networks Crossword Puzzles
malware 2023-06-21
izms crossword puzzle izms stands for Idea zizzles Mental Search 2014-05-05
Across
- The process by which a minority culture adopts a dominate culture and is absorbed into it it often involves the loss of language
- person who identifies his or her ethnic origin as Canadian along with ethnic origin of his or hers ancestors
- Identity: The common characteristics and values used to define a group
- Describes something such as a species of animal, a language or a people that no longer exist in the world
- Human Immunodeficiency Virus
- basic physical system of a community including roads, utilities, water, sewage and so on
- Process by which so many people move into rural area close to existing cities that these area became urban
- Member of First Nations, Metis, Inuit or Indigenous community who is respected for his or her knowledge, wisdom or experience
- Putting a group of people in a lower or powerless position within society
- Identity The group of characteristics and values people use to identify themselves as individuals
- Government in which power is held by the people under a system of free electionsHyphenated Canadian
- of Reconciliation An official acknowledgement of wrongs committed against Aboriginal peoples and a pledge to address those wrongs
- A positive, assertive action
- The final stage of HIV in which the human immune system collapses, placing people at greater risk of infection by life-threatening diseases
- Revolution The rapid transition from an agricultural based economy to a manufacture- based economy, which began in Great Britain in the 19th century and spread to other countries including Canada
- The different ways of transporting mass communication such as reading papers, radios, and television
- incurable disease transmitted through bodily fluids that destroys a person’s immune system
- North American Free Trade Agreement
- Globalization The process of expanding world trading networks
- A person who buys goods and services for personal useInfrastructure
Down
- Contact The interaction of two or more independent cultures
- Globalization The process by which political decisions and actions are becoming increasingly international
- language The first language a person learns at home, in childhood.
- The process by which cultures become more alike in terms of values, attitudes beliefs customs language and tradition
- A person whose first language is English
- Revitalization An effort to restore new life to a culture
- One company hiring another company to fulfill certain tasks in production
- Identity The collective identity of a people who speak the same language
- Francophone descendants of the New France
- Aboriginal people gaining control over key elements in their own communities such as the courts and education
- Making adjustments or reaching compromises to allow for differences
- Providing equal opportunity for participation of different groups in society
- A corporation that operates in two or more countries
- Cultures The cultures of the original inhabitants of a particular geographic area
- Globalization The process by which people’s lifestyles spread over global networks
- Commission A committee appointed by the federal government to investigate and write a report about a specific topic
36 Clues: Human Immunodeficiency Virus • A positive, assertive action • North American Free Trade Agreement • A person whose first language is English • Francophone descendants of the New France • A corporation that operates in two or more countries • Revitalization An effort to restore new life to a culture • Contact The interaction of two or more independent cultures • ...
Unit 3&4 Vocab Quiz Comp & Media 2023-03-06
Across
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A user on social media who has established credibility in a specific industry.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
Down
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The process of luring someone into a relationship by means of a fictional online persona.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Cybersecurity Final Vocab 2024-05-01
Across
- a logical element in programming languages that are used for storing a sequence of data elements of the same basic type
- a security mechanism that creates a virtual trap to lure attackers.
- Distributed denial of service (DDoS); involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
- a field of technology that uses investigative techniques to identify and store evidence from a computer device
- A UI redress attack; when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the top level page.
- horse a type of malware that downloads onto a computer disguised as a legitimate program.
- servers that are accessed over the Internet, and the software and databases that run on those servers.
- undocumented way of gaining access to computer system.
- a code that takes advantage of a software vulnerability or security flaw.
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants.
- any incident that results in unauthorized access to computer data, applications, networks or devices.
- a software program that performs automated, repetitive, pre-defined tasks.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user.
- a scam where thieves attempt to steal personal or financial account information by sending deceptive electronic messages that trick unsuspecting consumers into disclosing personal information.
- penetration testing or ethical hacking; the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications.
Down
- malware that employs encryption to hold a victim's information at ransom.
- the set of instructions, or a system of rules, written in a particular programming language
- a sphere of knowledge identified by a name
- the conversion of data from a readable format into an encoded format
- a computer network security system that restricts internet traffic in, out, or within a private network.
