networks Crossword Puzzles

Love (fraud) is in the air 2024-02-06

Love (fraud) is in the air crossword puzzle
Across
  1. Email messages that claim to be from a reputable business or organization and deceives individuals into disclosing private personal information
  2. The "S" in MISP
  3. "______" is software that my grant a scammer remote access to a computer and collects personal information from member device without their knowledge
  4. A favorite sweet treat of choice enjoyed by many during this holiday
  5. Criminals begin “_________ scams” by romancing unknowing victims-to-be, gaining their trust and making promises of love and new lives together.
  6. A classic flower that symbolizes love
Down
  1. The "I" in MISP
  2. "_____________" is the act of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
  3. A symbol of Valentine’s day - identified by a baby / angel holding a bow and arrow
  4. The holiday celebrated on February 14th - "________'s Day"
  5. These are scam attempts that come via text message
  6. Valentine’s Day revolves around showing "_____" for those you are close to
  7. The "M" in MISP
  8. "________" is when Scammers create a "false" or "shadow copy" of a real website, email or phone number which is indistinguishable from the real thing.

14 Clues: The "I" in MISPThe "S" in MISPThe "M" in MISPA classic flower that symbolizes loveThese are scam attempts that come via text messageThe holiday celebrated on February 14th - "________'s Day"A favorite sweet treat of choice enjoyed by many during this holidayValentine’s Day revolves around showing "_____" for those you are close to...

Computers 2024-07-09

Computers crossword puzzle
Across
  1. duplicating text, data, files, or disks, producing two or more of the same file or segments of data.
  2. a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  3. files embedded within online communication channels such as emails, instant messages, or social networks.
  4. a secret word or phrase that must be used to gain admission to a place.
  5. occurs when a computer program such as a software application or an operating system stops functioning properly and exits.
  6. a small device that connects to a computer and allows you to store and copy information.
  7. a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
Down
  1. a computer transferring data and generating a hard copy.
  2. the process of collecting data from one device and sending it to another device.
  3. a type of data storage device that is used in laptops and desktop computers
  4. It converts physical documents into digital files that can be stored, edited, and shared electronically.
  5. eliminating a file, text, or another object from the computer hard drive or other media.
  6. make a spare copy of data or a disk.
  7. load (software) into a computer

14 Clues: load (software) into a computermake a spare copy of data or a disk.a computer transferring data and generating a hard copy.a secret word or phrase that must be used to gain admission to a place.a type of data storage device that is used in laptops and desktop computersthe process of collecting data from one device and sending it to another device....

Cybersecurity Awareness Month - 2023 2023-10-17

Cybersecurity Awareness Month - 2023 crossword puzzle
Across
  1. an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
  2. one of the biggest ransomware attacks
  3. an unwanted software designed to throw advertisements up on your screen, most often within a web browser
  4. a set of changes to a computer program or its supporting data designed to update, fix, or improve
  5. a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
  6. is an authentication method that requires the user to provide two or more verification factors to gain access
Down
  1. a malware that misleads users of its true intent by disguising itself as a standard program
  2. a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
  3. designed to detect and destroy computer viruses
  4. validating the user identity
  5. will you stop clicking phishing links?
  6. a self-replicating virus that does not alter files but resides in active memory and duplicates itself
  7. a type of characters that you should use in your passwords
  8. harmful software

14 Clues: harmful softwarevalidating the user identityone of the biggest ransomware attackswill you stop clicking phishing links?designed to detect and destroy computer virusesa type of characters that you should use in your passwordsa malware that misleads users of its true intent by disguising itself as a standard program...

Digital-Literacy-Kavon Stewart 2024-06-14

Digital-Literacy-Kavon Stewart crossword puzzle
Across
  1. Spies on you, stealing information like passwords and credit card numbers
  2. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  3. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  4. Keeps track of every key you type and sends it to the hacker.
  5. IF someone is completely _______ they cant be traced.
  6. Reads everyone’s data that is passing through a network. Usually on public WiFi.
  7. A group of computers all being controlled by a remote hacker to perform illegal activity.
Down
  1. Displays ads on your computer. May slow down your computer
  2. Blocks you from accessing your files until you pay a ransom.
  3. When someone gets your personal info and then does things pretending to be you.
  4. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  7. Something used to protect Against Viruses

14 Clues: Something used to protect Against VirusesIF someone is completely _______ they cant be traced.Displays ads on your computer. May slow down your computerBlocks you from accessing your files until you pay a ransom.Keeps track of every key you type and sends it to the hacker.Spies on you, stealing information like passwords and credit card numbers...

Data 101 Recap 2024-05-30

Data 101 Recap crossword puzzle
Across
  1. Refers to a service that allows data to be stored on remote servers accessed via the internet, providing scalable and flexible storage solutions.
  2. Information stored and managed within an organisation's own physical infrastructure and servers, rather than on remote servers or in the cloud.
  3. Information collected from sources outside an organisation.
  4. Information that is organised in a predefined format, such as databases or spreadsheets, making it easy to search, analyse, and process.
  5. Something that data can bring to an organisation.
  6. Information that is generated within an organization.
  7. Information about other data.
  8. Information that is accessible to everyone.
Down
  1. All aspects of online activity, including communication, commerce, entertainment, and information exchange, conducted via digital technologies such as the internet and computer networks.
  2. Information that is freely available to anyone for use and distribution.
  3. Network of interconnected devices embedded with sensors, software, and connectivity, enabling them to collect and exchange data for various applications and services.
  4. Information that is confidential and not intended to be publicly disclosed.
  5. Information that lacks a predefined format, such as text documents, images, videos, and social media posts, making it more complex to analyse and process.
  6. Laws or rules enacted by a governing body.

14 Clues: Information about other data.Laws or rules enacted by a governing body.Information that is accessible to everyone.Something that data can bring to an organisation.Information that is generated within an organization.Information collected from sources outside an organisation.Information that is freely available to anyone for use and distribution....

iPay Puzzle 2024-05-17

iPay Puzzle crossword puzzle
Across
  1. Marketing of goods or services by means of telephone calls
  2. commercial transactions conducted electronically on the internet.
  3. the digital innovation arm of the Inteltec Group
  4. an Emirati start-up that aims to revolutionize the e-commerce industry by streamlining middle-mile package transportation across the GCC.
  5. provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.
  6. it makes your interconnection easier.
  7. monthly issue of latest updates within our company
  8. He does development, implementation of comprehensive core accounting, budgeting, financial reporting, and regulatory compliance
Down
  1. a GCC leading company in engineering and realization of Telecom Networks and Systems.
  2. provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.ne Stop Shop For E-Payment Solutions
  3. Provider of delivery services to ensure packages reach their destination seamlessly.
  4. Leveraging the support of a family business group, strategically partner with visionary entrepreneurs to craft the next wave of out-of-this-world startups.
  5. A global conference that covers the latest trends, market disruptors and technologies shaping the digital commerce world
  6. It's a set of strategies and techniques used to improve the visibility of a website

14 Clues: it makes your interconnection easier.the digital innovation arm of the Inteltec Groupmonthly issue of latest updates within our companyMarketing of goods or services by means of telephone callscommercial transactions conducted electronically on the internet.It's a set of strategies and techniques used to improve the visibility of a website...

types of crime 2025-12-04

types of crime crossword puzzle
Across
  1. offences committed by organisations, usually in the pursuit of profit for the company rather than the benefit of individuals.
  2. theft or intentional damage to things owned by an individual, group or organisation.
  3. offences which damage the natural world, with resulting harm to humans, other living things and the environment.
  4. criminal activities carried out by a group of (often young) people, who have a territory and a defined leadership and internal organisation.
  5. offences which have a clear goal. For example may include theft or burglary.
  6. involves the use or threat of physical force which will harm the victim.
Down
  1. non-violent crime committed by middle class people for financial gain.
  2. offences in which the victim is targeted because of a certain characteristics, related to, for example age, faith, sexuality or race.
  3. any crime or illegal activity committed on through or using the internet.
  4. crime involving use of new technologies.
  5. criminal activities which are planned and carried out by powerful groups.
  6. offences in which the offender and the victim live in the same family home or are in a relationship.
  7. offences involving emotions, which are usually unplanned.
  8. offences which are worldwide, involving international networks.

14 Clues: crime involving use of new technologies.offences involving emotions, which are usually unplanned.offences which are worldwide, involving international networks.non-violent crime committed by middle class people for financial gain.involves the use or threat of physical force which will harm the victim....

Week 1 Puzzle 2020-08-25

Week 1 Puzzle crossword puzzle
Across
  1. This is an example of "something you know"--one of the key factors in MFA.
  2. Approximately $6 trillion is planned on being spent on this by 2021.
  3. General term for the type of device most often connecting to public WiFi.
  4. This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
  5. Globally, one of these attacks every 39 seconds.
  6. By 2025, there will be an estimated 75 billion of these devices connected to the internet.
  7. 95% of cybersecurity breaches involve this type of error.
Down
  1. Any incident that results in unauthorized access to computer data, applications, networks or devices.
  2. The most dangerous type of WiFi.
  3. This is an example of "something you are"--one of the key factors of MFA.
  4. This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
  5. To increase your personal internet security, consider turning off the "save password" feature in this.
  6. 93% of these organizations have experienced a data breach within the past 3 years.
  7. Software that is created specifically to help detect, prevent and remove malicious software.

14 Clues: The most dangerous type of WiFi.Globally, one of these attacks every 39 seconds.95% of cybersecurity breaches involve this type of error.Approximately $6 trillion is planned on being spent on this by 2021.This is an example of "something you are"--one of the key factors of MFA....

Digital Literacy-Kavon 2024-06-13

Digital Literacy-Kavon crossword puzzle
Across
  1. Blocks you from accessing your files until you pay a ransom.
  2. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  3. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  4. Spies on you, stealing information like passwords and credit card numbers
  5. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. Keeps track of every key you type and sends it to the hacker.
  7. Something used to protect Against Viruses
  8. Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
  1. Displays ads on your computer. May slow down your computer
  2. IF someone is completely _______ they cant be traced.
  3. When someone gets your personal info and then does things pretending to be you.
  4. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  6. A group of computers all being controlled by a remote hacker to perform illegal activity.

14 Clues: Something used to protect Against VirusesIF someone is completely _______ they cant be traced.Displays ads on your computer. May slow down your computerBlocks you from accessing your files until you pay a ransom.Keeps track of every key you type and sends it to the hacker.Spies on you, stealing information like passwords and credit card numbers...

Digital-Literacy-Kavon Stewart 2024-06-14

Digital-Literacy-Kavon Stewart crossword puzzle
Across
  1. Blocks you from accessing your files until you pay a ransom.
  2. Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
  3. Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
  4. Spies on you, stealing information like passwords and credit card numbers
  5. Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
  6. Keeps track of every key you type and sends it to the hacker.
  7. Something used to protect Against Viruses
  8. Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
  1. Displays ads on your computer. May slow down your computer
  2. IF someone is completely _______ they cant be traced.
  3. When someone gets your personal info and then does things pretending to be you.
  4. Spreads through networks and emails infecting as many computers as possible. Get it through email.
  5. Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
  6. A group of computers all being controlled by a remote hacker to perform illegal activity.

14 Clues: Something used to protect Against VirusesIF someone is completely _______ they cant be traced.Displays ads on your computer. May slow down your computerBlocks you from accessing your files until you pay a ransom.Keeps track of every key you type and sends it to the hacker.Spies on you, stealing information like passwords and credit card numbers...

travel, communication, airplane, news, letter, text message, e-mial, radio, internet,boat,bus, motorcycle. cable car, truck, horse 2024-10-17

travel, communication, airplane, news, letter, text message, e-mial, radio, internet,boat,bus, motorcycle. cable car, truck, horse crossword puzzle
Across
  1. small wheel or roller, specifically the wheel of a gun-carriage.(N)
  2. message:A brief electronic message sent between mobile phones.(N)
  3. powered heavier-than-air aircraft with fixed wings.(N)news:New information of interest. (N)
  4. An open-seated motor-powered vehicle with two wheels.(N)
  5. A craft used for transportation of goods, fishing, racing, recreational cruising, or military use on or in the water, propelled by oars or outboard motor or inboard motor or by wind. (N)
  6. written or printed communication, generally longer and more formal than a note.(N)
  7. motor vehicle for transporting large numbers of peoplealong roads.(N)
  8. A hoofed mammal, of the genus Equus, often used throughout history for riding and draft work.
Down
  1. Any set of computer networks that communicate using the Internet Protocol. (N)
  2. concept or state of exchanging data or informationbetween entities.
  3. To be on a journey, often for pleasure or business and with luggage; to go from one place to another.(V,N)
  4. car:A streetcar moved by gripping to rotating loop of cable running along the track.(N)
  5. technology that allows for the transmission of sound or other signals by modulation of electromagnetic waves.(N)
  6. spelling of email (N)

14 Clues: spelling of email (N)An open-seated motor-powered vehicle with two wheels.(N)message:A brief electronic message sent between mobile phones.(N)concept or state of exchanging data or informationbetween entities.small wheel or roller, specifically the wheel of a gun-carriage.(N)motor vehicle for transporting large numbers of peoplealong roads.(N)...

Computing Careers Group Members Name: 2022-05-06

Computing Careers     Group Members Name: crossword puzzle
Across
  1. __________________ create systems to protect information networks and websites from cyber attacks and other security breaches.
  2. __________________ is considered to be one of the most widely recognized forces affecting work and how it is changing.
  3. As a ____________________ you are responsible for creating new programs for an organization.
  4. _________________ are responsible for designing, developing, and testing computer components, such as circuit boards, routers, and memory devices.
  5. They develop and improve the data resources used to store and retrieve critical information.
  6. Individuals who watch over a team of programmers and analysts to complete projects.
Down
  1. ______________ analyze a company's technology needs and oversee the implementation of appropriate data systems.
  2. _________________assess an organization's computer systems and recommend changes to hardware and software to improve the company.
  3. which team installs new software, troubleshoots, and repairs software problems
  4. Which department in an organisation is responsible for the hardware software and network of computers in a company
  5. __________________design, implement, and maintain networking and data communication systems.
  6. ____________________ invent technology that solves complex problems in fields like science, medicine, and business.
  7. They need to be fluent in the computer languages that are used to write the code for programs.
  8. Communication Skills and broad knowledge of technology and computer systems help computer science individuals excel in this role.
  9. Who creates Websites

15 Clues: Who creates Websiteswhich team installs new software, troubleshoots, and repairs software problemsIndividuals who watch over a team of programmers and analysts to complete projects.__________________design, implement, and maintain networking and data communication systems....

CYBERSECURITY - PHISHING 2021-12-01

CYBERSECURITY - PHISHING crossword puzzle
Across
  1. phishing emails may contain _____ to Malicious websites
  2. Email scam or attempt to trick you into giving your password or personal information
Down
  1. consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
  2. Someone who seeks and exploits weaknesses in a computer system or computer network.

