networks Crossword Puzzles
Commerce 2022-11-02
Across
- It is a payment processing networks in the world.
- One that can be used many times
- The buying and selling of goods and services between individuals and businesses.
- Pay back.
- Good pre-sales and after-sales service makes you feel you are valued customer.
- Its actual value of goods.
- The process of exploring, creating, and delivering value to meet the needs of customers.
Down
- The amount of money that is expected to pay for something. Consumers want the best value for their money.
- Amount of money that households have available for spending and saving after income taxes have been accounted for.
- What an individual gives up in order to satisfy a need or want
- An online payment system that makes paying for things online and sending and receiving money safe and secure.
- Swapping or exchanging one good for another without using coins and notes.
- The business of drawing people's attention to a good or service.
- items that are usually tangible.
- A written communication ordering your bank, which you sign and give to another party as payment.
- The variety of items people want cannot be fulfilled because resources are limited.
- someone who creates and supplies goods or services
- the standard of something as measured against other things of a similar kind
18 Clues: Pay back. • Its actual value of goods. • One that can be used many times • items that are usually tangible. • It is a payment processing networks in the world. • someone who creates and supplies goods or services • What an individual gives up in order to satisfy a need or want • The business of drawing people's attention to a good or service. • ...
SC015 2025-11-04
Across
- A unique numerical label assigned to each device connected to a network.
- A base-16 number system that uses digits 0–9 and letters A–F.
- A character encoding scheme that uses 7 bits to represent text.
- A network device that forwards data packets between computer networks.
- The SDLC phase where the system is updated and improved after implementation.
- A type of expression that evaluates to either TRUE or FALSE.
- A coding scheme that can represent characters from all languages.
- A study conducted to determine if a proposed system is practical or achievable.
- A network that covers a small geographic area like a computer lab.
- A harmful software designed to damage or disrupt a computer system.
Down
- A global network that connects millions of computers worldwide.
- The SDLC phase where user needs and system requirements are studied.
- A number system that uses only two digits, 0 and 1.
- The correct or acceptable way of communicating on the Internet.
- A base-10 number system that uses digits 0 to 9.
- The SDLC phase where the system is installed and made ready for users.
- An electronic circuit that performs logical operations such as AND, OR, NOT.
- A human-readable address used to identify a website, like google.com.
18 Clues: A base-10 number system that uses digits 0 to 9. • A number system that uses only two digits, 0 and 1. • A type of expression that evaluates to either TRUE or FALSE. • A base-16 number system that uses digits 0–9 and letters A–F. • A global network that connects millions of computers worldwide. • The correct or acceptable way of communicating on the Internet. • ...
Universal Design for Education! 2017-10-25
Across
- ___________ are one of the three principles of UDL.
- A __________ is an example of justifiable accommodations and is used when a child has difficulty writing.
- Having special lighting is an example of ____________ accommodation.
- An oral testing is an example of ____________ accommodations.
- Function ______________ helps children learn to make their own decisions, helps with time management, and also goal setting.
- Part of strategic networks is to optimize access to tools and assistive ____________.
- Udl began from ________ in certain public buildings that eventually began in schools
- One of the benefits of UDL is the ___________ curriculum.
- Time __________ is an example of timing in justified accommodations.
- Design for Learning _____________ is a philosophy and set of principles for curriculum development that give all individuals equal opportunities to learn.
Down
- The “Why” of learning is the __________ brain network.
- The “How” of learning is the __________ brain network.
- The “What” of learning is the ___________ brain network.
- Coloured paper and open book are both examples of _____________ accommodation.
- With UDL in place, _________ should not be needed anymore.
- Accommodations When UDL alone is not sufficient, _____________ is needed.
- UDL is not just beneficial children with exceptionalities, for example, a child in a _________ needs an elevator but that would not only be helpful to them but to others as well.
- of Assessment ________ are one of the three principles of UDL.
18 Clues: ___________ are one of the three principles of UDL. • The “Why” of learning is the __________ brain network. • The “How” of learning is the __________ brain network. • The “What” of learning is the ___________ brain network. • One of the benefits of UDL is the ___________ curriculum. • With UDL in place, _________ should not be needed anymore. • ...
Ch.2 Review - Tim Bogan 2013-09-25
Across
- / the bare minimum system requirements to run a certain type of software
- / hardware architecture and software framework that allows the software to run
- / running an operating system within another operating system
- / replacing hardware or software for newer and more effective versions
- / OS driver that intercepts requests for resources and analyzes them for remote access requirements
- / adding on small updates to an application to fix bugs or add new features
- / software that creates a user interface
- mask / address mask used in IP to indicated the bits of an IP address that are being used for the subnet address
- / operating system designed to track networks consisting of multiple users and programs
Down
- / text based user interface
- / software that performs essential system tasks
- / the organization of files within an operating system
- / graphic based operating system interface
- / the route taken so that a computer on one segment can communicate with a computer on another segment
- / booting two operating systems from the same hard drive
- / main module of the operating system that provides essential services needed by applications
- / 32-bit binary number that is divided into 4 groups of 8 bits, form logical address scheme that provides source and destination addressing and packet forwarding
- / Windows file system designed to manage global and enterprise-level OSs
18 Clues: / text based user interface • / software that creates a user interface • / graphic based operating system interface • / software that performs essential system tasks • / the organization of files within an operating system • / booting two operating systems from the same hard drive • / running an operating system within another operating system • ...
Chapter 6 2023-03-09
Across
- The theory that population increases will always outpace increases in food production.
- Movement away from a place.
- Which stage of the demographic transition model has high birth and death rates?
- A manlike image designed to convey the magnitude of something rather than exact spatial locations.
- People who think that immigrants deserve fewer rights than existing inhabitants of a country.
- What factors attract people to new destinations?
- Barriers to migration include: physical, economical, _________, cultural, and political.
Down
- Safety that a country grants to refugees.
- A portion of a migrant's earnings that are sent to their home country.
- A periodic count of every person resident in a country.
- A disease causing organism.
- _________ transition: a historical decrease in births in which populations move from high to low birth rates.
- Analysis of a population in terms of specific characteristics.
- What kind of migration consists of people who are free to choose whether they stay or move from a place?
- _____ Society: Networks of individuals who are not controlled by states or businesses.
- What factors make a person want to leave a place to find a better life elsewhere?
- The _______ increase or decrease is: The difference between the number of births and the number of deaths.
- Movement into a place.
18 Clues: Movement into a place. • Movement away from a place. • A disease causing organism. • Safety that a country grants to refugees. • What factors attract people to new destinations? • A periodic count of every person resident in a country. • Analysis of a population in terms of specific characteristics. • ...
CS Principles Review. 2023-04-26
Across
- JPG images use lossless compression (true or false)
- like the phonebook for the internet (3 words)
- are a way of writing algorithms that requires no coding experience
- programs that are made freely available and may be modified (2 words)
- full form of IP
- The use of digital data to approximate real-world analog data is an example of _____.
- algorithms which take exponentially longer to execute as data size goes up
- data have values that change smoothly, rather than in discrete intervals
- measured in bits per second
Down
- Data streams contain chunks of data, which are encapsulated in ___
- Symmetric encryption uses one public key and private key (true/false)
- A way of writing algorithms that is not language specific
- A computer with unlimited storage and computing power could solve every problem in the world. (true or false)
- An ______ problem is a problem with the goal of finding the “best” solution among many
- protocol where the packet received sends back an acknowledgment to the sender
- a wireless access point that gives unauthorized access to secure networks (3 words)
- a solution to a problem that is not the best, but good enough (2 words)
- Parallel computing takes as long as its sequential tasks plus the longest of its parallel tasks.
- Algorithms with a _____ efficiency or lower are said to run in a reasonable amount of time.
- physical devices connected through multiple paths are called ____ (2 words)
20 Clues: full form of IP • measured in bits per second • like the phonebook for the internet (3 words) • JPG images use lossless compression (true or false) • A way of writing algorithms that is not language specific • Data streams contain chunks of data, which are encapsulated in ___ • are a way of writing algorithms that requires no coding experience • ...
African Kingdom Vocab (no spaces in terms) 2024-10-22
Across
- promoted Ethiopian literature and arts and strengthened central authority and religious policies
- known as the "King Shark", the last independent ruler of Dahomey, strongly resisted French colonization
- created the position of supreme military commander, established many of the empire's political institutions and military structures
- founded the empire, created the basic administrative structure, and expanded trade networks
- "King of Kings," title of the Ethiopian emperor
- Sika'dwa, the sacred throne symbolizing Ashanti unity and power
- title of the emperor, meaning "Lord of the Conquered Lands"
- the first king of Dahomey
- modernized Ethiopia, defeated Italy, and expanded territory significantly
- "Glory of Kings," sacred text of Ethiopian history
Down
- matrilineal clan system
- co-founder of the Ashanti Empire, united the Ashanti states under the Golden Stool, created many of the empire's political and military institutions
- Notable as a female Alaafin who helped establish Oyo's cavalry forces, strengthened the empire's military capabilities and expanded its territory
- the title of the Ashanti king
- title of the Oyo ruler, meaning "owner of the palace"
- expanded the empire to its greatest territorial extent, strengthened trade relationships with coastal and Middle Eastern Arabs, and enhanced mining operations
- Dahomey royal python cult central to religious practice
- traditional legal code
18 Clues: traditional legal code • matrilineal clan system • the first king of Dahomey • the title of the Ashanti king • "King of Kings," title of the Ethiopian emperor • "Glory of Kings," sacred text of Ethiopian history • title of the Oyo ruler, meaning "owner of the palace" • Dahomey royal python cult central to religious practice • ...
Unit 3 and 4 Vocabulary 2022-11-04
Across
- the number of times one’s content is displayed, no matter if it was clicked or not.
- Voice this is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- Advocacy a marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- Curation filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- Proof a psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- a person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- Automation a set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- Marketing any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- the process of luring someone into a relationship by means of a fictional online persona.
- Awareness the extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, ____________ can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
Down
- an internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- Influencers a user on social media who has established credibility in a specific industry.
- the process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- Bullying the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Marketing a business methodology that attracts customers by creating valuable content and experiences tailored to them.
- the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- Advocate this is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- Audience the specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- this represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
20 Clues: the number of times one’s content is displayed, no matter if it was clicked or not. • the process of luring someone into a relationship by means of a fictional online persona. • Influencers a user on social media who has established credibility in a specific industry. • ...
VOCABULARY 1 2019-11-12
Across
- it's a language spoken in England
Down
- network refers to the infrastructure necessary to establish virtual links and the possibility of exchanging information from various
- real-time communication between multiple users
- is the use of computers to store, retrieve, transmit, and manipulate data, or information
4 Clues: it's a language spoken in England • real-time communication between multiple users • is the use of computers to store, retrieve, transmit, and manipulate data, or information • network refers to the infrastructure necessary to establish virtual links and the possibility of exchanging information from various
Topics 3 and 4 - Networks and Processing Data 2022-02-09
Across
- Used between faster and slower devices to let them work more quickly together
- Controls the transmission of data to and from memory, Processes the data held in main memory, Controls the transmission of data from main memory to output devices
- Carries memory locations/memory addresses between the main memory and the CPU/(memory address) registers.
- LAN
- A circuit which connects one part of the motherboard to another.
- Determines the speed of the processor
Down
- PAN
- WAN
- Interprets each instruction of the code of a program submitted to it by matching the instruction to one of its own instructions.
- Used as a (fast access) temporary data store (used for a specific purpose)
- The computer programs (sequences of instructions) that tell the computer what to do in response to a command or some event
- The physical components (Electronic Circuits) that make up a computer
- Logic Unit, ALU
13 Clues: PAN • WAN • LAN • Logic Unit, ALU • Determines the speed of the processor • A circuit which connects one part of the motherboard to another. • The physical components (Electronic Circuits) that make up a computer • Used as a (fast access) temporary data store (used for a specific purpose) • Used between faster and slower devices to let them work more quickly together • ...
Cyber security risks 2017-07-13
Across
- this is a software to design to detect and destroy computer viruses
- a person who uses computers to gain unauthorized access to data
- a network of social interactions and personal relationships
- the action of keeping your device safe
- this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
- a piece of code which is capable of copying itself and can corrupts the system or destroying data
- this is a software that threatens to delete your data for a specific amount of money
- a person who gains unauthorised access to computer files or networks in order to further social or political ends
- fraudulent practice of sending emails pretending to be from reputable companies
- convert information or data into a code especially to prevent unauthorised access
- a computer program that records every keystroke made by a computer user
- a secret word or phrase that must be used to gain admission to a place
12 Clues: the action of keeping your device safe • a network of social interactions and personal relationships • a person who uses computers to gain unauthorized access to data • this is a software to design to detect and destroy computer viruses • a secret word or phrase that must be used to gain admission to a place • ...
Computer 2018-10-10
Across
- program instructions
- connect as or operate with a network.
- a unit of memory or data equal to 1,024 (210) bytes.
- A router is a device that forwards data packets along networks.
- the introductory page of a website, typically serving as a table of contents for the site.
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted.
- arrange or put into a format.
Down
- a device that scans documents and converts them into digital data.
- Printing: the action or process of making a physical object from a three-dimensional digital model, typically by laying down many thin layers of a material in succession.
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- The word wireless is dictionary defined as "having no wires".
- a person who uses computers to gain unauthorized access to data.
12 Clues: program instructions • arrange or put into a format. • connect as or operate with a network. • a unit of memory or data equal to 1,024 (210) bytes. • The word wireless is dictionary defined as "having no wires". • A router is a device that forwards data packets along networks. • a person who uses computers to gain unauthorized access to data. • ...
Security Awareness 2013-05-01
Across
- (2 words) An employee security awareness program across the ESPN and Walt Disney company.
- Distracted Drivers Awareness Month
- See ____? Say ___!
- DON’T BE A DISTRACTED ______!
- “Up from the ____” is Global Security’s initiative to reinforce Community Watch safety tips and give employees a fun way to learn more about our teammates.