- a series of numbers that identifies any device on a network.
- a cybercrime that happens when someone impersonates a trusted contact or brand, pretending to be someone you trust in order to access sensitive personal information.
- a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
- when a person or program records login and password information from a legitimate user to illegally gain access to their account(s)
- also called encryption algorithms, are systems for encrypting and decrypting data.
- a process that transforms encrypted information into its original format.
- the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.
- passing some data through a formula that produces a result, called a hash.
- - short for bot network; is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker.
- instructions that tell a computer what to do.
30 Clues: a sphere of knowledge identified by a name • instructions that tell a computer what to do. • undocumented way of gaining access to computer system. • a series of numbers that identifies any device on a network. • a security mechanism that creates a virtual trap to lure attackers. • the conversion of data from a readable format into an encoded format • ...
Vocabulary words or something 2022-11-04
Across
- A user on social media who has established credibility in a specific industry.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically vieach a the internet.
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
Down
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- The process of luring someone into a relationship by means of a fictional online persona.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- Digital Marketing
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
20 Clues: Digital Marketing • A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Vocab 2022-11-15
Across
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- a user on social media who has established credibility in a specific industry.
- number of times one’s content is displayed, no matter if it was clicked or not.
- Apsychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- A set of tools designed to streamline and simplfy some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- an internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
Down
- the process used to optimize a website's technical configuration,content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- this is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- a business methodology that attracts customers by creating valuable content and experiences tailored to them.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- the use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- the process of luring someone into a relationship by means of a fictional online persona.
20 Clues: a user on social media who has established credibility in a specific industry. • number of times one’s content is displayed, no matter if it was clicked or not. • the process of luring someone into a relationship by means of a fictional online persona. • ...
PA 300 - Review 2024-11-24
Across
- Acronym for spatial positioning determination
- Systems, The type of steering system that is more accurate compared to light bars and can reduce operator fatigue
- Land Locations, The type of reference commonly used in agriculture that divides land into grids
- The part of DGPS control components that changes the state based on the controller’s feedback and helps create movement by converting energy into mechanical force
- Attenuation, The weakening or degradation of a GPS signal; can be caused by Ionospheric errors, multipath errors, etc.
- The GNSS constellation system that originated in Russia with 24 satellites
- Arguably the primary barrier to adopting PA technologies
- One of the angles associated with sate sensors that is the horizontal angle of vehicles left to right
- The process that calculates the conversion of coordinates from one datum to another
- Control, One of the three major PF applications that deals with the integration of technology and equipment
- Clock, The type of clocks that all satellites have but not all receivers do
- Offline, The engage option that determines how far off the guidance line the machine can be for auto steer to engage (typically is set high)
- Receiver, One of the two types of differential correction receivers that is moving and commonly a piece of equipment in ag
- Per Turn, The vehicle option that determines how dramatically the wheel will turn to stay on the guidance line that is set based on machine dimensions
- The acronym for how GPS receivers measure of signal strength (we want a high _____)
- One of the five types of DOP that has to do with the altitude of the satellites
Down
- The type of Ephemeris data used for trilateration calculations
- Producer Collecting, A PA technologie that is utilized in the dairy and poultry industry's that reduces labor and minimizes human contact
- of Precision, The indicator of the cumulative effects caused by Ionospheric, Tropospheric, clock and multipath errors (a high _____ equals poor location)
- The mathematical model that allows for the precise specification of locations on the surface of the earth
- The longest line of latitude
- Atmosphere, One of the five sources of errors that includes the slowing of signals due to ionized particles and pressure.
- The type of calculations that GNSS/GPS systems use that utilizes the convergence of pseudo-ranges
- The type of real time correction that utilizes a geostationary satellites
- Compensators, A types of sensor required for auto-steer systems that is also called the navigation controllers
- Tags, A PA technology used in the livestock sector that is responsible for tracking and monitoring animals for health and biosecurity purposes and is mandatory for animals leaving their place of birth
- Networks, VRS networks use _______ to create a virtual reference station in the field and requires a minimum of three of them for accuracy
- hydraulic steering, One of the two main types of steering actuators that is frequently factory installed in new equipment
- 27, A local datum that is used by GNSS/GPS systems
- Segment, One of the three GNSS components that is not located on the earth
30 Clues: The longest line of latitude • Acronym for spatial positioning determination • 27, A local datum that is used by GNSS/GPS systems • Arguably the primary barrier to adopting PA technologies • The type of Ephemeris data used for trilateration calculations • The type of real time correction that utilizes a geostationary satellites • ...