4 Clues: phishing emails may contain _____ to Malicious websitesSomeone who seeks and exploits weaknesses in a computer system or computer network.Email scam or attempt to trick you into giving your password or personal informationconsists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks

IT Jobs and Responsibilities Vocabulary 2023-05-25

IT Jobs and Responsibilities Vocabulary crossword puzzle
Across
  1. They may also build software to complete recent activities, perform old ones or send data more effectively and efficiently.
  2. They can work on operating systems, video games, middleware, commercial applications or network control systems.
  3. Their goal is to keep hackers out of a company's or organisation's computer system to protect data.
Down
  1. They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop.
  2. manage the daily operations of computer networks.

5 Clues: manage the daily operations of computer networks.Their goal is to keep hackers out of a company's or organisation's computer system to protect data.They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop....

CS Principles 2022 2022-04-22

CS Principles 2022 crossword puzzle
Across
  1. Spotify adds a ___ layer to streamed songs which prevents their subscribers from listening to the songs anywhere besides Spotify apps.
  2. A baked good. Also something that tracks information about a user visiting a website.
  3. A __ license is used when an author wants to give other people the right to share, use, and build upon a work that the author has created.
  4. The bandwidth of a computer network is the maximum amount of ____ that can be sent in a fixed amount of time.
  5. Gives the creator legal rights to determine whether their work can be copied and under what conditions
  6. Algorithms with exponential or factorial efficiencies are examples of algorithms that run in a(n) ___ amount of time
  7. ROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise
  8. For example, a = b evaluates to ____ if a and b are equal
  9. A rogue Access Point is a ____ access point that gives unauthorized access to secure networks
Down
  1. Analog data are values that change ____ , rather than in discrete intervals, over time.
  2. unscrambling data
  3. The protocols used in the Internet are ___
  4. JPG images use a ___ compression technique
  5. Dynamic routing allows for ____ of the Internet
  6. wikipedia is an example of ____ because many online users combine their efforts
  7. A protocol is an agreed upon set of ____ that specify the behavior of a system.

16 Clues: unscrambling dataThe protocols used in the Internet are ___JPG images use a ___ compression techniqueDynamic routing allows for ____ of the InternetFor example, a = b evaluates to ____ if a and b are equalROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise...

Revision : Marketing Analytics 2025-01-04

Revision : Marketing Analytics crossword puzzle
Across
  1. ________ data is measured as whole numbers: 1, 2, 3, ..
  2. networks _______ are algorithms that are trained to recognize patterns in data that are non-linear.
  3. _________ measures the frequency of the specific association rule.
  4. language processing (NLP) ________ is a branch of artificial intelligence (AI) used to identify patterns by reading and understanding meaning from human language.
  5. data includes text, images, videos, and sensor data.
  6. learning _________uses an algorithm to build neural network models that classify or predict target variables.
  7. Market basket analysis, sometimes referred to by marketers as _________ discovery, uses purchase transaction data to identify associations between products or combinations of products and services that occur together frequently.
Down
  1. ______ analytics is used to build models based on the past to explain the
  2. The ________ algorithm is used to calculate frequently co-occurring items in a transaction dataset.
  3. learning _______ is a statistical method of learning that can be trained without human intervention to understand and identify
  4. ______ data analysis provides a summary of the main characteristics within the data.
  5. _________ data is made up of records that are organized in rows and columns.
  6. between previously established variables.
  7. _______ data exist when values are selected from a group of categories
  8. ___________ is a situation where the predictor variables are highly correlated with each other.
  9. In the _________ layer, the model arrives at a prediction.

16 Clues: between previously established variables.data includes text, images, videos, and sensor data.________ data is measured as whole numbers: 1, 2, 3, ..In the _________ layer, the model arrives at a prediction._________ measures the frequency of the specific association rule._______ data exist when values are selected from a group of categories...

Myles Osborne AI Cybersecurity Word Search 2025-03-08

Myles Osborne AI Cybersecurity Word Search crossword puzzle
Across
  1. The use of largely automatic equipment in a system of operation or production.​
  2. in Science
  3. Society: A concept that refers to a society increasingly preoccupied with the future and safety, generating the notion of risk.​
  4. The practice of protecting systems, networks, and programs from digital attacks.​
  5. Intelligence: The simulation of human intelligence processes by machines, especially computer systems.​
  6. Inclination or prejudice for or against one person or group, especially in a way considered to be unfair.​
  7. The state of not being equal, especially in status, rights, and opportunities.​
  8. The belief that every problem has a solution, especially technological solutions to societal issues.​
  9. The process by which individuals become more concerned with their own lives and identities rather than traditional societal roles.​
Down
  1. The fact or condition of being accountable; responsibility.​
  2. The quality of being done in an open way without secrets.​
  3. Reliance on the integrity, strength, ability, or surety of a person or thing; confidence.​
  4. The ability to recognize forces of socialization and alter one's place in the social structure.​
  5. in Science
  6. A rule or directive made and maintained by an authority.​
  7. The process by which businesses or other organizations develop international influence or start operating on an international scale.​
  8. Moral principles that govern a person's behavior or the conducting of an activity.

17 Clues: in Sciencein ScienceA rule or directive made and maintained by an authority.​The quality of being done in an open way without secrets.​The fact or condition of being accountable; responsibility.​The use of largely automatic equipment in a system of operation or production.​...

Introduction to Internet 2013-10-06

Introduction to Internet crossword puzzle
Across
  1. a technology which allows to interact via two way video and audio transmission simultaneously .
  2. a unique address of every page on internet.
  3. An online process that involves instant text messaging between two or more users.
  4. A link that allows the user to visit websites without typing new address.
  5. A new development in the field of Internet which allows the user to access information without the use of a telephone line.
  6. Microsoft Internet Explorer and Google Chrome are examples of a software called.
  7. a company that provides individuals and other companies to access the internet.
  8. a language used to create web pages .
Down
  1. A network of networks
  2. another name for `online shopping` which is a new concept of purchasing goods sitting at home.
  3. is an example of transferring large amounts of data across the internet.
  4. The first network that came into existence.
  5. A collection of computers that are linked together.
  6. The first page of particular website displayed by the web browser.
  7. an electronic device which converts analog signals to digital signals and vice/versa.
  8. A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
  9. A collection of one or more related web pages linked with one another to form a global web of information.
  10. A method of communication in which one can accept, forward, delivers and stores messages digitally.

18 Clues: A network of networksa language used to create web pages .The first network that came into existence.a unique address of every page on internet.A collection of computers that are linked together.The first page of particular website displayed by the web browser.is an example of transferring large amounts of data across the internet....

Introduction to Internet 2013-10-06

Introduction to Internet crossword puzzle
Across
  1. a company that provides individuals and other companies to access the internet.
  2. A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
  3. another name for `online shopping` which is a new concept of purchasing goods sitting at home.
  4. is an example of transferring large amounts of data across the internet.
  5. An online process that involves instant text messaging between two or more users.
  6. A collection of computers that are linked together.
  7. The first page of particular website displayed by the web browser.
  8. A method of communication in which one can accept, forward, delivers and stores messages digitally.
  9. a language used to create web pages .
Down
  1. a technology which allows to interact via two way video and audio transmission simultaneously .
  2. Microsoft Internet Explorer and Google Chrome are examples of a software called.
  3. A new development in the field of Internet which allows the user to access information without the use of a telephone line.
  4. A link that allows the user to visit websites without typing new address.
  5. A collection of one or more related web pages linked with one another to form a global web of information.
  6. The first network that came into existence.
  7. A network of networks
  8. an electronic device which converts analog signals to digital signals and vice/versa.
  9. a unique address of every page on internet.

18 Clues: A network of networksa language used to create web pages .The first network that came into existence.a unique address of every page on internet.A collection of computers that are linked together.The first page of particular website displayed by the web browser.is an example of transferring large amounts of data across the internet....

Assignment 6 - Activities 2016-02-21

Assignment 6 - Activities crossword puzzle
Across
  1. a hypertext document connected to the World Wide Web; 2 words
  2. type of communication where both sender and receiver are active at same time
  3. using neutral rather than subjective language; 2 words
  4. computer or program that manages access to a centralized resource in a network
  5. companies that sell connection to the internet; abbreviated
  6. a group of information on a computer that can be software programs or data
  7. the exclusive legal right, given to an originator to print, publish, film, etc. and to authorize others to do the same
  8. use of a computer to gain unauthorized access to data in a system
Down
  1. an auxiliary memory to store data from which high-speed retrieval is possible
  2. a related group of networked computers
  3. used to view web pages and navigate between them via hyperlinks; 2 words
  4. the Internet is primarily this type of communication system
  5. files that can be embedded in web pages and displayed by a browser
  6. legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights' holders; 2 words
  7. a system or program that allows the user to edit text; 2 words
  8. person successfully masquerades as another by falsifying data
  9. the main technology for local area networks such as connecting all computers in a lab or building
  10. the codes or tags that browsers use to create web pages

18 Clues: a related group of networked computersusing neutral rather than subjective language; 2 wordsthe codes or tags that browsers use to create web pagesthe Internet is primarily this type of communication systemcompanies that sell connection to the internet; abbreviateda hypertext document connected to the World Wide Web; 2 words...

easy 2024-04-04

easy crossword puzzle
Across
  1. a type of network where anyone can connect without authentication, often found in cafes, airports, etc.
  2. Method of protecting your accounts with more than one form of authentication.
  3. A scam where attackers impersonate someone from within the organization to trick employees into sending money or sensitive information.
  4. A method of encrypting data during transmission over a network, often used in public networks to enhance security.
Down
  1. Technique used to erase visible data from the screen to prevent unauthorized access.

5 Clues: Method of protecting your accounts with more than one form of authentication.Technique used to erase visible data from the screen to prevent unauthorized access.a type of network where anyone can connect without authentication, often found in cafes, airports, etc....

Bruin AI Crossword Puzzle Week 10 2023-12-04

Bruin AI Crossword Puzzle Week 10 crossword puzzle
Across
  1. The mental process of acquiring knowledge and understanding through thought, experience, and the senses.
  2. Principles of right and wrong governing the conduct of individuals and organizations, particularly important in AI and technology
  3. The inclination or prejudice for or against something, often influencing decision-making and algorithms.
Down
  1. A supervised learning algorithm used in training artificial neural networks.
  2. The process of making something as effective or functional as possible, often used in the context of algorithms and models.

5 Clues: A supervised learning algorithm used in training artificial neural networks.The mental process of acquiring knowledge and understanding through thought, experience, and the senses.The inclination or prejudice for or against something, often influencing decision-making and algorithms....

Chapter 5- SALTING 2022-09-10

Chapter 5- SALTING crossword puzzle
Across
  1. It is the process of translating a random phrase into a code
  2. It is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
  3. It is the act of entering as many passwords or passphrases as possible until eventually is guessing your password correctly
Down
  1. It is a string of characters used to verify the identity of a user during the authentication process
  2. It is adding on purpose more characters

5 Clues: It is adding on purpose more charactersIt is the process of translating a random phrase into a codeIt is a string of characters used to verify the identity of a user during the authentication processIt is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks...

Cybersecurity Fundamentals Chapter 8 2022-11-08

Cybersecurity Fundamentals Chapter 8 crossword puzzle
Across
  1. US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
  2. poorly enforced security policies, no awareness of security
  3. the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
  4. open source linux security distribution.
  5. disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
  6. a method of testing the areas of weakness in systems by using various malicious techniques.
  7. includes the users who access the organization's information system.
Down
  1. assess computer, computer systems, networks, or applications for weakness.
  2. a non-profit organization that brings together industry, academia and government to address advance cyber threats.
  3. a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
  4. laws prohibit undesired behaviors.
  5. intercept and log network traffic
  6. provides free analysis and warning service to internet users and organizations.
  7. help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.

14 Clues: intercept and log network trafficlaws prohibit undesired behaviors.open source linux security distribution.poorly enforced security policies, no awareness of securityincludes the users who access the organization's information system.assess computer, computer systems, networks, or applications for weakness....

Show How Much You Know About Social Engineering 2025-09-04

Show How Much You Know About Social Engineering crossword puzzle
Across
  1. Cybercriminals use social engineering to get users to share confidential information or download this.
  2. A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
  3. A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
  4. The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
  5. The highest defense rating for passwords is "____"
  6. A single compromised password can put your organization's security and personal information at ____.
  7. This is a common way cyber villains get into computer networks.
Down
  1. This password level uses simple passwords and the same password for every account.
  2. The password defense rating for a "Level 1: Beginner" is "____".
  3. An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
  4. The name of the character that uses "convince" and "impersonate" attacks.
  5. The human firewall manifesto recommends using this for every account.
  6. Cybercriminals rely on being able to convince users to click on these.
  7. The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.

14 Clues: The highest defense rating for passwords is "____"This is a common way cyber villains get into computer networks.The password defense rating for a "Level 1: Beginner" is "____".The human firewall manifesto recommends using this for every account.Cybercriminals rely on being able to convince users to click on these....

ICT terminology 2013-09-03

ICT terminology crossword puzzle
Across
  1. world wide web
  2. Uniform resource locator. A ______ is the address of a specific Web site or file on the Internet
  3. Web browser is the program people use to access the World Wide Web
  4. media _______ is a collection of Internet-based communities
  5. Short for Wireless Fidelity.
  6. an Internet _________ acts as a marker for a Web site.
  7. ____________ can locate relevant Web sites when users enter search terms or phrases
  8. The _________ is the primary user interface of a computer
  9. an avatar specifically refers to a character that represents an online user.
  10. the _______ spreads across the globe and consists of countless networks and computers, allowing millions of people to share information
Down
  1. address it is another word for url
  2. The mouse cursor is most often an arrow that you can use to point to different objects on your screen
  3. The term ________ is often used synonymously with "computer screen" or "display
  4. Originating from the name of Hormel's canned meat, now also refers to junk e-mail or irrelevant postings
  5. A smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages
  6. Short for Web Log
  7. the group of letters you have to type in before you can log into a website.
  8. Information communication technology. ICT refers to technologies that provide access to information through telecommunications

18 Clues: world wide webShort for Web LogShort for Wireless Fidelity.address it is another word for urlan Internet _________ acts as a marker for a Web site.The _________ is the primary user interface of a computermedia _______ is a collection of Internet-based communitiesWeb browser is the program people use to access the World Wide Web...

INQUSITIVE 2020-11-01

INQUSITIVE crossword puzzle
Across
  1. a printed circuit board containing the principal components of a computer or other device.
  2. This was invented in Germany around 1440 by Johannes Gutenberg.
  3. The _________ is the movement that happens as a result of the INPUT.
  4. This is a magnet made by an electric current. It usually has an iron core.
  5. Is a common type of network cable used with wired networks
  6. The first ever programming language developed.
  7. Technical word for 'stretching' liquid aluminium.
  8. A programming error that causes a program to behave in an unexpected way.
Down
  1. First mobile robot capable of reasoning about it's surrounding.
  2. The branch of technology that deals with the design, construction, operation, and application of robots.
  3. A program on a computer that tells it how to communicate with an add-on piece of equipment
  4. A wheel used for pulling or raising a weight
  5. use of computer programs to create 2D or 3D graphical representations of the real product.
  6. A circuit in which all parts are connected end to end to provide a single path of current.
  7. This was first discovered in the 1930s with the first operational plant coming in the 1950s.
  8. Thomas Edison is credited with designing this in 1879.
  9. Pivot point around which a lever turns
  10. The generic word for an application, document, control panel, or other computer data.

