networks Crossword Puzzles
Computer Science Basics 2024-09-08
Across
- An electrical component that limits the flow of current in a circuit.
- A high-level programming language named after a popular French mathematician and philosopher.
- The language of 0s and 1s used by computers.
- The physical components of a computer system.
- A structure that stores multiple values in a single variable, accessed by an index.
- A step-by-step procedure or formula for solving a problem.
- A sequence of characters surrounded by double or single quotes.
- A device used to store digital data, such as documents, photos, and software.
- A logic gate that outputs true only if both inputs are true.
Down
- A type of loop that executes as long as a specified condition is true.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A small-sized type of volatile computer memory that provides high-speed data access to the processor.
- Software that acts as an intermediary between computer hardware and software.
- A program that translates high-level source code into machine code.
- A network device that forwards data packets between computer networks.
- The smallest unit of data in computing, represented as 0 or 1.
- The core component of an operating system, managing system resources and communication between hardware and software.
17 Clues: The language of 0s and 1s used by computers. • The physical components of a computer system. • A step-by-step procedure or formula for solving a problem. • A logic gate that outputs true only if both inputs are true. • The smallest unit of data in computing, represented as 0 or 1. • A sequence of characters surrounded by double or single quotes. • ...
Engagement Metrics 2024-10-09
Across
- For polls and questions, the total number of responses received.
- The number of unique users who have seen a post.
- The total number of comments made on a post.
- Specifically on Twitter, the number of times a tweet is retweeted.
- The percentage of users who click on a link in a post.
- The number of times a video or post has been viewed.
- How often a user or brand is mentioned in posts by others.
- The number of times users express approval of a post.
- The average amount of time users spend engaging with a post or profile.
Down
- The overall engagement (likes, comments, shares) divided by total followers or reach.
- The number of new followers gained or lost over a period.
- The number of times users save a post for later reference (common on platforms like Instagram).
- The number of views on ephemeral content, like Instagram or Facebook Stories.
- The total number of times a post is displayed, regardless of interaction.
- Various emotional responses (e.g., love, wow) on platforms like Facebook.
- The percentage of viewers who watched a video to the end.
- How often a post is shared by users, spreading it to their own networks.
17 Clues: The total number of comments made on a post. • The number of unique users who have seen a post. • The number of times a video or post has been viewed. • The number of times users express approval of a post. • The percentage of users who click on a link in a post. • The number of new followers gained or lost over a period. • ...
English 2021-01-21
Across
- a large natural elevation of the earth's surface rising abruptly from the surrounding level; a large steep hill.
- the basic or inherent features, character, or qualities of something.
- is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products
- them to realize the nature of their problems"
- horizontal plane"
- is an inorganic, transparent, tasteless, odorless, and nearly colorless chemical substance
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- cheeks were pressed together as they danced"
- a flightless swift-running African bird with a long neck, long legs, and two toes on each foot. It is the largest living bird, with males reaching a height of up to 2.75 m.
- star round which the earth orbits.
- move rhythmically to music, typically following a set sequence of steps.
- guide is also available on the internet"
- a flat surface on which a straight line joining any two points on it would wholly lie.
- set off down the mountain"
14 Clues: horizontal plane" • set off down the mountain" • star round which the earth orbits. • guide is also available on the internet" • cheeks were pressed together as they danced" • them to realize the nature of their problems" • the basic or inherent features, character, or qualities of something. • move rhythmically to music, typically following a set sequence of steps. • ...
Intro to Cyber CH 2 2021-09-19
Across
- malware designed to modify operating systems to allow unauthorized remote access through a backdoor
- malware designed to automatically perform actions over the Internet
- any computer code that can be used to steal data, bypass access controls, or harm or compromise a system
- an attack that interrupts network services to users, devices, or applications
- act of using an exploit against a vulnerability with the goal of breaking into the target system
- improper use of practices that manage physical control of equipment, data, or applications
Down
- way of gaining access to resources that manipulates individuals into performing actions or divulging confidential information
- malicious code that replicates itself independently by exploiting vulnerabilities in networks
- after an attack, technique used for ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks
- use of multiple techniques to compromise a target
- carries out malicious operations while appearing to have a desired function
- type of hardware or software defect that malicious users attempt to exploit
- malware designed to track the actions of users and capture data
13 Clues: use of multiple techniques to compromise a target • malware designed to track the actions of users and capture data • malware designed to automatically perform actions over the Internet • carries out malicious operations while appearing to have a desired function • type of hardware or software defect that malicious users attempt to exploit • ...
India in the middle ages --Madison Lott 2025-03-13
Across
- which empire is located in the mountain region of northwest of the Indus River valley and known for enlarging territories with military tatics
- Strongest empire in the Islamic world and from the 1300s
- Where did the Bhakti movement originate?
- Spent most of their life as a religious teacher, emphasized importance of works in a language
- Southeast Asia, adopted Hindu and Buddhism ideas and adopted Indian religion & culture, in the Gupta empire
- Empire conquered many other empires and established commercial trading networks
Down
- What group of people spread Hindu and Buddhist ideas to SOutheast Asia
- Believes Buddha as a teacher, understanding the way to gain Nirvana, transforming oneself by moral conduct and meditation
- Buddhist monk who helped transmit texts from India to central and East Asia
- the entire northern India and was Hindu
- Princess, famous for her religious devotion
- What Muslim scholars learn and borrow from Hindu scholars
- Believes Buddha as a God, Believe the 8 practices to bring end of personal suffering, Also believe to be able to follow the Eightfold Path
13 Clues: the entire northern India and was Hindu • Where did the Bhakti movement originate? • Princess, famous for her religious devotion • Strongest empire in the Islamic world and from the 1300s • What Muslim scholars learn and borrow from Hindu scholars • What group of people spread Hindu and Buddhist ideas to SOutheast Asia • ...
Human Right Heros 2016-01-05
Across
- This organization helps people that were in disaster or war and provides them food and stuff and helps people that dont have the access to food or water
- International fights the abuses of human rights and protects them and tryies to provide human rights for all
- Organization that inteprets the african charter on human rights and they protect and promote human rights
Down
- They build networks among nations to enable solidarity and build peace among people
- Helps people get rights and protects them and promotes and protect and fights for human rights for everyone
- A organization that fights for the human rights for colored people
- Defends the rights of all people worldwide
7 Clues: Defends the rights of all people worldwide • A organization that fights for the human rights for colored people • They build networks among nations to enable solidarity and build peace among people • Organization that inteprets the african charter on human rights and they protect and promote human rights • ...
Left Arm Veins & Ateries 2017-03-08
Across
- Digital Veins: network of veins formed by the dorsal metacarpal veins.
- Arch/ formed predominantly by the ulnar artery
- Cephalic/a variable vein that passes along the radial border of the forearm to join the cephalic vein near the elbow.
- Artery/is the largest branch of the axillary artery.
- Vein/runs up the lateral side of the arm from the hand to the shoulder.
- Vein/drain oxygen-depleted blood from the forearm.
- Artery/travels down the radial side of the forearm to the wrist.
Down
- Artery/supplies blood to the upper part of the chest.
- Vein/ passes along the back of the forearm on the ulnar side for a distance and then curves to the surface below the elbow.
- Vein/ a paired large vein, one on either side of the body.
- Artery/ the major blood vessel of the (upper) arm.
- Vein/ a large blood vessel that conveys blood from the lateral aspect of the thorax, axilla (armpit) and upper limb toward the heart.
- Palmar Arch/one of the arterial networks found in the hand.
13 Clues: Arch/ formed predominantly by the ulnar artery • Artery/ the major blood vessel of the (upper) arm. • Vein/drain oxygen-depleted blood from the forearm. • Artery/is the largest branch of the axillary artery. • Artery/supplies blood to the upper part of the chest. • Vein/ a paired large vein, one on either side of the body. • ...
InfoSec Crossword Puzzle 2022-10-29
Across
- The process of confirming the correctness of the claimed identity.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A set of programs that tell a computer to perform a task.
- A technique used by hackers to obtain sensitive information.
- The most widely-installed LAN technology.
Down
- A type of malware that functions by spying on user activity without their knowledge.
- A term to describe connecting multiple separate networks together.
- the process of transforming an encrypted message into its original plaintext.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.
- Another kind of malware that allows cybercriminals to remotely control your computer.
- The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.
13 Clues: The most widely-installed LAN technology. • A set of programs that tell a computer to perform a task. • A technique used by hackers to obtain sensitive information. • A term to describe connecting multiple separate networks together. • The process of confirming the correctness of the claimed identity. • ...
Tech crossword 2023-03-06
Across
- a very small, portable, solid-state hard drive that can be inserted into a USB port for storage and retrieval of data.
- reasonable and limited use of copyrighted material so as not to infringe upon copyright
- the rules of etiquette that apply when communicating over computer networks, especially the internet.
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
- acceptable use policy
- A digital identity is information used by computer systems to represent an external agent – a person, organization, application, or device.
- local area network
- wide area network
Down
- the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on
- a part of a mechanical or electrical system
- a piece of writing or other work reflecting such unauthorized use or imitation
- An external serial bus interface standard for connecting peripheral devices to a computer, as in USB port or USB cable.
- A device or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speaker, etc.
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
14 Clues: wide area network • local area network • acceptable use policy • a part of a mechanical or electrical system • a piece of writing or other work reflecting such unauthorized use or imitation • reasonable and limited use of copyrighted material so as not to infringe upon copyright • ...
Computers 2023-06-23
Across
- A small device used to move the cursor on the computer screen and make selections
- A set of keys or buttons used for inputting letters, numbers, and commands into the computer
- Programs or applications that provide instructions for the computer to perform tasks
- A system for sending, receiving, and storing electronic messages over computer networks
- An electronic device that produces a hard copy or printed version of digital documents or images
- browser A software application used to access and view websites and webpages on the internet
Down
- A collection of data or information stored on a computer under a specific name
- Devices that produce sound or audio output from the computer
- A pair of audio devices worn over the ears to listen to sound or music from the computer
- A global network of computers that allows communication and access to information
- A machine that can store, process, and retrieve data, and perform various tasks
- The physical components of a computer system, such as the processor, memory, and storage devices
- A screen or display used to show information and images from the computer
13 Clues: Devices that produce sound or audio output from the computer • A screen or display used to show information and images from the computer • A collection of data or information stored on a computer under a specific name • A machine that can store, process, and retrieve data, and perform various tasks • ...
Chapter 10: Crimes Against Property 2024-04-24
Across
- unlawful taking of a car by someone who intends only to use it temporarily.
- the taking of money or property by a person to whom it has been entrusted.
- Form of larceny in which a person takes items from a store without paying or intending to pay.
- Unlawful taking of another's property with the intent to steal it.
- the deliberate and malicious burning of another person's property.
- the unlawful taking of property from a person's immediate possession by force or intimidation
Down
- actions that involve computers and networks in criminal activities.
- a crime in which the perpetrator uses a force or intimidation to steal a car from a driver.
- receiving or buying property that is known or reasonably believed to be stolen.
- taking property illegally through threats of harm.
- the deliberate destruction or defacement of another person's property; also known as malicious mischief.
- breaking and entering a building with intentions of committing a crime.
- the act of making a fake document or altering a real one with the intentions to commit fraud.
13 Clues: taking property illegally through threats of harm. • Unlawful taking of another's property with the intent to steal it. • the deliberate and malicious burning of another person's property. • actions that involve computers and networks in criminal activities. • breaking and entering a building with intentions of committing a crime. • ...
Global Gridlock 2025-07-05
Across
- Warfare A modern form of warfare involving attacks on a country's digital systems and networks
- Describes the emerging global order with several power centers like BRICS, EU, and the US.
- A tax imposed on imports or exports to regulate trade and generate revenue. (6 letters)
- The analytical framework underpinning discussions on maritime strategy, energy corridors, and alliances.
- Temporary halt in fighting, often during negotiations
- The use of violence and intimidation by non-state actors, often targeting civilians, to achieve political goals
Down
- Penalties imposed by countries or international bodies to influence a nation’s behavior, often through trade or financial restrictions.
- India’s Cold War doctrine, reinterpreted as a form of “issue-based alignment” in the modern context.
- India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack
- A high-level diplomatic meeting of heads of state. (6 letters)
- An economic and geopolitical bloc central to India’s global strategy.
