networks Crossword Puzzles
Crossword 7 2018-02-15
Across
- The first robot to receive citizenship of any country.
- WLAN stands for ____ Local Area Network.
- A software which is specifically designed to disrupt, damage, or gain authorized access to a computer system.
- Android 4.1.
- A networking device that forwards data packets between computer networks.
- Second Generation Computer are made of?
- A program for converting instructions written in low-level symbolic code into machine code.
- A function used with Twitter and other services that give a post or tweet a keyword.
Down
- A general-purpose, imperative programming language that is especially suited to numeric computation and scientific computing.
- MAC addresses are made up of ______ numbers(digits).
- A light sensitive device that converts drawing, printed text or other images into digital form is?
- Family of personal computers designed, manufactured, and sold by Apple Inc.
- It consists of black squares arranged in a square grid on a white background.
- The reproducing sound the CD audio player uses___.
- What is the most common tool used to restrict access to a computer system?
- _________ is the measurement of things such as fingerprints and retinal scans used for security access.
- The __ is a standardized outline of an HTML document.
- A set of communications protocols used on the Internet.
- An Operating system developed by Linus Torvalds.
- An auxiliary memory from which high-speed retrieval is possible.
20 Clues: Android 4.1. • Second Generation Computer are made of? • WLAN stands for ____ Local Area Network. • An Operating system developed by Linus Torvalds. • The reproducing sound the CD audio player uses___. • MAC addresses are made up of ______ numbers(digits). • The __ is a standardized outline of an HTML document. • The first robot to receive citizenship of any country. • ...
Chapter 20 – The Lymphatic System and Lymphoid Organs and Tissues 2013-08-05
Across
- The thymus forms as an outgrowth of the lining of the primitive _________.
- Lymph flow stagnates in the lymph node since there are fewer ________ lymphatic vessels
- Lymphoid tissues strategically located in mucous membranes throughout the body
- Once interstitial fluid enters the lymphatic vessels, it is called __________.
- The lymphoid organs develop from mesodermal __________ cells.
- Prominent in newborns, this organ is where T lymphocytes mature
- Form a ring of lymphoid tissue around the entrance to the pharynx
- Elaborate networks of drainage vessels that collect the excess protein-containing interstitial fluid and return it to the bloodstream
- Infected lymph nodes that are swollen and tender to the touch
- Anything that promotes an immune response, such as bacteria, viruses, or cancer cells
Down
- Largest lymphoid organ
- Paired, largest tonsils located at the end of the oral cavity and the ones most often infected
- ___________ phagocytize foreign substances and help activate T cells
- Tubular offshoot of the large intestine
- Main warriors of the immune system that arise from red bone marrow
- Cells that capture antigens and bring them back to the lymph nodes
- Special set of lymphatic capillaries that transport absorbed fat from the small intestine to the bloodstream
- Tonsil at the base of the tongue
- Tonsil also referred to as the adenoids if enlarged, located in posterior wall of the nasopharynx
- Lymph enters the lymph nodes via the __________ lymphatic vessels
20 Clues: Largest lymphoid organ • Tonsil at the base of the tongue • Tubular offshoot of the large intestine • The lymphoid organs develop from mesodermal __________ cells. • Infected lymph nodes that are swollen and tender to the touch • Prominent in newborns, this organ is where T lymphocytes mature • Form a ring of lymphoid tissue around the entrance to the pharynx • ...
Chapter 9 2014-12-04
Across
- (Families) High in conversation and high in conformity.
- (Consciousness) A clear sense of "we-ness" of togetherness.
- Someone who behaves in a supportive, encouraging, and helpful manner.
- (Love) Experienced as a game, for fun.
- Share a basic belief system and philosophy of life.
- (Convergence) As a relationship between two people begin to develop, they share their networks of communications.
- Someone who introduces you to new ideas and new ways of seeing the world and helps you to expand your world view.
- (Love) Focuses on beauty and physical attractiveness.
- Includes children, relatives, and assorted significant others.
Down
- (Love) Extreme highs and lows.
- Stress their individuality
- interpersonal relationship between two persons that is mutually productive and characterized by mutual positive regard.
- (Love) Practical and seeks a relationship that will work.
- (Families) High in conformity, low in conversation
- Someone who does nothing to hurt you or to emphasize or call attention to your inadequacies or weaknesses.
- Someone who will affirm your personal value and help you recognize your attributes.
- live together, but view their relationship more as a matter of convenience than a result of their mutual love or closeness.
- (Love) Lacks passion and intensity
- Someone who may have special talents skills or resources that will help you achieve your specific goals and needs.
- (Love) Compassionate, ego less, self giving love.
20 Clues: Stress their individuality • (Love) Extreme highs and lows. • (Love) Lacks passion and intensity • (Love) Experienced as a game, for fun. • (Love) Compassionate, ego less, self giving love. • (Families) High in conformity, low in conversation • Share a basic belief system and philosophy of life. • (Love) Focuses on beauty and physical attractiveness. • ...
SAT vocab 2021-02-10
Across
- a scarcity or lack or something
- He hid in the closet in fear of what would come with his father’s _____.
- lacking significance through having been overused
- petty; worthless
- lack of experience, wisdom, or judgment; the opposite of wisdom
- The baby has ______ grip.
- Networks connected a _____ of computers
- In a forcive, passionate, intense manner
- school; boring
- He was a _______, solitary boy.
- Karen was ______ after being told to wear a mask.
- present, appearing, or found everywhere; omnipresent; universal
- regard with disgust and hatred; detest; hate; loathe; despise
- acting and showing care and thought for the future
- A ______ series of murders.
- knowing everything; all-knowing
- angry and bitter; vitriolic; rancorous; nasty
Down
- a shimmering ______ bubble.
- The _________ weapons are now displayed in a museum.
- My grandma is _______, and deserves respect.
- The purchaser should avoid asking for _______ information.
- arrogant or pompous
- to praise
- a duty of responsibility
- There are a number of _______ in the present system
- God is described as _______ and benevolent.
- wicked or criminal; evil; heinous
- The witch hazels are the ________ of spring.
- The new girl in class is somewhat of a milquetoast.
- to make (an unpleasant feeling) less intense; to relieve; ease; alleviate
- She should be _______ in victory.
- _______ grenades
- without the basic necessities of life
- _______ people are often stubborn and annoying.
- characterized by bitterness
35 Clues: to praise • school; boring • petty; worthless • _______ grenades • arrogant or pompous • a duty of responsibility • The baby has ______ grip. • a shimmering ______ bubble. • characterized by bitterness • A ______ series of murders. • a scarcity or lack or something • He was a _______, solitary boy. • knowing everything; all-knowing • wicked or criminal; evil; heinous • ...
Global Tapestry Vocab 2021-08-21
Across
- when a small group of people rule the government political system where a country is administered and regulated
- an object that is made by a human being from earlier in time
- belief in one god
- political system based upon the undivided sovereignty or rule of a single person
- an organized system of beliefs
- series of networks that connected China to the far East
- system where people are ranked above each other
- a succession of rulers of the same line of descent
- a complex human society, usually made up of different cities
- very small country made up of one city
- to bring into use in ones own country
- country ruled by religious leaders
Down
- branch of knowledge that deals with the creation and use of technical means
- when people learned to farm
- when people make decisions through voting
- A process where laborers focused on one specialty area
- government by a relatively small privileged class
- one that affects the people in more than one
- believing in many gods
- a worker who practices a trade or handicraft
- a major political unit having a territory of great extent or a number of territories or peoples under a single sovereign authority especially
- when people elect representatives to make desicions
- creation of written laws
- when culture spreads to other places
- heirarchy specifically in India
25 Clues: belief in one god • believing in many gods • creation of written laws • when people learned to farm • an organized system of beliefs • heirarchy specifically in India • country ruled by religious leaders • when culture spreads to other places • to bring into use in ones own country • very small country made up of one city • when people make decisions through voting • ...
IT 2021-10-27
Across
- allows you to store or retrieve information
- designed to be small enough and light enough to be used on your lap.
- screen that displays information such as text, numbers, and pictures.
- the brain of your computer Also called the tower or hard drive.
- gives you information from the computer in printed form.
- designed to be used on a desktop but still small enough to be portable
- a set of instructions that tells the computer what to do
- Program that allows you to create, edit, and print text documents
- electronic filing system
- A system of computers, peripherals, terminals, and databases connected by communication lines.
- software the controls the operation of the whole computer system
Down
- hardware that allows your computer to communicate with the user
- a computer designed to be used on a desktop.
- An electronic device that receives data, processes data, stores data, and produces a result
- Numbered Rows and Lettered Columns Intersection of a row and column is a cell
- system that performs a specific task.
- hardware that allows you to communicate with your computer.
- Physical Parts of the computer
- he use of audio, video, animation, or graphics.
- allow you to hear voice, music, and other sounds from your computer.
- connects your computer to the Internet
- result
- Electronic information networks that carry audio, video, and computer data.
23 Clues: result • electronic filing system • Physical Parts of the computer • system that performs a specific task. • connects your computer to the Internet • allows you to store or retrieve information • a computer designed to be used on a desktop. • he use of audio, video, animation, or graphics. • gives you information from the computer in printed form. • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
vocabulary unit 3 2021-11-17
Across
- is a box whit presents
- is when you like something more than something else
- is when you are part of something
- is when you do something perfectly
- is someting wat dou you need before enter in a work
- is when you accept the consequence or idea
- is when you do something
- It is an Agreement or conformity in something of all the people who belong to a community.
- is a place to you study
- Large group of bees, flies or other insects, especially when they go to a place.
- is when a lot of person go to live in a nother country
- is a armeshion
- Group of domestic livestock animals, especially quadrupeds, that walk together.
- is when you let someone get something
Down
- function by coordinating conjunction,
- is a group of people
- is when a person goes to live in another country
- is when you comunicate whit the hans
- Large group of domestic livestock animals, especially sheep, that are raised together.
- Fleeting meeting of a group of people in a public place to carry out a specific action, generally vindictive, that has been agreed through social networks.
- is a Orderly set of rules and procedures
- capacited to do a accion o funcion
- is someone who tells them what to do
- is when you enter a something
24 Clues: is a armeshion • is a group of people • is a box whit presents • is a place to you study • is when you do something • is when you enter a something • is when you are part of something • is when you do something perfectly • capacited to do a accion o funcion • is when you comunicate whit the hans • is someone who tells them what to do • function by coordinating conjunction, • ...
Colin's Body Systems and Homeostasis crossword Puzzle 2022-03-10
Across
- system that controls reproduction
- a complex network of glands and organs.
- any of the minute blood vessels that form networks throughout the bodily tissues
- involves the secretions of enzymes throughout your digestive tract.
- An organ that makes one or more substances, such as hormones, digestive juices, sweat, tears, saliva, or milk.
- what your body does to keep yourself in survivable conditions
- system of our body that controls what we feel
- the tendency toward a relatively stable equilibrium between interdependent elements, especially as maintained by physiological processes.
- any of the tubes forming part of the blood circulation system of the body, carrying in most cases oxygen-depleted blood toward the heart.
- single muscle cells
- system used to turn food into energy
- combination of cells that have the ability to contract
Down
- a substance that effects the way you behave
- system that consist of the bones in an organisms body
- any of the muscular-walled tubes forming part of the circulation system by which blood is conveyed from the heart to all parts of the body.
- the system that circulates blood and lymph through the body,
- sum of all systems in a human body
- when food is broken down by processes that are not chemical in origin.
- system that allows you to breathe
- system that rids waste from the body
20 Clues: single muscle cells • system that controls reproduction • system that allows you to breathe • sum of all systems in a human body • system used to turn food into energy • system that rids waste from the body • a complex network of glands and organs. • a substance that effects the way you behave • system of our body that controls what we feel • ...
Security 2022-03-27
Across
- Is a database of computers, users, and services.
- Ensures the integrity of a message.
- A type of asset for an organization.
- Software developed by cybercriminals to perform malicious acts.
- Type of malware where communications are intercepted.
- This needs to be done to your computer when it's left unattended.
- Using this method is a way to protect data.
- Type of malware where a removable device is left in a public place for someone to use and infect their machine.
- A feature that detects phishing websites.
- In order to use this feature in Windows, TPM must be enabled.
- Typically distributed by downloading online software.
Down
- This needed to be updated in order for its anti-malware software to work.
- A mode that allows users to browse the web anonymously.
- A set of objectives to ensure the security of a network.
- Type of malware where the attacker alters packet contents.
- Is a type of lock in Windows that needs a pre-paired device.
- Pretending to need personal information to confirm someone's identity.
- This minimizes traffic from overwhelming a website so manufacturers distribute files for download to multiple sites.
- Prevents unwanted traffic from going into internal networks.
- The most common type of computer malware.
- Can be found in high-security environments.
- A type of lock that needs a key that is separate from the door handle.
22 Clues: Ensures the integrity of a message. • A type of asset for an organization. • The most common type of computer malware. • A feature that detects phishing websites. • Using this method is a way to protect data. • Can be found in high-security environments. • Is a database of computers, users, and services. • Type of malware where communications are intercepted. • ...
test 2022-04-27
Across
- is equal to 1,000 Terabytes.
- the smallest unit of data in a pc
- engineer a software program that helps people find the information they are looking for online using keywords or phrases.
- programs to calculate
- storage Hard disk
- 1111
- is the component of the computer that holds
- audio
- to redraw the image information from memory
- architecture the structure of an internal structure in a computer
- running multiple applications at once
- a unit of information equal to one million
- bits half a byte
- RAM and ROM
- four binary digits or half of an eight-bit byte
Down
- one of a small set of data holding places that are part of the computer processor.
- the name of a website on the internet
- coding
- a software add-on that is installed on a program, enhancing its capabilities.
- 1000 bytes
- random access memory
- solid state storage device
- an individual who uses computer, networking or other skills to overcome a technical problem.
- needs instructions
- the action of looking through drives, shares, and folders on a computer for a file.
- a message warning the recipients of a non-existent computer virus threat.
- digital junk mail
- fuses electrical engineering and computer science to develop new technology
- error or failure in a program
- memory is the component that computer holds
- ram
31 Clues: ram • 1111 • audio • coding • 1000 bytes • RAM and ROM • digital junk mail • storage Hard disk • needs instructions • random access memory • programs to calculate • bits half a byte • solid state storage device • is equal to 1,000 Terabytes. • error or failure in a program • the smallest unit of data in a pc • the name of a website on the internet • running multiple applications at once • ...