18 Clues: Pivot point around which a lever turnsA wheel used for pulling or raising a weightThe first ever programming language developed.Technical word for 'stretching' liquid aluminium.Thomas Edison is credited with designing this in 1879.Is a common type of network cable used with wired networks...

legal terms - general 2022-05-05

legal terms - general crossword puzzle
Across
  1. power networks
  2. an annual plan by Congress to spend more than it collects in tax revenues
  3. the total of all prior spending by all Congresses in the past that spent in excess of revenues
  4. what political leaders who want the Supreme Court to only follow a strict and historically narrow interpretation of the Constitution and the powers of the judiciary prefer
  5. powers given to Congress to have individuals give evidence
  6. the leaders of Congress who have the duty of connecting the House and Senate leaders to the regular members
  7. members of Congress are expected to work for their party affiliation
  8. votes by Congress to allow the old budget to continue before the new one is voted upon
Down
  1. what happens when a president refuses to sign a bill during the last 9 days of a Congressional session
  2. Senate de-facto leader
  3. members of Congress expected to serve the needs of their constituents
  4. amendments attached to bills that do not pertain to the main goal of the bill
  5. Congress’ main method of controlling the power of the bureaucratic agencies
  6. removing a federal official from office
  7. a leader awaiting their replacement
  8. rules that are usually applied in floor debates to make the system move a little quicker
  9. members of Congress trying to be both representatives and policymakers
  10. when a president uses powers like executive orders, the “Bully-Pulpit”, and “war-making”

18 Clues: power networksSenate de-facto leadera leader awaiting their replacementremoving a federal official from officepowers given to Congress to have individuals give evidencemembers of Congress are expected to work for their party affiliationmembers of Congress expected to serve the needs of their constituents...

Tyson S. 2024-01-09

Tyson S. crossword puzzle
Across
  1. data about data
  2. An agreed-upon set of rules that specify the behavior of some system
  3. representing information using only two options
  4. an ordered collection of elements
  5. any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
  6. computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
  7. a written description of how a command or piece of code works or was developed.
  8. a named reference to a value that can be used repeatedly throughout a program.
  9. an ordered sequence of characters
  10. representing information using ten options.
  11. maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
Down
  1. the practice of obtaining input or information from a large number of people via the Internet
  2. a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
  3. Value a data type that is either true or false
  4. an individual value in a list that is assigned a unique index
  5. the process of accessing each item in a list one at a time.
  6. 8 bits
  7. data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.

18 Clues: 8 bitsdata about dataan ordered collection of elementsan ordered sequence of charactersrepresenting information using ten options.Value a data type that is either true or falserepresenting information using only two optionsthe process of accessing each item in a list one at a time.an individual value in a list that is assigned a unique index...

CROSSWORD INTEGRATION on ICT 2024-09-29

CROSSWORD INTEGRATION on ICT crossword puzzle
Across
  1. This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
  2. It refers to the physical components of a computerthat you can touch and see
  3. These devices display or output data from a computer
  4. This software helps manage a company's interactions with current and potential customers
  5. This is harmful software designed to damage or disrupt systems
  6. It involves organizing and maintaining data processes efficiently
  7. This type of software helps users perform specific tasks like writing or calculating
  8. This is a set of instructions that tells a computer how to perform tasks
  9. It involves protecting computers and networks from unauthorized access or attacks
  10. It integrates core business processes into a single system
Down
  1. This allows users to store and access data over the internet instead of local hardware
  2. These devices allow users to enter data into a computer
  3. It manages the hardware and software resources of a computer system
  4. This is a security system that controls the incoming and outgoing network traffic
  5. It refers to the unauthorized access or manipulation of computer systems
  6. It secures access to systems or information using a secret combination of characters
  7. This includes all technologies used to handle telecommunications, broadcasting, and information systems
  8. It involves encoding information so that only authorized parties can understand it

18 Clues: These devices display or output data from a computerThese devices allow users to enter data into a computerIt integrates core business processes into a single systemThis is harmful software designed to damage or disrupt systemsIt involves organizing and maintaining data processes efficiently...

Tech Puzzle Showdown​ 2025-04-11

Tech Puzzle Showdown​ crossword puzzle
Across
  1. Most commonly used tool for automating web browsers
  2. A meeting held at the end of a sprint to discuss what went well, what didn't, and how to improve.
  3. High Level Web Framework that encourages rapid development and clean, pragmatic design
  4. World's leading customer relationship management (CRM) platform
  5. A signal that temporarily halts the CPU to handle events.
  6. A mechanism where one class acquires the properties and behaviors of another class
  7. A cloud-based data warehousing platform
  8. Practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage
  9. A tool for API testing
Down
  1. An architectural style that structures an application as a collection of loosely coupled services
  2. A decentralized digital ledger that securely records, stores, and verifies data across a network of computers
  3. Open-source operating system that is widely used for its stability, security, and flexibility
  4. A measure of the amount of work a team can complete in a single sprint
  5. The oldest high-level programming language that is still in use today
  6. Programming language that is known for its use in data analysis and machine learning
  7. A game engine for developing 2D and 3D games.
  8. Open-source and NoSQL database designed for handling large volumes of data
  9. A command line interface and programming language that lets users interact with a computer's operating system

18 Clues: A tool for API testingA cloud-based data warehousing platformA game engine for developing 2D and 3D games.Most commonly used tool for automating web browsersA signal that temporarily halts the CPU to handle events.World's leading customer relationship management (CRM) platformThe oldest high-level programming language that is still in use today...

AWS Services All 2025-05-08

AWS Services All crossword puzzle
Across
  1. A fully managed machine learning service that helps developers build, train, and deploy models quickly.
  2. A monitoring and observability service that provides logs, metrics, and traces
  3. A service that enables event-driven computing using messages and notifications.
  4. A data warehousing service designed for complex queries on petabyte-scale data
  5. The AWS service that automates infrastructure provisioning using code templates.
  6. A service used to spin up and manage virtual machines in AWS.
  7. A service that provides API hosting and management, including rate limiting and security.
  8. A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
  9. A service that provides highly scalable and fully managed message queuing.
  10. AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
  1. This service allows you to run containerized applications without managing servers or clusters.
  2. AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
  3. This AWS service lets you run serverless applications without provisioning or managing servers.
  4. AWS’s managed NoSQL database, known for single-digit millisecond latency.
  5. An AWS networking service that allows secure connections between VPCs and on-premises networks.
  6. This AWS service is a fully managed relational database with automated backups and replication.
  7. An AWS security service that helps manage identities and access to resources
  8. A managed distributed streaming platform often compared to Apache Kafka.

18 Clues: A service used to spin up and manage virtual machines in AWS.A managed distributed streaming platform often compared to Apache Kafka.AWS’s managed NoSQL database, known for single-digit millisecond latency.A service that provides highly scalable and fully managed message queuing....

11.5 Vocab 2023-03-30

11.5 Vocab crossword puzzle
Across
  1. Allows devices to connect in a PAN
  2. The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
  3. combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
  4. used with the WPA and WPA2 wireless security standards
  5. a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
  6. increases bandwidth by using multiple antennas for both the transmitter and receiver
  7. developed by Cisco to address security concerns in RADIUS
  8. a key component of windows active directory
  9. a standard for local area networks created by IEEE-SA
Down
  1. a network that requires no authentication to connect to and is used in public
  2. introducd in 2018, and update to WPA2
  3. an open standard protocol used to authenticate users onto a network
  4. A communication method used on cards with a range of 2 inches
  5. the most commonly used access method
  6. introduced in 2004, a wireless security service
  7. an enhancement to MIMO that allows multiple users to use the same channel
  8. Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
  9. uses radio waves to transmit data from small circuit boards called RFID tags to special scanners

18 Clues: Allows devices to connect in a PANthe most commonly used access methodintroducd in 2018, and update to WPA2a key component of windows active directoryintroduced in 2004, a wireless security servicea standard for local area networks created by IEEE-SAused with the WPA and WPA2 wireless security standards...

test 2023-09-12

test crossword puzzle
Across
  1. Equivalent ot EU Data Protection Bill in India
  2. These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
  3. A digital form of social engineering to deceive individuals into providing sensitive information
  4. The process of transforming plaintext into ciphertext
  5. Old way of breaking phone
  6. Computer Malicious Program
  7. attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
  8. in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
  1. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
  2. secure online service that allows users to connect remotely to another network
  3. spyware software that records every keystroke made on a computer’s keyboard
  4. security framework that controls access to computer resources, enforces policies, and audits usage
  5. algorithms to create convincing fake videos or audio recordings
  6. Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
  7. type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
  8. type of attack which uses a fraudulent server with a relay address
  9. model that forms the basis for the development of security systems
  10. A capability to limit network traffic between networks and/or information systems

18 Clues: Old way of breaking phoneComputer Malicious ProgramEquivalent ot EU Data Protection Bill in IndiaThe process of transforming plaintext into ciphertextalgorithms to create convincing fake videos or audio recordingstype of attack which uses a fraudulent server with a relay addressmodel that forms the basis for the development of security systems...

AWS Services 2025-04-15

AWS Services crossword puzzle
Across
  1. A fully managed machine learning service that helps developers build, train, and deploy models quickly.
  2. A monitoring and observability service that provides logs, metrics, and traces.
  3. A service that enables event-driven computing using messages and notifications.
  4. A data warehousing service designed for complex queries on petabyte-scale data.
  5. The AWS service that automates infrastructure provisioning using code templates.
  6. A service used to spin up and manage virtual machines in AWS.
  7. A service that provides API hosting and management, including rate limiting and security.
  8. A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
  9. A service that provides highly scalable and fully managed message queuing.
  10. AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
  1. This service allows you to run containerized applications without managing servers or clusters.
  2. AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
  3. This AWS service lets you run serverless applications without provisioning or managing servers.
  4. AWS’s managed NoSQL database, known for single-digit millisecond latency.
  5. An AWS networking service that allows secure connections between VPCs and on-premises networks.
  6. This AWS service is a fully managed relational database with automated backups and replication.
  7. An AWS security service that helps manage identities and access to resources.
  8. A managed distributed streaming platform often compared to Apache Kafka

18 Clues: A service used to spin up and manage virtual machines in AWS.A managed distributed streaming platform often compared to Apache KafkaAWS’s managed NoSQL database, known for single-digit millisecond latency.A service that provides highly scalable and fully managed message queuing....

cyber security 2017-06-30

cyber security crossword puzzle
Across
  1. spreads through the inbox and makes a copy of itself
  2. practical networks to send copies of the original code to other computers
Down
  1. malicious code

3 Clues: malicious codespreads through the inbox and makes a copy of itselfpractical networks to send copies of the original code to other computers

Internet 2021-06-06

Internet crossword puzzle
Across
  1. is also a wide area network (known as_____), WAN
  2. as the networks grow larger it is then creating a massive connection we called,
Down
  1. is defined simply as communication at a distance (Merriam-Webster).
  2. network, is a pool of computer devices (hardware) that are programmed (software) to connect and communicate to each other to share information.

4 Clues: is also a wide area network (known as_____), WANis defined simply as communication at a distance (Merriam-Webster).as the networks grow larger it is then creating a massive connection we called,network, is a pool of computer devices (hardware) that are programmed (software) to connect and communicate to each other to share information.

Unit 5 2022-05-10

Unit 5 crossword puzzle
Across
  1. Cyber bullies often write ... comments in social networks.
  2. Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
  1. Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
  2. Julia and Weronika are good friends. They always ... for each other.
  3. Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.

5 Clues: Cyber bullies often write ... comments in social networks.Julia and Weronika are good friends. They always ... for each other.Nikita fell in love with Lena. He wants to organize a ... dinner for her.Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen....

Unit 5 2022-05-10

Unit 5 crossword puzzle
Across
  1. Cyber bullies often write ... comments in social networks.
  2. Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
  1. Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
  2. Julia and Weronika are good friends. They always ... for each other.
  3. Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.

5 Clues: Cyber bullies often write ... comments in social networks.Julia and Weronika are good friends. They always ... for each other.Nikita fell in love with Lena. He wants to organize a ... dinner for her.Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen....

Networking concept puzzle 2025-06-07

Networking concept puzzle crossword puzzle
Across
  1. Area Network This kind of network connects more computers located at distinct places.
  2. It is a device that connects two different types of networks with each other.
  3. Card It Is used to physically attach a computer to a network.
Down
  1. Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
  2. It is a network device that is used to connect all the computers in a network with each other.

5 Clues: Card It Is used to physically attach a computer to a network.It is a device that connects two different types of networks with each other.Area Network This kind of network connects more computers located at distinct places.It is a network device that is used to connect all the computers in a network with each other....

Entrepreneurship crosswordpuzzle 2020-09-23

Entrepreneurship crosswordpuzzle crossword puzzle
Across
  1. it is a combination of two companies into one larger company.
  2. strategy, a process that can allow an organisation to concentrate its resources on the optimal opportunities.
  3. display of information about the product on its container, packaging or the product.
  4. it helpps thousands of individuals to be their own boss and own operate their own business.
  5. a brand or a part of a brand that is given legal protection against its use by another firms.
  6. a corporate action in which a company buys most if not all of the target company's ownership stakes in order to assume control of the target firm
  7. symbol of product/ services of the company.
Down
  1. business making use of social networks to communicate with customers is called.
  2. the combined value of the merging firm exceeds the individual value of the merged firms.
  3. its is a delberate , planned and sustained effort to establish and maintain mutual understanding between an organisation and stakeholders.
  4. most important element of marketting mix.
  5. 4th element of marketing mix and refers to all activities undertaken to make the product known to the customer.

12 Clues: most important element of marketting mix.symbol of product/ services of the company.it is a combination of two companies into one larger company.business making use of social networks to communicate with customers is called.display of information about the product on its container, packaging or the product....

krizaljka_sp 2021-05-16

krizaljka_sp crossword puzzle
Across
  1. VECTOR PROTOCOL Protocol that determines the best path based on information about how far the packet destination is.
  2. Protocol establishes a connection between computers before sending data
  3. Protocols used to exchange information about networks between autonomous systems.
  4. Protocols used to determine the best routes to a destination within the same autonomous system.
  5. Type of OSPF packet that contains a list of neighbors of the router sending the packet
  6. Examples of IGP protocol
Down
  1. PROTOCOLS Protocols that do not send a network mask when exchanging information between routers.
  2. possibility of upgrading, ie how many routers can be in the network without disturbing the required convergence time
  3. STATUS PROTOCOL Protocol that works in such a way that each router knows the network topology and does not send the entire routing table, but all routers send only information about the state of connections in the form of small LSA (Link State Advertisement) packets.
  4. Protocol sends data directly to a specific computer without checking whether the system is ready to receive or not
  5. The layer is responsible for reliable data transfer between devices
  6. Example is the EEA protocol.