Unit 3&4 vocab 2026-04-08
Across
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The process of luring someone into a relationship by means of a fictional online persona.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
Down
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- A user on social media who has established credibility in a specific industry.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Units 3 & 4 Social Media, Apps, and Video Games Vocabulary 2026-04-01
Across
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A user on social media who has established credibility in a specific industry.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
Down
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- The process of luring someone into a relationship by means of a fictional online persona.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Unit 3&4 Vocab Crossword 2026-03-30
Across
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- The process of luring someone into a relationship by means of a fictional online persona.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
Down
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- A user on social media who has established credibility in a specific industry.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
UNIT 3 & 4 VOCAB, COMPOSITION AND MEDIA ANALYSIS 2026-03-30
Across
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A user on social media who has established credibility in a specific industry.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The process of luring someone into a relationship by means of a fictional online persona.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
Down
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Artificial Intelligence 2022-06-03
Across
- The person who created the term artificial intelligence.
- A subset of machine learning that consists of three or more layers of a neural network.
- The world's first robot citizen.
- Computing systems inspired by the biological neural networks that constitute animal brains.
- Highest Accuracy Drug Protein Folding AI.
- The machine that defeated the world champion, Garry Kasparov.
- First AI algorithm to detect potential COVID-19 infected patients.
- The person who made a detailing procedure known as Turing Test, forming the basis for artificial intelligence.
- A smart assistant that helps make everything faster and easier on your Apple devices.
- A logic programming language associated with artificial intelligence and computational linguistics made in 1972.
Down
- a collection of advanced driver-assistance system (ADAS)technologies provided by Tesla.
- A branch of engineering that involves the conception, design, manufacture and operation of robots.
- A type of artificial intelligence (AI) that enables software applications to improve their accuracy in forecasting events without being expressly designed to do so.
- Autoregressive language model that uses deep learning to produce human-like text.
- Language created by John Backus & IBM.
- A computer programming language developed about 1960 by John McCarthy.
- The first computer program to defeat a professional human Go player.
17 Clues: The world's first robot citizen. • Language created by John Backus & IBM. • Highest Accuracy Drug Protein Folding AI. • The person who created the term artificial intelligence. • The machine that defeated the world champion, Garry Kasparov. • First AI algorithm to detect potential COVID-19 infected patients. • ...
INQUSITIVE 2020-11-07
Across
- A circuit in which all parts are connected end to end to provide a single path of current.
- This is a magnet made by an electric current.It usually has an iron core.
- Pivot point around which a lever turns.
- __________ movement is movement backwards and forwards in the arc of circle.
- A wheel used for pulling or raising a weight.
- The branch of technology that deals with the design, construction, operation, and application of robots.
- Is a common type of network cable used with wired networks
Down
- First mobile robot capable of reasoning about it's surrounding.
- The first ever programming language developed.
- A program on a computer that tells it how to communicate with an add-on piece of equipment.
- Thomas Edison is credited with designing this in 1879.
- Use of computer programs to create 2D or 3D graphical representations of the real product.
- Technical word for 'stretching' liquid aluminium.
- This was first discovered in the 1930s with the first operational plant coming in the 1950s.
- A programming error that causes a program to behave in an unexpected way.
- A printed circuit board containing the principal components of a computer or other device.
- This was invented in Germany around 1440 by Johannes Gutenberg.
17 Clues: Pivot point around which a lever turns. • A wheel used for pulling or raising a weight. • The first ever programming language developed. • Technical word for 'stretching' liquid aluminium. • Thomas Edison is credited with designing this in 1879. • Is a common type of network cable used with wired networks • ...