Tech Terms 1,2, and 3 2022-05-09
Across
- a system software that manages computer hardware, software resources, and provides common services for computer programs
- hypertext markup language
- converts data to a digital format to a format suitable for an analog such as a telephone or radio
- malicious software
- Firefox and Google Chrome
- hardwired to the internet(usually a blue cord)
- Internet protocol address
- holds everything together
- taking something off the internet and moving it onto your computer
- web log(online journal)
- 8 bits
- Open source software
- eBooks and songs
- experiencing something that is real on virtual
- a computer that performs a service
- a method by which information is turned into code
Down
- 0s and 1s
- one million bytes
- monitors incoming and outgoing network traffic based on predetermined security rules
- World Wide Web
- Duck Duck Go and Safari
- the process of which a running computer system is restarted
- Ctrl P
- domain name system
- read only memory
- Portable document format
- pieces of code that got onto your computer
- forwards data packets to computer networks
- Ctrl V
- a bunch of computers linked together
- Ctrl C
- the process of starting a computer
- stores all of your information in a computer
- Computer Processing unit
- 0s and 1s
- random access memory
- Uniform resource locator
- personal identifiable information
38 Clues: Ctrl P • Ctrl V • 8 bits • Ctrl C • 0s and 1s • 0s and 1s • World Wide Web • read only memory • eBooks and songs • one million bytes • malicious software • domain name system • Open source software • random access memory • Duck Duck Go and Safari • web log(online journal) • Portable document format • Computer Processing unit • Uniform resource locator • hypertext markup language • Firefox and Google Chrome • ...
Crossword puzzle 2022-08-24
Across
- avoidance of potential ...... is important
- the chemical engineer must never lose sight of the practical limitations involved in a.....
- the principal function of most ...... audits in the past has been to verify the adequancy of safety equipment and rules.
- steam and ..... requirements are higher in plant
- ..... location is final geographic location of industry.
- the minimum concentration of fuel in air required for ignition at ambient temp. is known as the .....
- the time value of money has been integrated into investment evaluation system by means of......
- the last general design task is to establish correct ...... and piping layouts.
- In ..... chemical reaction propagates at supersonic velocity
Down
- the hazard and operability study is known as......
- generation of the maximal structure corresponding to the maximal reaction network with Algorithm.......
- a qualitative flow ....... is important for a plant design
- In Hazop study quantitave decrease is called as a word .....
- Fault tree analysis is also called .....
- it is a small scale replica of final plant.
- most separation process results in ...... product streams
- a measure of the ability of a waste component to consume the oxygen desolved in water is known as .....
- one measure of profitability is often used is the...
- generation of solution structure corresponding to the combinatorially feasible reaction networks as the solution structure with algorithm.....
- the characteristic of proposed land is known as ...... characteristic
20 Clues: Fault tree analysis is also called ..... • avoidance of potential ...... is important • it is a small scale replica of final plant. • steam and ..... requirements are higher in plant • the hazard and operability study is known as...... • one measure of profitability is often used is the... • ..... location is final geographic location of industry. • ...
Vocabulary Unit 5-10 2023-09-03
Across
- Reliability
- Rapid increase in numbers
- the use of exciting or shocking stories or language at the expense of accuracy, in order to provoke public interest or excitement.
- tendency to believe things too quickly or easily
- A precise sequence of instructions for processes that can be executed by a computer
- a practical joke; a trick
- Honesty
- Our love affair with technology; enthusiasm for technology
- Having to do with morals, values, right and wrong
- To ban or cover some of the information
- An improvement of an existing technological product, system, or method of doing something.
- A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
- A technique that is used to make a process automatic.
Down
- Incorporating misleading information into one's memory of an event
- not supported or proven by evidence
- Protection of computer systems, networks, and data from digital attacks.
- A new idea, method, or device
- having or revealing keen insight and good judgment
- A technique or device that examines a fingerprint, voice pattern, or the iris or retina of the eye.
- working the body harder than it is normally worked
- the quality of being believable or trustworthy
- the use of digital technologies to change a business model and provide new revenue or value
- Willingness to take credit and blame for actions.
- the right of people not to reveal information about themselves
24 Clues: Honesty • Reliability • Rapid increase in numbers • a practical joke; a trick • A new idea, method, or device • not supported or proven by evidence • To ban or cover some of the information • the quality of being believable or trustworthy • tendency to believe things too quickly or easily • Having to do with morals, values, right and wrong • ...
Know Your STEPN 2024-02-21
Across
- Needed to create a new sneaker
- An action that can increase base stats
- To get high-level mystery boxes you need a lot of...
- You will get it for your merits
- Break 5 to get 1
- To give a sneaker to a friend you need to do…
- Better than green
- Better than gray
- Top quality sneaker for today
- When moving to 25...HP will be restored
- Affects the wear of the sneaker
- Internal wallet
- Need to start earning
- Special sneaker for gold coins
- Where can you buy or sell
Down
- Needed to save HP
- Gem color to reduce wear
- Gem color to increase mystery box level
- Silver coins
- Sneaker for fast walking
- App move and earn money
- The simplest sneaker
- Golden coins
- Breeding sneakers
- It is advisable if the wear of the sneaker is more than 50%
- From it a sneaker is born
- Start code
- It greatly increases the stats of the sneaker
- A sneaker with which you need to move quickly
- Affects earnings of silver coins
- You don't have to rush with him
- To move more time you need...
- Gem color to increase gold coin production
- Sneaker with short number
- Gem color to increase silver coin production
- One of the application networks
36 Clues: Start code • Silver coins • Golden coins • Internal wallet • Break 5 to get 1 • Better than gray • Needed to save HP • Breeding sneakers • Better than green • The simplest sneaker • Need to start earning • App move and earn money • Gem color to reduce wear • Sneaker for fast walking • From it a sneaker is born • Sneaker with short number • Where can you buy or sell • Top quality sneaker for today • ...
lesson 24 vocab 2016-04-19
Across
- converts analog signals to digital.
- a device that joins multiple computers together.
- a worldwide system composed of thousands of smaller networkers.
- provides connection speeds more than 30 times faster than dial-up
- a type of network
- is a fiber-optic telephone line.
- describes a software architectural model relationship.
- special software or hardware to protect companies from external networks.
- designed for people with in an organization
- is a software program.
- each device on a network, they usually share different hardware.
- when all computers are equal.
- acts like a switch board through a firewall.
Down
- designed to provide network control.
- can include telephone systems, fiber optics, satellites, microwaves and etc.
- supports telephone service.
- examines fingerprints, voice patterns, retina of the eye to gain access to secure data.
- allows users outside of the organization to access internal information systems.
- is a recent wireless technology that can deliver maximum speeds up to 7mbps to your cell phone, etc.
- Is an internet connection technology that transfers information to a computer at a high speed.
- connects personal computers.
- what connects WANs
- uses coaxial cable to send the recieved data.
- a variation of LAN that uses no wires.s
- a computer that handles request for data, email, file transfers, and other network services from other computers.
- are people who can break into computer systems to steal services and information
26 Clues: a type of network • what connects WANs • is a software program. • supports telephone service. • connects personal computers. • when all computers are equal. • is a fiber-optic telephone line. • converts analog signals to digital. • designed to provide network control. • a variation of LAN that uses no wires.s • designed for people with in an organization • ...
Living in the I.T. Era 2019-11-10
Across
- is a digital representation of nontext information.
- includes music, speech, or any other sound.
- is the code of acceptable internet behavior.
- is a worldwide collection of networks that links millions of businesses, government, agencies, educational institutions, and individuals.
- is an online or internet-based illegal act.
- consists of full-motion images that are played back at various speeds.
- is a process of receiving information.
- is a hardware and/or software that protects a network's resources from intrusion.
- is the process of transferring data in a continuous and even flow.
- is permits file uploading and downloading.
- is a technique intruders use to make their network or internet transmission appear legitimate.
Down
- is an electronic device use to manipulate data.
- is the appearance of motion created by displaying a series of still images in sequence.
- is a group of compromised computers connected to a network.
- is a body of knowledge devoted to creating tools, processing actions and the extracting of materials.
- is an online area in which users have written discussions about a particular subject.
- using more than one medium of expression or communication.
- is a process of converting to readable data into unreadable characters to prevent unauthorized access.
- is a real-time typed conversation that takes place on a computer.
- enables users to speak to other users over the internet.
20 Clues: is a process of receiving information. • is permits file uploading and downloading. • includes music, speech, or any other sound. • is an online or internet-based illegal act. • is the code of acceptable internet behavior. • is an electronic device use to manipulate data. • is a digital representation of nontext information. • ...
Year 8 Social Studies 2019-08-23
Across
- Large sheet of ice / snow on land all year long
- layer of snow and ice on ground in high mountain ranges
- increase in average temperature near Earth's surface
- the currency used by this country is Ringgit
- group who are deployed to help to bring peace and stability
- refer to rain/hail or snow
- Refer to people who make Maps
- movement of plates apart or rift from each other
- Energy from plants and animals
- visitors explore nature
- Imaginary line that divides Earth two halves horizontally
- degree to which places are connected by communication networks
- information circulated to promote political cause [mostly biased]
- Lines run east to west around the earth, measured in degrees
- person who visits places
Down
- periods of unusually hot weather
- international soldiers/group who are deployed to help to bring peace and stability
- explanatory symbol on maps
- Across the borders
- Japanese way of life and culture imposed on Brunei
- list of agreed fundamental principles of a state
- this climate has desert and steppes
- Important habitat, protect shore from flooding
- natural home of an animal, plant or other organism
- travel to an important religious site
- Violent spinning funnels of air
- State of atmosphere at a particular time and place
- Type of air pollution built from vehicles
28 Clues: Across the borders • visitors explore nature • person who visits places • explanatory symbol on maps • refer to rain/hail or snow • Refer to people who make Maps • Energy from plants and animals • Violent spinning funnels of air • periods of unusually hot weather • this climate has desert and steppes • travel to an important religious site • ...
Exploring Computer Vocabulary, Part A 2020-04-22
Across
- of or pertaining to a number system having 2 as its base
- crime committed using a computer and the internet
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- an online journal where people post about their experiences
- locate and correct errors in a computer program code
- a copy of a file or directory on a separate storage device
- the part of a computer that does most of the data processing
- an organized body of related information
- restore something reduced in volume to its full volume
- the exclusive right to sell a work
Down
- of or relating to or being a communications network in which the bandwidth can be divided and share by multiple signals (voice, data, video)
- a program used to view HTML documents
- ready-made pieces of computerized graphic art that can be used to enhance a document
- a worldside network of computer networks
- a compact disk that is used with a computer
- a program that gives a computer instructions
- thy symbolic arrangement of data in a computer program
- a unit of measurement of information
- indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- a fault or defect in a computer program, system, or machine
20 Clues: the exclusive right to sell a work • a unit of measurement of information • a program used to view HTML documents • a worldside network of computer networks • an organized body of related information • a compact disk that is used with a computer • a program that gives a computer instructions • crime committed using a computer and the internet • ...
mar crossword 2024-05-30
Across
- device that protects a circuits againt brownouts and spikes
- is a device used to permanently store and also retrieve information
- is a disturbance of space in the electromagnetic space
- a cable to connect a device to a network
- main card where all the components of the computer are connected
- first one to create a way to connect devices each other at a short range connectionreflection the
- memory that keep information
- a device that detects or measures a physical property,records,indicates or otherwise responds do it
- are portable devices used to extinguish small fires
- connects devices toguether over short distances
Down
- device that protects all internal parts of the computer
- also called luminous energy or radiant energy
- group of devices connected each other using blutooth
- can change chemical energy to electricity by putting certain chemicals in contact with each other
- transforms alternate current to direct current
- is the standart unit of electrical resistant in the international system of units
- is the change in direction of a wave passing from gradual
- its the total loss of electric power to an area
- is a group of computers connected each other
- sudden flow of electricity between two electrically charged objects caused by a contact
- regulates or to set the flow of electrons through them by using conductive material
21 Clues: memory that keep information • a cable to connect a device to a network • is a group of computers connected each other • also called luminous energy or radiant energy • transforms alternate current to direct current • its the total loss of electric power to an area • connects devices toguether over short distances • are portable devices used to extinguish small fires • ...
Inventions 2024-07-25
Across
- Substances used for treating illness or promoting health.
- An appliance used for cooking food by heating it.
- An appliance used to keep food and drinks cool and fresh.
- Lenses set in a frame worn to correct or assist defective eyesight.
- A device used for capturing photographs or video recordings.
- An instrument for measuring and indicating time.
- A soft paper product used for personal hygiene after using the bathroom.
- A motor vehicle with four wheels, used for transporting passengers.
- The combustion or burning that produces light and heat.
- An electronic device for receiving visual and audio signals to display programs.
Down
- Water that has been purified by passing through a device to remove impurities.
- A compact digital device used for various personal tasks and internet browsing.
- Footwear typically covering the foot and the lower part of the leg.
- A thin material used for writing, printing, or packaging.
- A form of energy resulting from the existence of charged particles.
- A handheld device that combines mobile phone capabilities with a computer.
- A two-wheeled vehicle that you pedal to move forward.
- A global network connecting millions of private, public, academic, business, and government networks.
- Garments worn to cover the body.
- A powered flying vehicle with fixed wings.
- A series of connected vehicles running on railways for transporting goods or passengers.
21 Clues: Garments worn to cover the body. • A powered flying vehicle with fixed wings. • An instrument for measuring and indicating time. • An appliance used for cooking food by heating it. • A two-wheeled vehicle that you pedal to move forward. • The combustion or burning that produces light and heat. • Substances used for treating illness or promoting health. • ...