12 Clues: Examples of IGP protocolExample is the EEA protocol.The layer is responsible for reliable data transfer between devicesProtocol establishes a connection between computers before sending dataProtocols used to exchange information about networks between autonomous systems....

Industrial Revolution 2023-05-10

Industrial Revolution crossword puzzle
Across
  1. An economic concept that states that the price of a good rises and falls depending on how many people want it
  2. An increase in the percentage and in the number of people living in urban settlements.
  3. A system in which society, usually in the form of the government, owns and controls the means of production.
  4. Development of a system which supports machine production of goods
  5. Individuals who start new businesses, introduce new products and improve management techniques
  6. Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
  7. A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
Down
  1. Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
  2. A belief that ultimate power resides in the people.
  3. An economic system based on private ownership of capital
  4. A belief that limited government insures order competitive markets and personal opportunity.
  5. A belief that the government can and should achieve justice and equality of opportunity.

12 Clues: A belief that ultimate power resides in the people.An economic system based on private ownership of capitalDevelopment of a system which supports machine production of goodsA machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793An increase in the percentage and in the number of people living in urban settlements....

lesson 30 2015-05-15

lesson 30 crossword puzzle
Across
  1. Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
  2. Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
  3. Deciphers the information in an SSL Certificate.
  4. Encrypts the information in an SSL Certificate.
  5. Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
  6. A malicious program that records keystrokes.
  7. Hackers using spyware to control your browser
Down
  1. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  2. A program that hackers use to capture IDs and passwords on a network.
  3. Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
  4. Security feature used for larger networks that controls computers from one point.
  5. Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
  6. Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.

13 Clues: A malicious program that records keystrokes.Hackers using spyware to control your browserEncrypts the information in an SSL Certificate.Deciphers the information in an SSL Certificate.A program that hackers use to capture IDs and passwords on a network.Security feature used for larger networks that controls computers from one point....

Cybersecurity Vocab 2021-12-09

Cybersecurity Vocab crossword puzzle
Across
  1. any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
  2. an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
  3. the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
  1. a general term for when a perpetrator positions himself in a conversation between a user and an application
  2. tries to find two inputs producing the same hash value
  3. consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
  4. if we change a character of the plaintext, then several characters of the ciphertext should change
  5. convert (information or data) into a cipher or code, especially to prevent unauthorized access.
  6. each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
  7. a method in cryptography by which cryptographic keys are exchanged between two parties
  8. a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
  9. the art or process of deciphering coded messages without being told the key.

12 Clues: tries to find two inputs producing the same hash valuethe art or process of deciphering coded messages without being told the key.a method in cryptography by which cryptographic keys are exchanged between two partiesthe attacker has access to pairs of known plaintexts and their corresponding ciphertexts....

Keywords 2022-05-11

Keywords crossword puzzle
Across
  1. a computer network security system that restricts internet traffic in, out, or within a private network
  2. An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
  3. Network computer, computer program, or device that processes requests from a client
  4. The part of a network that handles the major traffic.
  5. the transmission of a file from one computer system to another, usually larger computer system
  6. A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  7. a computer-based application for the exchange of messages between users
Down
  1. Any computer hardware or software device that requests access to a service provided by a server.
  2. A physical or virtual appliance that passes information between two or more packet-switched computer networks
  3. the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  4. the overall time something takes to complete.
  5. electronic devices used to store data,

12 Clues: electronic devices used to store data,the overall time something takes to complete.The part of a network that handles the major traffic.a computer-based application for the exchange of messages between usersNetwork computer, computer program, or device that processes requests from a client...

Datawarehousing and Data Mining CA 3- Crossword Puzzle 2024-04-16

Datawarehousing and Data Mining CA 3- Crossword Puzzle crossword puzzle
Across
  1. DM functionality that provides a concise and succinct summarization of the given collection of data
  2. ___________________ databases store image, audio, and video data.
  3. A spatial database that stores spatial objects that change with time is called a database
  4. Data pre-processing step in KDD in which Data relevant to the analysis task are retrieved from the database
  5. Data pre-processing step in which multiple data sources may be combined
  6. Data pre-processing step to remove noise and inconsistent data
Down
  1. Geographical Maps can be represented in _________ format, where roads, bridges, buildings, and lakes are represented as unions or overlays of basic geometric constructs, such as points,lines, polygons, and the partitions and networks formed by these components.
  2. DM functionality of comparison of the target class with one or a set of comparative classes
  3. database typically stores relational data that include time-related attributes
  4. ______________ analysis describes and models regularities or trends for objects whose behavior changes over time.
  5. _____________ database stores sequences of ordered events, with or without a concrete notion of time.
  6. Data objects that do not comply with the general behavior or model of the data.

12 Clues: Data pre-processing step to remove noise and inconsistent data___________________ databases store image, audio, and video data.Data pre-processing step in which multiple data sources may be combineddatabase typically stores relational data that include time-related attributes...

Recruitment Procedures and External Validity 2024-10-20

Recruitment Procedures and External Validity crossword puzzle
Across
  1. What process involves inviting eligible participants to be part of a research study
  2. What term refers to the extent to which study results can be generalized to the broader population
  3. What is a major threat to external validity, where results apply only to the study sample
  4. What is an important factor to consider in maintaining external validity during recruitment
  5. Which concept involves making sure that results are generalizable to real-world scenarios
  6. Which recruitment strategy involves using existing networks of participants to enroll others
Down
  1. Which term refers to ensuring participants give informed agreement to take part in the study
  2. What term is used for the group of people who are asked to participate in a study
  3. What is a key element in recruitment to avoid underrepresentation of certain groups
  4. What process ensures that the sample is representative of the broader population being studied
  5. What term describes the selection of participants based on criteria relevant to the research question
  6. What term is used to describe the accuracy of inferences made from a study about other settings or groups

12 Clues: What term is used for the group of people who are asked to participate in a studyWhat is a key element in recruitment to avoid underrepresentation of certain groupsWhat process involves inviting eligible participants to be part of a research studyWhat is a major threat to external validity, where results apply only to the study sample...

Browsing Safely 2025-05-30

Browsing Safely crossword puzzle
Across
  1. It refers to the act of stealing and misusing someone's personal information
  2. Set of programs that disrupts the normal functioning of a computer
  3. It is the use of illegal methods to get money or other things that belong to a bank or its costumers
  4. It is the process of befriending children on social media to facilitate online
  5. Act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation
  6. An act of harming or harassing using information technology in a deliberate manner
Down
  1. It is a collection of technologies,processes and practices designed to protect networks,computers,programs and data from attack,damage or unauthorised access
  2. It refers to an illegal entry into a computer system or network
  3. A software that prevents unauthorised access
  4. A program used to remove viruses
  5. Any criminal activity intended to harm anyone using a computer or an internet connection
  6. The receiver of a message is fooled into believing that the message received by him is from a trusted source

12 Clues: A program used to remove virusesA software that prevents unauthorised accessIt refers to an illegal entry into a computer system or networkSet of programs that disrupts the normal functioning of a computerIt refers to the act of stealing and misusing someone's personal information...

AWS Services 2025-04-07

AWS Services crossword puzzle
Across
  1. A fully managed machine learning service that helps developers build, train, and deploy models quickly.
  2. A monitoring and observability service that provides logs, metrics, and traces
  3. A service that enables event-driven computing using messages and notifications.
  4. A data warehousing service designed for complex queries on petabyte-scale data.
  5. The AWS service that automates infrastructure provisioning using code templates.
  6. A service used to spin up and manage virtual machines in AWS.
  7. A service that provides API hosting and management, including rate limiting and security.
  8. A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
  9. A service that provides highly scalable and fully managed message queuing.
  10. AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
  1. This service allows you to run containerized applications without managing servers or clusters.
  2. AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
  3. This AWS service lets you run serverless applications without provisioning or managing servers.
  4. AWS’s managed NoSQL database, known for single-digit millisecond latency.
  5. An AWS networking service that allows secure connections between VPCs and on-premises networks.
  6. This AWS service is a fully managed relational database with automated backups and replication.
  7. An AWS security service that helps manage identities and access to resources.
  8. A managed distributed streaming platform often compared to Apache Kafka.

18 Clues: A service used to spin up and manage virtual machines in AWS.A managed distributed streaming platform often compared to Apache Kafka.AWS’s managed NoSQL database, known for single-digit millisecond latency.A service that provides highly scalable and fully managed message queuing....

LCaravelli-Network Devices 2023-01-04

LCaravelli-Network Devices crossword puzzle
Across
  1. security should be top of mind when the technician recommends and installs this type of system
  2. a method for powering devices that do not have a battery or access to a power outlet
  3. does not allow packets to enter the target system without first being analyzed
  4. commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility
  5. a generic name for an all in one network appliance
  6. a device in the cloud that allows network administrators to manage network devices
  7. Every device on a network has a unique media access control ___ address
  8. receives data from one port and sends it to all other ports
Down
  1. its main purpose is to regenerating weak signals
  2. typically responsible for monitoring all you end devices on your network
  3. networking systems that are no longer supported but are still in operation in today’s networks
  4. a more common term for power over ethernet
  5. uses various techniques for determining what is and what is not permitted in a network segment
  6. provides the physical connection to the network at the PC or other end device
  7. passively monitors traffic on the network
  8. switches come with additional features that the network administrator can configure to improve the network
  9. bridges and hubs are now considered legacy devices because of the benefits and low cost of ________
  10. introduced to divide LANs into segments

18 Clues: introduced to divide LANs into segmentspassively monitors traffic on the networka more common term for power over ethernetits main purpose is to regenerating weak signalsa generic name for an all in one network appliancereceives data from one port and sends it to all other portsEvery device on a network has a unique media access control ___ address...

Is DIS Your Handle? 2024-01-18

Is DIS Your Handle? crossword puzzle
Across
  1. Joint Intelligence Command provide ______, relevant, and timely intelligence for early warning and decision-making for the SAF’s operations.
  2. Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders.
  3. Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.
Down
  1. The DIS will defend and dominate in the digital domain. As part of an _____ SAF, the DIS will enhance Singapore’s security, from peace to war.
  2. The symbols of DIS comprises of our crest, logo and _____.
  3. Is DIS Your Handle?
  4. WHAT WE DO. The DIS defends the SAF’s digital domain, from cyber incident response and threat hunting, to electronic protection of our networks and _____, to digital threats to our servicemen’s psychological defence.

7 Clues: Is DIS Your Handle?The symbols of DIS comprises of our crest, logo and _____.Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders....

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is a physical area on the Earth’ surface called?
  2. What is the movement of people from rural to urban areas called?
  3. What is the area of the earth’s surface that holds special meaning for people?
  4. What job opportunities are called?
  5. What is a physical area on the earth’s surface called?
  6. areas What is an area with dense transport networks and densely packed buildings called
  7. What is the pollution caused by an increase in LED usage?
  8. What is the pollution related to and primarily caused by unnecessary honking called?
  9. What is the environment that has not been affected by people?
  10. Refers to our surroundings and can either be physical or human.
  11. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
  1. What is the environment where people live on farms and villages called?
  2. What are the advantages of going to a city called?
  3. Refers to surface runoff that results from melting snow.
  4. What are the disadvantages of going to a city called?
  5. What is the increase in the proportion of people living in urban areas called?
  6. What is poor air quality affecting half the world’s urban population called?
  7. Consist of living and non-living things that are found naturally.
  8. What is a multicultural society with many people from diverse cultural backgrounds called?
  9. What is a built up area called?
  10. What is the number of people living in a unit area of land called?
  11. What is the pollution caused by leakage fuel storage tanks into rivers?

22 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?Refers to surface runoff that results from melting snow....

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is a physical area on the Earth’ surface called?
  2. What is the movement of people from rural to urban areas called?
  3. What is the area of the earth’s surface that holds special meaning for people?
  4. What job opportunities are called?
  5. What is a physical area on the earth’s surface called?
  6. areas What is an area with dense transport networks and densely packed buildings called
  7. What is the pollution caused by an increase in LED usage?
  8. What is the pollution related to and primarily caused by unnecessary honking called?
  9. What is the environment that has not been affected by people?
  10. Refers to our surroundings and can either be physical or human.
  11. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
  1. What is the environment where people live on farms and villages called?
  2. What are the advantages of going to a city called?
  3. Refers to surface runoff that results from melting snow.
  4. What are the disadvantages of going to a city called?
  5. What is the increase in the proportion of people living in urban areas called?
  6. What is poor air quality affecting half the world’s urban population called?
  7. Consist of living and non-living things that are found naturally.
  8. What is a multicultural society with many people from diverse cultural backgrounds called?
  9. What is a built up area called?
  10. What is the number of people living in a unit area of land called?
  11. What is the pollution caused by leakage fuel storage tanks into rivers?

22 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?Refers to surface runoff that results from melting snow....

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is a physical area on the Earth’ surface called?
  2. What is the movement of people from rural to urban areas called?
  3. What is the area of the earth’s surface that holds special meaning for people?
  4. What job opportunities are called?
  5. What is a physical area on the earth’s surface called?
  6. areas What is an area with dense transport networks and densely packed buildings called
  7. What is the pollution caused by an increase in LED usage?
  8. What is the pollution related to and primarily caused by unnecessary honking called?
  9. What is the environment that has not been affected by people?
  10. Refers to our surroundings and can either be physical or human.
  11. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
  1. What is the environment where people live on farms and villages called?
  2. What are the advantages of going to a city called?
  3. Refers to surface runoff that results from melting snow.
  4. What are the disadvantages of going to a city called?
  5. What is the increase in the proportion of people living in urban areas called?
  6. What is poor air quality affecting half the world’s urban population called?
  7. Consist of living and non-living things that are found naturally.
  8. What is a multicultural society with many people from diverse cultural backgrounds called?
  9. What is a built up area called?
  10. What is the number of people living in a unit area of land called?
  11. What is the pollution caused by leakage fuel storage tanks into rivers?

22 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?Refers to surface runoff that results from melting snow....

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is the environment that has not been affected by people?
  2. What is the increase in the proportion of people living in urban areas called?
  3. What is the area of the earth’s surface that holds special meaning for people?
  4. What is an area with dense transport networks and densely packed buildings called
  5. What are the disadvantages of going to a city called?
  6. Refers to surface runoff that results from melting snow.
  7. Refers to our surroundings and can either be physical or human.
  8. What is the pollution caused by an increase in LED usage?
  9. What is a multicultural society with many people from diverse cultural backgrounds called?
  10. What is the pollution caused by leakage fuel storage tanks into rivers?
  11. What is a built up area called?
  12. What job opportunities are called?
  13. What are the advantages of going to a city called?
Down
  1. What is a physical area on the earth’s surface called?
  2. What is poor air quality affecting half the world’s urban population called?
  3. What is the pollution related to and primarily caused by unnecessary honking called?
  4. What is the environment where people live on farms and villages called?
  5. Consist of living and non-living things that are found naturally.
  6. What is the number of people living in a unit area of land called?
  7. What is the movement of people from rural to urban areas called?
  8. What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
  9. What is a physical area on the Earth’ surface called?

