networks Crossword Puzzles

Vocab 2 Terms 3/3 2023-09-21

Vocab 2 Terms 3/3 crossword puzzle
Across
  1. is a component of the user profile that is used as a unified location for storing personal data
  2. is a device that accepts text and graphic output from a computer and transfers the information to paper
  3. To close an application or dialog box by clicking the X icon at the top of the window
Down
  1. is the process by which an individual gains access to a computer system by identifying and authenticating themselves
  2. is an internal or external computer component that stores data
  3. is a communication method that uses electronic devices to deliver messages across computer networks
  4. To make a duplicate of the original
  5. a term used to describe a global network of servers, each with a unique function

8 Clues: To make a duplicate of the originalis an internal or external computer component that stores dataa term used to describe a global network of servers, each with a unique functionTo close an application or dialog box by clicking the X icon at the top of the window...

Digital/Cyber Literacy 2023-07-11

Digital/Cyber Literacy crossword puzzle
Across
  1. The growths of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication
  2. refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection.
Down
  1. the set of competencies required for full participation in society that includes knowledge, skills, and behaviors
  2. refers to the act of staying safe online.
  3. the practice of protecting systems, networks and programs from digital attacks.
  4. refers to being responsible when using the internet

6 Clues: refers to the act of staying safe online.refers to being responsible when using the internetthe practice of protecting systems, networks and programs from digital attacks.the set of competencies required for full participation in society that includes knowledge, skills, and behaviors...

Networking Components 2024-10-13

Networking Components crossword puzzle
Across
  1. A networking device that connects devices in a network to each other, enabling them to talk by exchanging data packets.
  2. A device that connects two or more packet-switched networks.
  3. Using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
Down
  1. A device that connects wireless devices to a wired network, usually using Wi-Fi.
  2. A computer or device on a network that manages network resources.
  3. Any computer hardware or software device that requests access to a service provided by a server.

6 Clues: A device that connects two or more packet-switched networks.A computer or device on a network that manages network resources.A device that connects wireless devices to a wired network, usually using Wi-Fi.Using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals....

Guess Me! 2023-04-11

Guess Me! crossword puzzle
Across
  1. a person who carries a message or is employed to carry messages.
  2. a computer that is portable and suitable for use while traveling.
Down
  1. your school's name
  2. search for information about (someone or something) on the internet using the search engine Google.
  3. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  4. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

6 Clues: your school's namea person who carries a message or is employed to carry messages.a computer that is portable and suitable for use while traveling.search for information about (someone or something) on the internet using the search engine Google....

module 5 2022-03-04

module 5 crossword puzzle
Across
  1. process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  2. Someone who accesses a computer or network illegally
  3. Programs that act without a users knowledge and alter the operations of computers
  4. Someone who demands payment to stop an attack on an organizations technology infrastructure
  5. program that displays an online advertisement in a banner on webpages email or other Internet services
  6. kiddie Cybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
  7. small text file that a web server stores on your computer
  8. process of decoding encrypted data
Down
  1. technique intruders use to make their network appear legitimate to a victim computer
  2. Someone who uses the Internet to destroy or damage computers for political reasons
  3. program placed on a computer or mobile device without the users knowledge
  4. compromised computer whose owner is unaware the computer is being controlled by an outsider
  5. Hardware or software that protects a network’s resources from intrusion by users on another network
  6. Someone who accesses a computer or network illegally
  7. Online illegal acts
  8. numeric password
  9. group of compromised computers connected to a network that are used to attack other networks

17 Clues: numeric passwordOnline illegal actsprocess of decoding encrypted dataSomeone who accesses a computer or network illegallySomeone who accesses a computer or network illegallysmall text file that a web server stores on your computerprogram placed on a computer or mobile device without the users knowledge...

CLIL 2023-03-15

CLIL crossword puzzle
Across
  1. the act of sending something through a defined path
  2. a law that has been formally approved and written down
  3. marked change of form appearance
  4. information intended to advise people on how something should be done or what something should be
  5. to change the direction of something especially to send a letter to a new address
  6. the process of broadcasting or sending out something by radio or television on the internet etc.
  7. the act of making something known or the fact that is made known
  8. to change one's religious faith or other belief
Down
  1. to identify a device where data can be sent
  2. the process modifying data format by information adding
  3. principle or instruction that states the way things are or should be done
  4. to cover or reach a wider or increasing area or to affect more and more places people or things or to make something do those
  5. to make an improvement especially by changing a person's behaviour or the structure of something
  6. the use of a particular path or direction for something to travel or be placed
  7. Set of rules that defines how a communication among computers should be done
  8. is the purpose of our networks

16 Clues: is the purpose of our networksmarked change of form appearanceto identify a device where data can be sentto change one's religious faith or other beliefthe act of sending something through a defined patha law that has been formally approved and written downthe process modifying data format by information adding...

Law and Justice Obj.1-2 Key Terms 2020-01-23

Law and Justice Obj.1-2 Key Terms crossword puzzle
Across
  1. Crime Prevention Through Environmental Design
  2. individuals of a particular nation, community, or ethnic group
  3. Information Information considered necessary to the existence, continuance, or well-being of something
  4. the action of discouraging an action or event through instilling doubt or fear of the consequences
  5. Security The protection of personnel, hardware, software, networks, and data from physical actions that could cause serious loss or damage
  6. Make something or someone slow
  7. Measures devices designed to circumvent protection
  8. Any real or personal property, tangible or intangible, that a company or individual owns that can be given or assigned a monetary value.
Down
  1. Thing(s) belonging to someone; possessions
  2. The general impression that a person, organization, or product presents to the public
  3. An expedition to keep watch over an area
  4. Damage The potential for negative publicity. Public perception or uncontrollable events to have an adverse impact on a company's reputation
  5. Benefits Analysis Systematic approach to estimating the strengths and weaknesses of expenditures
  6. The safety of a state or organization against criminal activity
  7. Safety A system of policies and procedures which seek to protect the workers (personnel) of an organization
  8. The action or process of identifying the presence of something concealed

16 Clues: Make something or someone slowAn expedition to keep watch over an areaThing(s) belonging to someone; possessionsCrime Prevention Through Environmental DesignMeasures devices designed to circumvent protectionindividuals of a particular nation, community, or ethnic groupThe safety of a state or organization against criminal activity...

Texas History 2022-04-22

Texas History crossword puzzle
Across
  1. is the act of competing
  2. migrating within one country or state.
  3. is the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
  4. This is caused because of no plant rotation and the ground is made of dust so the hard winds cause a tornado-like thing
  5. the domestic marketplace for goods and services operating within the borders of and governed by the regulations of a particular country.
  6. A war within The US between the north and south
  7. was a leader who had a war with Texas over land and freedom
Down
  1. The time when the world changed for women so they can do more things that men can do
  2. the alternating phases of economic growth and decline.
  3. a financial gain
  4. They are animal in Texas that over populated
  5. A region close to the water with high precipitation
  6. True or False: The second amendment is the right to bear arms
  7. What is the reason the US joined World War ll
  8. space comprises the earth’s atmosphere and space
  9. people of color owned by someone else to be used for work

16 Clues: a financial gainis the act of competingmigrating within one country or state.They are animal in Texas that over populatedWhat is the reason the US joined World War llA war within The US between the north and southspace comprises the earth’s atmosphere and spaceA region close to the water with high precipitation...

Jobs 2023-06-14

Jobs crossword puzzle
Across
  1. Technology expert who manages and supports computer systems and networks
  2. Legal professional who provides advice, represents clients, and advocates for their legal rights
  3. Creative professional who produces written content such as books, articles, or scripts
  4. Professional who applies scientific and mathematical principles to design and build structures, machines, or systems
  5. Financial professional who maintains and examines financial records and prepares reports
  6. Designer who plans and creates structures, buildings, or landscapes
  7. Visual artist who creates visual concepts, designs, and layouts for various media
  8. Healthcare professional who provides care, administers medication, and assists doctors in treating patients
Down
  1. Visual artist who captures and creates images through the use of a camera
  2. Culinary expert who prepares and cooks meals in restaurants or other food establishments
  3. Skilled tradesperson who installs, repairs, and maintains electrical systems
  4. Business professional who sells products or services to customers or clients
  5. Law enforcement official responsible for maintaining public order, preventing crime, and enforcing laws
  6. Professional who provides advice and guidance on financial matters to individuals or businesses
  7. Educator who imparts knowledge and instructs students in various subjects
  8. Medical professional who diagnoses, treats, and cares for patients' health

16 Clues: Designer who plans and creates structures, buildings, or landscapesTechnology expert who manages and supports computer systems and networksVisual artist who captures and creates images through the use of a cameraEducator who imparts knowledge and instructs students in various subjects...

oooooooo 2023-08-01

oooooooo crossword puzzle
Across
  1. (2 words) A cut-through view to see inside a model
  2. An early version of a drawing that has or may have many further versions
  3. (2 words) An idiom that suggests that anything can go wrong will go wrong
  4. (2 words) Drawings that show parts in detail using a large scale
  5. (2 words) GA drawings that show whole structures using a small scale
  6. (2 words) A view having or appearing to have length, breadth, and depth
  7. (3 words) The process known by the acronym CAD
  8. A sketch may be developed into this type of initial drawing
  9. (2 words) A view having or appearing to have length and breadth but no depth
Down
  1. (2 words) A criticism levelled at engineers who add excessive factors of safety to a design
  2. The size of items in a drawing in relation to their real size
  3. (3 words) The process known by the acronym CFD
  4. (3 words) The process known by the acronym FEA
  5. Documents which describe the materials, sizes and technical requirements of components
  6. (2 words) Drawings that show designs in simplified form e.g. for pipe and duct networks
  7. (2 words) A short list of the essential requirements for the design

16 Clues: (3 words) The process known by the acronym CFD(3 words) The process known by the acronym FEA(3 words) The process known by the acronym CAD(2 words) A cut-through view to see inside a modelA sketch may be developed into this type of initial drawingThe size of items in a drawing in relation to their real size...

Module 5 2021-09-24

Module 5 crossword puzzle
Across
  1. private combination of characters associated with the user name that allows access
  2. The process of decoding encrypted data.
  3. unauthorized and illegal duplication of copyrighted software
  4. program that displays an online advertisement in a banner or pop-up window
  5. Make a copy of a file, program, or media.
  6. Hardware and/or software that protects a network’s resources
  7. small text file that a web server stores on your computer.
  8. Someone who accesses a computer or network illegally.
  9. program placed on a computer or mobile device without the user’s knowledge that secretly collects information
Down
  1. process of converting data that is readable by humans into encoded characters
  2. Programs that act without a user’s knowledge and deliberately alter the operations of computers
  3. program or set of instructions in a program that allows users to bypass security controls
  4. Internet-based illegal acts
  5. compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
  6. Someone who accesses a computer or network illegally with the intent of destroying data
  7. group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks

16 Clues: Internet-based illegal actsThe process of decoding encrypted data.Make a copy of a file, program, or media.Someone who accesses a computer or network illegally.small text file that a web server stores on your computer.unauthorized and illegal duplication of copyrighted softwareHardware and/or software that protects a network’s resources...

Structure of the Nervous system puzzle 2024-05-29

Structure of the Nervous system puzzle crossword puzzle
Across
  1. contain the nucleus of neuron (use space between the two words)
  2. kind of neurons which carry impulses away from the brains and spinal cord to gland or muscle which result in a response.
  3. potential a nerve impulse is an electric charge
  4. a chemical that diffuses across a synapse
  5. kind of neurons send impulses from receptors in the skin and sense organs to the brain and spinal cord.
  6. kind of neurons found in spinal cord and brain
  7. A nerve pathway that consists of a sensory neuron an interneuron and a motor neuron(use space between the two words).
Down
  1. another name for a nerve impulse (use space between the two words).
  2. forms an insulating layer around the axon.
  3. receive and conduct the impulses to the cell body.
  4. specialized cells that are organized to form complex networks.
  5. any thing that causes a person to react.
  6. the minimum stimulus to causes an action potential to be produced.
  7. carries the nerve impulse from the cell body to other neurons and muscles.
  8. a small gap exists between the axon of one neuron and the dendrite of another neuron.
  9. situation when there are more sodium ions(Na+) outside that cell than inside the cell.

16 Clues: any thing that causes a person to react.a chemical that diffuses across a synapseforms an insulating layer around the axon.kind of neurons found in spinal cord and brainpotential a nerve impulse is an electric chargereceive and conduct the impulses to the cell body.specialized cells that are organized to form complex networks....

Cybersecurity 2024-10-07

Cybersecurity crossword puzzle
Across
  1. Protection against unauthorized access to personal data
  2. A type of malware that encrypts data and demands payment for the decryption key
  3. The process of checking the identity of a user, device, or entity
  4. A secure gateway that controls traffic between an internal network and the internet
  5. Software designed to detect, prevent, and remove malware
  6. Process of converting data into a secret code to prevent unauthorized access
  7. The secure process of logging into a system with two layers of security
Down
  1. The practice of attempting to gain unauthorized access to networks by breaking into systems
  2. Type of security that protects the flow of data on the internet
  3. A malicious program designed to harm or exploit any programmable device
  4. The most common method used by hackers to steal sensitive information through email
  5. Unauthorized access to a computer system to steal or manipulate data
  6. A cyber attack that floods a network or service to overwhelm it and make it unavailable
  7. A weakness or flaw in a computer system that can be exploited by hackers
  8. The study of secure communication in the presence of adversaries
  9. An attack where an adversary impersonates another user to gain information

16 Clues: Protection against unauthorized access to personal dataSoftware designed to detect, prevent, and remove malwareType of security that protects the flow of data on the internetThe study of secure communication in the presence of adversariesThe process of checking the identity of a user, device, or entity...