PRIN Word Search 2021-05-10
Across
- contain all the data in your PC, from the operating system to music, movies and video games
- the central unit of a computer system that performs arithmetic and logic operations
- the electronic circuitry that executes instructions comprising a computer program
- a way of connecting computers together in a local area network or LAN
- global system of interconnected computer networks
- portable Document Format
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- a part of the system that holds the internal factors of a computer together
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
Down
- an American multinational technology company
- the industry leading spreadsheet software program
- usually refers to something using digits, particularly binary digits
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- a form of computer memory that can be read and changed in any order
- a presentation program
- receive audio input from a device such as a computer
17 Clues: a presentation program • portable Document Format • an American multinational technology company • the industry leading spreadsheet software program • global system of interconnected computer networks • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
EDTC5325 Crossword -Laura Glass 2014-03-26
Across
- Technology that allows an electronic device to exchange data or connect to the internet wirelessly.
- Carries data to smaller lines of transmission.
- A hardware device that routes data from a local area network (LAN) to another network connection.
- Networks that span long distances via telephone lines, fiber-optic cables, or satellite links.
- Computer network limited to a small area such as an office building or university,
- Technology often used for wireless keyboards and wireless printing.
- A piece of computer hardware or software that accesses a service made available by a server.
- A site that offers Internet access over a wireless local area network (Starbucks).
- Card that makes the connection between the computer and the network cable.
- A type of connector commonly used for Ethernet networking.
Down
- Limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
- The most common type of connection computers use in a local area network (LAN).
- An Ethernet network cable
- The maximum data transfer rate of a network or Internet connection.
- Describes the arrangement of systems on a computer network.
- Address A numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
- A computer that provides data to other computers.
17 Clues: An Ethernet network cable • Carries data to smaller lines of transmission. • A computer that provides data to other computers. • A type of connector commonly used for Ethernet networking. • Describes the arrangement of systems on a computer network. • Technology often used for wireless keyboards and wireless printing. • ...
SS10: Chapter 3 Keyword Terms 2014-04-08
Across
- the document that describes the powers and responsibilities of the government and the rights of citizens
- when one or more political parties or interest groups work together to achieve a common goal
- areas with higher populations which have more elected officials in government
- union of provinces where each keep certain powers but gives up other powers to a central, national government
- an agreement that provided free trade between the United States and the British colonies
- transportation networks such as roads, canals, and sewers that allow a community to function
- social class with wealthy members without aristocratic heritage
Down
- Canada East and Canada West within the Province of Canada
- a bill promising compensation to people of Canada East who suffered property damage during the Rebellions
- granting someone the rights and protection of a citizen of a particular country
- to join another culture and to give up one's own language and traditions
- an American idea that it was the fate of the United States to control all of North America
- pertaining to the reign of Queen Victoria
- a period of low economic activity marked by high unemployment
- economic system based on colonialism
- land set aside by governments for the use of First Nations
- to take over a territory and add it to the territory of another country
17 Clues: economic system based on colonialism • pertaining to the reign of Queen Victoria • Canada East and Canada West within the Province of Canada • land set aside by governments for the use of First Nations • a period of low economic activity marked by high unemployment • social class with wealthy members without aristocratic heritage • ...
Machine Learning 2018-02-13
Across
- which Data set used for testing an algorithm/model
- which Analytic offers a unique opportunity to identify future trends and allows organizations to act upon them
- which networks are algorithms inspired by the biological brain
- Concerned with building models that separate data into distinct classes.
- process of acquiring training data from population
- this matrix is a table that is often used to describe the performance of a classification model
Down
- task of grouping a set of objects in such a way that objects in the same group
- It’s a branch of mathematics which deals with data
- which Data set used for testing an algorithm/model while tuning model hyperparameters
- the fraction of relevant instances that have been retrieved over the total amount of relevant instances
- the true negative rate or the proportion of negatives that are correctly identified
- Measure of association between two variables that are not designated as either dependent or independent
- which Data set used for fitting an algorithm/model
- This Learning required Trained Label Data
- the positive predictive value or the fraction of the positive predictions that are actually positive
- simply the fraction of the total sample that is correctly identified.
- Machine learning is a subset of
17 Clues: Machine learning is a subset of • This Learning required Trained Label Data • It’s a branch of mathematics which deals with data • which Data set used for testing an algorithm/model • which Data set used for fitting an algorithm/model • process of acquiring training data from population • which networks are algorithms inspired by the biological brain • ...