22 Clues: What is a built up area called?What job opportunities are called?What are the advantages of going to a city called?What are the disadvantages of going to a city called?What is a physical area on the Earth’ surface called?What is a physical area on the earth’s surface called?Refers to surface runoff that results from melting snow....

Science - Ethan Dao 2017-03-30

Science - Ethan Dao crossword puzzle
Across
  1. a compound of hydrogen and carbon
  2. substance that can be broken down by bacteria
  3. is a process of reacting monomer molecules together in a chemical reaction to form polymer chains or three-dimensional networks
  4. substance that increases the reaction
  5. The separation of a substance into simpler substances or basic elements.
  6. the quality or state of being physically strong.
  7. one atom or compound will steal electrons from another atom or compound
  8. a molecule that can be bonded to other identical molecules to form a polymer.
  9. the relative amount of a particular substance contained within a solution or mixture or in a particular volume of space
  10. theory theory stating the particles involved in a chemical reaction
Down
  1. the speed at which a chemical reaction proceeds.
  2. its a chemical reaction in which an acid and a base react quantitatively with each other
  3. make (a liquid) thinner or weaker by adding water or another solvent to it.
  4. the combination of components or elements to form a connected whole.
  5. a substance which has a molecular structure built up chiefly
  6. a reaction that involves energy
  7. is an ion that exists in the same form on both the reactant and product sides of a chemical reaction
  8. the action or process of precipitating a substance from a solution.
  9. is one that completely ionizes (dissociates) in a solution (provided there is sufficient solvent).
  10. acid A concentrated acid is an acid solution with a high molar concentration of hydrogen ions

20 Clues: a reaction that involves energya compound of hydrogen and carbonsubstance that increases the reactionsubstance that can be broken down by bacteriathe speed at which a chemical reaction proceeds.the quality or state of being physically strong.a substance which has a molecular structure built up chiefly...

Media and Information Literacy 2020-01-08

Media and Information Literacy crossword puzzle
Across
  1. collect and edit reports of articles about current events for information
  2. it is the World Wide Web that allows one to easily and instantaneously access types of information
  3. a weekly publication of opinion and news from the 3 regions of northern Luzon and Central Luzon
  4. collections of various facts
  5. these are used in looking for a great deal of information
  6. it is mostly used by students for research and it refers to a group of articles
  7. also known as community media
  8. it covers a large variety of topics
Down
  1. cover a large variety of articles and images of up-to-date information
  2. it's just focusing on a distinct field of study
  3. it reaches a large audience through written, spoken or broadcast communication
  4. its composed of collection of articles that may also provide short summaries and it is cited in newspaper, journals, etc
  5. it sends information and messages and also sends visual images through channels
  6. it is composed of millions of networks that are connected by networking technologies
  7. it is defined as the knowledge that is unique to a given culture or society
  8. refers to an organized collection of records items found in the library
  9. it is a newspaper and an online news website that covering the 3 regions of Northern Luzon
  10. a weekly newspaper created only for the people of Baguio City
  11. place where different kinds of books found
  12. it refers to sending sounds signal from transmitter through the air as radio waves

20 Clues: collections of various factsalso known as community mediait covers a large variety of topicsplace where different kinds of books foundit's just focusing on a distinct field of studythese are used in looking for a great deal of informationa weekly newspaper created only for the people of Baguio City...

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. something reduced in volume to its full volume
  2. transfer a file or program to a smaller computer
  3. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  4. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  5. a worldwide network of computer networks
  6. decompress
  7. science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  8. a short line of text that a web site puts on your computer's hard drive when you access the web site
  9. crime committed using a computer and the internet
  10. set up for a particular purpose
Down
  1. a facial expression represented by a sequence of characters
  2. an organized body of related information
  3. the symbolic arrangement of data in a computer program
  4. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  5. a listing of the computer files stored in memory
  6. the activity of converting data or information into code
  7. transfer out of a database or document
  8. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  9. the exclusive right to sell a work
  10. put into a format that can be read or processed by computers
  11. storage a data storage device that is not the main memory of a computer
  12. locate and correct errors in a computer program

22 Clues: decompressset up for a particular purposethe exclusive right to sell a workan organized body of related informationa worldwide network of computer networkstransfer out of a database or documentsomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

Chaper 17 Vocab 2021-10-28

Chaper 17 Vocab crossword puzzle
Across
  1. _____ energy is released during nuclear fission/fusion
  2. Liquid mixture of hydrocarbons
  3. a nuclear reaction where a heavy nucleus splits spontaneously and releases energy
  4. deposit of loose sand or partially consolidated sandstone containing petroleum
  5. nuclear reaction in which atomic nuclei of low atomic number fuse to form a heavier nucleus
  6. Acid ____ refers to the overflow of acidic water from metal or coal mines
  7. Chemicals obtained from petroleum and natural gas
  8. Mining where layers of surface soil and rock are removed to expose a resource
  9. Energy produced by the flow and interaction of electrons
  10. Energy source that is readily available or can be replaced easily
  11. The energy that an object has because of its position/shape
Down
  1. radioactive _____ material made from the use or reprocessing of nuclear fuel
  2. Burning the chemical reaction when a fuel combines rapidly with oxygen
  3. fine grained sedimentary rock from which oil can be extracted
  4. The energy produced by motion
  5. Energy ____ is when you reduce the amount of energy consumption by using less energy
  6. Energy that CANNOT be replaced easily/in a short period of time
  7. Type of mining where vertical shafts are dug deep into the ground and networks of tunnels are dug
  8. How much of the energy put into a system actually does useful work
  9. formal term of a severe nuclear reactor accident that results in cor damage from overheating
  10. The ability to do work and/or cause a change

21 Clues: The energy produced by motionLiquid mixture of hydrocarbonsThe ability to do work and/or cause a changeChemicals obtained from petroleum and natural gas_____ energy is released during nuclear fission/fusionEnergy produced by the flow and interaction of electronsThe energy that an object has because of its position/shape...

Spelling Bee, Week 27 2023-04-07

Spelling Bee, Week 27 crossword puzzle
Across
  1. extremely unpleasant.
  2. situated in the west, or directed toward or facing the west.
  3. the surroundings or conditions in which a person, animal, or plant lives or operates.
  4. an object or flat figure in an elongated rectangle or oval shape.
  5. a state in the western United States
  6. a view or opinion that is incorrect because based on faulty thinking or understanding.
  7. preoccupy or fill the mind of (someone) continually, intrusively, and to a troubling extent.
  8. reasoning conducted or assessed according to strict principles of validity.
  9. done or occurring again several times in the same way.
Down
  1. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  2. a greenish-blue color.
  3. no longer produced or used; out of date.
  4. act or course of action to which a person is morally or legally bound; a duty or commitment.
  5. easily perceived or understood; clear, self-evident, or apparent.
  6. block (an opening, path, road, etc.); be or get in the way of.
  7. a means of solving a problem or dealing with a difficult situation.
  8. more than one; several.
  9. an instrument or device for measuring the magnitude, amount, or contents of something, typically with a visual display of such information.
  10. an upright pillar, typically cylindrical and made of stone or concrete, supporting an entablature, arch, or other structure or standing alone as a monument.
  11. the action of delivering letters, packages, or ordered goods.

20 Clues: extremely unpleasant.a greenish-blue color.more than one; several.a state in the western United Statesno longer produced or used; out of date.done or occurring again several times in the same way.situated in the west, or directed toward or facing the west.the action of delivering letters, packages, or ordered goods....

Terms from Chapter 2 2013-09-20

Terms from Chapter 2 crossword puzzle
Across
  1. Browser used on both computers and mobile devices
  2. Informational website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order
  3. Symbols used in online communications that express emotion
  4. The code of acceptable behaviors users should follow while on the Internet
  5. The transmission of messages via a computer network
  6. Each electronic document on the web; can contain text, graphics, audio, and video
  7. Capability of accessing media content while it downloads
  8. Software that enables users with an Internet connection to access and view webpages on computers or mobile devices
  9. An Internet café that provides computers with Internet access, usually for a fee
  10. A website that offers a variety of Internet services from a single, convenient location
  11. A collaborative website that allows users to create, add to, modify, or delete the content via their browser
  12. Google's browser
Down
  1. Links to preferred websites
  2. A real-time typed conversation that takes place on a computer or mobile device with many other online users
  3. A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals
  4. A business transaction that occurs over an electronic network such as the Internet
  5. A collection of related webpages, which are stored on a web server
  6. Visual representation of nontext information such as a drawing, chart, or photo
  7. Mozilla Corporation's browser
  8. A worldwide collection of electronic documents

20 Clues: Google's browserLinks to preferred websitesMozilla Corporation's browserA worldwide collection of electronic documentsBrowser used on both computers and mobile devicesThe transmission of messages via a computer networkCapability of accessing media content while it downloadsSymbols used in online communications that express emotion...

Library Media Words - Volume 1 2014-04-16

Library Media Words - Volume 1 crossword puzzle
Across
  1. something (as a picture, chart, or film) that appeals to the sight
  2. a means of communication and source of information
  3. a person or a publication that supplies information
  4. a system for sending messages between computers
  5. relating to or connected to a computer or telecommunications system (as the Internet)
  6. a set of sheets of paper bound together
  7. use as sources of information
  8. published at regular intervals, such as weekly, monthly
  9. topics that are too broad, less specific
  10. a place that provides information or ideas to everyone in many material formats such as books, magazines, etc.
  11. raw information or facts about something that can be used in calculating, reasoning, or planning
Down
  1. a popular search engine and free apps service
  2. the sending, receiving, or reproducing of sound
  3. a programmable usually electronic machine that can store, get back again, and work with data
  4. topics that are more specific
  5. supply secondhand information
  6. a communications system that connects computers and computer networks all over the world
  7. a history of a person's life
  8. data which has been recorded, classified, organized, related, or interpreted within a framework so that meaning emerges
  9. something told or written that is not fact or a made-up story
  10. literature or cinema that is not fictional
  11. a digital book
  12. the application of information or something learned
  13. not made or coming from something else or firsthand
  14. characterized by electronic and computerized technology

25 Clues: a digital booka history of a person's lifetopics that are more specificsupply secondhand informationuse as sources of informationa set of sheets of paper bound togethertopics that are too broad, less specificliterature or cinema that is not fictionala popular search engine and free apps servicethe sending, receiving, or reproducing of sound...

Programming 2015-01-21

Programming crossword puzzle
Across
  1. Code which contains numbers like 1's and 0's.
  2. A list of instructions that tell a computer what to do.
  3. Movie that has to do with hacking and black coated people.
  4. Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
  5. Built the .net framework.
  6. American Standard Code for Information Interchange.
  7. A process that leads from an original formulation of a computing problem to executable computer programs.
  8. World Wide Web
  9. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  10. Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
  11. Software framework developed by Microsoft that runs primarily on Microsoft Windows.
Down
  1. The person's first name who made this crossword.
  2. A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
  3. A notation resembling a simplified programming language, used in program design.
  4. A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
  5. A type of software that allows you to perform specific tasks.
  6. Console that has access to the internet.
  7. The programs and other operating information used by a computer.
  8. IDE and RAD tool written in wxWidgets.
  9. A quantity or amount.

20 Clues: World Wide WebA quantity or amount.Built the .net framework.IDE and RAD tool written in wxWidgets.Console that has access to the internet.Code which contains numbers like 1's and 0's.The person's first name who made this crossword.American Standard Code for Information Interchange.A list of instructions that tell a computer what to do....

Cyber safty dona 2016-06-08

Cyber safty dona crossword puzzle
Across
  1. Service Provider (ISP)
  2. unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
  3. copy a file from one of your computer system to another via the Internet (usually your computer or a mobile phone, it can also be dangerous sometimes . )
  4. unwanted messages which may contain threats
  5. and blogs
  6. computing
  7. scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
  8. generic term for any company that can connect you directly to the Internet.
  9. even families and acquaintances
  10. on the Internet threatening or implying violent behavior, displaying suicidal tendencies
  11. fights where scornful and offensive messages are posted on websites ,
  12. spam
Down
  1. virus
  2. excluding someone from an online group
  3. viruses are maliciously-designed programs that infect computers by hiding themselves inside normal, harmless programs.
  4. to channel surfing on a television, Internet one involves users browsing around various websites following whatever interests them.
  5. that some people that will hack in really easily and will Steal thing.
  6. into someone's email or other online accounting and sending messages that will cause embarrassments
  7. internet-related illegal activity.
  8. when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
  9. is a virus also a worm which spreads by .
  10. number tracking feature of Internet browsers that shows all the recent websites visited.

22 Clues: spamvirusand blogscomputingService Provider (ISP)even families and acquaintancesinternet-related illegal activity.excluding someone from an online groupis a virus also a worm which spreads by .unwanted messages which may contain threatsfights where scornful and offensive messages are posted on websites ,...

DIGI CIT Vocab Words 2016-05-27

DIGI CIT Vocab Words crossword puzzle
Across
  1. usaully news or something that can be seen by others on internet
  2. the taking of copyrighted material and selling it for profit
  3. to have a change to do something
  4. Not the right thing to do
  5. changing something copyrighted especially music to add value
  6. Giant game where people play with/agaisnt eachother
  7. anybody can use w/o any punishment
  8. putting some out in the world that is yours
  9. is digitized content that can be transmitted over the internet or computer networks.
  10. be in a state where you can be hurt
  11. Pictures, illustrations, symbols
  12. a short message text or pic
  13. a thing that will take your money and value
  14. when you use copyrighted material you must change it in a way and this is called ______
  15. directly coping someone else's work
  16. to chart something
Down
  1. never giving in and keeping a level head
  2. something that has some sort of risk/reward
  3. where someone can see another's web page, but doesn't comment
  4. peer to peer, network that allows sharing
  5. a plan that is somewhat sketchy
  6. a slightly changed sence and used for comedy
  7. someone who says a comment that helps you
  8. a compression using like or as
  9. give others inspiration and help their self-essteem
  10. define how copyright is used
  11. a generalization about another person
  12. an audio file of which you listen to
  13. some who you can bestow trust on
  14. unsuspected problem or danger

30 Clues: to chart somethingNot the right thing to doa short message text or picdefine how copyright is usedunsuspected problem or dangera compression using like or asa plan that is somewhat sketchyto have a change to do somethingsome who you can bestow trust onPictures, illustrations, symbolsanybody can use w/o any punishment...