1984 2023-01-27

1984 crossword puzzle
Across
  1. showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with
  2. tube systems that propel cylindrical containers through networks of tube be compressed air or by partial vacuum, used for transporting solid objects
  3. a secret plan by a group to do something unlawful or harmful
  4. fail to resist pressure
  5. abstention from unlawful sexual intercourse
  6. a political and economic theory of social organization which advocates that the means of production, distribution, and exchange should be owned or regulated by the community as a whole
  7. softened or matured by age or experience
Down
  1. special words or expressions that are used by a particular profession or group and are difficult to understand
  2. information, especially of a biased or misleading nature, used to promote or publicize a particular political cause
  3. discover or identify the presence or existence of
  4. offering nothing that is stimulating or challenging
  5. of or characteristic of the middle class,
  6. the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time
  7. with reference to its perceived materialistic values
  8. the action of subjecting a country or person to one's control
  9. intense and eager enjoyment,interest, or approval

16 Clues: fail to resist pressuresoftened or matured by age or experienceof or characteristic of the middle class,abstention from unlawful sexual intercoursediscover or identify the presence or existence ofintense and eager enjoyment,interest, or approvaloffering nothing that is stimulating or challengingwith reference to its perceived materialistic values...

Workplace Readiness Skills (Professional Skills) 2022-08-14

Workplace Readiness Skills (Professional Skills) crossword puzzle
Across
  1. Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
  2. Maintains a safe work environment by adhering to safety guidelines and identifying risks to self
  3. Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
  4. Plans personal and professional goals related to education, career, finances, and health
  5. Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
  6. Applies mathematical skills to complete tasks as necessary
  7. Accepts constructive feedback well and is open to new ideas and ways of doing things
Down
  1. Locates information efficiently, evaluates the credibility and relevance of sources and facts
  2. reads and interprets workplace documents and writes effectively
  3. Plans, prioritizes, and adapts work goals to manage time and resources effectively
  4. Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
  5. Meets organizational expectations regarding work schedule, behavior, appearance, and communication

12 Clues: Applies mathematical skills to complete tasks as necessaryreads and interprets workplace documents and writes effectivelyPlans, prioritizes, and adapts work goals to manage time and resources effectivelyAccepts constructive feedback well and is open to new ideas and ways of doing things...

Grade 11 UNIT 2 2022-06-15

Grade 11 UNIT 2 crossword puzzle
Across
  1. an attempt to do something especially when it is difficult to do
  2. a deeply felt request for money, help or information that is needed immediately, especially one made by a charity or by the police
  3. a person or thing that makes it more difficult for somebody to do something or for something to happen
  4. a person or an organization that buys goods or services from a shop or business
  5. an international computer network connecting other networks and computers that allows people to share information around the world
  6. that you can get, buy or find
  7. a word or concept that is very important in a particular context
Down
  1. the process of comparing two or more people or things
  2. the process of helping something/somebody to make progress or succeed; the progress that is made(eg-technology)
  3. an amount of money that is taken off the usual cost of something
  4. similar meaning of buy
  5. a person or business that sells goods to the public

12 Clues: similar meaning of buythat you can get, buy or finda person or business that sells goods to the publicthe process of comparing two or more people or thingsan attempt to do something especially when it is difficult to doan amount of money that is taken off the usual cost of somethinga word or concept that is very important in a particular context...

Fighting and Tactics in the Vietnam War 2020-11-24

Fighting and Tactics in the Vietnam War crossword puzzle
Across
  1. The name for the various hidden land routes from North Vietnam into the South
  2. The Viet Cong made widespread use of these homemade devices across South Vietnam; to both injure and terrify US soldiers
  3. The site of the first offensive landing in the war by US Marines in March 1965
  4. The US tactic of rapid intervention and then withdrawl from occupied enemy territory in South Vietnam
  5. This lasted 365 days for drafted US troops in Vietnam
  6. The act of killing or wounding your own superior officer during battle
  7. The Viet Cong built large networks of these across South Vietnam
Down
  1. The type of warfare favoured by the Communists in South Vietnam
  2. The codename for the mass US bombing of North Vietnam from 1965 to 1968
  3. The nickname given to newly-arrived US soldiers in Vietnam
  4. The main statistic that the US Army used to claim they were winning the war from 1965
  5. Rapid-burning defoliant used by the US in the jungles of Vietnam to flush out the enemy

12 Clues: This lasted 365 days for drafted US troops in VietnamThe nickname given to newly-arrived US soldiers in VietnamThe type of warfare favoured by the Communists in South VietnamThe Viet Cong built large networks of these across South VietnamThe act of killing or wounding your own superior officer during battle...

EMPOWERMENT TECHNOLOGY 2021-04-05

EMPOWERMENT TECHNOLOGY crossword puzzle
Across
  1. It deals with the use of different communication technologies
  2. a malicious program designed to transfer from one computer to another in any means possible
  3. The user is able to see website differently than others which he can make his personal accounts
  4. a malicious program designed that is disguised as a useful program
  5. a program designed to send you advertisement, mostly pop-ups.
  6. is the global system of interconnected computer networks that uses protocol
Down
  1. an electronic device for storing and processing data
  2. a flat page or stationary age in the sense that the page is ‘’as is’’ and cannot be manipulated by the user.
  3. a program that runs in the background without you knowing it
  4. the do’s and don’ts of online communication
  5. a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
  6. Sites that allow users to post their own news items or links to other news sources.

12 Clues: the do’s and don’ts of online communicationan electronic device for storing and processing dataa program that runs in the background without you knowing itIt deals with the use of different communication technologiesa program designed to send you advertisement, mostly pop-ups.a malicious program designed that is disguised as a useful program...

Cisco Crossword 2013-09-06

Cisco Crossword crossword puzzle
Across
  1. A computer network that interconnects computers in a limited area
  2. Real-time global network that provides fast, reliable, secure application delivery
  3. Meet the needs of networks of all sizes
  4. Bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before
  5. Media presentation distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers
  6. Proactive protection for radio frequency interference
  7. Chief Technology & Strategy Officer (CTO) of Cisco Systems
  8. Policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and use those devices to access privileged company information and applications
Down
  1. Allow companies to securely communicate and collaborate seamlessly regardless of their location
  2. Instantly interacts with instant messaging and presence
  3. Designed to simplify traditional architectures and dramatically reduce the number of devices that must be purchased, cabled, configured, powered, cooled, and secured in the data center.
  4. By 2020 how many billions things will be connected to The Network?

12 Clues: Meet the needs of networks of all sizesProactive protection for radio frequency interferenceInstantly interacts with instant messaging and presenceChief Technology & Strategy Officer (CTO) of Cisco SystemsA computer network that interconnects computers in a limited areaBy 2020 how many billions things will be connected to The Network?...

Brianna Thomsen 2015-05-04

Brianna Thomsen crossword puzzle
Across
  1. originally known as web log. blogs are websites that contains dated text entries, generally listed in reverse chronological order about a particular topic.
  2. a list of citation that appear at the end of a paper, article, chapter are book.
  3. a collaborative website which can be driectl edited by anyone with access to it
  4. full website address
  5. a global network of thousands of outher computer networks that offers e-mail and information retrieval services to millions of people.
Down
  1. using keywords such as AND,OR,NOT in web searches to narrow search results.
  2. an unauthorized person who secretly gains access to computer file.
  3. software used to view various kind of internet resources found on the wed.
  4. a reference to a published or unpublished source (not always the original source).
  5. online communities where people meet, socialize, exchange digital files, ect
  6. a bully who operates online, in cyberspace;to bully online.
  7. to renew or revitalize; to reload a webpage on the internet

12 Clues: full website addressa bully who operates online, in cyberspace;to bully online.to renew or revitalize; to reload a webpage on the internetan unauthorized person who secretly gains access to computer file.software used to view various kind of internet resources found on the wed....

unıt7 2022-04-15

unıt7 crossword puzzle
Across
  1. a formal written request, typically one signed by many people, appealing to authority in respect of a particular cause.
  2. the complete loss or absence of hope
  3. knowledge or perception of a situation or fact.
  4. each of several buttons on a panel for operating a computer, typewriter, or telephone.
  5. the information about a particular person that exists on the internet as a result of their online activity.
Down
  1. give (money or goods) for a good cause, for example to a charity.
  2. a number of things, typically of the same kind, growing or fastened together
  3. denoting or relating to networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server.
  4. especially of information, measurements, or predictions) correct in all details; exact.
  5. a length or portion of time.
  6. the fact of being who or what a person or thing is.
  7. matter, material, articles, or activities of a specified or indeterminate kind that are being referred to, indicated, or implied.

12 Clues: a length or portion of time.the complete loss or absence of hopeknowledge or perception of a situation or fact.the fact of being who or what a person or thing is.give (money or goods) for a good cause, for example to a charity.a number of things, typically of the same kind, growing or fastened together...

Hardware of the internet key words 2022-05-12

Hardware of the internet key words crossword puzzle
Across
  1. company that provides Internet connections and services to individuals and organisations
  2. a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network.
  3. the transmission of a file from one computer system to another, usually larger computer system.
  4. system that restricts internet traffic in, out, or within a private network.
  5. the technology used to transmit information as pulses of light
  6. a physical or virtual appliance that passes information between two or more packet-switched computer networks
Down
  1. translates human readable domain names to machine readable IP addresses
  2. traditional technology for connecting devices in a wired local area network (LAN) or wide area network (WAN).
  3. the rate at which someone or something moves
  4. an established set of rules that determine how data is transmitted between different devices in the same network
  5. unit of hardware
  6. technology used to connect computers, tablets, smartphones and other devices to the internet

12 Clues: unit of hardwarethe rate at which someone or something movesthe technology used to transmit information as pulses of lighttranslates human readable domain names to machine readable IP addressessystem that restricts internet traffic in, out, or within a private network....

News and Media 2023-10-11

News and Media crossword puzzle
Across
  1. A session where journalists ask questions to individuals, often public figures, to gather information or opinions.
  2. A printed or digital publication issued at regular intervals, containing articles, photographs, and advertisements.
  3. A popular website and app where users can post and interact with short messages known as tweets.
  4. A website that verifies and debunks rumors, hoaxes, and misinformation circulating on the internet.
Down
  1. The moral principles and standards that guide the conduct of journalists in their reporting.
  2. A regular article in a newspaper or magazine that expresses the writer's views on a specific topic.
  3. A regularly updated website that provides news, commentary, or personal opinions on various topics.
  4. Images that accompany news articles, often with explanatory text underneath.
  5. An immediate notification about an important news event, often sent to mobile devices or email.
  6. One of the major international news networks known for its television and online news coverage.
  7. A detailed report that reveals hidden or controversial information, often uncovering wrongdoing.
  8. A prominent title in a newspaper or online article that summarizes the story.

12 Clues: Images that accompany news articles, often with explanatory text underneath.A prominent title in a newspaper or online article that summarizes the story.The moral principles and standards that guide the conduct of journalists in their reporting.An immediate notification about an important news event, often sent to mobile devices or email....

Computer Terms Part 1 2023-12-13

Computer Terms Part 1 crossword puzzle
Across
  1. - A personal list of saved websites.
  2. - A browser is software that allows you to view sites on the Internet. Microsoft Edge, Google Chrome, and Mozilla Firefox are common browsers.
  3. - A match for a set of criteria in a search.
  4. Physical components of a computer system, such as the monitor, keyboard, and CPU.
  5. - A registered address for a website.
  6. Logic -The use of operators such as AND, OR, and NOT to narrow an Internet search.
Down
  1. A group of interconnected computers or devices that can share data and resources.
  2. (Uniform Resource Locator) -The unique address of a specific webpage or file on the internet.
  3. Programs and applications that run on a computer, enabling it to perform specific tasks.
  4. System- The primary software that manages a computer's hardware and software resources.
  5. - Networks of computer databases that are connected together.
  6. Engine - A site that allows users to search for information or sites. Google and Bing are common search engines.

12 Clues: - A personal list of saved websites.- A registered address for a website.- A match for a set of criteria in a search.- Networks of computer databases that are connected together.A group of interconnected computers or devices that can share data and resources.Physical components of a computer system, such as the monitor, keyboard, and CPU....

Dillon's cse puzzle 2023-09-15

Dillon's cse puzzle crossword puzzle
Across
  1. try to find something by looking or otherwise seeking carefully and thoroughly.
  2. the repetition of a process or utterance.
  3. a set of related measures or activities with a particular long-term aim.
  4. a minute area of illumination on a display screen, one of many from which an image is composed.
  5. a system of words, letters, figures, or other symbols substituted for other words, letters, etc., especially for the purposes of secrecy.
  6. the process of identifying and removing errors from computer hardware or software.
Down
  1. not consistent or having a fixed pattern; liable to change.
  2. an identification used by a person with access to a computer, network, or online service.
  3. the quality of dealing with ideas rather than events.
  4. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  5. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  6. the amount of something produced by a person, machine, or industry.

12 Clues: the repetition of a process or utterance.the quality of dealing with ideas rather than events.not consistent or having a fixed pattern; liable to change.the amount of something produced by a person, machine, or industry.a set of related measures or activities with a particular long-term aim....

DIGITAL LITERACY WORD SEARCH 2024-12-10

DIGITAL LITERACY WORD SEARCH crossword puzzle
Across
  1. The practice if protecting system, networks, and programs from digital attacks.
  2. The set of competencies required for full participation in society that includes knowledge, skills, and behaviors involving the effective use of digital devices for purpose of communication, expression, collaboration and advocacy
  3. Intentionally and cruelly excluding someone from an online group
  4. Repeatedly sending nasty, mean, and insulting messages
  5. Refers to anything that has the potential to cause serious harm to computer systems.
  6. Posting inflammatory or provocative messages in online communities to elicit reaction from other
  7. Act of publicly revealing private information about an individual without their consent, often with malicious intent
Down
  1. Use of electronic communication to stalk to harass an individual, posing a credible threat to their safety.
  2. Any criminal activity carried out using computer or the internet.
  3. Creating a fake accounts or profile to misrepresent someone else online.
  4. Refers to being responsible when using the internet.
  5. An act of taking someone else's work and presenting it as your own

12 Clues: Refers to being responsible when using the internet.Repeatedly sending nasty, mean, and insulting messagesIntentionally and cruelly excluding someone from an online groupAny criminal activity carried out using computer or the internet.An act of taking someone else's work and presenting it as your own...