Cyber Ethics 2025-05-22
Across
- An act of sending an email to an user,misleading him to believe that it is from a trusted person or organisation.
- Accessing the internet in an illegal manner.
- Refers to criminal activities that involve the use of computers,networks, and the internet connections.
- An act of harming or harassing a person through information technology through a deliberate manner.
- Refers to an illegal intrusion into a computer system or network.
- Malicious Software.
- Refers to the act of using or imitating the language and thoughts of another person as one's original work.
- Hacking,which is done for a good cause,such as natural security.
- When software is copied and distributed illegally.
Down
- Combination of two words 'Net' and 'Etiquette'.
- The criminal practice of using social influence over the telephone system.
- A security system that prevents unauthorised people from accessing your system and network.
- A right related to the new inventions that grants the inventor the sole right to make,use,and sell that invention for a specific period time.
- A macious technique of tricking a web user into clicking on something different from what the user perceives he/she is clicking on.
- Another name of digital footprint.
- Unwanted bulk emails that come from unknown sources.
- The equivalent term to hacking.
17 Clues: Malicious Software. • The equivalent term to hacking. • Another name of digital footprint. • Accessing the internet in an illegal manner. • Combination of two words 'Net' and 'Etiquette'. • When software is copied and distributed illegally. • Unwanted bulk emails that come from unknown sources. • Hacking,which is done for a good cause,such as natural security. • ...
BC Newsletter 2016-02-10
Across
- The program that is responsible for establishing the Business Continuity framework is called the ____.
- ____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- The Zika virus is transmitted through ____ bites.
- ____ virus can be transmitted from pregnant mother to her baby.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- During an active shooter if escape is not possible, then ____.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
Down
- You should always be careful before opening any ____ that is unfamiliar to you.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- Take pictures of damage to your property for ____ purposes.
- Cyber ____ is now one of the number one threats against networks, computers, programs and data.
- Throw away all food that has come in contact with the ____ water.
- ____ Response Team is a group of staff that assists in evacuation.
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- Only as a last resort, you must ____ the active shooter.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
BC Newsletter 2016-02-10
Across
- You should always be careful before opening any ____ that is unfamiliar to you.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- Cyber ____ is now one of the number one threats against networks, computers, programs and data.
- ____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- ____ virus can be transmitted from pregnant mother to her baby.
- During an active shooter if escape is not possible, then ____.
Down
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- Only as a last resort, you must ____ the active shooter.
- The Zika virus is transmitted through ____ bites.
- Throw away all food that has come in contact with the ____ water.
- Take pictures of damage to your property for ____ purposes.
- ____ Response Team is a group of staff that assists in evacuation.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- The program that is responsible for establishing the Business Continuity framework is called the ____.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
Security Awareness crossword puzzle 2018-05-07
Across
- _______ your data regularly and periodically check that you are able to restore them.
- Do not provide your _______ email account to social networks.
- _______ your computer when left unattended.
- This can slow down your computer and watch everywhere you go on the Internet.
- When faced with an email of suspicious origin, with questionable subject and/or risky file type as attachment, _______ the email.
- Always use _______ factor authentication where available.
- A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.
- Use a _______ password different from the passwords you use to access other sites.
Down
- If you think you might be a victim of phishing email, _______ to your respective IT Helpdesk immediately.
- Function of access rights/privileges to resources related to information security and computer security in general and to access control in particular.
- You should always keep your software and anti-virus definitions up-to-_______.
- Cybersecurity is _______'s responsibility.
- Information Security is a _______ issue.
- This horse can stampede your security defences for the bad guys and make you look sheepish too!
- _______ before you click or forward.
15 Clues: _______ before you click or forward. • Information Security is a _______ issue. • Cybersecurity is _______'s responsibility. • _______ your computer when left unattended. • Always use _______ factor authentication where available. • Do not provide your _______ email account to social networks. • ...
Technology Crossword 2019-05-21
Across
- To write and post an entry in a Weblog.
- An inhouse website that serves employees only, and most medium-sized and large companies have one
- The primary method for keeping a computer secure from intruders
- is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords.