Comm Media Volcabulary 2023-05-03
Across
- a freelance photographer who pursues celebrities
- the act of coming out into view
- the act of dispersing something
- make central
- the process of adjusting or conforming to new conditions
- a machine for performing calculations automatically
- capable of influencing each other
- the profession of reporting or editing news stories
- equipment for making records
- Provide with computers
- relating to or indicating directions in space
- a digitally encoded recording on an optical disk that is smaller than a phonograph record; played back by a laser
- the branch of electrical engineering concerned with the technology of electronic communication at a distance
Down
- a partiality preventing objective consideration of an issue
- a small book usually having a paper cover
- occurring among or involving several people
- vary in order to spread risk or to expand
- a portable television camera and videocassette recorder
- deleting parts of publications or theatrical performances
- any celestial body orbiting around a planet or star
- the general appearance of a publication
- an equilibrium of power between nations
- a device that can be used to control a machine or apparatus from a distance
- the act of regaining or saving something lost
- forms of ceremony and etiquette observed by officials
- relating to or operating by a controlled current
- a worldwide network of computer networks
- the body of laws governing relations between nations
28 Clues: make central • Provide with computers • equipment for making records • the act of coming out into view • the act of dispersing something • capable of influencing each other • the general appearance of a publication • an equilibrium of power between nations • a worldwide network of computer networks • a small book usually having a paper cover • ...
Globalization 2023-04-28
Across
- helped avert famine and increase crop yields in many parts of the world.
- project sponsored by the United States, Russia, and 14 other nations
- air, water, and land resources
- Stated goal: “Help trade flow smoothly, freely, fairly, and predictably”
- the study of heredity through research on genes
- Stated goal: “Promote international monetary cooperation; to foster economic growth and high levels of employment; and to provide temporary financial assistance to countries”
- managing development so that growth can occur, but without
- trade elimination of trade barriers, such as tariffs, among nations
Down
- became prime locations for new manufacturing operations.
- includes all the financial interactions—among people, businesses, and governments—that cross international borders.
- introducing new genes into an organism to give that organism new traits.
- The creation of identical copies of DNA, the chemical chains of genes that determine heredity
- Stated goal: “A world free of poverty”
- involves some risks, including the accidental creation of disease-causing organisms.
- is the voluntary linkage of computer networks around the world
- replaced the bulky vacuum tubes used earlier.
- is our main protection against the Sun’s damaging ultraviolet rays.
- the U.S. space agency
- nations those nations with the industrialization, transportation, and business facilities for advanced production of manufactured goods.
- Doctors can build three-dimensional images of different organs or regions of the body.
20 Clues: the U.S. space agency • air, water, and land resources • Stated goal: “A world free of poverty” • replaced the bulky vacuum tubes used earlier. • the study of heredity through research on genes • became prime locations for new manufacturing operations. • managing development so that growth can occur, but without • ...
In the World of IT: Crime and Security 2024-11-19
Across
- exclusive legal right.
- Ensures that information is accessible to authorize persons when required without delay.
- Action derived from intelligent threats to violate the security of the system
- Security hole.
- Ensures that that the computer users or those who access information are who they claim to be.
- Both sending and collecting of information from unsuspecting people.
- An action that has the potential to compromise and/or violate security.
- Work on its own without attaching itself to file or programs.
- Pointing you to a malicious and illegitimate website by redirecting the legitimate URL.
- This involves actions that supplement the precautionary measures.
Down
- One of the layers of security that protects personnel, hardware, programs, networks, and data from physical threat.
- Term used for actions taken by someone to gain unauthorizes access to a computer.
- A person who breaks into computer systems.
- Sending emails purporting to be from reputable companies to gain personal information.
- Characteristics of the culture of computers, information, technology, and virtual reality.
- Often sent as email attachment or download with the intent of infecting the computer.
- Excessive gaming behavior.
- Action take in advance to protect the system against threats.
- Infects your computer (viruses, worms, spyware.
- One of the layers of security that allows the system to set security rules to determine what is displayed to which user.
20 Clues: Security hole. • exclusive legal right. • Excessive gaming behavior. • A person who breaks into computer systems. • Infects your computer (viruses, worms, spyware. • Action take in advance to protect the system against threats. • Work on its own without attaching itself to file or programs. • This involves actions that supplement the precautionary measures. • ...
UNO_Mania_Set4 2025-03-16
Across
- A hashing technique prevents collision using linked lists
- A type of machine learning where a model learns by receiving feedback based on its action and decisions
- A network device that connects multiple networks together
- A low-level programming language that is specific to a computer architecture
- type of memory is non-volatile and used for long-term storage
- The ISO/OSI layer that uses SSL/TLS protocol
- Transform message into a secret code
- A type of machine learning algorithm for clustering
- The term for a variable that holds a memory address
- An open source operating system
- A technique used to manage memory dynamically in OS
- The part of the CPU that carries out instructions
Down
- A machine learning model that mimics the human brain
- A type of error that occurs when a variable is not defined
- The smallest unit of data storage in a quantum computer
- The command to terminate a process in Unix/Linux
- A cryptographic technique used to secure data
- A language primarily used for styling web pages
- A type of memory that stores data permanently
- A number system used in computer memory addressing
- A type of software that protects against malware
- A Data structure used in recursion
- The type of attack tricks used into revealing sensitive information
- A type of data structure that follows the First In First Out principle
24 Clues: An open source operating system • A Data structure used in recursion • Transform message into a secret code • The ISO/OSI layer that uses SSL/TLS protocol • A cryptographic technique used to secure data • A type of memory that stores data permanently • A language primarily used for styling web pages • The command to terminate a process in Unix/Linux • ...
Deviance 2023-05-17
Across
- Durkeim believed that deviance ______ society together
- Durkeim felt that deviance ______ social change
- A person rejects social goals and means, to then replace them with new goals and means
- Inner and outer controls keep us in line
- The paradigm centered around how the people around us influence how we act and what we believe
- Deviance helps society function and clarifies moral boundaries
- What type of crime is more committed by the lower class and is more physically violent
- Someone rejecting social goals and embracing conventional behavior
- Normlessness
- Society is defined by the conflicts between different groups of people
Down
- People identified as a deviant start to embrace it
- Deviance is learned from the people he are around
- Believed that values, our conscience, friends, law enforcement, and bonds were as controls to keep us from deviance
- A negative status caused by labels
- Believed that deviance was learned from families, friends, and social networks
- Believed that the amount of evidence a society exhibited showed whether the society has provided the men to achieve social goals.
- Crime is a way for people to achieve goals that they don't have legitimate means of achieving
- What type of crime does money laundering and fraud fall under
- When someone uses illegitimate means to achieve a socially accepted goal
- Someone going against social goals and legitimate means of achieving them
20 Clues: Normlessness • A negative status caused by labels • Inner and outer controls keep us in line • Durkeim felt that deviance ______ social change • Deviance is learned from the people he are around • People identified as a deviant start to embrace it • Durkeim believed that deviance ______ society together • What type of crime does money laundering and fraud fall under • ...
Data Privacy and security crossword 2025-02-03
Across
- A type of attack where hackers trick individuals into revealing sensitive information
- The practice of protecting systems, networks, and data from digital attacks
- Ensuring that data is accurate and reliable
- A type of attack that floods a network with traffic to disrupt service
- A type of security breach where data is accessed without authorization
- A legal requirement to protect sensitive customer information
- A method of disguising communication to hide its content
- A process of converting data into a code to prevent unauthorized access
- A type of attack where an attacker pretends to be a trusted entity
- A type of software designed to detect and remove malicious programs
- A method of verifying someone's identity using two forms of verification
Down
- Protecting sensitive information from unauthorized access
- A type of software update designed to fix security vulnerabilities
- Ensuring that systems and data are accessible when needed
- the use of technologies, policies, and controls to protect data, applications, and infrastructure in cloud environments
- A weakness in a system that can be exploited by attackers
- A process of regularly backing up data to prevent loss
- A legal framework that protects personal data in the European Union
- A person who attempts to gain unauthorized access to systems or data
- A type of malware that encrypts files and demands payment for decryption
- A secure method of transmitting data over the internet
21 Clues: Ensuring that data is accurate and reliable • A process of regularly backing up data to prevent loss • A secure method of transmitting data over the internet • A method of disguising communication to hide its content • Protecting sensitive information from unauthorized access • Ensuring that systems and data are accessible when needed • ...
CIS 27 Chapter 2 2025-02-25
Across
- SMS-based phishing attack via fraudulent messages.
- Advanced Google search techniques for information.
- Sturdy post blocking vehicles for security
- A device that detects and measures physical properties.
- The total exposure points to social engineering.
- Exploiting misspelled URLs for malicious purposes.
- Fraud exploiting email for financial theft
- Manipulating users to disclose confidential information.
- Pretending to be someone real or fictitious.
- Replacing sensitive data with random tokenized values.
- Gaining private information through fabricated scenarios.
- Infecting frequented websites with malware
- Removing sensitive data to ensure privacy.
- Voice phishing using phone calls to scam victims.
- Country-specific laws governing data usage.
Down
- Restricting access to protect networks
- Detects motion using microwave signal reflection
- A creative invention or work with rights.
- – Locating and identifying where data resides.
- Determining device's physical location using coordinates
- Creating a modified copy of original data.
- Identification card granting secure area access
- A targeted attack on specific individuals or groups.
- False or misleading information with malicious intent.
- Exploiting electronic payments for financial gain.
- The highest level of data sensitivity
- Converting data into unreadable form for security.
- Illuminates areas to prevent unauthorized access
- Confidential information providing business competitive advantage
- Redirecting users to fake websites to steal data.
- The highest classification level of sensitive data.
31 Clues: The highest level of data sensitivity • Restricting access to protect networks • A creative invention or work with rights. • Creating a modified copy of original data. • Sturdy post blocking vehicles for security • Fraud exploiting email for financial theft • Infecting frequented websites with malware • Removing sensitive data to ensure privacy. • ...
Crossword Craze: Internet Terminology 2025-01-13
Across
- A list of websites that users who use a given computer have visited.
- It is an unsolicited email from somebody we do not know.
- An animated face that conveys many emotions.
- It is a set of digits and letters used to identify a place.
- A real-time communication via the internet.
- A computerized copy on the document stored on your computer.
- A network of countless numbers of computers from around the world.
- The starting point of any server or the page site your browser is configured to use when it first launches.
- This file has been fused to an email.
Down
- Small images that depict the software on your computer.
- It is used to describe all internet-based computer networks.
- Typically defined as a private or nonprofit website which employs a dated log appearance.
- A compilation of "folio" or info that are linked together and accessible over the World Wide Web.
- Illegally copying under copyright programs, music, or films.
- The act of browsing from each page one to another and site to site online.
- An internet scam that targets the web browser's address bar.
- A computer software that can damage files or cause the device to "collapse".
- This is a computer-generated file that has been printed on paper.
- The transmission of video clips, sounds, and other sorts of media via the internet.
- Ethical usage of internet.
20 Clues: Ethical usage of internet. • This file has been fused to an email. • A real-time communication via the internet. • An animated face that conveys many emotions. • Small images that depict the software on your computer. • It is an unsolicited email from somebody we do not know. • It is a set of digits and letters used to identify a place. • ...
Job Tech CROSSWORD 2024-11-19
Across
- a machine used by farmer on the fields
- the place where farmers sell their products (fruits or vegetables)
- to work 8 hours
- world wide web
- connected to the internet
- electronic mail
- a person who looks after a child or children while the parents are out.
- to work 4 hours
- the abbreviation for application.
- a name to access a network, email or any social network
- curriculum vitae
- the part of a computer that contains the screen
- the opposite of upload
Down
- a device used to program using codes
- the physical components of a computer
- real time conversation on whatsapp, instagram, messenger
- the amount of money a person earns for a job
- a person that employs people
- a place where people work sitting at desks
- a person who works in a hospital
- a formal meeting at which someone is asked questions in order to find out if they are suitable for a post of employment.
- dentist, doctor, teachers are examples of these
- global positioning system
- personal computer
- network connection to do things like sending email, use social networks
- the person who works on a farm with animals and crops.
- A wireless networking that allows users to send data from one device to another
- advertisement
- portal document format
29 Clues: advertisement • world wide web • to work 8 hours • electronic mail • to work 4 hours • curriculum vitae • personal computer • portal document format • the opposite of upload • connected to the internet • global positioning system • a person that employs people • a person who works in a hospital • the abbreviation for application. • a device used to program using codes • ...
DIGITAL IDENTITY 2025-09-27
Across
- Data about you collected by websites (7)
- Protection of systems and networks (10)
- Online character or profile picture (6)
- A trail of online activities (9)
- Misuse of someone’s personal information (7)
- The act of stealing someone’s digital identity (8)
- To keep information from being seen by others (6)
- Pretending to be someone else online (10)
- A personal code to access an account (8)
- A contract or rules you must accept online (4)
- A digital badge or card to prove identity (8)
- An agreement to use a website or app (5)
- Online personality created by someone (7)
- Right to keep your data safe (7)
- The act of blocking unwanted users (5)
- An image used to represent yourself online (6)
- A short, unique online address or ID (6)
Down
- Device used to connect to the internet (6)
- The ability to access and use the internet (6)
- Criminal act using computers or the internet (8)
- Another word for online identity (7)
- Online accounts on Facebook, Instagram, TikTok, etc. (7)
- A fake message that tries to steal your data (8)
- Basic information such as name and birthdate (8)
- A short message sent online
- A set of secret numbers and letters for access (6)
- Online reputation based on your behavior (9)
- A secret number for verification (3)
- Technology to unlock devices with your face or fingerprint (9)
- A place where you can post and share online (8)
30 Clues: A short message sent online • A trail of online activities (9) • Right to keep your data safe (7) • Another word for online identity (7) • A secret number for verification (3) • The act of blocking unwanted users (5) • Protection of systems and networks (10) • Online character or profile picture (6) • Data about you collected by websites (7) • ...
Learning Aim B: How data is exchanged and stored 2026-01-19
Across
- (5,4,3) – A collection of websites accessed using the internet.
- (3) – Converts domain names into IP addresses.
- (6) – A device that directs traffic between networks and to the internet.
- (3) – A company that provides internet access.
- (6) – A copy of data so it can be restored if lost.
- (8) – A global network connecting devices worldwide.
- (6) – A computer that provides services or data to clients.
- (7) – Delay in sending/receiving data (lag).
- (6,5) – A device that provides Wi-Fi to connect wireless devices.
- (6) – A small chunk of data sent across a network.
- (6,9) – Data split into packets that can take different routes.
Down
- (5,7) – Saving files directly on your device (not online).
- (5) – Hardware that connects your network to your ISP service.
- (5,9) – Using remote servers for storage/services instead of your device.
- (6) – A device/app that requests services or data.
- (6,4) – The human-friendly web address (e.g., bbc.co.uk).
- (3) – The full address of a webpage.
- (6) – Connects devices in a LAN and forwards data to the correct device.
- (9) – How much data can transfer per second (capacity).