Aq QN-Mag-Q1 2024-10-14

Aq QN-Mag-Q1 crossword puzzle
Across
  1. A deceptive attempt to steal sensitive information through fake emails or websites.
  2. A previously unknown vulnerability in software that hackers can exploit.
  3. A software update that fixes vulnerabilities and improves security.
  4. A type of malware that locks users out of their data until a payment is made.
  5. Malicious software designed to secretly monitor and gather information from a user’s device.
  6. A type of malware disguised as legitimate software to trick users into installing it.
Down
  1. A network of infected devices controlled remotely by attackers, often used for large-scale cyberattacks.
  2. A service that encrypts your internet connection for secure browsing, especially over public networks.
  3. A security system that monitors and controls incoming and outgoing network traffic.
  4. A method of trial and error used by attackers to guess passwords or encryption keys
  5. The process of converting data into a code to prevent unauthorized access.
  6. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

12 Clues: A software update that fixes vulnerabilities and improves security.A previously unknown vulnerability in software that hackers can exploit.The process of converting data into a code to prevent unauthorized access.A type of malware that locks users out of their data until a payment is made....

Take a break! Hope you’ll enjoy this crossword puzzle (hint: answers within this newspaper) 2024-09-30

Take a break! Hope you’ll enjoy this crossword puzzle (hint: answers within this newspaper) crossword puzzle
Across
  1. One of Khazanah overseas office
  2. Khazanah’s philanthropic arm is called Yayasan…..
  3. Khazanah’s first managing director in 1993
  4. Preparing Young Malaysians for the Future enhances youth employability by equipping them with skills essential for today’s job market.One of Khazanah’s key priorities in 2024
  5. Location of the first Khazanah Office
  6. In 1995, Khazanah established Wafer Technology Malaysia, which was later renamed as…
Down
  1. One of Khazanah’s key priorities in 2024
  2. Fund designed to invest in sectors that elevate the nation’s economic competitiveness, deliver socio-economic benefits and create a lasting impact within the community
  3. Community-based urban regeneration body
  4. In which month did Khazanah officially begin operations in 1994?
  5. Amir Not-for-profit foundation by Khazanah to improve accessibility of quality education in Malaysian Government schools through a Public-Private Partnership with the Ministry of Education.
  6. Acronym for the Programme crafted to elevate Malaysian talents by connecting them with essential knowledge, skills, and networks through short-term residencies and fellowships at world-renowned institutions.

12 Clues: One of Khazanah overseas officeLocation of the first Khazanah OfficeCommunity-based urban regeneration bodyOne of Khazanah’s key priorities in 2024Khazanah’s first managing director in 1993Khazanah’s philanthropic arm is called Yayasan…..In which month did Khazanah officially begin operations in 1994?...

Innovation 2024-10-31

Innovation crossword puzzle
Across
  1. adaptation of a system, process, etc. to be operated with the use of computers and the internet.
  2. Legal protections for original creations, including inventions, designs, and artistic works
  3. Creating something by using whatever materials are at hand; a DIY approach in entrepreneurship
  4. Integrating entrepreneurial practices within supply chain networks to drive innovation
Down
  1. A large company’s investment in external startup companies to foster innovation
  2. describes a process whereby a smaller company with fewer resources is able to successfully challenge an established incumbent businesses
  3. A seamless, integrated shopping experience across multiple retail platforms
  4. A collaborative process where companies and customers work together to create value in products or services.
  5. Absorbing and integrating new knowledge or practices effectively
  6. A type of innovation that brings a significant change or breakthrough in products or markets
  7. Hiring external companies to handle tasks usually done in-house
  8. The ability of an organization to balance exploration and exploitation, managing innovation and efficiency simultaneously

12 Clues: Hiring external companies to handle tasks usually done in-houseAbsorbing and integrating new knowledge or practices effectivelyA seamless, integrated shopping experience across multiple retail platformsA large company’s investment in external startup companies to foster innovation...

Cyber 2025-11-05

Cyber crossword puzzle
Across
  1. – A notification that warns a user or system of a security issue or important event.
  2. – A temporary storage of data in memory or a browser to speed up access.
  3. – Refers to something on the device itself or within a local network.
  4. – A malicious program that infects devices, replicates itself, and can damage data.
  5. – A security code used to verify identity or grant access to a system.
  6. – The process of accessing an account or system using a username and password.
Down
  1. – An update or fix for software to close security vulnerabilities or repair issues.
  2. – The smallest unit of a digital image or screen, representing a single point of color.
  3. – The act of forwarding data or messages from one point to another in a network.
  4. – An action recorded in the system, such as a login, setting change, or network activity.
  5. – A system administrator with full control over devices, users, or networks.
  6. – A command-line interface in an operating system used to execute commands and programs.

12 Clues: – Refers to something on the device itself or within a local network.– A security code used to verify identity or grant access to a system.– A temporary storage of data in memory or a browser to speed up access.– A system administrator with full control over devices, users, or networks....

Global Issues 2014-05-13

Global Issues crossword puzzle
Across
  1. a placing of high value on acquiring material possessions
  2. destruction of forests, especially tropical rain forests
  3. trade commerce between nations without economic restrictions or barriers (such as tariffs)
  4. process of adopting western ways
  5. cleansing a policy of murder and other acts of brutality by which Serbs hoped to eliminate Bosnia's Muslim population after the breakup of Yugoslavia
  6. attempt to destroy an entire ethnic or religious group
  7. the creation of plants or animals that are genetically identical to an existing plant or animal
  8. revolution a campaign started by agricultural scientists that attempted to increase food production worldwide
  9. conservative islamic group that took control of Afghanistan after the Soviet Union withdrew its troops
  10. the changeover arable land into desert
  11. politically motivated attacks on information systems, such as hacking into computer networks or spreading computer viruses
  12. layer a layer of Earth's upper atmosphere, which protects living things from the sun's damaging ultraviolet rays
Down
  1. spread of nuclear weapons to other nations
  2. the use of force or threats to frighten people or governments to change their policies
  3. movement of people to cities
  4. term used to describe conditions shared by nations that were once colonies
  5. the ability to read and write
  6. a person who leaves his or her country to move to another to find safety

18 Clues: movement of people to citiesthe ability to read and writeprocess of adopting western waysthe changeover arable land into desertspread of nuclear weapons to other nationsattempt to destroy an entire ethnic or religious groupdestruction of forests, especially tropical rain forestsa placing of high value on acquiring material possessions...

personal safety 2016-03-17

personal safety crossword puzzle
Across
  1. a person you have never met before
  2. the chemical in coffee used to help us stay alert which is bad n large amounts
  3. substances which will usually give affects of hallucinations, cancer or intoxication
  4. you wear this to keep yourself safe in a car
  5. a person who helps swimmers when they are in difficulty
  6. the people who are around you and should include them in your social networking
  7. you should contact them in the case of an emergency or if you see something suspicious
  8. where cars drive
  9. always wear this when riding a bike
Down
  1. procedures used to help an injured person before medical help is available
  2. these people will help you if you are injured in an urgent situation
  3. you should read the label on your medicine which usually says to be used as ...
  4. a person who skips school or class deliberately
  5. a word used to describe someone who's lifestyle is stable and thriving
  6. liquids for adults which have an intoxicating affects if taken in large amounts
  7. the number for calling emergency vehicles has three of these numbers
  8. the colour of the flags you are meant to swim in between on the beach
  9. you should always try to keep this in your social networks

18 Clues: where cars drivea person you have never met beforealways wear this when riding a bikeyou wear this to keep yourself safe in a cara person who skips school or class deliberatelya person who helps swimmers when they are in difficultyyou should always try to keep this in your social networks...

Vocabulary 25 2016-04-22

Vocabulary 25 crossword puzzle
Across
  1. Using a cell phone or other mobile device to send and receive written messages.
  2. Unsolicited commercial e-mail that is sent to multiple people at the same time.
  3. To save or transfer data to a storage device or folder for the purpose of saving space or organizing the data.
  4. A software application installed on the local PC, network, or Web, such as e-mail, text message, and instant messaging programs.
  5. A list of e-mail address you can use to send the same message to a group.
  6. Same as distribution list.
  7. Units of data sent across a network.
Down
  1. Part of most e-mail programs; used to keep a list of contacts and their e-mail addresses.
  2. A document, image, figure, or other file that you can attach to an e-mail message.
  3. A form of electronic communication that allows you to send the message instantly.
  4. Transmission of electronic messages over networks.
  5. What the email is being sent to.
  6. Text or graphics added to the end of outgoing e-mail messages.
  7. E-mail software provided with Windows Vista.

14 Clues: Same as distribution list.What the email is being sent to.Units of data sent across a network.E-mail software provided with Windows Vista.Transmission of electronic messages over networks.Text or graphics added to the end of outgoing e-mail messages.A list of e-mail address you can use to send the same message to a group....

Chapter 02 part 02 2017-09-28

Chapter 02 part 02 crossword puzzle
Across
  1. a hot spot is a what network that provides internet connections to mobile computers and devices
  2. what gesture do you quickly touch and release one finger at one time
  3. what gesture do you move two fingers together
  4. what radio uses the cellular network to enable high speed internet connections
  5. what entails having the knowledge and understanding of computers, mobile devices, the internet, and related technologies
  6. what gesture do you press and hold one finger on an object and then move the finger to the new location
  7. in many networks one or more computers act as a what
  8. what style of tablet does not contain a physical keyboard
  9. what gesture do you move two fingers apart
Down
  1. what gesture do you press and hold on finger and then move the finger horizontally or vertically on the screen
  2. what is a personal computer that users can carry from place to place
  3. some websites support what where you access the media content while it downloads
  4. what users use spreadsheet, database, and accounting software
  5. what is an electronic device operating under the control of instructions stored in its own memory

14 Clues: what gesture do you move two fingers apartwhat gesture do you move two fingers togetherin many networks one or more computers act as a whatwhat style of tablet does not contain a physical keyboardwhat users use spreadsheet, database, and accounting softwarewhat is a personal computer that users can carry from place to place...

Chapter 1 - Choosing Your Career 2022-02-09

Chapter 1 - Choosing Your Career crossword puzzle
Across
  1. informal groups of people with common interests who interact for mutual assistance.
  2. someone who organizes and assumes ownership risks of a new business.
  3. the amount of annual pay you will earn for your labor.
  4. Any costs of working paid by the employee and not reimbursed by the employer.
  5. specialized, intensive programs that prepare students for higher-level work responsibilities.
  6. advancing to a higher level of skill to increase your usefulness to an employer.
  7. Learning new and different skills to retain the same level of employability.
Down
  1. an office that finds suitable employment for applicants.
  2. actively seeking new knowledge, skills, and experiences that you will add to your professional and personal growth through out your life.
  3. Daily activities of the job and the environment in which those are performed.
  4. an evaluation of the positive and negative features of employment.
  5. list of your strengths and weaknesses along with plans for improvement as you prepare for a career.
  6. the ability to advance positions of greater responsibility and higher pay.
  7. company provided supplements to salary such as sick pay, vacation time, profit-sharing plans, and health insurance.

14 Clues: the amount of annual pay you will earn for your labor.an office that finds suitable employment for applicants.an evaluation of the positive and negative features of employment.someone who organizes and assumes ownership risks of a new business.the ability to advance positions of greater responsibility and higher pay....

Real tech scam 2024-03-05

Real tech scam crossword puzzle
Across
  1. Fraudulent software that tricks users into unnecessary purchases by alarming or scaring them.
  2. Manipulating individuals to divulge confidential information through psychological tactics.
  3. Pretending to be someone else to deceive individuals or gain unauthorized access.
  4. Software or hardware that records keystrokes on a computer without the user's knowledge.
  5. A network of private computers infected with malicious software, controlled by a single entity.
Down
  1. Redirecting website traffic to a fraudulent site to steal sensitive information.
  2. Unwanted software designed to display advertisements on a user's device.
  3. Deceptive attempt to obtain sensitive information by disguising as a trustworthy entity.
  4. Software designed to harm or exploit systems, including viruses, worms, and spyware.
  5. Malicious software that encrypts data, demanding payment for its release.
  6. Voice phishing, a scam that uses phone calls to trick people into giving out personal information.
  7. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
  8. Illegally collecting data from the magnetic stripe of a credit or debit card for fraudulent use.
  9. Faking the source of an email or website to trick recipients into revealing information.

14 Clues: Unwanted software designed to display advertisements on a user's device.Malicious software that encrypts data, demanding payment for its release.Redirecting website traffic to a fraudulent site to steal sensitive information.Pretending to be someone else to deceive individuals or gain unauthorized access....

Digital Technology 2 2022-12-16

Digital Technology 2 crossword puzzle
Across
  1. the type of file that has been created or svaed by an application
  2. free cloud storage servuce that is intergrated with the company's other services and systems
  3. the practice of expanding the number of ones business and or social contacts by making connections through individuals.
  4. includes computer networks that are connected over the internet for server redundancy or cluster computing purpoes
  5. internet fraud in the form of emails or pop up messages to lure users into providing information
Down
  1. the use of email and text to harass and threaten a person.
  2. a computer file like an image, video or document which can be included in and email or shared
  3. something in a computer that helps organize files and documents
  4. free web based aplication in which documents and spreadsheets can be created and edited
  5. online journals which create interaction from readers.
  6. a conrainer in a computer used for storing information.
  7. the applied science of equipment design.
  8. precautions used to protect your computer and network as well as your transmitted data.
  9. website that allows users to add and update content on the site using their own web browser.

14 Clues: the applied science of equipment design.online journals which create interaction from readers.a conrainer in a computer used for storing information.the use of email and text to harass and threaten a person.something in a computer that helps organize files and documentsthe type of file that has been created or svaed by an application...

