networks Crossword Puzzles
Technical Crossword 2024-05-05
Across
- front end framework developed by Google for building progressive web apps
- If a feature represents a characteristics measured in numbers, it is called a _____ feature
- Ubuntu package manager is used for installing, updating, and removing software
- algorithmic technique used in AI for predicting future events or outcomes based on past data
- library for building interactive and dynamic user interface
- In object-oriented programming, what is the process of creating a new instance of a class called
- data structure used to implement a priority queue
Down
- programming language was created by Yukihiro Matsumoto and is known for its simplicity and productivity, particularly in web development and automation tasks
- It's a popular python library for data analysis. It's not directly related to machine learning
- it's used to delete a whole database
- popular front-end framework for building responsive and mobile-first websites
- framework for building and training neural networks, developed by Google brain team
- SI unit of magnetic flux density
- In operating system architecture, what term refers to the central component that interacts directly with hardware and manages system resources?
- it's a command that removes all records from a table including all spaces allocated for records are removed
15 Clues: SI unit of magnetic flux density • it's used to delete a whole database • data structure used to implement a priority queue • library for building interactive and dynamic user interface • front end framework developed by Google for building progressive web apps • popular front-end framework for building responsive and mobile-first websites • ...
VOCAB REVIEW 2022-06-22
Across
- Pursue and kill (a wild animal) for sport or food.
- Animal with long, slender soft bodies and no limbs.
- (of a bird) Strike or bite something with its beak.
- A written, typed, or printed communication, sent in an envelope by post or messenger.
- Reach a place at the end of a journey or a stage in a journey.
- A container or device in which water is boiled, having a lid, spout, and handle.
- The imparting or exchanging of information by speaking, writing, or using some other medium.
Down
- (of a bird) Make a loud, harsh noise.
- A worldwide system of computer networks
- Frogs are from this animal group.
- The short, fine, soft hair of certain animals.
- A person employed in an office or bank to keep records, accounts, and undertake other routine administrative duties
- the vapour into which water is converted when heated, forming a white mist of minute water droplets in the air. 2. cook (food) by heating it in steam from boiling water.
- A pulpy and usually edible fruit (such as a strawberry, raspberry, or checkerberry) of small size.
- 1. (of a liquid, gas, or electricity) Move steadily and continuously in a current or stream.
15 Clues: Frogs are from this animal group. • (of a bird) Make a loud, harsh noise. • A worldwide system of computer networks • The short, fine, soft hair of certain animals. • Pursue and kill (a wild animal) for sport or food. • Animal with long, slender soft bodies and no limbs. • (of a bird) Strike or bite something with its beak. • ...
Learn Your Medical Jargon 2022-10-11
Across
- The percentage you typically pay toward the claim.
- A group of primary care clinics, specialists and hospitals that work together to give you the care you need
- An employer-sponsored savings account associated with a high-deductible insurance plan
- Money that an individual must pay before an insurance company will pay 100% of an individual’s health care expenses
- A written order from your primary care doctor for you to see a specialist or get certain medical services.
- Medica's network equipped with 715,000 providers and more than 5,400 hospitals across the US
- This program that provides employees with 24/7 support, resources, and access to trained professionals
- Routine health care
Down
- 9 local health care networks that group primary care clinics, specialists, and hospitals together
- A provider that is part of a network contracted with your health care plan
- A flat fee paid by you for covered services
- The time that must pass before coverage can become effective for an employee or dependent
- An employer-sponsored savings account whose money must be used by the end of the year
- A $20 a month credit toward health club dues
- The amount you pay before your insurance plan’s benefits begin
15 Clues: Routine health care • A flat fee paid by you for covered services • A $20 a month credit toward health club dues • The percentage you typically pay toward the claim. • The amount you pay before your insurance plan’s benefits begin • A provider that is part of a network contracted with your health care plan • ...
The American Revolution 2023-10-03
Across
- Legislative body of England, and later Great Britain.
- Second president of the United States, led the movement for independence.
- Allowed British East India company to sell tea directly in the colonies, took money from colonial tea merchants.
- Principal author of the Declaration of independence.
- A famous pamphlet Thomas Paine wrote.
- A person who warned militia that the British troops were coming.
- The group of merchants, shop keepers, and craftsmen who successfully opposed the Stamp Act by establishing networks to boycott British goods.
- The American army formed in 1775 by the Second Continental Congress and led by General George Washington.
Down
- Taxed sugar used to produce rum.
- Washington's right hand man,fought in the revolutionary war one of the founding fathers of The United States.
- Civilians taunt British Soldiers, 5 Bostonian's dead, British soldiers found not guilty.
- the 1773 incident in which the Sons of Liberty boarded British ships and dumped their cargo in protest of British taxes on the colonists.
- Taxed tea, glass, paper, lead, and paint
- An American colonist who supported the right of the American Colonies to govern themselves.
- An American colonist who supported Britain during the American Revolution.
15 Clues: Taxed sugar used to produce rum. • A famous pamphlet Thomas Paine wrote. • Taxed tea, glass, paper, lead, and paint • Principal author of the Declaration of independence. • Legislative body of England, and later Great Britain. • A person who warned militia that the British troops were coming. • ...
Middle School IT Terminology 2025-04-14
Across
- A person employed to maintain and operate a computer system or network for a company or other organization.
- The person responsible for monitoring and controlling computer systems in a company or organization.
- People who work in communicating a concept or information via a computer using audio, video, text, graphics, animation, etc.
- A system of computers, peripherals, terminals, and databases connected by communication lines.
- A person who creates technical documentation and user guides for a professional field.
- A profession that involves the understanding and design of computers and computational processes.
- A person who designs, creates, and maintains software.
- Programs on the computer with written commands that tell a computer what tasks to perform.
Down
- Persons responsible primarily for supporting end-user software applications, normally done remotely via telephone.
- The person who writes codes for computer software.
- The person responsible for maintaining and updating a website.
- Technology that enables information to be used to produce products and services.
- Electronic information networks that carry audio, video, and computer data.
- The physical parts of the computer.
- A programmer who designs and manages the development of business applications on the computer.
15 Clues: The physical parts of the computer. • The person who writes codes for computer software. • A person who designs, creates, and maintains software. • The person responsible for maintaining and updating a website. • Electronic information networks that carry audio, video, and computer data. • ...
Law Chapter 10 Vocabulary 2024-12-12
Across
- the deliberate destruction or defacement of another person’s property
- ____________ use of a vehicle unlawful taking of a car by someone who intends only to use it temporarily
- ____________ receiving or buying property that is known or reasonably believed to be stolen
- the deliberate and malicious burning of another person’s property
- a form of larceny in which a person takes items from a store without paying
- the act of making a false document or altering a real one with the intent to commit fraud
- the taking of money or property by a person to whom it has been entrusted
Down
- a crime in which the perpetrator uses force or intimidation to steal the car from the driver
- taking property illegally through threats of harm
- the unlawful taking of another’s property with the intent to steal it
- describes a wide range or actions that involves computers and computer networks in criminal activities
- the crime of attempted shoplifting that is recognized by some states
- the unlawful taking property from a persons immediate possession by force
- offering to someone as genuine a document known to be fake
- breaking and entering a building with the intention of committing a crime
15 Clues: taking property illegally through threats of harm • offering to someone as genuine a document known to be fake • the deliberate and malicious burning of another person’s property • the crime of attempted shoplifting that is recognized by some states • the deliberate destruction or defacement of another person’s property • ...
Computer 2021-03-02
Across
- It is an electronic device that is used as a display unit for a computer.
- It is the main component of the computer, also called the "brain" of the computer.
- It is a handheld hardware input device that controls a cursor in a GUI and can move and select text, icons, files, and folders
- It is a small, portable personal computer .
- It is an input device that allows a person to enter letters, numbers, and other symbols.
- It is a device that accepts text and graphic output from a computer and transfers the information to paper
Down
- It is the global system of interconnected computer networks.
- It is a input device used for converting sound waves into electrical energy variations which may then be amplified, transmitted, or recorded.
- Inventor of world wide web
- It is a device which converts an electrical audio signal into a corresponding sound.
10 Clues: Inventor of world wide web • It is a small, portable personal computer . • It is the global system of interconnected computer networks. • It is an electronic device that is used as a display unit for a computer. • It is the main component of the computer, also called the "brain" of the computer. • ...
IoT crossword 2021-09-15
Across
- is the ability to send a data packet from one device to another device, sometimes over multiple hops.
- platforms bring together capabilities of IoT devices and cloud computing delivered as an end-to-end service.
- functional block provides various functions to govern the IoT system.
- header composed by three primary fields datagram size, datagram tag, and datagram offset.
- devices that can measure a physical quantity and convert it into a signal which can be read and interpreted by the microcontroller unit.
Down
- is a fully managed NoSQL database service that provides fast performance at any scale.
- systems allow users to achieve deeper automation, analysis, and integration within a system.
- protection secures communication channels to prevent man-in-the-middle attacks.
- can roughly be divided into symmetric key and public key cryptographies.
- Z-Wave and Thread are radio protocols for creating low-rate private area networks.
10 Clues: functional block provides various functions to govern the IoT system. • can roughly be divided into symmetric key and public key cryptographies. • protection secures communication channels to prevent man-in-the-middle attacks. • Z-Wave and Thread are radio protocols for creating low-rate private area networks. • ...
GLOBALIZATION 2022-02-17
Across
- culture brought by Alexander the great in Africa
- involves an intensifying, deepening and expansion of global networks
- refers to the sharing of ideas and information between and through different countries
- It is conducted between different regions and geographical locations of the same country.
Down
- It is the process of buying products of huge quality from manufactures and then distributing them to retailers so that they sell them to consumers.
- spread its economic and governing systems through significant portions of the ancient world for centuries. Going back to 600 B.C
- trade that are sold very quickly and a lot of money is being made
- is the exchange of domestic goods within the boundaries of a country
- buy a small number of goods from wholesalers and sell it to the end consumers
- the mutual exchange of services or goods between international regions and borders.
10 Clues: culture brought by Alexander the great in Africa • trade that are sold very quickly and a lot of money is being made • is the exchange of domestic goods within the boundaries of a country • involves an intensifying, deepening and expansion of global networks • buy a small number of goods from wholesalers and sell it to the end consumers • ...
AP Micro - 12/16 - 1 2021-12-17
Across
- new technology applied/ actions taken by government to reduce pollution
- the quantity that society would choose if all the costs and benefits were fully accounted for
- when individuals have no incentive to pay for their own consumption of a good, they will take a "free ride" on anyone who does pay
- the buying or selling of shares in a company by insiders of that company
Down
- a way of showing the distribution of income (or wealth) within an economy
- networks of relationships between people in society that allows the society to function effectively
- a taxpayer pays higher taxes if they earn more income and lower taxes if they earns less
- the relative ability of parties in an argumentative situation to exert influence over each other
- how the nation's total income is distributed amongst its population
- taking into account all of the private and social costs and benefits of a decision/policy (MSB=MSC)
10 Clues: how the nation's total income is distributed amongst its population • new technology applied/ actions taken by government to reduce pollution • the buying or selling of shares in a company by insiders of that company • a way of showing the distribution of income (or wealth) within an economy • ...
Module 3 2017-02-12
Across
- Your socioeconomic resources, your psychological resources, and ___ determine your health behaviors.
- social support and ______ _______ contribute to good health, because it promotes social networks and makes people feel loved and valued.
- job ____ increases health, wellbeing, and job satisfaction.
- despite the "stressed executive" stereotype, those who are _____ on the socioeconomic ladder tend to be more stressed.
- _____ health problems cost the US $55 billion in the year 2000.
- _____ conditions in the US, not genetics, account for the increased risk of hypertension in African Americans.
- The more educated you are, the ___ likely you are to smoke
Down
- The social _____ of health are based on the social and environmental conditions in which people live.
- Your ___ standing has a direct influence on your health and resources.
- health ____ mean that people have poorer health and die younger depending on the circumstances they are in, where they live, and what they do.
10 Clues: The more educated you are, the ___ likely you are to smoke • job ____ increases health, wellbeing, and job satisfaction. • _____ health problems cost the US $55 billion in the year 2000. • Your ___ standing has a direct influence on your health and resources. • Your socioeconomic resources, your psychological resources, and ___ determine your health behaviors. • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A software that is designed to detect and destroy compute viruses.