- (3,6) – A server that stores and delivers web pages to users.
- (2,7) – A unique number that identifies a device on a network.
- (4,6) – A building full of servers storing online services and data.
22 Clues: (3) – The full address of a webpage. • (7) – Delay in sending/receiving data (lag). • (3) – Converts domain names into IP addresses. • (3) – A company that provides internet access. • (6) – A device/app that requests services or data. • (6) – A small chunk of data sent across a network. • (6) – A copy of data so it can be restored if lost. • ...
Issac Kim's Amazing World History Crossword 2025-10-31
Across
- First ruler of the Mongol Empire, originally named Temujin
- A network of stations established to communicate rapidly throughout the Mongol empire.
- Originally temple used for Hindu but later used for Buddhism
- A period of significant argricultural advancements in the Islamic World
- A Indian dynaasty that ruled Java and SouthEast parts of Asia
- Ruler of Mali, known for his immmense wealth.
- A group of people who moved seasonally to different locations
- A major center of trade, scholarship and culture in West Africa
- major hubs of the indian oceans, welcomed all settlers
- Am early chinese credit system, early variation of paper money
Down
- A chinese admiral the led 7 major expiditions and fostered trade networks in the process
- Traditional wooden sailing vesselwith lanteen sails
- Renewal of Confusianism that includes ideas from Buddhism and Daoist
- A inn for travelers across the major trade routes that gave place to rest, eat, and water animals.
- Group of people/travelors who settle into another country/region and adapt to their culture
- Of significance important in the African world, could transport and store goods across the Saharan Desert which increased trade
- Moroccan travelor who documented his journey from the Islamic world to Asia
- A major city of the early north american civilation
- Use of siege technolodgies and tactics used by the mongols
- A wide trade network that spanned across all of Eurasia
20 Clues: Ruler of Mali, known for his immmense wealth. • Traditional wooden sailing vesselwith lanteen sails • A major city of the early north american civilation • major hubs of the indian oceans, welcomed all settlers • A wide trade network that spanned across all of Eurasia • First ruler of the Mongol Empire, originally named Temujin • ...
Wavenet and deep learning - based TTS systems 2025-12-26
Across
- Replicating a person’s voice using AI
- Delay between input and speech output
- Generating audio points from probability
- DeepMind model that generates speech one sample at a time
- Converts acoustic features into waveform audio
- RNN variant handling long-term dependencies
- Computing system inspired by biological neurons
- Predicts future samples from past outputs
- Collection of text and audio samples
- TTS system supporting many voices
- Single system trained from text to speech
- Written representation of a sound
- Mechanism to focus on relevant input parts
- Field that enables machines to mimic human intelligence
- Converts encoded features into speech output
- Technique to improve audio quality
- Network effective in feature extraction
Down
- Frequency-based audio representation for TTS
- Mapping between text and audio
- Raw audio signal representation
- Intonation, stress, and rhythm in speech
- Predicts length of each phoneme
- Basic sound unit of spoken language
- Converts written text into natural-sounding speech
- Machine learning using multi-layer neural networks
- Reducing precision of audio samples
- Vector representing speaker identity
- Neural architecture using self-attention
- Artificial production of human speech
- Number of audio samples per second
- Network designed for sequence modeling
- Generating speech from trained model
- How human-like synthesized speech sounds
- Converts text into hidden representations
- Process of learning model parameters
- Large structured speech dataset
- Simplified recurrent neural network
37 Clues: Mapping between text and audio • Raw audio signal representation • Predicts length of each phoneme • Large structured speech dataset • TTS system supporting many voices • Written representation of a sound • Number of audio samples per second • Technique to improve audio quality • Basic sound unit of spoken language • Reducing precision of audio samples • ...
Cryptober Puzzle #1 2021-09-27
Across
- The anonymous creator of Bitcoin
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
- To physically separate or isolate a system from other systems or networks
- The amount you are willing to pay for a transaction on the Ethereum network.
- A hardware device that stores public and private keys of cryptocurrency
- A website that helps one buy/sell cryptocurrencies
- requires the same key for encryption and decryption
Down
- Bitcoin was the first and is the most successful of all the cryptocurrencies. All the other coins are grouped together under the category of _______
- requires different keys for encryption and decryption.
- A record of financial transactions
- Every cryptocurrency coin has a unique _______ that identifies where it sits on the blockchain.
- Converting plain text into unintelligible text with the use of a cipher
- When a new version of a blockchain is created, resulting in two versions of the blockchain running side-by-side.
- Mathematic instructions coded into and implemented by computer software in order to produce a desired outcome.
- a number of internet-connected devices that are infected and controlled by malware.
15 Clues: The anonymous creator of Bitcoin • A record of financial transactions • A website that helps one buy/sell cryptocurrencies • requires the same key for encryption and decryption • requires different keys for encryption and decryption. • Converting plain text into unintelligible text with the use of a cipher • ...
P13 V1 2023-01-27
Across
- Provides guidelines to ensure all properties are developed and used according to the Master Plan
- Building infrastructure and utilities _____ strengthen the reliability and security of these networks.
- One of the oldest urban areas gazetted for conservation in 1989
- _______ at Tuas Mega Port is carried out to a depth of more than 30m and is expected to be completed in 2040.
- 80% of households will be located within a 10-minute walking distance to _____ stations.
- The only island city-state in the world
- Lebar, In 1975, the existing ______ airport was moved to Changi
Down
- The island that is made up of 7 offshore islands that were merged using reclamation.
- Autonomous vehicles are being tested in _____.
- Pedestrian ______ connect buildings and help us avoid crossing busy streets
- Marina Barrage is designed to be more than a dam and pumping station
- A plan that shows the permissible land use and density for developments to guide the development of land.
- We have more than ____ buildings over 150m
- The first town to pilot new bicycle and pedestrian-friendly amenities and dedicated infrasture to create a walking and cycling town.
- An island located to the southern part of Singapore.
15 Clues: The only island city-state in the world • We have more than ____ buildings over 150m • Autonomous vehicles are being tested in _____. • An island located to the southern part of Singapore. • One of the oldest urban areas gazetted for conservation in 1989 • Lebar, In 1975, the existing ______ airport was moved to Changi • ...
Reg'cross'ion Wk31 2013-07-31
Across
- Tested as part of Sync-2 TB. Failed with cq300225998. Third word of the test case is present here.
- NSSA test areas that are not part of this :)
- Pioneer in mobile backhaul. You 'commit' when you configure here :)
- I am cautious before sending Ethernet traffic. If I detect collision, I stop. Tested as part of ELC1-3 TB.
- RFC 2507 talks about me :)
- Tellabs 8600 supports this protocol as part of 'Resiliency'. Applies for ETSI.
- One of the important concept of IP-VPN tested as part of ELC1-2. This is often associated with Spokes :)
Down
- At any given layer, layer 'n', I am the PDU of the layer above, layer 'n+1'
- Injurious to health but this test is good for the software :)
- Aricent (CSS America) recently won a deal worth 2.7M with this company.
- Final step in submitting scripts to MCL. This will let the world know your changes :)
- Frame Relay networks use me to statistically multiplex frames!
- I am tested only in 8611 for 145 minutes (only the first word) :)
- "Heart Beat" messages for CFM. They are multicast.
- I am over-curious and I pop the outer label before my peer does :)
15 Clues: RFC 2507 talks about me :) • NSSA test areas that are not part of this :) • "Heart Beat" messages for CFM. They are multicast. • Injurious to health but this test is good for the software :) • Frame Relay networks use me to statistically multiplex frames! • I am tested only in 8611 for 145 minutes (only the first word) :) • ...
BC 2016-02-04
Across
- You should always be careful before opening any ___ that is unfamiliar to you.
- The program that is responsible for establishing the framework is called the ____.
- Take pictures of damage to your property for _____ purposes.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- _____ Response Team is a group of staff that assist in evacuation.
- The first thing to do when confronted with an active shooter if possible is _____.
- Throw away all food that has come in contact with the ____ water.
Down
- If escape is not possible, then _____.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Only as a last resort, you must _____ the active shooter.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- _____ virus can be transmitted from a pregnant mother to her baby
- The virus is transmitted through ______ bites.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • _____ virus can be transmitted from a pregnant mother to her baby • Throw away all food that has come in contact with the ____ water. • ...
BC 2016-02-04
Across
- The program that is responsible for establishing the framework is called the ____.
- Throw away all food that has come in contact with the ____ water.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- _____ virus can be transmitted from a pregnant mother to her baby
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- The first thing to do when confronted with an active shooter if possible is _____.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
Down
- You should always be careful before opening any ___ that is unfamiliar to you.
- The virus is transmitted through ______ bites.
- Only as a last resort, you must _____ the active shooter.
- Take pictures of damage to your property for _____ purposes.
- If escape is not possible, then _____.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- _____ Response Team is a group of staff that assist in evacuation.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • Throw away all food that has come in contact with the ____ water. • _____ virus can be transmitted from a pregnant mother to her baby • ...
Bullying? Dont Start, Be Smart! 2016-03-28
Across
- C_________ can be dealt with by standing up for yourself, reasoning with the offender or telling someone about it.
- Bullying can lead to many unfortunate outcomes. The most severe being s_________.
- Bullies bully to gain a__________ and increase their social popularity.
- This can be used in a negative or positive way and can be gained by strength, experience, knowledge or position.
- Teachers, Doctors and Friends can help us deal with Bullying. We should also seek help from our ____________.
- Bullying that occurs online behind a screen.
- One of the main types of bullying that involves negative interaction through contact with another.
- Online networks such as BeyondBlue and Kids H__________ can help a victim of Bullying talk about their problems and ways to fix them.
Down
- When we are getting bullied at school who can we can we consult?
- Bullying can occur singularly or in ________.
- The school c___________ is another person we can get help from.
- It is considered Bullying when it happens c___________.
- Cyberbullying can lower someone's self-esteem and eventually lead to anxiety and d____________.
- Where can Bullying occur?
- A type of Bullying that is most likely to occur between females.
15 Clues: Where can Bullying occur? • Bullying that occurs online behind a screen. • Bullying can occur singularly or in ________. • It is considered Bullying when it happens c___________. • The school c___________ is another person we can get help from. • When we are getting bullied at school who can we can we consult? • ...
tech crossword 2018-04-04
Across
- is the abbreviation for central processing unit
- Image result for usb definitionwww.pcmag.com
- short for Internet service provider.
- Universal Serial Bus (USB) is a common interface that enables communication between devices and a host controller such as a personal computer
- the programs and other operating information used by a computer.
- a wall or partition designed to inhibit or prevent the spread of fire.
- transmitting a signal
- the address of a World Wide Web page.
Down
- a small sweet cake, typically round, flat, and crisp.
- a minute area of illumination on a display screen, one of many from which an image is composed.
- a regularly updated site
- a local or restricted communications network, especially a private network created using World Wide Web software.internet a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- tools, machinery, and other durable equipment.
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a collection of items of the same type stored in a hidden or inaccessible place.
15 Clues: transmitting a signal • a regularly updated site • short for Internet service provider. • the address of a World Wide Web page. • Image result for usb definitionwww.pcmag.com • tools, machinery, and other durable equipment. • is the abbreviation for central processing unit • a small sweet cake, typically round, flat, and crisp. • ...
Information system Crossword 2023-08-15
Across
- what is the schedule that based on best guesses of demand?
- which mining mines website structural elements such as link?
- Which key digital networking technologies distribute digital message into parcels?
- Give atleast 1 role of auditing.
- what is the next evolution of HTML?
- The company respondsible for security resides with owning the data.
- Capturing prospect and customer data, scheduling and tracking direct marketing mailings or email.
- WHich wireless computer network and internet acess is useful for personel networking and only links devices within 10m aream?
Down
- What is the most extensive network?
- what are the process by which errors are eliminated?
- What is the name of the use of computers and other computing devices and equipment in energy effcient and eco friendly ways?
- Which effect has the information about product demand gets distorted as it passes from one antity to next access supply chain?
- Which technology service provider use external provider to run computer center and networks?
- Creates a subset of all records meeting stated criteria?
- what is the tool that breaks data task into sub-problems and distributes the processing to many in expensive computer processing notes
15 Clues: Give atleast 1 role of auditing. • What is the most extensive network? • what is the next evolution of HTML? • what are the process by which errors are eliminated? • Creates a subset of all records meeting stated criteria? • what is the schedule that based on best guesses of demand? • which mining mines website structural elements such as link? • ...
Network Systems 2023-11-17
Across
- Security system that monitors and controls incoming and outgoing network traffic.
- Device that converts digital signals to analog for transmission over analog communication lines.
- The time delay between the moment data is sent and when it is received.
- Set of rules governing the exchange of data between devices on a network.
- Secure connection over the internet, allowing remote access to a private network.
- Protocol used to automatically assign IP addresses to devices on a network, namely in WAN.
- Transmission medium that allows data to be transmitted without the need for physical cables, often using radio waves.
- Simple Mail Transfer Protocol
Down
- Type of cable with a central conductor surrounded by insulation, a metallic shield, and an outer insulating layer, commonly used for transmitting television and internet signals.
- Commonly used technology for wired local area networking.
- Device that directs data traffic between computer networks.
- The amount of data that can be transmitted in a fixed amount of time.
- The physical or logical layout/arrangement of a network.
- Small unit of data that travels across a network.
- Network device that connects and redirects devices within a local area network (LAN).
15 Clues: Simple Mail Transfer Protocol • Small unit of data that travels across a network. • The physical or logical layout/arrangement of a network. • Commonly used technology for wired local area networking. • Device that directs data traffic between computer networks. • The amount of data that can be transmitted in a fixed amount of time. • ...
Cybersecurity Fundamentals Chapter 4 2022-10-25
Across
- policies and procedures defined by organizations to implement and enforce all aspects of controlling authorize access.
- fundamental component of ipsec virtual private networks (vpn).
- actual barriers deployed to prevent direct contact with systems.
- way to store and transmit data so only the intended recipient can read or process it.
- to encrypt and decrypt messages.
- has a fixed block size of 128, 192 or 256 bits.
- use one key to encrypt data and a different key to decrypt data.
- implementing cryptography into a web browser.
- encrypts data three times and uses a different key for at least one of the three passes, giving it a cumulative key size of 112-168 bits
Down
- hardware and software solutions used to manage access resources and systems.