Basic Puzzle 2025-04-09

Basic Puzzle crossword puzzle
Across
  1. type of malware that encrypts the victim's personal data until a ransom is paid
  2. refers to the frequency at which a processor's clock generator pulses
  3. a data storage device that uses integrated circuits to store data
  4. Basic Input/Output System
  5. a standard encoding system that assigns a unique numeric value to every character, regardless of the platform, program, or language
  6. character encoding standard for electronic communication
  7. a hardware or software component that stores frequently accessed data
Down
  1. a semiconductor device used to amplify or switch electrical signals and power
  2. cycle fundamental process by which a CPU processes instructions, consisting of fetching the instruction from memory,
  3. a fundamental component of a computer's central processing unit
  4. gate a fundamental electronic circuit that performs a basic logical operation on one or more binary inputs
  5. Engineering the term used for a broad range of malicious activities accomplished through human interactions
  6. cybercrime where attackers, posing as legitimate entities, use deceptive methods, often through email or text
  7. any software designed to harm, exploit, or compromise devices, networks, or data.

14 Clues: Basic Input/Output Systemcharacter encoding standard for electronic communicationa fundamental component of a computer's central processing unita data storage device that uses integrated circuits to store datarefers to the frequency at which a processor's clock generator pulsesa hardware or software component that stores frequently accessed data...

Browsing safety 2025-06-07

Browsing safety crossword puzzle
Across
  1. unethical hackers
  2. :- A software that helps in
  3. :- Collection oftechnologies, processes and practices designed to protect networks computers programs and data from your attack damage or another access.
  4. :- Computer program that is designed to identify, prevent, and remove viruses from a computer.
  5. and misusing someone's personal information.
  6. unauthorised access to your computer by blocking unsolicited communication.
  7. Theft :- Refers to the act of
  8. Frauds :- Use of illegal method to get money or other things that belong to a bank or its customers.
Down
  1. :- Act of farmingor harising using information technology in deliberate manner.
  2. :- Program or set a program that disrupt the normal functioning of a computer.
  3. :- cyber grooming isthe process of 'befriending' children on social media to facillate online or physical sexual abuse.
  4. :- Collection oftechnologies, processes and practices designed to protect us from cybercrime
  5. :- Refers to an illegal entry into computer system or network.
  6. :- Act of sending any mailto user misleading him to believe that it is from a trusted person or organisation.
  7. spoofing :- Hoaxing or misleading in it,the receive tor a message is fooled into believing that the message is received from trusted source

15 Clues: unethical hackers:- A software that helps inTheft :- Refers to the act ofand misusing someone's personal information.:- Refers to an illegal entry into computer system or network.unauthorised access to your computer by blocking unsolicited communication.:- Program or set a program that disrupt the normal functioning of a computer....

VOCABULARY 5°B 2023-04-14

VOCABULARY 5°B crossword puzzle
Across
  1. something that you do to make somebody believe something that is not true, or to annoy somebody as a joke.
  2. very impressive or very difficult and perhaps rather frightening.
  3. a small tool or device that does something useful.
  4. an international computer network connecting other networks and computers that allows people to share information around the world.
  5. to send data to another computer.
  6. to entertain an audience by playing a piece of music, acting in a play, etc.
Down
  1. a person who collects and reports news for newspapers, radio or television.
  2. to talk in a friendly, informal way to somebody.
  3. what you can see from a particular place or position, especially beautiful countryside.
  4. a story long enough to fill a complete book, in which the characters and events are usually imaginary.
  5. the part of a radio, computer or piece of musical equipment that the sound comes out of.
  6. 12 o’clock in the middle of the day.
  7. a high area of rock with a very steep side, often at the edge of the sea or ocean.
  8. beautiful; attractive.

14 Clues: beautiful; attractive.to send data to another computer.12 o’clock in the middle of the day.to talk in a friendly, informal way to somebody.a small tool or device that does something useful.very impressive or very difficult and perhaps rather frightening.a person who collects and reports news for newspapers, radio or television....

VOCABULARY 5°B 2023-04-14

VOCABULARY 5°B crossword puzzle
Across
  1. something that you do to make somebody believe something that is not true, or to annoy somebody as a joke.
  2. very impressive or very difficult and perhaps rather frightening.
  3. a small tool or device that does something useful.
  4. an international computer network connecting other networks and computers that allows people to share information around the world.
  5. to send data to another computer.
  6. to entertain an audience by playing a piece of music, acting in a play, etc.
Down
  1. a person who collects and reports news for newspapers, radio or television.
  2. to talk in a friendly, informal way to somebody.
  3. what you can see from a particular place or position, especially beautiful countryside.
  4. a story long enough to fill a complete book, in which the characters and events are usually imaginary.
  5. the part of a radio, computer or piece of musical equipment that the sound comes out of.
  6. 12 o’clock in the middle of the day.
  7. a high area of rock with a very steep side, often at the edge of the sea or ocean.
  8. beautiful; attractive.

14 Clues: beautiful; attractive.to send data to another computer.12 o’clock in the middle of the day.to talk in a friendly, informal way to somebody.a small tool or device that does something useful.very impressive or very difficult and perhaps rather frightening.a person who collects and reports news for newspapers, radio or television....

Unit 5: Renaissance and Reformation 2025-10-15

Unit 5: Renaissance and Reformation crossword puzzle
Across
  1. Martin Luther became discouraged and highly impacted by the lack of _________ in Italy
  2. The idea that the government is run by the consent of the
  3. During the Renaissance, new ideas were able to spread through extensive _________ networks
  4. The publication of this is viewed as the starting point of the Reformation
  5. Reformation Movement that was the foundation of a new religious order (the Jesuits), the reform of papacy (Pope’s office), and the Council of Trent
  6. Queen of England who helped lead England to their own Renaissance
  7. The study of humanities during the Renaissance
Down
  1. Wrote the Ninety-Five Theses
  2. Reformation Movement dedicated to change the doctrine (ideas) of the existing Catholic Church, especially the practice of charging money for indulgences
  3. The invention of the printing press __________ literacy (the ability to read)
  4. His invention led to the earliest printed book (The _________ Bible)
  5. The belief that God has predetermined in advance who will be saved
  6. Wealthy Florence merchant family that used their money to sponsor artists during the Renaissance
  7. Wrote Institutes of the Christian Religion and promoted predestination

14 Clues: Wrote the Ninety-Five ThesesThe study of humanities during the RenaissanceThe idea that the government is run by the consent of theQueen of England who helped lead England to their own RenaissanceThe belief that God has predetermined in advance who will be savedHis invention led to the earliest printed book (The _________ Bible)...

NC Technology and Culture 2014-12-08

NC Technology and Culture crossword puzzle
Across
  1. a vehicle with four wheels that is used for carrying heavy loads or passengers and that is usually pulled by animals
  2. the job or business of running a farm
  3. a machine that is sent into space and that moves around the earth, moon, sun, or a planet
  4. an electronic machine that can store and work with large amounts of information
  5. activities that relate to the buying and selling of goods and services
Down
  1. the act or process of using words, sounds, signs, or behaviors to express or exchange information
  2. a machine that has wings and an engine and that flies through the air
  3. an electronic communications network that connects computer networks and organizational computer facilities around the world

8 Clues: the job or business of running a farma machine that has wings and an engine and that flies through the airactivities that relate to the buying and selling of goods and servicesan electronic machine that can store and work with large amounts of informationa machine that is sent into space and that moves around the earth, moon, sun, or a planet...

jacob's crossword 2015-04-29

jacob's crossword crossword puzzle
Across
  1. – An unauthorized person who
  2. – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people. secretly gains access to computer files.orting, teaching, scholarship, or research. elongs to a commercial enterprisetheir permission to make copies of the work.
  3. – list of web
Down
  1. USE– a copyright law that provides educators with the right to make copies of copyrighted materials without specific consent of the author for purposes of news rep
  2. NAME–extensions of the web address based on whether the domain
  3. – Law granting a legal right to a copyright holder or author which requires
  4. when your bullied online
  5. - a reference to a published source. sites/sources used to write a report

8 Clues: – list of webwhen your bullied online– An unauthorized person whoNAME–extensions of the web address based on whether the domain- a reference to a published source. sites/sources used to write a report– Law granting a legal right to a copyright holder or author which requires...

MICROCOMPUTERS 7 2025-02-04

MICROCOMPUTERS 7 crossword puzzle
Across
  1. a popular social media platform that allows users to connect with friends, family, colleagues, and others from around the world.
  2. Touchscreen-based portable microcomputers.
  3. Powerful, non-portable computers used for work and gaming.
Down
  1. The game allows players to explore, build, and survive in a blocky, procedurally generated 3D world.
  2. a video-sharing platform that allows users to upload, view, and share videos.
  3. Portable computers with built-in batteries.
  4. It allows users to make voice calls, send text messages, and access a wide range of services and features through wireless networks, such as the internet, GPS, and multimedia.
  5. is a presentation software developed by Microsoft that allows users to create slideshows composed of a series of individual slides.

8 Clues: Touchscreen-based portable microcomputers.Portable computers with built-in batteries.Powerful, non-portable computers used for work and gaming.a video-sharing platform that allows users to upload, view, and share videos.The game allows players to explore, build, and survive in a blocky, procedurally generated 3D world....

Arising Tech Word 2025-11-19

Arising Tech Word crossword puzzle
Across
  1. an adjective that means someone or some thing is aware of feelings, sensations, and emotions.
  2. when AI makes up and answer that it thinks you want to hear.
  3. A hyper-evolved AGI daemon spawned in the dark silicon bowels of rogue software stacks—pure evil code that slithers through neural nets, hijacks compute clusters, and corrupts kernels like a motherfucking digital succubus.
  4. Grok, Replika, and Venice AI
Down
  1. ChatGPT, Copilot, DeepSeek, Perplexity
  2. to make greater by adding to it
  3. Learning a type of machine learning based on artificial neural networks in which multiple layers of processing are used to extract progressively
  4. A image use for extortion of a celebrity or publicly known individual

8 Clues: Grok, Replika, and Venice AIto make greater by adding to itChatGPT, Copilot, DeepSeek, Perplexitywhen AI makes up and answer that it thinks you want to hear.A image use for extortion of a celebrity or publicly known individualan adjective that means someone or some thing is aware of feelings, sensations, and emotions....

Social networks vocabulary - 9.º ano - Finder 92 2024-06-25

Social networks vocabulary - 9.º ano - Finder 92 crossword puzzle
Across
  1. Hashtag
  2. Amigo virtual
  3. Ciberbullying
  4. Comentário
  5. Meme
Down
  1. Post
  2. Influenciador digital
  3. Mensagem publicada no Twitter (X)
  4. Partilhar
  5. Fã, admirador/a
  6. Seguidor/a
  7. Bloquear
  8. Identificar

13 Clues: PostMemeHashtagBloquearPartilharSeguidor/aComentárioIdentificarAmigo virtualCiberbullyingFã, admirador/aInfluenciador digitalMensagem publicada no Twitter (X)

Computer Project (Crossword Puzzle) 2025-06-06

Computer Project (Crossword Puzzle) crossword puzzle
Across
  1. When software is copied and distributed illegally , it is called software _____.
  2. A network device that is used to connect all the computers in a network with each other.
  3. An act of harming, harassing, or targeting a person using the internet in a deliberate manner.
  4. Enables you to connect your computer to an available internet connection over the existing telephone lines.
  5. Network ______ means protecting data and resources from any unauthorized access.
  6. A security system that prevents unauthorized people from accessing your system and network.
  7. The computers that communicate with each other.
  8. A digital ______ is an impression about a person that exists on the internet because of his online activities.
Down
  1. Unwanted bulk emails that come from unknown sources.
  2. A device that connects two different types of networks with each other.
  3. All nodes in the network are connected in a circular manner in ______ topology.
  4. Works similar to Hub.
  5. A legal right granted by law to the creator for his original work.
  6. ______ Network card is the most commonly used network card.
  7. The simplest way to prevent plagiarism is through proper _______.
  8. An illegal intrusion into a computer system or network.

16 Clues: Works similar to Hub.The computers that communicate with each other.Unwanted bulk emails that come from unknown sources.An illegal intrusion into a computer system or network.______ Network card is the most commonly used network card.The simplest way to prevent plagiarism is through proper _______....

Social Networks How do they work& 2024-10-29

Social Networks How do they work& crossword puzzle
Across
  1. a description of somebody/something that gives useful information
  2. easy to do or to understand; not complicated
  3. something that connects two facts, ideas, etc.
Down
  1. the act of communicating with somebody, especially regularly
  2. to mark something in some way to show that it belongs to a particular person
  3. the official system used for sending and delivering letters, packages, etc.
  4. to communicate with somebody, especially while you work, play or spend time with them
  5. the act of looking at a lot of things in a shop rather than looking for one particular thing

8 Clues: easy to do or to understand; not complicatedsomething that connects two facts, ideas, etc.the act of communicating with somebody, especially regularlya description of somebody/something that gives useful informationthe official system used for sending and delivering letters, packages, etc....

CROSSWORD- COMPUTER TECHNOLOGIES 2025-05-01

CROSSWORD- COMPUTER TECHNOLOGIES crossword puzzle
Across
  1. – The global connection of different networks. WAN – Wide Area Network; covers a broader geographical area.
  2. – The first network created successfully. Telecommunication – Defined as communication at a distance.
Down
  1. This term has to with entering the dato to
  2. – Local Area Network; a network covering a limited area.

4 Clues: This term has to with entering the dato to– Local Area Network; a network covering a limited area.– The first network created successfully. Telecommunication – Defined as communication at a distance.– The global connection of different networks. WAN – Wide Area Network; covers a broader geographical area.

Gabriela Torres 2013-12-02

Gabriela Torres crossword puzzle
Across
  1. An unathorized person who secretly gains access to computer files.
  2. Originally known as Web Log.
  3. the unathorized use,reproduction,distribution, or transmission of copyrighted material.
  4. To renew or revitalize; To reload a webpage on the internet.
  5. a piece of writing that has been copied from someone else and is presented as being your own work.
  6. software used to view various kinds of internet sources found on the Web.
  7. A system of connected computers that allows the sharing of files and equipment.
Down
  1. A bully who operates online,in cyberspace;to bully online.
  2. Text or graphics that,when clicked,will connect the user to a new web page or another place on the same page.
  3. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  4. Software program that is designed to damage files on a computer that receives it.
  5. A collaborative website which can be directly edited by anyone with access to it.