- Involving or affecting two sides, especially two countries. (9 letters)
- A concept linked to India’s defense diplomacy and strategic posture, especially in border and nuclear policy.
13 Clues: Temporary halt in fighting, often during negotiations • A high-level diplomatic meeting of heads of state. (6 letters) • An economic and geopolitical bloc central to India’s global strategy. • Involving or affecting two sides, especially two countries. (9 letters) • India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack • ...
CROSSWORD 2025-11-20
Across
- A type of blood vessel that carries deoxygenated blood from the heart to the lungs
- These components of blood are part of the immune system and defend the body against infection
- The protein in red blood cells that transports oxygen
- The largest artery in the body, which carries oxygenated blood out of the left ventricle
- A blood vessel that carries deoxygenated blood back to the heart
- The continuous movement of blood through the body
- A type of blood vessel that carries oxygenated blood from the lungs back to the heart
Down
- the main organ of the circulatory system that pumps blood throughout the body
- The liquid component of blood, consisting mainly of water, in which red and white blood cells are suspended
- Small, disk-shaped cells without a nucleus that are involved in blood clotting
- These cells are responsible for transporting oxygen in the blood
- The smallest blood vessels, which form networks where the exchange of materials between blood and tissues occurs
- A blood vessel that carries oxygenated blood away from the heart to the rest of the body
13 Clues: The continuous movement of blood through the body • The protein in red blood cells that transports oxygen • These cells are responsible for transporting oxygen in the blood • A blood vessel that carries deoxygenated blood back to the heart • the main organ of the circulatory system that pumps blood throughout the body • ...
Think Different - iSecure 2017-10-25
Across
- A type of online scam where criminals send an email that appears to be from a legitimate company asking you to provide sensitive information
- Users shall not enter sensitive areas without
- If someone calls you to say that you've won a huge sweepstakes that you never entered, it's probably a
Down
- The process of organizing data into categories for its most effective and efficient use
- You are typically required to change these every 45 days and are not to share them with anyone (including IT personnel)
- users shall report any lost or stolen device to the
- Malware that can replicate itself and is spread usually over networks to cause harm
7 Clues: Users shall not enter sensitive areas without • users shall report any lost or stolen device to the • Malware that can replicate itself and is spread usually over networks to cause harm • The process of organizing data into categories for its most effective and efficient use • ...
Unit 2: Social Media Vocabulary Review 2023-09-28
Across
- Is a website which promotes or sells products and services. Both buyers and sellers are connected through these platforms.
- Group of people who can see the content you share online.
- The information, products, videos, and all the data you share on your social networks
- Based on posting digital audio content. It often lasts longer than one hour and may be listened to by other internet users through their computers or their MP3 players.
- The continuously updated page you see on a social media website.
Down
- Refers to the blocking of unwanted content on the web.
- Is a program operating on a computer or any electronic device.
7 Clues: Refers to the blocking of unwanted content on the web. • Group of people who can see the content you share online. • Is a program operating on a computer or any electronic device. • The continuously updated page you see on a social media website. • The information, products, videos, and all the data you share on your social networks • ...
revision-crossord 2022-12-13
Across
- the unequal accessibility of internet access of information and those without.
- the legal protection employers receive when prosecuting unfair actions within the workplace.
- The process of a device being created, used and recycled or disposed of.
- the abundance of physical objects that can that connect and exchange data with other devices and systems over the Internet or other communications networks.
Down
- simulation of human-intelligence processes by computer systems using machine learning, expert systems
5 Clues: The process of a device being created, used and recycled or disposed of. • the unequal accessibility of internet access of information and those without. • the legal protection employers receive when prosecuting unfair actions within the workplace. • simulation of human-intelligence processes by computer systems using machine learning, expert systems • ...
Cybersecurity 2025-03-28
Across
- artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
- The practice of protecting systems, networks, and programs from digital attacks
- a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
- When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
- how many KUB(TYREX) stations in PTTEP YADANA Asset in total
- What is the minimum number of characters for PTTEP YADANA Asset user accounts
6 Clues: how many KUB(TYREX) stations in PTTEP YADANA Asset in total • What is the minimum number of characters for PTTEP YADANA Asset user accounts • The practice of protecting systems, networks, and programs from digital attacks • When you got a phishing email, you should (_____) by clicking report phishing button in Outlook. • ...
EDTC5325 Crossword -Laura Glass 2014-03-26
Across
- A hardware device that routes data from a local area network (LAN) to another network connection.
- Card that makes the connection between the computer and the network cable.
- Technology often used for wireless keyboards and wireless printing.
- Carries data to smaller lines of transmission.
- A piece of computer hardware or software that accesses a service made available by a server.
- A computer that provides data to other computers.
- Address A numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
- Limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
- Describes the arrangement of systems on a computer network.
- Networks that span long distances via telephone lines, fiber-optic cables, or satellite links.
Down
- The most common type of connection computers use in a local area network (LAN).
- The maximum data transfer rate of a network or Internet connection.
- A site that offers Internet access over a wireless local area network (Starbucks).
- An Ethernet network cable
- A type of connector commonly used for Ethernet networking.
- Computer network limited to a small area such as an office building or university,
- Technology that allows an electronic device to exchange data or connect to the internet wirelessly.
17 Clues: An Ethernet network cable • Carries data to smaller lines of transmission. • A computer that provides data to other computers. • A type of connector commonly used for Ethernet networking. • Describes the arrangement of systems on a computer network. • Technology often used for wireless keyboards and wireless printing. • ...
PRIN Word Search 2021-05-10
Across
- global system of interconnected computer networks
- the industry leading spreadsheet software program
- a way of connecting computers together in a local area network or LAN
- the central unit of a computer system that performs arithmetic and logic operations
- a form of computer memory that can be read and changed in any order
- an American multinational technology company
- contain all the data in your PC, from the operating system to music, movies and video games
- a part of the system that holds the internal factors of a computer together
- a presentation program
- usually refers to something using digits, particularly binary digits
Down
- receive audio input from a device such as a computer
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- the electronic circuitry that executes instructions comprising a computer program
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- portable Document Format
17 Clues: a presentation program • portable Document Format • an American multinational technology company • global system of interconnected computer networks • the industry leading spreadsheet software program • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
PRIN Word Search 2021-05-10
Across
- contain all the data in your PC, from the operating system to music, movies and video games
- the central unit of a computer system that performs arithmetic and logic operations
- the electronic circuitry that executes instructions comprising a computer program
- a way of connecting computers together in a local area network or LAN
- global system of interconnected computer networks
- portable Document Format
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- a part of the system that holds the internal factors of a computer together
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
Down
- an American multinational technology company
- the industry leading spreadsheet software program
- usually refers to something using digits, particularly binary digits
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- a form of computer memory that can be read and changed in any order
- a presentation program
- receive audio input from a device such as a computer
17 Clues: a presentation program • portable Document Format • an American multinational technology company • the industry leading spreadsheet software program • global system of interconnected computer networks • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
ICT652 CHAPTER 4 2023-10-30
Across
- child pornography is considered as child _____
- is a ____ to disseminate information classified as an official secret
- remove ____ material is one of the alternative to control offensive speech online
- ____ is the process of transferring ownership of a business in public sector (a government) to the private sector.
- state may make law in respect of matters in the _____
- ____ is the act or process of removing or reducing state regulation
- the purpose of anonymity is to hide certain _____
- Government has the power to ____ the license from people if there are threat to the government
Down
- parliament may make law in respect of matters in the _____
- is the political right to communicate one's opinions and ideas via ____
- the title for this chapter is the censorship in ____
- (COPA)is the Abbreviation for the Child Online _____ Act
- Quality or state of being anonymous is the definition of _____
- ______is one of the way to control offensive speech in the cyberspace
- Net ____is a principle that supports no restrictions by Internet service providers or governments on consumers' access to networks that participate in the Internet.
- ____is applied to control media content to avoid unnecessary disturbance to the national security.
- Share issue privatization (SIP) ,Asset sale privatization ,Voucher privatization and Privatization from below is the ____ of Privatization
17 Clues: child pornography is considered as child _____ • the purpose of anonymity is to hide certain _____ • the title for this chapter is the censorship in ____ • state may make law in respect of matters in the _____ • (COPA)is the Abbreviation for the Child Online _____ Act • parliament may make law in respect of matters in the _____ • ...
Software Part 3 2020-08-10
Across
- A small picture used to represent a file or program in a GUI interface
- the type of storage that is not changed even when the computer is turned off
- A deliberately harmful computer program designed to create annoying glitches or destroy data
- 1,024,576 bytes or 1,024 kilobytes; enough storage to approximately equal a 600 page paperback book; generally abbreviated Mb
- A list of operations avalaible to the user of a program
- Any device that olds computer data
- Software provided at a minimal cost to users who are on their honor to send in payment to the programmer
- The type of storage that changes; when the computer is turned off, the RAM memory is erased
- A network of computer networks encompassing
- A collection of computers that are connected
Down
- 1,024 bytes; usually abbreviated KB
- A graphical representation of program activities; a row of icons used to perform tasks in a program
- A program that allows the user to create primarily text documents
- A program arranged in rows and colums that manipulates numbers
- A computer´s unique address or number on the internet
- Any of a number of hardware devices connected to a CPU
- A screen in a software program that permits the user to view several programs at one time
17 Clues: Any device that olds computer data • 1,024 bytes; usually abbreviated KB • A network of computer networks encompassing • A collection of computers that are connected • A computer´s unique address or number on the internet • Any of a number of hardware devices connected to a CPU • A list of operations avalaible to the user of a program • ...
MHI - Crossword 2024-08-27
Across
- Abbreviation for the digital version of a patient's medical history
- The ability of different health information systems to work together within and across organizational boundaries
- Largest hospital network and health research organizationin Canada
- An online platform that gives patients access to their health information and the ability to communicate with healthcare providers
- Last Name of MHI Program Director
- An independent, not-for-profit corporation dedicated to AI research
- The use of telecommunications technology to provide clinical healthcare from a distance
- The simulation of human intelligence in machines, often used in predictive analytics (2 words)
Down
- The practice of protecting systems, networks, and programs from digital attacks in the healthcare industry
- A MHI Prof is the founder of this company that creates digital health solutions
- UofT website where you can find your transcript
- State of physical, emotional, and mental exhaustion often experienced by healthcare professionals due to prolonged stress
- Permission given by a patient to share their personal health information with others.
- The largest academic science and health science library in Canada
- The social media platform used mainly for networking
- The institution that the MHI Program falls under
- The sequence of processes through which a piece of work passes from initiation to completion in healthcare settings
17 Clues: Last Name of MHI Program Director • UofT website where you can find your transcript • The institution that the MHI Program falls under • The social media platform used mainly for networking • The largest academic science and health science library in Canada • Largest hospital network and health research organizationin Canada • ...
Crossword Puzzle 2025-03-01
Across
- COMMUNICATION-The process of exchanging information effectively (14 letters)
- COMMUNICATION- A type of communication that involves sharing personal experiences (10 letters)
- TECHNOLOGY AND SOCIETY- A field exploring the societal impact of science and technology (16 letters)
- ERA- The current era characterized by widespread use of digital technology (11 letters)
- THE SELF- The study of the self and its development (15 letters)
- A key aspect of self-concept: your sense of who you are (8 letters)
- COMMUNICATION- A type of communication that uses technology to connect people across distances (10 letters)
- A type of reasoning used to solve mathematical problems (7 letters)
Down
- COMMUNICATION- A type of communication used to persuade or influence (12 letters)
- A key element of self-understanding: your values and beliefs (10 letters)
- A characteristic of effective communication: being clear and easy to understand (8 letters)
- A branch of mathematics dealing with numbers and their relationships (11 letters)
- INTELLIGENCE- The ability to understand and manage one's emotions (11 letters)
- A key element of self-understanding: your beliefs about your abilities (11 letters)
- A branch of mathematics dealing with shapes and spaces (9 letters)
- STORAGE- The use of computers and networks to store and share information (10 letters)
- The application of scientific knowledge to solve practical problems (10 letters)
- A branch of mathematics used in data analysis and prediction (10 letters)
18 Clues: THE SELF- The study of the self and its development (15 letters) • A branch of mathematics dealing with shapes and spaces (9 letters) • A key aspect of self-concept: your sense of who you are (8 letters) • A type of reasoning used to solve mathematical problems (7 letters) • A key element of self-understanding: your values and beliefs (10 letters) • ...