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- A piece of digital information generated by a web server and saved in your computer after visiting a website
Down
- A network using which things can communicate with each other using internet as means of communication between them.
- An attempt by hackers to damage or destroy a computer network or system.
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
Alex p crossword 2016-08-30
Across
- a program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- URL is one type of Uniform Resource Identifier
- Name Servers
Down
- a person who uses computers to gain unauthorized access to data.
- computing, virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms, operating systems, storage devices, and computer network resources.
- router is a device that forwards data packets along networks.
- -The data is usually text, a numeric value, or a formula.
- local-area network
- is a programming language that developers use to create applications on your computer.
10 Clues: Name Servers • local-area network • URL is one type of Uniform Resource Identifier • -The data is usually text, a numeric value, or a formula. • router is a device that forwards data packets along networks. • a person who uses computers to gain unauthorized access to data. • is a programming language that developers use to create applications on your computer. • ...
Cosmetology 14E Chapter 12 Crossword Puzzle 2023-10-24
Across
- Edge control is used on highly textured or _______ relaxed hair to smooth and control the fine hair around the face's perimeter.
- Clips and clamps are part of a broad category of implements that are sometimes known as __________.
- _______ comb finely combs each cutting section and styles the hair.
Down
- ________ comb tool used in finishing a style and producing different looks.
- __________ are separate networks of coily, textured hair that are intertwined and meshed together.
- _______is a thickened styling preparation that comes in a tube, bottle, or large container and creates a strong hold.
- ________ precisely parts and sections the hair and serves as a styling tool.
- _______has a creamy consistency and is alcohol-free, which allows for a light hold with a natural effect.
- _______is oil that gives hair a luminous appearance during and after styling.
- Hair spray, also known as ________ is a quick-drying liquid delivered to the hair via a spray bottle.
10 Clues: _______ comb finely combs each cutting section and styles the hair. • ________ comb tool used in finishing a style and producing different looks. • ________ precisely parts and sections the hair and serves as a styling tool. • _______is oil that gives hair a luminous appearance during and after styling. • ...
WE ARE EVEN ONLINE. 2022-06-06
Across
- Content shared on social media through a user's profile.
- Someone who has established credibility in a specific industry, has access to a huge audience and can persuade others to act based on their recommendations.
- It is when your device is connected to the internet.
- A form of engagement on Facebook. In addition to Likes, reactions include Love, Haha, Wow, Sad, and Angry.
- Facts provided or learned about something or someone.
Down
- Websites and applications that enable users to create and share content or to participate in social networking.
- The distribution of web/blog content across social media networks.
- Represents a user who chooses to see all of another user's posts in their content feed.
- A response that is often provided as an answer or reaction to a blog post or message on a social network.
- Have a particular opinion, belief, or idea about someone or something.
10 Clues: It is when your device is connected to the internet. • Facts provided or learned about something or someone. • Content shared on social media through a user's profile. • The distribution of web/blog content across social media networks. • Have a particular opinion, belief, or idea about someone or something. • ...
PBL 5 2024-03-27
Across
- Companies merge to create large conglomerates of many newspapers and broadcasting stations.
- Television and radio, as compared with print media.
- means of communication that reach large numbers of people in a short time
- the tendency of the national media to focus on who is winning at any given time during a presidential campaign.
- The way the media influences what issues the public considers important enough to address through the government.
Down
- The use of in-depth reporting to unearth scandals, scams, and schemes at times putting reporters in adversarial relationships with political leaders.
- the bias or preference for one political party or ideology over another, demonstrated by media outlets or journalists.
- A news agency that sends out general news items to various media by means of wire or satellite
- Media providing the public with new information about subjects of public interest.
- electronic technologies that link people to networks and allow the exchange of personal and professional information
10 Clues: Television and radio, as compared with print media. • means of communication that reach large numbers of people in a short time • Media providing the public with new information about subjects of public interest. • Companies merge to create large conglomerates of many newspapers and broadcasting stations. • ...
Compliance & Ethics Week 2022 2022-09-28
Across
- Taking responsibility for one's actions.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Conforming to a rule, such as specification, policy, standard or law.
- Making choices that are consistent with each other and with the stated and operative values one espouses.
- The act, process of power of exercising authority or control in an organizational setting.
Down
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Wrongful or criminal deception intended to result in financial or personal gain.
- The practice of protecting systems, networks and programs form digital attacks.
- Protects the patient's right to privacy of health information and what appropriate safeguards are required to protect the information.
- Moral principles that govern a person's behavior or the conducting of an activity.
10 Clues: Taking responsibility for one's actions. • Conforming to a rule, such as specification, policy, standard or law. • The practice of protecting systems, networks and programs form digital attacks. • Wrongful or criminal deception intended to result in financial or personal gain. • Moral principles that govern a person's behavior or the conducting of an activity. • ...
Data Transmission 2022-07-13
Across
- stages in a network that can receive and transmit data packets; routers are nodes in communication networks
- the time interval allowed to elapse before an acknowledgement is received(in the ARQ error detection method)
- a method used to check if data has been transferred correctly; it makes use of even parity(an even number of 1-bits) and odd parity(an odd number of 1-bits)
- a type of encryption key that is known to all users
Down
- a horizontal and vertical parity check on a block of data being transmitted
- the original text/message before it is put through an encryption algorithm
- the actual data being carried in a data packet
- encrypted data that is the result of putting a plaintext message through an encrytion algorithm
- data that can be sent in one direction only
- data that can be sent in both direction simultaneously
10 Clues: data that can be sent in one direction only • the actual data being carried in a data packet • a type of encryption key that is known to all users • data that can be sent in both direction simultaneously • the original text/message before it is put through an encryption algorithm • a horizontal and vertical parity check on a block of data being transmitted • ...
Data Transmission 2022-07-13
Across
- the actual data being carried in a data packet
- a type of encryption key that is known to all users
- the time interval allowed to elapse before an acknowledgement is received[in the ARQ error detection method
- data that arrives at the destination with the bits no longer synchronised
Down
- a bit added to a byte of data in the most significant bit position; this ensures that the byte follows the correct even parity or odd parity protocol
- staged in a network that can receive and transmit data packets; routers are nodes in communication networks
- a horizontal and vertical parity check on a block of data being transmitted
- the original text/message before it is put through an encryption algorithm
- data that can be sent on one direction only
- a type of encryption key which is known only to the single computer/user
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • a type of encryption key that is known to all users • a type of encryption key which is known only to the single computer/user • data that arrives at the destination with the bits no longer synchronised • ...
Data Transmisson 2022-07-13
Across
- data that can be sent in both directions but not at the same time
- data that can be sent on one direction only
- a type of serial data transmission which has become the industry standard for connecting computers to devices via a port
- a type of encryption key which is known only to the single computer/user
- the original text/message before it is put through an encryption algorithm
Down
- data that can be sent in both directions at the same time (simultaneously)
- a device that enables data packets to be moved between different networks, for example to join an LAN to a WAN
- encrypted data that is the result of putting a plaintext message through an encryption algorithm
- the process of making data meaningless using encryption keys; without the correct decryption key the data cannot be decoded (unscrambled)
- a type of encryption key that is known to all users
10 Clues: data that can be sent on one direction only • a type of encryption key that is known to all users • data that can be sent in both directions but not at the same time • a type of encryption key which is known only to the single computer/user • data that can be sent in both directions at the same time (simultaneously) • ...
crossword 2 2022-11-19
Across
- A device that connects two computers together over a telephone cable line by converting the computer data into an audio signal.
- this application software is used to perform calculations on rows and columns of data
- This utility software helps to protect the computer system from viruses and prevent the computer system files from being corrupt.
- A mistake in algorithm that generates incorrect results or outputs.
Down
- Codes consisting of bars or lines varying in width and length that computer-readable.
- CD-ROM is a kind of _______.
- ____________ is the semiconductor technology used in most of today's integrated circuits.
- a plastic card similar to a credit card but having some memory and microprocessor embedded within it.
- Telecommunication device that forwards data packets across two or more distant networks toward their destination through a process known as routing.
- network is designed to block unauthorized access while permitting outward communication.
10 Clues: CD-ROM is a kind of _______. • A mistake in algorithm that generates incorrect results or outputs. • this application software is used to perform calculations on rows and columns of data • Codes consisting of bars or lines varying in width and length that computer-readable. • ...
Viruses 2025-03-15
Across
- A set of tools used by hackers to gain administrative access to a computer while remaining hidden.
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules
- Malware that encrypts a victim's files and demands payment to restore access
- Software that secretly gathers user information through the user's Internet connection without their knowledge.
- A network of infected computers controlled remotely by cybercriminals to perform tasks such as sending spam or launching attacks.
Down
- Malicious software that records keystrokes made by a user, capturing sensitive information like passwords.
- Unwanted software that automatically displays advertisements on a user's screen.
- A malicious program designed to replicate itself and spread to other computers without user permission.
- Any software intentionally designed to cause damage to a computer, server, client, or computer network.
- A self-replicating malware that spreads over networks, often causing harm to systems.
10 Clues: Malware that encrypts a victim's files and demands payment to restore access • Unwanted software that automatically displays advertisements on a user's screen. • A self-replicating malware that spreads over networks, often causing harm to systems. • A set of tools used by hackers to gain administrative access to a computer while remaining hidden. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
Mental Health Awareness Month 2025-05-07
Across
- How the brain grows and changes over time.
- A neurotransmitter that helps in regulating many different brain functions, including mood, anxiety and thinking.
- Intervention A process used to recognize warning signs for mental health problems and to take early action against factors that put individuals at risk
Down
- A practice that involves focusing or clearing the mind, often through techniques like focusing on the breath or a mantra, to achieve mental clarity, emotional calm, and increased awareness
- A natural bodily and mental response to challenges and demands.
- Middle School Mental Health Liaison.
- Illness Range of brain disorders that affect mood, behaviour, and thought process
- The study of the nervous system, including the brain, spinal cord, and networks of sensory nerve cells called neurons.
- Month of Mental Health Awareness
- A person who is professionally trained and/or skilled in the practice of a particular type of therapy.
10 Clues: Month of Mental Health Awareness • Middle School Mental Health Liaison. • How the brain grows and changes over time. • A natural bodily and mental response to challenges and demands. • Illness Range of brain disorders that affect mood, behaviour, and thought process • ...
Vocabulary Quiz 4 Study Guide 2025-02-27
Across
- To break down a problem into smaller parts to make it easier to solve.
- Content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page
- A step-by-step procedure for solving a problem
- A method of problem-solving that helps computer scientists prepare problems for digital solutions
- The process of simplifying complex problems by focusing on the essential things and ignoring the irrelevant details.
- Looking for similarities among and within problems
Down
- websites and applications that enable users to create and share content or to participate in social networking.
- The buying and selling of products and services through computer networks
- All of the information online about a person either posted by that person or others, intentionally or unintentionally
- An idea, behavior, or style that spreads from person to person within a culture
10 Clues: A step-by-step procedure for solving a problem • Looking for similarities among and within problems • To break down a problem into smaller parts to make it easier to solve. • The buying and selling of products and services through computer networks • An idea, behavior, or style that spreads from person to person within a culture • ...
Set 2 2025-09-17
Across
- Which system is hosted on the DSN platform, is the primary cargo user interface providing video monitoring and surveillance capabilities through live streams coming from cameras for the purpose of safety and security of airplane and cargo?
- A network device that connects multiple devices and directs data to the correct destination.
- A system that uses cameras to monitor and record activities for security purposes/Synonym of CCTV functionality
- A network system that connects and manages digital services within an aircraft cabin.
- A company known for its wireless networking solutions and enterprise Wi-Fi products.
- A software certification standard for airborne systems ensuring safety and reliability.
Down
- A network device that connects different networks and translates data between them.
- A communication network that provides digital data transmission services.
- A software program designed to be loaded and executed on a system, often used in avionics applications.
- Goods transported by aircraft
10 Clues: Goods transported by aircraft • A communication network that provides digital data transmission services. • A network device that connects different networks and translates data between them. • A company known for its wireless networking solutions and enterprise Wi-Fi products. • ...
Josh Wurtz Vocab Lesson 2 2017-03-02
Across
- A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
- In data communications, bits per second (abbreviated bps or bit/sec) is a common measure of data speed for computer modems and transmission carriers. As the term implies, the speed in bps is equal to the number of bits transmitted or received each second.