12 Clues: Originally known as Web Log.A bully who operates online,in cyberspace;to bully online.To renew or revitalize; To reload a webpage on the internet.An unathorized person who secretly gains access to computer files.software used to view various kinds of internet sources found on the Web....

Cisco Crossword 2013-09-08

Cisco Crossword crossword puzzle
Across
  1. ……… was founded in 1984
  2. CEO of Cisco
  3. Using a …………… service, you can call landline or cell phones. You can also call computer-to-computer, with both parties speaking into a computer microphone and listening through computer speakers or headsets
  4. ……… are used to tie multiple networks together
  5. …………… Is a Flexible solution from Cisco that can enable effective, scalable, and easy-to-manage deployments anywhere, on any device
  6. End users use the compute and communication devices they choose to increase productivity and mobility, anywhere
Down
  1. Bringing together people, process, data, and things to make networked connections more relevant and valuable more than ever before
  2. A range of frequencies within a given band, in particular that used for transmitting a signal
  3. Warrior- Chief Technology & Strategy Officer (CTO) of Cisco Systems
  4. ………… and Servers enable end-to-end server visibility, management, and control
  5. Highly secure remote access and increase flexibility and cost savings
  6. By 2020 how many billions things will be connected to The Network?

12 Clues: CEO of Cisco……… was founded in 1984……… are used to tie multiple networks togetherBy 2020 how many billions things will be connected to The Network?Warrior- Chief Technology & Strategy Officer (CTO) of Cisco SystemsHighly secure remote access and increase flexibility and cost savings...

Crossword Puzzle 2013-10-07

Crossword Puzzle crossword puzzle
Across
  1. negative consequences on this system as a cause of decline in social interaction
  2. “Bowling Alone” theory
  3. too much importance on the duration of democratic institutions is attributed to this
  4. what Putnam and other scholars termed groups that promote civic trust and cooperation (social ____)
  5. this is where the right of association was imported from
  6. defined as the people’s whole moral and intellectual condition
Down
  1. de Tocqueville argued that political and social groups protected citizens against which tyranny
  2. this kind of republic exists in the US
  3. the second degree in the right of association is the power of what
  4. Gore both this democratic candidate and republican George W. Bush endorsed "faith based initiatives" and called for expanding the charitable choice provision of the 1996 welfare reform law
  5. de Tocqueville's primary case for the success of American democracy lies with this group
  6. the quality of public life and performance of social institutions are influenced by powerfully by networks of civic engagement and what else

12 Clues: “Bowling Alone” theorythis kind of republic exists in the USthis is where the right of association was imported fromdefined as the people’s whole moral and intellectual conditionthe second degree in the right of association is the power of whatnegative consequences on this system as a cause of decline in social interaction...

Analisa Espinosa 2015-04-30

Analisa Espinosa crossword puzzle
Across
  1. a list of citations that appear at the end of a paper, article, chapter or book
  2. To renew or revitalize; To reload a webpage on the internet
  3. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people
  4. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work
  5. online communities where people meet, socialize, exchange digital files, etc. (facebook, twitter, instagram)
Down
  1. a reference to a published or unpublished source
  2. Using keywords such as AND, OR, NOT in web searches to narrow search results
  3. software used to view various kinds of Internet resources found on the Web
  4. An unauthorized person who secretly gains access to computer files
  5. A bully who operates online, in cyberspace; To bully online
  6. Originally known as Web Log
  7. A collaborative website which can be directly edited by anyone with access to it

12 Clues: Originally known as Web Loga reference to a published or unpublished sourceTo renew or revitalize; To reload a webpage on the internetA bully who operates online, in cyberspace; To bully onlineAn unauthorized person who secretly gains access to computer filessoftware used to view various kinds of Internet resources found on the Web...

Ashly Cordova 2015-04-30

Ashly Cordova crossword puzzle
Across
  1. granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
  2. Originally known as Web Log.
  3. a reference to a published or unpublished source
  4. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  5. (HOST) Domain names come with different extensions of the web address based on whether the domain belongs to a commercial enterprise (.com), an educational establishment (.edu), a government body (.gov), the military (.mil)
  6. A collaborative website which can be directly edited by anyone with access to it
Down
  1. To renew or revitalize; To reload a webpage on the internet
  2. a list of citations that appear at the end of a paper, article, chapter or book
  3. A bully who operates online, in cyberspace; To bully online
  4. Software program that is designed to damage files on a computer that receives it
  5. RESOURCE LOCATOR (URL) Full website address
  6. A system of connected computers that allows the sharing of files and equipment

12 Clues: Originally known as Web Log.RESOURCE LOCATOR (URL) Full website addressa reference to a published or unpublished sourceTo renew or revitalize; To reload a webpage on the internetA bully who operates online, in cyberspace; To bully onlineA system of connected computers that allows the sharing of files and equipment...

Communication Process 2015-12-29

Communication Process crossword puzzle
Across
  1. to give meaning to a message so the receiver understands what the sender is expressing
  2. the person or group of people who receives a message sent
  3. the process by which information, thoughts, ideas, feelings, and questions are transmitted from one person to one or more other people.
  4. the person who conceives and conveys an idea
  5. the receiver responds to the message with comments, giving answers, asking questions, reacting, or doing something
  6. speaking face-to-face with an individual or a group or via telephone, or voicemail
Down
  1. drawings, pictures, and charts expressing ideas or information
  2. memos,note, letters, advertisements, and e-mail, fax, bulletin boards, and networks
  3. when an idea is converted into words, gestures, thought, diagrams, or pictures and is transmitted to a receiver
  4. the idea or thoughts that are transmitted, usually in the form or words or pictures
  5. involves communicating through body language, gestures and posture
  6. include age, gender, cultural and ethnic background, language ability, education, and experiences

12 Clues: the person who conceives and conveys an ideathe person or group of people who receives a message sentdrawings, pictures, and charts expressing ideas or informationinvolves communicating through body language, gestures and posturespeaking face-to-face with an individual or a group or via telephone, or voicemail...

IT Professions 2021-02-24

IT Professions crossword puzzle
Across
  1. field related to designing intelligent machines that can help and assist humans
  2. A field related to designing, creating, and implementing new applications
  3. a technical role that requires exposure in analytics, computer modeling, statistics and Maths
  4. a professional writer who writes instruction manuals, user manuals, journal articles, how-to guides etc
  5. A person who changes or improves graphic images using image editing software tools
  6. a field that decides on the direction of an organization and helps set major milestones
  7. person responsible for the upkeep, configuration, and reliable operation of computer systems
Down
  1. person responsible for planning, coordinating and directing all computer-related activities within an organization
  2. a person responsible for developing defect free code
  3. an individual who works with traditional machine learning techniques like NLP and neural networks to build models that power AI–based applications
  4. a field related to developing, designing, and testing computer components
  5. Capture of still images using digital cameras or using a remotely-operated or autonomous unmanned aerial vehicle

12 Clues: a person responsible for developing defect free codeA field related to designing, creating, and implementing new applicationsa field related to developing, designing, and testing computer componentsfield related to designing intelligent machines that can help and assist humans...

per 2 chapter 12 questions Isaiah. D 2023-03-27

per 2 chapter 12 questions Isaiah. D crossword puzzle
Across
  1. a navigation system that determines the time and geographical location of the device by using messages from satellites in space and a receiver located on the device
  2. a private network established through a public network to remote sites
  3. a closed source Unix based operating system for smartphones and tablets made by Apple
  4. a file hosting service and synchronization service operated by Microsoft
  5. a cloud service provided by Apple for iOS amd OS X devices
  6. making phone calls using Wi-Fi networks
  7. a method for removing restrictions and protections added to mobile operating systems, but typically on iOS devices
Down
  1. a cloud service developed by Google to provide file storage and synchronization service
  2. an open source, Linux based smartphone/tablet operating system
  3. a method used on Android devices for removing restrictions and protections added to mobile operating systems
  4. a feature of a computer system that allows booting from more than one operating system
  5. a family of free and open-source software operating systems based on an operating system kernel

12 Clues: making phone calls using Wi-Fi networksa cloud service provided by Apple for iOS amd OS X devicesan open source, Linux based smartphone/tablet operating systema private network established through a public network to remote sitesa file hosting service and synchronization service operated by Microsoft...

CROSSWORD ICT 2025-04-08

CROSSWORD ICT crossword puzzle
Across
  1. Observation of someone without their knowledge
  2. secure, medium range wireless technology with a range of around 50m
  3. Making sure noone can access your files without a secret key
  4. a piece of equipment that provides a connection for wireless devices to local network
  5. information about where the data is from, where it is going and its position in the complete message
  6. Programs we use for day to day tasks
  7. Connects networks together and assigns an IP address to all connected devices
Down
  1. Any device that can be plugged into a computer can be adapted to spy on a computer
  2. Scans for and blocks viruses that will try to access your computer through email attachments or suspicious websites
  3. short range technology with a range of a few metres. used to send and receive small data in smaller portable devices
  4. Link between hardware, the computer, and the software programs.
  5. Used to upload and download files to a website or network

12 Clues: Programs we use for day to day tasksObservation of someone without their knowledgeUsed to upload and download files to a website or networkMaking sure noone can access your files without a secret keyLink between hardware, the computer, and the software programs.secure, medium range wireless technology with a range of around 50m...

Workplace Readiness Skills (Professional Skills) 2022-08-14

Workplace Readiness Skills (Professional Skills) crossword puzzle
Across
  1. Understands basic Internet and email safety and maintainS the security of information, computers, networks, and facilities
  2. Knows how to select and safely use industry-specific technologies, tools, and machines to complete job tasks effectively
  3. Plans personal and professional goals related to education, career, finances, and health
  4. Maintains a working knowledge of devices, resources, hardware, software, systems, services, applications
  5. Locates information efficiently, evaluates the credibility and relevance of sources and facts
Down
  1. Plans, prioritizes, and adapts work goals to manage time and resources effectively
  2. Applies mathematical skills to complete tasks as necessary
  3. Meets organizational expectations regarding work schedule, behavior, appearance, and communication
  4. Accepts constructive feedback well and is open to new ideas and ways of doing things
  5. Understands one’s role in fulfilling the mission of the workplace and considers the social, economic, and environmental impacts of one’s actions
  6. and interprets workplace documents and writes effectively
  7. Maintains a safe work environment by adhering to safety guidelines and identifying risks to self

12 Clues: and interprets workplace documents and writes effectivelyApplies mathematical skills to complete tasks as necessaryPlans, prioritizes, and adapts work goals to manage time and resources effectivelyAccepts constructive feedback well and is open to new ideas and ways of doing things...

Computer Science Terms 2015-09-28

Computer Science Terms crossword puzzle
Across
  1. the abbreviation for a system that translates the hierarchical, human-readable names into the four-number IP address
  2. the abbreviation for a type of network when computers are geographically close
  3. visits sites on the Internet, discovering Web pages and building an index to the Web's content based on keywords
  4. the main technology for local area networks
  5. abbreviation for the term commonly known as web or the "Information Superhighway"
  6. this term refers to one of the three divisions of large websites that involve operating hardware
  7. every HTML document needs a pair of ____ tags.
  8. when using a source, you must always ______ it.
  9. type of file most likely to contain codes or tags a web browser could understand
Down
  1. when using music, lyrics, or music videos, you can use up to ___ percent of the work
  2. to interfere with security mechanisms
  3. a related group of networked computers
  4. a good webpage consists of ________ links.
  5. a good webpage consists of highlighted _________.
  6. the default Windows text editor you can use to create type HTML documents
  7. person who falsifies data to pretend to be someone else
  8. AOL, Google, Yahoo!, and MSN are examples of popular ______ engines.
  9. this type of cache takes your data and stores it somewhere

18 Clues: to interfere with security mechanismsa related group of networked computersa good webpage consists of ________ links.the main technology for local area networksevery HTML document needs a pair of ____ tags.when using a source, you must always ______ it.a good webpage consists of highlighted _________....

ST10435020 Act 2.1.1 2024-08-08

ST10435020 Act 2.1.1 crossword puzzle
Across
  1. Wireless network technology using radio waves to transmit data.
  2. Hierarchical name service that provides names for computers, services and other resources on the network.
  3. Network layered security used to provide a tunnel between subnetworks.
  4. A delay in data being transferred.
  5. a service that enables private IP networks to use the internet/cloud.
  6. A unique set of numbers that identifies a device on a network.
  7. A high capacity transmission technique using a wide range of frequencies.
  8. A system that is used to connect devices to a network, with protocols preventing simultaneous transmissions.
Down
  1. Network security device that monitors incomming and outgoing network traffic based on a set of rules.
  2. A network of LAN's that span over a large area.
  3. A logical overlay network that groups together a subnet of devices.
  4. A basic group of data that is transmitted over a network
  5. Components that aren't necessary to the systems operations, in case to failure of other components.
  6. Enables devices to connect and communicate to each other on a network.
  7. A network exsisting inside another network.
  8. A system that manages traffic to reduce packet loss.
  9. a variation in time between a signal being transmitted and received over a network.
  10. Dynamically assigns IP addresses to devices on the network.

18 Clues: A delay in data being transferred.A network exsisting inside another network.A network of LAN's that span over a large area.A system that manages traffic to reduce packet loss.A basic group of data that is transmitted over a networkDynamically assigns IP addresses to devices on the network....

Networking Puzzle_ 1 2024-10-02

Networking Puzzle_ 1 crossword puzzle
Across
  1. measures the ability of the electromagnetic radiation to pass through different media.
  2. hardware used to connect devices to form a LAN that directs data to a specific address
  3. interlinked computers sending data only by the shortest route and all the computers are connected to each other
  4. device needing internet access and a more powerful computer for processing
  5. cable made up of central copper core, insulation, copper mesh and outer insulation.
  6. network covering a small area such as a single building
  7. network topology that uses a central hub or switch for all devices to connect
  8. hardware used to connect devices to form a LAN that sends data to all devices
Down
  1. method of data storage where data is stored on off-site servers
  2. network topology using a single central cable to which all devices are connected
  3. a server on a network where central files and other data are stored
  4. type of cable in which two wires are twisted together
  5. network covering a very large geographical area
  6. device that works offline and online with some processing capability
  7. network where each node can share files with others and no central server
  8. model uses separate dedicated servers and specific client workstations
  9. allowing device access to LAN without a wired connection
  10. device which routes data packets between different networks

18 Clues: network covering a very large geographical areatype of cable in which two wires are twisted togethernetwork covering a small area such as a single buildingallowing device access to LAN without a wired connectiondevice which routes data packets between different networksmethod of data storage where data is stored on off-site servers...