Down
- ________ is a member of the security community.
- Never ____ your ID to another employee
- Do not open ___________ to unsolicited emails
- A type of “social engineering” generally in the form of an email or phone call intended to get people to respond to the phishers request for personal information.
- Self-Awareness is ________ Awareness - you know what is normal and not normal in your workplace.
- Social Media provides an efficient means for criminals to mine both personal and company data. Social ______ work to gain standing with the victim via phone, email, or text, based on information they have obtained from these social networks.
- Contact Brian ____, Associate Director of Facility Security to find out more on how you can get involved with the Community Watch Team.
12 Clues: See ____? Say ___! • DON’T BE A DISTRACTED ______! • Distracted Drivers Awareness Month • Never ____ your ID to another employee • Do not open ___________ to unsolicited emails • ________ is a member of the security community. • (2 words) An employee security awareness program across the ESPN and Walt Disney company. • ...
chapter 7 vocab 2015-02-13
Across
- hoc- refers to a system of network elements that combine to form a network requiring little or no planning
- When a device authenticates itself
- applicationon of a specific algorithm to data that makes the data protected from unauthorized access.
- Wireless local area network.
- personal area network.
- Electromagnetic waves with a frequency range above that of microwaves. Below that of the visible spectrum. LAN systems based on technology represent an emerging tech.
- service set identifier. code assigned to a packet that designates that the communication is part of a wireless network
Down
- station, basic network device/=
- radio frequency for short-range communication enabling devices to communicate with each other over short distances.
- wave- Self-propagating wave in space with electric and magnetic componets classified in order of increasing frequency; radio waves, microwave, infrared radiation, visible light, terahertz radiation, ultraviolet radiation, x-rays and gamma rays.
- Client- a host that connects to a wireless network
- point- wireless LAN transmitter/receiver that acts as a connection between wireless clients and wired networks.
12 Clues: personal area network. • Wireless local area network. • station, basic network device/= • When a device authenticates itself • Client- a host that connects to a wireless network • applicationon of a specific algorithm to data that makes the data protected from unauthorized access. • ...
CS 2022-05-12
Across
- Copy (data) from one computer system to another, typically over the internet.
- A computer-based application for the exchange of messages between users.
- situated, occurring, or done below the sea or the surface of the sea.
- A range of frequencies within a given band, in particular that used for transmitting a signal.
- A system for connecting a number of computer systems to form a local area network.
- A computer or computer program which manages access to a centralized resource or service in a network.
Down
- A unit of hardware , outside or inside the case or housing for the essential computer.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
- An electronic device for storing and processing data.
- A unit of information equal to one thousand million bits.
- A facility allowing computers, smartphones, or other devices to connect to the internet.
- A device that connects two or more packet-switched networks or subnetworks.
12 Clues: An electronic device for storing and processing data. • A unit of information equal to one thousand million bits. • situated, occurring, or done below the sea or the surface of the sea. • A computer-based application for the exchange of messages between users. • A device that connects two or more packet-switched networks or subnetworks. • ...
hardware 2022-05-11
Across
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- electronic device for storing/processing data
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- one billion bits
- consisting of or using thin flexible fibres with a glass core through which light signals can be sent with very little loss of strength.
- the rate at which someone or something moves or operates
Down
- something that is under the sea
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- a person or organization using the services of a professional person or company.
- V
- A router is a device that connects two or more packet-switched networks or subnetworks.
12 Clues: V • one billion bits • something that is under the sea • electronic device for storing/processing data • the rate at which someone or something moves or operates • a person or organization using the services of a professional person or company. • A router is a device that connects two or more packet-switched networks or subnetworks. • ...
Hardware of the Internet 2022-05-11
Across
- a computer-based application for the exchange of messages between users
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- a high-speed device that receives incoming data packets and redirects them to their destination on a local area network
- electronic devices used to store data
- organises communication between computer networks.
- the part of a network that handles the major traffic.
Down
- The maximum amount of data transmitted over an internet connection in a given amount of time
- an established set of rules that determine how data is transmitted between different devices in the same network
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- any computer hardware or software device that requests access to a service provided by a server.
- one billion bits
- a computer or computer program which manages access to a centralized resource or service in a network
12 Clues: one billion bits • electronic devices used to store data • organises communication between computer networks. • the part of a network that handles the major traffic. • a computer-based application for the exchange of messages between users • The maximum amount of data transmitted over an internet connection in a given amount of time • ...
IT Crossword 2019-07-23
Across
- A network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
- The practice of protecting systems, networks, and programs from digital attacks.
- The fact of obeying a particular law or rule, or of acting according to an agreement:
- Repair the damage to something in an improvised way
- The company with 20 years of experience that helps you with your IT issues
- A person who uses computers to gain unauthorized access to data
Down
- A collection of data or computer instructions that tell the computer how to work
- The quality or state of being exposed to the possibility of being attacked or harmed
- A means to support and help you deal with any issues/incidents in your organization
- A copy of a file or other item of data made in case the original is lost or damaged
- Conduct an examination
- A group or system of interconnected people or things.
12 Clues: Conduct an examination • Repair the damage to something in an improvised way • A group or system of interconnected people or things. • A person who uses computers to gain unauthorized access to data • The company with 20 years of experience that helps you with your IT issues • A collection of data or computer instructions that tell the computer how to work • ...
Basics of Software Engineering 2025-05-01
Across
- The programs, instructions, and data that tell a computer what to do.
- the ability of a computer or machine to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- a way to store some sort of information for later use in programming.
- Physical components of a computer or other technology.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- the ability of one device, particularly a computer, to communicate and share data with another device, often through a network like the Internet.
- Structure and grammar of programming.
Down
- the process or activity of writing computer programs.
- Programming language for developing web applications.
- application of scientific principles to design, build, and solve problems.
- a form of energy resulting from the existence of charged particles (such as electrons or protons), either statically as an accumulation of charge or dynamically as a current.
- program instructions
12 Clues: program instructions • Structure and grammar of programming. • the process or activity of writing computer programs. • Programming language for developing web applications. • Physical components of a computer or other technology. • The programs, instructions, and data that tell a computer what to do. • ...
Cybersecurity Crossword 2025-08-18
Across
- A weakness in a system that can be exploited by attackers.
- A broad term encompassing any malicious software designed to damage or disable computer systems.
- The process of verifying the identity of a user or system
- Engineering The art of manipulating people into divulging confidential information.
- A type of malware that encrypts a victim's files and demands a ransom for their release.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication
Down
- The process of converting data into a code to prevent unauthorized access.
- authentication An extra layer of security requiring users to provide two or more verification factors.
- A type of malware that secretly gathers information about a user's activities
- An attempt to damage or disrupt computer systems or networks.
- A security system that controls network traffic based on predetermined security rules.
- Detection System (IDS) A system that monitors network traffic for suspicious activity.
12 Clues: The process of verifying the identity of a user or system • A weakness in a system that can be exploited by attackers. • An attempt to damage or disrupt computer systems or networks. • The process of converting data into a code to prevent unauthorized access. • A type of malware that secretly gathers information about a user's activities • ...
tech terms 2022-05-09
Across
- the basic unit of information in computer storage and processing
- central prosing unit
- data that identify a specific individual
- a set of programs that help a communications service provider monitor, control, analyze and manage a telephone or computer network
- information in secret code
- software that allows a computer user to find and view information on the
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- bad software
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
Down
- one million bytes
- 0 or 1
- a piece of data from a website that is stored within a web browser that the website can retrieve at a later time
- Hypertext Markup Language,
- any of a class of electronic devices that convert digital data signals into modulated analog signals suitable for transmission over analog telecommunications circuits.
- a physical or virtual appliance that passes information between two or more packet-switched computer networks
- platform that enables applications to run.
- portable document format
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
18 Clues: 0 or 1 • bad software • one million bytes • central prosing unit • portable document format • Hypertext Markup Language, • information in secret code • data that identify a specific individual • platform that enables applications to run. • the basic unit of information in computer storage and processing • software that allows a computer user to find and view information on the • ...
Commerce 2022-11-02
Across
- An online payment system that makes paying for things online and sending and receiving money safe and secure.
- What an individual gives up in order to satisfy a need or want
- One that can be used many times
- Its actual value of goods.
- someone who creates and supplies goods or services
- The process of exploring, creating, and delivering value to meet the needs of customers.
- It is a payment processing networks in the world.
- A written communication ordering your bank, which you sign and give to another party as payment.
- The variety of items people want cannot be fulfilled because resources are limited.
Down
- The business of drawing people's attention to a good or service.
- Good pre-sales and after-sales service makes you feel you are valued customer.
- Swapping or exchanging one good for another without using coins and notes.
- the standard of something as measured against other things of a similar kind
- The buying and selling of goods and services between individuals and businesses.
- Amount of money that households have available for spending and saving after income taxes have been accounted for.
- items that are usually tangible.
- Pay back.
- The amount of money that is expected to pay for something. Consumers want the best value for their money.
18 Clues: Pay back. • Its actual value of goods. • One that can be used many times • items that are usually tangible. • It is a payment processing networks in the world. • someone who creates and supplies goods or services • What an individual gives up in order to satisfy a need or want • The business of drawing people's attention to a good or service. • ...
Health and Wellness 2025-01-08
Across
- relating to your mental health & perspective on the world
- a sum total of all the living and non-living elements and their effects that influence human life
- state of complete physical, mental and emotional, and social well-being
- related risks that increase in effect with each added risk
- waiting until the adverse health issue finds you and dealing with it then
- relating to the body, internal & external
- encouraging your expansion of knowledge and self awareness
Down
- relating to or affecting the human spirit or soul as opposed to material or physical things
- biological, environmental, familiar, social, behavioral, cultural characteristics that increase the likelihood of a bad outcome
- the main means of mass communication
- living a lifestyle that helps you avoid or prevent adverse health issues
- a way of life of a group of people
- relating to who you spend your time with, or don’t, human interaction
- process of identifying one’s state of health and taking steps to improve it
- someone at your own level
- the passing on of genes and genetic traits from parent to offspring
- the practice of refraining from sexual activity
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
18 Clues: someone at your own level • a way of life of a group of people • the main means of mass communication • relating to the body, internal & external • the practice of refraining from sexual activity • relating to your mental health & perspective on the world • related risks that increase in effect with each added risk • ...
CS Unit 2 Vocab 2025-09-30
Across
- identity verification
- software that is programmed to detect, prevent, and remove viruses from devices
- a network that only uses cables to connect to devices or the internet
- a network that transmit data extremely fast through thin strands of plastic or glass fiber
- data stored on a device that is not connected to the internet or to a network
- open authorization and two-factor authentication
- security process that requires two different forms/factors of authentication to verify someone's identity
- the data is trustworthy and accurate (part of the CIA triad)
- the exposure something has to being in danger
Down
- to reduce the severity of something
- the accessibility of data to authorized users (part of the CIA triad)
- services that are useable
- the core fundamental concept of cybersecurity
- proof that someone/something has performed a digital action, so they can not deny involvement
- network security systems that monitor and control network trafficet, used as barriers between internal and external networks
- only people who are authorized have access to data (part of the CIA triad)
- network security tool that monitors system and network activity for threats and mitigates them immediately
- network security tool that monitors system and nwork activity for suspicious behavior
18 Clues: identity verification • services that are useable • to reduce the severity of something • the core fundamental concept of cybersecurity • the exposure something has to being in danger • open authorization and two-factor authentication • the data is trustworthy and accurate (part of the CIA triad) • the accessibility of data to authorized users (part of the CIA triad) • ...
Unit 1 What is cybersecurity? 2021-09-27
Across
- protocols for encrypting or decrypting information in order to protect computer systems, networks and data from cyber attacks
- assurance that systems and data are accessible by authorized users when and where needed
- the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
- the protection of information from people who are not authorized to view it
Down
- the study of computational thinking which describes a step by step process
- a widely accepted security measure that should be guaranteed in every secure system
- the usage of deceptive emails and websites to maliciously gather personal information
- identify theft, stealing money, stealing private information controlling private computers
- ensures that information is protected from unauthorized or unintentional alteration
9 Clues: the study of computational thinking which describes a step by step process • the protection of information from people who are not authorized to view it • a widely accepted security measure that should be guaranteed in every secure system • ensures that information is protected from unauthorized or unintentional alteration • ...
Networking Software 2021-12-01
Across
- a small program that exploits a network security weakness (security hole) to replicate itself through computer networks.
- an acronym that explains the main functions of a database
- a program that hides in or masquerades as desirable software, such as utility or a game, but attacks computers it infects.
- a small program attached to another program or data file. It replicates itself by attaching itself to other programs.
Down
- a method of defining data formats for data that will be transmitted around a network.
- self-contained, modular applications that can be described, published, located and invoked over a network, generally the web.
- a standard format for transmitting data (linked to Javascript)
- a layer of software that allows application programs to call on the services of the operating system.
- a methodology for implementing a networked database.
9 Clues: a methodology for implementing a networked database. • an acronym that explains the main functions of a database • a standard format for transmitting data (linked to Javascript) • a method of defining data formats for data that will be transmitted around a network. • ...
S.S. Critical Vocabulary 2024-04-01
Across
- process of increasing interconnectedness among countries and regions through the exchange of goods, services and ideas
- the process of transforming an economy based on large-scale industries
- clearing of forests for agricultural, commercial, or residential purposes.
Down
- the process of population concentration in cities and towns, accompanied by the growth of urban areas.
- the basic physical and organizational structures and facilities needed for the operation of a society, including transportation networks, communication systems, energy grids, and water supply systems.
- practice of acquiring and controlling foreign territories for economic exploitation, and cultural influence.
- Laws or statutes enacted by a legislative body, such as a parliament or congress.
- Principles, beliefs, or values that are perfect and serve as the basis for behavior or goals.
- The gradual development or change of something over time
9 Clues: The gradual development or change of something over time • the process of transforming an economy based on large-scale industries • clearing of forests for agricultural, commercial, or residential purposes. • Laws or statutes enacted by a legislative body, such as a parliament or congress. • ...
