over the Internet
- An object placed into orbit by humans; most are used for communications purposes
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- Computerized storage for information and facts
- A navigational system that uses satellite technology to determine location and provide directions
Down
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- A number you choose to gain access to an account
- Computer software designed to mimic the knowledge of a human expert
- The practical application of science to society and industry
- The use of computer technology to plan, design, test, and alter products
- Working from home or a remote location
- A mobile phone with advanced capabilities, such as accessing the Internet
- Technology that allows users to communicate over the Internet rather than through traditional public networks
15 Clues: Working from home or a remote location • Computerized storage for information and facts • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
10-1 Ch. 3 Identity, Media, and Communication Technology Part 1TNN 2024-09-30
Across
- the interconnection of information and communications technologies, computer networks, and media content
- a process wherein fewer individuals or organizations control shares of the mass media
- the evaluation or estimation of the nature, quality, or ability of someone or something
- how you view yourself
- the customs, arts, social institutions, and achievements of a particular nation, people, or other social group
- the process by which businesses or other organizations develop international influence or start operating on an international scale
- how you view a belief, idea, issue etc.
Down
- an alliance for combined action (to fulfill a specific goal)
- cultural modification of an individual, group, or people by adapting to or borrowing traits from another culture
- when you spend much time physically alone on technology (even if you are communicating with other people)
- how a collective views a belief, idea, issue etc.
- the imparting or exchanging of information or news
- a person whose first language is French
- (of people)inhabiting or existing in a land from the earliest times or from before the arrival of colonists
- media that communicates its message all around the world
15 Clues: how you view yourself • a person whose first language is French • how you view a belief, idea, issue etc. • how a collective views a belief, idea, issue etc. • the imparting or exchanging of information or news • media that communicates its message all around the world • an alliance for combined action (to fulfill a specific goal) • ...
compsci 2025-04-09
Across
- cybercrime where attackers, posing as legitimate entities, use deceptive methods, often through email or text
- a standard encoding system that assigns a unique numeric value to every character, regardless of the platform, program, or language
- State Hard Drive
- a semiconductor device used to amplify or switch electrical signals and power
- refers to the frequency at which a processor's clock generator pulses
- any software designed to harm, exploit, or compromise devices, networks, or data.
- a hardware or software component that stores frequently accessed data
- gate a fundamental electronic circuit that performs a basic logical operation on one or more binary inputs
Down
- cycle fundamental process by which a CPU processes instructions, consisting of fetching the instruction from memory,
- a data storage device that uses integrated circuits to store data
- type of malware that encrypts the victim's personal data until a ransom is paid
- Basic Input/Output System
- a fundamental component of a computer's central processing unit
- Engineering the term used for a broad range of malicious activities accomplished through human interactions
- character encoding standard for electronic communication
15 Clues: State Hard Drive • Basic Input/Output System • character encoding standard for electronic communication • a fundamental component of a computer's central processing unit • a data storage device that uses integrated circuits to store data • refers to the frequency at which a processor's clock generator pulses • ...
CyberSecurity 2025-06-19
Across
- The use of physical characteristics, such as fingerprints, to verify identity.
- A copy of data stored separately to protect against data loss.
- Software that secretly monitors and collects information about users.
- A service that encrypts your internet connection and hides your IP address.
- A type of malware that threatens to publish or block access to data unless a ransom is paid.
- A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
- The process of verifying the identity of a user or device.
- The practice of protecting systems, networks, and programs from digital attacks.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- Software designed to detect and destroy computer viruses.
- A secret word or phrase used to gain access to a system.
- A network security device that monitors and filters incoming and outgoing network traffic.
- The process of converting information or data into a code to prevent unauthorized access.
- Unwanted or unsolicited email messages.
- An individual who uses technical skills to gain unauthorized access to systems.
15 Clues: Unwanted or unsolicited email messages. • A secret word or phrase used to gain access to a system. • Software designed to detect and destroy computer viruses. • The process of verifying the identity of a user or device. • A copy of data stored separately to protect against data loss. • Software that secretly monitors and collects information about users. • ...
JSBdOFNPNFhNFNcDNFpPNF 2026-01-21
Across
- Gateway – A router that connects a local network to other networks
- – The time period for which an IP address is assigned to a client
- – The process of extending an IP address lease
- – A message sent to all devices on a network
- – A device or system that provides services or resources to other devices
- – The first DHCP message sent by a client to find a DHCP server
- Address – A unique hardware identifier assigned to a network interface
- Server – A server that translates domain names into IP addresses
Down
- – A response from the DHCP server offering an IP address
- – A device that receives network configuration information from a DHCP server
- – A range of IP addresses that a DHCP server can assign
- Mask – A number that defines the network and host portions of an IP address
- – A fixed IP address assigned to a specific device using its MAC address
- – Dynamic Host Configuration Protocol; a network protocol that automatically assigns IP addresses to devices
- Address – A unique numerical label assigned to a device on a network
15 Clues: – A message sent to all devices on a network • – The process of extending an IP address lease • – A range of IP addresses that a DHCP server can assign • – A response from the DHCP server offering an IP address • – The first DHCP message sent by a client to find a DHCP server • Server – A server that translates domain names into IP addresses • ...
AI Accountability Vocabulary 2026-03-23
Across
- Unfair prejudice in data that leads to discriminatory outcomes
- The EU AI Act classifies systems based on this (Unacceptable, High, etc.)
- The ability to provide a human-understandable reason for an AI's output
- Legal responsibility for damages caused by a product or system
- The set of rules or instructions followed by a computer to solve a problem
- The obligation to explain, justify, and take responsibility for AI decisions
- The moral principles that govern how AI should be designed and deployed
Down
- The structural concept of human oversight: In, On, or Out
- A system where the internal logic is hidden or too complex to interpret
- The landmark European regulation that categorizes AI by risk levels
- A formal review to check if an AI system complies with safety standards
- The principle of being open about how an AI system is developed and used
- A subset of AI based on neural networks that is often difficult to explain
- The capacity of an AI to act or make decisions without human intervention
- The fuel of AI; if this is biased, the output will be biased too
15 Clues: The structural concept of human oversight: In, On, or Out • Unfair prejudice in data that leads to discriminatory outcomes • Legal responsibility for damages caused by a product or system • The fuel of AI; if this is biased, the output will be biased too • The landmark European regulation that categorizes AI by risk levels • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Applications can be accessed over the Internet through a subscription.
- Interactive websites where people create and share user-generated content with friends and family
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Hosts that provide information
- Examples include routers, switches and wireless access points
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Type of network provides access to users over a small geographical area
- Real-time communication between two or more people
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
Down
- identify the physical location of intermediary devices and cable installation.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- lol
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Something that helps people work together on a particular file or piece of software
- Examples include copper, fiber and wireless
- Private networks in use by just one company
- limits the impact of a failure, so that the fewest number of devices are affected.