- a unit of information equal to one billion (109) or, strictly, 230 bits.
- home page-Computer Definition .Also known as page and Web page. A document that serves as a starting point on a Web site. A home page typically contains hypertext and navigation buttons that allows the user to navigate the site by clicking them with a mouse and invoking hyperlinks to other pages and even other sites.
- A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
- software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
- A computer network or data network is a telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
- Also known as Web browser. A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. ... Currently popular browsers include Internet Explorer (IE), Mozilla, and Netscape Navigator.
- A scanner is an input device that scans documents and images, which can be imported into a computer. They are available in flatbed or sheet-fed versions and are usually connected via a high-speed USB port. OCR software can be used to recognize text documents imported from a scanner.
- The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;encrypted data is referred to as cipher text.
- In computing, virtualization means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments.
- A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Routers are located at gateways, the places where two or more networks connect
- Domain Name System, The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.
Down
- In decimal systems, kilo stands for 1,000, but in binary systems, a kilo is 1,024 2 to the 10th power. Technically, therefore, a kilobyte is 1,024 bytes, but it is often used loosely as a synonym for 1,000 bytes In computer literature, kilobyte is usually abbreviated as K or KB.
- data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- The term "format" has several meanings, related to 1) disk formatting, 2) page formatting, and 3) file formats. 1) Disk formatting. In order for storage media, such as a hard drive or flash drive to be recognized by your computer, it first needs to be initialized, or "formatted."
- Short for Joint Photographic Experts Group, and pronounced jay-peg. JPEG is a lossy compression technique for color images. Although it can reduce files sizes to about 5% of their normal size, some detail is lost in the compression.
- A system of signals used to represent letters or numbers in transmitting messages. The instructions in a computer program. Instructions written by a programmer in a programming language are often called source code.
- Java was designed to have the look and feel of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network.
- The most widely used local area network (LAN) technology. Defined as the 802.3 standard by the IEEE, the Ethernet access method is used to connect computers in a company or home network as well as to connect a single computer to a modem for Internet access.
- Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.”
- A 3D printer is a computer-aided manufacturing (CAM) device that creates three-dimensional objects. Like a traditional printer, a 3D printer receives digital data from a computer as input. ... The process of printing a 3D model varies depending on the material used to create the object.
- data is usually text, a numeric value, or a formula. The entire spreadsheet is composed of rows and columns of cells. A spreadsheet cell is analogous to a field in database management systems. Individual cells are usually identified by a column letter and a row number.
- The word wireless is dictionary defined as "having no wires". In networking terminology, wireless is the term used to describe any computer network where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications.
- URL is the abbreviation of Uniform Resource Locator. It is the global address of documents and other resources on the World Wide Web. ... A URL is one type of Uniform Resource Identifier URI the generic term for all types of names and addresses that refer to objects on the World Wide Web.
25 Clues: a unit of information equal to one billion (109) or, strictly, 230 bits. • A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. • ...
Computer Structure 2019-03-29
Across
- A form of online fraud that is usually an attempt to gain user’s personal information. Often done through emails
- A program that can replicate itself by copying its source code into other programs
- The smallest storage of data
- RAM continues to be powered
- It translate and execute each line of the program in turn
- Software that installs itself on a computer and monitors and gathers personal or private information without the user’s knowledge
- A malicious program that gets into a computer system disguised as some other type of ‘helpful’ program
- Malicious program that replicates itself through computer networks executing its code in the computer’s memory in order to spread through other systems
- System memory which holds vital systems information
Down
- The size of pixels
- Contents of RAM are copied to hard disk, hard disk saves a permanent copy
- Temporary storage locations that are used to store data being transferred to or from memory
- Gaining access to a computer system without permission
- It go through source code one line at a time translating it
- The largest size of data storage
- Any software package that automatically shows advertisements in order to generate revenue for its author
- The working space of the computer
17 Clues: The size of pixels • RAM continues to be powered • The smallest storage of data • The largest size of data storage • The working space of the computer • System memory which holds vital systems information • Gaining access to a computer system without permission • It translate and execute each line of the program in turn • ...
Computer Structure 2019-03-29
Across
- Malicious program that replicates itself through computer networks executing its code in the computer’s memory in order to spread through other systems
- System memory which holds vital systems information
- Contents of RAM are copied to hard disk, hard disk saves a permanent copy
- The largest size of data storage
- Gaining access to a computer system without permission
- Temporary storage locations that are used to store data being transferred to or from memory
- The smallest storage of data
- The size of pixels
- It go through source code one line at a time translating it
Down
- Any software package that automatically shows advertisements in order to generate revenue for its author
- Software that installs itself on a computer and monitors and gathers personal or private information without the user’s knowledge
- The working space of the computer
- It translate and execute each line of the program in turn
- A form of online fraud that is usually an attempt to gain user’s personal information. Often done through emails
- RAM continues to be powered
- A malicious program that gets into a computer system disguised as some other type of ‘helpful’ program
- A program that can replicate itself by copying its source code into other programs
17 Clues: The size of pixels • RAM continues to be powered • The smallest storage of data • The largest size of data storage • The working space of the computer • System memory which holds vital systems information • Gaining access to a computer system without permission • It translate and execute each line of the program in turn • ...
OA ISM SECURITY CROSSWORD 2023-08-24
Across
- A person who attempts to gain unauthorized access to computer systems.
- The quality of data being accurate, consistent, and unaltered.
- The process of converting data into a code to prevent unauthorized access.
- A piece of code capable of self-replicating and causing damage to a computer system.
- Faking the source of data to appear as if it's coming from a trusted source.
- The state of keeping information private and only accessible to authorized parties.
- A network security device that monitors and controls incoming and outgoing traffic.
- Ensuring that computer systems and data are accessible when needed.
Down
- Software intended to harm or exploit computer systems and data.
- Measures taken to secure computer systems from threats and vulnerabilities.
- A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
- (Virtual Private Network): A technology that provides secure and private connections over public networks.
- Malicious software that encrypts a user's data and demands payment to restore access.
- Software that collects information from a computer or network without the user's knowledge.
- Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
- A secret combination of characters used to access a system or data.
- The potential for loss or harm in the context of cybersecurity.
17 Clues: The quality of data being accurate, consistent, and unaltered. • Software intended to harm or exploit computer systems and data. • The potential for loss or harm in the context of cybersecurity. • A secret combination of characters used to access a system or data. • Ensuring that computer systems and data are accessible when needed. • ...
PRIN Word Search 2021-05-10
Across
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- the electronic circuitry that executes instructions comprising a computer program
- usually refers to something using digits, particularly binary digits
- a presentation program
- an American multinational technology company
- a way of connecting computers together in a local area network or LAN
- the central unit of a computer system that performs arithmetic and logic operations
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
Down
- a part of the system that holds the internal factors of a computer together
- a form of computer memory that can be read and changed in any order
- the industry leading spreadsheet software program
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- portable Document Format
- global system of interconnected computer networks
- receive audio input from a device such as a computer
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- contain all the data in your PC, from the operating system to music, movies and video games
17 Clues: a presentation program • portable Document Format • an American multinational technology company • the industry leading spreadsheet software program • global system of interconnected computer networks • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
Artificial Intelligence 2022-06-03
Across
- The first computer program to defeat a professional human Go player.
- Autoregressive language model that uses deep learning to produce human-like text.
- The person who created the term artificial intelligence.
- a collection of advanced driver-assistance system (ADAS)technologies provided by Tesla.
- The person who made a detailing procedure known as Turing Test, forming the basis for artificial intelligence.
- First AI algorithm to detect potential COVID-19 infected patients.
- The world's first robot citizen.
- A subset of machine learning that consists of three or more layers of a neural network.
- A branch of engineering that involves the conception, design, manufacture and operation of robots.
- A logic programming language associated with artificial intelligence and computational linguistics made in 1972.
- A computer programming language developed about 1960 by John McCarthy.
Down
- A type of artificial intelligence (AI) that enables software applications to improve their accuracy in forecasting events without being expressly designed to do so.
- Highest Accuracy Drug Protein Folding AI.
- A smart assistant that helps make everything faster and easier on your Apple devices.
- Computing systems inspired by the biological neural networks that constitute animal brains.
- Language created by John Backus & IBM.
- The machine that defeated the world champion, Garry Kasparov.
17 Clues: The world's first robot citizen. • Language created by John Backus & IBM. • Highest Accuracy Drug Protein Folding AI. • The person who created the term artificial intelligence. • The machine that defeated the world champion, Garry Kasparov. • First AI algorithm to detect potential COVID-19 infected patients. • ...
FREE TIME ACTIVITIES 2022-10-01
Across
- Prepare food to be eaten by heating it in a particular way.
- To spend time making use of internet and webpages such as social networks (Facebok, Instagram, etc
- To buy things which you really want. You do this activity for pleasure.
- The activity or job of taking photographs or filming
- To leave your house and go somewhere, especially to do something enjoyable with friends.
- Having the ability to play an object such a piano or guitar, in order to produce musical sounds
- The process of extracting meanings and information from a book
- To make musical sounds with the voice, usually a tune with words
Down
- Playing agame that is played on a computer, in which the pictures that appear on the screen
- To talk to someone in a friendly informal
- Listen to patterns of sounds produced by people singing or playing instruments.
- To get and keep things of one type such as stamps or coins as a hobby.
- To perform a part in a film, play, etc
- To move the body and feet to music
- The ability to create handicrafts, etc.
- The act of spending time viewing a television.
- Playing a game or activity needing physical effort and skill that is played or done according to rules
17 Clues: To move the body and feet to music • To perform a part in a film, play, etc • The ability to create handicrafts, etc. • To talk to someone in a friendly informal • The act of spending time viewing a television. • The activity or job of taking photographs or filming • Prepare food to be eaten by heating it in a particular way. • ...
Diagnostic Models 2020-04-28
Across
- This model is a framework for thinking holistically about the major components of organizational design. When the points of strategy, structure processes and lateral capability, reward systems, and people practices are in alignment, the organization is at its most effective.
- This strategic is made up of hard (strategy, structure, systems) and soft (shared vision, skills, staff, style) elements.
Down
- Metaphorically similar to an air traffic controller’s radar, each of these blips (purpose, structure, rewards, helpful mechanisms, relationships, and leadership) tell us which organizational components are most important and, by the intensity of the blips, where the trouble spots might be. However, it’s important to remember we can’t focus too hard on any one of these.
- This nine levers of this framework include: external interface, mission, strategy, managing organizational mission and strategy processes, task, prescribed networks, organizational processes, people, and emergent networks.
- This model assumes that organizations are open systems. The organization is influenced by inputs (environment, resources, history, and strategies) and outputs (system functioning, group behavior, intergroup relations, and individual behavior and effect). The transformation process (task component, individual component, organizational arrangements, and informal organization) are what help change inputs into outputs.
5 Clues: This strategic is made up of hard (strategy, structure, systems) and soft (shared vision, skills, staff, style) elements. • This nine levers of this framework include: external interface, mission, strategy, managing organizational mission and strategy processes, task, prescribed networks, organizational processes, people, and emergent networks. • ...
Daily Ethernet Puzzle 2025-10-17
4 Clues: Improved Ethernet offering speeds of up to 100 Mbps. • This was the original standard, offering speeds of up to 10 Mbps • Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs. • Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
Invertebrate Vocab Crossword 2016-02-24
Across
- circulatory system/a system in which blood is always pumped throughout the body
- internal skeleton made of bone and cartilage
- hard, external, supporting structure that develops from the ectoderm
- digestive tract
- circulatory system/a system in which a fluid in a cavity called the hemocoel bathes the organs directly with oxygen and nutrients
- vascular system/the networks of blood vessels within the organism
Down
- part of a larger structure, such as the body of an organism, that is set off by natural or arbitrary boundaries
- phase in the life cycle of many animals during which a rapid change from the immature organism to the adult takes place; an example is the change from larva to adult in insects
- animal that does not have a backbone
- mass of nerve cells
- eye composed of many light detectors separated by pigment cells
- body cavity that contains internal organs
- feeler that is on the head of an invertebrate, such as a crustacean or an insect, and that senses touch, taste, or smell
13 Clues: digestive tract • mass of nerve cells • animal that does not have a backbone • body cavity that contains internal organs • internal skeleton made of bone and cartilage • eye composed of many light detectors separated by pigment cells • vascular system/the networks of blood vessels within the organism • ...