- a computer program that provides cryptographic privacy and authentication to increase the security of email communications.
- algorithms that use the same pre-shared key, sometimes called a secret key pair, to encrypt and decrypt data.
- science of making and breaking secret codes.
- uses the product of two very large prime numbers with an equal length between 100 and 200 digits.
- a protocol that provides a secure remote access connection to network devices.
15 Clues: to encrypt and decrypt messages. • science of making and breaking secret codes. • implementing cryptography into a web browser. • has a fixed block size of 128, 192 or 256 bits. • fundamental component of ipsec virtual private networks (vpn). • actual barriers deployed to prevent direct contact with systems. • ...
Neurons and Neuronal Connections 2025-03-05
Across
- body - contains the nucleus
- - involved in the regulation of sleep, mood, attention, and learning. Low levels of serotonin are associated with depression and SIDS.
- - chemical substances that are stored in tiny sacs within the terminal buttons and involved in transmitting information across the synaptic gap to the next neuron.
- - carries information away from the cell body toward other cells
- cells: provide support, nutritional benefits, and other functions and keep neurons running smoothly
- cell body
- - directs the manufacture of substances that the neuron needs for growth and maintenance
- - treelike fibers projecting from the neuron, which receive information and orient it toward the neuron’s cell body.
- - tiny spaces between neurons
Down
- - natural opiates
- sends and receives information
- Networks: are interconnected pathways of nerve cells that integrate sensory input and motor output
- Terminals - Sends information away from the cell body and toward other neuronsNorepinephrine - Stress stimulates the production of this neurotransmitter. Controls alertness. Too much triggers agitation and jumpiness. Too Little is associated with depression.
- Nerves: carry information about the world TO the brain
- Nerves: carry information FROM the brain to the rest of the body.
- - helps to control voluntary movement and affects sleep, mood, attention, learning, and the ability to recognize opportunities for rewarding experiences in the environment. Low levels are associated with Parkinson’s Disease and ADHD. High levels are associated with schizophrenia.
16 Clues: cell body • - natural opiates • body - contains the nucleus • - tiny spaces between neurons • sends and receives information • Nerves: carry information about the world TO the brain • - carries information away from the cell body toward other cells • Nerves: carry information FROM the brain to the rest of the body. • ...
Revision Questions 2025-01-07
Across
- ______ analytics is used to build models based on the past to explain the
- learning _________uses an algorithm to build neural network models that classify or predict target variables.
- data includes text, images, videos, and sensor data.
- language processing (NLP) ________ is a branch of artificial intelligence (AI) used to identify patterns by reading and understanding meaning from human language.
- between previously established variables.
- ___________ is a situation where the predictor variables are highly correlated with each other.
Down
- ________ data is measured as whole numbers: 1, 2, 3, ..
- _________ measures the frequency of the specific association rule.
- In the _________ layer, the model arrives at a prediction.
- networks _______ are algorithms that are trained to recognize patterns in data that are non-linear.
- ______ data analysis provides a summary of the main characteristics within the data.
- learning _______ is a statistical method of learning that can be trained without human intervention to understand and identify
- Market basket analysis, sometimes referred to by marketers as _________ discovery, uses purchase transaction data to identify associations between products or combinations of products and services that occur together frequently.
- _________ data is made up of records that are organized in rows and columns.
- _______ data exist when values are selected from a group of categories
15 Clues: between previously established variables. • data includes text, images, videos, and sensor data. • ________ data is measured as whole numbers: 1, 2, 3, .. • In the _________ layer, the model arrives at a prediction. • _________ measures the frequency of the specific association rule. • _______ data exist when values are selected from a group of categories • ...
Browsing Safely (SAPTADIP SAMADDER ) 2025-06-17
Across
- The data we leave behind when we use in internet
- Any criminal activity intended to harm anyone using computer and an internet connection
- It is referred to the act of stealing and misusing someone's personal information
- A collection of technology to protect networks and data from an unauthorized access
- It is a program or set of programs that disrupt the normal functioning of a computer
- Known as crackers
Down
- A crime in which the victim is attacked first and then forced to pay money to stop further attack
- used to conduct terrorism through the use of computers and internet
- Referred to an illegal entry into a computer system or network
- The process befriending with children on social media to continue online or physical sexual abuse
- illegal method to get money or other things that belong to a bank or its customers
- Example of a antivirus
- The receiver of a messages fold into believing at the message is received by him is from trusted source which is actually not true
- Ethical hackers
- A computer program that is designed to identify, prevent and remove virus from a computer
15 Clues: Ethical hackers • Known as crackers • Example of a antivirus • The data we leave behind when we use in internet • Referred to an illegal entry into a computer system or network • used to conduct terrorism through the use of computers and internet • It is referred to the act of stealing and misusing someone's personal information • ...
Gen AI and LLM - Set 1 2024-11-18
Across
- Information used to train AI models, including text and images.
- A numerical representation of words or phrases in vector space for better processing by models.
- An input given to a model to generate a response or output.
- A conversational interaction, often facilitated by AI.
- Adjusting a pre-trained model on a smaller dataset for specific tasks.
- The process of teaching a model using large datasets to improve its performance.
- Referring to models that can create new content, such as text or images.
- A mechanism in neural networks that allows models to focus on relevant parts of the input data when generating output.
- A learning approach where a model performs tasks without specific training examples for those tasks.
Down
- A type of neural network architecture that underpins many modern LLMs.
- A modeling error where a model learns noise in the training data instead of the underlying pattern.
- The primary output of language models, consisting of written words.
- The surrounding information that helps models understand the meaning of text.
- A unit of text processed by language models, typically a word or subword.
- The act of generating predictions or outputs from a trained model.
15 Clues: A conversational interaction, often facilitated by AI. • An input given to a model to generate a response or output. • Information used to train AI models, including text and images. • The act of generating predictions or outputs from a trained model. • The primary output of language models, consisting of written words. • ...
The Ultimate Review Guide 2025-05-02
Across
- an example of this was Ethernet
- This occurs when the code continues to run but not as expected.
- An access point that is wireless and functions to give unauthorized access to secure networks
- the separation of a program into independent modules that are each responsible for one aspect of the program's functionality
- This simply allows for the scalability of the internet through routing
- a sequence of 8 bits
Down
- A type of abstraction that uses arrays and/or lists in order to simplify the code and making it easier to adapt and scale to larger projects
- when one function can be a broad function that contains more specific function inside of it
- a technique that helps an algorithm find a good solution in a hard problem
- a software that is freely accessible to the public and may be modified and sold
- some communities have less access to computing than others due to limitation of internet speed or hardware access
- an attack where a user is tricked into revealing private information, via a deceptive email.
- reptition of steps in an algorithm until the condition is met
- small amount of text that tracks information about a user visiting a website
- data about data
15 Clues: data about data • a sequence of 8 bits • an example of this was Ethernet • reptition of steps in an algorithm until the condition is met • This occurs when the code continues to run but not as expected. • This simply allows for the scalability of the internet through routing • a technique that helps an algorithm find a good solution in a hard problem • ...
The Ultimate Review Guide 2025-05-02
Across
- a sequence of 8 bits
- This occurs when the code continues to run but not as expected.
- an attack where a user is tricked into revealing private information, via a deceptive email.
- when one function can be a broad function that contains more specific function inside of it
- A type of abstraction that uses arrays and/or lists in order to simplify the code and making it easier to adapt and scale to larger projects
- This simply allows for the scalability of the internet through routing
- an example of this was Ethernet
- a software that is freely accessible to the public and may be modified and sold
- reptition of steps in an algorithm until the condition is met
Down
- a technique that helps an algorithm find a good solution in a hard problem
- the separation of a program into independent modules that are each responsible for one aspect of the program's functionality
- some communities have less access to computing than others due to limitation of internet speed or hardware access
- data about data
- small amount of text that tracks information about a user visiting a website
- An access point that is wireless and functions to give unauthorized access to secure networks
15 Clues: data about data • a sequence of 8 bits • an example of this was Ethernet • reptition of steps in an algorithm until the condition is met • This occurs when the code continues to run but not as expected. • This simply allows for the scalability of the internet through routing • a technique that helps an algorithm find a good solution in a hard problem • ...
financial centers 2025-11-20
Across
- A classification for a center like Zurich, which is strong in private banking.
- A modern trend where financial centers focus on ESG and renewable energy investments.
- A city that is an emerging financial hub in the Middle East.
- A condition for a financial center's formation: a stable ______ and regulatory environment.
- The approach to financial centers focuses on rules, governance, and regulation.
- The approach views financial centers as nodes in global financial networks.
- The abbreviation for the index that ranks the competitiveness of financial centers worldwide.
- A type of financial center with favorable tax and regulatory environments, e.g., Cayman Islands.
- A global hub known for its strong legal system and foreign exchange trading.
Down
- The theoretical approach that sees financial centers as natural results of trade and capital accumulation.
- A function of financial centers, channeling savings into productive investments.
- A key function of financial centers, ensuring assets can be quickly bought or sold.
- A key characteristic of a financial center, referring to the dense gathering of banks and institutions.
- A leading Asian financial hub that transformed from a trading port.
- The current leading global financial center according to the GFCI
15 Clues: A city that is an emerging financial hub in the Middle East. • The current leading global financial center according to the GFCI • A leading Asian financial hub that transformed from a trading port. • The approach views financial centers as nodes in global financial networks. • A global hub known for its strong legal system and foreign exchange trading. • ...
AP CS P HOMEWORK 1 2026-03-28
Across
- The capacity of data transfer in a system. Measured by bitrate.
- Throwing away some of the data to save space. We can throw away a lot of data without any noticeable difference from the original.
- One key encrypts, a different key decrypts.
- A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
- Scrambling digital information into an unreadable form.
- The amount of data (in bits) that can be sent in a fixed amount of time.
- The ______ of a system is the time it takes for a bit to travel from sender to receiver.
- _____Compression involves no loss of information.
Down
- The process of encoding information, using fewer bits than the original representation.
- The conversion of encrypted data into its original form.
- An encryption method in which each letter of the message is shifted by a certain amount, called the key
- The same key is used to encrypt and decrypt
- A group of two or more computer systems linked together.
- A shared secret that allows the recipient to convert ciphertext into plaintext.
- A widely agreed upon set of rules that standardize communication between machines.
15 Clues: The same key is used to encrypt and decrypt • One key encrypts, a different key decrypts. • _____Compression involves no loss of information. • Scrambling digital information into an unreadable form. • The conversion of encrypted data into its original form. • A group of two or more computer systems linked together. • ...
tts english experts testing 2022-09-01
Across
- The smallest structural unit of a living organism
- A collection of networks that have one or more functions
- The double-membrane organelles found in most eukaryotic organisms are the
- The largest solid organ and largest gland in the human body
- Groups of cells that have the same function and shape are called
- The type of cell that covers the entire surface of the body
- One of the plant organs that grows from twigs, usually green and mainly functions as a catcher of energy from sunlight for photosynthesis
Down
- Pigments that are owned by various organisms and become one of the molecules that play a major role in photosynthesis are
- Small, dense organelles that are found in cells and act as sites for protein synthesis are called
- Fibers that connect the organs of the body with the central nervous system and between parts of the nervous system with others.
10 Clues: The smallest structural unit of a living organism • A collection of networks that have one or more functions • The largest solid organ and largest gland in the human body • The type of cell that covers the entire surface of the body • Groups of cells that have the same function and shape are called • ...
MASS MEDIA 2022-09-24
Across
- A collection of sheets of paper, parchment or other material with text written on them, bound together along one edge within covers.
- Involves the spread of news on a large scale.
- Is the distribution of sound and/or video signals (programs) to a number of recipients ("listeners" or "viewers") that belong to a large group.
- Is a term that encompasses motion pictures as individual projects, as well as the field in general.
- Briefly understood as "a network of networks."
Down
- A periodical publication containing a variety of articles, generally financed by advertising and/or purchase by readers.
- A publication containing news and information and advertising, usually printed on low-cost paper called newsprint.
- The activity of making information available for public view.
- It is mainly used by academics and media professionals.
- It is the sum of the public mass distributors of news and entertainment and other information
10 Clues: Involves the spread of news on a large scale. • Briefly understood as "a network of networks." • It is mainly used by academics and media professionals. • The activity of making information available for public view. • It is the sum of the public mass distributors of news and entertainment and other information • ...
Cyber Mela - Puzzle 1 2022-10-07
Across
- a type of internet fraud that seeks to acquire a user’s credentials by deception.
- extends a private network across a public network and enables users to send and receive data across shared or public networks
- Completely Automated Public Turing test to tell Computers and Humans Apart
- string of characters used to verify the identity of an user during the authentication process
- Comprised of any number and variety of interconnected devices
- A combination of the words "robot" and "network"
- A person or event that has the potential for impacting a valuable resource in a negative manner
Down
- a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
- a term commonly used to describe a person who tries to gain unauthorized access into a network or computer system.
- any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
10 Clues: A combination of the words "robot" and "network" • Comprised of any number and variety of interconnected devices • Completely Automated Public Turing test to tell Computers and Humans Apart • a type of internet fraud that seeks to acquire a user’s credentials by deception. • ...
Social network and sport 2020-11-02
Across
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
- a person who regularly writes material for a blog.
- a location connected to the Internet that maintains one or more pages on the World Wide Web.
- training for all body, and prevention of heart diseases
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- is an American photo and video sharing social networking service owned by Facebook
- a word or phrase preceded by a hash sign (#), used on social media websites and applications, especially Twitter, to identify messages on a specific topic.
- The sport of fighting with long, thin swords
- physical exercises are lowering-lifting the body using the hands from the floor
10 Clues: The sport of fighting with long, thin swords • a person who regularly writes material for a blog. • training for all body, and prevention of heart diseases • physical exercises are lowering-lifting the body using the hands from the floor • is an American photo and video sharing social networking service owned by Facebook • ...
Cybersecurity Crossword 2021-02-12
Across
- Something to protect your personal data.
- It locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- A malicious form of self-replicating software.
- It appears to be a useful or fun application but unbeknown to the user it also performs malicious actions.
Down
- It is any information relating to an identifiable person.
- a person who uses computers to gain unauthorized access to data.
- It is unwanted software that monitors and gathers information on a person and how they use their computer.
- It is an attack in which the victim receives an email disguised to look as if it has come from a reputable source
- They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware.