- Type of network provides access to users over a large geographical area
- Web pages that groups of people can edit and view together
- Provides the physical connection to the network at the PC or other host device
- Having multiple paths to a destination
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- allows people to share files with each other without having to store and download them from a central server
- Identify devices, ports, and addressing scheme.
39 Clues: lol • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Examples include copper, fiber and wireless • Private networks in use by just one company • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Examples include copper, fiber and wireless
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Examples include routers, switches and wireless access points
- Interactive websites where people create and share user-generated content with friends and family
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- limits the impact of a failure, so that the fewest number of devices are affected.
- allows people to share files with each other without having to store and download them from a central server
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Hosts that request information
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Hosts that provide information
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Type of network provides access to users over a large geographical area
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Down
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- identify the physical location of intermediary devices and cable installation.
- Applications can be accessed over the Internet through a subscription.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- Web pages that groups of people can edit and view together
- Private networks in use by just one company
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- lol
- Provides the physical connection to the network at the PC or other host device
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a small geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Having multiple paths to a destination
- diagram Diagram of a network
- Real-time communication between two or more people
- Identify devices, ports, and addressing scheme.
40 Clues: lol • diagram Diagram of a network • Hosts that request information • Hosts that provide information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- Hosts that provide information
- Private networks in use by just one company
- Web pages that groups of people can edit and view together
- limits the impact of a failure, so that the fewest number of devices are affected.
- Applications can be accessed over the Internet through a subscription.
- identify the physical location of intermediary devices and cable installation.
- yes
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- Identify devices, ports, and addressing scheme.
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Type of network provides access to users over a large geographical area
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- Real-time communication between two or more people
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
- diagram Diagram of a network
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Interactive websites where people create and share user-generated content with friends and family
Down
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Hosts that request information
- allows people to share files with each other without having to store and download them from a central server
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Audio-based medium that allows people to deliver their recordings to a wide audience
- Something that helps people work together on a particular file or piece of software
- Provides the physical connection to the network at the PC or other host device
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Type of network provides access to users over a small geographical area
- Having multiple paths to a destination
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Examples include routers, switches and wireless access points
41 Clues: yes • diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Cisco Chapter 1 Crossword 2020-09-24
Across
- available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
- Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
- Type of network provides access to users over a small geographical area
- Provides the physical connection to the network at the PC or other host device
- one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
- Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization
- Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
- Having multiple paths to a destination
- Web pages that groups of people can edit and view together
- A connector or outlet on a networking device where the media is connected to an end device or another networking device.
- Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
- Examples include copper, fiber and wireless
- Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
- Something that helps people work together on a particular file or piece of software
- splits traffic into packets that are routed over a shared network. Helps create redundancy
- An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
- Describes the state of a network when the demand on the network resources exceeds the available capacity
- identify the physical location of intermediary devices and cable installation.
Down
- uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
- reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
- Audio-based medium that allows people to deliver their recordings to a wide audience
- limits the impact of a failure, so that the fewest number of devices are affected.
- Identify devices, ports, and addressing scheme.
- Examples include routers, switches and wireless access points
- capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
- Hosts that provide information
- Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Private networks in use by just one company
- Real-time communication between two or more people
- allows people to share files with each other without having to store and download them from a central server
- makes it possible for users to be free to use their personal devices to access a corporate or a campus network
- diagram Diagram of a network
- Interactive websites where people create and share user-generated content with friends and family
- The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Hosts that request information
- refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
- Type of network provides access to users over a large geographical area
- Applications can be accessed over the Internet through a subscription.
- Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
- Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
40 Clues: diagram Diagram of a network • Hosts that provide information • Hosts that request information • Having multiple paths to a destination • Private networks in use by just one company • Examples include copper, fiber and wireless • Identify devices, ports, and addressing scheme. • Real-time communication between two or more people • ...
Modern Technology Terms 2023-05-18
Across
- Rechargeable battery used to power a laptop.
- Protection of computer systems and networks from theft or damage.
- Latest version of USB used for connecting devices to a computer.
- Online meeting conducted using Zoom video conferencing software.
- Network security system that monitors and controls incoming and outgoing network traffic.
- Two dimensional barcode used for storing information.
- Display screen that responds to touch input.
- Networking device that forwards data packets between computer networks.
- Small application designed to run within a web browser.
- Unit of digital image resolution equal to one million pixels.
- Programming language used to create interactive web pages.
- Settings for configuring a firewall.
- Video sharing platform.
- Portable storage device that uses USB technology.
- Software used for creating and managing backups of data or files.
- Software that securely stores and manages passwords.
- Portable computer designed for use on a lap or desk.
- Protection of internet connected devices from threats and attacks.
- Software used to access and view websites on the internet.
- Software that manages computer hardware and software resources.
- Input device used to type text and commands into a computer.
- Portable computer designed for use on a lap or desk.
- Branch of physics that studies the behavior of matter and energy at the quantum level.
- Network of physical devices, vehicles, and other objects connected to the internet.
- Software that reads and interprets XML documents.
- Process of creating and restoring backups of data or files.
- Design, construction, and operation of robots.
- Mathematical formula used for encrypting and decrypting data.
- Delivery of computing services over the internet.
- Physical or logical arrangement of network devices and connections.
- Software that can perform tasks or provide information in response to voice commands.
- Simulation of human intelligence in machines.
- Measure of the effectiveness of a password in preventing unauthorized access.
- Mobile phone with advanced computing capabilities.
- Process of analyzing large sets of data to discover patterns and relationships.
- Protection of computer networks from unauthorized access or attacks.
- Integration of digital information with the physical environment.
Down
- Software designed to harm or disrupt computer systems.
- Online platforms for sharing information and connecting with others.
- Universal Serial Bus used for connecting devices to a computer.
- Network security system that monitors and controls incoming and outgoing network traffic.
- Head mounted display used for virtual reality experiences.
- Design and development of robots and robotic systems.
- Display screen that responds to touch input.
- Set of instructions for solving a problem or completing a task.
- Extensible Markup Language used for storing and transporting data.
- Input device used to control the movement of a cursor on a computer screen.
- Process of analyzing and interpreting data to gain insights and make decisions.
- Account on YouTube used for uploading and sharing videos.
- Representation of data in visual form, such as charts or graphs.
- Set of instructions for controlling network traffic.
- Programming language used for developing applications and software.
- Hypertext Markup Language used to create web pages.
- Use of GPS technology for tracking the location of a person or object.