Invertebrate Vocab Crossword 2016-02-24
Across
- hard, external, supporting structure that develops from the ectoderm
- phase in the life cycle of many animals during which a rapid change from the immature organism to the adult takes place; an example is the change from larva to adult in insects
- eye composed of many light detectors separated by pigment cells
- animal that does not have a backbone
- part of a larger structure, such as the body of an organism, that is set off by natural or arbitrary boundaries
- feeler that is on the head of an invertebrate, such as a crustacean or an insect, and that senses touch, taste, or smell
Down
- body cavity that contains internal organs
- internal skeleton made of bone and cartilage
- circulatory system/a system in which blood is always pumped throughout the body
- mass of nerve cells
- circulatory system/a system in which a fluid in a cavity called the hemocoel bathes the organs directly with oxygen and nutrients
- digestive tract
- vascular system/the networks of blood vessels within the organism
13 Clues: digestive tract • mass of nerve cells • animal that does not have a backbone • body cavity that contains internal organs • internal skeleton made of bone and cartilage • eye composed of many light detectors separated by pigment cells • vascular system/the networks of blood vessels within the organism • ...
Technology and AI vocabulary 2024-05-29
Across
- The science of making machines that can think like humans.
- A portable and wearable electronic device in form of a watch that can do things not related to showing the time.
- The practice of protecting systems, networks and programs from digital attacks.
- A machine that does tasks without the help of a person.
- A mobile electronic device that work as a computer but is small enough to fit in a person's hand.
- It is basically the Internet. More specifically, it is to all the things that you have remotely and unlimited access over the internet.
Down
- An electronic device that can store and process information.
- A person that has the ability to influence the behaviour or opinions of others.
- A flying robot that can be remotely controlled or fly autonomously.
- A set of steps used to solve a specific problem.
- A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices as if they were communicating with a real person.
- A technology that allows devices to communicate with each other without cables.
- Small, portable personal computer.
13 Clues: Small, portable personal computer. • A set of steps used to solve a specific problem. • A machine that does tasks without the help of a person. • The science of making machines that can think like humans. • An electronic device that can store and process information. • A flying robot that can be remotely controlled or fly autonomously. • ...
ARCADIA CROSSWORD 2024-07-09
Across
- a system that uses only 1's and 0's
- What gets wetter as it dries?
- in geometry what is the line that just does'nt let go of a circle
- software library developed by google for building and tuning neural networks
- The more you take, the more you leave behind. What am I?
- What has keys but can't open locks?
- What can be cracked, made, told, and played?
- python library
Down
- What is the main ingredient in guacamole?
- I speak without a mouth and hear without ears. I have no body, but I come alive with the wind. What am I?
- I can be found on the cover of books, I crown the top of articles, and I name movies and songs. Without me, you'd have no clue what you're looking at your answer to the final destination lies here. What am I?
- may 1st is a monday, then may 31st will be?
- I have an infinite number of points that are all the same distance from a central point. What am I?
13 Clues: python library • What gets wetter as it dries? • a system that uses only 1's and 0's • What has keys but can't open locks? • What is the main ingredient in guacamole? • may 1st is a monday, then may 31st will be? • What can be cracked, made, told, and played? • The more you take, the more you leave behind. What am I? • ...
Office equipment 2024-03-13
Across
- computer programs necessary for directing the computer hardware to perform specific functions; refers to the application programs
- is a type of application software that manages the operations of a medical practice and is available from a variety of companies.
- Anything you plug into a computer—for example, a printer, USB flash drive, monitor, or scanner.
- software application that allows searching or browsing within CPT, HCPCS, ICD-9, and ICD-10 code sets, and Medicare coding guidelines.
- times when the computer systems are not operating.
- produces hard copies from computer files
Down
- allow patients to communicate with the practice and providers, using a secure username and password
- are used by hospitals, providers’ offices, and clinics to send and receive information over telephone lines.
- a system of interconnected computer networks by which to access information from all over the world.
- suite includes multiple applications programs bundled together, often with related functions.
- the visible parts of a computer system (keyboard, disk drive, monitor, and printers).
- permit providers to be contacted regardless of where they are.
- spoken words; recorded voice communication.
13 Clues: produces hard copies from computer files • spoken words; recorded voice communication. • times when the computer systems are not operating. • permit providers to be contacted regardless of where they are. • the visible parts of a computer system (keyboard, disk drive, monitor, and printers). • ...
Smart cities 2025-10-24
Across
- shared travel services such as buses, trains, and trams available for public use
- the effort to ensure that all citizens can participate equally in digital and social opportunities
- a device that measures air quality and pollution levels in real time
- the practice of meeting current needs without compromising the ability of future generations to meet theirs
- electronic tools and systems that generate, store, or process data to enhance urban functions
- the protection of computer systems and networks from digital attacks or unauthorized access
- the integration of digital technology into transportation to improve efficiency and sustainability
Down
- a structured process for collecting, analyzing, and managing information in a smart city
- the design of systems and services that can be used easily by everyone, including people with disabilities
- a device that converts sunlight into electrical energy for sustainable power generation
- energy from sources that naturally replenish, such as solar, wind, or hydro power
- an urban area that uses digital technology and data to improve the quality of life for its citizens
- a device that monitors and records vehicle movement for traffic management and safety
13 Clues: a device that measures air quality and pollution levels in real time • shared travel services such as buses, trains, and trams available for public use • energy from sources that naturally replenish, such as solar, wind, or hydro power • a device that monitors and records vehicle movement for traffic management and safety • ...
BC 2016-02-04
Across
- The first thing to do when confronted with an active shooter if possible is _____.
- You should always be careful before opening any ___ that is unfamiliar to you.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- _____ virus can be transmitted from a pregnant mother to her baby
- Throw away all food that has come in contact with the ____ water.
Down
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- If escape is not possible, then _____.
- The program that is responsible for establishing the framework is called the ____.
- _____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for _____ purposes.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- Only as a last resort, you must _____ the active shooter.
- The virus is transmitted through ______ bites.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • _____ virus can be transmitted from a pregnant mother to her baby • Throw away all food that has come in contact with the ____ water. • ...
The Fall of Rome 2017-02-03
Across
- This word explains what happened to western portion of Rome
- One of the causes for Rome's downfall, occurs when the government doesn't give the citizens what they want
- Emperor who divided Rome in half, and east and west
- The spread of this religion throughout the Roman empire made the citizens lose traditional value
- This word explains what happened eastern portion of Rome
- Group that attacked Rome in 410 BCE
- This legacy of the Roman empire is still seen in the US today
- One of the causes for Rome's downfall, the emperors couldn't get messages through their empire quick enough because of this
Down
- The result of trading over trade networks, caused a decline in population
- One of the causes for the downfall of Rome AND one of its legacies, Rome overspent money on this and their techniques impacted modern day armies
- Examples of this would be domes, paved roads, columns, and aqueducts
- The effect of a decrease in trade
- One of the causes for Rome's downfall, causes soil erosion
- One of the causes of Rome's downfall, multiple groups of people entered at different places and attacked Rome
- This language inspired Roman languages and the English language
15 Clues: The effect of a decrease in trade • Group that attacked Rome in 410 BCE • Emperor who divided Rome in half, and east and west • This word explains what happened eastern portion of Rome • One of the causes for Rome's downfall, causes soil erosion • This word explains what happened to western portion of Rome • ...
Security Awareness crossword puzzle 2018-05-07
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- _______ your data regularly and periodically check that you are able to restore them.
- _______ before you click or forward.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- Cybersecurity is _______'s responsibility.
- Always use _______ factor authentication where available.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
Down
- You should always keep your software and anti-virus definitions up-to-_______.
- Use a _______ password different from the passwords you use to access other sites.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Information Security is a _______ issue.
- Do not provide your _______ email account to social networks.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Cybersecurity Awareness Crossword (2018) 2018-07-29
Across
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- Information Security is a _______ issue.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- This can slow down your computer and watch everywhere you go on the Internet.
- _______ your computer when left unattended.
- _______ before you click or forward.
Down
- _______ your data regularly and periodically check that you are able to restore them.
- Use a _______ password different from the passwords you use to access other sites.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Cybersecurity is _______'s responsibility.
- You should always keep your software and anti-virus definitions up-to-_______.
- Do not provide your _______ email account to social networks.
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Always use _______ factor authentication where available.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Computer Terms 2018-04-04
Across
- IS The computing part of the computer
- IS A small text file (up to 4KB)
- IS A website that serves employees only, and most medium-sized and large companies have one
- IS The most widely used hardware interface for attaching peripherals to a computer
- is The primary method for keeping a computer secure from intruders
- IS a large network made up of smaller networks
- is entries that contain commentary, observations,and opinions and may include images, audio, video, links to other sites, as well as a search facility for finding past entries
Down
- IS An organization that provides access to the Internet
- is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords
- IS Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.)
- IS To store data locally in order to speed up subsequent retrievals
- is a term for capability and time
- IS A series of instructions that performs a particular task is called a "program."
- IS The address that defines the route to a file on an Internet server
- IS The fundamental display element of an electronic screen or bitmapped image
15 Clues: IS A small text file (up to 4KB) • is a term for capability and time • IS The computing part of the computer • IS a large network made up of smaller networks • IS An organization that provides access to the Internet • is The primary method for keeping a computer secure from intruders • IS To store data locally in order to speed up subsequent retrievals • ...
Network Computers 2013-10-18
Across
- is a device that connects your computer or home LAN to the Internet.
- is a type of wireless networking for mobile phones.
- is a type of wireless networking for long distances.
- It's a type of network that cover a building.
- It's a type of network that cover a country or a continent.
- all the computers have the same capabilities, they can share files and peripherals without requiring a separate server computer.
- is a type of wireless networking for medium-range distances.
- is a type of wireless networking for short distances.
- is a computer act as a server and stores and distributes information to other nodes, or clients.
Down
- It's a type of network that cover a campus or a city.
- are the networks that are linked by Ethernet cables, phone lines and high-speed fibre optic cables.
- there are two computers are connected by cable to allow file sharing.
- It's a type of network that is typically include a laptop, a mobile phone and a PDA.
- This is the language or set of rules that computers use to communicate which each other.
- are classified according to different criteria.
15 Clues: It's a type of network that cover a building. • are classified according to different criteria. • is a type of wireless networking for mobile phones. • is a type of wireless networking for long distances. • is a type of wireless networking for short distances. • It's a type of network that cover a campus or a city. • ...
Texas History 2022-04-20
Across
- sectors (areas that are distinct from others) that produce goods and services within an economy (EX. the automobile industry; the steel industry).
- the act of competing
- a long and severe recession in an economy or market
- statistical data relating to the population and particular groups within it.
- Austria-hungary, germany, bulgaria, ottoman empire
- the process of increasing the percentage and number of people living in urban settlements.
- the part of the economy devoted to the production, processing, and distribution of food, including the financial institutions that fund these activities.
- a return to a normal state of health, mind, or strength.
Down
- a period of temporary economic decline during which trade and industrial activities are reduced.
- space comprising the earth’s atmosphere and the space beyond.
- a financial gain
- business activities designed to plan, price, promote, and direct the flow of a company’s goods and services to consumers or users in more than one nation for a profit.
- Great britain. US, russia, France, and siberia
- the process by which an economy is transformed from primarily agricultural to one based on the manufacturing of goods.
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
15 Clues: a financial gain • the act of competing • Great britain. US, russia, France, and siberia • Austria-hungary, germany, bulgaria, ottoman empire • a long and severe recession in an economy or market • a return to a normal state of health, mind, or strength. • space comprising the earth’s atmosphere and the space beyond. • ...
Information Security 2023-12-18
Across
- A secret word or phrase that must be used to gain access to a system or service.
- A technique that falsifies the identity or location of a sender or receiver.
- A deliberate attempt to compromise or damage a system, network, or program.
- The process of protecting data by secret code.
- A cybercriminal who breaks into systems
- A part of the internet that is hidden from regular search engines and requires special software to access.
- A software program that enters a computer system without the owner’s knowledge or consent.
Down
- The practice of protecting systems, networks, and programs from digital attacks.
- A type of malware that infects and replicates itself on other files or programs
- A small computer defect that causes errors or failures.