Week One Crossword 2024-10-15
Across
- He said that the bourgeoisie are in conflict with the proletariat.
- Collections of people (friends, family, teams) that influence behavior and social norms.
- How people learn values, norms, and behaviors from society throughout their lives.
- Weber believed that Protestants saw financial success as a sign from God and this led to the birth of ___.
- His goal was to get sociology recognized as a separate academic discipline.
- He invented the term "sociology," the study of society.
- Marx believed that the engine of human history is class ____.
- He disagreed with Marx's claim that economics is the central force in social change.
- Our sense of identity, shaped through interactions with others.
Down
- Marx supported ___ as the only way workers could gain control of society.
- Weber believed that ___ was the central force in social change.
- Spencer is known for creating the idea of "survival of the ____."
- Spencer was influenced by ideas similar to Charles Darwin’s theory of ___.
- He thought that societies evolve from "barbarian" to "civilized" forms over time
- Durkheim's research found that people are more likely to commit ___ if their ties to others are weak.
- Social ___ are the benefits (like resources and support) we gain from our social connections and networks.
- The ____ Revolution was one of the biggest influences on Comte's beliefs.
17 Clues: He invented the term "sociology," the study of society. • Marx believed that the engine of human history is class ____. • Weber believed that ___ was the central force in social change. • Our sense of identity, shaped through interactions with others. • Spencer is known for creating the idea of "survival of the ____." • ...
Living in the IT Era 2019-11-16
Across
- a device, module, machine, or subsystem whose purpose is to detect events or changes in its environment.
- was a convenient way to send a message to associates or friends.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- the code of acceptable internet behavior.
- consists of a worldwide collection of electronic documents.
- the technology by which a process or procedure is performed with minimal human assistance.
- refers to information presented in non-textual forms such as video, sound, and graphics.
- the first page that a Web site displays.
- a malicious program that looks like a legitimate program.
- a communications system connecting two or more computers.
Down
- affects a computer negatively by altering the way the computer works.
- an online or internet-based illegal act.
- a process of receiving information.
- the worldwide computer network that links thousands of smaller networks.
- an online area in which users have written discussions about a particular subject.
- a real-time typed conversation that takes place on a computer.
- the appearance of motion created by displaying a series of still images in sequence.
- a type of malware that can block access to the victim's data.
- a collection of data or computer instructions that tell the computer how to work.
19 Clues: a process of receiving information. • an online or internet-based illegal act. • the first page that a Web site displays. • the code of acceptable internet behavior. • a malicious program that looks like a legitimate program. • a communications system connecting two or more computers. • consists of a worldwide collection of electronic documents. • ...
humanities geographical wordfind 2020-04-30
Across
- The elevation of a geographical location ether higher or lowr that a point.
- plants that are found in a particular area.
- The earth.
- A supply of materials, money and food/ water that people use to build and live off.
- Your attitude towards towards a point of view.
- a way of living within a group.
- The increase of the population of people living in a town or city which spill out in to nearby areas.
- Is the area of biology that deals with organisms and their surrounding.
- An extraordinary or rare occurrence or happenings
- A state that can be maintained for a designated amount of time.
Down
- Characteristics of the of an area.
- A group of people, animals or plants of the same species living in the same area.
- Describes the arrangement of housing or physical features in a area.
- connections between environments of nature and humanity that from a system.
- The research of the physical features of the earth.
- A group or system of links betweet people or things.
- The average temperature, rain fall, wind, atmospheric pressure and other meteorological elements.
- Is a place where a group of people live.
- cycle The cycle in which water moves from the land to the sky and back to earth through the processes of evaporation, condensation and precipitation.
19 Clues: The earth. • a way of living within a group. • Characteristics of the of an area. • Is a place where a group of people live. • plants that are found in a particular area. • Your attitude towards towards a point of view. • An extraordinary or rare occurrence or happenings • The research of the physical features of the earth. • ...
Digital Commerce 2021-10-06
Across
- a part of something
- a device used to enter information into a computer
- it is a free online encyclopedia
- it stands for wide area network and it connects computers over a large area
- it is a way to store digital information
- to copy and paste other people’s work and demand that you did it
- it stands for solid state drive and it use flash memory to store your data
Down
- proper manners
- it stands for central processing unit and it sends signals to control the computer
- it’s a law that gives the owner of their own work, the right to decide what other people can do with it
- to protect your networks from intruders
- it is to intrude into someone else’s privacy and to steal their information by breaking through their computer security
- commercial messages that you did not ask for
- it stands for local area network that connects computers or devices in a building
- it controls the flow of the data from one computer to another
- it stands for hard disk drive and it uses a magnetic storage to save data
- a technology that allows someone to connect a electron device to a computer
- it means that you could use something that someone else created
- it stands for random access memory and it is a memory in your computer that stores your program
19 Clues: proper manners • a part of something • it is a free online encyclopedia • to protect your networks from intruders • it is a way to store digital information • commercial messages that you did not ask for • a device used to enter information into a computer • it controls the flow of the data from one computer to another • ...
Internet Safety Crossword - Kim Chart 2025-02-26
Across
- a type of cybercrime where a criminal poses as a known person
- any criminal that involves a computer network or networked devices
- a frequently updated web page used for personal commentary or business content
- small text files that websites store on your computer to remember information about you and your browsing activity
- the international video recorded assault of individuals
- the trail data you leave when using the internet
- sending fraudulent communications that appear to come from different sources
- an online individual who uses the internet as a means to commit harassment
Down
- the practice of protecting systems networks and digital attacks
- any form of making fun or bullying someone without being in person
- settings controls available on many websites and apps to limit who can access your profile
- the act of someone causing discord online or in person
- an ideal pattern of behavior for internet users about what is acceptable
- sending you intimate or sexual content and asking you to share the same thing in return
- an image digitally altered using image editing software
- any kind of communication over the internet
- a tyoe of malware which prevents you from accessing your device and the data stored on it
- short strings of words in capital letters
- unauthorized use copying or distribution of copyrighted software
19 Clues: short strings of words in capital letters • any kind of communication over the internet • the trail data you leave when using the internet • the act of someone causing discord online or in person • an image digitally altered using image editing software • the international video recorded assault of individuals • ...
Economic Growth 2025-11-17
Across
- Physical structures like roads, railways, ports, and communication networks that support production.
- The value of exports minus imports.
- Raw materials from nature (e.g., oil, minerals) used in production.
- How optimistic firms feel about future economic conditions.
- The total value of all goods and services produced in an economy, adjusted for inflation.
- Economic activity that is not recorded or taxed, so not included in GDP.
- When people who are able and willing to work cannot find a job.
- All people who are able and willing to work.
- The value of all goods and services produced in an economy at current prices, without adjusting for inflation.
- Spending by the government on public and merit goods and wages of public employees.
- An unexpected event that reduces total supply (e.g., bad weather, oil price spike).
- An unexpected event that reduces total demand (e.g., higher interest rates, falling confidence).
Down
- Skills, education, and health of the labour force.
- Payments for which no good or service is exchanged (e.g., unemployment benefits); not included in GDP.
- Business spending on capital goods (machinery, technology) to increase production.
- An increase in the productive capacity of an economy or an increase in real GDP.
- Household spending on goods and services.
- GDP divided by the total population; an indicator of average income per person.
- A fall in total demand and GDP over time; negative economic growth.
19 Clues: The value of exports minus imports. • Household spending on goods and services. • All people who are able and willing to work. • Skills, education, and health of the labour force. • How optimistic firms feel about future economic conditions. • When people who are able and willing to work cannot find a job. • ...
IT English 1 2025-09-14
Across
- to unexpectedly meet or be faced with something or someone
- a person who designs, writes, and tests software and applications
- a professional who protects an organization's computer systems and networks from cyber threats
- a secure, digital, and decentralized record of transactions
- the skill or knowledge that a person has in a particular area
- a security specialist who simulates cyber attacks to find vulnerabilities in computer systems
- teachable abilities or specific knowledge sets, like programming or accounting
- a person who prepares technical drawings and plans for machinery, buildings, or products
Down
- to start a project or task from the very beginning
- the point where a user and a computer system interact
- a person who publicly supports or recommends a particular cause, policy, or group
- a writer who creates the text that guides users through a product, like buttons and menu labels
- giving a lot of information clearly and in a few words
- a person who introduces new methods, ideas, or products
- someone who examines, cleans, and models data to find useful information and support decision-making
- a professional who installs, maintains, and repairs electrical equipment and systems
- an engineer who designs, constructs, and programs robots and robotic systems
- people skills, help you collaborate with people
- an engineer who helps integrate and launch new software or systems for customers
19 Clues: people skills, help you collaborate with people • to start a project or task from the very beginning • the point where a user and a computer system interact • giving a lot of information clearly and in a few words • a person who introduces new methods, ideas, or products • to unexpectedly meet or be faced with something or someone • ...
haley's internet crossword puzzle 2013-03-26
Across
- a list of citations that appear at the end of a paper, article, chapter or book
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
Down
- A bully who operates online, in cyberspace; To bully online
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- To renew or revitalize; To reload a webpage on the internet
- unauthorized person who secretly gains access to computer files.
- a piece of writing that has been copied from someone else and is presented as being your own work
- tabs name for a way to display information on websites. Website tabs
8 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • unauthorized person who secretly gains access to computer files. • tabs name for a way to display information on websites. Website tabs • a list of citations that appear at the end of a paper, article, chapter or book • ...
isai jimenez internet Crossword Puzzle 2013-12-02
Across
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- An unauthorized person who secretly gains access to computer files.
- software used to view various kinds of Internet resources found on the Web.
- A bully who operates online, in cyberspace; To bully online
Down
- To renew or revitalize; To reload a webpage on the internet
- NETWORKS online communit
- a restricted computer network; a private network created using World
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software. ies where people meet, socialize
8 Clues: NETWORKS online communit • To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • a restricted computer network; a private network created using World • ...
Choice HW 2021-03-03
Across
- a group that aimed to help African Americans be physically, mentally, politically, and socially (National Association for the Advancement of Colored People)
- groups that made loans and provided legal assistance
- Liberal Mexicano, a group of Mexican Americans organizing for their own benefit (similar to the Urban League)
- Progress, the progress of equality between races (specifically black and white)
- League, a group of people dedicated to provide religious education, to help, and to defend Jewish people
Down
- Movement, a movement that denounced the idea of gradual progress
- the process of changing immigrant ways of life to that of Americans
- League, a networks of over 100 groups of black employment agencies and relief efforts to help African Americans get settled and find work
8 Clues: groups that made loans and provided legal assistance • Movement, a movement that denounced the idea of gradual progress • the process of changing immigrant ways of life to that of Americans • Progress, the progress of equality between races (specifically black and white) • ...
Jobs 2024-05-08
Across
- A person who takes care of money matters in a company, including planning, keeping records, and making financial reports.
- A designer who creates things like websites and graphics using computer software.
- Someone who makes sure that products are made correctly, on time, and within budget in a factory.
- A worker in a store who helps customers find products and buy them.
Down
- A professional who manages computer systems, helps with technical problems, and keeps computer networks safe.
- A person who leads a team to sell products or services and tries to meet sales goals.
- Someone who plans and organizes projects, manages teams, and makes sure the project finishes successfully.
- A worker who helps manage the office by doing tasks like organizing files, scheduling meetings, and supporting other staff.
8 Clues: A worker in a store who helps customers find products and buy them. • A designer who creates things like websites and graphics using computer software. • A person who leads a team to sell products or services and tries to meet sales goals. • Someone who makes sure that products are made correctly, on time, and within budget in a factory. • ...
Strategy Quiz 2024-08-08
Across
- What is the word for converting the pieces of a process into a digital format to accelerate the connection between people, processes, and technologies
- The Repositioning the Belden Brand Initiative focuses on creating a Brand strategy that conveys the "Belden of the _________"
- Orchestration, What is the word for when data is received and transported where it needs to go via integrated networks?
- How many strategic initiatives are there?
Down
- What is the word for "untapped opportunities"
- What locations are designed to create and validate solutions with customers and partners before we install them?
- To Market, Which bucket of strategic initiatives does the "Generating Revenue through Whitespace" fall into?