- Arrangement of keys on a keyboard.
- Unit of digital information equal to one billion bytes.
- Video uploaded to YouTube for sharing and viewing.
- Combination of keys used to perform a specific task.
- Global Positioning System used for navigation and location tracking.
- Social media platform for sharing photos and videos.
- Set of rules for validating XML documents.
- Secret code used to access a computer or online account.
- Group of interconnected devices and computers.
- Process of converting data into a code to prevent unauthorized access.
- Online seminar conducted using Zoom video conferencing software.
- Process of removing malware from a computer system.
- Wireless networking technology that uses radio waves to provide high speed internet and network connections.
- Use of social media platforms for marketing and advertising.
- Latest version of HTML used for creating web pages.
- Computer generated simulation of a three dimensional environment.
- Use of GPS technology for navigation and location tracking.
- Code used to encrypt and decrypt data.
- Backup of data or files stored in the cloud.
- Use of quantum mechanical phenomena to perform computing tasks.
- Process of creating and maintaining websites.
- Purchasing goods or services over the internet.
- Copy of data or files made in case the original is lost or damaged.
- Conducting banking transactions over the internet.
- Online storage service for data and files.
- Software used for creating and editing HTML code.
- Wireless communication technology for short range data exchange.
- Video conferencing software.
82 Clues: Video sharing platform. • Video conferencing software. • Arrangement of keys on a keyboard. • Settings for configuring a firewall. • Code used to encrypt and decrypt data. • Set of rules for validating XML documents. • Online storage service for data and files. • Rechargeable battery used to power a laptop. • Display screen that responds to touch input. • ...
Information Technologies 2023-09-05
Across
- software written to solve problems such as payroll processing, financial analysis or creation of contracts. Usually this type of software is purchased, however there are free open-source versions.
- Rather than needing to buy application software and host it on a corporate computer systems which entail high up-front costs, SAAS is a lease and pay as you payment option. The key difference is the software resides at the software vendor’s data center which can be problematic for certain contexts (such as hospitals). SAAS has helped many small businesses reduce their start-up costs and complexity.
- a principal that computers double in speed ever 18 to 24 months
- a roadmap created by an organization to describe its current processes, and goals, and focuses on ensuring the data, apps, and technology infrastructure support business operations and strategy
- glass ‘wire’ tubes (made from melted beach sand) that were installed in the walls of homes and businesses, by the side of roads and underground (and under oceans) for super fast data transmission.
- software that can read an image such as a pdf and turn it into a document that can be edited.
- the brain of the computer that accepts programmed instructions, data to control tasks and perform calculations
- the measurement of actual data transmission spped
- older information system including hardware, operating system, and application software which remains in use because it still works.
- language a programming language that builds objects such as a button, input box, or chart and gives them attributes and capabilities (such as printing, displaying data or validating data entry) or that leverages programming objects built by others. The idea is that the code is organized when it is embedded in the objects.
- copper wires that were installed in the walls of homes and businesses used for higher speed cable TV and cable modems
- A group of interconnected computing devices tht can share resources and communicate data using standard (rather than proprietary meaning company owned) protocols. Inside a building another name is local area network which use Ethernet wired technology or WIFI
- the copper wires of old telephone networks which were installed in the walls of homes and businesses. It was an engineering feat to use these wires for DSL (highspeed) data transmission
Down
- an in-home or business computing device that connects to the fiber optics or cable coaxial cable modem and creates a WIFI network used to connect devices to the Internet.
- a data storage, processing and transmitting technology embedded into labels that is used to track the location and movement of assets such as pallets of inventory.
- software used to write computer programs which are instructions to process data. Popular examples are Python, C#, C++, and Visual Basic.
- written instructions that control computer data processing and hardware. The software controls the hardware and tells it what to do such as calculating payroll using different business rules to implement different tax structures.
- the maximum BPS that a network channel can transmit. Slang usage is a meaure of the capacity of a person or department to get work done.
- software that controls and connects the different parts of the computer such as disk storage, RAM, the keyboard, screen and the CPU to the application software.
- the data transmission protocol invented by Americans and UK engineers that created the Internet
- as opposed to disk drives, and solid state memory which are used for permanent storage, RAM computer chips are used to temporarily store and manipulate data. Data is copied from permanent storage into RAM for ‘in-memory’ processing such as calculation of metrics.
- a computer generated bot that uses AI to support your information needs, for example to choose the best flight to Florida.
- software modules (such as a print driver) that are created by programmers and can be freely used by other programmers to build new application software.
- voice over internet protocol a technology that enables telephone calls over the internet rather than private networks managed by telephone companies.
- rather than rely of copper or glass ‘wires’ WIFI uses radio waves emitted from a system of cellular towers.
- an electronic device that can be programmed to accept data input, store it, manipulate it and output data.
- transmission the ability to transmit data without wires either long distances (5G networks) or short distances (bluetooth).
27 Clues: the measurement of actual data transmission spped • a principal that computers double in speed ever 18 to 24 months • software that can read an image such as a pdf and turn it into a document that can be edited. • the data transmission protocol invented by Americans and UK engineers that created the Internet • ...
NETWORKS 2016-09-07
Δίκτυα Υπολογιστών (Computer Networks) 2020-04-23
Across
- Οι υπολογιστές και οι συσκευές (εκτυπωτές, τερματικά, δρομολογητές και δορυφόροι) που συνδέονται σε ένα δίκτυο,ονομάζονται τερματικές συσκευές ή αλλιώς...
- Παίζει το ρόλο του πομπού ή του δέκτη σε ένα δίκτυο και ονομάζεται υπολογιστής ...
- Τα δίκτυα που καλύπτουν μία μικρή έκταση, συνδέοντας συσκευές που βρίσκονται σε ένα δωμάτιο ή σε ένα κτίριο ή συγκρότημα κτιρίων ονομάζονται...
Down
- Στην τοπολογία αυτή, υπάρχει μια γραμμή (καλώδιο) που αποτελεί́ τη ραχοκοκαλιά του δικτύου και όλες οι συσκευές είναι συνδεδεμένες σε αυτήν.Είναι η τοπολογία...
- Το δίκτυο καλωδιακής τηλεόρασης είναι ένα ... δίκτυο
5 Clues: Το δίκτυο καλωδιακής τηλεόρασης είναι ένα ... δίκτυο • Παίζει το ρόλο του πομπού ή του δέκτη σε ένα δίκτυο και ονομάζεται υπολογιστής ... • Τα δίκτυα που καλύπτουν μία μικρή έκταση, συνδέοντας συσκευές που βρίσκονται σε ένα δωμάτιο ή σε ένα κτίριο ή συγκρότημα κτιρίων ονομάζονται... • ...