- A small piece of data stored on a user’s browser that tracks their preferences or activities.
- A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
- A type of malware that encrypts the victim’s data and demands payment for its decryption.
- Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
- A system that prevents unauthorized access to a network or device.
15 Clues: A cybercriminal who breaks into systems • The process of protecting data by secret code. • A small computer defect that causes errors or failures. • A system that prevents unauthorized access to a network or device. • A deliberate attempt to compromise or damage a system, network, or program. • ...
Mia Hartman and Lilly Askins 2024-01-09
Across
- The unique number assigned to each device on the Internet.
- typically represented as a 0 or 1
- a computer network consisting of interconnected networks that use standardized, open communication protocols.
- <, >, <=, >=, ==, != indicate a Boolean expression
- any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- form of program documentation written into the program to be read by people and which do not affect how a program runs.
- A way of representing information using ten options
Down
- A process for reducing the number of bits needed to represent something without losing any information. This process is reversible.
- a group of computing devices and programs working together for a common purpose
- A way of representing information using only two options
- an ordered sequence of characters
- 8 Bits
- Error from attempting to represent a number that is too large.
- the series of connections between computing devices on a network starting with a sender and ending with a receiver.
- data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
15 Clues: 8 Bits • typically represented as a 0 or 1 • an ordered sequence of characters • <, >, <=, >=, ==, != indicate a Boolean expression • A way of representing information using ten options • A way of representing information using only two options • The unique number assigned to each device on the Internet. • Error from attempting to represent a number that is too large. • ...
Technology Crossword 2019-05-21
Across
- a hardware interface for up to 127 peripherals that is governed by the USB Implementers Forum
- is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords.
- The computing part of the computer
- In operation, a computer is both hardware and software, and one is useless without the other.
- A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk
- Computer people may use the term for capability and time
- The address that defines the route to a file on an Internet server
- Instructions for the computer.
- The fundamental display element of an electronic screen or bitmapped image
Down
- To write and post an entry in a Weblog.
- An organization that provides access to the Internet.
- To store data locally in order to speed up subsequent retrievals
- The primary method for keeping a computer secure from intruders
- a large network made up of smaller networks.
- An inhouse website that serves employees only, and most medium-sized and large companies have one
15 Clues: Instructions for the computer. • The computing part of the computer • To write and post an entry in a Weblog. • a large network made up of smaller networks. • An organization that provides access to the Internet. • Computer people may use the term for capability and time • The primary method for keeping a computer secure from intruders • ...
Unit II 2019-07-10
Across
- Voltage gain of an ideal op-amp is:
- Increases the input impedance and bandwidth.
- A narrow band-reject filter is also called as ____ because of its higher quality factor, Q (>10).
- The maximum rate of change of output voltage caused by a step input voltage with respect to time.
- Opposite polarity signals are applied to the inputs.
- Determine the order of filter used, when the gain increases at the rate of 60dB/decade on the stop band.
- In an inverting ideal integrator, which component exhibits the feedback path connection?
- Is zero at some specific value of input signal frequency called band width.
Down
- A circuit whose output is proportional to the difference between the input signals
- The input stage of an Op-amp is usually a ……….
- op-amps with wider bandwidth have ________ slew rate.
- For non-inverting adder, which theorem is applicable to determine the expression for output voltage?
- If ground is applied to the (+) terminal of an inverting op-amp, the (–) terminal will:
- In a buffer circuit, the voltage follower is placed _______ two networks in order to minimize the effect of loading on the first network.
- As the frequency increases, input impedance of differentiator __________.
15 Clues: Voltage gain of an ideal op-amp is: • Increases the input impedance and bandwidth. • The input stage of an Op-amp is usually a ………. • Opposite polarity signals are applied to the inputs. • op-amps with wider bandwidth have ________ slew rate. • As the frequency increases, input impedance of differentiator __________. • ...
CSS 10 2024-04-01
Across
- Designed to connect devices over large distances like states or between countries.
- CABLE The standard in networking installation for years
- A cable that is more expensive and difficult to install
- Any set of instructions that guides the hardware and tells it how to accomplish each task.
- Used to connect similar devices.
- Used to identify or test faulty or damaged cabling.
- The last color in the RJ45 pin-out
Down
- A cable that connect computer to a network hub, switch and router: Where we can walk over rivers without getting wet
- Designed to connect multiple network devices and systems within a limited geographical distance.
- It provides services directly to the end-user, or to some other software
- A medium that can deliver signal that are clearer and can go farther, w/o compromising the clarity of signal
- A medium that is composed of pairs of wires that is used in a variety of networks
- This network is limited to a single person, which means that communication between computer devices is limited to an individual’s work environment.
- Ensures the proper functioning of a particular device.
- System software that operates the computer
15 Clues: Used to connect similar devices. • The last color in the RJ45 pin-out • System software that operates the computer • Used to identify or test faulty or damaged cabling. • Ensures the proper functioning of a particular device. • A cable that is more expensive and difficult to install • CABLE The standard in networking installation for years • ...
forcasting of national economy 2025-03-20
Across
- Periodic fluctuations in a national economy (boom, recession, depression, recovery).
- Managing returns, recycling, and waste disposal in reverse supply chain processes.
- Short-term or long-term fluctuations in market demand, captured through forecasting models.
- technology to monitor real-time status across supply chain stages, enhancing transparency and responsiveness.
- A production management method focused on eliminating waste and optimizing processes for efficiency.
- The additional cost of producing one more unit, influencing pricing strategies.
- metric measuring the efficiency of inventory management, reflecting how quickly inventory is sold.
- Amplification of demand distortions from downstream to upstream in supply chains, leading to inventory imbalances.
- Policy restrictions like tariffs or quotas that impact international trade and supply chain networks.
Down
- A measure of true corporate profitability, calculated as net profit minus capital costs.
- A method where supply chain members share data and jointly plan production and replenishment.
- Environmentally friendly logistics practices, such as reducing carbon emissions and resource recycling.
- The time from order placement to delivery, impacting inventory planning and cost control.
- Research Analyzing consumer preferences through data collection to predict market demand.
- Chain A flexible supply chain design that adapts quickly to market changes, reducing risks.
15 Clues: The additional cost of producing one more unit, influencing pricing strategies. • Managing returns, recycling, and waste disposal in reverse supply chain processes. • Periodic fluctuations in a national economy (boom, recession, depression, recovery). • A measure of true corporate profitability, calculated as net profit minus capital costs. • ...
Cloud Technology 2025-05-13
Across
- – The system’s capacity to automatically adjust resources according to workload.
- – Cloud environment open to multiple organizations and managed by a third-party provider.
- – A cloud infrastructure operated solely for one organization.
- – A combination of public and private cloud systems working together.
- – The ability of a system to grow or shrink to meet demand.
Down
- – A facility that houses computer systems and related components like storage and networking.
- – Online storage model in which data is stored on remote servers accessed via the internet.
- – Software that is delivered and accessed over the internet, usually on a subscription basis.
- – The maximum data transfer rate of a network or internet connection.
- – The creation of virtual versions of physical components like servers or networks.
- – A model for enabling on-demand access to shared computing resources over the Internet.
- – Cloud service that provides virtualized computing infrastructure over the internet.
- – The period during which a system or service remains functional and available for use without failure.
- – The time delay between a user action and the response from the system.
- – Cloud service that offers a platform for developers to build, test, and deploy applications.
15 Clues: – The ability of a system to grow or shrink to meet demand. • – A cloud infrastructure operated solely for one organization. • – The maximum data transfer rate of a network or internet connection. • – A combination of public and private cloud systems working together. • – The time delay between a user action and the response from the system. • ...
Browsing safely 2025-06-08
Across
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- It is an act ab harming or harassing using information technology in deliberate manner.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Standard form of vital information resources under seize.
- It refer to the act of stealing and misusing someone's personal Plus information.
- It referred to an illegal entry into a computer system or network.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- ____ also known as unethical hacker.
- A ____ is a software that help in preventing unauthorised access to your computer.
- ____ means hoaxing or misleading.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ______ is a popular anti-virus.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- Never share your ____ while chatting.
15 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
The bigger picture 2025-01-22
Across
- Having or producing energy that comes from atoms breaking up.
- The country which is the world's largest producer or rare earth metals.
- Tsunami early system use .... networks to detect and issue timely warnings.
- NASA is analysing .... data and measuring sea surface temperatures to learn more about how any sea levels are rising.
- Making something dirty or polluted.
- ... Materials-resources that cannot be replaced naturally; only a certain amount exists.
- ...computing refers to the efficient use of resources in computing, with a minimal carbon footprint.
Down
- The amount of carbon dioxide an individual or organisation produces as a result of the energy they consume.
- A substance that can conduct electricity under some conditions but not others, making it a good medium for the control of electrical current.
- Is any form of discarded electronic equipment, including computing technology.
- Concerned with what is morally right or wrong
- Havcomputer/printer printer in .... mode when not in use reduce the energy consumption.
- Being affected by something harmful because you are in the same place as it.
- A metal used in the manufacture of circuit boards and cable sheathing.
- Information from .... also being used to track in wild life conservation,
15 Clues: Making something dirty or polluted. • Concerned with what is morally right or wrong • Having or producing energy that comes from atoms breaking up. • A metal used in the manufacture of circuit boards and cable sheathing. • The country which is the world's largest producer or rare earth metals. • ...
GEOG1 - Chapter 2 Crossword 2024-10-25
Across
- A flat representation of Earth’s surface features
- A satellite-based system for pinpointing location, stands for Global Positioning System
- The relationship between distance on a map and the corresponding distance on the ground
- A type of projection that maps Earth onto a flat plane, good for polar areas
- A global system of satellite networks for navigation, stands for Global Navigation Satellite System
- A type of map scale described in words, such as "1 inch equals 1 mile"
- A type of map scale expressed as a ratio, like "1:50,000"
- A type of projection that uses a cone over part of Earth, ideal for mid-latitudes
Down
- A type of projection that resembles cylindrical but curves outward, distorting shape minimally
- A line on a map connecting points of equal value, like temperature or elevation
- A type of projection that wraps a map around a cylinder, often distorting poles
- The method used to represent Earth’s curved surface on a flat map
- A type of map scale that uses a visual bar to show distance
- A spherical model of Earth
- The detailed mapping of the physical features of an area, such as elevation and landforms
15 Clues: A spherical model of Earth • A flat representation of Earth’s surface features • A type of map scale expressed as a ratio, like "1:50,000" • A type of map scale that uses a visual bar to show distance • The method used to represent Earth’s curved surface on a flat map • A type of map scale described in words, such as "1 inch equals 1 mile" • ...
AUTONOMOUS MOBILITY 2024-12-04
Across
- The final step in the delivery process from the hub to your doorstep
- A sensor technology that uses laser pulses to map the surroundings of autonomous vehicles
- A groundbreaking autonomous vehicle project developed by Carnegie Mellon University in the 1980s
- Company responsible for the introduction of autonomous security robots
- The organization behind the Grand Challenges that significantly advanced autonomous vehicle technology
- A leading company in autonomous mobility, known for its operational robotaxi services in the U.S
- What means no need for human intervention
- A sensor used in autonomous vehicles to detect objects and measure their speed and distance
Down
- Bug Created by Charles Kettering, Henry Ford, and Orville Wright in 1918
- A branch of artificial intelligence that enables autonomous vehicles to improve performance by learning from data.
- A company known for its Autopilot feature and significant advancements in autonomous vehicle technology
- The smart roads, 5G networks, and urban systems required to support autonomous vehicles.
- The primary benefit of autonomous vehicles is to reduce accidents caused by human error.
- Rare, unpredictable scenarios that test the limits of autonomous vehicle systems
- A self-driving vehicle service operating in urban areas, often used for ride-hailing.
15 Clues: What means no need for human intervention • The final step in the delivery process from the hub to your doorstep • Company responsible for the introduction of autonomous security robots • Bug Created by Charles Kettering, Henry Ford, and Orville Wright in 1918 • Rare, unpredictable scenarios that test the limits of autonomous vehicle systems • ...
Network Devices 2022-11-07
Across
- A digital-interface device used to connect data terminal equipment,
- A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver.