- Instructions for the computer.
- A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk
- The computing part of the computer
Down
- The address that defines the route to a file on an Internet server
- The fundamental display element of an electronic screen or bitmapped image
- Computer people may use the term for capability and time
- a large network made up of smaller networks.
- An organization that provides access to the Internet.
- In operation, a computer is both hardware and software, and one is useless without the other.
- To store data locally in order to speed up subsequent retrievals
- a hardware interface for up to 127 peripherals that is governed by the USB Implementers Forum
15 Clues: Instructions for the computer. • The computing part of the computer • To write and post an entry in a Weblog. • a large network made up of smaller networks. • An organization that provides access to the Internet. • Computer people may use the term for capability and time • The primary method for keeping a computer secure from intruders • ...
Digital Citizenship 2018-01-29
Across
- the electronic responsibility for actions, deeds which is either ethical or unethical
- the relationship between copyrighted digital works and user permissions and rights related to computers, networks, and electronic devices
- the correct or acceptable way of communicating on the Internet
- difficult to detect by both humans and computer programs, effectively protecting data
- federal law of the United States that protects original works of authorship
- the information about a particular person that exists on the Internet as a result of their online activity
- any existence of an individual or business that can be found via an online search
- the state of belonging or being available to the public as a whole, and therefore not subject to copyright
Down
- a person using technology in order to engage in society, politics, and government
- someone uses a person's thoughts and ideas
- use of electronic communication to bully a person
- the danger to children presented by strangers
- user's personal safety against security risks to private information and property associated with using the Internet
- concerned with the privacy of digital information in general
- a website that enables users to create and share content or to participate in social networking
15 Clues: someone uses a person's thoughts and ideas • the danger to children presented by strangers • use of electronic communication to bully a person • concerned with the privacy of digital information in general • the correct or acceptable way of communicating on the Internet • federal law of the United States that protects original works of authorship • ...
5G-Technology -An Overview 2023-10-06
Across
- brings disparate things into a coherent whole.
- allows the controller to use resources from a lower level controller and provides services to a higher level controller
- emerging computing paradigm which refers to a range of networks and devices at or near the user.
- medium of transmission of the signal
- information are secured and don’t allow any unauthorized access.
- long-term solution necessitating the use of virtualized BBUs running on commercial servers within an NFV
- connectivity between BBUs and RRUs in C-RAN is provided
- spectrum between 1 and 6 GHz
Down
- emerging trend that seeks to transform a network’s designing, planning, implementation, and operations through software programming.
- The measurement of response time and throughput with respect to user load conditions.
- enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.
- applied to the signal to reduce the impairments like noise, interference, etc.
- The ability of a system to handle unusual peak loads without additional resources.
- increased system capacity
- measure of how often a system’s resources and services are accessible to end users, often expressed as the uptime of a system.
15 Clues: increased system capacity • spectrum between 1 and 6 GHz • medium of transmission of the signal • brings disparate things into a coherent whole. • connectivity between BBUs and RRUs in C-RAN is provided • information are secured and don’t allow any unauthorized access. • applied to the signal to reduce the impairments like noise, interference, etc. • ...
1984 Vocab #1 2023-02-13
Across
- information, especially of a biased or misleading nature, used to promote or publicize a particular political cause or point of view
- the action of subjecting a country or person to one's control
- the acceptance of or mental capacity to accept contrary opinions or beliefs at the same time
- discover or identify the presence or existence of
- a political or economic theory which advocates for production, distribution, and exchange to be controlled by the community as a whole
- intense and eager enjoyment, interest, or approval
- the state or practice of refraining from premarital sexual intercourse
Down
- offering nothing that is stimulating or challenging
- softened or matured by age or experience
- of or characteristic of the middle class, typically with reference to its perceived materialistic values or conventional attitudes
- system that propels containers through networks of tubes by compressed air
- fail to resist pressure, temptation, or some other negative force
- special words or expressions that are used by a particular profession or group and are difficult for others to understand
- a secret plan by a group to do something unlawful or harmful
- showing willingness to allow the existence of opinions or behavior that one does not necessarily agree with
15 Clues: softened or matured by age or experience • discover or identify the presence or existence of • intense and eager enjoyment, interest, or approval • offering nothing that is stimulating or challenging • a secret plan by a group to do something unlawful or harmful • the action of subjecting a country or person to one's control • ...