PLS115 Ch. 2 Vocab 2021-08-31
Across
- _________________ language is communication that eliminates or limits the use of codes and acronyms.
- _________________ information does not need to be divulged to the police or courts due to a special relationship.
- A statement of information about elements of a crime given by a person involved in the crime.
- A person who provides information in a criminal action and whose identity must be protected.
- Totality of ____________.
- The ability of public safety officials to communicate with each other via wireless communications networks.
Down
- A purposeful and voluntary giving up of a known right.
- ______________ questions limit the amount of information a witness can provide.
- A statement which contains information about elements of a crime but falls short of a confession.
- Acronym for the FBI's online real-time transaction-processing database that maintains information on millions of records.
- ____________ questions suggest answers.
- The questioning of a hostile witness or suspect.
- The planned questioning of a witness, victim, informant, or other persons with information.
- A relationship of mutual trust.
- A legal detailed account of events related to a crime.
15 Clues: Totality of ____________. • A relationship of mutual trust. • ____________ questions suggest answers. • The questioning of a hostile witness or suspect. • A purposeful and voluntary giving up of a known right. • A legal detailed account of events related to a crime. • ______________ questions limit the amount of information a witness can provide. • ...
PLS115 Ch. 2 Vocab 2021-08-31
Across
- _________________ language is communication that eliminates or limits the use of codes and acronyms.
- _________________ information does not need to be divulged to the police or courts due to a special relationship.
- A statement of information about elements of a crime given by a person involved in the crime.
- A person who provides information in a criminal action and whose identity must be protected.
- Totality of ____________.
- The ability of public safety officials to communicate with each other via wireless communications networks.
Down
- A purposeful and voluntary giving up of a known right.
- ______________ questions limit the amount of information a witness can provide.
- A statement which contains information about elements of a crime but falls short of a confession.
- Acronym for the FBI's online real-time transaction-processing database that maintains information on millions of records.
- ____________ questions suggest answers.
- The questioning of a hostile witness or suspect.
- The planned questioning of a witness, victim, informant, or other persons with information.
- A relationship of mutual trust.
- A legal detailed account of events related to a crime.
15 Clues: Totality of ____________. • A relationship of mutual trust. • ____________ questions suggest answers. • The questioning of a hostile witness or suspect. • A purposeful and voluntary giving up of a known right. • A legal detailed account of events related to a crime. • ______________ questions limit the amount of information a witness can provide. • ...
Cross Word Puzzle 2021-08-24
Across
- Literacy, being able to understand and use technology
- set of related web pages located under a single domain name, typically produced by a single person or organization.
- theory that says learners construct knowledge rather than just passively take in information.
- recording, reproducing, or broadcasting of moving visual images.
- Practice of taking someone else's work or ideas and passing them off as one's own.
- The evolution of ever-changing learning networks, their complexity, and the role of technology.
Down
- Combination of text, graphics, audio, and video with links and tools that let the user navigate, interact, create, and communicate.
- Intelligence, Computer programs that try to emulate human decision-making capabilities
- The legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy.
- theory of learning based on the idea that all behaviors are acquired through conditioning.
- Theory that focusses on how information is received, organized, stored and retrieved by the mind
- Integration, Implementation of educational technology to accomplish intended learning outcomes.
- Software designated to allow user browse online
- Medium
- Lifeline of today's era.
15 Clues: Medium • Lifeline of today's era. • Software designated to allow user browse online • Literacy, being able to understand and use technology • recording, reproducing, or broadcasting of moving visual images. • Practice of taking someone else's work or ideas and passing them off as one's own. • ...
CROSSWORD 2022-03-29
Across
- satellite internet constellation operated by SpaceX for providing satellite internet connectivity
- Microsoft is setting up its largest data center in India in this city
- Founder of world wide web - Tim _____ Lee
- Digital dexterity is a term coined by
- Balance point where enterprises achieve th right mix of traditional and digitial capabilities of assets
- The acronymn for 5 tech stocks that replaced FAANG
- Network of physical objects that are embedded with sensors, software and technologies and exchange data over internet
Down
- A concept that uses technology to combine the digital world with the physical world; a portmanteau
- Society 5.0 is an intiative by which country
- After 244 years, this company ceased to print encylopaedia from 2012 thereby migrating to digital editions
- digital payments firm that has acquired Gigindia, a marketplace for gig workers
- Digital ______ is the ability of employees to adapt to emerging technologies in their feld to produce better results
- Project _____ is BPCL's initiative on the digital front
- India's latest unicorn which is into developing software for OTT networks
- Cloud computing service that provides computing, storage and networking resources on demand
15 Clues: Digital dexterity is a term coined by • Founder of world wide web - Tim _____ Lee • Society 5.0 is an intiative by which country • The acronymn for 5 tech stocks that replaced FAANG • Project _____ is BPCL's initiative on the digital front • Microsoft is setting up its largest data center in India in this city • ...
Radio, Recording, and Popular Music 2022-02-27
Across
- a broadcasting station that aligns itself with a network
- sale of radio or television content to stations on a market-by-market basis
- the illegal recording and sale of copyrighted material
- relaxation of ownership and other rules for radio and television
- total sale of broadcast airtime
- streaming or downloading of audio files recorded and stored on distant servers
- single ownership and management of multiple radio stations in one market
- "radio stations" that can be accessed only over the World Wide Web
Down
- percentage of a market's total population that is reached by a piece of broadcast programming
- a device that translates digital computer information into an analog form so it can be transmitted through telephone lines
- centralized production, distribution, decision-making organizations that links affiliates for the purpose of delivering their audiences to advertisers
- in broadcast regulation, the idea that broadcasters serve as the public's trustees fiduciaries
- the delivery of "radio" over the Internet directly to individual listeners
- predetermined sequence of selected records to be played by a disc jockey
- a radio station's particular sound or programming content
15 Clues: total sale of broadcast airtime • the illegal recording and sale of copyrighted material • a broadcasting station that aligns itself with a network • a radio station's particular sound or programming content • relaxation of ownership and other rules for radio and television • "radio stations" that can be accessed only over the World Wide Web • ...
alex crossword 2013-05-01
Across
- One type of damage of threath security.
- Is a software program that displays advertising on your computer.
- Is a form of attack that prevents users from accessing normal services.
- Is a program written with malicious intent .
- Programming language developed to interact with HTML source code to allow interactive websites.
- Is the protocol suite that is used to control all of the communications on the Internet.
- Is a self-replicating program that is harmful to networks.
- Technology created by Microsoft to control interactivity on web pages.
- Explain his activities is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
- Virus that does not need to be attached to other software.