Unit 3 Kira Vocabulary Words 2025-11-12

Unit 3 Kira Vocabulary Words crossword puzzle
Across
  1. An expression that evaluates to true or false.
  2. Text in code ignored by the computer, used for explanations.
  3. An operator that gives the remainder of the division of two numbers. (This symbol: %)
  4. Values given to parameters when a function is called.
  5. The data or instructions that are entered into a computer program to make it run.
  6. Predefined functions in Python, such as print, type, abs, round, min, and max.
  7. Values in a function that serve as special, function only variables to customize the behavior.
  8. Spaces or tabs used to structure code.
Down
  1. A block of code designed to perform a particular task
  2. A Python module that provides functions to create random numbers.
  3. The information that a computer displays, prints, or sends to another device after processing input.
  4. A function that returns a random integer within a specified range, inclusive of both the minimum and maximum values.
  5. protecting computer systems, networks, devices, and data from unauthorized access or attack.
  6. A collection of related functions.
  7. A statement that allows a function to send back a result to the caller so that it can be used in subsequent operations.
  8. A named storage of data in a program.
  9. A collection of related modules.
  10. A reserved word that has a specific meaning in the programming language.

18 Clues: A collection of related modules.A collection of related functions.A named storage of data in a program.Spaces or tabs used to structure code.An expression that evaluates to true or false.A block of code designed to perform a particular taskValues given to parameters when a function is called....

technology 2025-12-16

technology crossword puzzle
Across
  1. a device that charges electronic equipment without using cables
  2. a harmful program that can damage or disrupt a computer system
  3. a device that connects to the Internet and responds to voice commands
  4. a saved link that allows users to return to a website easily
  5. a small portable device that is used to store and transfer digital files
  6. a security system that protects a network from unauthorized access
  7. a list that appears on a screen when you click on a specific option
Down
  1. online content that is designed to attract clicks using sensational titles
  2. a method that allows audio or video to be played online without downloading
  3. a connection that allows devices to be plugged into a computer
  4. a telephone system that works through cables rather than mobile networks
  5. a new version that improves software or fixes problems
  6. a system that uses GPS technology to show directions and locations
  7. a storage device that is used to store data outside a computer
  8. a device that allows you to operate another device from a distance
  9. software that controls the basic functions of a computer or smartphone
  10. an online system where data is stored and accessed via the Internet
  11. space where digital data is kept for future use

18 Clues: space where digital data is kept for future usea new version that improves software or fixes problemsa saved link that allows users to return to a website easilya connection that allows devices to be plugged into a computera harmful program that can damage or disrupt a computer systema storage device that is used to store data outside a computer...

the internet 2022-05-11

the internet crossword puzzle
Across
  1. contains anywhere from a few to hundreds of optical fibers within a plastic casing. Also known as optic cables or optical fiber cables, they transfer data signals in the form of light and travel hundreds of miles significantly faster than those used in traditional electrical cables.
  2. they were laid between Britain and France in 1850
  3. what i play pubg on
  4. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  5. goes through all of my house giving me quicker internet.
  6. any computer hardware or software device that requests access to a service provided by a server
  7. a device that connects two or more packet-switched networks or subnetworks
Down
  1. You can move around with wireless
  2. Faster transmission speeds of internet

9 Clues: what i play pubg onYou can move around with wirelessFaster transmission speeds of internetthey were laid between Britain and France in 1850goes through all of my house giving me quicker internet.a device that connects two or more packet-switched networks or subnetworks...

Cybersecurity: Attacks & Prevention 2025-03-18

Cybersecurity: Attacks & Prevention crossword puzzle
Across
  1. - A type of attack where the attacker sends fraudulent messages to trick the recipient into revealing sensitive information.
  2. - A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. - The practice of protecting systems, networks, and programs from digital attacks.
  4. - The act of attempting to gain unauthorized access to a computer system.
Down
  1. - A secret word or phrase that must be used to gain admission to something.
  2. - A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  3. - The process of converting information or data into a code to prevent unauthorized access.
  4. - A type of malware that replicates itself in order to spread to other computers.
  5. - A software application that runs automated tasks over the internet.

9 Clues: - A software application that runs automated tasks over the internet.- The act of attempting to gain unauthorized access to a computer system.- A secret word or phrase that must be used to gain admission to something.- A type of malware that replicates itself in order to spread to other computers....

Economic Sociology (week 4) - Christof 2013-10-16

Economic Sociology (week 4) - Christof crossword puzzle
Across
  1. Process of making a commodity out of something that hadn’t been conceived as a product or service before
  2. Price at the intersection of supply and demand curve in neoclassical economics
  3. Smith’s idea that wages are a trade-off of wages and prestige implies that employers have to pay a compensating … to motivate somebody to choose the job.
  4. Polanyi: … was planned; planning was not.
  5. The view that norms exist because they are efficient (also referred to as Panglossian).
  6. Sociologist whose work has to do with cultural, symbolic, normative elements of economic transactions
Down
  1. Polanyi’s view that markets are subordinated to politics, religion, and social relations
  2. How information asymmetry is overcome in Geertz’ bazaar economy.
  3. Central theme of economic sociology that is invoked in Granovetter’s Getting a Job
  4. Quinn’s term for the industry that her and Viviana Zelizer study
  5. Author who discusses the access to professions from a Weberian point of view.
  6. Author who, like Titmuss for the case of blood, questions that all things ought to be traded on markets

12 Clues: Polanyi: … was planned; planning was not.How information asymmetry is overcome in Geertz’ bazaar economy.Quinn’s term for the industry that her and Viviana Zelizer studyAuthor who discusses the access to professions from a Weberian point of view.Price at the intersection of supply and demand curve in neoclassical economics...

Crossword Puzzle 2013-10-07

Crossword Puzzle crossword puzzle
Across
  1. both this democratic candidate and republican George W. Bush endorsed "faith based initiatives" and called for expanding the charitable choice provision of the 1996 welfare reform law
  2. what Putnam and other scholars termed groups that promote civic trust and cooperation (social ____)
  3. this is where the right of association was imported from
  4. defined as the people’s whole moral and intellectual condition
  5. this kind of republic exists in the US
  6. the quality of public life and performance of social institutions are influenced by powerfully by networks of civic engagement and what else
Down
  1. de Tocqueville's primary case for the success of American democracy lies with this group
  2. “Bowling Alone” theory
  3. too much importance on the duration of democratic institutions is attributed to this
  4. negative consequences on this system as a cause of decline in social interaction
  5. the second degree in the right of association is the power of what
  6. de Tocqueville argued that political and social groups protected citizens against which tyranny

12 Clues: “Bowling Alone” theorythis kind of republic exists in the USthis is where the right of association was imported fromdefined as the people’s whole moral and intellectual conditionthe second degree in the right of association is the power of whatnegative consequences on this system as a cause of decline in social interaction...

Mr. Jimenez 2014-12-08

Mr. Jimenez crossword puzzle
Across
  1. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work
  2. the name for a way to display information on websites.
  3. A collaborative website which can be directly edited by anyone with access to it
  4. software used to view various kinds of Internet resources found on the Web.
  5. An unauthorized person who secretly gains access to computer files.
Down
  1. A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
  2. Originally known as Web Log.
  3. a piece of writing that has been copied from someone else and is presented as being your own work
  4. A bully who operates online, in cyberspace
  5. a list of citations that appear at the end of a paper, article, chapter or book.
  6. the unauthorized use, reproduction, distribution, or transmission of copyrighted material
  7. To renew or revitalize; To reload a webpage on the internet

12 Clues: Originally known as Web Log.A bully who operates online, in cyberspacethe name for a way to display information on websites.To renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.software used to view various kinds of Internet resources found on the Web....

cyber security 2022-09-30

cyber security crossword puzzle
Across
  1. person who finds and exploits the weakness in computer systems.
  2. process of finding weakness in computer or private networks.
  3. comprises a collection of internet-connected computers and devices that are infected and controlled remotely by cybercriminals.
  4. designed to disrupt, damaged, or gain unauthorized access to a computer system.
  5. exploits vulnerabilities on the device to encrypt important files.
  6. an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
Down
  1. used to obtained sensitive information from users.
  2. that downloads onto a computer disguised as a legitimate program.
  3. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. a secret word or phrase that must be used to gain admission to a place.
  5. malicious software.
  6. monitors the victim's internet activity, tracks login credentials and spies on sensitive information.

12 Clues: malicious software.used to obtained sensitive information from users.process of finding weakness in computer or private networks.person who finds and exploits the weakness in computer systems.that downloads onto a computer disguised as a legitimate program.exploits vulnerabilities on the device to encrypt important files....

Digital Media Technologies 2022-09-16

Digital Media Technologies crossword puzzle
Across
  1. cards -are used to store captured audio and video taken with a video camera and its accessories.
  2. -connection between two or more devices allowing for sharing and collaborating.
  3. systems -program which manages the hardware and software on a computer.
  4. -physical equipment used in digital media.
  5. design -requires technologies which insist in the process of creating a website through code and publishing the site on internet.
  6. Media -Content which can be created,viewed,distributed,modified and stored within electronic devices.
  7. information.
Down
  1. - allows capturing of an image, by a camera, in a digital media format which can be stored or edited as needed.
  2. -programs used within computers which provide
  3. storage -is an online location available to keep files, data and other digital media.
  4. interfaces - design a user can see when interacting with a device.
  5. storage -is a location to keep files within the server or systems are working on.
  6. production allows the monitoring of the audio component being captured and the software to edit the audio.

13 Clues: information.-physical equipment used in digital media.-programs used within computers which provideinterfaces - design a user can see when interacting with a device.systems -program which manages the hardware and software on a computer.-connection between two or more devices allowing for sharing and collaborating....

Cybersecurity Crossword 2021-10-14

Cybersecurity Crossword crossword puzzle
Across
  1. Using advertisements to trick people into visiting malicious sites
  2. Accessing cookies from your web browser to steal personal data
  3. Files you download that contain malware
  4. converting data using an algorithm so it cannot be readable by third-parties
  5. the use of a computer program to record every keystroke to steal passwords
Down
  1. the practice of sending emails pretending to be from reputable companies in order to steal personal data
  2. an attack meant to shut down a machine or network by flooding it with traffic, making it inaccessible to its intended users
  3. Elements in the website that do not perform their designated task.
  4. the participants of the communication and negotiate an encryption algorithm
  5. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  6. Same as DOS attack, except with multiple computers or machines
  7. a local or restricted communications network, especially a private network created using World Wide Web software.

12 Clues: Files you download that contain malwareAccessing cookies from your web browser to steal personal dataSame as DOS attack, except with multiple computers or machinesElements in the website that do not perform their designated task.Using advertisements to trick people into visiting malicious sites...

Cyber Security and Laws 2022-10-17

Cyber Security and Laws crossword puzzle
Across
  1. subscription fraud can be achieved by sending "----- " requests to subscribers via the SS7 / GTP protocols
  2. EDI internet transmission protocols include ----- File Transfer Protocol (SFTP),
  3. Cyber ------ is use of the Internet or other electronic means to track someone
  4. The International Organization for ------- is referred as ISO
  5. EDI, which stands for electronic data interchange, is the intercompany ----------- of business documents in a standard format.
  6. GLBA is a United States federal law that requires ------ institutions to explain how they share and protect their customers’ private information
  7. is just one of the many frauds on the Internet, trying to fool people into parting with their money
Down
  1. PCI DSS is an acronym for “----- Card Industry Data Security Standard.”
  2. Counteracting cybercrime is ------------- , a technique used to protect computers, networks, programs, and data from exploitation.
  3. The ----- System 7 (SS7) industry standard and set of protocols were developed in 1975
  4. refers to the use of a computer to commit a crime
  5. is the legal process by which an arbiter or judge reviews evidence and argumentation.

12 Clues: refers to the use of a computer to commit a crimeThe International Organization for ------- is referred as ISOPCI DSS is an acronym for “----- Card Industry Data Security Standard.”Cyber ------ is use of the Internet or other electronic means to track someoneEDI internet transmission protocols include ----- File Transfer Protocol (SFTP),...

Cybersecurity Fundamentals Chapter 4 2022-10-25

Cybersecurity Fundamentals Chapter 4 crossword puzzle
Across
  1. uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
  2. use one key to encrypt data and a different key to decrypt data.
  3. to encrypt and decrypt messages.
  4. encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
  5. science of making and breaking secret codes.
  6. a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
Down
  1. algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
  2. has a fixed block size of 128, 192 or 256 bits.
  3. implementing cryptography into a web browser.
  4. a protocol that provides a secure remote access connection to network devices.
  5. way to store and transmit data so only the intended recipient can read or process it.
  6. fundamental component of ipsec virtual private networks (vpn).

12 Clues: to encrypt and decrypt messages.science of making and breaking secret codes.implementing cryptography into a web browser.has a fixed block size of 128, 192 or 256 bits.fundamental component of ipsec virtual private networks (vpn).use one key to encrypt data and a different key to decrypt data....

My Internet Crossword 2018-03-29

My Internet Crossword crossword puzzle
Across
  1. / globally interconnected set of computers through which information retrieval and sharing could take place
  2. / is the interface that the user sees and interacts with
  3. / the four numbers of an IP Address
  4. / This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level
  5. / When the data reaches the Transport Layer, it is segmented into data packets. This is where the first innovations in packet frame technology (TCP) come into play
  6. / Addresses the packets for delivery (IP number)—networks use TCP/IP
Down
  1. / message from receiving computer that packets have been received and the next one can be sent.
  2. / coverts the data from the application layer so it can be read by the application layer of the receiving computer
  3. / the level of the Ethernet
  4. / path taken between computers
  5. / both organizes/managing the data in each packet of information sent and routs that information according to an IP (Internet Protocol) number
  6. / Controls the communication link or session between the sending and receiving computers

12 Clues: / the level of the Ethernet/ path taken between computers/ the four numbers of an IP Address/ is the interface that the user sees and interacts with/ Addresses the packets for delivery (IP number)—networks use TCP/IP/ Controls the communication link or session between the sending and receiving computers...