MALWARE 2025-08-05
Across
- (7 letters) Software that hides as something useful but gives hackers access to your device.
- (4 letters) A harmful program that spreads on its own, through networks, without needing you to click.
- (5 letters) A harmful program that attaches itself to other files and needs you to open it to spread.
- (8 letters) A program that spies on you and steals your private information.
- (9 letters) Using old software can make your device __________ to malware attacks.
Down
- (8 letters) This type of software protects your computer from malware.
- (7 letters) This malware encrypts your files and asks for money to unlock them.
- (6 letters) Type of malware that tracks your browsing and shows you pop-up ads.
- (3 letters) A dangerous link or file often found in scam emails that can lead to malware.
9 Clues: (8 letters) This type of software protects your computer from malware. • (8 letters) A program that spies on you and steals your private information. • (7 letters) This malware encrypts your files and asks for money to unlock them. • (6 letters) Type of malware that tracks your browsing and shows you pop-up ads. • ...
Ví dụ 2022-12-12
Across
- A .......... protects a company intra net from outside attacks
Down
- A ............... is a person who uses their computer skills to enter computers and networks illegally.
- ................... can infect your files and corrupt your hard drive.
- Users have to enter a ......... to gain access to a network
4 Clues: Users have to enter a ......... to gain access to a network • A .......... protects a company intra net from outside attacks • ................... can infect your files and corrupt your hard drive. • A ............... is a person who uses their computer skills to enter computers and networks illegally.
Computer Words 2014-04-28
Across
- A location connected to the Internet that maintains one or more web pages.
- To transfer (software, data, character sets, etc.) from a distant to a nearby computer, from a larger to a smaller computer, or from a computer to a peripheral device.
- A system for sending messages from one individual to another via telecommunications links between computers or terminals.
- Can be used to move, select, activate, and change items on a computer screen.
Down
- Leading internet search engine.
- First thing you see when you open your laptop.
- A brand name certifying that a device or other product is compatible with a set of broadband wireless networking standards.
- A vast computer network linking smaller computer networks worldwide.
- The name of a social-networking service and website, created to communicate worldwide.
9 Clues: Leading internet search engine. • First thing you see when you open your laptop. • A vast computer network linking smaller computer networks worldwide. • A location connected to the Internet that maintains one or more web pages. • Can be used to move, select, activate, and change items on a computer screen. • ...
Malware 2022-12-06
Across
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- a computer program used to prevent, detect, and remove malware.
- malicious software designed to block access to a computer system until a sum of money is paid.
- records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
Down
- the protection of computer systems and networks from attacks from malicious software.
- malware that misleads users of its true intent.
- the psychological manipulation of people into performing actions or giving out confidential information.
- can propagate or self-replicate from one computer to another without human activation after breaching a system.
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
9 Clues: malware that misleads users of its true intent. • a computer program used to prevent, detect, and remove malware. • the protection of computer systems and networks from attacks from malicious software. • malicious software designed to block access to a computer system until a sum of money is paid. • ...
ict 2021-09-24
Across
- a speech or talk in which a new product, idea, or piece of work is shown and explained to an audience.
- a pair of earphones joined by a band placed over the head, for listening to audio signals such as music or speech.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- schoolwork that a pupil is required to do at home.
- the action or skill of writing something by means of a typewriter or computer.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
Down
- a short piece of writing on a particular subject
- an electronic device for storing and processing data
- schoolwork that a pupil is required to do at home.
- a panel of keys that operate a computer or typewriter.
10 Clues: a short piece of writing on a particular subject • schoolwork that a pupil is required to do at home. • schoolwork that a pupil is required to do at home. • an electronic device for storing and processing data • a panel of keys that operate a computer or typewriter. • the action or skill of writing something by means of a typewriter or computer. • ...
Crossword 2024-10-15
Across
- Incorporating or representing multiple cultures (Globalization/Culture).
- The process by which businesses and other organizations develop international influence (Globalization).
- A new method, idea, or product, crucial for technological advancement (Science and Technology).
- A change in a DNA sequence that can affect an organism's traits (Genetics). Pedagogy The method and practice of teaching, especially in education (Education).
- The presence of different cultures, ideas, and perspectives in a group (Culture).
Down
- The ability to maintain or support an activity or process over the long term, especially regarding the environment (Earth).
- The branch of biology that deals with the relations of organisms to one another and to their physical surroundings (Earth).
- The complete set of genes or genetic material in an organism (Genetics).
- A global system of interconnected computer networks that revolutionized communication (Science and Technology).
9 Clues: Incorporating or representing multiple cultures (Globalization/Culture). • The complete set of genes or genetic material in an organism (Genetics). • The presence of different cultures, ideas, and perspectives in a group (Culture). • A new method, idea, or product, crucial for technological advancement (Science and Technology). • ...
Objective 2a: Causes and Effects of Growing Trade 2024-11-15
Across
- A device that enhanced stability for riders, facilitating long-distance travel along trade routes.
- A major trade network that connected regions across Afro-Eurasia, fostering commerce and cultural exchange.
- A transportation innovation that improved efficiency for merchants traveling across desert trade routes.
- Roadside inns along trade routes that provided rest and resources for merchants and their animals.
- Institutions that supported trade by facilitating credit, currency exchange, and financial transactions.
- A form of currency that simplified transactions and promoted economic growth in trade networks.
Down
- A system of credit that enabled long-distance trade by providing merchants with secure payment options.
- A trading city along the Silk Roads known for its role in facilitating trade and cultural interactions.
- A key trading city along the Silk Roads that served as a hub for commerce and cultural exchange.
9 Clues: A form of currency that simplified transactions and promoted economic growth in trade networks. • A key trading city along the Silk Roads that served as a hub for commerce and cultural exchange. • A device that enhanced stability for riders, facilitating long-distance travel along trade routes. • ...
Integration of Filipino values on mental health practice 2025-12-14
Across
- Determinants Poverty, nutrition, and social conditions are recognized as major influences on mental well-being.
- Care Treatment involves family support, recognizing kinship as a key strength in Filipino mental health care.
- Care is built on sensitivity, trust, and indirect communication to preserve dignity and comfort.
- Mental health is viewed as relational; distress affects not only the individual but also family and community.
Down
- Mental health care is strengthened through collaboration with spiritual and community leaders.
- Mental health care respects and integrates cultural and religious practices alongside modern treatment
- Community- and family-based approaches help reduce stigma and increase access to care
- Friends and social networks serve as primary coping resources and often come before professional help.
- Reframed as resilience and hope—trusting inner strength and faith despite uncertainty.
9 Clues: Community- and family-based approaches help reduce stigma and increase access to care • Reframed as resilience and hope—trusting inner strength and faith despite uncertainty. • Mental health care is strengthened through collaboration with spiritual and community leaders. • ...
Texas History 2022-04-21
Across
- a return to a normal state of health, mind, or strength.
- statistical data relating to the population and particular groups within it.
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
- a financial gain
- the process by which an economy is transformed from primarily agricultural to one based on the manufacturing of goods.
Down
- the Mexican-American civil rights movement of the 1960s with the stated goal of achieving Mexican American empowerment.
- the process of increasing the percentage and number of people living in urban settlements.
- a form of protest in which demonstrators occupy a place, refusing to leave until their demands are met.
- prejudice, discrimination, or antagonism directed against someone of a different race based on the belief that one’s own race is superior
9 Clues: a financial gain • a return to a normal state of health, mind, or strength. • statistical data relating to the population and particular groups within it. • the process of increasing the percentage and number of people living in urban settlements. • a form of protest in which demonstrators occupy a place, refusing to leave until their demands are met. • ...
Cyber Crosswords 2024-06-19
Across
- A secret word or phrase used to gain access to a computer system (8 letters)
- A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- Software that is designed to detect and destroy computer viruses (9 letters)
- The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- Unsolicited email, often used for advertising or phishing (4 letters)
9 Clues: Unsolicited email, often used for advertising or phishing (4 letters) • Software that is designed to detect and destroy computer viruses (9 letters) • A secret word or phrase used to gain access to a computer system (8 letters) • The practice of protecting systems, networks, and programs from digital attacks (10 letters) • ...
Chapter 17 Effects of Globalization on Individuals and Communities 2023-06-05
Across
- when a government-owned business, operation, or property becomes owned by a private, non-government party
- the spread of infectious diseases to create a worldwide epidemic
- the basic equipment and structures that are needed for a country, region, or organization to function properly
- genes from one species are introduced into another to produce a hardier and higher-yielding strain of a product
- trust—an essential, life supporting resource for the benefit of everyone that should not be exploited for profit
Down
- a period of global agriculture increased drastically as a result of new advances
- networks which create political, social, cultural, and economic links between geographic locations around the world
- able to decay naturally and in a way that is not harmful
- United Nations agency that is responsible for international public health
9 Clues: able to decay naturally and in a way that is not harmful • the spread of infectious diseases to create a worldwide epidemic • United Nations agency that is responsible for international public health • a period of global agriculture increased drastically as a result of new advances • ...
Digital CX 2023-04-11
Across
- A set of related web pages located under a single domain name
- Interactive technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks
- A software orprogram developed specifically for use on small, wireless computing devices
- Feedback collected using digital tools in the store
Down
- Form of a commercial message, typically to a group of people, usually to an inbox
- A list of questions aimed for extracting specific data from a particular group of people
- A computer program designed to simulate conversation with human users, especially over the internet
- Principles, practices, and guidelines that an organization follows when interacting with its customers
- Packaged software that creates a comprehensive database accessible by other systems to analyze, track, and manage consumer data
9 Clues: Feedback collected using digital tools in the store • A set of related web pages located under a single domain name • Form of a commercial message, typically to a group of people, usually to an inbox • A list of questions aimed for extracting specific data from a particular group of people • ...
ECE chapter 8 vocab 2023-02-01
Across
- funding gap schools that have a higher portion of students who are low income and need a higher level of services.
- per pupil the average amount of money a school district spends to educate one student for one year.
- gap differences in learning and graduating rates among schools.
- education partnership businesses enter into a expanded and more formal relationship with school.
Down
- a student no longer has the right to attend school for a specific amount of time.
- an adult who commits to a long term relationship with a student to provide support,guidance, and help.
- tolerance policy the prohibited behaviors and actions will not be tolerated.
- bullying intimidation through e-mail,social networks and texting;bullying online.
- risk students or groups that have characteristics that make them more likely to fail academically.
9 Clues: a student no longer has the right to attend school for a specific amount of time. • gap differences in learning and graduating rates among schools. • tolerance policy the prohibited behaviors and actions will not be tolerated. • education partnership businesses enter into a expanded and more formal relationship with school. • ...
Computing Key Words 2024-01-13
Digital Citizenship - Paige Gavilanes 2022-12-14
Across
- program or automated script that methodically browses the World Wide Web
- computer instructions or data; anything that can be stored electronically
- derived from the term “malicious software;” refers to any program designed to infiltrate or damage a computer or network
- sending email that attempts to scam the user into giving up private information to be used for identity theft
- a way to give information to a computer
- online commenter whose intent is to attack views expressed online; these attacks are often personal
- gateway between two
- computer or device on a network that manages network resources
- series of messages that have been posted as replies to each other in online discussions
- electronic display that senses physical touch by hands, fingers, or a tool such as a stylus
- unique web address for a single blog posting
Down
- device or program that enables a computer to transmit data
- repeating code
- secret series of numbers or letters that allows you to access a locked computer or program
- site or page located on the World Wide Web
- An alert that notifies a blog poster of a response to their post
- a global network connecting millions of computers
- Unifrom Resource Locator, or "adress" for a Webpage
- having doubt about something
- device that forwards data packets of digital information along networks
20 Clues: repeating code • gateway between two • having doubt about something • a way to give information to a computer • site or page located on the World Wide Web • unique web address for a single blog posting • a global network connecting millions of computers • Unifrom Resource Locator, or "adress" for a Webpage • device or program that enables a computer to transmit data • ...
TEACHING MACHINES 2019-01-14
Across
- / extend over so as to cover partly
- / an outstanding part of an event or period of time
- – electronic grid, having its own "brain" with databases for large/scale tasks and calculations
- / of or relating to the ability to interpret or become aware of something through the senses
- / get or bring (something) back; regain possession of
- / (of an animal) feeding on other animals
- / an incident or event
- – do something productive with high returns
- / requiring no physical or mental exertion
Down
- / a particular mode in which something exists or is experienced or expressed
- / a layer at the back of the eyeball containing cells that are sensitive to light and that trigger nerve impulses that pass via the optic nerve to the brain, where a visual image is formed
- / worth the time, money, or effort spent; of value or importance
- – become aware or conscious of (something); come to realize or understand
- / a particular order in which related events, movements, or things follow each other
- networks / a computer system modeled on the human brain and nervous system
- / an attempt to achieve a goal
- / the ability to see, hear, or become aware of something through the senses
- / follow (someone or something) in order to catch or attack them
- / a person who embodies in the flesh a deity, spirit, or abstract quality
- – move out of or away from something and come into view
20 Clues: / an incident or event • / an attempt to achieve a goal • / extend over so as to cover partly • / (of an animal) feeding on other animals • / requiring no physical or mental exertion • – do something productive with high returns • / an outstanding part of an event or period of time • / get or bring (something) back; regain possession of • ...
Living in the IT Era 2019-11-16
Across
- the first page that a Web site displays.
- was a convenient way to send a message to associates or friends.
- the worldwide computer network that links thousands of smaller networks.
- an online area in which users have written discussions about a particular subject.
- a real-time typed conversation that takes place on a computer.
- the code of acceptable internet behavior.
- consists of a worldwide collection of electronic documents.
- a process of receiving information.
- a collection of data or computer instructions that tell the computer how to work.
- an online or internet-based illegal act.
- a malicious program that looks like a legitimate program.
Down
- the appearance of motion created by displaying a series of still images in sequence.
- affects a computer negatively by altering the way the computer works.
- a digital representation of nontext information.
- refers to information presented in non-textual forms such as video, sound, and graphics.