Down
- The process of removing sensitive data from hardware and software before recycling or discarding.
- Is software designed specifically to detect, disable, and remove viruses.
- Programming language that allows applets to run within a web browser.
- Is a file or program other then a virus that is potentially harmful.
- Is a common tcp/ip atacks.
15 Clues: Is a common tcp/ip atacks. • One type of damage of threath security. • Is a program written with malicious intent . • Is a self-replicating program that is harmful to networks. • Virus that does not need to be attached to other software. • Is a software program that displays advertising on your computer. • ...
5.01 Vocab 2024-04-22
Across
- Computerized storage for information and facts
- The use of computer software to control machines, tools, and processes involved in manufacturing products
- A system of computers connected together by telephone wires, cable wires, or other means
- A navigational system that uses satellite technology to determine location and provide directions
- The use of computer technology to plan, design, test, and alter products
- A mobile phone with advanced capabilities, such as accessing the Internet
- The practical application of science to society and industry
Down
- Technology that allows users to communicate over the Internet rather than through traditional public networks
- Programs that instruct computers to perform specific operations
- The physical components of a computer system (e.g., the central processing unit, hard drive, modem)
- An object placed into orbit by humans; most are used for communications purposes
- Computer software designed to mimic the knowledge of a human expert
- Working from home or a remote location
- Technology that allows users to make telephone calls over the Internet
- A number you choose to gain access to an account
15 Clues: Working from home or a remote location • Computerized storage for information and facts • A number you choose to gain access to an account • The practical application of science to society and industry • Programs that instruct computers to perform specific operations • Computer software designed to mimic the knowledge of a human expert • ...
CS Principal Exam Review 2024-04-25
Across
- The idea that some communities or populations have less access to computing than others (2 words)
- A mistake in typed code that violates the rules of the programming language
- A wireless access point that gives unauthorized access to secure networks
- Material created on a computer is the _______ _______ of the creator or an organization.
- _____ _____ issue digital certificates that validate the ownership of encryption keys
- a problem with a yes/no answer
- Add from the end of the array
- composed of 8 bits
Down
- The iteration over the items in a list. A full traversal iterates over every item, while a partial traversal iterates over a subset of the items
- Google Maps Route Recommendations are an example of a to a problem
- compression does not lose any data such as Huffman text compression
- Wikipedia is an example of _____
- A lightweight data transport protocol with minimal error checking
- Amount of time to complete the task sequentially divided by the Amount of time to complete the task when run in parallel.
- The data of a data is called ___
15 Clues: composed of 8 bits • Add from the end of the array • a problem with a yes/no answer • Wikipedia is an example of _____ • The data of a data is called ___ • A lightweight data transport protocol with minimal error checking • Google Maps Route Recommendations are an example of a to a problem • compression does not lose any data such as Huffman text compression • ...
Week 10: The Nervous System 2022-11-19
Across
- microscopic branching fiber of a nerve cell that is the first part to receive the nervous impulse.
- collection of spinal nerves below the end of the spinal cord.
- space thru which a nervous impulse travels between nerve cells: means, a point of contact
- connective and supportive tissue of an organ. In the nervous system these are glial cells.
- this nervous system contains nerves that are only found in the digestive system.
- portion of the brain that controls body temperature, sleep, appetite, sexual desire, and emotions such as fear and pleasure.
- largest part of the brain: responsible for voluntary muscular activity, vision, speech, taste, hearing, thought and memory.
Down
- suffix that means seizure
- meninges that means hard mother, in Latin.
- large, interlacing networks of nerves
- neurotransmitter chemical released at the ends of nerve cells.
- suffix that means strength
- relatively sudden loss of consciousness, followed by a spontaneous rapid and complete recovery
- microscopic fiber that is part of a neuron and carries nerve impulses along the nerve cell.
- neurons and nerves, essential distinguishing tissue of the nervous system.
15 Clues: suffix that means seizure • suffix that means strength • large, interlacing networks of nerves • meninges that means hard mother, in Latin. • collection of spinal nerves below the end of the spinal cord. • neurotransmitter chemical released at the ends of nerve cells. • neurons and nerves, essential distinguishing tissue of the nervous system. • ...
computer components 2025-03-28
Across
- a computer's main processing component that controls the flow of data and instructions.
- a temporary storage area that stores frequently accessed data and instructions
- a device that sends and receives data between networks, connecting devices to the internet
- a computer storage device that uses flash memory to store data
- a physical device that stores data
- the main printed circuit board
- a screen that displays information from a computer
Down
- an electronic circuit that processes graphics
- a hardware component that converts alternating current electricity into direct current electricity for a computer
- It's where the data is stored that the computer processor needs to run applications and open files.
- a hand-held device that controls the cursor on a computer screen
- a wireless technology that allows devices to connect and exchange data without wires
- a type of non-volatile computer memory that can store data even when there is no power
- a panel of keys that you press to type letters, numbers, and symbols
- a type of computer memory that stores permanent data and instructions
15 Clues: the main printed circuit board • a physical device that stores data • an electronic circuit that processes graphics • a screen that displays information from a computer • a computer storage device that uses flash memory to store data • a hand-held device that controls the cursor on a computer screen • ...
Techtonic Round 1 Set C 2025-03-26
Across
- A set of rules that define how data is transmitted between devices in a network.
- A type of memory that loses its data when power is turned off.
- A security software designed to detect and remove malicious programs.
- (The smallest unit of digital data, represented as either 0 or 1.
- A computing approach that simulates human intelligence for decision-making.
- A numerical label assigned to a device for identification on a network.
- A cryptographic technique used to convert data into a secure format.
Down
- (A collection of related web pages, usually accessed through a common domain name.
- (A system that prevents unauthorized access to or from a private network.
- (A widely used markup language for creating web pages.
- (A set of programs that manage computer hardware and software resources.
- A network device that forwards data packets between computer networks.
- A process that transforms data into a fixed-length value, commonly used in security.
- A cloud computing service model that provides virtualized computing resources over the internet.
- A widely used operating system known for its open-source nature and flexibility.
15 Clues: (A widely used markup language for creating web pages. • A type of memory that loses its data when power is turned off. • (The smallest unit of digital data, represented as either 0 or 1. • A cryptographic technique used to convert data into a secure format. • A security software designed to detect and remove malicious programs. • ...