- A computer that sits between different networks or applications
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Down
- An electrical network consisting basically of four impedances connected in series to form a rectangle,
- Provides you with a digital connection that allows you to communicate by using any combination of voice, data, and videos
- A standard that defines the way in which Internet communications and other advanced services are provided on wireless mobile devices
- A device for making and breaking the connection in an electric circuit.
8 Clues: A computer that sits between different networks or applications • A digital-interface device used to connect data terminal equipment, • A device for making and breaking the connection in an electric circuit. • An electrical network consisting basically of four impedances connected in series to form a rectangle, • ...
Information technology 2021-02-09
Across
- - a pointing device that replaces the mouse most commonly found in laptops.
- port is universal in the sense that it can be used to connect many different devices to a computer
- - an internet service for sending text or multimedia messages
- - a computer program that provides services for corresponding programs normally running on other computers
Down
- is a type of computer program that edits plain text Such programs are sometimes known as "notepad" software
- is a network device that is used to connect different computer networks
- is used for permanent connection of power sources with its receivers
- - stands for Content Management System It is a website with an administration panel that allows you to change the content independently and free of charge without programming knowledge
8 Clues: - an internet service for sending text or multimedia messages • is used for permanent connection of power sources with its receivers • is a network device that is used to connect different computer networks • - a pointing device that replaces the mouse most commonly found in laptops. • ...
Choice HW 2021-03-03
Across
- a group that aimed to help African Americans be physically, mentally, politically, and socially (National Association for the Advancement of Colored People)
- groups that made loans and provided legal assistance
- Liberal Mexicano, a group of Mexican Americans organizing for their own benefit (similar to the Urban League)
- Progress, the progress of equality between races (specifically black and white)
- League, a group of people dedicated to provide religious education, to help, and to defend Jewish people
Down
- Movement, a movement that denounced the idea of gradual progress
- the process of changing immigrant ways of life to that of Americans
- League, a networks of over 100 groups of black employment agencies and relief efforts to help African Americans get settled and find work
8 Clues: groups that made loans and provided legal assistance • Movement, a movement that denounced the idea of gradual progress • the process of changing immigrant ways of life to that of Americans • Progress, the progress of equality between races (specifically black and white) • ...
Digital Citizenship 2023-02-08
Across
- content or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
- information that can be used to identify you because it is unique to you.
- using media in a way that feels healthy and in balance with other life activities.
- When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
- an attempt to trick someone online, usually with the intention of stealing money or private information.
- behaviors we do often or regularly with digital media devices.
- a type of crime in which your private information is stolen and used for criminal activity.
- to engage in activities that don't involve devices, apps or the internet.
8 Clues: behaviors we do often or regularly with digital media devices. • information that can be used to identify you because it is unique to you. • to engage in activities that don't involve devices, apps or the internet. • using media in a way that feels healthy and in balance with other life activities. • ...
Vocabulary Crossword 2015-04-27
Across
- – Originally known as Web Log. Blogs are websites that contains dated text entries about a particular topic.
- – list of websites/sources used to write a report
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate and can spread to other applications and operating system software.
Down
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – An unauthorized person who secretly gains access to computer files.
- NAME–extensions of the web address based on whether the domain belongs to a commercial enterprise
- - A bully who operates online, in cyberspace
8 Clues: - A bully who operates online, in cyberspace • – list of websites/sources used to write a report • – An unauthorized person who secretly gains access to computer files. • NAME–extensions of the web address based on whether the domain belongs to a commercial enterprise • ...
4.1-Globalization 2014-09-02
Across
- Trade / the movement of goods and services among nations without political or economic restricitons.
- Economy / the increasing interaction of the world's economies with one another as a single market instead of in many national markets.
- / the increasing connectivity and interdependence of the world's economies, societies, and cultures because of advances in communication, technology, trade, international investment, movement of currency, and migration.
Down
- / a company produces goods domestically and sells them outside the country.
- Corporations / organizations with multinational management and ownership that manufacture and market products in many different countries.
- / the buying and selling of products and services through computer networks.
- / a company buys goods outside the country and resells them domestically.
7 Clues: / a company buys goods outside the country and resells them domestically. • / a company produces goods domestically and sells them outside the country. • / the buying and selling of products and services through computer networks. • Trade / the movement of goods and services among nations without political or economic restricitons. • ...
SMELL 2025-01-09
Across
- detect and transmit odorant information to the central nervous system
- a distinctive, typically pleasant smell
- The space inside the nose. The nasal cavity lies above the bone that forms the roof of the mouth
- the part projecting above the mouth on the face of a person or animal, containing the nostrils and used for breathing and smelling
Down
- a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- A rounded mass of tissue that contains several types of nerve cells that are involved in the sense of smell
- the faculty by which the mind stores and remembers information
7 Clues: a distinctive, typically pleasant smell • the faculty by which the mind stores and remembers information • detect and transmit odorant information to the central nervous system • The space inside the nose. The nasal cavity lies above the bone that forms the roof of the mouth • ...
Invention 2 2024-04-09
Across
- Electronic device capturing and storing digital images, replacing traditional film cameras in photography.
- Machine-readable representation of data, consisting of parallel lines of varying widths, revolutionizing retail inventory management.
- Electronic banking device enabling customers to perform financial transactions without the need for a bank teller.
Down
- Process of determining the precise order of nucleotides within a DNA molecule, enabling advances in genetics and biotechnology.
- Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology.
- Portable cassette player introduced by Sony, allowing users to listen to music on the go with headphones.
- Networking technology facilitating the transmission of data between computers over local area networks (LANs).
7 Clues: Portable cassette player introduced by Sony, allowing users to listen to music on the go with headphones. • Electronic device capturing and storing digital images, replacing traditional film cameras in photography. • Networking technology facilitating the transmission of data between computers over local area networks (LANs). • ...
CISCO PARTNER ENABLEMENT SESSION 2025-10-01
Across
- With Cisco Secure Firewall you can now __________ your network, workload, and application security.
- Cisco creates the infrastructure you need to transform how you connect, protect, and innovate in the __________ era.
- Zero trust helps enable secure ________ for users and devices and within apps, across networks, and clouds.
Down
- Cisco provides 24/7, award-winning _________ support services, online and by phone to customers, partners, resellers, and distributors who hold valid Cisco service contracts.
- Cisco enables ________ security.
- Cisco _______ is the leader in cloud controlled WiFi, routing, and security. Secure and scalable.
- Small and medium businesses (SMBs) require products and solutions designed to scale, innovate, and ___________ in a digital-first world.
7 Clues: Cisco enables ________ security. • Cisco _______ is the leader in cloud controlled WiFi, routing, and security. Secure and scalable. • With Cisco Secure Firewall you can now __________ your network, workload, and application security. • Zero trust helps enable secure ________ for users and devices and within apps, across networks, and clouds. • ...
flows of products 2018-07-02
Across
- transport and time costs have been - - - - - - - by the process of containerization
- transaction costs have been - - - - - - - by the improvement in flows of data
- a collection of different companies or organisationd which may be involved in different business activities but all report to one parent company
- a system of standardised transport that uses large standard-sized steel comtainers to transport goods.
- a deliberate policy by gouvernment to impose restrictions on trade in goods and services with other countries.
Down
- what does WTO stand for ? they encouraged the reduce in tarrifs in trade
- improvements of global telephone networks has made communication ...
- information flows are gouverned by the movement of people through - - - - - - - - -
- A tax or duty placed on imported goods with the intention of making them more expensive to consumers ,so that they do not sell at a lower price.
- live media coverage avalible on a global scale because of - - - - - - - - - technology
10 Clues: improvements of global telephone networks has made communication ... • what does WTO stand for ? they encouraged the reduce in tarrifs in trade • transaction costs have been - - - - - - - by the improvement in flows of data • information flows are gouverned by the movement of people through - - - - - - - - - • ...
Yelo 2013-05-01
Across
- Programming language that allows applets to run within a web browser
- Is a self-replicating program that is harmful to networks
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank
- Help to keep data and equipment functioning and provide access only to appropriate people
- Software, is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- Also known as junk mail, is unsolicited e-mail, as shown in Figure 1. In most cases, spam is used as a method of advertising
Down
- Is a program written with malicious intent and sent out by attackers
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
- Is a software program that displays advertising on your computer
- Employees have access to data, equipment, and the network
10 Clues: Is a self-replicating program that is harmful to networks • Employees have access to data, equipment, and the network • Is a software program that displays advertising on your computer • Programming language that allows applets to run within a web browser • Is a program written with malicious intent and sent out by attackers • ...
Crossword Unit 2 2013-07-21
Across
- involving or employing compulsion; compelling; necessary; essential.
- physical exertion, esp for the purpose of development, training, or keeping fit.Example My father like do an excercise.
- to examine or investigate, esp systematically.Example In the TV's has programs about explorers.
- the single worldwide computer network that interconnects other computer networks, on which end-user services.
Down
- a gregarious and intelligent anthropoid ape, Pan troglodytes, inhabiting forests in central W Africa.
- a person known well to another and regarded with liking, affection, and loyalty; an intimate.Example My cousin like make friends all days.
- an institution or building at which children and young people usually under 19 receive education.
- a writer of novels.Example my grandfather are novelist.
- a statement or account that describes; representation in words.
- the act or process of acquiring knowledge, esp systematically during childhood and adolescence.Example The education is important for the development of people.
10 Clues: a writer of novels.Example my grandfather are novelist. • a statement or account that describes; representation in words. • involving or employing compulsion; compelling; necessary; essential. • to examine or investigate, esp systematically.Example In the TV's has programs about explorers. • ...
Globalisation Terminology 2013-11-22
Across
- Multiple nations bound together into a collective trading entity by treaties, economic union, or military force.
- Investment by a company based in one nation into organisations, industries and projects in another nation.
- The practice of implementing one standard or design of a certain device or process across a group or buisiness
- A corporation that is officially established in more than one nation
- The increasing of global interconnectivity.
Down
- The act of tailoring a product produced in one country for being sold in a different country (e.g dubbing a movie)
- An area across which importa quotas, tarrifs, and goods preferences do not apply.
- The gradual development of industrial infrastructure, such as factories and plants over an area
- Tangible or non-tangible movement from area to area. Can include culture, data, resources, people, etc.
- A point of intersection for multiple networks; A crossroad for global trade routes and flows.
10 Clues: The increasing of global interconnectivity. • A corporation that is officially established in more than one nation • An area across which importa quotas, tarrifs, and goods preferences do not apply. • A point of intersection for multiple networks; A crossroad for global trade routes and flows. • ...
Computer 2015-07-22
Across
- / _____________ is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM).
- / A ____________ represents its layout or structure from the point of view of data flow
- / _________ allows wireless transmission of audio.
- / The popularity of computer networks sharply increased with the creation of the ________________ in the 1990s.
- / In a ____________, all data flows through one centralized device.
Down
- / WiFi uses ____________ to allow two devices to communicate with one another.
- / ______________ allow devices in different rooms to efficiently share a broadband Internet connection, enable people to more easily share their files and printers within the network, and help with overall network security.
- / a _________ is a type of socket where cable plug is inserted
- Positioning System (GPS)/ _____________ is a space-based navigation system that provides location and time information in all weather conditions.
- / ___________ devices typically produce a better signal when used outside or by a window.
10 Clues: / _________ allows wireless transmission of audio. • / a _________ is a type of socket where cable plug is inserted • / In a ____________, all data flows through one centralized device. • / WiFi uses ____________ to allow two devices to communicate with one another. • / A ____________ represents its layout or structure from the point of view of data flow • ...
internet security 2021-03-01
Across
- software designed to collect information from computers for commercial or criminal purposes
- black-hat hackers
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a program designed to prevent spyware from gaining access to the internal network.
- horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
- a deceptive scheme or trick used to cheat someone out of something, especially money
- the illegal copying and distribution of copyrighted software, information, music and video files
- self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
- programs that spread by attaching themselves to executable files or documents
- certificate an electronic way of proving your identity, when you are doing business on the Internet
10 Clues: black-hat hackers • programs that spread by attaching themselves to executable files or documents • a program designed to prevent spyware from gaining access to the internal network. • a deceptive scheme or trick used to cheat someone out of something, especially money • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malware that automatically delivers advertisements.
- They are software programs created to automatically perform specific operations
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
- It is a global system of interconnected computer networks
- It is a string of characters used to verify the identity of a user during the authentication process.