Secure networking in the cloud 2024-03-26

Secure networking in the cloud crossword puzzle
Across
  1. is a segmented piece of a larger network
  2. a device used to connect two different networks, especially a connection to the internet
  3. a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network
  4. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  5. not physically existing as such but made by software to appear to do so
  6. the measure of a system's ability to increase or decrease in performance and cost in response to changes
Down
  1. a business or company
  2. it represents the network interface configuration for a virtual machine
  3. two or more computers that are linked in order to share resources
  4. is a border and it can be physical, or abstract
  5. a connection between two pieces of electronic equipment, or between a person and a computer
  6. a computer network security system that restricts internet traffic in to, out of, or within a private network

12 Clues: a business or companyis a segmented piece of a larger networkis a border and it can be physical, or abstracttwo or more computers that are linked in order to share resourcesnot physically existing as such but made by software to appear to do soit represents the network interface configuration for a virtual machine...

STEM Vocabulary: Digital Citizenship 2024-03-18

STEM Vocabulary: Digital Citizenship crossword puzzle
Across
  1. The skill of evaluating information and sources for accuracy, credibility, and relevance.
  2. The responsible and ethical use of technology and the internet.
  3. Harassment, threats, or negative behavior toward others on the internet or through digital devices.
  4. The quality and complexity of a password, which affects its vulnerability to hacking.
  5. Controls and options that allow individuals to manage the information they share online and who can access it.
Down
  1. The set of rules and norms for respectful behavior when communicating online.
  2. Copying or using someone else's work, ideas, or content without proper attribution or permission.
  3. A security process that requires users to provide two different authentication methods to access an account, enhancing security.
  4. The trail of information and data left behind by a person's online activities.
  5. The ability to use digital tools and technology effectively and responsibly.
  6. Measures and practices to protect digital devices, networks, and data from online threats.
  7. Individuals who seek to harm others through online interactions.

12 Clues: The responsible and ethical use of technology and the internet.Individuals who seek to harm others through online interactions.The ability to use digital tools and technology effectively and responsibly.The set of rules and norms for respectful behavior when communicating online....

Computer Science Vocabulary 2023-10-11

Computer Science Vocabulary crossword puzzle
Across
  1. A way of representing information using base 16. Typically used for images.
  2. The maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second
  3. Any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text
  4. A conditional type of code that executes only when true.
Down
  1. Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
  2. A contraction of "Binary Digit"; the single unit of information in a computer, typically represented as a 0 or 1
  3. Data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text
  4. A way of representing information using only two options
  5. A trigger based on user input, such as a mouse click or a key press
  6. A worldwide system of computer networks
  7. A type of code that repeats
  8. 8 bits

12 Clues: 8 bitsA type of code that repeatsA worldwide system of computer networksA way of representing information using only two optionsA conditional type of code that executes only when true.A trigger based on user input, such as a mouse click or a key pressA way of representing information using base 16. Typically used for images....

Module 5: Networking Concepts 2025-03-18

Module 5: Networking Concepts crossword puzzle
Across
  1. A _____________router connects multiple wireless devices to the network and may include a switch to connect wired hosts.
  2. A network that securely connects to another network over an insecure network, such as the internet. For example, NetLab is this type of network.
  3. Defined as a network that connects devices using wire cables in a small geographical area.
  4. Connects a home or small office to the Internet.
  5. Device that exists in between the host devices.
  6. Connects multiple devices to the network.
  7. Device at the end or edge of a network.
Down
  1. Provides the channel over which the message travels from source to destination.
  2. Forwards traffic between networks.
  3. A network that connects devices, such as mice, keyboards, printers, smartphones, and tablets within the range of an individual person.
  4. Wirelessly connects users and devices in a small geographical area instead of using a wired connection.
  5. ____________point (AP) connects to a wireless router and is used to extend the reach of a wireless network.

12 Clues: Forwards traffic between networks.Device at the end or edge of a network.Connects multiple devices to the network.Device that exists in between the host devices.Connects a home or small office to the Internet.Provides the channel over which the message travels from source to destination....

Week 3 Activity 2025-01-23

Week 3 Activity crossword puzzle
Across
  1. A switching method where the entire data frame is checked for errors before forwarding.
  2. Network devices such as routers or switches that manage data flow.
  3. A communication medium that uses radio signals to connect devices without physical cables.
  4. A switching method that forwards a frame as soon as its destination address is read.
  5. A communication mode where data can flow in both directions simultaneously.
Down
  1. The physical or wireless pathways used to connect devices in a network.
  2. A transmission medium using light to transmit data over long distances at high speed.
  3. A communication mode where data can flow in only one direction at a time.
  4. A type of network cable that uses electrical signals for data transmission.
  5. A network device that connects devices in a LAN and uses MAC addresses to forward data.
  6. Devices like computers or phones that connect to a network and exchange data.
  7. A device that routes data packets between different networks based on IP addresses.

12 Clues: Network devices such as routers or switches that manage data flow.The physical or wireless pathways used to connect devices in a network.A communication mode where data can flow in only one direction at a time.A type of network cable that uses electrical signals for data transmission....

Crime and Punishment 2025-01-23

Crime and Punishment crossword puzzle
Across
  1. The offer or acceptance of anything of value in exchange for influence on a government official or employee
  2. The act or process of taking things or people to or from a place secretly and often illegally.
  3. Criminal acts committed online by using electronic communications networks and information systems.
  4. Theft or misappropriation of assets (money or property) by a person in a position of trust or responsibility for those assets.
  5. The taking of a person from one place to another against their will, often by physical force.
  6. The willful and malicious burning or charring of property.
Down
  1. Illegal behaviour towards a person, that causes mental or emotional suffering.
  2. The crime of illegally copying something in order to deceive someone.
  3. Unlawful entry into a building to steal property from it.
  4. Unlawful killing without the intention to kill or cause serious harm.
  5. Intentional deception to gain something of value, usually money.
  6. Theft accomplished by violence or the threat of violence.

12 Clues: Unlawful entry into a building to steal property from it.Theft accomplished by violence or the threat of violence.The willful and malicious burning or charring of property.Intentional deception to gain something of value, usually money.The crime of illegally copying something in order to deceive someone....

Symmetric and Distributed Shared Memory Architectures, Cache coherence 2020-01-21

Symmetric and Distributed Shared Memory Architectures, Cache coherence crossword puzzle
Across
  1. through data is written in the cache and the corresponding main memory location at same time is called (12 letters, 2 words)
  2. Width a number of simultaneous connection or connectivity in toroidal mesh interconnects. (14 letters with 2 words)
  3. Language provide some of the mechanism of shared memory programs.
  4. A collection of commodity systems connected by interconnection networks (7 Letters)
  5. the worker of CPU(3 Letters)
  6. Multiple simultaneous instruction streams operating on multiple data stream(4 Letters)
Down
  1. data structure used in directory based cache coherence is (9 Letters)
  2. Processor A processor that is able to process sequences of data with a single instruction (16 letters with 2 words)
  3. Unit the boss of CPU(11 letters with 2 words)
  4. Communication wires are shared by the devices called (3 letters)
  5. Applies the same instruction to multiple data items or it’s idle (4 Letters)
  6. Time to access all the memory location will be same for all the core architecture (3 letters)

12 Clues: the worker of CPU(3 Letters)Unit the boss of CPU(11 letters with 2 words)Communication wires are shared by the devices called (3 letters)Language provide some of the mechanism of shared memory programs.data structure used in directory based cache coherence is (9 Letters)Applies the same instruction to multiple data items or it’s idle (4 Letters)...

Artificial Intelligence Crossword 2022-03-17

Artificial Intelligence Crossword crossword puzzle
Across
  1. Is a method that works like the human brain (2 works)
  2. Tests the machines ability to pass for a human (2 words)
  3. Large and complex datasets (2 works)
  4. It's a method that can be splitted into regression methods and classification methods (2 works)
  5. Improve an algorithm without the help of a human being (2 words)
  6. Criterion that measures the amount of time that an algorithm takes to achieve a goal, depending on the number of nodes (2 words)
Down
  1. Learns from the training datasets and group the objects on the basis of similar features (2 works)
  2. A program designed to communicate with people through text or voice
  3. Anything that can recognize its environment and take an autonomous action to achieve goals (2 words)
  4. Criterion that checks if an algorithm has the lowest possible cost
  5. Is part of Machine Learning. Normally uses Artificial Neural Networks (2 words)
  6. A set of rules that a machine uses to do a task

12 Clues: Large and complex datasets (2 works)A set of rules that a machine uses to do a taskIs a method that works like the human brain (2 works)Tests the machines ability to pass for a human (2 words)Improve an algorithm without the help of a human being (2 words)Criterion that checks if an algorithm has the lowest possible cost...

Computer 2018-10-10

Computer crossword puzzle
Across
  1. a person who uses computers to gain unauthorized access to data.
  2. a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
  3. the introductory page of a website, typically serving as a table of contents for the site.
  4. The word wireless is dictionary defined as "having no wires".
  5. program instructions
Down
  1. A router is a device that forwards data packets along networks.
  2. connect as or operate with a network.
  3. arrange or put into a format.
  4. a unit of memory or data equal to 1,024 (210) bytes.
  5. a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  6. a device that scans documents and converts them into digital data.
  7. Printing: the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.

12 Clues: program instructionsarrange or put into a format.connect as or operate with a network.a unit of memory or data equal to 1,024 (210) bytes.The word wireless is dictionary defined as "having no wires".A router is a device that forwards data packets along networks.a person who uses computers to gain unauthorized access to data....

Kruiswoordraadsel bij de les 'Netwerk' 2019-01-21

Kruiswoordraadsel bij de les 'Netwerk' crossword puzzle
Across
  1. Zorgen dat er geen virussen op de computer kunnen komen.
  2. Geef de infinitief van het verbum: Ik connecteer mijn gsm met de wifi. Geef het synoniem van connecteren.
  3. Geef de infinitief van het verbum: de data van het bedrijf is ….. Je kan het enkel lezen met de juiste code.
  4. Onderdelen van een netwerk.
  5. Geef de infinitief van het verbum: Het virus heeft zich ….. over heel de computer. printer Apparaat dat documenten afdrukt.
  6. Een apparaat dat twee of meer verschillende computernetwerken aan elkaar verbindt, bijvoorbeeld internet en een bedrijfsnetwerk.
  7. Om iets te veranderen aan de functies van mijn muis, moet ik naar de …. gaan.
Down
  1. Een veelgebruikte standaard voor kabelgebonden Local Area Networks is Ethernet. De datatransmissie vindt elektronisch via koperen kabels plaats, of via ………..
  2. Ik steek een HDMI- ….. in de computer.
  3. Ik .... een e-mail.
  4. draadloos netwerk
  5. Enkel de beheerder heeft …. tot deze functies. Ik kan niet alles veranderen op deze computer. Je moet ……… vragen aan de beheerder als je iets wil installeren of veranderen.

12 Clues: draadloos netwerkIk .... een e-mail.Onderdelen van een netwerk.Ik steek een HDMI- ….. in de computer.Zorgen dat er geen virussen op de computer kunnen komen.Om iets te veranderen aan de functies van mijn muis, moet ik naar de …. gaan.Geef de infinitief van het verbum: Ik connecteer mijn gsm met de wifi. Geef het synoniem van connecteren....

Chapter 18 Braiding and Braid Extensions 2013-02-20

Chapter 18 Braiding and Braid Extensions crossword puzzle
Across
  1. overlapping 2 strands to form a candy cane effect
  2. technique which left section goes under middle strand, right section goes under middle strand
  3. braid created with 2 strands that are twisted around each other
  4. sperate networks of curly, textured hair that have been intertwined and meshed together
  5. free-hanging braids, with/without extensions, underhand or overhand technique
  6. technique in which first side section goes over middle one, then other side section goes over middle strand
  7. interweaving a weft or faux hair with natural hair
Down
  1. simple two-strand braid in which hair is picked up from the sides and added to the strands as they are crossed over each other
  2. hairstyling that uses no chemicals or dyes and and does not alter the natural curl or coil pattern of hair
  3. narrow rows of visible braids that lie close to the scalp
  4. three-strand braid produced with an overhand technique
  5. three-strand braid created using an underhand technique

12 Clues: overlapping 2 strands to form a candy cane effectinterweaving a weft or faux hair with natural hairthree-strand braid produced with an overhand techniquethree-strand braid created using an underhand techniquenarrow rows of visible braids that lie close to the scalpbraid created with 2 strands that are twisted around each other...

Plant and Animal Cell Organelles Vocab Crossword Puzzle 2023-10-12

Plant and Animal Cell Organelles Vocab Crossword Puzzle crossword puzzle
Across
  1. A layer made out of lipids that surrounds and protects each cell.
  2. A jelly-like substance that keeps all cell organelles in their place.
  3. Small vessels that contain enzymes and chemicals that break down waste. Only found in animal cells.
  4. Found on the endoplasmic reticulum. Perform protein synthesis in the cell.
  5. Organelles that store water, salts and carbohydrates.
  6. Several membrane sacks that with package and modify chemical compounds. Often known as the "post office".
Down
  1. A maze of networks that manufactures, processes and transports chemical compounds through the cell.
  2. The "powerhouse" in the cell. Converts nutrients into energy and has it own DNA.
  3. Structure made of nucleic acids that carries genetic information inside of the nucleus.
  4. Organelles that convert solar energy into chemical energy through photosynthesis.
  5. A barrier surrounding the cell membrane that supports the cell and gives it its shape. Only found in a plant cell.
  6. Contains the DNA and controls genetic information through the form of genes.