Crack the Cold War Code 2024-12-13
Across
- A Soviet clerk who defected to Canada, exposing Soviet spy networks and starting the Cold War
- Canadian-built fighter jet was designed to defend North America from Soviet bombers during the Cold War
- A radar system built in Canada's north to detect Soviet missile attacks during the Cold War
- Communist superpower
- A defense alliance between Canada and the U.S. to defend against Soviet missile attacks
- Canada's key military partner during the Cold War
- A competition between the U.S. and the Soviet Union to build powerful weapons during the Cold War
Down
- A military alliance that included Canada, created to protect against Soviet expansion
- An economic system based on private ownership and free markets
- An economic and political system where the government controls production, central to Cold War tensions
- In the Cold War, Canada was often referred to as a "Middle ______"
- A period of tension between the U.S. and the Soviet Union without direct fighting
- This "scare" symbolized the hunt for Soviet spies in Canada
13 Clues: Communist superpower • Canada's key military partner during the Cold War • This "scare" symbolized the hunt for Soviet spies in Canada • An economic system based on private ownership and free markets • In the Cold War, Canada was often referred to as a "Middle ______" • A period of tension between the U.S. and the Soviet Union without direct fighting • ...
Their are dashes between the words 2024-01-19
Across
- private network that uses internet technologies, but its resources are made available only to external
- limited in range to only a few feet
- a portion of a network with a common network address
- geographically isolated and connected to form a large internetwork
- a computer system controlled by a single organization
- geographically dispersed WAN connections that connect multiple LANs
Down
- it uses radio signals instead of wires to connect systems together
- a network that covers an area as small as a few city blocks to as large as an entire metropolitan city
- network made up of an interconnection of local area networks within a limited geographical area, such as a university's campus
- network that uses software to control connectivity, management and services between data centers and remote branches
- a network in a small geographic area,
- a private network that uses internet technologies
- a large world-wide public network
13 Clues: a large world-wide public network • limited in range to only a few feet • a network in a small geographic area, • a private network that uses internet technologies • a portion of a network with a common network address • a computer system controlled by a single organization • it uses radio signals instead of wires to connect systems together • ...
Mobile Communication Basics 2025-03-20
Across
- The fifth-generation mobile communication standard, known for ultra-fast speeds
- This component in GSM acts as a bridge between BTS and MSC
- The third-generation (3G) mobile communication standard
- A key component of GSM architecture responsible for routing calls and managing mobility
- The high-speed wireless technology introduced in 4G networks
- The radio interface between the mobile phone and the base transceiver station in GSM
- The first generation of mobile communication (1G) used this type of technology
- A database that temporarily stores subscriber information when they roam into a new area
Down
- This technology introduced packet-switched data transmission in 2.5G
- A mobile device connects to this station for communication with the network
- The technology that allows multiple users to share the same frequency band in GSM
- The process of dividing a geographic area into smaller regions for better frequency reuse
- This GSM element keeps a database of all mobile subscribers permanently registered in the network
13 Clues: The third-generation (3G) mobile communication standard • This component in GSM acts as a bridge between BTS and MSC • The high-speed wireless technology introduced in 4G networks • This technology introduced packet-switched data transmission in 2.5G • A mobile device connects to this station for communication with the network • ...
Computer Science Crossword 2025-10-04
Across
- Security device or software that filters network traffic based on rules.
- A device that connects two or more networks and directs data between them.
- Solid State Drive: fast storage device based on flash memory with no moving parts.
- The part of the CPU responsible for arithmetic and logical operations.
- The process of removing unnecessary details to focus on the essential parts of a problem.
- A network covering a small geographic area, such as a building.
- Number system using only 0s and 1s; also known as base 2.
Down
- Software designed with malicious intent to harm or access data.
- A translator that converts source code to machine code in a single pass.
- A named value in a program that can store data and be changed during execution.
- Search algorithm that repeatedly divides an ordered list in half to find a value.
- Random Access Memory: temporary storage for programs and data that is lost when power is off.
- Software that controls the operation of the computer and provides a user interface.
13 Clues: Number system using only 0s and 1s; also known as base 2. • Software designed with malicious intent to harm or access data. • A network covering a small geographic area, such as a building. • The part of the CPU responsible for arithmetic and logical operations. • A translator that converts source code to machine code in a single pass. • ...
Animal Cell 2021-10-06
Across
- membrane-bound organelles they handle waste products, taking in waste products and get rid of them
- a nonmembranous body make of protein and RNA and the site of ribosome synthesis
- where proteins are synthesized
- Contains DNA and directs cells activities
- contains no ribosomes and functions in lipid synthesis, absorption of fats, and metabolism of drugs
- Boundary that holds cell contents, move substances in and out of the cell and uses signal transduction
- make up most of the cell volume, a clear liquid (cytosol), cytoskeleton, and networks of membranes and organelles
- transports materials within the cell, provide attachment for ribosomes and synthesizes lipids
Down
- condensed DNA in which is formed during cell division
- packages protein molecules for transport and secretion
- the double-layered layer that contains relatively large nuclear pores
- release energy from nutrient molecules and change energy into a usable form
- enables a sperm cell to move
- contains ribosomes and functions in protein synthesis and processing
- digest worn cellular parts or substances that enter cells
- near the nucleus usually in pairs and involved in the development of spindle fibers in cell division
- propel fluid over cellular surfaces
17 Clues: enables a sperm cell to move • where proteins are synthesized • propel fluid over cellular surfaces • Contains DNA and directs cells activities • condensed DNA in which is formed during cell division • packages protein molecules for transport and secretion • digest worn cellular parts or substances that enter cells • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The misuse of substances that affect both physical and mental health
- The illegal trade and distribution of drugs is called drug ________
- The condition of relying on drugs and unable to function without them
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- In the long term, drug use leads to ___________, making it hard to stop
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- Drug addiction often leads to losing this, impacting economic productivity.
- Illegal networks that distribute drugs internationally
Down
- The illegal act of transporting or selling drugs
- Many drug users experience this mental condition, causing sadness and hopelessness.
- A harmful mental effect caused by drug use, where users see things that aren't real
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drug users often experience ________, a mental disorder involving intense fear
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Excessive use of drugs can lead to ________, which can be fatal.
- 10. Vital part of the body damaged by drug use, such as the brain, liver, and _______
- A fatal consequence of drug use, often from excessive consumption
- Drug users are often involved in illegal ________ acts to support their addictio
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
TTS DRUGS (GROUP 1) 2024-10-24
Across
- The illegal trade and distribution of drugs is called drug ________
- Illegal networks that distribute drugs internationally
- The government allocates a large _______ to fight drug trafficking and support rehabilitation
- Drugs cause damage to these parts of the body, like the brain, liver, and lungs
- Drugs lower the overall ______ of life for users
- Vital part of the body damaged by drug use, such as the brain, liver, and _______
- Excessive use of drugs can lead to ________, which can be fatal.
- Drugs are a major trigger for increased _______ rates, such as theft and violen.