- Hundred Twenty, Belden has been at the forefront of innovation for how many years?
8 Clues: How many strategic initiatives are there? • What is the word for "untapped opportunities" • Hundred Twenty, Belden has been at the forefront of innovation for how many years? • To Market, Which bucket of strategic initiatives does the "Generating Revenue through Whitespace" fall into? • ...
IoT Crossword 2024-10-06
Across
- A distributed computing paradigm that brings computation and data storage closer to the location where it is needed, enhancing response times and saving bandwidth
- A set of rules for transmitting data between IoT devices
Down
- A component that takes action based on data, such as opening a valve or turning on a light.
- A technology using radio waves to identify and track objects, used in IoT systems.
- A device that detects and measures changes in the environment, sending data for processing.
- A device that connects IoT devices to the internet or local networks.
- A network of servers used to store and manage data over the internet, essential for IoT.
- A connection point in a network where data is collected or transmitted.
8 Clues: A set of rules for transmitting data between IoT devices • A device that connects IoT devices to the internet or local networks. • A connection point in a network where data is collected or transmitted. • A technology using radio waves to identify and track objects, used in IoT systems. • ...
FAKE NEWS, ΠΝΕΥΜΑΤΙΚΑ ΔΙΚΑΙΩΑΜΑΤΑ & ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2025-03-31
Across
- Είναι πιθανό να χάσετε... ή δεδομένα με την εγκατάστασή του στον υπολογιστή σας
- Η προώθηση μέσω του Διαδικτύου παράνομων αντιγράφων έργων πνευματικής ιδιοκτησίας (π.χ. μουσικής, ταινιών, ηλεκτρονικών βιβλίων, προγραμμάτων) θεωρείται...πράξη
- Έτσι ονομάζεται το δικαίωμα που αποκτά κάποιος σε ένα πρωτότυπο δημιούργημα
- Πνευματική ...είναι το σύνολο των εξουσιών που δίνει ο νόμος στον ιδιοκτήτη ενός πνευματικού έργου
Down
- Το Διαδίκτυο αποτελεί το κυριότερο μέσο διακίνησης ... λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων (peer to peer networks)
- Αφορά στην παράνομη αντιγραφή και χρήση προγραμμάτων χωρίς την άδεια του δημιουργού τους και στην παράνομη αναπαραγωγή
- Όλες οι πληροφορίες που καταχωρίζονται στο διαδίκτυο δεν είναι...
- Το ... λογισμικό συνήθως δεν ενημερώνεται με διορθωτικές εκδόσεις για την αντιμετώπιση ευπαθειών και έτσι είναι ευάλωτο σε επιθέσεις εισβολέων
8 Clues: Όλες οι πληροφορίες που καταχωρίζονται στο διαδίκτυο δεν είναι... • Έτσι ονομάζεται το δικαίωμα που αποκτά κάποιος σε ένα πρωτότυπο δημιούργημα • Είναι πιθανό να χάσετε... ή δεδομένα με την εγκατάστασή του στον υπολογιστή σας • Πνευματική ...είναι το σύνολο των εξουσιών που δίνει ο νόμος στον ιδιοκτήτη ενός πνευματικού έργου • ...
A spot-the-threat challenge with 8 hidden cybersecurity risks 2025-04-17
Across
- Software that secretly gathers information about a person or organization without their knowledge.
- A cyberattack where a person or program disitself guises as another by falsifying data to gain an advantage.
- A type of malware disguised as legitimate software that tricks users into installing it.
- Malicious software designed to harm, exploit, or disable computers and networks.
- Synthetic media in which a person in an image or video is replaced with someone else's likeness using AI.
Down
- A type of cyberattack where attackers pretend to be a trustworthy entity to steal sensitive information.
- A type of malware that locks or encrypts data and demands payment for its release.
- A network of private computers infected with malicious software and controlled as a group.
8 Clues: Malicious software designed to harm, exploit, or disable computers and networks. • A type of malware that locks or encrypts data and demands payment for its release. • A type of malware disguised as legitimate software that tricks users into installing it. • A network of private computers infected with malicious software and controlled as a group. • ...
Cs Test 2022-10-21
Across
- How long it takes for data packets to travel from one designated point to another.
- A trailer or footer refers to supplemental data (metadata) placed at the end of a block of data being stored or transmitted, which may contain information for the handling of the data block, or simply mark the block's end.
- In networking, a packet is a small segment of a larger message.
- hmmm
Down
- Packet loss occurs when one or more transmitted data packets fail to arrive at their destinations.
- Packet switching is the transfer of small pieces of data across various networks.
- In computing, a payload is the carrying capacity of a packet or other transmission data unit.
- Bandwidth is the data transfer capacity for a computer network in bits per second.
8 Clues: hmmm • In networking, a packet is a small segment of a larger message. • Packet switching is the transfer of small pieces of data across various networks. • How long it takes for data packets to travel from one designated point to another. • Bandwidth is the data transfer capacity for a computer network in bits per second. • ...
Org&Mgt 16Jan2023 2023-01-15
Across
- =current assets/current liabilities
- Employment ________ is an agreement or term of hire that is extended from an employer to
- It is the assignment of authority to another person (normally from a manager to a subordinate) to carry out specific activities.
- She/He creates and maintain brand promotions, company information, and marketing campaigns for their company across several social media networks.
Down
- It involves setting up standards of individuals and organizational performance.
- ______ control is a process by which entities review the quality of all factors involved in production.
- employee to set the terms and conditions of their employment.
- ____ chain is the actual sequence of activities that results in the production of goods and services that have values for customers.
8 Clues: =current assets/current liabilities • employee to set the terms and conditions of their employment. • It involves setting up standards of individuals and organizational performance. • Employment ________ is an agreement or term of hire that is extended from an employer to • ...
Finacle KBC24 2013-09-17
Across
- In E-banking, this process checks the accounts at regular intervals to maintain desired balance (8)
- The delay granted by banks for repayment of loan (10)
- The financial assistance given to an insured bank which is suffering a loss of earnings (7)
- The security deposit collected by bank under Murabaha Concept (6,8)
- In ATM Networks, the entity which dispenses the cash and collects transaction fee from card issuing bank (8)
- This Unix command used to get details on how many days the server is up and running (6)
- In Unix O/S, this command used to connect to a remote host (6)
Down
- The e-banking functionality provides Corporate users to upload salary payments (4,6)
- This can be called as an alias for Table, View, Sequence in Oracle (7)
- This Component is responsible for Maintaining Contra Entries in Transaction Creation (7)
- The legal status of a Person / Entity, who is not a position to repay the debts they owe (10)
- This option gives the inventory status for all users (5)
- The menu option for DSA subvention payment (7)
13 Clues: The menu option for DSA subvention payment (7) • The delay granted by banks for repayment of loan (10) • This option gives the inventory status for all users (5) • In Unix O/S, this command used to connect to a remote host (6) • The security deposit collected by bank under Murabaha Concept (6,8) • ...
Lesson 25 Vocabulary 2015-04-24
Across
- to save or transfer data to a storage device or folder to save space or organize data
- electronic communication that allows use to send and receive real time text messages from those who are online
- the space in some application windows that displays the name of an open folder or object
- a document, image, figure, or other file that you can attach to en e-mail
- text or graphics added to the end of an outgoing e-mail message
- transmission of electronic messages over networks
- e-mail software provided with Windows Vista
Down
- using a ell phone or other mobile device to send and receive written messages
- the unique address used to send e-mail to someone
- a list of e-mail addresses you can use to send the same message to a group
- unsolicited e-mail that is sent to many people at the same time to promote products and services
- a software application installed on a local PC, network, or Web
- a list of e-mail addresses you can use to send the same message to a group
- when an e-mail is sent and broken down into smaller chunks
14 Clues: e-mail software provided with Windows Vista • the unique address used to send e-mail to someone • transmission of electronic messages over networks • when an e-mail is sent and broken down into smaller chunks • text or graphics added to the end of an outgoing e-mail message • a software application installed on a local PC, network, or Web • ...
1.1-1.2 vocab 2022-09-06
Across
- the use of computers to simulate a real or imagined environment that appears as a three-dimensional
- involves reducing electricity consumed and environmental waste generated when using technology
- Alarm clocks, coffeemakers, thermostats, streetlights, navigation systems, and much more
- descriptive text added to an object, such as a picture or drawing
- the technological use of logic and prior experience to simulate human intelligence
Down
- the gap between those who have access to technology and those who not
- stores data on a chip instead of a magnetic stripe
- an environment where processors are embedded in every product imaginable, and these things communicate with one another via the Internet or wireless networks.
- the use of technology by a companies employees
- technology uses audio output to describe the contents of the screen
- a computer that functions as one component in a larger product
- a type of VR that uses an image of an actual place or thing and adds digital information to it
- a freestanding booth usually placed in a public area that can contain a display device
13 Clues: the use of technology by a companies employees • stores data on a chip instead of a magnetic stripe • a computer that functions as one component in a larger product • descriptive text added to an object, such as a picture or drawing • technology uses audio output to describe the contents of the screen • ...
11 General BME 2025-07-02
Across
- those a person wants to avoid being associated with.
- one of four psychological factors influencing purchasing decisions.
- Network naturally forming networks of employees or other business related entities casually forming outside of the business.
- refers to the quantity of a good or service that producers are willing and able to offer at various price levels.
- skimming an example of the marketing mix
- individuals or groups that a person wishes to compare with
- of ethics the set of rules and expectations for the business that states the ethical principles staff are expected to have and the values of the workplace culture.
- the quantity of a good or service that consumers are willing and able to purchase at various price levels
Down
- attributes of the consumer population such as gender, income levels and age
- is an example of the marketing mix
- Share The percentage of a market controlled by a particular company or product.
- trader exclusive owner of the business
- Mix the strategic framework of the 4P's used to plan and executive the marketing plan
13 Clues: is an example of the marketing mix • trader exclusive owner of the business • skimming an example of the marketing mix • those a person wants to avoid being associated with. • individuals or groups that a person wishes to compare with • one of four psychological factors influencing purchasing decisions. • ...
Global Gridlock 2025-07-05
Across
- The use of violence and intimidation by non-state actors, often targeting civilians, to achieve political goals
- The analytical framework underpinning discussions on maritime strategy, energy corridors, and alliances.
- India’s Cold War doctrine, reinterpreted as a form of “issue-based alignment” in the modern context.
- India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack
- Temporary halt in fighting, often during negotiations
- A tax imposed on imports or exports to regulate trade and generate revenue. (6 letters)
Down
- A concept linked to India’s defense diplomacy and strategic posture, especially in border and nuclear policy.
- Describes the emerging global order with several power centers like BRICS, EU, and the US.
- Penalties imposed by countries or international bodies to influence a nation’s behavior, often through trade or financial restrictions.
- A high-level diplomatic meeting of heads of state. (6 letters)
- Involving or affecting two sides, especially two countries. (9 letters)
- An economic and geopolitical bloc central to India’s global strategy.
- Warfare A modern form of warfare involving attacks on a country's digital systems and networks
13 Clues: Temporary halt in fighting, often during negotiations • A high-level diplomatic meeting of heads of state. (6 letters) • An economic and geopolitical bloc central to India’s global strategy. • Involving or affecting two sides, especially two countries. (9 letters) • India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack • ...
Intro to Cybersecurity Vocabulary 2025-10-14
Across
- set of security controls designed to protect payment account security such as credit or debit card transactions
- protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- crime committed over the internet
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- set of best practice recommendations for information security management
- unique skills for a specific area
- attempt to steal, damage or destroy information on a device or computer system
- individual who participates in hacking
- abilities needed to communicate and work with others
- prevents a user from accessing a system
- act of skirting or breaking through security boundaries
13 Clues: unique skills for a specific area • crime committed over the internet • individual who participates in hacking • prevents a user from accessing a system • abilities needed to communicate and work with others • act of skirting or breaking through security boundaries • set of best practice recommendations for information security management • ...
communication system in canada 2014-01-13
Across
- a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio.
- stated that the world is becoming a global village
- is the physical transfer of data over a point-to-point or point-to-multipoint communication sysytem
Down
- a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
- idea that the world is becoming like one large of improvements in communication
- is the transfer of information from one place to another
- a device that receives television signals and reproduces them on a screen.