HEMTECH 2017 Crossword 2017-05-07

HEMTECH 2017 Crossword crossword puzzle
Across
  1. / Measure of explosive power
  2. / inventor of AK - 47
  3. / '.TMP' extension refers usually to what kind of file?
  4. / a network whose elements may be separated by some distance, It usually involves two or more small networks and dedicated high-speed telephone lines
  5. / a non metal that remains liquid at room temperature
  6. / The fluid property, due to which, mercury does not wet the glass is
  7. / Reading of a barometer going down is an indication of
  8. / India's first satellite Aryabhatta was launched by
  9. / Standard explosive used for determining F of I
  10. / Anti tank missile developed by DRDO
  11. / Most Famous Secondary explosive
  12. / Made from a variety of materials, it inhibits the flow of current
  13. / The speed of your net access is defined in terms of
  14. / Ship launched prithvi variant missile
  15. / How many bits is a byte
Down
  1. / Gas used as disinfectant in drinking water
  2. / A given signal's second harmonic is twice the given signal's __________ frequency
  3. / Company where vulcanised rubber was invented
  4. / Knot is a unit of speed of
  5. / Optic fibres are mainly used for
  6. / Who invented the railway engine
  7. / He discovered the law of floating bodies
  8. / Rifle used by Indian Army
  9. / Mode is which Computers calculate numbers
  10. / 52 cal. Artillery gun developed by DRDO
  11. / The letter D in "DOS" stand for
  12. / unit for measuring the amplitude of a sound
  13. / Wood is the main raw material for the manufacture of

28 Clues: / inventor of AK - 47/ How many bits is a byte/ Rifle used by Indian Army/ Knot is a unit of speed of/ Measure of explosive power/ Who invented the railway engine/ The letter D in "DOS" stand for/ Most Famous Secondary explosive/ Optic fibres are mainly used for/ Anti tank missile developed by DRDO/ Ship launched prithvi variant missile...

CIS 228 Review Terms Crossword Puzzle 2018-03-07

CIS 228 Review Terms Crossword Puzzle crossword puzzle
Across
  1. Elected on OSPF multiaccess networks to manage LSA flooding.
  2. Allows ports to transition from blocking to forwarding immediately.
  3. Switch ports closest to the root bridge in terms of overall cost to the root bridge.
  4. IEEE link aggregation standard.
  5. A dynamic interior routing protocol based on the DUAL algorithm.
  6. Defines how quickly the routers in the network topology share routing information and reach a state of consistent knowledge.
  7. A Cisco-proprietary protocol that aids in the automatic creation of EtherChannel links.
  8. Designed by Cisco to allow for gateway redundancy without any additional configuration on end devices.
  9. Prevents information from being sent out the same interface from which it was received.
  10. Also called OSPF area 0.
  11. Type of adjacency between DR and non-DR router.
Down
  1. Occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed.
  2. An OSPF configuration that requires a hierarchical network design and contains multiple areas.
  3. Can cause an issue that may create EIGRP routing problems.
  4. A protocol used to discover neighbors, form adjacencies, and monitor the state of a neighbor.
  5. The default VTP domain name.
  6. The area of a network that is impacted when a critical device or network service experiences problems.
  7. Reduces administration of VLANs in a switched network.
  8. A dynamic interior routing protocol based on the SPF algorithm.
  9. Aggregates multiple switched links together to load balance over redundant paths between two devices.

20 Clues: Also called OSPF area 0.The default VTP domain name.IEEE link aggregation standard.Type of adjacency between DR and non-DR router.Reduces administration of VLANs in a switched network.Can cause an issue that may create EIGRP routing problems.Elected on OSPF multiaccess networks to manage LSA flooding....

computer application technology 2018-09-04

computer application technology crossword puzzle
Across
  1. it infect the computer
  2. it manipulates data
  3. generates control signals that direct the operation of memory and the datapath
  4. physical component of computer
  5. is used for observing,checking or keeping a continuous record of something
  6. spreedsheet developed by microsoft
  7. the brain of a computer
  8. fraudulent practice of sending emails
  9. a computer device
  10. operate a computer or typewriter
  11. it defines different structures in a database
  12. personal area network
  13. short last name or street name
  14. monetary
  15. paste images
  16. tool used to manipulate data in the database
  17. electronic device
  18. to put information on it and use it later
Down
  1. the programs and operating information
  2. a type of browser
  3. display either a list of values that is retrieved from a table or query
  4. local area network
  5. text or combination of text and numbers stored as text
  6. a computer program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
  7. long blocks of text
  8. all the components of computer attached to it
  9. to move or position cursor
  10. external devices such as keyboards, mice, disks, and networks that provide input to the processor
  11. global computer network
  12. a collection of interrelated data
  13. facts and statistics collected together for reference or analysis
  14. liquid crystal display
  15. hypertext markup language
  16. africa an african country
  17. a contraction of malicious software
  18. holds instructions and most of the data for currently executing programs

36 Clues: monetarypaste imagesa type of browsera computer deviceelectronic devicelocal area networkit manipulates datalong blocks of textpersonal area networkit infect the computerliquid crystal displaythe brain of a computerglobal computer networkhypertext markup languageafrica an african countryto move or position cursorphysical component of computer...

United States Review 2018-12-06

United States Review crossword puzzle
Across
  1. Perfect climate for citrus fruits
  2. The NE had towns built specifically for this resource
  3. These bring in blizzards into a very populated part of the US
  4. Because of our post industrial economy most jobs are
  5. The SW is famous for this resource, it is what made Houston and Dallas big cities
  6. Cold weather forest
  7. The NW is famous for this industry
  8. The Rust Belt is known for this
  9. The tech industry is in the norther part of this state
  10. The vast lowlands in the interior of the continental United States
  11. The US has a ______________ capitalist economy
  12. Country that colonized the Eastern Seaboard
  13. The United States has a vast amount of these, it made us an economic powerhouse
  14. The NE part of the country is famous for this delicious resource
  15. The dairy land of America is in this region
Down
  1. Roads, canals, airports, railroads, and electronic networks
  2. From this highest point, rivers flow east or west
  3. Wherever you had major ports or railroad stops these popped up
  4. These are the highest peaks in the United States
  5. The government of the United States is a mix of democracy and this
  6. The way people from the South Pacific made it to the Americas
  7. The land/ice bridge the nomads crossed to get here
  8. The import to the New World that had the biggest effect on the native population
  9. These winds move weather across our continent

24 Clues: Cold weather forestThe Rust Belt is known for thisPerfect climate for citrus fruitsThe NW is famous for this industryCountry that colonized the Eastern SeaboardThe dairy land of America is in this regionThese winds move weather across our continentThe US has a ______________ capitalist economyThese are the highest peaks in the United States...

ICT chapter 3 & 4 Crossword 2021-12-01

ICT chapter 3 & 4 Crossword crossword puzzle
Across
  1. Hardware device which have a number of devices or computer connected to them
  2. A type of disc which holds around 4.7GB and is non-volatile
  3. , Devices that store data in the form of magnetised dots
  4. , Devices that save data as pattern of dots which can be read by light
  5. Systems not very far away from each other geographically
  6. A type of disc which holds around 800MB of data and is non-volatile
  7. ‘Modulator demodulator’ is a device that converts a computer's digital signal into analogue signal
  8. , Files stored in a sequence which has to be searched through one by one
Down
  1. Gives the location of a device on the internet
  2. A short range wireless data transfer
  3. A serial access medium used for magnetic recordings
  4. Devices that connect a LAN to another LAN
  5. , Type of storage that ensures data is stored permanently so it can be used again at a later date
  6. Enable data packets to be routed between the different networks
  7. Receives information from a network via it's connection
  8. , Files which do not need to be searched through one by one
  9. A small device that connects to a computer and stores data
  10. A unique number that identifies a device connected to the internet
  11. A replacement of DVDs which hold 25-50GB
  12. They connect a number of devices or computers together to form a LAN but more efficient than hubs

20 Clues: A short range wireless data transferA replacement of DVDs which hold 25-50GBDevices that connect a LAN to another LANGives the location of a device on the internetA serial access medium used for magnetic recordingsReceives information from a network via it's connection, Devices that store data in the form of magnetised dots...

Grant M period 1 2024-02-06

Grant M period 1 crossword puzzle
Across
  1. The device that is used to display images, text, video,
  2. an online cloud storage service from Microsoft
  3. Used to connect computers with electronic devices such as smartphones, printers, scanners, and keyboards.
  4. A animated picture that is most commonly used in text
  5. from a computer to a remote device or to the internet
  6. Text files with pieces of data
  7. is what comes between the @ in your email address
  8. Refers to the physical elements of a computer
  9. A worldwide network that links computer networks
  10. Is storage which allows you to create and store files online
  11. a computer file format for the storage of digital images.
Down
  1. another word for internet.
  2. a wireless networking technology
  3. the address of a web page
  4. a type of image file that is used on the internet.
  5. a collection of instructions, programs, and data that tell a computer how to perform specific tasks.
  6. To send data to a file or program.
  7. wirless that can connect to speakers, phones, ETC
  8. To move or copy data
  9. a file format that provides an electronic image
  10. To bring data into a file or program
  11. suite A collection of commonly used softwar
  12. An page that will transfer you to another page if you click on it
  13. The search bar at the top of the screen is called
  14. is the primary place to display and organize apps on a screen.

25 Clues: To move or copy datathe address of a web pageanother word for internet.Text files with pieces of dataa wireless networking technologyTo send data to a file or program.To bring data into a file or programsuite A collection of commonly used softwarRefers to the physical elements of a computeran online cloud storage service from Microsoft...

The Internet 2024-01-19

The Internet crossword puzzle
Across
  1. address,number assigned to every device
  2. interconnected digital environment
  3. search bar
  4. needed to unlock access
  5. messaging others
  6. the exchange of information and ideas among people
  7. information that has been translated
  8. easy to go computer
  9. need this to have internet
  10. to lookup something
  11. internet gets people to...
  12. Apple device
  13. keep up with your snap score
  14. World Wide Web, WWW...
  15. cloud, backup your data in the...
  16. Computer networks
  17. Media, an outlet where you post for all to see
  18. internet mail
  19. when you are not online
  20. the computer program
  21. the internet
  22. needed to get into something
  23. used to reach the internet
  24. The number one search engine
  25. the boomer social media
  26. on the go
Down
  1. downloadable things on your phone
  2. where you go to see what is happening
  3. when you are not offline you are...
  4. a computer company
  5. hit that SUBSCRIBE button!
  6. a person's name
  7. a type of search engine
  8. the scary part of the internet
  9. website, starts with WWW and ends with .com
  10. A type of email, also sounds like a chocolate milk
  11. biggest online shopping site
  12. intended to take your information
  13. social media where you share your posts
  14. humans
  15. harming someone on the internet
  16. camera on computers
  17. the bird app
  18. another word for phone
  19. not login but...
  20. a type of search engine
  21. the earth
  22. place you go to look up
  23. messages
  24. hit this and it brings you to a website

50 Clues: humansmessagesthe earthon the gosearch barApple devicethe bird appthe internetinternet maila person's namemessaging othersnot login but...Computer networksa computer companyeasy to go computerto lookup somethingcamera on computersthe computer programWorld Wide Web, WWW...another word for phoneneeded to unlock accessa type of search engine...

Cardiovascular System - Abigail Granado 2024-03-22

Cardiovascular System - Abigail Granado crossword puzzle
Across
  1. Disease resulting from reduced blood flow from the heart
  2. Carries blood from the body to the R atrium
  3. surgical opening
  4. Narrowing;Tightening
  5. Test Procedure that tests how efficiently the heart pumps blood
  6. Procedure to stop atrial or ventricular fibrillation
  7. Pulse
  8. A surgical procedure in which plaque is removed from the lining of an artery
  9. Prevent the back flow of blood between chambers between R atrium and ventricle
  10. Narrowing of the coronary arteries, resulting in a insufficient blood supply to the heart
  11. instrument to measure pressure
  12. Procedure in which controlled electrical shocks are sent through the heart to restore normal cardiac rhythm
  13. Inflammation of the inner larger of the heart muscle
  14. condition in which the atria beat more rapidly than the ventricles, causing quivering movement
  15. Networks of small vessels that perfuse tissue
Down
  1. Pumps blood through the system
  2. Mass of solid, liquid or gas that travels through the blood stream
  3. A radiograph test that uses a contrast agent and a camera to take pictures of the blood flow in arteries
  4. Reads your hearts electrical impulses
  5. Raid spontaneous contractions of the muscle fibers in the atria or ventricles
  6. A fibroserous sac that encloses the heart
  7. Chest
  8. Abnormal heartbeats that disrupt the regular ventricular rhythm of the heart
  9. Tissue death in the heart muscle resulting from an obstructed artery
  10. Localized balloon like dilation of a blood vessel usually an artery
  11. Vessels that deliver blood to tissues

26 Clues: PulseChestsurgical openingNarrowing;TighteningPumps blood through the systeminstrument to measure pressureReads your hearts electrical impulsesVessels that deliver blood to tissuesA fibroserous sac that encloses the heartCarries blood from the body to the R atriumNetworks of small vessels that perfuse tissue...

Tech Terms 2024-04-11

Tech Terms crossword puzzle
Across
  1. A small application with limited functionality
  2. Time delay in a system
  3. Not physically existing but made to appear so by software
  4. The discovery and communication of meaningful patterns in data
  5. The programs and other operating information used by a computer
  6. A unit of information equal to one sextillion bytes
  7. A device that forwards data packets
  8. A set of rules governing the exchange of data
  9. A unit of information equal to one trillion bytes
  10. A unit of information equal to one billion bytes
  11. A point of interaction between components
  12. A step-by-step procedure for calculations
  13. A group of interconnected computers
  14. An area of control or a sphere of knowledge
  15. The core of an operating system
  16. A hardware or software component that stores data
  17. A high-level programming language
  18. Relating to the smallest possible unit of any physical property
Down
  1. The practice of protecting systems and networks from digital attacks
  2. A standard for the short-range wireless interconnection
  3. A unit of information equal to one septillion bytes
  4. A network security system
  5. Software with source code that anyone can inspect
  6. The process of converting information into code
  7. The address of a web page
  8. Data transmission capacity, measured in bits
  9. A reference in a document to another section or page
  10. Software designed to disrupt or damage a computer system
  11. A markup language for documents containing structured information
  12. A structured set of data held in a computer

30 Clues: Time delay in a systemA network security systemThe address of a web pageThe core of an operating systemA high-level programming languageA device that forwards data packetsA group of interconnected computersA point of interaction between componentsA step-by-step procedure for calculationsAn area of control or a sphere of knowledge...