- a type of malware that can block access to the victim's data.
- the technology by which a process or procedure is performed with minimal human assistance.
- a device, module, machine, or subsystem whose purpose is to detect events or changes in its environment.
- a communications system connecting two or more computers.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
20 Clues: a process of receiving information. • the first page that a Web site displays. • an online or internet-based illegal act. • the code of acceptable internet behavior. • a digital representation of nontext information. • a communications system connecting two or more computers. • a malicious program that looks like a legitimate program. • ...
Living in the IT Era 2019-11-16
Across
- a real-time typed conversation that takes place on a computer.
- a device, module, machine, or subsystem whose purpose is to detect events or changes in its environment.
- a type of malware that can block access to the victim's data.
- was a convenient way to send a message to associates or friends.
- refers to information presented in non-textual forms such as video, sound, and graphics.
- the appearance of motion created by displaying a series of still images in sequence.
- an online area in which users have written discussions about a particular subject.
- a collection of data or computer instructions that tell the computer how to work.
- a malicious program that looks like a legitimate program.
- the first page that a Web site displays.
Down
- the technology by which a process or procedure is performed with minimal human assistance.
- a process of receiving information.
- an online or internet-based illegal act.
- the code of acceptable internet behavior.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- affects a computer negatively by altering the way the computer works.
- the worldwide computer network that links thousands of smaller networks.
- a communications system connecting two or more computers.
- a digital representation of nontext information.
- consists of a worldwide collection of electronic documents.
20 Clues: a process of receiving information. • an online or internet-based illegal act. • the first page that a Web site displays. • the code of acceptable internet behavior. • a digital representation of nontext information. • a communications system connecting two or more computers. • a malicious program that looks like a legitimate program. • ...
Malware 2021-04-29
Across
- program or code introduced by a criminal who has compromised a system.
- phishing using voice communication technology.
- This type of malware remains inactive until that trigger event happens.
- junk mail
- malicious executable code attached to another executable file, such as a legitimate program.
- modifies the operating system to create a backdoor.
- software that enables a criminal to obtain information about a user’s computer activities.
- takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
- Short Message Service phishing
- malicious software
- a phishing attack that targets high profile targets within an organization such as senior executives.
Down
- malware that carries out malicious operations under the guise of a desired operation such as playing an online game.
- non-technical means for a criminal to gather information on a target.
- malicious code that replicates by independently exploiting vulnerabilities in networks.
- the impersonation of a legitimate website in an effort to deceive users into entering their credentials.
- an attacker requests personal information from a party in exchange for something, like a gift.
- a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
- holds a computer system, or the data it contains, captive until the target makes a payment.
- a highly targeted phishing attack.
- displays annoying pop-ups to generate revenue for its authors.
20 Clues: junk mail • malicious software • Short Message Service phishing • a highly targeted phishing attack. • phishing using voice communication technology. • modifies the operating system to create a backdoor. • displays annoying pop-ups to generate revenue for its authors. • non-technical means for a criminal to gather information on a target. • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
Tech x BU 2023-03-02
Across
- COM’s one-stop-shop for JO & FTV equipment
- Walking down COMM Ave, you’ll see plenty of students listening to these
- Student-run radio station
- Undergrad students graduate with a Bachelor of ______ degree
- This wifi service recently partnered with BU, giving students access to wireless networks at participating institutions
- BU students get free access to this creative suite
- Use this app to order your favorite on-campus food
- BUMC IT recently launched the Hear My _____ App to combat mispronunciations of names
- President Brown specialized in this type of engineering
- Acronym for new building on campus
- This BU alum is the first woman to lead NASA’s Kennedy Space Center (Last Name Only)
Down
- Public Open Nights are held most Wednesday evenings at the _____ Observatory
- The Boston University _______ transports students to different places
- This tech company makes watches, computers, iphones and more
- The primary learning management system at Boston University
- Publication exploring Boston University’s pioneering research
- Ben & Jerry’s is a popular client for this Lab
- Video conferencing platform
- In 1877, this BU alum became the first woman to earn a doctorate in the United States (Last Name Only)
- This platform is poised to get a makeover soon
- Boston University Information Services & Technology website name
- A technology incubator and experiential learning lab for BU student-led projects
22 Clues: Student-run radio station • Video conferencing platform • Acronym for new building on campus • COM’s one-stop-shop for JO & FTV equipment • Ben & Jerry’s is a popular client for this Lab • This platform is poised to get a makeover soon • BU students get free access to this creative suite • Use this app to order your favorite on-campus food • ...
CS Principles Review 2023-04-26
Across
- this phase may include brainstorming, storyboarding, flow charting, and creating other plan diagrams(2 words)
- Software or a device that uses software(2 words)
- A miniscule network, most often found in smaller buildings
- A solution that is good enough(2 words)
- the process of encoding data to prevent unauthorized access.
- The use of digital data to approximate real-world analog data is an example of
- The coder typed something that breaks the code before in can run(2 words)
- Compression technique most commonly used for text
- Compression technique most commonly used for images
- Open access online research output free of any and all
Down
- have values that change smoothly, rather than in discrete intervals, over time(2 words)
- Data about Data
- A problem where the goal is to find the best solution
- programs that are made freely available and may be redistributed and modified(2 words)
- when a non-diverse field of computer scientists leave blind spots in code(2 words)
- a wireless access point that gives unauthorized access to secure networks(3 words)
- What purpose describes(2 words)
- online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions(2 words)
- is a wrong answer(3 words)
- Whatever is made on the computer is the intellectual property of the
20 Clues: Data about Data • is a wrong answer(3 words) • What purpose describes(2 words) • A solution that is good enough(2 words) • Software or a device that uses software(2 words) • Compression technique most commonly used for text • Compression technique most commonly used for images • A problem where the goal is to find the best solution • ...
Vocab Book 5 section 1-6 2012-10-29
Across
- Sleep
- The board of education could not find a ____ solution to the overcrowding of city schools
- Reading the article was so ______ that I left the library exhausted
- To honor with a banquet or feast
- the guilty man's face took on a distinct ____ and his hands began to tremble
- Donna feared that her years of gymnastics training would be ___ by an accidenet during the competition
- Shining brilliantly
- Of or related to a wild celebration
- Song or poem memorializing something or someone
- Having made his fortune in computer sales, Kit retired to an ____ estate on a private island.
- To give in
- Sinful
Down
- the rule of Czar Nicholas came to an end when the Czar and other members of the royal family were ___ and murdered by rebel forces.
- Having no flaws
- To drape or adorm festively
- Having no motion or change
- A sense of unease
- The ______ of the two networks allowed for faster and more powerful tansmission information
- Watchful
- To attack the character of; to mock
- Weak
- The elderly man expected the children to become ____ during his long speech, but they listened attentively instead.
- Through Reverend Lockwood was a ___ bleiever in the goodness of humanity, he found his faith tested by the horrible events of that week.
- To fill with horror or disapproval
24 Clues: Weak • Sleep • Sinful • Watchful • To give in • Having no flaws • A sense of unease • Shining brilliantly • Having no motion or change • To drape or adorm festively • To honor with a banquet or feast • To fill with horror or disapproval • To attack the character of; to mock • Of or related to a wild celebration • Song or poem memorializing something or someone • ...
ENERGY 2013-10-24
Across
- Unit measuring the force to produce an electric current.
- A form of energy that travels as waves from the sun to Earth.
- Animals store their excess energy in this form.
- Humans get their energy from this.
- Energy of dam water.
- Fuels that can generate power without getting depleted.
- Chemical energy is stored in the ____ of molecules.
- The burning of wood releases this form of energy.
- Energy from the Sun.
- Overload protection device.
- Energy produced by splitting atoms.
- A form of energy that results from the movement of machine parts.
- Another name for electrical networks.
Down
- The basic unit of energy that scientists use.
- Field that attracts iron or steel.
- A form of energy that travels as waves through the air.
- Rotary engine that extracts energy from water.
- Energy created by moving electrons.
- One of the gases released into the air when fossil fuels burn.
- The energy stored in compressed springs is known as ____ potential energy.
- Relating to the use of radio waves to send and receive electronic signals.
- A storage of energy invented by humans and which is filled with chemicals.
- A type of fuel formed from the remains of plants or sea creatures millions of years ago.
- A measure of energy that is used for measuring the amount of energy in food.
- Produced by a surplus or shortage of electrons.
25 Clues: Energy of dam water. • Energy from the Sun. • Overload protection device. • Field that attracts iron or steel. • Humans get their energy from this. • Energy created by moving electrons. • Energy produced by splitting atoms. • Another name for electrical networks. • The basic unit of energy that scientists use. • Rotary engine that extracts energy from water. • ...
News 2015-10-25
Across
- idle talk or rumor, especially about the personal or private affairs of others
- sparkling or brilliant, especially in a superficial way or for the moment
- ingrained and institutionalized prejudice against or hatred of women; misogyny
- of little depth
- self-indulgently carefree
- lacking in freshness or effectiveness because of constant use or excessive repetition
- luridly or vulgarly sensational news
- a person who has been tricked or deceived into appearing or acting silly or stupid
- a vast computer network linking smaller computer networks worldwide
- a belief or doctrine that inherent differences among the various human racial groups determine cultural or individual achievement, usually involving the idea that one's own race is superior and has the right to dominate others or that a particular racial group is inferior to the others
- to intensify (advertising, promotion, or publicity) by ingenious or questionable claims, methods, etc.
Down
- a report of a recent event; intelligence; information
- the means of communication, as radio and television, newspapers, and magazines, that reach or influence people widely
- any worthless stuff
- of very little importance or value; insignificant
- writing that reflects superficial thought and research, a popular slant, and hurried composition
- a period or outburst of extreme activity
- the quality or condition of existing in a meaningless and irrational world
- incapable of producing any result
- a famous or well-known person
- something intended to deceive or defraud
21 Clues: of little depth • any worthless stuff • self-indulgently carefree • a famous or well-known person • incapable of producing any result • luridly or vulgarly sensational news • a period or outburst of extreme activity • something intended to deceive or defraud • of very little importance or value; insignificant • a report of a recent event; intelligence; information • ...
Kyle Morgan-Crossword-4 2016-10-24
Across
- provides wireless access to a network
- portable computers that you can take with you and use in different environments.
- refers to a computer that has been configured to perform a certain set of tasks
- a concept which helps teachers, technology leaders and parents to understand what students/children/technology users should know to use technology appropriately.
- refer to a reduced size version of a digital image.
- irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
- common connection point for devices in a network
- allow certain files and folders to be shared with everyone or with selected users.
- a networking device that forwards data packets between computer networks.
- Threats might exploit a vulnerability to breach security and therefore cause possible harm.
Down
- software program that runs on your computer
- combines standard mobile phone features with advanced features found on personal device assistants
- small programs or scripts that can negatively affect the health of your computer.
- faster than a regular phone connection.
- refers to the files and programs that make up your computer's operating system.
- a general term used to describe Internet services
- free software that is supported by advertisements.
- computer networking device that connects devices together on a computer network
- attempt to steal your personal information.
- port can be used to connect your computer to another computer
20 Clues: provides wireless access to a network • faster than a regular phone connection. • software program that runs on your computer • attempt to steal your personal information. • common connection point for devices in a network • a general term used to describe Internet services • free software that is supported by advertisements. • ...
DIGI CIT Vocab Words 2016-05-27
Across
- peer to peer, network that allows sharing
- a thing that will take your money and value
- anybody can use w/o any punishment
- a compression using like or as
- putting some out in the world that is yours
- a short message text or pic
- Not the right thing to do
- to have a change to do something
- the taking of copyrighted material and selling it for profit
- when you use copyrighted material you must change it in a way and this is called ______
- define how copyright is used
- an audio file of which you listen to
- is digitized content that can be transmitted over the internet or computer networks.
- to chart something
Down
- unsuspected problem or danger
- directly coping someone else's work
- where someone can see another's web page, but doesn't comment
- a plan that is somewhat sketchy
- give others inspiration and help their self-essteem
- a generalization about another person
- changing something copyrighted especially music to add value
- never giving in and keeping a level head
- some who you can bestow trust on
- usaully news or something that can be seen by others on internet
- Pictures, illustrations, symbols
- Giant game where people play with/agaisnt eachother
- a slightly changed sence and used for comedy
- something that has some sort of risk/reward
28 Clues: to chart something • Not the right thing to do • a short message text or pic • define how copyright is used • unsuspected problem or danger • a compression using like or as • a plan that is somewhat sketchy • to have a change to do something • some who you can bestow trust on • Pictures, illustrations, symbols • anybody can use w/o any punishment • ...
Crossword 7 2018-02-15
Across
- A general-purpose, imperative programming language that is especially suited to numeric computation and scientific computing.
- The first robot to receive citizenship of any country.
- The reproducing sound the CD audio player uses___.
- Second Generation Computer are made of?
- Family of personal computers designed, manufactured, and sold by Apple Inc.
- An auxiliary memory from which high-speed retrieval is possible.
- It consists of black squares arranged in a square grid on a white background.
- A function used with Twitter and other services that give a post or tweet a keyword.
- Android 4.1.
Down
- MAC addresses are made up of ______ numbers(digits).
- WLAN stands for ____ Local Area Network.
- A light sensitive device that converts drawing, printed text or other images into digital form is?
- A networking device that forwards data packets between computer networks.
- _________ is the measurement of things such as fingerprints and retinal scans used for security access.
- What is the most common tool used to restrict access to a computer system?
- A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- A program for converting instructions written in low-level symbolic code into machine code.
- The __ is a standardized outline of an HTML document.
- An Operating system developed by Linus Torvalds.
- A set of communications protocols used on the Internet.
20 Clues: Android 4.1. • Second Generation Computer are made of? • WLAN stands for ____ Local Area Network. • An Operating system developed by Linus Torvalds. • The reproducing sound the CD audio player uses___. • MAC addresses are made up of ______ numbers(digits). • The __ is a standardized outline of an HTML document. • The first robot to receive citizenship of any country. • ...