7 Clues: stated that the world is becoming a global village • is the transfer of information from one place to another • a device that receives television signals and reproduces them on a screen. • idea that the world is becoming like one large of improvements in communication • ...
α2ομαδα5 2021-03-22
Across
- Εκτός από την παραβίαση των δικαιωμάτων πνευματικής ιδιοκτησίας των δημιουργών λογισμικού, το παράνομο λογισμικό είναι πιθανό να βλάψει σοβαρά τον υπολογιστή μας
- ονομαζεται... προστασιας η αλλιως firewall
- τους χρησιμοποιουμε για να κρατησουμε τα αρχεια μας ασφαλη
Down
- μπορουμε να παρουμε τετοιες απο σαιτ οπως η (βικιπαιδια)
- άλλα άτομα μπορούν να συνδεθούν με τον υπολογιστή του και να ξεκινήσουν να παίρνουν το αρχείο (δηλαδή να κάνουν download). Το αρχείο που είχε αρχικά ο seeder, μοιράζεται στα άτομα σε κομμάτια. (αγγλικά με ελληνικούς χαρακτήρες)
- αυτο αποτελεί το κυριότερο μέσο διακίνησης πειρατικού λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων(peer to peer networks).
- Το παράνομο λογισμικό μπορεί να είναι μολυσμένο με κακόβουλο λογισμικό
7 Clues: ονομαζεται... προστασιας η αλλιως firewall • μπορουμε να παρουμε τετοιες απο σαιτ οπως η (βικιπαιδια) • τους χρησιμοποιουμε για να κρατησουμε τα αρχεια μας ασφαλη • Το παράνομο λογισμικό μπορεί να είναι μολυσμένο με κακόβουλο λογισμικό • ...
fintech 2024-03-05
Across
- digitally distributed, decentralized, public ledger that exists across a network
- type of technology that is considered environmentally friendly based on its production process or its supply chain
- the practice of protecting systems, networks, and programs from digital attacks
Down
- utilization of technology, for example, big data and artificial intelligence(AI), to offer an alternative to conventional wealth management firms
- the use of technology innovations to bring in savings and efficiency to the insurance industry model
- management of regulatory monitoring, reporting, and compliance within the financial industry through technology
- any payments that involve technology, such as paying bus fare with a QR code or tapping a mobile phone on a credit card reader
7 Clues: the practice of protecting systems, networks, and programs from digital attacks • digitally distributed, decentralized, public ledger that exists across a network • the use of technology innovations to bring in savings and efficiency to the insurance industry model • ...
Computer network puzzle 2023-02-07
Across
- two or more devices connected together to create a computer network
- an established set of rules that determine how data is transmitted between different devices in the same network
- a set of physical or network devices that are essential for interaction and communication between hardware units operational on a computer network.
Down
- a node that broadcasts data to every computer or Ethernet-based device connected to it.
- a physical or virtual appliance that passes information between two or more packet-switched computer networks.
- a computer-based application for the exchange of messages between users
- These cables are essentially the carrier or media through which data flows.
7 Clues: two or more devices connected together to create a computer network • a computer-based application for the exchange of messages between users • These cables are essentially the carrier or media through which data flows. • a node that broadcasts data to every computer or Ethernet-based device connected to it. • ...
Social Network Theory 2025-06-09
Across
- any social group a person can be involved with
- he was the first to use sociograms to conduct research on social networks
- a theory built on “relationships between and among individuals and how the nature of those relationships influences beliefs and behavior”
Down
- this is a diagram that can show the connections between a network of people
- social network theory doesn’t work well for mass groups of people, but it does work in these
- Social Network was first theorized in small villages in this country in the 1950’s
- this does not play much of a role in SNT as it is about the the influence of relationships
7 Clues: any social group a person can be involved with • he was the first to use sociograms to conduct research on social networks • this is a diagram that can show the connections between a network of people • Social Network was first theorized in small villages in this country in the 1950’s • ...
Stay Compliant: Crossword Challenge 2024-08-23
Across
- 8. A program that was established to identify & manage potential risk associated with third party
- 2. Any information that when used alone or combine with other information, identifies an individual
- 5. Lilly’s code of business conduct
Down
- 7. The best practice when receiving email from external party
- 1. The practice of manipulating people to gain confidential information through deception
- 3. Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites
- 4. Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
- 6. Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity
8 Clues: 5. Lilly’s code of business conduct • 7. The best practice when receiving email from external party • 1. The practice of manipulating people to gain confidential information through deception • 8. A program that was established to identify & manage potential risk associated with third party • ...
Find the Terms to Re-energize the Crystals 2025-03-01
Across
- ____ capital refers to social and community networks and the resources that can be accessed through them.
- ____ capital is the knowledge and skills learned by communities of color over generations of resistance to inequity and oppression.
- ___capital is about the knowledge, learning, and practices that are nurtured through kinship and extended family.
- _____ capital refers to multilingualism and other communication skills, including storytelling traditions, art, music, and poetry.
Down
- ____ capital includes the knowledge and resiliency to navigate oppressive and marginalizing systems.
- A framework that focuses on ones strengths in a nontraditional sense
- The last name of the a University of California, Riverside researched whose framework is often highlighted at the UCI College Corps Biweekly Training
- ___capital is about the hopes, dreams, and aspirations that parents pass on to their youth.
8 Clues: A framework that focuses on ones strengths in a nontraditional sense • ___capital is about the hopes, dreams, and aspirations that parents pass on to their youth. • ____ capital includes the knowledge and resiliency to navigate oppressive and marginalizing systems. • ...
fake news/Πνευματικά δικαιώματα/Πειρατεία λογισμικού 2025-03-31
Across
- Ο Παγκόσμιος Ιστός έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε...
- Εκτός από την παραβίαση των δικαιωμάτων πνευματικής ιδιοκτησίας των δημιουργών λογισμικού, το.... λογισμικό είναι πιθανό να βλάψει σοβαρά τον υπολογιστή σας.
- Το... αποτελεί το κυριότερο μέσο διακίνησης πειρατικού λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων (peer to peer networks).
Down
- Σε περιπτώσεις που δεν γίνεται ρητή αναφορά σε πνευματικά δικαιώματα καλό είναι να αναφέρουμε τις... μας.
- Η πειρατεία λογισμικού αφορά στην παράνομη αντιγραφή και χρήση ... χωρίς την άδεια του δημιουργού
- Πνευματικό... είναι το δικαίωμα που αποκτά κάποιος πάνω σε ένα πρωτότυπο πνευματικό δημιούργημα
- οι περισσότεροι...περιέχουν αναλυτική αναφορά στην πνευματική τους ιδιοκτησία..
- Πολλές πληροφορίες δεν είναι μόνο αναληθείς ή εσφαλμένες, αλλά μπορεί να είναι και
8 Clues: οι περισσότεροι...περιέχουν αναλυτική αναφορά στην πνευματική τους ιδιοκτησία.. • Πολλές πληροφορίες δεν είναι μόνο αναληθείς ή εσφαλμένες, αλλά μπορεί να είναι και • Ο Παγκόσμιος Ιστός έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε... • Πνευματικό... είναι το δικαίωμα που αποκτά κάποιος πάνω σε ένα πρωτότυπο πνευματικό δημιούργημα • ...
Think 4, Page 50 2021-05-16
Across
- shell that protects your device of damage
- a piece of equipment that you wear over your ears with a part you can speak into, connected to a telephone or radio
- a piece of equipment or software that finds the best way of sending information between any two networks
Down
- electrical cable that temporarily connects an appliance to the mains electricity supply via a wall socket or extension cord
- an object that allows you to connect two pieces of equipment of different types or sizes
- device connected to a computer that produces images that can be seen on a website
- an object used for connecting a piece of equipment to an electricity supply
- a piece of equipment used for providing a battery with electricity
8 Clues: shell that protects your device of damage • a piece of equipment used for providing a battery with electricity • an object used for connecting a piece of equipment to an electricity supply • device connected to a computer that produces images that can be seen on a website • ...
Cloud Computing Crossword 5 2022-06-13
Across
- Software...networking. The ability to manage networking configuration of a virtualization infrastructure directly from the hypervisor stack.
- In a packet-switched networ, this is the time from the source sending a packet to the destination receiving it.
- Software whose use is allowed without functional restrictions but with a time limit imposed.
- A IP networking concept which virtually isolates networks and create discrete broadcast domains at OSI layer 2.
- Zero... A series of security architectures and best practices for securing on-premises and the cloud.
Down
- The act of creating source or machine code that is difficult for humans to understand.
- The act of segregating an IPv4 network to smaller network segments
- Software to automate the management and configuration of any infrastructure or application at
8 Clues: The act of segregating an IPv4 network to smaller network segments • The act of creating source or machine code that is difficult for humans to understand. • Software whose use is allowed without functional restrictions but with a time limit imposed. • Software to automate the management and configuration of any infrastructure or application at • ...
Networking terminologies 2023-04-18
Across
- A device that connects multiple devices together in a network and forwards data between them.
- A computer or device that provides services or resources to other devices on a network.
- A network that covers a small geographic area, such as a home, office, or school.
- A set of rules that governs the communication between devices on a network.
Down
- A system that translates domain names (like google.com) into IP addresses so that devices can communicate with each other.
- A security device that filters incoming and outgoing network traffic to protect the network from unauthorized access.
- A group of interconnected devices or computers that communicate with each other.
- A device that connects two or more networks together and routes traffic between them.
8 Clues: A set of rules that governs the communication between devices on a network. • A group of interconnected devices or computers that communicate with each other. • A network that covers a small geographic area, such as a home, office, or school. • A device that connects two or more networks together and routes traffic between them. • ...
CS Month Week 1 2023-09-14
Across
- A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.
8 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data. • ...
Malware Crossword 2024-10-06
Across
- a helical device or component
- a communication method that uses electronic devices to deliver messages across computer networks
- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
- a type of malware that downloads onto a computer disguised as a legitimate program
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
5 Clues: a helical device or component • a type of malware that downloads onto a computer disguised as a legitimate program • a communication method that uses electronic devices to deliver messages across computer networks • software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system • ...
Mesh Wifi 2020-05-09
Across
- What is the name of the device that an ISP (Internet Service Provider) uses to connect a home to the web?
- What broadcasts the internet signal from the modem to the wireless devices within a home?
- Mesh Wi-Fi ____ connections offer customers a consistent, speedy connection for any sized home.
- Mesh Wi-Fi Networking is designed to be ____ so it can fit any home.
Down
- With traditional networks, the signal strength ____ the further you’re away from the wireless node (router).
- Any device that transmits and/or receives a wireless signal is known as a network ___.
6 Clues: Mesh Wi-Fi Networking is designed to be ____ so it can fit any home. • Any device that transmits and/or receives a wireless signal is known as a network ___. • What broadcasts the internet signal from the modem to the wireless devices within a home? • Mesh Wi-Fi ____ connections offer customers a consistent, speedy connection for any sized home. • ...
Technology vocabulary 2021-03-16
Across
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- a facial expression represented by a sequence of characters
- the activity of converting data or information into code
- the symbolic arrangement of data in a computer program
- the exclusive right to sell a work
- crime committed using a computer and the internet
- put into a format that can be read or processed by computers
- something reduced in volume to its full volume
- decompress
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- transfer a file or program to a smaller computer
- a worldwide network of computer networks
- a listing of the computer files stored in memory
- science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- set up for a particular purpose
- transfer out of a database or document
- locate and correct errors in a computer program
- an organized body of related information
- a short line of text that a web site puts on your computer's hard drive when you access the web site
21 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • a worldwide network of computer networks • transfer out of a database or document • an organized body of related information • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
Name that PersonalitIE 2021-10-21
Across
- Father of modern probability;
- Pioneer of quality control.
- He wrote Toyota Production System: Beyond Large-Scale Production.
- Concepts of SMED, mistake-proofing, and "zero quality control"
- Chief financial officer of both Facebook and YouTube as well as the senior vice president and treasurer of Yahoo.
- Developer of AHP (Analytic Hierarchy Process) method in decision making;
- Invented the fields of traffic engineering; created the field of telephone networks analysis
- Earned a BS in Industrial Engineering and fourth CEO of Walmart
- Developed simple graphs that would measure performance while visually showing projected schedules.