DC9111 2024-08-09

DC9111 crossword puzzle
Across
  1. A framework used to manage and mitigate cybersecurity risks.
  2. A cybersecurity tool used to monitor, detect, and respond to threats.
  3. - The process of converting data into a code to prevent unauthorized access.
  4. The practice of finding and fixing security flaws.
  5. A common online attack method involving fraudulent emails.
  6. A network security device that monitors and filters incoming and outgoing traffic.
  7. An open-source intelligence gathering technique.
  8. A term for ethically hacking a system.
  9. An organized event where hackers test their skills.
  10. The art of disguising communication within another medium.
  11. A type of malware that demands payment for the return of stolen data.
  12. The practice of attacking a system to test its security.
  13. A person who finds and reports security vulnerabilities for rewards.
  14. A malicious program that spreads across systems and networks.
  15. A type of attack where multiple systems flood a target with traffic.
Down
  1. The exploitation of software vulnerabilities by malicious hackers.
  2. The unauthorized access of data in transit.
  3. A cryptographic key used in public key cryptography.
  4. A protocol used for secure internet communication.
  5. The process of analyzing network traffic for malicious activity.
  6. An organization that sets standards for securing information systems.
  7. A type of attack that overwhelms a system with traffic.
  8. A hidden malicious software that provides backdoor access.
  9. A form of social engineering to manipulate users into giving up confidential information.
  10. A global, decentralized group known for hacktivism.
  11. A popular TV series about a hacker with dissociative identity disorder.

26 Clues: A term for ethically hacking a system.The unauthorized access of data in transit.An open-source intelligence gathering technique.The practice of finding and fixing security flaws.A protocol used for secure internet communication.An organized event where hackers test their skills.A global, decentralized group known for hacktivism....

Tech01 2025-02-05

Tech01 crossword puzzle
Across
  1. - A feed format for delivering regularly updated content.
  2. - A document format that preserves layout and fonts.
  3. - The top-level directory in a file system.
  4. - A browser feature allowing multiple web pages at once.
  5. - A pre-designed layout for creating documents quickly.
  6. - A data unit equal to about one trillion bytes.
  7. - Input method using spoken commands.
  8. - A fast storage device with no moving parts.
  9. - A measure of a computer processor’s speed.
  10. - A data structure following the “last in, first out” rule.
  11. - The core of an operating system.
  12. - A short number code for secure authentication.
  13. - Short for configuration, settings that adjust software behavior.
  14. - The process of finding and fixing code errors.
  15. - A logic system with only true or false values.
Down
  1. - Automated instructions executed by programs.
  2. - Temporary storage to speed up processes.
  3. - Software programmed into hardware devices.
  4. - A unique address identifying devices on the internet.
  5. - A small update fixing bugs or vulnerabilities.
  6. - A sequence of executable commands within a program.
  7. - Organizes data into rows and columns.
  8. - Firmware that starts up your computer.
  9. - Something that exists digitally, not physically.
  10. - A temporary connection between a user and a service.
  11. - A node that connects different networks.
  12. - A layout system for organizing digital content.
  13. - A display technology known for deep blacks and vivid colors.
  14. - A line of tasks waiting to be processed.
  15. - A digital key used in secure authentication.

30 Clues: - The core of an operating system.- Input method using spoken commands.- Organizes data into rows and columns.- Firmware that starts up your computer.- Temporary storage to speed up processes.- A node that connects different networks.- A line of tasks waiting to be processed.- The top-level directory in a file system....

Internet Technologies 2025-01-08

Internet Technologies crossword puzzle
Across
  1. A real-time communication over the internet.
  2. A way to quickly access a favorite web site by saving it in your browser.
  3. Usually defines as a personal or noncommercial web site that uses a dated log format.
  4. The web page that your browser is set to use when it starts up, or the main page of any website.
  5. The act of moving from page to page and website to website online
  6. It is a series of letters and numbers that identify a location.
  7. This is the printed/paper copy of a file from the computer.
  8. To search for information on the web in a random , non-linear way.
  9. A special software package that connects to a network and provides data.
  10. An animated faces that express different emotions.
Down
  1. Refers to all computer networks on the internet.
  2. This is a file that has been added to an e-mail.
  3. illegally copying copyrighted software, music or movies.
  4. A request for information about certain topic.
  5. A collection of "pages" or files linked together and available on the world Wide Web.
  6. Small pictures that represent the program on your computer.
  7. A popular term for someone who accesses computer information either legally or illegally
  8. It is an unwanted email from someone we don't know.
  9. Another way to describe having access to the internet or actively using the internet.
  10. This is where all of the messages that you send are kept.

20 Clues: A real-time communication over the internet.A request for information about certain topic.Refers to all computer networks on the internet.This is a file that has been added to an e-mail.An animated faces that express different emotions.It is an unwanted email from someone we don't know.illegally copying copyrighted software, music or movies....

RU ITEC411 2025-10-22

RU ITEC411 crossword puzzle
Across
  1. The duty to use technology in a fair and moral way
  2. Offs  Giving up one benefit in order to gain another like privacy for convenience
  3. Creating new ideas or methods that improve technology or society
  4. Speech  The right to express opinions without government control
  5. When jobs are lost because machines or computers take over
  6. The idea that the best action is the one that helps the most people
  7. The results or effects that come from actions good or bad
  8. Dilemma  A situation where the right action is unclear or has both good and bad outcomes
  9. Tools and systems created to make tasks easier or more efficient
  10. A moral approach that focuses on duties and rules rather than results
  11. Networking  Websites or apps that let people share and connect online
Down
  1. Technology  Tools designed to help people with disabilities use computers or devices
  2. Using machines or software to perform work without human help
  3. How technology connects people and businesses around the world
  4. Divide  The gap between people who have access to technology and those who do not
  5. The study of what is right and wrong especially in human actions
  6. Intelligence  Machines or programs that can think and learn like humans
  7. The right to keep personal information safe and undisclosed
  8. Rights  Basic freedoms every person is born with such as life and liberty
  9. Of Change  How quickly technology develops and spreads in modern life
  10. Protection of computers data or networks from harm or misuse

21 Clues: The duty to use technology in a fair and moral wayThe results or effects that come from actions good or badWhen jobs are lost because machines or computers take overThe right to keep personal information safe and undisclosedProtection of computers data or networks from harm or misuseUsing machines or software to perform work without human help...

25339 2025-10-26

25339 crossword puzzle
Across
  1. Model suggesting optimal decisions or actions
  2. Finding hidden patterns in unlabeled data
  3. Software used to create interactive visuals
  4. Google’s serverless data warehouse for analytics
  5. Data that provides information about other data
  6. Making choices based on factual data insights
  7. Tool for data connection and transformation in Excel and Power BI
  8. Estimating future business trends using analytics
  9. Performing data analysis using cloud computing resources
  10. Combining data from multiple sources into one view
  11. Non-relational database system for handling large unstructured data
  12. Mathematical framework for achieving the best result
  13. Using statistical models to predict future outcomes
  14. Moral principles guiding responsible data use
  15. Learning based on rewards and penalties
Down
  1. Processing data through interconnected neural structures
  2. Immediate analysis of streaming data
  3. Process of removing personal identifiers from data
  4. Machine learning technique using labeled data
  5. Subset of AI using neural networks with multiple layers
  6. Simulation of human intelligence by machines
  7. Stages through which data passes from creation to deletion
  8. Identifying and evaluating potential business risks
  9. Moving data between systems or storage types
  10. Selecting and transforming variables for model building
  11. Model explaining what has happened in the data
  12. Identifying unusual patterns that do not conform to expected behavior
  13. Continuous flow of real-time data from sources
  14. Tool to evaluate and compare multiple decision options
  15. Protecting data from unauthorized access or corruption
  16. Presenting key metrics visually for quick insight

31 Clues: Immediate analysis of streaming dataLearning based on rewards and penaltiesFinding hidden patterns in unlabeled dataSoftware used to create interactive visualsSimulation of human intelligence by machinesMoving data between systems or storage typesModel suggesting optimal decisions or actionsMachine learning technique using labeled data...

Techonology 2019-03-25

Techonology crossword puzzle
Across
  1. websites and applications that enable users to create and share content or to participate in social networking
  2. an aircraft or flying device which does not have a human pilot onboard
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Down
  1. a person who uses computers to gain unauthorized access to data
  2. a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded apps
  3. a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
  4. a computer that is portable and suitable for use while travelling
  5. a method of exchanging mails between people using electronic devices

8 Clues: a person who uses computers to gain unauthorized access to dataa computer that is portable and suitable for use while travellinga method of exchanging mails between people using electronic devicesan aircraft or flying device which does not have a human pilot onboard...

TECHNICAL VOCABULARY 2015-02-25

TECHNICAL VOCABULARY crossword puzzle
Across
  1. how fast data flows on a given transmission path. The width of the range of frequencies that an electronic signal occupies on a given transmission medium.
  2. when you send a file from one computer to another, you.............it.
  3. a fiber optic line that can carry sixty times more data than a residential modem. They are used by businesses to connect to ISPs.
  4. an access point to the Internet. It's a physical location that houses servers, routers and ATM switches.
Down
  1. a network that covers a broad area.
  2. Today there are high capacity...............that connect networks across the globe. They are composed of trunk cables.
  3. a fiber optic line that can support hundreds of even thousands of computers on a single network.
  4. when you receive a file from another computer, you..........it.

8 Clues: a network that covers a broad area.when you receive a file from another computer, you..........it.when you send a file from one computer to another, you.............it.a fiber optic line that can support hundreds of even thousands of computers on a single network....

Vaping Health Risks 2025-10-29

Vaping Health Risks crossword puzzle
Across
  1. a chronic disease characterized by compulsive drug seeking and use
  2. the process of informing individuals, especially youth, about the health risks associated with using e-cigarettes and providing guidance to prevent or quit the behavior
  3. products, strategies, or behaviors used to either replace vaping or to help a person stop using nicotine products entirely
  4. adolescents and young adults, typically those aged 12–24 years
Down
  1. a traditional tobacco product that involves burning tobacco for smoking
  2. the highly addictive, psychoactive chemical that is added to e-liquids to be inhaled as an aerosol, or “vapor,” by the user
  3. primarily due to its nicotine content, can negatively impact _________ and learning by altering brain networks
  4. the swelling and irritation of body tissues, especially the lungs, caused by inhaling chemicals and particles from e-cigarette aerosols

8 Clues: adolescents and young adults, typically those aged 12–24 yearsa chronic disease characterized by compulsive drug seeking and usea traditional tobacco product that involves burning tobacco for smokingprimarily due to its nicotine content, can negatively impact _________ and learning by altering brain networks...

D.A.T.A. Lab Crossword 2014-03-03

D.A.T.A. Lab Crossword crossword puzzle
Across
  1. A person or agency considered to interface wise counsel or prophetic predictions or precognition of the future, inspired by the gods.
  2. A group of neighboring stars.
  3. The ability to querying very large databases for knowledge discovery.
  4. The entire protein complement of a given organism.
  5. The company that developed .
  6. The field of endeavor that relates to the collection, organization and analysis of large amounts of biological data using networks of computers and databases.
  7. This SQL Server data structure is commonly found in books.
Down
  1. An open-source software framework for storage and large scale processing of data sets on clusters of commodity hardware.
  2. The structural or descriptive information about data.
  3. A random process in which the probabilities of discrete states in a series depend only on the properties of the immediately preceding state or the next preceeding state.
  4. A vast array of heterogeneous data stored in a single logical data repository for querying and manipulation methods.
  5. An organized collection of data to model relevant aspects of reality in a way that supports processes requiring this information.

12 Clues: The company that developed .A group of neighboring stars.The entire protein complement of a given organism.The structural or descriptive information about data.This SQL Server data structure is commonly found in books.The ability to querying very large databases for knowledge discovery....

Health Assessment Chapters 31 Jarvis 7th ed. Laboratory Manual for Physical Examination & Health Assessment 2015-09-30

Health Assessment Chapters 31 Jarvis 7th ed. Laboratory Manual for Physical Examination & Health Assessment crossword puzzle
Across
  1. multidimensional assessment (physical examination and assessments of mental status, functional status, social and economic status, pain, and physical environment for safety)
  2. perceived strain by the person who cares for an older, chronically ill, or disabled person
  3. activities that an older adult performs as a family member or as a member of society or community
  4. assessment of an individual's spiritual health
  5. informal supports accessed by older adults (family members, close friends, neighbors, church societies, neighborhood groups, and senior centers)
  6. assessment of an individual's home environment and community systems (includes hazards)
Down
  1. ability of person to perform activities necessary to live in modern society
  2. systematic assessment that includes assessment of an individual's activities of daily living, instrumental activities and tasks associated with current life roles
  3. supportive services provided in the home
  4. tasks that are necessary for self-care
  5. mental status assessments (attention, memory, orientation, language, visuospatial skills, and higher cognitive functions
  6. assessment of health and well-being of an individual's caregiver

12 Clues: tasks that are necessary for self-caresupportive services provided in the homeassessment of an individual's spiritual healthassessment of health and well-being of an individual's caregiverability of person to perform activities necessary to live in modern societyassessment of an individual's home environment and community systems (includes hazards)...

ismael crosword 2019-11-13

ismael crosword crossword puzzle
Across
  1. a set of keys used to input text
  2. is the main printed circuit board (PCB) found in general purpose computers and other expandable systems
  3. a device to digitize paper documents
  4. is a hand-held pointing device that detects two-dimensional motion relative to a surface
  5. a cathode ray tube or liquid crystal display
Down
  1. is a graphics standard for video display controller first introduced with the IBM PS/2 line of computers in 1987
  2. data network, a digital telecommunications network
  3. an output device that displays information in pictorial form
  4. is a peripheral device which makes a persistent representation of graphics or text on paper.
  5. is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
  6. is an industry standard that establishes specifications for cables and connectors and protocols for connection, communication and power supply between computers, peripheral devices and other computers.
  7. is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions.

12 Clues: a set of keys used to input texta device to digitize paper documentsa cathode ray tube or liquid crystal displaydata network, a digital telecommunications networkan output device that displays information in pictorial formis a hand-held pointing device that detects two-dimensional motion relative to a surface...

Redalert CTF 2019-08-05

Redalert CTF crossword puzzle
Across
  1. This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
  2. This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
  3. This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
  4. May sometime be known as Industroyer
  5. The world’s most murderous malware
Down
  1. Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
  2. A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
  3. This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
  4. This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
  5. This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
  6. A network security measure employed on one or more computers to physically isolated from another network.
  7. A RAT targeting the ICS industry by the hacking group Dragonfly

12 Clues: The world’s most murderous malwareMay sometime be known as IndustroyerA RAT targeting the ICS industry by the hacking group DragonflyThis malware was reported to be involved with the 2015 cyber-attacks in UkraineThis is an attack on bluetooth connections which allows for complete takeover of targeted devices....

Chem 2023-11-16

Chem crossword puzzle
Across
  1. A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
  2. the process of becoming an acid or the act of making something become an acid
  3. the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
  4. H₂CO₃
  5. the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
  1. When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
  2. a principle of chemistry used to predict the rates of chemical reactions
  3. the abundance of a constituent divided by the total volume of a mixture
  4. CO2
  5. A state in which the rate of the forward reaction equals the rate of the backward reaction
  6. a measure of how acidic/basic water is
  7. a process that leads to the chemical transformation of one set of chemical substances to another.

12 Clues: CO2H₂CO₃a measure of how acidic/basic water isthe abundance of a constituent divided by the total volume of a mixturea principle of chemistry used to predict the rates of chemical reactionsthe process of becoming an acid or the act of making something become an acid...