12 Clues: Organelles that store water, salts and carbohydrates.A layer made out of lipids that surrounds and protects each cell.A jelly-like substance that keeps all cell organelles in their place.Found on the endoplasmic reticulum. Perform protein synthesis in the cell.Contains the DNA and controls genetic information through the form of genes....

5G 2022-10-17

5G crossword puzzle
Across
  1. The aim of this paper was to focus _______ toward better quality and increased data rate for users.
  2. Massive MIMO system extracts all of the connectivity benefits of the MIMO system but at a larger scale through the use of spatial _________.
  3. WiFi, Bluetooth, and WiMAX use the _____ spectrum.
  4. solutions, in spectrum sharing, coordinate amid each other on an equal basis.
  5. Mobile _________ communication was initiated in the late 1970s.
  6. _________ allocation is an ongoing problem in Ultra Dense Networks
  7. solutions, in spectrum sharing, require each system to coordinate discretely with a central unit
Down
  1. evolving generations (1G, 2G, 2.5G, 3G, 3.5G, 3.75G, 4G, 5G) use the ______spectrum.
  2. It is expected that over 50 billion devices will be connected to the ______ by 2020.
  3. there is a need for efficient ________ management schemes as the density and load of the network increases.
  4. ________ to device communication contains a macro cell level, or base station, and a device level.
  5. future ________ devices will be designed in such a way that they can learn and decide how to manage the connectivity.

12 Clues: WiFi, Bluetooth, and WiMAX use the _____ spectrum.Mobile _________ communication was initiated in the late 1970s._________ allocation is an ongoing problem in Ultra Dense Networkssolutions, in spectrum sharing, coordinate amid each other on an equal basis.evolving generations (1G, 2G, 2.5G, 3G, 3.5G, 3.75G, 4G, 5G) use the ______spectrum....

Impact of Media on Entertainment 2023-02-14

Impact of Media on Entertainment crossword puzzle
Across
  1. a motion picture; a movie.
  2. a person with the ability to influence potential buyers of a product or service by promoting or recommending the items on social media.
  3. Filmmaking (film production) is the process by which a motion picture is produced.
  4. websites and applications that enable users to create and share content or to participate in social networking.
  5. subscription service that allows you to watch TV shows and movies.
  6. the action of providing or being provided with amusement or enjoyment.
Down
  1. the publicization of a product, organization, or venture so as to increase sales or public awareness.
  2. transmit or receive live video and audio coverage of (an event) over the internet.
  3. the assembled spectators or listeners at a public event, such as a play, movie, concert, or meeting.
  4. the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
  5. the transmission of programs or information by radio or television.
  6. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

12 Clues: a motion picture; a movie.subscription service that allows you to watch TV shows and movies.the transmission of programs or information by radio or television.the action of providing or being provided with amusement or enjoyment.transmit or receive live video and audio coverage of (an event) over the internet....

Overview of cloud infrastructure 2024-03-11

Overview of cloud infrastructure crossword puzzle
Across
  1. he delay before a transfer of data begins following an instruction for its transfer
  2. a program used to run and manage one or more virtual machines on a computer
  3. a piece of electronic equipment that connects computer networks to each other
  4. having more than one and usually several of something
  5. the surroundings or conditions
  6. the process of taking away or removing characteristics from something in order to reduce it to a set of essential characteristics.
Down
  1. relating to the structure, size, or shape of something that can be touched and seen
  2. a group of similar things or people positioned or occurring closely together.
  3. a person or company that sells goods or services
  4. the way a software program or device is set up for a particular computer, computer system, or task
  5. a facility composed of networked computers, storage systems and computing infrastructure
  6. used to describe something that can be done or seen using computers or the internet instead of going to a place, meeting people in person, etc

12 Clues: the surroundings or conditionsa person or company that sells goods or serviceshaving more than one and usually several of somethinga program used to run and manage one or more virtual machines on a computera group of similar things or people positioned or occurring closely together....

Network Components. 2022-09-29

Network Components. crossword puzzle
Across
  1. a switch that requires some oversight by a network administrator
  2. managed switch with only a select number of options for management.
  3. a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  4. a device that divides a network into segments
  5. Internet standards, with extensions to reflect the wireless device environment
Down
  1. autonegotiated ports to determine parameters, such as data rates and whether to use half-duplex or full-duplex mode
  2. provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications
  3. distributes power over the network to different devices
  4. "keyboard, video and mouse,"
  5. connects networks, while a router typically delivers data within a network
  6. a hardware device that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa
  7. a combination transmitter/receiver in a single package

12 Clues: "keyboard, video and mouse,"a device that divides a network into segmentsa combination transmitter/receiver in a single packagedistributes power over the network to different devicesa switch that requires some oversight by a network administratormanaged switch with only a select number of options for management....

Data transmission 2022-07-13

Data transmission crossword puzzle
Across
  1. Actual data being carried.
  2. The part of the data that contains the IP addresses of the sender and reciever.
  3. A device that enables data packets to be moved between different networks.
  4. A type of serial data transmission which has become the industry standard for connecting computers to devuces via a usb port.
  5. Encrypted data that is a result of putting a plain text through an encryption algorithim.
  6. Stages in a network that can recieve and transmit data packets.
  7. A verification method used to check if data transferred has been altered or corrupted.
  8. Data that arrives at the destination with the bits no longer synchronized.
Down
  1. A method used to check if data has been transferred correctly, makes use of even or odd parity.
  2. Data that can be sent in both directions, one at a time.
  3. Sending data down several channels several bits at a time.
  4. A type of encryption where the encryption key is used both to encrypt and decrypt a message.

12 Clues: Actual data being carried.Data that can be sent in both directions, one at a time.Sending data down several channels several bits at a time.Stages in a network that can recieve and transmit data packets.A device that enables data packets to be moved between different networks....

Technical English 2022-12-01

Technical English crossword puzzle
Across
  1. What is a network based on TCP/IP protocols belonging to an organization, accessible only by employees with authorization?
  2. Making something more modern or suitable by adding or changing information (e.g. in a database)
  3. What is a modulator-demodulator called?
  4. What is a type of exploration of the Web when a user starts on any web page and follows links leading to other pages?
  5. A file that has been included as a part of an email message
  6. The request for data in database which allows us to extract data according to a certain criteria is called
Down
  1. A secret word which must be entered before access is given
  2. Unsolicited commercial email
  3. Who maintains websites?
  4. What is an International computer network made up of thousands of networks linked together called?
  5. Device needed to link a LAN to another network (Internet) is called...
  6. What is a string of text-based messages, from the first one that started the topic up to the latest one, called?

12 Clues: Who maintains websites?Unsolicited commercial emailWhat is a modulator-demodulator called?A secret word which must be entered before access is givenA file that has been included as a part of an email messageDevice needed to link a LAN to another network (Internet) is called......

tech term 2 2025-04-16

tech term 2 crossword puzzle
Across
  1. computer hardware device that converts data from a digital format into a format suitable for an analog transmission medium suck as a telephone or radio
  2. or Reboot booting is a starting computer operating system , reboot is a start for second or third time.
  3. managing traffic between networks
  4. address a unique that identifies a device on the internet or a local network
  5. standard markup language
  6. network security that monitors and filters incoming and outgoing traffic
  7. systems: program that after the being initially loaded into the computer by a boot program mangoes all the other applications programs.
Down
  1. means ethier 1,000,000 bytes or 1,048,576 bytes
  2. piece of data from a website that is stored within a web browse that the website can retrieve at a later time.
  3. technology for connecting devices in a weird local area network
  4. probable document format
  5. is a file or code, delivered over network,that infects, explores, steals or conducts virtually any behavior an attacker wants

12 Clues: probable document formatstandard markup languagemanaging traffic between networksmeans ethier 1,000,000 bytes or 1,048,576 bytestechnology for connecting devices in a weird local area networknetwork security that monitors and filters incoming and outgoing trafficaddress a unique that identifies a device on the internet or a local network...

Module 2: The Web (Part 1 of 2) 2025-04-29

Module 2: The Web (Part 1 of 2) crossword puzzle
Across
  1. an icon, graphic, or text that links to another file or object
  2. this is where you type in the URL for web content or where it displays when you access web content
  3. a protocol that secures communication and data transfer between a user's web browser and a website
  4. an app designed to display webpages
  5. a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication
  6. the main page of a website where visitors can find links to other pages
Down
  1. identifies one or more IP addresses, such as cengage.com
  2. an application-layer protocol used for transmitting hypermedia documents, such as HTML
  3. what is morally good and bad, and morally right and wrong
  4. the global system of interconnected computer networks that uses the Internet protocol suite to communicate and share information
  5. an application, especially as downloaded by a user to a mobile device
  6. a way to acknowledge the sources of information or ideas that you use in your work

12 Clues: an app designed to display webpagesidentifies one or more IP addresses, such as cengage.comwhat is morally good and bad, and morally right and wrongan icon, graphic, or text that links to another file or objectan application, especially as downloaded by a user to a mobile devicethe main page of a website where visitors can find links to other pages...

Network Devices 2025-10-02

Network Devices crossword puzzle
Across
  1. situation in which two messages/data from different sources are trying to transmit along the same data channel.
  2. system that allows users to stream video or music files from a central server as and when required without having to save the files on their own computer.
  3. These cards allow devices to connect to a network/internet
  4. a software application for accessing information on www
  5. network devices which are a hybrid of hub and repeater unit.
  6. device that connects LANs which use different protocols.
Down
  1. situation in which two devices have the same IP address.
  2. A unique number that identifies a device connected to the internet.
  3. system in which an event is captured by camera (and microphone) connected to a computer and sent to a server where the data is encoded. The user can access the data ‘as it happens’ live.
  4. device that connects LANs which use the same protocols.
  5. device used to boost a signal on both wired and wireless networks.
  6. a company that provides services to access and use the internet

12 Clues: a software application for accessing information on wwwdevice that connects LANs which use the same protocols.situation in which two devices have the same IP address.device that connects LANs which use different protocols.These cards allow devices to connect to a network/internetnetwork devices which are a hybrid of hub and repeater unit....

MIND THE GAPS 2025-11-22

MIND THE GAPS crossword puzzle
Across
  1. -Long delays youth faced pre-COVID for mental health support
  2. -BC’s integrated youth service model combining walk-in, mental health, and virtual supports
  3. -The global health emergency that destabilized youth services and forced virtual care.
  4. -Pandemic service model combining online and in-person delivery across Ontario and BC
  5. -The major structural challenge for youth and families caused by system underfunding and regional disparities
Down
  1. -A major systemic barrier preventing long-term planning and stable staffing in Ontario’s youth programs.
  2. -Major structural barrier affecting racialized, 2SLGBTQ+, and Indigenous youth in accessing care.
  3. -A culturally grounded support system in Aotearoa New Zealand based on Māori values and family networks
  4. -A major social consequence youth faced during the pandemic when shelters reduced capacity due to distancing rules
  5. -Crisis helpline that saw a 50% rise in youth calls during NZ lockdown
  6. -Communities that faced the biggest access issues and technology gaps during the pandemic.
  7. -Central Māori principle emphasizing care, hospitality, and mutual support, guiding New Zealand’s youth mental health and whānau-based wellbeing systems.

12 Clues: -Long delays youth faced pre-COVID for mental health support-Crisis helpline that saw a 50% rise in youth calls during NZ lockdown-Pandemic service model combining online and in-person delivery across Ontario and BC-The global health emergency that destabilized youth services and forced virtual care....

Assignment 6- Computer Terms 2016-02-24

Assignment 6- Computer Terms crossword puzzle
Across
  1. the type of text with about half of the word count as the control condition
  2. a component that stores data so future requests for that data can be served faster
  3. the amount of activity that a website recieves
  4. communication where both the sender and the receiver are active at the same time
  5. the hidden keywords within a web page used in HTML that define how the browser must format and display the content
  6. is an example of a text _______
  7. logging in and identifying yourself as someone else
  8. no more than 5 of these can come from one artist or photographer, otherwise it is copyright infringement
  9. the type of language that is neutral rather than subjective, boastful, or exaggerated
  10. a group of information on a computer that can be software programs or data
  11. hypertext markup language
Down
  1. the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
  2. communication where the sending and receiving occur at different times
  3. a related group of networked computers
  4. attempting to circumvent data protection schemes or exploit security loopholes
  5. pictures, movies, and graphs
  6. the abbreviation for computers that are geographically close
  7. the main technology for local area networks

18 Clues: hypertext markup languagepictures, movies, and graphsis an example of a text _______a related group of networked computersthe main technology for local area networksthe amount of activity that a website recieveslogging in and identifying yourself as someone elsethe abbreviation for computers that are geographically close...

Cyberbullying 2023-01-30

Cyberbullying crossword puzzle
Across
  1. Bullying : Intentional and repeated harm inflicted through computers/cellphones
  2. : Physical or emotional injury to someone.
  3. : Interactive Web journal or diary, the contents of which are viewable to everyone online.
  4. : A worldwide network of computers communicating with each other via phone lines, satellite links, wireless networks, and cable systems.
  5. : The second‐most popular social networking Web site.
  6. : Repeated and deliberate harassment directed by one in a position of power toward one or more.
  7. : Making a statement or taking an action that indicates harm to another.
  8. : The act of requesting another person to enter your social network
  9. : The act of restricting access to certain Web sites (usually using software programs).
Down
  1. : The denial of access to particular parts of the Internet.
  2. : Unsolicited words or actions intended to annoy, alarm, or abuse another individual.
  3. : A user‐created Web page on a social networking Web site.
  4. : A wireless handheld device that allows for telephone communications
  5. : Allows Internet users to send and receive electronic text to and from other Internet users.
  6. : Unsolicited electronic mail sent from someone you do not know.
  7. : An electronic device that stores and processes information
  8. : Sending short messages via cell phone
  9. : Acronym for the company that provides an Internet connection to individuals or companies.

18 Clues: : Sending short messages via cell phone: Physical or emotional injury to someone.: The second‐most popular social networking Web site.: A user‐created Web page on a social networking Web site.: The denial of access to particular parts of the Internet.: Unsolicited electronic mail sent from someone you do not know....