Computer 2022-04-11
Across
- 8 bits - kilobyte (approx. 1,000 bytes), megabyte (1 million), gigabyte (1 billion)
- device that converts data to a form that can be transmitted by telephone etc
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- software that contains coded instructions to control a computer
- you click with?
- aggressive pressure or intimidation by the use of internet
- system of sending messages through the internet
- binary digit, the basic binary unit for storing data, either 0 or 1
- a program dedicated to a specific task
- the mechanical and electronic parts of a computer, not the software
- a job in computer science
Down
- the alternative of the mouse
- an area in memory used for temporary storage
- part of a computer for (temporary) storing of data
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- an activity that one engages in for amusement or fun.
- a video camera connected to a computer, allowing its images to be seen by internet users
- the object which is helping you writing
- the surface area of the visual display unit on which the image is formed
- the programs, routines etc for a computer, not the hardware
- data delivered by a computer (by printer, screen etc)
21 Clues: you click with? • a job in computer science • the alternative of the mouse • a program dedicated to a specific task • the object which is helping you writing • an area in memory used for temporary storage • system of sending messages through the internet • part of a computer for (temporary) storing of data • an activity that one engages in for amusement or fun. • ...
Safety Crossword Challenge 2022-05-04
Across
- practice runs for tornado and fire
- name of our MTA Safety Trainer (2 words)
- protect your noggin' with this (2 words)
- appendix F in the ERP includes locations of this (2 words)
- it is your ______ to work safely and report hazards
- do not do this to fire extinguisher locations
- creating a good fit between an employee and what they do is the main concept of this
- two types of CPR, traditional with breaths and ___ (2 words)
- virus caused by mosquitoes (2 words)
- overloading this warehouse equipment can be very dangerous
Down
- this hazard can be truly shocking
- occurs when you use or lose more fluid than you take in
- safety data sheet section number for Fire Fighting Measures
- where you can access PR safety manual, ERP, and safety data sheets easily
- practice of protecting systems, networks and programs from digital attacks
- what to do should you catch on fire (3 words)
- member of PR's safety committee who reports to duty at all 3 locations (2 words)
- in sunscreen, what the F stands for in SPF
- a document you refer to if you have been exposed to a hazardous chemical (abbreviated)
- the first S in the acronym PASS stands for
- announce this if activating paging system for active shooter (two words)
- disease caused by deer ticks
22 Clues: disease caused by deer ticks • this hazard can be truly shocking • practice runs for tornado and fire • virus caused by mosquitoes (2 words) • name of our MTA Safety Trainer (2 words) • protect your noggin' with this (2 words) • in sunscreen, what the F stands for in SPF • the first S in the acronym PASS stands for • what to do should you catch on fire (3 words) • ...
Tech Terms 1,2, and 3 2022-05-09
Across
- a system software that manages computer hardware, software resources, and provides common services for computer programs
- hypertext markup language
- converts data to a digital format to a format suitable for an analog such as a telephone or radio
- malicious software
- Firefox and Google Chrome
- hardwired to the internet(usually a blue cord)
- Internet protocol address
- holds everything together
- taking something off the internet and moving it onto your computer
- web log(online journal)
- 8 bits
- Open source software
- eBooks and songs
- experiencing something that is real on virtual
- a computer that performs a service
- a method by which information is turned into code
Down
- 0s and 1s
- one million bytes
- monitors incoming and outgoing network traffic based on predetermined security rules
- World Wide Web
- Duck Duck Go and Safari
- the process of which a running computer system is restarted
- Ctrl P
- domain name system
- read only memory
- Portable document format
- pieces of code that got onto your computer
- forwards data packets to computer networks
- Ctrl V
- a bunch of computers linked together
- Ctrl C
- the process of starting a computer
- stores all of your information in a computer
- Computer Processing unit
- 0s and 1s
- random access memory
- Uniform resource locator
- personal identifiable information
38 Clues: Ctrl P • Ctrl V • 8 bits • Ctrl C • 0s and 1s • 0s and 1s • World Wide Web • read only memory • eBooks and songs • one million bytes • malicious software • domain name system • Open source software • random access memory • Duck Duck Go and Safari • web log(online journal) • Portable document format • Computer Processing unit • Uniform resource locator • hypertext markup language • Firefox and Google Chrome • ...
Africa 2024-02-27
Across
- Vast expanse of land separating North Africa from sub-Saharan Africa
- African kingdom known for its ironworking and terraced hillsides
- Ancient West African kingdom famous for its gold trade
- Essential commodity traded in the Trans-Saharan trade routes
- Ancient kingdom in present-day Sudan, known for its wealth and pyramids
- Empire that succeeded Ghana and flourished in the 13th-16th centuries
- The largest tropical rainforest in Africa, spanning multiple countries in Central Africa
- A vast savanna region stretching across East Africa, famous for its wildlife and migrations
- Major city in Mali and a center of trade in medieval Africa
- Mountain range in northeastern Africa, including the highest peak on the continent
- Large river in northeastern Africa, often associated with ancient civilizations
Down
- City in modern-day Tunisia, once a major center of Carthaginian civilization
- Famous ruler of the Mali Empire known for his wealth
- Ancient North African civilization, famous for its pyramids: Egypt
- Precious metal highly valued in ancient African trade
- Large lake in East Africa, near which many early human fossils have been found
- Explorer who documented his travels through Africa in the 14th century
- Desert Large arid region in southwestern Africa, known for its red sand dunes
- Networks of pathways used for trade across Africa
- Kingdom in modern-day Ethiopia, known for its ancient civilization
20 Clues: Networks of pathways used for trade across Africa • Famous ruler of the Mali Empire known for his wealth • Precious metal highly valued in ancient African trade • Ancient West African kingdom famous for its gold trade • Major city in Mali and a center of trade in medieval Africa • Essential commodity traded in the Trans-Saharan trade routes • ...
Computing Systems A 2023-12-04
Across
- Wi-Fi is mainly used by home and public networks to access the Internet.
- software that is embedded in hardware
- computer programs and games
- _____enable a peripheral and computer to "talk" to each other.
- Random access memory is the ____ storage for your computer.
- a machine that stores and processes data
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- A computer ____is security software that protects your computer from hackers.
- any invention, including tools, machines, techniques, and sources of power
- The physical components of a computer are called _____.
- local access network
Down
- incomplete email
- _____is using simple problem solving techniques to solve a problem.
- a file sent along with an email
- wide area network
- A file ____tells the computer what type of program to open.
- What does the B in Bcc mean?
- A device that transmits digital data over analog utility lines and links with an Internet Service Provider.
- provides a particular service and manages resources
- A group of computers that share resources is called a ____.
- helps a computer find other computers on the network
- includes input devices and output devices
- When looking on the Internet for a solution to a problem, you should look for ____ sources.
- image file
- group of computers that can share resources and information
25 Clues: image file • incomplete email • wide area network • local access network • computer programs and games • What does the B in Bcc mean? • a file sent along with an email • software that is embedded in hardware • a machine that stores and processes data • includes input devices and output devices • provides a particular service and manages resources • ...
Cyber Security Crossword 2023-09-10
Across
- when cyber criminals deceive others by acting as someone or something else. usually through email or messages
- a security violation in which sensitive/confidential information has been accessed/stolen by an unauthorized person
- pretending to be someone else in order to get someones personal information
- sends signals to devices
- someone listening to a conversation to gain personal information
- intrusive software made by cyber criminals to damage/destroy computers and computer systems
- checking a users credentials to see if they are allowed to access the protected information
- any activity to protect the functionality and contents of information
- preventing and detecting threats to protect information being stolen/tampered with
- a device used to access the worldwide web
Down
- manipulating or influencing someone to gain access to their computer personal information
- monitors incoming and outgoing networking traffic
- the programs and other operating information used by a computer
- a type of malware that grows and spreads throughout the device inf
- a type of malware that threatens to release personal information if they don't pay a ransom
- securing networks by actively seeking out weaknesses in the defense
- attackers deceiving people into revealing personal info or download malware
- detects and destroys computer viruses
- a computer program that can copy itself and infect a computer without the users permission/knowledge
- a form of security in which information is converted into cypher-text
20 Clues: sends signals to devices • detects and destroys computer viruses • a device used to access the worldwide web • monitors incoming and outgoing networking traffic • the programs and other operating information used by a computer • someone listening to a conversation to gain personal information • a type of malware that grows and spreads throughout the device inf • ...
ENG106 English for IT 2024-03-14
Across
- A period of time given for a particular activity.
- the process of keeping in a good condition or situation
- something (an event) to take place at a particular time.
- The first letters of other words and pronounced as a word. (ex. NASA, MoEYS)
- To make or to bring smth into existence. To make smth real.
- a set of related web pages located under a single domain name.
- a secret word that allows access to a computer system or service.
- a structured set of data held in a computer, especially one that is accessible in different ways.
- a meeting with a group of people to have a deep discussion on a topic or project.
- A computer program that is designed for a particular purpose.
Down
- To contact or keep in touch.
- A person who manages a computer network or system.
- To enter, obtain or retrieve.
- the state of being free from danger or threat.
- To be present at (an event, meeting, or function).
- a person studies or examines something in an organized way
- To make arrangements or prepare for smth (an event or activity)
- A set of rules that controls the exchange of information between different computers or networks.
- A cyber wall that prevents or protects (a network or system) from unauthorized access.
- a group or system of interconnected people or things.
20 Clues: To contact or keep in touch. • To enter, obtain or retrieve. • the state of being free from danger or threat. • A period of time given for a particular activity. • A person who manages a computer network or system. • To be present at (an event, meeting, or function). • a group or system of interconnected people or things. • ...
e 2024-05-10
Across
- traverse through lists/arrays/strings
- data about data
- the person who created something determines who uses their creation
- gives you the remainder of 2 #’s
- converts text to binary format
- a statement that only returns one value. (Evaluated with PEMDAS)
- encoding data to prevent others from accessing it
- part of a string
- programming instructions that are also called methods or functions
- gaps between those who have access to the internet and those who do not
- the process of finding the best path to deliver information.
- an ordered sequence of element
- examining very large data sets to find information
Down
- Reduces complexity by only focusing on the most important parts & hiding the irrelevant parts from the user.
- a call with defined values + attributes
- integral to CS because it allows for diverse ideas and thoughts that cater towards different people.
- input variables of a procedure
- interconnection and networks
- an individual value in a list
- tricks ppl into giving their personal information away
- are an ordered list of characters
- duplication of things
- used for RGB color codes & it uses numbers and letters to represent values
- statements are processed through if statements that all have conditions that need to be met for the selection to run
- instructions that accomplish a task or solve a problem
- are what computers store data in
26 Clues: data about data • part of a string • duplication of things • interconnection and networks • an individual value in a list • input variables of a procedure • converts text to binary format • an ordered sequence of element • gives you the remainder of 2 #’s • are what computers store data in • are an ordered list of characters • traverse through lists/arrays/strings • ...
DEEP LEARNING AND DATA VISUALIZATION PUZZLE 2024-11-17
Across
- A technique to reduce the spatial dimensions of feature maps
- Neuron A simplified model of a biological neuron
- The process of creating visual representations of data
- Combining multiple data sources into one
- A mathematical operation applied to an input image
- Reusing a pre-trained model for a new task
- A small matrix used in the convolution operation
- Arranging data in a specific order
- A subset of machine learning
- The art of communicating information through narrative
- A function that measures the error between predicted and actual values
- Combining data points into summary statistics
- A task of identifying and locating objects in an image
- A technique to narrow down the data to be analyzed
Down
- A mathematical operation performed on data
- An early artificial neural network model
- A powerful data visualization tool
- A function to calculate the total of a numerical field
- The basic unit of a neural network
- The graphical representation of data
- An algorithm used to train neural networks
- A technique to speed up computations by representing data as vectors and matrices
- A collection of visualizations on a single page
- A mathematical function used to introduce non-linearity
- An open-source platform for machine learning
- A spreadsheet software often used for data analysis
- A graphical representation of data
- Perceptron A neural network with multiple hidden layers
- The output of a convolution operation
- Which activation function is commonly used in single layer perceptrons
30 Clues: A subset of machine learning • A powerful data visualization tool • The basic unit of a neural network • Arranging data in a specific order • A graphical representation of data • The graphical representation of data • The output of a convolution operation • An early artificial neural network model • Combining multiple data sources into one • ...
Unit-5 2025-04-30
Across
- Computer vision library widely used in AI
- The process of extracting useful information from data
- Google API for converting spoken language into text
- Collection of data used for training AI models
- Google's AI assistant
- Trend predicting the evolution of intelligent systems
- Presentation format used to visually explain concepts
- AI-powered analytics service from Google
- Statistical data visualization library built on top of matplotlib
- Python library for data analysis and manipulation
- Field focused on building smart machines
- Learning model where students study before class and apply during class
- AI content creation tool used for copywriting
- Facebook’s open-source deep learning framework
- Open-source machine learning library developed by Google
Down
- Visualization technique to display distribution of data
- Interactive teaching activity simulating real-world roles
- Google’s multimodal AI model introduced in 2023
- Traditional blackboard-based teaching method
- Amazon’s cloud-based AI and ML platform
- Technique of training neural networks using backpropagation
- Software that mimics human conversation
- Popular Python-based IDE for data science
- Google's machine learning platform
- AI model that generates text and code
- AI technique for recognizing images and patterns
- Process of teaching AI systems using data
- OpenAI’s advanced conversational AI
- Python library for creating static, animated, and interactive plots
- Interface to allow users to interact with AI models
30 Clues: Google's AI assistant • Google's machine learning platform • OpenAI’s advanced conversational AI • AI model that generates text and code • Amazon’s cloud-based AI and ML platform • Software that mimics human conversation • AI-powered analytics service from Google • Field focused on building smart machines • Computer vision library widely used in AI • ...
COMPUTER NEWORK CROSSWORD 2025-04-19
Across
- – Device that connects devices within a network and filters traffic.
- – Process of determining the path for data to travel in a network.