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
10 Clues: Something to protect your personal data. • A malicious form of self-replicating software. • It is any information relating to an identifiable person. • a person who uses computers to gain unauthorized access to data. • They are able to exploit vulnerabilities in the a computer’s operating system or a networks hardware. • ...
technology vocabulary 2021-04-19
Across
- Object manufactured and composed of a set of pieces adjusted to each other that are.
- set of instruments that are used to carry out a specific trade or job.
- Is the external part of the computer, for example the monitor or the mouse.
- Is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data.
- Is the internal part of the computer, for example the programs and some games.
- Is someone or something used as a model to make a copy, a design, or an expected action.
Down
- It’s a process to analyze problems based on the logical thinking and the use of the computer (programming.
- Is the global system of interconnected computer networks.
- Set of techniques and science knowledges used to solve problems and satisfy necessities.
- Is an input device that allows a person to enter letters, numbers, and other symbols into a computer
10 Clues: Is the global system of interconnected computer networks. • set of instruments that are used to carry out a specific trade or job. • Is the external part of the computer, for example the monitor or the mouse. • Is the internal part of the computer, for example the programs and some games. • ...
Tech Resources Internet Safety Crossword 2023-02-14
Across
- the information about a particular person that exists on the internet as a result of their online activity.
- an app where one can communicate with people or watch videos
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- the act of staying away from danger
- the use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
Down
- someone who pretends to be someone who they are not
- a place where a person can buy things from the comfort of their home
- a bot who's purpose is to try to get personal information about someone
- a create set of letters, symbols, or words that someone uses to protect an account
- an object that someone has that can be used to go on different apps/search engines
10 Clues: the act of staying away from danger • someone who pretends to be someone who they are not • an app where one can communicate with people or watch videos • a place where a person can buy things from the comfort of their home • a bot who's purpose is to try to get personal information about someone • ...
internet keywords 2023-03-01
Across
- powerful computer that often acts as a central hub for services in a network
- a wireless technology used to connect computers, tablets, smartphones and other devices to the internet
- receives and sends data on computer networks
- a mode of computer data storage in which digital data is stored on servers in off-site locations
- a network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it
Down
- two or more computers (or other electronic devices) that are connected together, usually by cables or Wi-Fi
- there are many of them that connect to your network
- the transmission of voice and data without cable or wires
- the transmission of a file or data from one computer to another over a network (the process of downloading data)
- when your haven't got Wifi it brings data communication in and out
10 Clues: receives and sends data on computer networks • there are many of them that connect to your network • the transmission of voice and data without cable or wires • when your haven't got Wifi it brings data communication in and out • powerful computer that often acts as a central hub for services in a network • ...
Internet Hardware Crossword 2023-03-08
Across
- Technology used by internet services to transmit information as pulses of light, through strands of fiber made of glass or plastic, over long distances
- A network of computers or devices all contained within one connection
- A fast and powerful computer which is capable of handling a lot of traffic
- One of the basic methods computers use to communicate with each other in a network
- Responsible for translating domain names into a specific IP address so that the client can load the requested internet resources
- A networking device that forwards data packets between computer networks
Down
- A system or a program that requests the activity of one or more other systems or programs
- High-speed line or series of lines that forms the fastest path through a network
- A mode of computer data storage that enables storing data and files on the internet through a cloud computing provider
- A wide connection to your router
10 Clues: A wide connection to your router • A network of computers or devices all contained within one connection • A networking device that forwards data packets between computer networks • A fast and powerful computer which is capable of handling a lot of traffic • High-speed line or series of lines that forms the fastest path through a network • ...
CS crossword 2023-03-03
Across
- Over 40 Tb per second
- will have a number of devices connected to it (e.g. phones,laptops, PCs, printers, TVs, etc)
- the delay before a transfer of data begins following an instruction for its transfer.
- a network of computers or devices all contained within one location (e.g. a school).
Down
- In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing ...
- defined as a networking technology that includes the protocol, port, cable, and computer chip needed to plug a desktop or laptop into a local area network (LAN) for speedy data transmission via coaxial or fiber optic cables.
- Up to 300 Mb per second (home users) Up to 1Gb per second (business users)
- the company who supplies your broadband connection.
- a network security device that monitors and filters incoming and outgoing network traffic
- translates human readable domain names
10 Clues: Over 40 Tb per second • translates human readable domain names • the company who supplies your broadband connection. • Up to 300 Mb per second (home users) Up to 1Gb per second (business users) • a network of computers or devices all contained within one location (e.g. a school). • ...
Computer Careers 2023-06-16
Across
- is a person who makes films by means of animation
- is a person who reviews data to identify key insights into a business's customers and ways the data can be used to solve problems.
- is a person who create, test, and develop computer systems with a goal of mimicking human intelligence in said systems.
- is a graphic artist who is responsible for designing the layout, usability, and visual appearance of a website.
- is someone who conceptualizes game plots and storylines, levels, characters and other creative aspects of a game.
- is a person who gain unauthorized access to a computer system or data.
- is a person who applies the engineering design process to design, develop, maintain, test, and evaluate computer software
Down
- is a person who play video games for prize money or salaries.
- is a person who create, maintain and secures databases
- is a person who set up, develop and maintain computer networks.
10 Clues: is a person who makes films by means of animation • is a person who create, maintain and secures databases • is a person who play video games for prize money or salaries. • is a person who set up, develop and maintain computer networks. • is a person who gain unauthorized access to a computer system or data. • ...
E-Marketing, Digital Media, and Social Networking 2013-09-26
Across
- Allow customers to express their needs and wants directly to the firm in response to its marketing communications.
- The worlds largest social networking site that began in 2004.
- media Electronic media that function using digital codes; we are referring to media via computers, phones, smartphones, and other digital devices.
- Use of digital networks to provide linkages between information providers and users.
- A microblogging website that allows users to vent their thoughts at a limit of 140 characters per blog.
Down
- The ability to obtain digital information.
- Refers to the way digital media can be used to outsource tasks to a large group of people.
- Customers abilities to regulate the information they view and the rate and sequence of their exposure to that information
- A smartphone photo sharing app that takes pictures using funky filters.
- a video sharing app that allows six seconds of free format filming on smart phones.
10 Clues: The ability to obtain digital information. • The worlds largest social networking site that began in 2004. • A smartphone photo sharing app that takes pictures using funky filters. • a video sharing app that allows six seconds of free format filming on smart phones. • Use of digital networks to provide linkages between information providers and users. • ...
crossword 1 2015-06-29
Across
- One of the top manufacturers of Network-related equipment. An actual drawing of the Golden Gate Bridge is the logo.
- The Australian Government's mega project to provide 100Mbps to australian households
- Loss in signal power as light travels down the fiber is called
- It is an addressing scheme for the Internet which allows for more efficient allocation of IP Addresses
Down
- A popular brand of watches sold in India, a race of powerful deities that ruled during the Golden age in Greek Mythology
- Which protocol does Ping use?
- The device perform the data traffic directing functions on the internet or on a large corporate network. It is a device that joins multiple wires or wireless networks It operates at network layer of OSI model. Identify the device
- Infosys' Business Continuity Management plan
- A popular company headquartered in Missouri, USA providing CRM, OSS products
- This device was developed by Research In Motion, senior management in Infy have these
10 Clues: Which protocol does Ping use? • Infosys' Business Continuity Management plan • Loss in signal power as light travels down the fiber is called • A popular company headquartered in Missouri, USA providing CRM, OSS products • The Australian Government's mega project to provide 100Mbps to australian households • ...
Information Security Crossword 2017-01-13
Across
- A secret series of characters used to authenticate a person’s identity.
- A person who uses computers to gain unauthorized access to computer systems and networks.
- Anything that has the potential to cause serious harm to a computer system.
- You may not divulge this information while you are working for an employer or after you leave.
Down
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
- A type of malware that is often disguised as legitimate software.
- A flaw or weakness that can be used to attack a system or organization.
- Personal information related to personal data stored on computer systems
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • Personal information related to personal data stored on computer systems • ...
Module 3 2017-02-12
Across
- despite the "stressed executive" stereotype, those who are _____ on the socioeconomic ladder tend to be more stressed.
- The more educated you are, the ___ likely you are to smoke
- Your ___ standing has a direct influence on your health and resources.
- The social _____ of health are based on the social and environmental conditions in which people live.
- _____ health problems cost the US $55 billion in the year 2000.
Down
- Your socioeconomic resources, your psychological resources, and ___ determine your health behaviors.
- _____ conditions in the US, not genetics, account for the increased risk of hypertension in African Americans.
- health ____ mean that people have poorer health and die younger depending on the circumstances they are in, where they live, and what they do.
- social support and ______ _______ contribute to good health, because it promotes social networks and makes people feel loved and valued.
- job ____ increases health, wellbeing, and job satisfaction.
10 Clues: The more educated you are, the ___ likely you are to smoke • job ____ increases health, wellbeing, and job satisfaction. • _____ health problems cost the US $55 billion in the year 2000. • Your ___ standing has a direct influence on your health and resources. • Your socioeconomic resources, your psychological resources, and ___ determine your health behaviors. • ...
Promoting and Preserving Your Psychological Health 2017-12-11
Across
- Reflect the level of closeness and attachment that we develop with individuals and are the very foundation of the human life.
- Refers to the networks of people and services with whom and with which you interact and share social connections.
- Icludes menatal, emotional, social, and spiritual dimensions.
- Refers to the feeling, or subjecttive,side of psychological health.
- Sense of self respect or self worth.
Down
- The ability to identify, use, understand, and manage one's emotions in a positive way.
- Intensifified fellings or complex patterns of feeling that we experience on a regular day basis, including love,hate,anixety etc.
- Includes your interactions with others on an individual and group basis, your ability to use social resources and support in times of need.
- Belief in one's own ability to perform a task successfully.
- Used to describe the thinking or rational dimensions of our health.
10 Clues: Sense of self respect or self worth. • Belief in one's own ability to perform a task successfully. • Icludes menatal, emotional, social, and spiritual dimensions. • Used to describe the thinking or rational dimensions of our health. • Refers to the feeling, or subjecttive,side of psychological health. • ...
INFORMATION SECURITY PUZZLE 2017-11-14
Across
- A piece of digital information generated by a web server and saved in your computer after visiting a website
- A network using which things can communicate with each other using internet as means of communication between them.
- Don't click on _ _ _ _ _ within emails from an unknown or untrusted source
- Should contain a minimum of 10 characters using uppercase letters, lowercase letters, numbers and special characters
Down
- Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _
- The activity of defrauding an online account holder of financial information by posing as a legitimate company.
- An attempt by hackers to damage or destroy a computer network or system.
- A software that is designed to detect and destroy compute viruses.
- Global system of interconnected computer networks that use the Internet protocol suite
- Refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
10 Clues: Cybersecurity is our shared _ _ _ _ _ _ _ _ _ _ _ _ _ _ • A software that is designed to detect and destroy compute viruses. • An attempt by hackers to damage or destroy a computer network or system. • Don't click on _ _ _ _ _ within emails from an unknown or untrusted source • ...
Advertising Vocabulary 2022-03-17
Across
- language in an ad that is intended to qualify a claim
- a type of ad – often in the form of a funny message or video – that is spread widely from person to person, either in formal or informal social networks
- paying a fee for the right to use an entertainment character as a part of advertising.
- the personality of a product or company that is created through its advertising and marketing.
- someone who buys and uses products and services
Down
- a tool used to get people's attention and to get people to do, buy, or believe something
- a symbol or graphic design that identifies a product or company
- a promotional drawing in which prizes are given away at no charge to the participants (advertisers use these as a way to attract attention)
- information about how a product works or helps you
- Federal Trade Commission abbreviation
10 Clues: Federal Trade Commission abbreviation • someone who buys and uses products and services • information about how a product works or helps you • language in an ad that is intended to qualify a claim • a symbol or graphic design that identifies a product or company • paying a fee for the right to use an entertainment character as a part of advertising. • ...
Family Assessment 2022-03-29
Across
- When this is held in the home, it can give the social worker a perspective on family function in its own environment.
- families are not________. Meaning each family will be unique.
- we should always recognize the effects of _______ factors on family and child functioning.
- families develop this when they have positive experiences coping with environmental stressors and demands.
- Used frequently to identify who is in the family, and what role important family members play.
- the structure and quantity of a set of interconnected relationships
Down
- families consist of two or more people who depend on each other. this makes families _______
- the family is seen as an organism that is more than the sum of its parts.
- After constructing the social network map, clients can be asked to then fill out what?
- different ways in which people offer assistance to one another. (provided spontaneously through networks of family and friends, can be provided through a helping network or agency)
10 Clues: families are not________. Meaning each family will be unique. • the structure and quantity of a set of interconnected relationships • the family is seen as an organism that is more than the sum of its parts. • After constructing the social network map, clients can be asked to then fill out what? • ...
26 2024-01-08
Across
- The activity of exploiting genetic material experimentally without regard to ethical considerations.
- Commercial transactions conducted electronically on the Internet.
- Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
- Including all or everyone; not excluding any particular group or individual.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- A digital or virtual form of currency that uses cryptography for security.
Down
- Work Working from a location other than the central office, often from home.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
- A digital or virtual form of currency that uses cryptography for security. (Note: Repeated for variety.)
12 Clues: Commercial transactions conducted electronically on the Internet. • A digital or virtual form of currency that uses cryptography for security. • Work Working from a location other than the central office, often from home. • Including all or everyone; not excluding any particular group or individual. • ...
Service Desk Refresher - September 2/3 2023-09-18
Across
- Initial access to most business systems applications is usually provided by this group
- If a professor needs to change their podcast settings, it needs to be done by this team
- Alumni Email for Life doesn’t guarantee that the user keeps the mailbox; rather, it sets up the UCSD address for email ___
- The short name for ITS-SIS-AcademicAffairs (it’s not AcAff)
Down
- Users that are visiting from other institutions are able to connect to this wifi network
- Professors that need software for their course must fill out this form
- While users don’t necessarily need to come to the front desk for a malware scan, they are required to come for this type of scan
- The opposite of a dynamic IP
- On UCSD wired networks, an IP starting with 172.xx usually a ___ IP address
- Although leads are usually able to process VLAN changes, this group can do them if we are not able to
10 Clues: The opposite of a dynamic IP • The short name for ITS-SIS-AcademicAffairs (it’s not AcAff) • Professors that need software for their course must fill out this form • On UCSD wired networks, an IP starting with 172.xx usually a ___ IP address • Initial access to most business systems applications is usually provided by this group • ...