Piaget 2023-06-19

Piaget crossword puzzle
Across
  1. Tweaking old schemes or building new ones when new experiences reveal that one's current schemes do not perfectly describe the external environment
  2. A specific way of understanding experiences
  3. When the brain is using schemes to understand the external environment more that it is changing or modifying current schemes
  4. A young child using his schemes to understand his external environment
  5. This type of behaviour is the result of the simultaneous combination of schemes to address a problem
  6. This Reaction is the repetition of an originally random behaviour which eventually leads to the adaptation of schemes
Down
  1. The cognitive discomfort that a child feels during periods where their cognitive development is fast
  2. Creating and using schemes that apply to one's external world
  3. This approach provides opportunities to tweak current schemes by preforming a repetitive action slightly differently and examining the results
  4. A baby's first schemes are patterns of these
  5. A process where schemes are linked with other schemes to form networks
  6. The large amount of new schemes created in this stage make it the most complicated stage of development

12 Clues: A specific way of understanding experiencesA baby's first schemes are patterns of theseCreating and using schemes that apply to one's external worldA process where schemes are linked with other schemes to form networksA young child using his schemes to understand his external environment...

Business (Promotion) 2023-04-28

Business (Promotion) crossword puzzle
Across
  1. The combination of promotional materials used by a business to communicate with its customers.
  2. A form of online marketing which places advertisements on web pages showing the results from search engine queries.
  3. Involves information and techniques used by businesses to make consumers aware of products and to persuade them to buy those products now and in the future.
Down
  1. Using internet technologies to provide a range of advertising including using email, social media messages and banner advertisements on mobile phones and websites.
  2. The various places where advertisements may be found such as television, newspapers, or the internet.
  3. Involves websites and applications which allow users to create and share information, ideas and interests with other individuals, communities and networks.
  4. These are a form of online marketing which place new browser windows on computer screens.
  5. The total amount of methods of promotion
  6. Provides information and allows discussion on the internet with other users producing their own entries or posts.
  7. The total amount of types of advertising
  8. A type of advertising that uses bright light
  9. The first step of the advertising process

12 Clues: The total amount of methods of promotionThe total amount of types of advertisingThe first step of the advertising processA type of advertising that uses bright lightThese are a form of online marketing which place new browser windows on computer screens.The combination of promotional materials used by a business to communicate with its customers....

Networking Basics 2023-08-14

Networking Basics crossword puzzle
Across
  1. An address that identifies the network and host address assigned to a device.
  2. A network that connects several LANs. often limited to a corporation or an organizatio
  3. A device that is connected to absorb signals and prevent them from reflecting repeatedly back and forth on the cable.
  4. The term used to describe how devices are connected and how messages flow from device to device.
  5. An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
Down
  1. A local or restricted communications network, especially a private network created using World Wide Web software.
  2. A WAN that uses software to control connectivity.
  3. A collection of many networks owned by many entities that share information and communicate together.
  4. The portion of the IP address that identifies the network the device is assigned to.
  5. A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
  6. A tunnel interface.
  7. Computer users and resources within a geographic area the size of a metropolitan area that are connected.

12 Clues: A tunnel interface.A WAN that uses software to control connectivity.An address that identifies the network and host address assigned to a device.The portion of the IP address that identifies the network the device is assigned to.A network that connects several LANs. often limited to a corporation or an organizatio...

Computer architecture 2024-01-09

Computer architecture crossword puzzle
Across
  1. A single integrated circuit performing the basic functions of the central processing unit in a small computer.
  2. The act or process of calculating an answer or amount by using a machine.
  3. A set of instructions that form part of an electronic device and allow it to communicate with a computer or with other electronic devices.
  4. Connected to a computer or other device by a wire.
  5. An amount of something that is used, or the process of using something.
  6. To open a computer file, a website, etc. in order to look at or change information in it.
Down
  1. The act or process of executing.
  2. The process of saving and keeping information, music, etc. on a computer.
  3. A system for connecting computers into networks (= groups of computers that are used together).
  4. Not needing wires to make a connection or to communicate.
  5. The design and structure of a computer system, which controls what equipment can be connected to it and what software can operate on it.
  6. The main part of a computer which contains the CPU.

12 Clues: The act or process of executing.Connected to a computer or other device by a wire.The main part of a computer which contains the CPU.Not needing wires to make a connection or to communicate.An amount of something that is used, or the process of using something.The process of saving and keeping information, music, etc. on a computer....

25 2024-01-05

25 crossword puzzle
Across
  1. The activity of setting up a business or businesses, taking on financial risks in the hope of profit.
  2. The practice of protecting systems, networks, and programs from digital attacks.
  3. The use of living systems and organisms to develop or make useful products.
  4. Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
  5. The use of largely automatic equipment in a system of operation.
  6. Capable of being decomposed by bacteria or other living organisms.
Down
  1. The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
  2. Working from home, making use of the Internet, email, and the telephone.
  3. The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
  4. The ability to be maintained over the long term without harming the environment. (Note: Repeated for variety.)
  5. Capable of being maintained or continued over the long term.
  6. Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device.

12 Clues: Capable of being maintained or continued over the long term.The use of largely automatic equipment in a system of operation.Capable of being decomposed by bacteria or other living organisms.Working from home, making use of the Internet, email, and the telephone.The use of living systems and organisms to develop or make useful products....

Module 1: Impact of Digital Technology (Part 1 of 2) 2025-04-24

Module 1: Impact of Digital Technology (Part 1 of 2) crossword puzzle
Across
  1. when software processes or converts data into something meaningful
  2. raw facts, such as text and numbers used to analyze something or make decisions
  3. the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from beginner to advanced user
  4. an electronic device for storing and processing data; devices that can share data using internet or wireless networks
  5. combining traditional teaching methods with digital tools such as a smartboard and LMS to engage students
  6. responds to your verbal (natural language)commands, i.e., Amazon's Alexa
  7. the gap between those who have access to technology and its resources and information; includes affordability and quality
  8. a computer that functions as one computer component in a larger product and has a specified purpose
Down
  1. technology that enables computers and machines to simulate human learning and comprehension
  2. the device itself (i.e., desktop computer) and its components (i.e., keyboard)
  3. an individual's ability to find, evaluate, and communicate information using digital media platforms
  4. acronym that when individuals use their personal devices to access work data and information

12 Clues: when software processes or converts data into something meaningfulresponds to your verbal (natural language)commands, i.e., Amazon's Alexathe device itself (i.e., desktop computer) and its components (i.e., keyboard)raw facts, such as text and numbers used to analyze something or make decisions...

Technology 2025-05-12

Technology crossword puzzle
Across
  1. A group of computers and other devices connected in some ways so as to be able to exchange data
  2. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  3. Not natural; Man-made
  4. Machine resembling a human
  5. A type of automated machine that can execute specific tasks with little or no human intervention and with speed and precision
  6. A physical system that uses power to apply forces and control movement to perform an action
Down
  1. Machines and technologies that can operate without continuous human supervision
  2. A worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols
  3. The procedure of calculating; determining something by mathematical or logical methods
  4. Machinery and equipment developed from the application of scientific knowledge
  5. The bringing about of new ideas, methods, products, services, or solutions that have a significant positive impact and value
  6. A branch of engineering and computer science that involves the conception, design, manufacture and operation of robots

12 Clues: Not natural; Man-madeMachine resembling a humanMachinery and equipment developed from the application of scientific knowledgeMachines and technologies that can operate without continuous human supervisionThe procedure of calculating; determining something by mathematical or logical methods...

Exam|Business Role in Society 2025-09-04

Exam|Business Role in Society crossword puzzle
Across
  1. A professor in Mexico who turned the pandemic into a time to weave networks and co-found Tierra Común
  2. The university where Paola Ricaurte teaches media and digital culture
  3. Every element within a system influences and is influenced by other elements, creating a web of interconnectedness
  4. Pattern that is selling a product or service to the highest bidder
  5. This pattern allows other companies to distribute its goods under their brands, so that it appears as if they are made by them
  6. The ability to see both the separate elements of a situation and the complex interactions between them
  7. According to Matthew Prince, what is eating the web?
Down
  1. A block in the Business Model Canvas that identifies the external organizations or individuals a company must collaborate with to operate successfully
  2. The conscious and responsible ways a company communicates with and delivers value to its customers and stakeholders
  3. The company led by Matthew Prince
  4. A product, project or entire start-up is financed by a crowd of investors who wish to support the underlying idea, typically via the Internet
  5. Mexican restaurant that empowers homeless youth through training and jobs.

12 Clues: The company led by Matthew PrinceAccording to Matthew Prince, what is eating the web?Pattern that is selling a product or service to the highest bidderThe university where Paola Ricaurte teaches media and digital cultureMexican restaurant that empowers homeless youth through training and jobs....

Chapters 8-9 2025-12-06

Chapters 8-9 crossword puzzle
Across
  1. Social __ is the sense of psychological closeness and connection experienced during communication
  2. The kind of ties in social networks that exist when people have infrequent interaction with acquaintances and limited emotional involvement
  3. Communication channel factor reflecting whether interaction occurs at the same time or at different times
  4. The level of richness that works best for simple, routine, broadcast, or archival messages
  5. When the amount of job information received exceeds processing capacity, resulting in delayed or inaccurate communication
  6. A psychological state where someone believes they have control over their work and freedom to make decisions, often boosting motivation and performance
  7. Contingency of power that exists when your skills or resources cannot be replaced by alternatives
Down
  1. When a person pushes back against influence; actively refusing, delaying, or signaling disagreement
  2. Use of facts, logical arguments, and emotional appeals to change someone's mind or behavior
  3. An emotional __ happens when we “catch” or share someone else’s emotions by mimicking their facial expressions and body language
  4. Final stage of listening where the receiver confirms understanding through verbal or nonverbal feedback
  5. Power based on accepted authority to request behaviors from others

12 Clues: Power based on accepted authority to request behaviors from othersThe level of richness that works best for simple, routine, broadcast, or archival messagesUse of facts, logical arguments, and emotional appeals to change someone's mind or behaviorSocial __ is the sense of psychological closeness and connection experienced during communication...

Networks of Exchange in AP World History 2024-01-31

Networks of Exchange in AP World History crossword puzzle
Across
  1. proved to be an invaluable tool for trade and transportation in the Sahara Desert
  2. trade between sub-Saharan Africa and North Africa that requires travel across the Sahara.
  3. a person or company involved in wholesale trade, especially one dealing with foreign countries or supplying merchandise.
  4. exported animal skins, precious metals, and exotic African animals for Asian zoos in return for spice and art.
Down
  1. a global trade system (an interconnected network of many trade routes) based primarily in the Indian Ocean.
  2. refers to a network of routes used by traders for more than 1,500 years, from when the Han dynasty of China opened trade
  3. the world's largest hot desert and the third largest desert behind Antarctica and the Arctic
  4. a person who works hard or campaigns forcefully for a cause.
  5. the action of buying and selling goods and services.

9 Clues: the action of buying and selling goods and services.a person who works hard or campaigns forcefully for a cause.proved to be an invaluable tool for trade and transportation in the Sahara Deserttrade between sub-Saharan Africa and North Africa that requires travel across the Sahara....

World Unit 2 2023-10-18

World Unit 2 crossword puzzle
Across
  1. the founder of Mali empire. He crushed his enemies and won control of the gold trade routes along the trans-Saharan trade networks
  2. a central Asian city where the western and the eastern Silk Roads met; one of the westernmost cities of China, near the border with modern day Afghanistan, Kyrgyzstan, Pakistan, and Tajikistan.
  3. a Muslim city-state that became wealthy by building a navy and imposing fees on ships that passed through the Strait of Malacca, a narrow inlet that was part of the Indian Ocean trade network. Many ship captains used to travel between ports in India and ports in China.
  4. Mongol empire that ruled over Iran (Persia) & the Middle East
  5. Ruler of Mali (r. 1312-1337). His extravagant pilgrimage through Egypt to Mecca in 1324-1325 established the empire's reputation for wealth in the Mediterranean world.
  6. Mongol khanate founded by Genghis Khan's. It was based in southern Russia and quickly adopted both the Turkic language and Islam.
  7. ruler of the golden horde; one of Chinggis Khan's grandsons; responsible for the invasion of Russia beginning in 1236.
Down
  1. Meeting of all Mongol chieftains at which the supreme ruler of all tribes was selected
  2. The period of approximately 150 years of relative peace and stability created by the Mongol Empire.
  3. Europeans' name for the Moluccas, islands in Southeast Asia rich in highly desired spices like cinnamon, cloves, and nutmeg which were often traded in the Indian Ocean trade network
  4. Wrote the Book of Margery Kempe - considered the 1st autobiography in the English language. Chronicles her pilgrimages to holy sites in Europe and Asia. Claimed to have vision that called her to leave the vanities of the world
  5. (1304-1369) Moroccan Muslim scholar, the most widely traveled individual of his time. He wrote a detailed account of his visits to Islamic lands from China to Spain and the western Sudan. His writings gave a glimpse into the world of that time period.
  6. (1215-1294) Grandson of Genghis Khan and founder of the Mongol Yuan Dynasty in China.
  7. Cities along the coast of East Africa that actively participated in Indian Ocean trade: showed syncretism in their language and religion, blending traditional central African beliefs with Islam and Arabic
  8. Grandson of Chinggis Khan (ca. 1217-1265) who became the first il-khan (subordinate khan) of Persia.
  9. During the rule of Timur Lane was the most influential capital city, a wealthy trading center known for decorated mosques and tombs; a key trading city along the Silk Roads
  10. Mali trading city that became a center of wealth and learning thanks to its location in the trans-Saharan trade networks; universities, mosques, and libraries
  11. (1371-1433) a Chinese mariner, explorer, diplomat, fleet admiral, and court eunuch during China's early Ming dynasty, and often regarded as the greatest admiral in Chinese history. He was originally born as Ma He in a Muslim family and later adopted this new surname conferred by the Yongle Emperor.

18 Clues: Mongol empire that ruled over Iran (Persia) & the Middle East(1215-1294) Grandson of Genghis Khan and founder of the Mongol Yuan Dynasty in China.Meeting of all Mongol chieftains at which the supreme ruler of all tribes was selectedThe period of approximately 150 years of relative peace and stability created by the Mongol Empire....

crossword 2015-06-28

crossword crossword puzzle
Across
  1. Which protocol does Ping use?
  2. The device perform the data traffic directing functions on the internet or on a large corporate network. It is a device that joins multiple wires or wireless networks It operates at network layer of OSI model. Identify the device
  3. Loss in signal power as light travels down the fiber is called
Down
  1. One of the top manufacturers of Network-related equipment. An actual drawing of the Golden Gate Bridge is the logo.
  2. The moon is a
  3. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
  4. A popular manufacturer logo represents the integration of analog and digital technology

7 Clues: The moon is aWhich protocol does Ping use?Loss in signal power as light travels down the fiber is calledA popular manufacturer logo represents the integration of analog and digital technologyOne of the top manufacturers of Network-related equipment. An actual drawing of the Golden Gate Bridge is the logo....