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- It is a type of malware that functions by spying on user activity without their knowledge.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Unit 3 Vocabulary word puzzle 2023-09-08
Across
- a kind of business model that takes advantage of ecosystems, facilitating transactions between large networks of users such as sellers and buyers
- a document that contains important information about an organisation, including details about what the organisation does, its goals, available assets and mission
- a person or a financial company that acts both as a broker, making investments for customers, and as a dealer making investments for themselves
- favorable or advantageous; resulting in good
- a piece of information that is discovered during an official examination of a problem, situation, or object
Down
- the act of putting money, effort, time, etc. into something to make a profit or get an advantage, or the money, effort, time
- a person who gives advice in a particular field
- relating to money or currency.
- give work to (someone) and pay them for it
- the illegal process of making large amounts of money generated by criminal activity
10 Clues: relating to money or currency. • give work to (someone) and pay them for it • favorable or advantageous; resulting in good • a person who gives advice in a particular field • the illegal process of making large amounts of money generated by criminal activity • ...
Digital Citizen Vocab 2023-09-11
Across
- Small text files placed on your device by the sites you visit that collect information about your device and your activity
- Design Features or aspects of a device or app that prioritize what's good for people's lives
- Status you currently have or built
- Guaranteed by our constitution , federal and state laws
- Closely linked to freedom of expression and privacy, are those that allow people to access, use, create and publish digital media, as well as access and use computers, other electronic devices and communications networks.
Down
- Practice the use of technology in a safe, ethical, and respectful way
- Protection from being observed or tracked by others, including the government, the public, or selected individuals or groups
- When people share something they later regret
- All the information online about a person either posted by that person or others, intentionally or unintentionally
- Something we do automatically without thinking
10 Clues: Status you currently have or built • When people share something they later regret • Something we do automatically without thinking • Guaranteed by our constitution , federal and state laws • Practice the use of technology in a safe, ethical, and respectful way • Design Features or aspects of a device or app that prioritize what's good for people's lives • ...
Vocab Nonfiction 2024-01-28
Across
- The curious student approached the professor after class with a _____ about a concept discussed during the lecture.
- The success of the documentary hinged on the _____ of the eyewitness accounts and archival footage.
- Researchers are using social networks to _____ surveys and collect data for their studies.
- The editorial criticized the film for its perceived _____ bias, arguing that it portrayed a one-sided perspective.
- The _____ behavior of the customer service representative left a negative impression on the frustrated customer.
Down
- The community worked together to _____ a sense of unity and cooperation among its members.
- In certain cultures, there are _____ rules of etiquette that are widely understood but rarely explicitly discussed.
- The team's achievement was a _____ of individual talents, collaboration, and effective communication.
- The _____ committed against the indigenous community sparked outrage and demands for immediate action to address historical injustices.
- The artist carefully selected colors and shapes to create a _____ composition that conveyed a specific mood and message.
10 Clues: The community worked together to _____ a sense of unity and cooperation among its members. • Researchers are using social networks to _____ surveys and collect data for their studies. • The success of the documentary hinged on the _____ of the eyewitness accounts and archival footage. • ...
CS OATS October 2019 Crossword Puzzle 2019-10-04
Across
- Malware that can replicate itself in order to spread the infection to other connected computers.
- The past tense of when a bad actor gained unauthorized access to a system.
- Software which protects systems from malware like Trojans, viruses, worms, spyware, and more.
- Malware that prevents you from accessing files on your computer by holding your data hostage.
- Practice of sending emails to trick users into revealing personal information.
- A defensive technology, that acts as a virtual or physical barrier, designed to keep unauthorized users off networks.
- Malicious software that allows a hacker to gain remote access to a computer through a “back door”.
Down
- A group of computers, printers and devices that are interconnected and governed as a whole.
- An access method that enables access to a private network over a public network such as the Internet.
- Malicious software that disrupts a system or allows a bad actor to gain access to a system.
10 Clues: The past tense of when a bad actor gained unauthorized access to a system. • Practice of sending emails to trick users into revealing personal information. • A group of computers, printers and devices that are interconnected and governed as a whole. • Malicious software that disrupts a system or allows a bad actor to gain access to a system. • ...
Fact or fiction 2020-05-19
Across
- :known to be real and what somebody claims it is and not a copy
- : television
- :a way of criticizing a person, an idea or an institution in which you use humour to show their faults or weaknesses; a piece of writing that uses this type of criticism
- :to feel certain that something is true or that somebody is telling you the Truth
- :the activity of broadcasting programmes for people to listen to; the programmes that are broadcast
- :ideas or statements that may be false or present only one side of an argument that are used in order to gain support for a political leader, party, etc.
Down
- :that cannot be trusted or depended on
- :a person whose job is teaching, especially in a school
- :a person whose job is to collect and write news stories for newspapers, magazines, radio, television or online news sites
- :an international computer network connecting other networks and computers from companies, universities, etc.
10 Clues: : television • :that cannot be trusted or depended on • :a person whose job is teaching, especially in a school • :known to be real and what somebody claims it is and not a copy • :to feel certain that something is true or that somebody is telling you the Truth • :the activity of broadcasting programmes for people to listen to; the programmes that are broadcast • ...
Media 2020-05-18
Across
- it is a form of communication used all over the world, it is a means of communication different from the others, used in companies as one of the main communication tools, for this reason it must be efficient and professional.
- World Day is celebrated on May 17th.
- ...is a collective designation of the media outlets that exercise Journalism and other informational communication functions.
- Have stations
- The first appeared between 1946 and 1947
Down
- ...is the most used technology in the world.
- it is a periodical publication of an informative, journalistic or entertainment nature, generally aimed at the general public.
- Is one of the printed media
- it is also called seventh art, or, in certain contexts cinematography.
- networks In the former there was only the exchange of messages between users, in the current ones, there is the exposure of profiles with personal information, photos, as well as much more comprehensive forms of communication.
10 Clues: Have stations • Is one of the printed media • World Day is celebrated on May 17th. • The first appeared between 1946 and 1947 • ...is the most used technology in the world. • it is also called seventh art, or, in certain contexts cinematography. • ...
KANINI SECONDARY SCHOOL GRADE 10D TEST 2 2023 2023-03-06
Across
- ....software are developed to make the user more effective and efficient in his or her everyday job
- A....specialist is a person who sets up, support and maintain networks
- .... is the process of writing instructions for the computer
- A computer .... is a person who installs, maintains and repairs computer systems and equipments.
Down
- .....software consists of the programs that controls the operations of the computer and its devices
- ... is a person who develops or designs a program or software
- A computer...is a person responsible for maintaining and control of computer systems and normally works in a server room or a data centre
- A ... software is made to a specific user needs and customised for a specific task
- .... software is a general purpose program that can perform many tasks and not limited
- A computer ...is a profession or a job available to those who have done computer courses or program.
10 Clues: ... is a person who develops or designs a program or software • .... is the process of writing instructions for the computer • A....specialist is a person who sets up, support and maintain networks • A ... software is made to a specific user needs and customised for a specific task • ...
Technology in our lives 2024-12-21
Across
- – The practice of meeting current needs without harming future generations or the environment.
- – The use of machines or technology to perform tasks without human assistance.
- Computing – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
- – The practice of protecting computers, networks, and data from unauthorized access or attacks.
- – The science of building and using materials or devices at the nanoscale (extremely small sizes).
Down
- Intelligence – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
- – The process of creating new ideas, methods, or products that bring improvement or solve problems.
- Reality (AR) – A technology that overlays digital information or images on the real-world environment.
- – The ability to connect devices or systems to each other for communication and data exchange.
- Learning – A field of AI where computers learn from data and improve their performance without being explicitly programmed.
10 Clues: – The use of machines or technology to perform tasks without human assistance. • – The practice of meeting current needs without harming future generations or the environment. • – The ability to connect devices or systems to each other for communication and data exchange. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
HS4015 W10 Presentation 2025-03-25
Across
- A form of surrogacy, framed to be noble, sacrificial and out of goodwill
- This term describes the result of the lack of commercial exchanges that require regulation in commercial surrogacy
- The ethical principles and values that guide how surrogacy is practiced and perceived
- According to Rudrappa, the task of this term is to challenge, and rethink the possessive investment in nuclear families that underwrite both markets and kinship networks (2 words)
- The term used to refer to the quantitative calculation and qualitative judgement of reproductive laborers’ bodies
- Schurr and Militz’s reading uses this country as a case study
Down
- The qualitative, immersive study of surrogacy practices, focusing on the lived experiences of surrogate mothers
- The detachment of the surrogate baby from those who have participated in its (re-)production
- In organization of market encounters, intended parents are considered as…
- How surrogacy is framed, talked about, and understood in public discourse, media, and society. i.e. ~~Colonialism
10 Clues: Schurr and Militz’s reading uses this country as a case study • A form of surrogacy, framed to be noble, sacrificial and out of goodwill • In organization of market encounters, intended parents are considered as… • The ethical principles and values that guide how surrogacy is practiced and perceived • ...
Crossword 2025-04-09
Across
- Protection or resistance against something harmful, like cyber-attacks in this context.
- The basic physical systems and structures (like networks, roads, or cables) needed for operation.
- The main, central part of a network that connects different parts together and carries most of the data.
- Relating to the use of thin glass or plastic fibers to transmit data as light signals.
- A method of converting data into a secret code to prevent unauthorized access.
- The process of combining parts into a whole, like combining classical and quantum systems in the same network
Down
- A quantum phenomenon where particles become linked and instantly affect each other, no matter the distance between them.
- The act of sharing or delivering something across a range or network.
- A formal meeting where people discuss topics, often related to science, tech, or business.
- A connection point within a network where data is received, transmitted, or processed
10 Clues: The act of sharing or delivering something across a range or network. • A method of converting data into a secret code to prevent unauthorized access. • A connection point within a network where data is received, transmitted, or processed • Relating to the use of thin glass or plastic fibers to transmit data as light signals. • ...
Browsing safely 2025-06-22
Across
- Criminal activity intended to harm anyone using a computer and an internet connection.
- THEFT- Act of stealing and misusing someone's personal informations.
- A program that disturbs the normal functioning of the computer.
- Computer program, designed to identify, prevent,and remove viruses from a computer.
- An illegal entry into a computer system or network.
Down
- Collection of technologies,processes, and practices designed to protect networks,computers, program,and data from attack,damage,or unauthorised access.
- The act of sending an email to a user and misleading him to believe that it is from a trusted person or organisation.
- Illegal method to get money or other things that belong to a bank or it's customers.
- Unethical hackers,extract confidential information from users and use this information to execute fraudulent tasks online
- A software that helps in preventing unauthorised access to you computer by blocking communication.
10 Clues: An illegal entry into a computer system or network. • A program that disturbs the normal functioning of the computer. • THEFT- Act of stealing and misusing someone's personal informations. • Computer program, designed to identify, prevent,and remove viruses from a computer. • Illegal method to get money or other things that belong to a bank or it's customers. • ...
Aspects related to Social, economic and environmental development 2025-07-17
Across
- Food water,shelter, clothing, medical care.
- The ability to read, speak, listen effectively and write.
- Basic physical and organizational structures needed for a society to function;such as transport networks, communication links and buildings that show development.
- The chances that may be available for individuals to get jobs related to job availability,required skills and career development and growth.
Down
- Money given for a specific purpose, frequently by government and not acquiring payment.
- The value of valuable goods and capital owned by a person, organi,ation ,or a country compared to their liabilities.
- The rights that people have relating to their equality between races,genders,cultures,religions and the rights of disabled people,children and the elderly.
- The process of facilitating learning,or the acquisition of knowledge, skills,beliefs, and habits.
- Number of deaths within a population over a certain period expressed as a rate.
- The act of helping or assisting.
10 Clues: The act of helping or assisting. • Food water,shelter, clothing, medical care. • The ability to read, speak, listen effectively and write. • Number of deaths within a population over a certain period expressed as a rate. • Money given for a specific purpose, frequently by government and not acquiring payment. • ...
CYBERCRIMES 2024-12-02
Across
- offering computer repair, network troubleshooting, and IT support services to make money illegally.
- Unsolicited bulk messages from unfamiliar organizations, companies, and groups are sent to large numbers of users
- cybercriminals make a direct contact with you through phone calls, emails, or even in person.
- steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information to steal money
Down
- are malicious software to gain unauthorized access to systems and steal important data.