- CONTROL – Mechanism that regulates the amount of data transferred in a packet.
- – Layer that deals with the function required to carry a bit stream.
- – Unit of data at the network layer.
- – Time taken for one cycle of a wave; inverse of frequency.
- STATE – Routing protocol where each node shares its view of the entire network.
- VECTOR – Routing protocol where nodes share distance information with neighbors.
- – Layer responsible for managing synchronization between systems.
- – Wrapping data with protocol-specific headers for transmission.
- – Device that forwards data packets between different networks.
Down
- – Time delay between sending and receiving data.
- – Layer where translation, encryption, and compression occur.
- – Contains control information added to data at each layer of the OSI model.
- – Error detection method added at the end of a data block.
- – Network arrangement used to avoid collision.
- – Technique used to identify the beginning and end of a data frame.
- ADDRESS – Logical address used to identify devices on a network.
- – Transmission medium that uses light to carry data.
- – Unique hardware address of a network interface card.
- – Transport layer protocol that provides reliable, ordered communication.
- – Routing algorithm used to find the shortest path in a network.
- – Maximum data transfer capacity of a network connection.
23 Clues: – Unit of data at the network layer. • – Network arrangement used to avoid collision. • – Time delay between sending and receiving data. • – Transmission medium that uses light to carry data. • – Unique hardware address of a network interface card. • – Maximum data transfer capacity of a network connection. • ...
icuk 2 2024-10-15
Across
- Magic words for entry
- Encrypted web protocol
- Prefix with attack or security
- A mobile device made of marshmallow.
- Best wholesale ISP
- father of computing
- Say goodbye in 2027
- Hosting Throwing a party for spiders.
- Optic A diet-friendly eye exam.
- Angling is a version of this activity
- A hairnet for ghosts.
- Most popular platform for building websites
- Forwarding When you attempt to walk while on the phone and trip over.
- The result of drinking too much coffee before a phone call.
- Not FTTC
- Technology that increases the capacity of optical fibre
Down
- A generic name for digital lines
- A weightlifting session for people with low energy.
- One touch is all it takes
- Turn off and on again
- A gateway between networks
- Core links in a network
- Love them or loathe them, we need to work with them
- 3 golf courses and 2 Michelin stars
- Data transmission rate
- When your alarm clock goes off before you’re ready.
- The sound a microwave makes when it’s finished.
- A defence mechanism against enthusiastic bonfires.
- An eclectic musical ensemble
- Go for this if you are in a challenging area
- Protocol for authenticating users accessing a network
- A tennis player who always has to bring the ball.
- Trunk A discreet way to drink tea from a tree.
33 Clues: Not FTTC • Best wholesale ISP • father of computing • Say goodbye in 2027 • Magic words for entry • Turn off and on again • A hairnet for ghosts. • Encrypted web protocol • Data transmission rate • Core links in a network • One touch is all it takes • A gateway between networks • An eclectic musical ensemble • Prefix with attack or security • Optic A diet-friendly eye exam. • ...
Networking Crossword 2024-06-13
Across
- Sends a signal to every computer on a local area network. Considered old and obsolete.
- What "ISP" stands for (no space).
- 1000 of these form a megabyte.
- 1000 of these form a gigabyte.
- 8 of these form a byte.
- The number of bits transferred per second.
- Follows hyperlinks in webpages to create a search index.
- Can send a signal to a specific computer connected on a local area network.
- What "www" stands for (no space).
- The ranking system used by Google (no space).
- 1000 of these form a kilobyte.
- The part of a motherboard a fiber optic cable is plugged into.
- Can connect multiple devices in the same location.
- What "URL" stands for (no space).
Down
- What "UTP" stands for (no space).
- Maximum rate of which data can be transferred. Measured by bitrate.
- Is used for wireless connections. Also found within this classroom. (no space.)
- The thing that every URL starts with (and what it stands for)(no space).
- The type of connector that is used by a UTP.
- The number of people that own the internet.
- A collection of local area networks.
- Specific address assigned to a device (no space).
- The time it takes for data to travel from sender to receiver.
- A top level domain name used for websites trying to make money (period included).
- Sends data using radio waves.
25 Clues: 8 of these form a byte. • Sends data using radio waves. • 1000 of these form a megabyte. • 1000 of these form a gigabyte. • 1000 of these form a kilobyte. • What "UTP" stands for (no space). • What "ISP" stands for (no space). • What "www" stands for (no space). • What "URL" stands for (no space). • A collection of local area networks. • ...
Cultural Exchanges and Influences on Trade Routes (Sundara Pandiyan 6) 2024-10-18
Across
- Groups of peoples that live away from their homeland.
- Rest stops for merchants and travelers.
- A language derived from Bantu Roots and was influenced by Arabic.
- A system that allows trade without physical money.
- Buddhism A form of Buddhism that teaches rebirth in a happy place after death.
- An ancient city known for its impressive earthworks in North America.
- Trade routes over the water which is used for transporting goods between civilizations.
- An important dynasty in Southeast Asia known for its architectural and cultural legacy.
- Traditional boats used for trading on water in Asia.
- A Chinese philosophy that combines Confucian principles with other spiritual ideas.
Down
- A cultural achievement of the ancient Pueblo peoples in the Southwest.
- A famous traveler who explored the Islamic world and he spent his whole life traveling.
- Agricultural advancements that improved farming techniques in Islamic world.
- The pathogen that caused the widespread disease in history like the "Black Death."
- A monumental and a religious temple complex in Cambodia which was dedicated for Hindu Deities.
- Oral Historians and musicians in West Africa.
- Wealthiest king in Mali.
- Networks for transporting goods and ideas between different regions. Down
- A school of Buddhism that focuses on meditation. 15. A monumental and a religious temple complex in Cambodia which was dedicated for Hindu Deities.
- Tallest brick tower in Delhi, India.
20 Clues: Wealthiest king in Mali. • Tallest brick tower in Delhi, India. • Rest stops for merchants and travelers. • Oral Historians and musicians in West Africa. • A system that allows trade without physical money. • Traditional boats used for trading on water in Asia. • Groups of peoples that live away from their homeland. • ...
Importance of Religion and Religious Education 2024-10-22
Across
- – Knowing right from wrong, often taught through religious education.
- – A central theme in many religious traditions.
- – A common goal in many religious teachings.
- – Learning about different religions leads to this.
- – A religious journey to a sacred place.
- – Knowledge of life gained through religious teachings.
- – Strong belief in a religion or deity without direct proof.
- – Letting go of wrongs is central to many religions.
- – A key value that religious teachings often promote.
- – Ensuring fairness and equity, often emphasized in religion.
- – Principles that guide moral behavior.
- – Religious education encourages respect for this in society.
- – Communication with a deity or God, a common religious practice.
Down
- – Giving help to those in need, a core tenet of many religions.
- – Religious practices passed down over generations.
- – Compassion and care for others, promoted by most religions.
- – Religion influences this aspect of human societies.
- – Religious education often teaches optimism for the future.
- – Something that is sacred or deeply respected in a religion.
- – Religious groups often form these supportive networks.
- – A sense of connection to something bigger than ourselves.
- – A religious practice where individuals abstain from food for spiritual reasons.
- – Feeling sympathy for the suffering of others.
- – A sense of trust or confidence in religious truths.
- – Living in peace and cooperation with others, often promoted by religious teachings.
- – Accepting and respecting different beliefs and practices.
26 Clues: – Principles that guide moral behavior. • – A religious journey to a sacred place. • – A common goal in many religious teachings. • – A central theme in many religious traditions. • – Feeling sympathy for the suffering of others. • – Religious practices passed down over generations. • – Learning about different religions leads to this. • ...
Unit 5 Activity 2 2024-10-24
Across
- The pair of spongy, pinkish-gray organs in your chest.
- Root word that means “little vessel.”
- The abbreviation for Arteries.
- Networks of small vessels that perfuse tissues.
- inflammation of the inside lining of the heart chambers and heart valves
- produces a black-and-white image that shows the organs in your chest.
- Abbreviation for Chronic heart failure.
- type of portable electrocardiogram (ECG).
- The abbreviation for blood vessels
- Abbreviation for Atrial fibrillation.
- A test to record the electrical signals in the heart.
Down
- Abbreviation for Central nervous system.
- _____ occurs when the heart muscle doesn't pump blood as well as it should.
- Medical condition in which poor blood flow to the brain causes cell death.
- Vessels that deliver blood to tissues.
- Any cardiovascular disease process involving one or more of the four valves of the heart.
- The abbreviation for Blood.
- Vessels that return blood to the heart.
- Improper beating of the heart, whether irregular, too fast, or too slow.
- The abbreviation for heart.
- A scan used to look at the heart and nearby blood vessels.
- tests A test done on a sample of blood to measure the amount of certain substances in the blood or to count different types of blood cells.
- Pumps blood through the system.
- Abbreviation for Electrocardiogram.
- Abbreviation for Coronary heart disease.
25 Clues: The abbreviation for Blood. • The abbreviation for heart. • The abbreviation for Arteries. • Pumps blood through the system. • The abbreviation for blood vessels • Abbreviation for Electrocardiogram. • Root word that means “little vessel.” • Abbreviation for Atrial fibrillation. • Vessels that deliver blood to tissues. • Vessels that return blood to the heart. • ...
Computer class 6 2024-10-27
Across
- Rules and guidelines for responsible behavior, like using computers respectfully
- A set of slides created to present information, like in PowerPoint
- Software used to detect and remove computer viruses
- Memory that holds important startup instructions, cannot be changed
- The main circuit board that holds the computer’s components
- Programs and applications that allow a computer to perform tasks
- A single page or part of a presentation in MS PowerPoint
- The memory that temporarily holds data while a computer is on
- A popular search engine used to find information on the internet
Down
- The position of text on a page, such as left, center, or right
- A global network that connects computers around the world
- Number system with only two digits: 0 and 1, used by computers
- Number system with ten digits, from 0 to 9
- A type of computer virus
- A box in a spreadsheet where data is entered, found in Excel
- A mathematical expression used in MS Excel to calculate values
- The main screen in an operating system where files and icons are located
- A person who tries to access computers or networks without permission
- A type of software for organizing data in rows and columns, like MS Excel
- The main part of the computer that performs calculations and tasks
- A popular antivirus software
21 Clues: A type of computer virus • A popular antivirus software • Number system with ten digits, from 0 to 9 • Software used to detect and remove computer viruses • A single page or part of a presentation in MS PowerPoint • A global network that connects computers around the world • The main circuit board that holds the computer’s components • ...
Issac's Crossword 2025-10-31
Across
- Moroccan travelor who documented his journey from the Islamic world to Asia
- Ruler of Mali, known for his immmense wealth.
- First ruler of the Mongol Empire, originally named Temujin
- Of significance important in the African world, could transport and store goods across the Saharan Desert which increased trade
- Group of people/travelors who settle into another country/region and adapt to their culture
- A major city of the early north american civilation
- major hubs of the indian oceans, welcomed all settlers
- Renewal of Confusianism that includes ideas from Buddhism and Daoist
- A inn for travelers across the major trade routes that gave place to rest, eat, and water animals.
Down
- Originally temple used for Hindu but later used for Buddhism
- A Indian dynaasty that ruled Java and SouthEast parts of Asia
- Traditional wooden sailing vesselwith lanteen sails
- Am early chinese credit system, early variation of paper money
- A group of people who moved seasonally to different locations
- Use of siege technolodgies and tactics used by the mongols
- A network of stations established to communicate rapidly throughout the Mongol empire.
- A period of significant argricultural advancements in the Islamic World
- A major center of trade, scholarship and culture in West Africa
- A chinese admiral the led 7 major expiditions and fostered trade networks in the process
- A wide trade network that spanned across all of Eurasia
20 Clues: Ruler of Mali, known for his immmense wealth. • Traditional wooden sailing vesselwith lanteen sails • A major city of the early north american civilation • major hubs of the indian oceans, welcomed all settlers • A wide trade network that spanned across all of Eurasia • First ruler of the Mongol Empire, originally named Temujin • ...
uouh 2025-08-29
Across
- ordenador computer (Spain) querer to want
- apasionada passionate
- always de of/from
- la compra to do the shopping en in/on
- to think con with
- la mesa to clear the table
- challenging, demanding ¡Claro que sí! of course!
- capable Phrases to keep a conversation going
- tarea homework PREPOSITIONS:
- pupitres student desks a to/at
- persistent ¡Qué chévere! how cool!
- móvil cell phone estar to be (temporary)
- la basura to take out the trash
- orgullosa proud ¡Qué interesante! how interesting!
- lively ¡Qué lástima! what a shame!
- comprendo! I don't understand!
- pizarra whiteboard/blackboard para for
Down
- juguetona playful ¿En serio? really?
- abierta open-minded hacia towards
- comprometida committed ¡Yo también! me too!
- to chat online action words (know how to conjugate: present tense/preterite/imperfect)**
- melancólica melancholic ¡No me digas! you don't say!
- por internet to surf the internet tener to have
- veces often, many times ¡Lo siento! I am sorry!
- los muebles to dust the furniture **practice conjugating using "conjuguemos" under Super 7 verbs start with present tense singular/plural, then preterite singular/plural and finally imperfect singular/plural
- la mesa to set the table gustar to like
- la ropa to wash the clothes
- bien to have a good time haber (hay) there is/there are
- redes sociales social networks ir to go
- /colgar fotos to upload photos ser to be (permanent)
- never hasta until/up to
31 Clues: always de of/from • to think con with • apasionada passionate • never hasta until/up to • la mesa to clear the table • la ropa to wash the clothes • tarea homework PREPOSITIONS: • pupitres student desks a to/at • comprendo! I don't understand! • la basura to take out the trash • abierta open-minded hacia towards • persistent ¡Qué chévere! how cool! • ...
IT 2025-09-19
Across
- system of interconnected devices
- Raw, unprocessed facts and figures that can be used and analyzed to make decisions.