- Many drug users experience this mental condition, causing sadness and hopelessness.
- In the long term, drug use leads to ___________, making it hard to stop
Down
- The illegal act of transporting or selling drugs
- The crime of cleaning illegally obtained money, often linked to drug trafficking
- A harmful mental effect caused by drug use, where users see things that aren't real
- Drug users often experience ________, a mental disorder involving intense fear
- The condition of relying on drugs and unable to function without them
- The misuse of substances that affect both physical and mental health
- Mental health disorder caused by drug use, involving extreme fear and nervousness
- Drug users are often involved in illegal ________ acts to support their addictio
- Drug addiction often leads to losing this, impacting economic productivity.
- A fatal consequence of drug use, often from excessive consumption
20 Clues: The illegal act of transporting or selling drugs • Drugs lower the overall ______ of life for users • Illegal networks that distribute drugs internationally • Excessive use of drugs can lead to ________, which can be fatal. • A fatal consequence of drug use, often from excessive consumption • The illegal trade and distribution of drugs is called drug ________ • ...
Ancient history egypt 2024-10-28
Across
- - Ancient Egyptian writing system using pictographs and symbols.
- - Location of rock-cut tombs for New Kingdom pharaohs.
- - Massive statue with a lion’s body and a human head near Khafre’s pyramid.
- - Title given to Egyptian kings, considered gods on Earth.
- - Preserved body prepared for the afterlife in ancient Egypt.
- - Major temple complex dedicated to gods like Amun-Ra.
- - The river that was the lifeline of Egypt, providing fertile soil and transportation.
- - Land with which Hatshepsut established trade, known for luxury goods like myrrh.
Down
- - One of the first female pharaohs who expanded trade networks.
- - Site of temples built by Ramses II to honor his legacy and power.
- - Young pharaoh known for his intact tomb, discovered in the 20th century.
- - God of the afterlife, central to Egyptian religion in the Middle Kingdom.
- - Location of the Great Pyramid built for Pharaoh Khufu.
- - Material used for writing in ancient Egypt, made from a Nile plant.
- - Military technology introduced by the Hyksos during the Second Intermediate Period.
- - Known as Ramses the Great, he led military campaigns and built numerous temples.
- - Concept of truth, balance, and order maintained by the pharaoh.
17 Clues: - Location of rock-cut tombs for New Kingdom pharaohs. • - Major temple complex dedicated to gods like Amun-Ra. • - Location of the Great Pyramid built for Pharaoh Khufu. • - Title given to Egyptian kings, considered gods on Earth. • - Preserved body prepared for the afterlife in ancient Egypt. • - One of the first female pharaohs who expanded trade networks. • ...
AP World Crossword 2023-02-22
Across
- open rebellions against the authorities
- Indian Soldiers serving under British or European orders
- Caused fierce parliamentary debates and press wars
- The british changed their goals to ___ due to the violent conflicts being put into question, and therefore expanding railroad networks
- The European’s ___ developments catapulted the European’s far ahead in the capacity to wage war
- Formed the Indian National Congress movement, which would become important to independence after WWI
- Great Britain sent these, making for a brutal counteroffensive that led to the sepoy bands being crushed
- Leaders often lacked ___ in new industrialized nations when it came to dealing with overproduction and unemployment as a result of economic crises
- Ships Began to rapidly advance after the opening of the _____.
Down
- Often seen as safe valves during industrial slumps and raw material shortages
- Indian rebellions named after its origins in the ranks of British-trained Indian Soldiers.
- one of the main causes why the first mutiny occurred in India
- The new industrialization in Europe created ___ among European Powers
13 Clues: open rebellions against the authorities • Caused fierce parliamentary debates and press wars • Indian Soldiers serving under British or European orders • one of the main causes why the first mutiny occurred in India • Ships Began to rapidly advance after the opening of the _____. • The new industrialization in Europe created ___ among European Powers • ...
Cyber Security 2021-10-07
Across
- ethics being authorized to attempt to gain unauthorized access to a computer,
- scramble,
- the practice of encoding information so only authorized people can read it,
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit care numbers,
- the practice of protecting systems networks, and programs from digital attacks,
- footprint a data trail you unintentionally leave online,
- hat hackers have permission to hack a system to discover the systems vulnerabilities,
Down
- the practice of solving and writing encryptions,
- a type of malicious software designed to block access to a computer system until a sum of money is paid,
- hacking to promote a political agenda or social change,
- a form of protection for intellectual property usually applying to artistic works,
- the use of electronic communication to bully a person,
- literacy having the ability to find information evaluate information credibility and use information effectively,
13 Clues: scramble, • the practice of solving and writing encryptions, • the use of electronic communication to bully a person, • hacking to promote a political agenda or social change, • footprint a data trail you unintentionally leave online, • the practice of encoding information so only authorized people can read it, • ...
Computing Technical Terms 2023-05-19
Across
- A software that searches, detects and blocks computer viruses and other malware
- The primary printed circuit board in a computer
- _________ system, the computer's master control program which sets the standards for all application programs
- A system that connects and transmits data between different computer devices
- The address of a page or a file on the Internet
Down
- A computer system in a network that is shared by multiple users and client computers
- Universal interface that connects peripheral devices to a computer
- Unsolicited emails, also called junk mail
- The temporary storage where all program execution and data processing takes place
- A software that blocks traffic into and out of private networks according to configured rules
- A file or set of files that are necessary for the operating system to communicate with a hardware device
- A copy of data on external storage, usually made for security reasons
- The process of initializing the computer and starting to execute instructions
13 Clues: Unsolicited emails, also called junk mail • The primary printed circuit board in a computer • The address of a page or a file on the Internet • Universal interface that connects peripheral devices to a computer • A copy of data on external storage, usually made for security reasons • A system that connects and transmits data between different computer devices • ...
Tech Times Crossword 2023-09-25
Across
- Pink WhatsApp messages are often circulated via these types of links, making them appear trustworthy
- A payment solution that enables real-time small-value payments without a UPI PIN
- The Rupay card variant in which "Empower Her" Debit Card is available
- Under Sampann, access to benefits are extended to the entire __
- As part of the Sampann program, these are provided at a discount and are used in farming
- The technology that UPI Lite X uses for transactions in close proximity
- A cyberattack that locks or encrypts data and demands a ransom for its release
Down
- GBM helps improve customer satisfaction and loyalty through this
- Extended Reality combines the best elements of AR and VR, creating an __ experience
- A security breach where an attacker gains unauthorized access to a system by guessing passwords
- The act of illegally accessing computer systems or networks with malicious intent
- This feature of UPI Lite X allows users to send and receive money
- DPDPA mandates firms to assess data collection, legal basis, and obtain this
13 Clues: Under Sampann, access to benefits are extended to the entire __ • GBM helps improve customer satisfaction and loyalty through this • This feature of UPI Lite X allows users to send and receive money • The Rupay card variant in which "Empower Her" Debit Card is available • The technology that UPI Lite X uses for transactions in close proximity • ...