- Father of modern assembly lines used in mass production
- First female professor in the engineering school and Mother of Modern Management
- Father of Scientific Management; the founder of modern 'Time Study
Down
- One of the founders of modern study of sociology and public administration; major works deal with rationalization in sociology of religion and government
- Development of the Simplex Algorithm
- One of the most influential researchers in the fields of Operations Research and Discrete Applied Mathematics.
- One of the founders of the field of Computer Simulation; pioneer in the field of Operations research
- Father of Systematic Planning; He was the original developer of relationship chart (REL-CHART)
- Founded Expedia within Microsoft and became company’s president & CEO
- published his seminal work on fuzzy sets in 1965,
19 Clues: Pioneer of quality control. • Father of modern probability; • Development of the Simplex Algorithm • published his seminal work on fuzzy sets in 1965, • Father of modern assembly lines used in mass production • Concepts of SMED, mistake-proofing, and "zero quality control" • Earned a BS in Industrial Engineering and fourth CEO of Walmart • ...
Emerging Technology vocabulary 2023-10-12
Across
- mobile device that allows users to take pictures and store the photographed images digitally.
- a mobile phone that performs many of the functions of a computer
- content on a storage medium that you can use in case the original is lost, damaged
- Thin, lighter weight mobile computer that has a touch screen, usually smaller than a laptop but larger than a phone.
- A mobile computing device designed for video games
- the electronic data stored on a computer or other device and generates a hard copy
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks
- A electronic device, operating under the control of instructions stored in its own memory
Down
- A hardware component that conveys information with people
- A personal computer designed to be in a stationary location
- contain text, graphics, audio, and video.
- A worldwide collection of electronic documents
- Term used to refer collectively to hard disks and SSDs.
- Thin, lightweight mobile computer with a screen in its lid and a keyboard in its base
- Software that enables users with an Internet connection to access and view webpages on devices
- a set of related web pages located under a single domain name
- the faculty by which the mind stores and remembers information
- A personal computer designed to be in a stationary location
- the programs and other operating information used by a computer
- collection of computers and mobile devices connected together
20 Clues: contain text, graphics, audio, and video. • A worldwide collection of electronic documents • A mobile computing device designed for video games • Term used to refer collectively to hard disks and SSDs. • A hardware component that conveys information with people • A personal computer designed to be in a stationary location • ...
Geography crossword puzzle 2022-07-04
Across
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is the term for pollution caused primarily by unnecessary honking?
- What is the pollution caused by fuel storage tank leakage into rivers?
- What are the advantages of going to a city called?
- What is the environment where people live on farms and villages called?
- What is the pollution caused by the increased use of LEDs?
- What is poor air quality affecting half the world’s urban population called?
- What is the term for the increase in the proportion of people living in cities?
- What job opportunities are called?
- What is the movement of people from rural to urban areas called?
- refers to our surroundings and can either be physical or human.
- Consist of living and non-living things that are found naturally.
Down
- What is a physical area on the Earth’ surface called?
- What is the number of people living in a unit area of land called?
- What is the state of the environment that has not been influenced by humans?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the name of a physical area on the earth's surface?
- surface runoff caused by melting snow.
- What are the disadvantages of going to a city called?
- What is a built up area called?
- What is the primary source of pollution caused by the use of fuelwood and paraffin for cooking and heating?
21 Clues: What is a built up area called? • What job opportunities are called? • surface runoff caused by melting snow. • What are the advantages of going to a city called? • What is a physical area on the Earth’ surface called? • What are the disadvantages of going to a city called? • What is the pollution caused by the increased use of LEDs? • ...
Crossword Puzzle 2023-01-10
Across
- - Name the sculpture created by David Mach in 1997 to celebrate the Darlington's railway heritage.
- - What is the busiest train station in the world, with 3.5 million passing through its doors every day?
- - Which famous Russian writer died at a railway station in 1910?
- - Which herbivorous mammal did America's first steam locomotive lose a race to?
- - What is the UKs longest single train route that runs for 785 miles or 1,263km?
- - What Scottish village was Glasgow Central built over?
- - Name the fuel used to power 19th century American steam locomotives.
- - What is one of the most inter-connected underground networks in the world more commonly known as?
- - which country has no railway network?
- - Which train ran on the world's first inter-city rail line?
Down
- - In which Scottish city would you find Waverly station?
- - Name the underground railway built in 1863 to ease traffic congestion.
- - In which European city is Gard du Nord?
- - Name the oldest train station in Scotland that's still in operation.
- - In 1934, which train became the official first steam locomotive to reach 100mph?
- - Name the shortest railway line in England
- - The first underground railway was constructed in which city in 1863?
- - Which country has the longest railway tunnel?
- - Which 1998 film starring Gwyneth Paltrow shows two different paths the protagonist can take if they catch a train or not?
19 Clues: - which country has no railway network? • - In which European city is Gard du Nord? • - Name the shortest railway line in England • - Which country has the longest railway tunnel? • - What Scottish village was Glasgow Central built over? • - In which Scottish city would you find Waverly station? • - Which train ran on the world's first inter-city rail line? • ...
Opportunities and Challenges of Urban Growth in Lagos 2025-06-23
Across
- Harm to the environment caused by waste, traffic and factories.
- Access to hospitals and clinics is often better in urban areas than in rural ones.
- An effect where investment leads to more jobs, income and spending.
- A social challenge that often increases in areas with high unemployment.
- Unregulated jobs like street vending or shoe-shining that many rely on.
- The sector that includes manufacturing and processing, which grows in urban centres.
- An illegal housing area built by people without formal planning or access to basic services.
- One of the main pull factors for people migrating to cities.
- Slums, access to resources and services, unemployment, pollution, and congestion
- A problem in slums where many people live in a small space.
Down
- When people are willing and able to work but can’t find jobs.
- Urban growth increases access to schools, colleges and universities.
- Social (health, education, water, energy) and Economic (industrial growth)
- Safe disposal of waste and access to toilets – often lacking in informal settlements.
- Large gaps in income, access to services and living conditions between people.
- A major challenge in fast-growing cities where rubbish collection can’t keep up.
- Access to piped or treated water improves in growing cities.
- Urban areas are more likely to have electricity networks than rural areas.
- Traffic build-up caused by rapid urban growth and poor infrastructure.
19 Clues: A problem in slums where many people live in a small space. • Access to piped or treated water improves in growing cities. • One of the main pull factors for people migrating to cities. • When people are willing and able to work but can’t find jobs. • Harm to the environment caused by waste, traffic and factories. • ...
Cyber security 2021-11-05
Across
- They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
- pretending to be a genuine organisation to get someone's details.
- a virus that usually come embedded within another file that looks genuine.
Down
- horse malware that is disguised as a genuine file that gives hackers access to a computer.
- engineering the art of tricking or manipulation to get someone to reveal their personal info.
5 Clues: pretending to be a genuine organisation to get someone's details. • a virus that usually come embedded within another file that looks genuine. • horse malware that is disguised as a genuine file that gives hackers access to a computer. • engineering the art of tricking or manipulation to get someone to reveal their personal info. • ...
networking concepts 2025-06-15
Across
- this is usedto connect all computers in a network with each other
- this enables you to connect to your computer to the available internet connection over the existing telephone lines
- this is used to physically attach a computer to a network
Down
- this is a device that connects two different types of networks with each other
- this is a layout in which various components of a network are connected and communicate with each other
5 Clues: this is used to physically attach a computer to a network • this is usedto connect all computers in a network with each other • this is a device that connects two different types of networks with each other • this is a layout in which various components of a network are connected and communicate with each other • ...
test 2024-08-22
Across
- local search is classified under local search algorithms and is commonly applied in scenarios where the goal is to identify the optimal solution from a set of possible solutions.
- AWS tool that prioritize data protection
- is a model that refers to the process of linking the abstract concepts in the model to real world entities.
Down
- form the basis for comprehension and generation within generative AI, like GPT, when processing text.
- is the core architectural framework that GPT-4 utilizes for processing and generating text
- Generative AI works through the use of neural networks, specifically
6 Clues: AWS tool that prioritize data protection • Generative AI works through the use of neural networks, specifically • is the core architectural framework that GPT-4 utilizes for processing and generating text • form the basis for comprehension and generation within generative AI, like GPT, when processing text. • ...
Lesson 2 2024-02-13
Across
- The art of writing or solving codes to secure digital information.
- The practice of protecting computers, networks, programs, and data from unauthorized access or attacks, which often relies on cryptographic methods.
- The process of converting information into a code to prevent unauthorized access.
Down
- A fundamental aspect of cryptography aimed at protecting the confidentiality of digital communications and information.
- A technique for ensuring data integrity by converting information into a fixed-size string of characters.
5 Clues: The art of writing or solving codes to secure digital information. • The process of converting information into a code to prevent unauthorized access. • A technique for ensuring data integrity by converting information into a fixed-size string of characters. • ...
Ethernet Standards 2025-10-17
4 Clues: Improved Ethernet offering speeds of up to 100 Mbps. • This was the original standard, offering speeds of up to 10 Mbps. • Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs. • Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
Combat Support 2024-10-16
Across
- Supports commanders and staff in gaining situational understanding of threats, terrain, weather, and civil considerations
- Protects the force/nation from MWD and CBHN threats and hazards
Down
- Supports unified land operations from stable peace to major decisive action consisting of lethal or nonlethal engagement against the wide range of threats
- Installs, operates, maintains, secures, and defends the Army's portion of the Department of Defense information networks and communication security
- Plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations
- Responsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance
6 Clues: Protects the force/nation from MWD and CBHN threats and hazards • Plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations • Responsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance • ...
Tourism Industry and Hospitality Sector 2024-10-08
Across
- Natural, cultural, and man-made attractions, such as museums, parks, historical sites, theme parks, and zoos, that tourists visit.
- These are the networks, press, advertisers, and advocacy groups
- Includes labor unions, labor-management councils, service providers, cooperatives, and contractors
- Includes travel agents, tour operators, and online platforms that help plan, arrange, and sell travel experiences.
Down
- This sector involves accommodation and F&B outlets
- The sector with responsibilities carried out by agencies and bodies at local, regional, and national levels including policy-making and implementation among others.
- This sector is a specialized niche of group tourism that is focused on organizing, booking, and facilitating events for large groups.
- These are educational institutions and organizations involved in teaching, researching, and developing talent related to tourism and hospitality management.
8 Clues: This sector involves accommodation and F&B outlets • These are the networks, press, advertisers, and advocacy groups • Includes labor unions, labor-management councils, service providers, cooperatives, and contractors • Includes travel agents, tour operators, and online platforms that help plan, arrange, and sell travel experiences. • ...
CSAM Week #3 2024-10-10
Across
- _____ Breach is an incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
- A small text file sent to your browser by a website. This is also a term for a baked snack.
- A generic term for a number of different types of malicious code.
- ______ fraud is a form of theft in which a transaction, typically financial, is performed by an attacker impersonating someone else.
- A communication link between systems or networks that is typically encrypted in order to provide a secured pathway of communication.
Down
- Use a ______ password for each app and website.
- A gold mine of information hackers can use to trick you and your co-workers.
- _____ over links can provide insight into their true destination.
8 Clues: Use a ______ password for each app and website. • _____ over links can provide insight into their true destination. • A generic term for a number of different types of malicious code. • A gold mine of information hackers can use to trick you and your co-workers. • A small text file sent to your browser by a website. This is also a term for a baked snack. • ...
Online safety 2021-08-11
Across
- a set of related web pages located under a single domain name, typically produced by a single person or organization
- a set of related web pages located under a single domain name, typically produced by a single person or organization
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- things used to protect something or someone from accessing something
- content that portrays good values or interesting information
- a program built into a search engine to prohibit expilicit content
- a person under the ages of 18
- the act of agreeing or accepting an act or behaviour
- safety he saftey of a person whilst on the internet
- mode airplane or flight mode is used to restrict access to some online services.
Down
- a software put on a device that limits content, usually inappropriate or harmful.
- Good habits are acts that bennifit a person or person's
- areas that are used by everyone
- they appear in a place or situation unexpectedly
- the act of watching and looking over something
- the act of doing something by yourself
- websites and applications that enable users to create and share content or to participate in social networking.