- physical delimitation where the hyperlink takes action if clicked
- opera software web browser
- process of providing data or instructions to a computer
- Words become clickable to access linked information
- networking: linking computers and devices across the world
- process of providing data or instructions to a computer
- a system for CERN researchers
- to browse the internet
- set of interacting or interdependent components forming a complex whole
- frst web page
- Non-sequential writing, interconnected by hyperlinks
- Graphics (icons,images...) become clickable to access linked information
- group of many web pages managed by the same owner
Down
- The United State Department o fDefense established the __ to research and develop a solution.
- google web browser
- mozilla web browser
- microsoft web browser
- Electronic devices that process data, perform calculations, and execute instructions
- person who uses a networking service
- acceptance of input to act on it, interactivity between user and software
- A communication device that transmits voice, data, and signals
- HyperText Markup Language
- global system of interconnected computer networks that use the standard Internet Protocol Suite
- collection of websites, pages, and resources
- browser: what are Chrome, Safari, Firefox
- Document for the WorldWideWeb(WWW) identified by a Unique Uniform Resource Locator (URL)
- combination of different content forms
- apple’s web browser
30 Clues: frst web page • google web browser • mozilla web browser • apple’s web browser • microsoft web browser • to browse the internet • HyperText Markup Language • opera software web browser • a system for CERN researchers • system of interconnected devices • person who uses a networking service • combination of different content forms • browser: what are Chrome, Safari, Firefox • ...
022.03a - What Can You Do Online? 2024-09-23
4 Clues: The responsible use of technology and behavior online • The act of purchasing goods or services over the internet • The practice of protecting systems, networks, and programs from digital attacks • Websites and apps that allow users to create and share content or participate in social networking
Beginners Level 2021-09-11
Across
- using _____________ for doing competitive information gathering is a crime.
- it is necessary to methodically & systematically ensure all pieces of information related to the target.
Down
- _______________ needs to be turned off in order to prevent from this attack.
- using spyware is an example of _________ type of information gathering.
- the _________ is developed for negotiating a virtual tunnel throughout the network by encrypting & arbitrarily bouncing all of its communications via relay networks.
5 Clues: using spyware is an example of _________ type of information gathering. • using _____________ for doing competitive information gathering is a crime. • _______________ needs to be turned off in order to prevent from this attack. • it is necessary to methodically & systematically ensure all pieces of information related to the target. • ...
KeyWord Recap 2022-11-02
Across
- the college's campaign against sexual harrassment, abuse and violence
- Holding extreme political or religious views
- a person at risk of abuse or neglect.
- a form of criminal activity in which drug dealers in major cities establish networks for the supply and sale of drugs to users in towns and rural areas
- a form of crime in which the home of a vulnerable person is taken over by a criminal in order to use it to deal, store or take drugs
Down
- Programme about safeguarding and supporting those vulnerable to radicalisation.
- A member of an extreme online community who consider themselves unable to attract women sexually
- The process by which people come to support terrorism and extremism
- The unlawful use of violence and intimidation in the pursuit of political aims
9 Clues: a person at risk of abuse or neglect. • Holding extreme political or religious views • The process by which people come to support terrorism and extremism • the college's campaign against sexual harrassment, abuse and violence • The unlawful use of violence and intimidation in the pursuit of political aims • ...
briseidi's crossword 2022-09-30
Across
- protect an application/server from Internet-based threats such as: SQL injection attacks; XML injection; DDoS
- that delivers content or services to end users over the internet
- that exists over a large-scale geographical area, as compared to other network types, such as a local
- may also be referred to as diskless nodes or hybrid clients
- of inter-connected workstations and personal computers which are each capable of accessing and sharing data and devices, such
Down
- device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital
- device that receives incoming data packets and redirects them to their destination
- the connectivity of its network with external networks
- of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes
- hardware component that allows a computer to connect to a network. NICs may be used for both
10 Clues: the connectivity of its network with external networks • may also be referred to as diskless nodes or hybrid clients • that delivers content or services to end users over the internet • device that receives incoming data packets and redirects them to their destination • ...
Intelligence and Brain Anatomy 2024-03-01
Across
- The process where the cerebral cortex folds into gyri and sulci
- The ability of neural networks in the brain to change through growth and reorganization
- The darker tissue of the brain and spinal cord, consisting mainly of nerve cell bodies and branching dendrites.
Down
- The capacity to perform various mental activities
- The measure of a person's cognitive abilities
- Branch-like extensions of a neuron that receive signals from other neurons and transmit them to the cell body
- The grooves or indentations between the gyri on the brain's surface
- The branching pattern of nerve fibers often describes the complex branching structure of neurons in the brain
- The raised folds or ridges on the surface of the brain that increase the surface area of the brain, allowing for more neural connections and higher cognitive processing
9 Clues: The measure of a person's cognitive abilities • The capacity to perform various mental activities • The process where the cerebral cortex folds into gyri and sulci • The grooves or indentations between the gyri on the brain's surface • The ability of neural networks in the brain to change through growth and reorganization • ...
seth obadiah mckenney 2012-04-02
Across
- the unauthorized use, reproduction, distribution, or transmission of copyrighted material.
- Software program that is designed to damage files on a computer that receives it. The virus spreads from file to file on a single computer, and does not intentionally try to move to another computer. It must replicate (reproduce) and execute itself to be defined as a virus. Since the virus reproduces itself, it can spread to other application and operating system software. Some viruses cause little or no damage (they are more of a nuisance because they place messages on the monitor, etc); however, other viruses can destroy the hard drive and render the computer unusable.
- An unauthorized person who secretly gains access to computer files.
- A system of connected computers that allows the sharing of files and equipment. There are two types of networks: local area network (LAN) and wide area network (WAN).
- a piece of writing that has been copied from someone else and is presented as being your own work
- A special computer used to store programs and files, and then sends it out to other computers one or all at a time. SPAM – unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
- HORSE Malicious software that is disguised as a useful application. It is sometimes called a “backdoor virus,” though it is not technically a virus.
Down
- unwanted/junk e-mail (usually of a commercial nature sent out in bulk)
- A bully who operates online, in cyberspace; To bully online
- Software written and then donated to the public, so anyone is free to copy it and share it with their friends. Ownership of the software is retained by the owner/software developer who may choose to charge for future releases of the software.
- Software that can be tried before you purchase.
- Malicious software code that is designed to copy itself and intentionally move from computer system to computer system, via networks, internet etc. Unlike a true computer virus, a worm does not need a host file to move from one computer to the next; therefore, worms can spread more rapidly than viruses. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
12 Clues: Software that can be tried before you purchase. • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • unwanted/junk e-mail (usually of a commercial nature sent out in bulk) • the unauthorized use, reproduction, distribution, or transmission of copyrighted material. • ...
038 - Digital Literacy 2024-10-20
Across
- the practice of protecting systems, networks, and programs from digital attacks.
- a person who uses digital technology responsibly and effectively.
- the network of physical objects embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
Down
- the trail of data you create while using the internet.
- the ability to use, understand, and create digital content safely and effectively.
5 Clues: the trail of data you create while using the internet. • a person who uses digital technology responsibly and effectively. • the practice of protecting systems, networks, and programs from digital attacks. • the ability to use, understand, and create digital content safely and effectively. • ...
Wireless Router Security Crossword Puzzle 2022-02-10
Across
- a single, direct request sent from one host to another
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
Down
- short for Internet Protocol
- an interface that enables the serial (one bit at a time) exchange of data between two devices
- the security method added to WPA for wireless networks that provides stronger data protection and network access control.
5 Clues: short for Internet Protocol • a single, direct request sent from one host to another • an interface that enables the serial (one bit at a time) exchange of data between two devices • the security method added to WPA for wireless networks that provides stronger data protection and network access control. • ...
Primary Terms 2013-09-20
Across
- Another word for URL
- The conduct expected of individuals while online.
- The process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting.
- consists of a worldwide collection of electronic documents.
- A website or application that permits users to chat with others who are online at the same time.
- also called bookmarks
- media content that users create and share online
- A collection of related webpages and associated items, such as documents and pictures, stored on a web server.
- Document on the web
- An informal website consisting of posts in a journal format.
Down
- where the top of the browser shows a tab for each webpage you display.
- the transmission of messages and files via a computer network.
- A computer that delivers requested webpages to your computer or mobile device.
- short for protocol address
- Used to express emotion
- a Business transaction that occurs over an electronic network such as the internet.
- An application that enables users with an Internet connection to access and view webpages on a computer or mobile device.
- A worldwide collection of networks that connects millions of businesses, government agencies and etc.
- engine A software that finds websites, webpages, images and other information related to a specific topic.
- A website that offers a variety of internet services from a single, convenient location.
20 Clues: Document on the web • Another word for URL • also called bookmarks • Used to express emotion • short for protocol address • media content that users create and share online • The conduct expected of individuals while online. • consists of a worldwide collection of electronic documents. • An informal website consisting of posts in a journal format. • ...
lesson 24 vocab 2016-04-19
Across
- hardware and software that protects from the outside internet
- a software program such as Internet Explorer
- worldwide system of information
- high end programs designed to provide networks contol
- supports telephone service and the worlds collection of interconnected voice oriented systems
- include fiber optics, satellites, microwaves, or any combination of these
- a variation of LAN that uses no physical wires
- uses a coaxial cable to send and receive data
- newer form of internet connection technology
- describes a software architechtectal model realationship
Down
- provide connection 30 times faster than dialup
- users outside of the organization that can use it
- a serise of connected computers over a network
- each device on a network
- examine fingerprints, retinas, and voice
- a giant database
- exclusive use for the people within an organiztion
- a small simple device that connected devices together
- wireless technology that can deliver up to 7 Mbps per second to your phone
- multiple WANs are connected by a router
- converts analog signals to digital viceversa
- a variation of lan that uses no wires
- all the computers are equal on the server
- people who break into computer systems to steal services and information
- a server that acts as an intermediate between the user and the internet
- a type of fiber optic cable
26 Clues: a giant database • each device on a network • a type of fiber optic cable • worldwide system of information • a variation of lan that uses no wires • multiple WANs are connected by a router • examine fingerprints, retinas, and voice • all the computers are equal on the server • a software program such as Internet Explorer • converts analog signals to digital viceversa • ...
SAT vocabulary 2021-02-07
Across
- He hid in the closet in fear of what would come with his father’s _____.
- arrogant or pompous
- There are a number of _______ in the present system
- The new girl in class is somewhat of a milquetoast.
- petty; worthless
- A ______ series of murders.
- wicked or criminal; evil; heinous
- regard with disgust and hatred; detest; hate; loathe; despise
- _______ people are often stubborn and annoying.
- lacking significance through having been overused
- a duty of responsibility
- angry and bitter; vitriolic; rancorous; nasty
- _______ grenades
- He was a _______, solitary boy.
- a scarcity or lack or something
- The purchaser should avoid asking for _______ information.
Down
- She should be _______ in victory.
- acting and showing care and thought for the future
- school; boring
- In a forcive, passionate, intense manner
- to make (an unpleasant feeling) less intense; to relieve; ease; alleviate
- My grandma is _______, and deserves respect.
- The baby has ______ grip.
- Karen was ______ after being told to wear a mask.
- lack of experience, wisdom, or judgment; the opposite of wisdom
- without the basic necessities of life
- to praise
- a shimmering ______ bubble.
- knowing everything; all-knowing
- characterized by bitterness
- The _________ weapons are now displayed in a museum.
- The witch hazels are the ________ of spring.
- God is described as _______ and benevolent.
- Networks connected a _____ of computers
- present , appearing, or found everywhere; omnipresent; universal
35 Clues: to praise • school; boring • petty; worthless • _______ grenades • arrogant or pompous • a duty of responsibility • The baby has ______ grip. • A ______ series of murders. • a shimmering ______ bubble. • characterized by bitterness • knowing everything; all-knowing • He was a _______, solitary boy. • a scarcity or lack or something • She should be _______ in victory. • ...
Computer Aiden Byrd 2020-09-30
Across
- Central Processing Unit, the brains of the computer
- Computer component that displays video.
- Displays video from the computer.
- Output device that displays audio.
- Known as the first programmer.
- Main storage device that uses silicon technology.
- Input device that picks up audio.
- Random Access Memory
- Output device that puts pictures and words onto paper.
- Major system software. (Operating System)
- Software that allows you to connect and talk to the internet.
- A device used to type out things on the computer.
- Input device used to function the computer in certain areas.
- One of the top producing computer component manufacturers
- Computer software entertainment via interactions with mouse, keyboard, controller, or other input devices.
Down
- Known for creating the difference machine, one of the first "computers".
- Remote storage device.
- A private network that encrypts your data and keeps you safe while using public networks.
- Storage device for discs.
- Audio editing software.
- Input device that picks up video.
- Computer component that allows for many different connections.
- The "highway" of a computer.
- File manager software.
- First electronic and programmable computer.
- Software built into your system software that allows for the configuration of multiple different aspects of your device.
- Mini computer able to be programmed and used.
- Main storage device that uses a spinny disk.
28 Clues: Random Access Memory • Remote storage device. • File manager software. • Audio editing software. • Storage device for discs. • The "highway" of a computer. • Known as the first programmer. • Input device that picks up video. • Displays video from the computer. • Input device that picks up audio. • Output device that displays audio. • Computer component that displays video. • ...
Technology 2018-09-03
Across
- Computer Aided design
- random access memory
- collection of data with a name
- used to send and receive computer files via telephone limes
- start up of the computer
- a microprocessor
- degree of sharpness of the screen
- program that provides you with pictures to help you interact with your computer
- home keys on the keyboard
- part of the computer where all other parts of the computer are connected
- a website's text and information
- connection on the computer that allows input devices
- parts of the computer that we can touch and see
- a program used to view web pages
- a saved link to a particular Web page
- transferring data from another computer to your computer
- a collection of connected networks
Down
- Perform tasks for us as users
- pointing device
- a wireless communications technology intended to replace cables
- Read only Memory
- Repetitive Strain Injury
- visual display unit
- any device used to give instructions to the computer is called an......device
- .......system that runs the computer
- converts documents to digital format
- data temporarily stored on your computer
- a type of communications technology whereby a single wire can carry more than one type of signal at once
- a program that is designed to disrupt the normal working of your computer
- software provided at no cost to the user
- digital video
31 Clues: digital video • pointing device • Read only Memory • a microprocessor • visual display unit • random access memory • Computer Aided design • Repetitive Strain Injury • start up of the computer • home keys on the keyboard • Perform tasks for us as users • collection of data with a name • a website's text and information • a program used to view web pages • degree of sharpness of the screen • ...