Technology Crossword 2023-09-19
Across
- a microcomputer designed for use by one person at a time.
- a type of compact disc able to store large amounts of data, especially high-resolution audiovisual material.
- the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- integrated circuit that generates the video signal sent to a computer display.
- a set of instructions, data or programs used to operate computers and execute specific tasks
- a worldwide system of computer networks
Down
- the main printed circuit board (PCB) in a computer.
- all the public websites or pages that users can access on their local computers and other devices through the internet.
- an internal or external computer component that stores data, such as the operating system, applications, and user files
- a mechanism used to connect peripheral devices to computers.
- your computer or laptop's short-term memory
- a type of compact disc that can only be read, not written to
- essentially the brain of the computer.
13 Clues: essentially the brain of the computer. • a worldwide system of computer networks • your computer or laptop's short-term memory • the main printed circuit board (PCB) in a computer. • a microcomputer designed for use by one person at a time. • a mechanism used to connect peripheral devices to computers. • a type of compact disc that can only be read, not written to • ...
AP gov 5.6 2025-03-13
Across
- organizations formed to advocate for specific issues or causes
- a lobbying approach that targets influential community leaders rather than the general public
- a broader and less structured coalition of various groups that influence policy
- large, structured organizations such as businesses or unions that engage in lobbying
- a theory that multiple, competing groups influence policymaking.
- a strategy where lobbyists directly communicate with legislators to influence policies
- public support given to a candidate or policy by an influential organization
Down
- groups that focus on one specific poicy area, sich as gun rights or abortion
- Individuals who benefit from public goods or group activities without contributing
- a form of advocacy that starts from the bottom up, involving regulat citizens in political action
- organizations that work for the common good of society rather than specific interests
- the act of attempting to influence policymaking and legislation
- the relationship among bureaucratic agiencies, interest groups, and congressional committees that shapes policy
13 Clues: organizations formed to advocate for specific issues or causes • the act of attempting to influence policymaking and legislation • a theory that multiple, competing groups influence policymaking. • groups that focus on one specific poicy area, sich as gun rights or abortion • public support given to a candidate or policy by an influential organization • ...
Community Development 2018-03-01
Across
- community development process pg. 3
- based on weak relationships among people who do not have a great deal of contact with one another pg. 78
- having the knowledge, skills, and processes or a specialized nature pg. 59
- create mechanisms for specified purpose of providing or enhancing technical assistance pg. 59
- networks of actors engaged in activities associated with a place, or a social process involving residents in working together to improve their quality of life pg. 2
- institutional environment shapes the context and defines the arena where conflict plays out pg. 105
- identifying individual resources, local organizations, and community institutions that can be used as assets in community development plan pg. 75
- focuses on the use of technical knowledge to design and implement a targeted program pg. 16
- What state is MTSU in?
- central to conflict pg. 106
- a method of implementing change possibly through technical assistance or self-help pg. 14
- specified activities such as housing construction, adoption of agriculture innovations or implementing recreational programs pg. 14
- where was Ms. Standridge's conference?
- also emphasizes local people working together, nurture their leadership skill and knowledge, and organize their own actions even when they disagree pg. 16
- extensive tracts of land and all that is on them- trees, rivers, mountains, beaches, etc. pg. 37
Down
- concerned with fairness of the process, won't be satisfied with outcome is process wasn't fair pg. 113
- conflict or controversy over land or resources pg. 103
- all rights assigned to you in a social role, defined through written and unwritten rules pg. 103
- response to conflict characterized by high concern for one's own interests, paired with a high concern for the interests of other parties pg. 112
- disagreement between individuals who are important at the community level, often between people of authority pg. 105
- process of effectively communicating or marketing technology's benefits to potential users pg. 57
- strong relationships among individuals who know each other very well pg. 78
- residents in a specific geographic place that act on locally oriented or collective interests pg. 2
- community development outcomes pg. 3
- create policies and programs, control access to federal funds, and influence how or if community development occurs pg.23
- have a vested interest in the conflict, but may not be directly involved pg. 106
- emphasizes people in a community coming together and learning how to address problems on their own pg. 16
- having the power to manipulate resources, knowledge, and information pg. 59
- stresses the importance of social relationships and networks to make community development possible (a.k.a. glue) pg. 72
- having the power to create, legislate, and appropriate resources pg. 59
- perform specific tasks by private consultants pg. 59
31 Clues: What state is MTSU in? • central to conflict pg. 106 • community development process pg. 3 • community development outcomes pg. 3 • where was Ms. Standridge's conference? • perform specific tasks by private consultants pg. 59 • conflict or controversy over land or resources pg. 103 • having the power to create, legislate, and appropriate resources pg. 59 • ...
Web Safety Terms and Definitions 2023-08-22
Across
- Software designed to protect computers from viruses.
- A program designed to prevent, detect, search and remove viruses and other types of malware from the computers drive.
- A relationship between two things or situations, especially where one thing affects the other.
- A communication method/mailing method that uses electronic devices to deliver messages across computer networks
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- The system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties.
- A dishonest scheme; a fraud.
- Collection of computers controlled by users other than their owners to perform automated tasks over the Internet.
- connected to, served by, or available through a system and especially a computer or telecommunications system .
- Ownership of any creative work or invention.
- A person who uses computers to gain unauthorized access to data.
- The act or an instance of taking one's own life voluntarily and intentionally.
- exception to copyright infringement.
- The external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more.
- The sending of sexually explicit messages or images by cell phone.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Down
- A group of two or more computers or other electronic devices that are interconnected for the purpose of exchanging data and sharing resources.
- bring together or into contact so that a real or notional link is established.
- The use and or distribution of copyrighted computer software in violation of the copyright laws or applicable license restrictions.
- The programs and other operating information used by a computer.
- The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- The practice of taking someone else's work or ideas and passing them off as one's own.
- Information such as facts and numbers used to analyze something or make decisions or information in a form that can be processed by a computer.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A secret word or phrase that must be used to gain admission to something.
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Computer device which forwards data packets from one network to another .
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
28 Clues: A dishonest scheme; a fraud. • exception to copyright infringement. • Ownership of any creative work or invention. • Software designed to protect computers from viruses. • The programs and other operating information used by a computer. • A person who uses computers to gain unauthorized access to data. • ...