- the act of aggresion or assult perpertrated online
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the amount of time spent on a device
20 Clues: a person under the ages of 18 • areas that are used by everyone • the amount of time spent on a device • the act of doing something by yourself • the act of watching and looking over something • they appear in a place or situation unexpectedly • the act of aggresion or assult perpertrated online • the act of agreeing or accepting an act or behaviour • ...
Technology 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is a commonly used method of lossy compression for digital images
- is a mobile operating system
- is the most important processor in a given computer.
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- are small blocks of data created by a web server
Down
- is the protection of computer systems and networks
- is a method of transmitting and receiving messages using electronic devices
- is a hardware or software component
- is an American multinational technology company
- is a collection of discrete values that convey information
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
- is a file format developed by Adobe
- is a bitmap image format that was developed by a team at the online services provider CompuServe
- is a form of computer memory that can be read and changed in any order
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
19 Clues: is a mobile operating system • is a mapping from some domain • is a hardware or software component • is a file format developed by Adobe • is an American multinational technology company • are small blocks of data created by a web server • is the protection of computer systems and networks • is the most important processor in a given computer. • ...
AP World 2025-11-02
Across
- A inn for travelers across the major trade routes that gave place to rest, eat, and water animals.
- Moroccan travelor who documented his journey from the Islamic world to Asia
- Of significance important in the African world, could transport and store goods across the Saharan Desert which increased trade
- A major city of the early north american civilation
- A group of people who moved seasonally to different locations
- Am early chinese credit system, early variation of paper money
- major hubs of the indian oceans, welcomed all settlers
- Traditional wooden sailing vesselwith lanteen sails
- A chinese admiral the led 7 major expiditions and fostered trade networks in the process
- Use of siege technolodgies and tactics used by the mongols
- A wide trade network that spanned across all of Eurasia
Down
- Group of people/travelors who settle into another country/region and adapt to their culture
- Ruler of Mali, known for his immmense wealth.
- Renewal of Confusianism that includes ideas from Buddhism and Daoist
- A network of stations established to communicate rapidly throughout the Mongol empire.
- Originally temple used for Hindu but later used for Buddhism
- First ruler of the Mongol Empire, originally named Temujin
- A Indian dynaasty that ruled Java and SouthEast parts of Asia
- A major center of trade, scholarship and culture in West Africa
19 Clues: Ruler of Mali, known for his immmense wealth. • A major city of the early north american civilation • Traditional wooden sailing vesselwith lanteen sails • major hubs of the indian oceans, welcomed all settlers • A wide trade network that spanned across all of Eurasia • First ruler of the Mongol Empire, originally named Temujin • ...
Technology vocabulary 2021-03-16
Across
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- a facial expression represented by a sequence of characters
- the activity of converting data or information into code
- the symbolic arrangement of data in a computer program
- the exclusive right to sell a work
- crime committed using a computer and the internet
- put into a format that can be read or processed by computers
- something reduced in volume to its full volume
- decompress
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- transfer a file or program to a smaller computer
- a worldwide network of computer networks
- a listing of the computer files stored in memory
- science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- set up for a particular purpose
- transfer out of a database or document
- locate and correct errors in a computer program
- an organized body of related information
- a short line of text that a web site puts on your computer's hard drive when you access the web site
21 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • a worldwide network of computer networks • transfer out of a database or document • an organized body of related information • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
Technology vocabulary 2021-03-16
Across
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- a facial expression represented by a sequence of characters
- the activity of converting data or information into code
- the symbolic arrangement of data in a computer program
- the exclusive right to sell a work
- crime committed using a computer and the internet
- put into a format that can be read or processed by computers
- something reduced in volume to its full volume
- decompress
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- transfer a file or program to a smaller computer
- a worldwide network of computer networks
- a listing of the computer files stored in memory
- science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- set up for a particular purpose
- transfer out of a database or document
- locate and correct errors in a computer program
- an organized body of related information
- a short line of text that a web site puts on your computer's hard drive when you access the web site
21 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • a worldwide network of computer networks • transfer out of a database or document • an organized body of related information • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
Digital Commerce 2021-10-06
Across
- a part of something
- a device used to enter information into a computer
- it is a free online encyclopedia
- it stands for wide area network and it connects computers over a large area
- it is a way to store digital information
- to copy and paste other people’s work and demand that you did it
- it stands for solid state drive and it use flash memory to store your data
Down
- proper manners
- it stands for central processing unit and it sends signals to control the computer
- it’s a law that gives the owner of their own work, the right to decide what other people can do with it
- to protect your networks from intruders
- it is to intrude into someone else’s privacy and to steal their information by breaking through their computer security
- commercial messages that you did not ask for
- it stands for local area network that connects computers or devices in a building
- it controls the flow of the data from one computer to another
- it stands for hard disk drive and it uses a magnetic storage to save data
- a technology that allows someone to connect a electron device to a computer
- it means that you could use something that someone else created
- it stands for random access memory and it is a memory in your computer that stores your program
19 Clues: proper manners • a part of something • it is a free online encyclopedia • to protect your networks from intruders • it is a way to store digital information • commercial messages that you did not ask for • a device used to enter information into a computer • it controls the flow of the data from one computer to another • ...
Name that PersonalitIE 2021-10-21
Across
- erlang invented the fields of traffic engineering; created the field of telephone networks analysis
- One of the founders of the field of Computer Simulation; pioneer in the field of Operations research
- deming Pioneer of quality control.
- Developer of AHP (Analytic Hierarchy Process) method in decision making;
- Father of Systematic Planning; He was the original developer of relationship chart (REL-CHART)
- published his seminal work on fuzzy sets in 1965,
- Chief financial officer of both Facebook and YouTube as well as the senior vice president and treasurer of Yahoo.
- Father of modern probability;
- Earned a BS in Industrial Engineering and fourth CEO of Walmart
- ford Father of modern assembly lines used in mass production
Down
- Developed simple graphs that would measure performance while visually showing projected schedules.
- First female professor in the engineering school and Mother of Modern Management
- One of the most influential researchers in the fields of Operations Research and Discrete Applied Mathematics.
- Development of the Simplex Algorithm
- barton Founded Expedia within Microsoft and became company’s president & CEO
- He wrote Toyota Production System: Beyond Large-Scale Production.
- One of the founders of modern study of sociology and public administration; major works deal with rationalization in sociology of religion and government
- Concepts of SMED, mistake-proofing, and "zero quality control"
- Father of Scientific Management; the founder of modern 'Time Study
19 Clues: Father of modern probability; • deming Pioneer of quality control. • Development of the Simplex Algorithm • published his seminal work on fuzzy sets in 1965, • ford Father of modern assembly lines used in mass production • Concepts of SMED, mistake-proofing, and "zero quality control" • Earned a BS in Industrial Engineering and fourth CEO of Walmart • ...
Online safety 2021-08-11
Across
- the act of agreeing or accepting an act or behaviour
- they appear in a place or situation unexpectedly
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the act of doing something by yourself
- websites and applications that enable users to create and share content or to participate in social networking.
- areas that are used by everyone
- a software put on a device that limits content, usually inappropriate or harmful.
- a set of related web pages located under a single domain name, typically produced by a single person or organization
Down
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- safety he saftey of a person whilst on the internet
- the amount of time spent on a device
- Good habits are acts that bennifit a person or person's
- things used to protect something or someone from accessing something
- a program built into a search engine to prohibit expilicit content
- content that portrays good values or interesting information
- the act of watching and looking over something
- a person under the ages of 18
- the act of aggresion or assult perpertrated online
- mode airplane or flight mode is used to restrict access to some online services.
- a set of related web pages located under a single domain name, typically produced by a single person or organization
20 Clues: a person under the ages of 18 • areas that are used by everyone • the amount of time spent on a device • the act of doing something by yourself • the act of watching and looking over something • they appear in a place or situation unexpectedly • the act of aggresion or assult perpertrated online • safety he saftey of a person whilst on the internet • ...
Online safety 2021-08-11
Across
- mode airplane or flight mode is used to restrict access to some online services.
- content that portrays good values or interesting information
- a person under the ages of 18
- areas that are used by everyone
- a software put on a device that limits content, usually inappropriate or harmful.
- a set of related web pages located under a single domain name, typically produced by a single person or organization
- things used to protect something or someone from accessing something
- the act of agreeing or accepting an act or behaviour
- the act of aggresion or assult perpertrated online
Down
- a program built into a search engine to prohibit expilicit content
- a set of related web pages located under a single domain name, typically produced by a single person or organization
- they appear in a place or situation unexpectedly
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- the act of watching and looking over something
- Good habits are acts that bennifit a person or person's
- the amount of time spent on a device
- the act of doing something by yourself
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- websites and applications that enable users to create and share content or to participate in social networking.
- safety he saftey of a person whilst on the internet
20 Clues: a person under the ages of 18 • areas that are used by everyone • the amount of time spent on a device • the act of doing something by yourself • the act of watching and looking over something • they appear in a place or situation unexpectedly • the act of aggresion or assult perpertrated online • safety he saftey of a person whilst on the internet • ...
Newsletter 2023 Q4 Crossword Puzzle 2023-11-08
Across
- Member of management or delegate who has primary responsibility for the business function supported by a system, application
- Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- Concerning ransomware, a user or organization's critical data is made inaccessible
- Operations Risk Management Committee
- Leader of a business unit with responsibility for implementing department level operating procedures
- Any staff member who maintains security controls on behalf of an Owner
- A kind of software used to prevent, scan, detect and delete viruses from a computer
Down
- TEAMS channel for up to date security notices
- Security Operating Policy
- Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- Minimizing the harm of a particular risk
- Month of CAM
- Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- One of two useful Security Awareness TEAMS channels
- Any staff member who oversees data recovery
- Number of years Catalyst has been a CAM Champ
- Pertaining to a strong p, used to reduce vulnerability in the event of a hack
19 Clues: Month of CAM • Security Operating Policy • Operations Risk Management Committee • Minimizing the harm of a particular risk • Any staff member who oversees data recovery • TEAMS channel for up to date security notices • Number of years Catalyst has been a CAM Champ • One of two useful Security Awareness TEAMS channels • ...
Information system exam 2023-03-02
Across
- a computer program or device that provides a service to another computer program and its user, also known as the client.
- Be very skeptical of change
- one of the main type of inforation system
- physical aspects of technology.
- the ability to conceive, develop, deliver, and scale new products, services, processes, and business models for customers
- Convert analog data into digital form /0 and 1/, so that it can be stored, processed and transmitted by a computer.
- Technology Acceptance Model
- a type of software system that helps organizations automate and manage core business processes for optimal performance.
- the programs that are needed to accomplish the input, processing, output, storage, and control activities of information systems
- a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
- change model that is a simple and easy-to-understand framework to humanize the change management process.
- an awareness and understanding of a set of information and the ways that information can be used to support a specific task or reach a decision
Down
- the redesign of business processes
- an integral part of strategic planning for many businesses today
- a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
- having the ability to store and access data and programs over the internet instead of on a hard drive.
- most valuable information system.
- structure of coordination between the activities of the organization
- a type of innovation
- the raw fact
20 Clues: the raw fact • a type of innovation • Be very skeptical of change • Technology Acceptance Model • physical aspects of technology. • most valuable information system. • the redesign of business processes • one of the main type of inforation system • an integral part of strategic planning for many businesses today • ...
Spinal Nerves 2024-08-28
Across
- the ____ horn of grey matter contains somatic motor neurons (efferent)
- the ____ horn of grey matter conveys sensory/afferent information
- the area of the spinal cord that contains myelinated axons
- the germ layer that spinal nerves are derived from via the neural tube
- spinal nerve TN2 exits ___ to the T2 vertebra
- the fibers found within the ventral (anterior) root from the gray matter of spinal cord and carry information from the CNS to the muscles of the body
- ____ nerves arise from the spinal cord via two roots, the ventral (anterior) and dorsal (posterior)
- the number of pairs of spinal nerves
- group of cell bodies in the peripheral nervous system
- Cervical nerve 1 (CN1) exits ___ to the first cervical vertebra
- a defined group of muscles innervated by a single spinal nerve root
Down
- the small posterior and large anterior ___ are branches of mixed spinal nerves that carry both sensory and motor fibers
- ___ matter contains cell bodies in the spinal cord
- sensory information from a specific area of skin
- the spinal nerves are part of the ____ nervous system
- ___ root carries sensory fibers from organs and other parts of the body to the posterior horn of gray matter in the spinal cord
- networks of intersecting nerves
- bundle of axons in the peripheral nervous system
- sensory fibers that carry information from the periphery to the CNS
- ___ spinal nerve is the combination of ventral and dorsal nerve roots with both sensory and motor information
20 Clues: networks of intersecting nerves • the number of pairs of spinal nerves • spinal nerve TN2 exits ___ to the T2 vertebra • sensory information from a specific area of skin • bundle of axons in the peripheral nervous system • ___ matter contains cell bodies in the spinal cord • the spinal nerves are part of the ____ nervous system • ...