Networking Crossword - Quentin 2024-06-13
Across
- Sends a signal to every computer on a local area network. Considered old and obsolete.
- What "ISP" stands for (no space).
- 1000 of these form a megabyte.
- 1000 of these form a gigabyte.
- 8 of these form a byte.
- The number of bits transferred per second.
- Follows hyperlinks in webpages to create a search index.
- Can send a signal to a specific computer connected on a local area network.
- What "www" stands for (no space).
- The ranking system used by Google (no space).
- 1000 of these form a kilobyte.
- The part of a motherboard a fiber optic cable is plugged into.
- Can connect multiple devices in the same location.
- What "URL" stands for (no space).
Down
- What "UTP" stands for (no space).
- Maximum rate of which data can be transferred. Measured by bitrate.
- Is used for wireless connections. Also found within this classroom. (no space.)
- The thing that every URL starts with (and what it stands for)(no space).
- The type of connector that is used by a UTP.
- The number of people that own the internet.
- A collection of local area networks.
- Specific address assigned to a device (no space).
- The time it takes for data to travel from sender to receiver.
- A top level domain name used for websites trying to make money (period included).
- Sends data using radio waves.
25 Clues: 8 of these form a byte. • Sends data using radio waves. • 1000 of these form a megabyte. • 1000 of these form a gigabyte. • 1000 of these form a kilobyte. • What "UTP" stands for (no space). • What "ISP" stands for (no space). • What "www" stands for (no space). • What "URL" stands for (no space). • A collection of local area networks. • ...
12 2023-03-02
Across
- A recursive function in c.
- This type of filter which allows the signals within the specified range of frequencies.
- Turn a circuit on or off with this.
- A Jupyter Notebook in python.
- A binary file in c.
- What is a type of IoT device that can be used to remotely control a robot?
- The condition where we can’t determine the value either “0” or “1”.
- The process of gradual destruction of transistor due to the effect of temperature.
- A command line argument in c.
- Full form of emf.
- A dangling pointer in c.
- The type of circuit where all the flipflops are given the same clock.
- This type of system responds differently to the same input signal depending on the time it is applied.
Down
- A security measure used to protect IoT devices from unauthorized access
- A device that can detect the location of other devices or objects]
- A function annotation in python.
- A docstring in python.
- A type hint in python.
- What is the technology that allows devices to connect to the internet via cellular networks called?
- A text file in c.
- Full form of LD in PL.
- A decorator in python.
- The expression which will be formed using min terms.
- The basic unit of memory element.
- A device that can control the temperature of a room or building
25 Clues: A text file in c. • Full form of emf. • A binary file in c. • A docstring in python. • A type hint in python. • Full form of LD in PL. • A decorator in python. • A dangling pointer in c. • A recursive function in c. • A Jupyter Notebook in python. • A command line argument in c. • A function annotation in python. • The basic unit of memory element. • Turn a circuit on or off with this. • ...
ICT CROSSWORD PUZZLE 2025-01-08
Across
- Small pictures that represent the program on your computer
- A real-time communication over the internet
- Usually defines as personal or noncommercial website that uses a dated log format
- Another way to describe having access to the internet or actively using the internet
- A special software package that connects to a network and provides data
- Refers to not being connected to the internet
- Illegal copying copyrighted software, music, or movies
- This is a file that has been added to an email
- It is an unwanted email from someone we don't know
- An animated face that expresses different emotions
Down
- A collection of "pages" or files linked together and available on the World Wide Web
- A popular term for someone who accesses computer information either legally or illegally
- A computer program that can destroy files or make your computer "crash"
- Refers to all computer networks in the internet
- This is the printed/paper copy of a file from the computer
- A private network inside a company or an organization
- A way to quickly access a favorite web site by saving it in your browser
- It is a series of letters and numbers that identify a location
- A program that allows users to view web pages
- To leave a message on a newsgroup or bulletin board
20 Clues: A real-time communication over the internet • Refers to not being connected to the internet • A program that allows users to view web pages • This is a file that has been added to an email • Refers to all computer networks in the internet • It is an unwanted email from someone we don't know • An animated face that expresses different emotions • ...
Crossword Craze: Internet Terminology 2025-01-13
Across
- A real-time communication via the internet.
- It is an unsolicited email from somebody we do not know.
- A computer software that can damage files or cause the device to "collapse".
- The starting point of any server or the page site your browser is configured to use when it first launches.
- An animated face that conveys many emotions.
- A computerized copy on the document stored on your computer.
- A network of countless numbers of computers from around the world.
- It is a set of digits and letters used to identify a place.
- This is a computer-generated file that has been printed on paper.
Down
- A list of websites that users who use a given computer have visited.
- A compilation of "folio" or info that are linked together and accessible over the World Wide Web.
- The act of browsing from each page one to another and site to site online.
- An internet scam that targets the web browser's address bar.
- Typically defined as a private or nonprofit website which employs a dated log appearance.
- This file has been fused to an email.
- Illegally copying under copyright programs, music, or films.
- Ethical usage of internet.
- Small images that depict the software on your computer.
- The transmission of video clips, sounds, and other sorts of media via the internet.
- It is used to describe all internet-based computer networks.
20 Clues: Ethical usage of internet. • This file has been fused to an email. • A real-time communication via the internet. • An animated face that conveys many emotions. • Small images that depict the software on your computer. • It is an unsolicited email from somebody we do not know. • It is a set of digits and letters used to identify a place. • ...
Crossword Craze: Internet Terminology 2025-01-13
Across
- A real-time communication via the internet.
- It is an unsolicited email from somebody we do not know.
- A computer software that can damage files or cause the device to "collapse".
- The starting point of any server or the page site your browser is configured to use when it first launches.
- An animated face that conveys many emotions.
- A computerized copy on the document stored on your computer.
- A network of countless numbers of computers from around the world.
- It is a set of digits and letters used to identify a place.
- This is a computer-generated file that has been printed on paper.
Down
- A list of websites that users who use a given computer have visited.
- A compilation of "folio" or info that are linked together and accessible over the World Wide Web.
- The act of browsing from each page one to another and site to site online.
- An internet scam that targets the web browser's address bar.
- Typically defined as a private or nonprofit website which employs a dated log appearance.
- This file has been fused to an email.
- Illegally copying under copyright programs, music, or films.
- Ethical usage of internet.
- Small images that depict the software on your computer.
- The transmission of video clips, sounds, and other sorts of media via the internet.
- It is used to describe all internet-based computer networks.
20 Clues: Ethical usage of internet. • This file has been fused to an email. • A real-time communication via the internet. • An animated face that conveys many emotions. • Small images that depict the software on your computer. • It is an unsolicited email from somebody we do not know. • It is a set of digits and letters used to identify a place. • ...
9626 Chapter 12.1 to 12.2 2025-02-14
Across
- Money that is not in a physical form.
- These transactions are irreversible so care has to be taken to transmit payments correctly.
- Can cause hardware and software failures.
- The process of creating new currencies.
- These cards act as a sort of loan to the card holder.
- Banks are being encouraged to use this to expose fraudsters.
- These are devices on peer-to-peer networks.
- Wallet stores logins, passwords, credit card details and shipping addresses.
- Allows governments to monitor activities of their citizens.
- This is the 6th stage of the data mining process
Down
- These services show stock market patterns and trends and allow them to be analyzed.
- CBDC is backed by by foreign exchange and . . .
- This ledger is used by cryptocurrencies as a form of control
- An an amount of money, that is stored only in a digital form
- Currencies are not monitored or administered by a government or regulatory body
- Learning can use that has been learned to analyze new data
- Funds are stored on a card and not in a separate account
- Data mining is described as the practice of extracting useful information and is also called. . .
- Used at checkouts or sales points in stores to allow customers to pay using a bank card
- This is used in the wireless transfer data in the same way contactless payments are made.
20 Clues: Money that is not in a physical form. • The process of creating new currencies. • Can cause hardware and software failures. • These are devices on peer-to-peer networks. • CBDC is backed by by foreign exchange and . . . • This is the 6th stage of the data mining process • These cards act as a sort of loan to the card holder. • ...
English words every IT professional should know 2023-10-09
Across
- To establish a link between a device and a server or between two separate devices
- A restricted or private computer network
- A feature of something that is a disadvantage, problem, or obstacle
- To carry out specific functions or operations
- To set up for use or service
- To merge two or more things together
- A detailed description of a product’s design, parts, features, etc.
- Being able to operate with other programs or equipment
- A small electronic device that is often new and unconventional
- A set of programs and instructions that an operating system uses to function
Down
- To keep something in good condition
- A system of connected devices that can share information with each other
- A collection of digital information stored and saved in one unit on an electronic device
- An action that needs to be completed
- A group of electronic circuit structures laid out in rows and columns
- To improve, enhance, or update something
- A thorough examination of something
- To make something smaller or less of
- A physical or virtual point of connection to link two devices or networks so they can share data
- To move or send something from one place to another
- An error or problem in computer software that causes a program to behave unexpectedly or malfunction
- up To make a copy of data
22 Clues: To set up for use or service • up To make a copy of data • To keep something in good condition • A thorough examination of something • An action that needs to be completed • To make something smaller or less of • To merge two or more things together • A restricted or private computer network • To improve, enhance, or update something • ...
Cardiovascular System 2024-10-15
Across
- heart
- often caused by cholesterol, a waxy substance, that builds up inside the lining of the coronary arteries forming plaque
- plasma
- a computerized tomography scan that images x-ray technique to create detailed images of the body
- pumps blood through the system
- regulate the flow of blood into capillary beds
- blood pressure
- vessel
- vessels that return blood to the heart
- coronary artery bypass grafting
- networks of small vessels that perfuse tissues
- an imaging test that shows how blood goes to the heart at rest and during exercise
Down
- vessels that deliver blood to tissues
- aorta
- a condition that develops when your heart doesn’t pump enough blood for your body’s needs
- a long, thin, flexible tube inserted into a blood vessel
- occurs when a blood clot forms in one or more of the deep veins in the body
- artery
- uses sound waves to create pictures of the heart
- beats per minute
- a problem with your heart muscle that can make it harder for your heart to pump blood
- disease occurs when a valve narrows, leaks, or has other problems that affect blood flow
- a test that uses magnetic field and radiofrequency waves to create detailed pictures of your heart and arteries
- coronary artery disease
- atrial fibrillation
25 Clues: aorta • heart • artery • plasma • vessel • blood pressure • beats per minute • atrial fibrillation • coronary artery disease • pumps blood through the system • coronary artery bypass grafting • vessels that deliver blood to tissues • vessels that return blood to the heart • regulate the flow of blood into capillary beds • networks of small vessels that perfuse tissues • ...
Chapter 4- Intellectual Property Crossword 2024-10-22
Across
- A US property law where copyright material can be used without permission.
- Small part of reusable source code.
- A market structure where a single producer dominates the market for a product.
- Acronym for GUN’s Not Unix, for a free software project.
- Converting compiled low level code back into human readable form.
- 1984 US Supreme Court case with Sony for the invention of this video recording machine.
- Term used for creative work to which you have the right to patent, copyright, and trademark.
- Platform that collects content from multiple sources.
- Legal permission granted by the patent holder for another party to use.
- The core part of the operating system that manages resources and communication between hardware and software.
- Fake/damaged files placed in file sharing networks to stop the user from downloading unauthorized files.
Down
- Organizations dedicated to enforcing copyright laws in the software industry.
- Hardware device that verifies user has permission to certain software.
- File-sharing platform to download music files.
- source Software that is released with its source code available to the public.
- Companies that buy patents to sue others for patent infringement.
- Abbreviation for Business Software Alliance, organization representing the global software industry
- Temporarily storing data from a slower source for faster retrieval of data.
- Unauthorized copying of copyrighted material over the internet.
- Legal framework ensuring that software remains free and open to use
20 Clues: Small part of reusable source code. • File-sharing platform to download music files. • Platform that collects content from multiple sources. • Acronym for GUN’s Not Unix, for a free software project. • Unauthorized copying of copyrighted material over the internet. • Companies that buy patents to sue others for patent infringement. • ...
Trade School vs 4yr College Crossword Lab 2024-02-29
Across
- the activity or business of promoting and selling products or services
- to relieve stress and conditions associated with it, such as tension headaches
- the process of ensuring that an aircraft is safe and reliable for flight through regular inspections, repairs, and replacements
- the process of planning, organizing, directing, and controlling the activities of a business or organization to achieve its goals and objectives
- the data related to a person's medical history
- heating, ventilation, and air conditioning
- the study of machines, equipment, technology and systems
- an interconnected set of components used to collect, store, process and transmit data and digital information
- the personnel of a business or organization
- a trained person whose job is to improve the appearance of a customer's face, hair, or skin using makeup and beauty treatments
Down
- the study or use of systems
- the system that prescribes the fate of the criminal
- a mechanic who services and repairs automobiles
- takes patients' vital signs, such as their blood pressure
- (metal pieces or parts) by heating the surfaces to the point of melting using a blowtorch
- Commercial Driver's License
- the practice of protecting systems, networks, and programs from digital attacks
- the preparation, cooking, plating, presentation, and service of food
- the process of recording, classifying and summarizing financial transactions
- handles several important tasks within the dentist's office
20 Clues: the study or use of systems • Commercial Driver's License • heating, ventilation, and air conditioning • the personnel of a business or organization • the data related to a person's medical history • a mechanic who services and repairs automobiles • the system that prescribes the fate of the criminal • the study of machines, equipment, technology and systems • ...