Cloud Computing 2024-02-07
Across
- ______Computing is a form of computing in which a single large task is broken into smaller tasks through a distributed system on multiple computer networks.
- Cloud service model offering a development platform with tools and services to build and deploy applications
- Opposite of "downloading" data
- Transforming data into an unreadable format to safeguard it from unauthorized access in the cloud
- Connecting different cloud services and applications from various providers to work together seamlessly
Down
- What type of cloud is designed for the exclusive use of a single organization, not shared with others?
- Having a copy of your data stored in the cloud in case of an outage or disaster
- Open-source cloud platform known for its virtual machines, databases, and AI services
- Open-source software for managing and orchestrating containers in the cloud
- Moving data and applications from on-premises servers to the cloud
10 Clues: Opposite of "downloading" data • Moving data and applications from on-premises servers to the cloud • Open-source software for managing and orchestrating containers in the cloud • Having a copy of your data stored in the cloud in case of an outage or disaster • Open-source cloud platform known for its virtual machines, databases, and AI services • ...
5G will create the condition for new business opportunities 2024-04-15
Across
- Reduced in 5G networks, allowing for real-time applications like remote surgeries and autonomous vehicles.
- The interconnected network of businesses, consumers, and devices that thrive with the deployment of 5G technology.
- Vehicles 5G's low latency and high bandwidth are essential for the development and operation of self-driving cars.
- Enabled by 5G, it allows for remote healthcare services.
Down
- Chain Enhanced by 5G's ability to provide real-time tracking and monitoring of goods in transit, improving efficiency and visibility.
- The driving force behind new business opportunities enabled by 5G.
- Computing Enhanced by 5G, it enables faster processing of data closer to the source, optimizing various applications.
- Cities 5G facilitates the development of urban environments with connected infrastructure.
- One of the key features of 5G that enables faster data transfer.
- Reality Enhanced by 5G's capabilities, it opens avenues for immersive experiences in various industries.
10 Clues: Enabled by 5G, it allows for remote healthcare services. • One of the key features of 5G that enables faster data transfer. • The driving force behind new business opportunities enabled by 5G. • Cities 5G facilitates the development of urban environments with connected infrastructure. • ...
Solomon Puzzle unit 2 vocab 2026-02-17
Across
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- a group of computing devices and programs working together for a common purpose
- An agreed-upon set of rules that specify the behavior of some system
- a system of linked pages, programs, and files.
- the series of connections between computing devices on a network starting with a sender and ending with a receiver.
- a type of computer that forwards data across a network
- A chunk of data sent over a network. Larger messages are divided into packets that may arrive at the destination in order, out-of-order, or not at all
Down
- The unique number assigned to each device on the Internet.
- a group of interconnected computing devices capable of sending or receiving data.
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
10 Clues: a system of linked pages, programs, and files. • a type of computer that forwards data across a network • The unique number assigned to each device on the Internet. • An agreed-upon set of rules that specify the behavior of some system • a group of computing devices and programs working together for a common purpose • ...
Everyd'AI 2024-09-18
Across
- An AI-driven solution that optimizes across multiple networks with a holistic approach to paid advertising
- I prioritize accounts by value, orchestrating a laser-focused approach in paid campaigns
- The vault where multi-format assets reside, ready to support omnichannel campaigns
- I’m omnipresent on the digital web, subtly urging users with visual prompts to click, spanning across display inventory
Down
- I’m the digital shadow that mirrors users' previous actions, reappearing to drive conversions
- A strategy where thought leadership scales, leveraging external channels to build credibility without direct promotion
- A granular cost metric that signifies an accepted entry into a nurturing pipeline based on qualification criteria
- In this model, visibility is free, but value is extracted only when engagement happens
- I mold ad content dynamically, reflecting real-time user behavior for maximum impact
- The silent judge of ad appeal, calculating engagement efficiency as a percentage
10 Clues: The silent judge of ad appeal, calculating engagement efficiency as a percentage • The vault where multi-format assets reside, ready to support omnichannel campaigns • I mold ad content dynamically, reflecting real-time user behavior for maximum impact • In this model, visibility is free, but value is extracted only when engagement happens • ...
Form 5 Crossword Puzzle 2025-09-22
Across
- This acronym represents the unique name of WIFI network that are being broadcasted.
- A company that provides mobile network services to the public.
- You enter a web address into a browser and press Enter. What component retrieves and sends the webpage to your browser?
- A network that covers a large area such as a town or city is called.
- Which attack involves following someone into a secure area?
Down
- The ability of a network to be easily expanded by adding new devices, users, storage and other resources is
- A type of social engineering attack where malicious actor rely on creating a believable scenario to trick users into revealing sensative information.
- This acronym represents the component of a mobile network that helps route calls and data.
- What type of network will allow a company to connect branches across different cities?
- A feature introduce in 2G networks which allowed users to send text messages is also known as?
10 Clues: Which attack involves following someone into a secure area? • A company that provides mobile network services to the public. • A network that covers a large area such as a town or city is called. • This acronym represents the unique name of WIFI network that are being broadcasted. • ...
Test 1 2025-11-04
Across
- I watch your fingers as they dance, recording every word and chance.
- I lock your files and hold the key, until you pay, they won’t be free.
- I wear a friendly face, but I’m not what I seem, once you let me in, I’ll shatter your dream.
- I copy myself from host to host, invisible until you are toast
- I’m the umbrella for all that’s bad, from sneaky bugs to hacks gone mad.
- I lie in wait, a silent threat, my fuse is long, my goal is set.
Down
- I’m a secret way to sneak inside, a hidden path the guards can’t find.
- I scan your traits, unique and true, like eyes or prints that belong to you.
- I guard the gates, decide who’s in, based on rights and where you’ve been.
- I crawl through networks, swift and sly, no help I need to multiply.
10 Clues: I copy myself from host to host, invisible until you are toast • I lie in wait, a silent threat, my fuse is long, my goal is set. • I watch your fingers as they dance, recording every word and chance. • I crawl through networks, swift and sly, no help I need to multiply. • I’m a secret way to sneak inside, a hidden path the guards can’t find. • ...
Cybersecurity Vocabulary Crossword 2022-03-22
4 Clues: designed to damage and destroy networks and computer systems • used to prove one's identity, or authorize access to a resource • software used to prevent, check, detect and remove malicious code from a device • practice of sending fraudulent messages that appear to come from a reputable source
Router fun 2018-05-29
Digital Tech 2020-10-07
Across
- Hollerith - an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting
- Census - is a principal agency of the U.S. Federal Statistical System, responsible for producing data about the American people and economy
- - a set of related measures or activities with a particular long-term aim
- - the amount of something produced by a person, machine, or industry
- Lovelace - an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine
- browse - is a software application for accessing information on the World Wide Web. When a user requests a web page from a particular website, retrieves the necessary content from a web server and then displays the page on the user's device
- - is a calculating tool that was in use in the ancient Near East, Europe, China, and Russia, centuries before the adoption of the written Arabic numeral system. The exact origin of the abacus is still unknown
- - an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity
- - hit (someone) hard
- Babbage - A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer
- system - the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals
- - a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
- memory - is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
Down
- - a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- - main processor or just processor, is the electronic circuitry within a computer that executes instructions that make up a computer program
- - what is put in, taken in, or operated on by any process
- - a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
- - the programs and other operating information used by a computer
- - the use or operation of computers
- - is an American multinational technology company headquartered in Armonk, New York. It was founded in 1911 in Endicott, New York, as the Computing-Tabulating-Recording Company
- - is a networking device that forwards data packets between computer networks
- Wozniak - is an American electronics engineer, programmer, philanthropist, and technology entrepreneur
- Turing - an English mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist
- - an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- memory - a usually small computer memory that contains special-purpose information (such as a program) which cannot be altered — compare ram
- - A top-level Internet domain used by associations and non-profit organizations mostly in the U.S. and Canada
- - tools, machinery, and other durable equipment
- science - the study of the principles and use of computers
28 Clues: - hit (someone) hard • - the use or operation of computers • - tools, machinery, and other durable equipment • - what is put in, taken in, or operated on by any process • science - the study of the principles and use of computers • - the programs and other operating information used by a computer • - the amount of something produced by a person, machine, or industry • ...
Units 3-4 Vocab 2023-03-07
Across
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A user on social media who has established credibility in a specific industry.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
Down
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- The process of luring someone into a relationship by means of a fictional online persona.
- this is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
CROSSWORD 2024-10-06
Across
- What is the term for software applications designed to help businesses manage data?
- What device is used to increase or decrease voltage in an electrical circuit?
- What type of semiconductor has more electrons than holes?
- What modulation technique varies the amplitude of the carrier signal?
- What is the unit of electrical resistance?
- What term describes the network of physical objects that are connected to the internet?
- What is the term for the blueprint or plan of a system in software development?
- What is the name for the bottom-most part of a building, transmitting loads to the ground?
- What is the practice of analyzing financial data to make business decisions?
- What technique in AI allows computers to understand spoken language?
- What is the horizontal structural element that supports the weight of floors or roofs?
- What technology enables online transactions between a buyer and a seller?
- What algorithm is used for finding the shortest path in a graph?
- What type of memory is volatile and stores data temporarily while a computer is running?
- What is the process of cleaning, transforming, and modeling data to discover useful information?
- What is the process of converting information into code to prevent unauthorized access?
- Which programming language is known for its "write once, run anywhere" capability?
- What is the basic unit of measurement for land in civil engineering?
Down
- What is the practice of protecting networks and systems from digital attacks?
- What branch of AI deals with machines capable of learning from data?
- What is the term for the rate at which electrical energy is consumed?
- What is the global system of interconnected computer networks known as?
- What law states that the total current entering a junction equals the total current leaving?
- What is the term for attempting to gain unauthorized access to a system?
- What data structure uses LIFO (Last In, First Out) order?
- What device converts sound into electrical signals in communication systems?
- What is the name of the basic building block of digital circuits?
- What is the phenomenon where current flows in one direction only?
- Which technology is used for data transmission over long distances without wires?
- What is the process of finding and fixing defects in software?
- What term describes malicious software designed to damage, disrupt, or gain unauthorized access?
- What machine learning model is inspired by the structure of the brain?
- What is a digital currency that uses cryptography for security?
- What material is primarily used to bind concrete in construction?
- What is the process of creating and managing databases?
- What type of server stores and serves web pages?
- What is the process of removing excess water from soil or land?
- What type of attack involves overwhelming a server with traffic to make it unavailable?
- What type of algorithm is used for making binary decisions?
- What is the method for sending and receiving files over a network?
40 Clues: What is the unit of electrical resistance? • What type of server stores and serves web pages? • What is the process of creating and managing databases? • What type of semiconductor has more electrons than holes? • What data structure uses LIFO (Last In, First Out) order? • What type of algorithm is used for making binary decisions? • ...
Social media, apps and video games unit 2022-11-04
Across
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
Down
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels
- Someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- A user on social media who has established credibility in a specific industry.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them
- The number of times one’s content is displayed, no matter if it was clicked or not
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The process of luring someone into a relationship by means of a fictional online persona
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not • The process of luring someone into a relationship by means of a fictional online persona • ...
Social media 2026-03-30
Across
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
Down
- A user on social media who has established credibility in a specific industry.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The process of luring someone into a relationship by means of a fictional online persona.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- The number of times one’s content is displayed, no matter if it was clicked or not.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Techno Definition 2022-03-03
Across
- a detection system which works on the principle of radar,but uses light from a laser
- A person who introduces new methods,ideas,or products
- Denoting or relating to a period of a thousand years
- Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid
- Take(something) illicitly:steal
- Optimization The process of adjusting your website content to ensure that visitors that access the site from mobile devices have an experience customized to their device
- The process of adding games or games like element to something(such as task) so as to encourage participants
- the formation of ideas or concepts
- Networks a computer system modeled on the human brain and nervous system
- The practice of cross-posting involves posting a single message or piece of content to multiple destinations
- fusion The ability to bring together inputs from multiple radars, lidars and cameras from single model or images of the environment around a vehicle
- Computing a rapidly-emerging technology that harness the laws of quantum mechanics to solve problems too complex for classical computers
- Provide an enhanced viewing experience for content on another device
- Fatigue tiredness and frustration caused by having to remember a large amount of password for electronically-controlled activities
- an accumulation of data that is too large and complex for processing by traditional database management tools
- Key performance indicators
- Someone who believes they have good ideas for businesses or inventions but hasn’t actually managed to get any of them off the ground
- The correct or acceptable way of communicating on the internet
- A system for detecting the presence, direction, distance, and speed of aircraft, ships, and other objects
- reuse(discarded object or materials) in such a way as to create a product of higher quality or value than the original
- specification for a suite of high level communication protocols used to create personal area networks built from small, low-power digital radios
Down
- a form of entertainment
- Leader one whose views on a subject are taken to be authorized and influential
- Massive open online course
- you should focus on putting good content
- audio to describe any digital audio file or format that exceeds the quality of an audio CD
- A set of instructions for solving a problem or accomplishing a task
- The state, fact, quality, or condition of being singular
- a person or thing that interrupts an event, activity, or process by causing a disturbance or problem
- the state or quality of being efficient
- attract attention and encourage visitors to click on a link to a particular web page
- Business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features
- video recording where a view every direction is recorded at the same time
- An image, video, advertisements, etc.., that is circulated rapidly on the internet
34 Clues: a form of entertainment • Massive open online course • Key performance indicators • Take(something) illicitly:steal • the formation of ideas or concepts • the state or quality of being efficient • you should focus on putting good content • Denoting or relating to a period of a thousand years • A person who introduces new methods,ideas,or products • ...
Digital Citizenship Crossword 2015-01-15
Across
- Describes the conditions that copyrighted material may be used without permission.
- Commercial transitions conducted electronically on the internet.
- A person or group that ruthlessly exploits others through the Internet.
- Sources that are reliable,accurate,and trustworthy.
- To manage or influence skillfully, especially in an unfair manner.
- Against one thing, person, or group compared to another in a way that is unfair.
- The method used to boost the ranking of a website in results given by a search engine.
- The personality presented to or perceived by others about a single person.
- The Practice of making people and businesses look best on the internet.
- Using etiquette online and on networks
- An application that authorizes credit-card payments for online businesses.
- The environment in witch communication over computer networks occur.