- use email spoofing to extract confidential information such as credit card numbers, social security number
- Controlled by remote attackers called - bot herders
- Encrypts files and information through public-key encryption and asks for money for unlocking it
- temporarily or completely interrupts servers and networks that are successfully running to make the website unavailable
- partial or complete acquisition of important data and information, breaching privacy.
10 Clues: Controlled by remote attackers called - bot herders • partial or complete acquisition of important data and information, breaching privacy. • are malicious software to gain unauthorized access to systems and steal important data. • cybercriminals make a direct contact with you through phone calls, emails, or even in person. • ...
5G-Advanced Acronyms 2025-08-22
Across
- Creates multiple customized virtual networks on a single physical network, like VIP lanes for specific tasks.
- Provides ultra-fast speeds for buffer-free streaming, quick downloads, and immersive experiences.
- A "5G Lite" standard that provides efficient connectivity for small, battery-powered devices like wearables.
- Connects millions of smart devices and sensors simultaneously to power the Internet of Things (IoT).
Down
- Enables instant, ultra-reliable communication with zero lag for critical real-time applications.
- The universal technology standard that defines how all 5G devices wirelessly connect to the network.
- Represents a pure, end-to-end 5G network, independent of 4G, that unlocks its full potential.
- The official technical name for a 5G base station or cell tower.
- Processes data at the edge of the network, closer to the user, for faster app performance and lower latency.
- Uses multiple antennas to transmit and receive more data at once, dramatically increasing network speed and capacity.
10 Clues: The official technical name for a 5G base station or cell tower. • Represents a pure, end-to-end 5G network, independent of 4G, that unlocks its full potential. • Enables instant, ultra-reliable communication with zero lag for critical real-time applications. • Provides ultra-fast speeds for buffer-free streaming, quick downloads, and immersive experiences. • ...
E-commerce 2025-12-09
Across
- The pandemic created ________ growth in online grocery shopping, a sector that had been slow to digitalize.
- Consumer demand for same-day delivery continues to ________, pushing logistics companies to invest heavily in automation.
- The advent of the "buy now, pay later" (BNPL) option is beginning to _______ consumer spending habits.
- Sophisticated tracking software now ________ companies to provide customers with real-time updates on their deliveries.
Down
- To compete with giants like Amazon, smaller retailers must develop a ________ supply chain that can handle peak season demand without failure.
- The ________ of sophisticated tracking software has allowed companies to provide real-time delivery updates.
- Advanced warehouse robotics can dramatically ________ human error in the picking and packing process.
- Successful e-commerce brands use social media to actively ________ with their community and gather feedback.
- The ________ of cross-border e-commerce has forced logistics firms to master complex international customs rules.
- Logistics networks must constantly ________, integrating new technologies like AI and drones.
10 Clues: Logistics networks must constantly ________, integrating new technologies like AI and drones. • Advanced warehouse robotics can dramatically ________ human error in the picking and packing process. • The advent of the "buy now, pay later" (BNPL) option is beginning to _______ consumer spending habits. • ...
inter 2026-01-01
Across
- a time interval during which there is a temporary cessation of something
- a program that translates and executes source language statements one line at a time; someone who mediates between speakers of different languages
- make a break in; destroy the peace or tranquility of
- get involved, so as to alter or hinder an action, or through force or threat of force
- occurring among or involving several people
- concerning or belonging to all or at least two or more nations; from or being of other countries
Down
- speak abruptly, especially as an interruption
- a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
- involving and relating to the mutual relations of states especially of the United States
- capable of acting on or influencing each other; relating to a program or interface that responds to the user's input
10 Clues: occurring among or involving several people • speak abruptly, especially as an interruption • make a break in; destroy the peace or tranquility of • a time interval during which there is a temporary cessation of something • get involved, so as to alter or hinder an action, or through force or threat of force • ...
Media Terminologies 2023-04-21
Across
- Journalists and novelists of the Progressive Era who tried to expose corruption in big corporations and the government
- Regulates interstate and international communication through cable, radio, TV, satellite, and wire
- Construction and dissemination of messages acts to highlight, emphasize or obscure some aspects of the message over others
- news associated with objective reporting
- Federal equal time rule requires broadcasters to treat candidates equally
- give reporters protection against being forced to disclose confidential information or sources in state court.
- news considered to be more individualized and subjective
- race resembles coverage of horse races because of the focus on polling data and public perception instead of candidate policy,
Down
- Media using specific events that would be used to reevaluate the current political ruler
- a kind of journalism or a journalistic role where the journalist adopts an oppositional and combative style of reporting and interviewing.
- The result of concern regarding the three main networks, NBC, ABC, and CBS, could misuse their broadcast licenses to set a biased public agenda.
- Supplies syndicated news by wire to newspapers, radio,and television stations
- Tabloid-style newspapers from the 1830s onwards
- Communication occurs through means of large broadcast
- Exaggerated language is used to sensationalize news
- ownership, advertising, the media elite, flak and the common enemy
- Distorting information to favor ones viewpoint
17 Clues: news associated with objective reporting • Distorting information to favor ones viewpoint • Tabloid-style newspapers from the 1830s onwards • Exaggerated language is used to sensationalize news • Communication occurs through means of large broadcast • news considered to be more individualized and subjective • ...
PRIN Word Search 2021-05-10
Across
- the industry leading spreadsheet software program
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
- a form of computer memory that can be read and changed in any order
- an American multinational technology company
- contain all the data in your PC, from the operating system to music, movies and video games
- the central unit of a computer system that performs arithmetic and logic operations
Down
- a way of connecting computers together in a local area network or LAN
- a presentation program
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- usually refers to something using digits, particularly binary digits
- receive audio input from a device such as a computer
- global system of interconnected computer networks
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- portable Document Format
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- a part of the system that holds the internal factors of a computer together
- the electronic circuitry that executes instructions comprising a computer program
17 Clues: a presentation program • portable Document Format • an American multinational technology company • the industry leading spreadsheet software program • global system of interconnected computer networks • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
PRIN Word Search 2021-05-10
Across
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a way of connecting computers together in a local area network or LAN
- the electronic circuitry that executes instructions comprising a computer program
- contain all the data in your PC, from the operating system to music, movies and video games
- receive audio input from a device such as a computer
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- a presentation program
Down
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- global system of interconnected computer networks
- the central unit of a computer system that performs arithmetic and logic operations
- an American multinational technology company
- a form of computer memory that can be read and changed in any order
- the industry leading spreadsheet software program
- a part of the system that holds the internal factors of a computer together
- usually refers to something using digits, particularly binary digits
- portable Document Format
17 Clues: a presentation program • portable Document Format • an American multinational technology company • global system of interconnected computer networks • the industry leading spreadsheet software program • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
Industrialism and Westward Expansion Crossword 2024-11-05
Across
- Period of apparent prosperity in the U.S., marked by underlying issues and inequality
- ... Integration; Business strategy where a company controls every stage of production, from raw materials to sales
- African Americans who moved westward after the Civil War
- Law that offered 160 acres of land to settlers willing to farm it for five years.
- Major railroad connecting the eastern and western United States, completed in 1869.
- Networks that expanded during the Industrial Revolution, crucial for transportation and trade
- Material produced using the Bessemer Process, stronger than iron and used widely in construction
- The movement of people from rural areas to cities, often for factory jobs
- Social class primarily made up of laborers and factory workers
Down
- Economic policy of minimal government interference in business
- Industrialist known for dominating the steel industry through vertical integration.
- Period marked by rapid industrialization and urbanization
- The belief that Americans were destined to expand across the continent
- Organizations formed by workers to advocate for better conditions and pay
- Wealthy industrialists accused of exploiting workers and using unethical business practices
- ... Integration;Business tactic involving the merger of companies in the same industry to reduce competition
- Practice of employing children in factories, often in unsafe and demanding jobs.
17 Clues: African Americans who moved westward after the Civil War • Period marked by rapid industrialization and urbanization • Economic policy of minimal government interference in business • Social class primarily made up of laborers and factory workers • The belief that Americans were destined to expand across the continent • ...
Telecommunications 2022-07-04
Across
- (n) a significant effect or result
- to separate something from something else
- (n) a means of communicating or expressing information
- (n) the process or fact of becoming progressively worse
- (adj) allowing the communication of two signals at the same time in opposite directions
- (n) radio or television apparatus that changes broadcast signals into a visible or audio form
- (n) a cable consisting of fine bendable fibres through which light signals can be transmitted
- (n) the largest range of a vibration or oscillation
Down
- (n) in communication, data transmitted from a central user to a large number of other users
- (n) in telecommunications, a process taking place at the transmitter which changes the message before sending it
- (n) an identifying aspect of something or someone
- (v) to make a machine work
- n) a kind of shielded and insulated copper cable used in cable TV services and computer networks
- (n) the connection or service between two telephones
- (n) a phone connected via wires to a telephone jack on the wall, unlike a mobile phone
- (n) a plate or screen that safeguards a machine or person using it from damage or harm
- (v) to change from one form to another
17 Clues: (v) to make a machine work • (n) a significant effect or result • (v) to change from one form to another • to separate something from something else • (n) an identifying aspect of something or someone • (n) the largest range of a vibration or oscillation • (n) the connection or service between two telephones • (n) a means of communicating or expressing information • ...
Cardiovacular System 2022-10-24
Across
- Fibrillation / Medical Abbreviation AF means...
- / An ___ is a quick and painless test that records the electrical signals within one's heart.
- Disease / Affects veins in the lower body. Problems like chronic venous insufficiency and ___ occur when blood can’t flow back to the heart and pools in leg veins.
- / An exam which uses sound waves to create detailed images of the heart in motion is known as a…
- / The ___ pumps blood through the system.
- Fibers / ___ are specialized muscle fibers that relay impulses to create synchronized contractions of the ventricles.
- /A ___ can occur when an artery wall weakens and enlarges.
- Catheter / A ___ can show blockages in the heart arteries.
- Blood Pressure / When the pressure of blood against the blood vessel walls gets too high, you develop…
- Deposits / High cholesterol and diabetes can lead to fat and other substances collecting in the blood. These substances form…
- MRI / A ___ uses a magnetic field and computer-generated radio waves to create detailed images of the heart.
- / Vessels that deliver blood to tissues are…
Down
- Pacing / Medical Abbreviation ATP means…
- Monitor / A ___ is a portable ECG device that’s worn for a day or several to record one’s heart's activity during daily activities.
- / Vessels that return blood to the heart are…
- Heart Disease / Medical Abbreviation CHD means…
- Disease / Medical Abbreviation CVD means…
- Artery Disease / Medical Abbreviation CAD means…
- Attack / A ___ occurs when the blood flow that brings oxygen to the heart muscle is severely reduced,
- / Networks of small vessels that perfuse tissues are…
20 Clues: Pacing / Medical Abbreviation ATP means… • Disease / Medical Abbreviation CVD means… • / The ___ pumps blood through the system. • / Vessels that deliver blood to tissues are… • / Vessels that return blood to the heart are… • Fibrillation / Medical Abbreviation AF means... • Heart Disease / Medical Abbreviation CHD means… • ...
Computer Science Basics 2024-09-08
Across
- An electrical component that limits the flow of current in a circuit.
- A high-level programming language named after a popular French mathematician and philosopher.
- The language of 0s and 1s used by computers.
- The physical components of a computer system.
- A structure that stores multiple values in a single variable, accessed by an index.
- A step-by-step procedure or formula for solving a problem.
- A sequence of characters surrounded by double or single quotes.
- A device used to store digital data, such as documents, photos, and software.
- A logic gate that outputs true only if both inputs are true.
Down
- A type of loop that executes as long as a specified condition is true.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A small-sized type of volatile computer memory that provides high-speed data access to the processor.
- Software that acts as an intermediary between computer hardware and software.
- A program that translates high-level source code into machine code.
- A network device that forwards data packets between computer networks.
- The smallest unit of data in computing, represented as 0 or 1.
- The core component of an operating system, managing system resources and communication between hardware and software.
17 Clues: The language of 0s and 1s used by computers. • The physical components of a computer system. • A step-by-step procedure or formula for solving a problem. • A logic gate that outputs true only if both inputs are true. • The smallest unit of data in computing, represented as 0 or 1. • A sequence of characters surrounded by double or single quotes. • ...