Nathanie's word puzzle 2023-09-12
Across
- transfer a file or program to a smaller computer
- transfer out of a database or document
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- set up for a particular purpose
- the activity of converting data or information into code
- something reduced in volume to its full volume
- an organized body of related information
- a facial expression represented by a sequence of characters
Down
- crime committed using a computer and the internet
- the exclusive right to sell a work
- a listing of the computer files stored in memory
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- locate and correct errors in a computer program
- a worldwide network of computer networks
- put into a format that can be read or processed by computers
- (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- the symbolic arrangement of data in a computer program
20 Clues: set up for a particular purpose • the exclusive right to sell a work • transfer out of a database or document • a worldwide network of computer networks • an organized body of related information • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
Data Transmission - IGCSE 2022-10-25
Across
- a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
- the part of a data packet that indicates the end of the data packet and cyclic redundancy check error check
- data that arrives at the destination with the bits no longer synchronised
- the part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets
- device that enables data packets to be moved between different networks
- a small part of a message/data that is transmitted over a network
Down
- data that can be sent in both directions at the same time (simultaneously)
- data that can be sent on one direction only
- the actual data being carried in a data packet
9 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • a small part of a message/data that is transmitted over a network • device that enables data packets to be moved between different networks • data that arrives at the destination with the bits no longer synchronised • ...
REACH PUZZLE 2023-04-26
Across
- How many AI Cohorts are running in Learning Program
- How many pillars in REACH Program
- in REACH 'C' stands for ?
Down
- techNxt program is associated to which Pillar ?
- program that teaches the know-how of writing a technical or white paper.
- which pillar of the REACH program engages with talent by inviting them to SAP Labs India and providing them with an opportunity to understand the SAP culture and ethos.
- What is the name of the partner institute for the program AI for product management
- Bidirectional knowledge exchange between SAP and Academia through sessions driven by SAP experts and industry thought leaders on topics relevant to SAP solution area as well as Industry perspective
- which pillar of the REACH program is to provide certification programs to enable colleagues to be future-ready.
- Program will mobilize students across certain universities with the help of alumni networks of employees.
10 Clues: in REACH 'C' stands for ? • How many pillars in REACH Program • techNxt program is associated to which Pillar ? • How many AI Cohorts are running in Learning Program • program that teaches the know-how of writing a technical or white paper. • What is the name of the partner institute for the program AI for product management • ...
technology 2023-10-12
Across
- electronic device, which operates under the control of instructions stored in its own memory
- A worldwide collection of computer networks that connects millions of businesses, government agencie
- Thin, lighter weight mobile computer that has a touch screen, usually smaller than a laptop but larger than a phone.
- It is Internet-compatible and usually also includes a calendar, appointment book, address book, etc.
- Thin and light mobile computer with a screen on the lid and a keyboard on the base, designed to fit on your lap.
Down
- A worldwide collection of computer networks that connects millions of businesses, government agencie
- Electronic components that store instructions waiting to be executed and the data needed by those instructions
- A mobile device that allows users to take pictures and store the photographed images digitally.
- A collection of computers and mobile devices connected together, often wirelessly
- mobile computing device designed for single-player or multiplayer video games.
10 Clues: mobile computing device designed for single-player or multiplayer video games. • A collection of computers and mobile devices connected together, often wirelessly • electronic device, which operates under the control of instructions stored in its own memory • A mobile device that allows users to take pictures and store the photographed images digitally. • ...
WotD 2023-11-05
Across
- Capable of being maintained or continued over the long term without harming the environment or depleting resources.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- To bring about a complete change in something, typically in a significant and dramatic way.
Down
- The use of largely automatic equipment and systems in various processes, reducing the need for human intervention.
- Introducing or using new ideas, methods, or equipment.
5 Clues: Introducing or using new ideas, methods, or equipment. • To bring about a complete change in something, typically in a significant and dramatic way. • The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. • ...
Cyber Security 2024-03-25
Across
- Security systems designed to prevent unauthorized access to or from a private network.
- Networks of hijacked computer devices used to carry out various scams and cyber attacks.
- A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
6 Clues: Security systems designed to prevent unauthorized access to or from a private network. • Networks of hijacked computer devices used to carry out various scams and cyber attacks. • Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system. • ...
EOCT Vocab Crossword 2015-05-05
Across
- Used to measure storage space
- Logic Statements used in programming that uses terms such as "if, then..." or "if, else"
- Programming "Plug and Place" coding; "Sissy Programming"; Helps people get into programming; to make money you have to set up actual programming
- 1,000,000
- Use Act / It allows exceptions to the rule
- Working from home full or part time
- Developers Work on the back end of the site, writing the code that allows the website to function
- 1,000,000,000
- Law States that the number of transistors on a processor chip doubles about every two years; Gordon Moore came up with this law in 1965; co-founder of INTEL
Down
- Refers to the spelling and grammar of a programming language; Every language has it's own syntax rules (especially with the symbols)
- 1000
- Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH
- 100,000
- Used to measure processor speed
- Chart It is a "storyboard" of logical thinking placed on paper or computer program; It helps programmers think
- Formula or set for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point
- Commons License Offers some protection
- Numbers; Math 0 and 1 are the only two numbers computers recognize
- Computing Storing your information online; you are basically giving up your private rights by sharing.
19 Clues: 1000 • 100,000 • 1,000,000 • 1,000,000,000 • Used to measure storage space • Used to measure processor speed • Working from home full or part time • Commons License Offers some protection • Use Act / It allows exceptions to the rule • Numbers; Math 0 and 1 are the only two numbers computers recognize • Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH • ...
EOCT Crossword for Mr. Gerrell 2015-05-06
Across
- Developers Work on the back end of the site, writing the code that allows the website to function
- 1000
- Formula or set for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point
- Commons License Offers some protection
- Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH
- Law States that the number of transistors on a processor chip doubles about every two years; Gordon Moore came up with this law in 1965; co-founder of INTEL
- Chart It is a "storyboard" of logical thinking placed on paper or computer program; It helps programmers think
- Used to measure processor speed
- 1,000,000
Down
- Refers to the spelling and grammar of a programming language; Every language has it's own syntax rules (especially with the symbols)
- Numbers 0 and 1 are the only two numbers computers recognize
- Used to measure storage space
- Working from home full or part time
- Programming "Plug and Place" coding; "Sissy Programming"; Helps people get into programming; to make money you have to set up actual programming
- Logic Statements used in programming that uses terms such as "if, then..." or "if, else"
- Computing Storing your information online; you are basically giving up your private rights by sharing.
- 100,000
- Designers Work on the front end of a site, or, the part that users can see and interact
- Use Act It allows exceptions to the rule
- 1,000,000,000
20 Clues: 1000 • 100,000 • 1,000,000 • 1,000,000,000 • Used to measure storage space • Used to measure processor speed • Working from home full or part time • Commons License Offers some protection • Use Act It allows exceptions to the rule • Numbers 0 and 1 are the only two numbers computers recognize • Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH • ...
CS Principles 2022 2022-04-22
Across
- Metadata stores _____ concerning larger data to increase convenience.
- JPG Images use this type of compression.
- Rogue Access points allow for ________ access into secure networks.
- All protocols used in the Internet are _____.
- Algorithms with _______ efficiency are said to run in reasonable time.
- A system that is able to handle failure and still function is called fault-________.
- Open _____ programs can be redistributed and modified freely.
- Some data types include lists, ______, strings, and numbers.
Down
- The bandwidth of a computer is the ________ amount of data that can be sent in a fixed amount of time.
- This type of problem has the goal of finding the best solution.
- Every algorithm can be broken down into three parts: sequencing, ________, and iteration.
- This type of routing allows for the scalability of the internet:
- Analog data is used to store values that have ______ changes.
- If you put 5 cans of beans into a box designed to hold 4 cans of beans, that is an example of a(n) _________ error.
- A heuristic approach produces a solution that is not guaranteed to be _______ but is "good enough" for the situation.
- This type of key encryption uses one key for both encryption and decryption.
- Dividing by zero is an example of this type of error.
- This protocol is more popular for video calls and streams.
- Bandwidth is measured in ______ per second.
19 Clues: JPG Images use this type of compression. • Bandwidth is measured in ______ per second. • All protocols used in the Internet are _____. • Dividing by zero is an example of this type of error. • This protocol is more popular for video calls and streams. • Some data types include lists, ______, strings, and numbers. • ...
Crossword Topic 7 2021-06-30
Across
- any type of network with a high capacity to transport information that affects its transmission speed.
- It is one that presents a discontinuous variation over time and that can only take certain discrete values.
- It is a local type network whose computers do not need to be linked by cables to connect.
- It consists of various electronic devices connected to exchange and share information and resources.
- is a device that offers a Wi-Fi connection, which is usually connected to a modem
- it is a type of twisted pair cable and can run CDDI and can transmit data at 100Mbps.
Down
- it does not use cables to receive and send messages.
- device used to emit or receive radio waves.
- global network of computer networks that allow the free exchange of information among all its users.
- enables data transmission between computers communicating over a basic telephone line or other data lines.
- links computers that are in a small physical space, such as an office or building.
11 Clues: device used to emit or receive radio waves. • it does not use cables to receive and send messages. • is a device that offers a Wi-Fi connection, which is usually connected to a modem • links computers that are in a small physical space, such as an office or building. • it is a type of twisted pair cable and can run CDDI and can transmit data at 100Mbps. • ...
TTL 2021-08-24
Across
- using more than one medium of expression or communication
- is an online journal where posted information from teachers and students are arranged
- a massive network of networks; a networking infrastructure
- is an episodic series of spoken word digital audio files that a user can download to a personal device for easy listening
- used in application of knowledge
Down
- programs and other operating information used by a computer
- the overall process of invention, innovation and diffusion of technology or processes
- refers to the proficiency in applying technological resources to achieve instructional goals in a given teaching
- a small mechanical or electronic device or tool, especially an ingenious or novel one
- an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web
- is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users
11 Clues: used in application of knowledge • using more than one medium of expression or communication • a massive network of networks; a networking infrastructure • programs and other operating information used by a computer • the overall process of invention, innovation and diffusion of technology or processes • ...
Hardware Vocabulary 2023-03-06
Across
- A computer hardware component that connects a computer to a computer network.
- A network security device that monitors and filters incoming and outgoing network traffic.
- Used to connect a LAN to another LAN.
- A device that forwards data packets to the appropriate parts of a computer network.
- A hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
- Required if there are multiple wired connections on the network.
Down
- A box that connects your home network to your internet service provider, or ISP.
- Provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
- A computer that sits between different networks or applications.
- A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
- A combination transmitter/receiver in a single package.
11 Clues: Used to connect a LAN to another LAN. • A combination transmitter/receiver in a single package. • A computer that sits between different networks or applications. • Required if there are multiple wired connections on the network. • A computer hardware component that connects a computer to a computer network. • ...
Network 2018-02-20
Across
- Address How your device can be located
- designed for end-users, to access resources such as files, songs, video collections, or some other service
- Service Provider an organization that provides services for accessing, using, the Internet
- the arrangement of the various elements of a computer network.
- a computer that provides other computers access as to shared peripherals, programs, or databases
Down
- a combination of wireless and fidelity, is defined as a wireless local network that uses radio waves to connect to the Internet
- a type of cable wiring used in telecommunications that relays data from individual computers to a larger network mainframe.
- a bundle of data transmitted as a unit
- Name Server a naming system for computers, services, or any resource connected to the Internet or a private network.
- formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network
- a networking device that forwards data packets between computer networks.
11 Clues: Address How your device can be located • a bundle of data transmitted as a unit • the arrangement of the various elements of a computer network. • a networking device that forwards data packets between computer networks. • Service Provider an organization that provides services for accessing, using, the Internet • ...