- The gap between those who have a ready-to-use computer and internet; and those who don't.
- A person who uses online communication to bully others.
- The appropriate and responsible use of technology
- Data relating to the population and particular groups within it.
- A virtual community were members interact with each other through the Internet.
- The process of searching for and/or retrieving requested information from online databases.
- To send someone sexually explicit photos or messages through technology devices.
Down
- A small piece of data sent from a website and stored in a user's web browser while the user is browsing said website.
- Insulting and hostile interaction between two Internet users.
- Websites and applications that allow users to create and share content or to participate in social networking.
- An addiction of which a person's online life is more important then real-life relationships and friends.
- When someone presents information that is not necessary or unwanted.
- When one person reveals him/herself to another through communication.
- The process of growing and expanding to exist throughout the entire world.
- The trail you leave when using technology.
- A regular business that has expanded its activities to operate also on the internet.
- The study of people's efficacy in their working environment
- Digitized content that can be transmitted over the web or other computer network
- This activity usually uses e-mail, cell phones, text, etc.
- A place were particular ideas and views can be shared.
- A standard document that allows the district to out line the rights, responsibilities, and authority of its network.
- The fraudulent gain and use of someone's private identifying information.
- Learning through social and content interactions using personal electronic devices.
- An icon or figure representing a particular person in computer games, Internet forums, etc.
- Unauthorized use or reproduction of another's work.
- The act of manipulating an account user of giving information by posing as a real business.
- The transmission of audio and images (as an event) through the internet.
- A legal right given to a person(s) that protects and claims the person(s) original work, preventing others from claiming, copying, and using the person(s) work without permission.
40 Clues: Using etiquette online and on networks • The trail you leave when using technology. • The appropriate and responsible use of technology • Sources that are reliable,accurate,and trustworthy. • Unauthorized use or reproduction of another's work. • A place were particular ideas and views can be shared. • A person who uses online communication to bully others. • ...
Hardware and Software ( Parts of a computer ) 2021-02-25
Across
- software for pictures or clipart
- an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines
- software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
- a computer that is small enough to be carried around easily and is flat when closed
- the instructions that control what a computer does; computer programs
- a large smartphone that can be used like a tablet computer
- remove bugs (= mistakes) from a computer program
- a computer program that is designed for a particular purpose
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
- a view on a computer screen that contains icons (= small symbols or pictures) representing files, programs, and other features of the compute.
- any small device whose name you have forgotten or do not know
- an electronic glove that sends information about the hand movements of the person wearing it to a computer
- a part of a computer that controls its main operations
- a printer attached to a computer, that can make a solid object from a digital (= computer) model by printing many separate layers of the object
Down
- the part of a computer that performs operations on the information that is put into it
- a brand name for a system for connecting electronic equipment such as mobile phones, computers, and electronic organizers to each other and to the internet using radio signals
- a computer language designed for business managers
- a small computer program, often used on websites, that performs one particular task and works from within a larger program
- software that is no longer produced or supported by the company that originally made it
- is used mainly for typing text into your computer
- Random access memory (temporary)
- a computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
- the core of a computer system
- a piece of equipment, such as a printer, that can be connected to a computer
- computer software that is designed to damage the way a computer works
- the physical and electronic parts of a computer, rather than the instructions it follows
- a brand name for computer software that allows a group of two or more people to see and talk to each other over the internet using their computers, tablets, or smartphones
- a small device used to point to and select items
- a device for making images of the inside of the body or for reading information into a computer system
- a part of a computer to which extra devices such as printers, scanners, and digital cameras can be connected easily
- Virtual Private Network: a private computer network within a larger network such as the internet
31 Clues: the core of a computer system • software for pictures or clipart • Random access memory (temporary) • remove bugs (= mistakes) from a computer program • a small device used to point to and select items • is used mainly for typing text into your computer • a computer language designed for business managers • a part of a computer that controls its main operations • ...
units 3&4 vocabulary 2022-11-04
Across
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- A user on social media who has established credibility in a specific industry.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked
- The number of times one’s content is displayed, no matter if it was clicked or not
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Down
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The process of luring someone into a relationship by means of a fictional online persona.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not • The process of luring someone into a relationship by means of a fictional online persona. • ...
Comp & Media Vocab 2022-11-07
Across
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- a psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Down
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better
- A business methodology that attracts customers by creating valuable content and experiences tailored to them
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach
- A user on social media who has established credibility in a specific industry.
- The process of luring someone into a relationship by means of a fictional online persona
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona • ...
9.3 key words 2024-02-12
Across
- a situation where the attacker can physically view the device screen and keypad to obtain personal information
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files
- one that is done without the target of the hack being aware of it
- an attack meant to shut down a machine or network, making it inaccessible to its intended users
- the process in which your software applies critical updates without seeking confirmation from a user
- type of malicious software, or malware, that spreads between computers and causes damage to data and software
- a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection.
- facts provided or learned about something or someone.
- where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service (SMS) text messages, to reveal sensitive information.
- the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information
- an attack in which the victim is asked in an app or social media post to combine a few pieces of information or complete a short quiz to produce a name.
Down
- a hacking method that uses trial and error to crackpasswords, login credentials, and encryption keys.
- a person who breaks into a computer system. The reasons for hacking can be many: installing malware, stealing or destroying data, disrupting service, and more
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems
- the act of inventing a specific scenario to try and engage with the victim
- a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites
- unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place
- information (typically held electronically) about a particular person, especially sensitive information regarding their finances, medical history, etc
- helps to identify verified users and allows them to access accounts and networks securely.
- facts and statistics collected together for reference or analysis.
- The authorization given to users that enables them to access specific resources on the network
- an authorized attempt to gain unauthorized access to a computer system, application, or data
- a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware
- write once, read many, or WORM, is a data storage technology that allows data to be written to a storage medium a single time and prevents the data from being erased or modified.
25 Clues: facts provided or learned about something or someone. • one that is done without the target of the hack being aware of it • facts and statistics collected together for reference or analysis. • the act of inventing a specific scenario to try and engage with the victim • helps to identify verified users and allows them to access accounts and networks securely. • ...
GIS Day 2024 - ArcGIS Pro Toolboxes 2024-11-04
Across
- tools for performing spatial analysis on big data; tools provide a parallel processing framework for analysis on a desktop machine using Apache Spark
- tools to create, administer, and load data into parcel fabrics
- tools for analyzing data distributions and patterns in the context of both space and time.
- spatial analysis and modeling tools for raster (cell-based) and feature (vector) data
- tools that perform network analysis and network dataset maintenance
- tools that support data validation
- tools for working with distributed workflow manager repositories as well as tools that retrieve job-specific information useful for other data processing tasks
- tools that manage S-57, S-100, VPF, paper charting, and bathymetric data
- tools used in topographic production
- tools that assist in the process of assigning a location to an address
- tools to manage web layers and web maps as well as tools that simplify data extraction through the server
- tools that manage and generate true orthos, digital surface models (DSM), 2.5D and 3D meshes, and point cloud products from adjusted imagery collected by drone and digital aerial sensors
- tools that perform the most fundamental GIS operations from buffering to proximity analysis
- tools for using and training AI models that work with geospatial and tabular data
- tools for converting, displaying, editing, and analyzing public transit data
- tools used to develop, manage, and maintain vector and raster data and datasets
- tools that convert a wide range of data formats using Safe Software’s FME technology
- tools to manage diagrams and configure diagram templates
Down
- tools that enable the automation of analytical processes and workflows determining location, distance, range, and visibility
- tools to create, configure, and work with utility networks
- tools that allow you to apply bulk editing to all features in a feature class to address data quality issues
- tools to create, configure, and work with trace networks
- tools for creating, calibrating, and displaying the data used for linear referencing
- tools designed to produce and refine data to support the production of maps
- tools to create, manage, and maintain oriented imagery datasets and layers
- tools to build, edit, balance, and maintain territories for point and polygon datasets
- tools to create an ArcGIS IPS Information Model
- tools for adding datasets, feature classes, tables, and configurations to host ArcGIS Indoors data in a geodatabase
- tools used to analyze imagery data
- tools that are used to create and manage netCDF, GRIB, HDF, OPeNDAP, Esri’s CRF, multidimensional mosaic datasets, and multidimensional image services
- tools that convert data between various formats
- tools for the configuration and management of the linear referencing system
- tools that perform GIS operations fundamental to market analysis from demographic reporting to visualization of data variables
- tools for creating surfaces that can be used to visualize, analyze, and understand spatial phenomena
- tools that create, analyze, and manage aviation content
- statistical tools for analyzing spatial distributions, patterns, processes, and relationships
- tools that convert and analyze intelligence data sources
- tools that manage bathymetric data
38 Clues: tools that support data validation • tools used to analyze imagery data • tools that manage bathymetric data • tools used in topographic production • tools to create an ArcGIS IPS Information Model • tools that convert data between various formats • tools that create, analyze, and manage aviation content • tools to create, configure, and work with trace networks • ...
AI and Cybersecurity 2025-03-02
Across
- A technique that identifies anomalies by learning normal system behavior.
- A strategy that uses decoy systems to mislead potential attackers.
- A method that detects patterns without pre‐labelled data.
- A general term for software designed to damage or exploit systems.
- The process of converting unstructured text into structured threat intelligence.
- An algorithm that groups similar data points without prior labels.
- A process of embedding hidden messages within non-secret data.
- A generative model used in adversarial defense strategies.
- A decentralized ledger technology that records transactions securely.
- A deceptive email tactic aiming to steal sensitive information.
- A vulnerability exploited before any patch becomes available.
- A method used to scramble data so only authorised parties can read it.
- A process that identifies deviations from normal system behavior.
- A simulated attack conducted to assess a system’s security.
- An attack strategy that manipulates inputs to avoid detection.
- A computing paradigm with the potential to break current cryptographic systems.
- A short-lived digital key that grants temporary access to a system.
- The process of integrating security measures early in the development cycle.
- An autoencoder variant adept at detecting long-term attack patterns.
- A security barrier that filters incoming and outgoing network traffic.
- A security model that denies trust by default.
- A learning technique that uses labelled training data.
- Short abbreviation for a cyberattack that persists undetected.
- A technique that examines user actions to detect irregular behavior.
- A systematic method for testing systems to uncover vulnerabilities.
Down
- The standard established for normal system behavior to flag outliers.
- A type of malware that locks files until a ransom is paid.
- A learning approach where systems adapt through trial and error.
- A GAN-based framework that sanitizes adversarial inputs.
- A decoy system designed to lure attackers away from real assets.
- Coordinated automation of multi-step incident response workflows.
- Neural networks that automatically extract complex features from data.
- An approach combining CNN and RNN for enhanced threat detection.
- A neural network variant particularly effective at visual data analysis.
- The process of confirming a user’s or device’s identity.
- A practice that limits user rights to only what is necessary.
- A technique for extracting actionable intelligence from text.
- The practice of quantifying and managing potential security risks.
- A technique that maps adversarial inputs to a learned data manifold.
- The security centre challenged by overwhelming daily alerts.
- A sequence of operations used to process or secure data.
- A model that integrates spatial and temporal data for threat detection.
- A framework that maps tactics and techniques in cyberattacks.
- A tool that suggests security-focused improvements during code writing.
- The process of cleansing inputs by projecting them onto benign data.
- A software solution that detects and removes malicious programs.
- A network model that captures sequential dependencies in data.
- A device that directs data between networks while managing traffic.
- Abbreviation for analytics that monitor user behavior for anomalies.
- A system designed to monitor network traffic for suspicious activities.
50 Clues: A security model that denies trust by default. • A learning technique that uses labelled training data. • A GAN-based framework that sanitizes adversarial inputs. • The process of confirming a user’s or device’s identity. • A sequence of operations used to process or secure data. • A method that detects patterns without pre‐labelled data. • ...
Hardware and Software ( Parts of a computer ) 2021-02-24
Across
- software for pictures or clipart
- an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines
- software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money
- a computer that is small enough to be carried around easily and is flat when closed
- the instructions that control what a computer does; computer programs
- a large smartphone that can be used like a tablet computer
- remove bugs (= mistakes) from a computer program
- a computer program that is designed for a particular purpose
- a piece of electronic equipment that connects computer networks to each other, and sends information between networks
- a view on a computer screen that contains icons (= small symbols or pictures) representing files, programs, and other features of the compute.
- any small device whose name you have forgotten or do not know
- an electronic glove that sends information about the hand movements of the person wearing it to a computer
- a part of a computer that controls its main operations
- a printer attached to a computer, that can make a solid object from a digital (= computer) model by printing many separate layers of the object
Down
- the part of a computer that performs operations on the information that is put into it
- a brand name for a system for connecting electronic equipment such as mobile phones, computers, and electronic organizers to each other and to the internet using radio signals
- a computer language designed for business managers
- a small computer program, often used on websites, that performs one particular task and works from within a larger program
- software that is no longer produced or supported by the company that originally made it
- is used mainly for typing text into your computer
- Random access memory (temporary)
- a computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
- the core of a computer system
- a piece of equipment, such as a printer, that can be connected to a computer
- computer software that is designed to damage the way a computer works
- the physical and electronic parts of a computer, rather than the instructions it follows
- a brand name for computer software that allows a group of two or more people to see and talk to each other over the internet using their computers, tablets, or smartphones
- a small device used to point to and select items
- a device for making images of the inside of the body or for reading information into a computer system
- a part of a computer to which extra devices such as printers, scanners, and digital cameras can be connected easily
- Virtual Private Network: a private computer network within a larger network such as the internet
31 Clues: the core of a computer system • software for pictures or clipart • Random access memory (temporary) • remove bugs (= mistakes) from a computer program • a small device used to point to and select items • is used mainly for typing text into your computer • a computer language designed for business managers • a part of a computer that controls its main operations • ...
Media and Comp analysis vocab 3&4 2026-03-30
Across
- A user on social media who has established credibility in a specific industry.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
Down
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The process of luring someone into a relationship by means of a fictional online persona.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Units 3 & 4 Vocabulary 2026-03-30
Across
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- The process of luring someone into a relationship by means of a fictional online persona.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
Down
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A user on social media who has established credibility in a specific industry.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Unit 3 & 4 Vocab 2026-03-30
Across
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- The process of luring someone into a relationship by means of a fictional online persona.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
Down
- A user on social media who has established credibility in a specific industry.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