Basic concepts 2023-03-15
Across
- Strengths, weaknesses, opportunities and threats
- it means that it generates a profit rather than a loss. In other words, the business achieves a financial gain.
- LABOR the workers who are not directly involved in producing goods or supplying services
- RAW MATERIALS materials that companies directly use in the manufacturing of a finished product
- scale models
- MEDIA outdoor publications, television, press, radio, social networks.
- CENTERS a department or function within an organization that does not directly add to profit but still costs the organization money to operate.
- COMPANY international investors
Down
- the sending of commodities out of a country, typically in trade
- to ensure the only necessary quantity of necessary items including parts or raw materials in advance in response to the orders to produce products and parts, and the requests of service parts.
- a managerial accounting method for capturing all costs associated with manufacturing a particular product.
- LABOR refers to the salaries and wages paid to workers directly involved in the manufacture of a specific product
- VOLUME the number of units your company sells during a specific reporting period.
- OVERHEAD all indirect costs incurred during the production process.
- CYCLE: a management tool that evaluates a product's journey from development to withdrawal from the market.
- RAW MATERIALS goods that, while part of the overall manufacturing process, are not integrated into the final product.
- modern tendencies
17 Clues: scale models • modern tendencies • COMPANY international investors • Strengths, weaknesses, opportunities and threats • the sending of commodities out of a country, typically in trade • OVERHEAD all indirect costs incurred during the production process. • MEDIA outdoor publications, television, press, radio, social networks. • ...
Information Technology Terms 2021-10-11
Across
- A person employed to maintain and operate a computer system or network for a company or other organization.
- The person responsible for monitoring and controlling computer systems in a company or organization.
- People who work in communicating a concept or information via a computer using audio, video, text, graphics, animation, etc.
- A system of computers, peripherals, terminals, and databases connected by communication lines.
- A person who creates technical documentation and user guides for a professional field.
- A profession that involves the understanding and design of computers and computational processes.
- A person who designs, creates, and maintains software.
- Programs on the computer with written commands that tell a computer what tasks to perform.
Down
- Persons responsible primarily for supporting end-user software applications, normally done remotely via telephone.
- The person who writes codes for computer software.
- The person responsible for maintaining and updating a website.
- Technology that enables information to be used to produce products and services.
- Electronic information networks that carry audio, video, and computer data.
- The physical parts of the computer.
- A programmer who designs and manages the development of business applications on the computer.
15 Clues: The physical parts of the computer. • The person who writes codes for computer software. • A person who designs, creates, and maintains software. • The person responsible for maintaining and updating a website. • Electronic information networks that carry audio, video, and computer data. • ...
Elisa's Internet Terms 2021-10-28
Across
- Going from site to site with a purpose.
- Going from site to site without a purpose.
- The physical parts of a computer.
- This refers to the process of receiving data over the internet.
- Everyone can use this, it is worldwide.
- A word, phrase, or image that you can click and jump to a site. This is usually blue in color and is underlined.
- Junk mail or irrelevant postings to a newsgroup or bulletin board.
- A popular type of network cable that is used for wired networks.
Down
- A saved shortcut that directs your browser to a specific webpage.
- A barrier. It only allows trusted data to flow into your computer. It will not allow unauthorized data into your computer. This is between a trusted system or network and outside connections.
- Every device has one of these. This is how your device is identified.
- The act of posting or sending offensive messages over the internet.
- Describes the maximum data transfer rate of an internet connection.
- A computer that provides data to other computers.
- A type of virus that replicates itself, but doesn't alter any of the files on your computer or device.
15 Clues: The physical parts of a computer. • Going from site to site with a purpose. • Everyone can use this, it is worldwide. • Going from site to site without a purpose. • A computer that provides data to other computers. • This refers to the process of receiving data over the internet. • A popular type of network cable that is used for wired networks. • ...
Elisa's Internet Terms 2021-10-28
Across
- Going from site to site with a purpose.
- Going from site to site without a purpose.
- The physical parts of a computer.
- This refers to the process of receiving data over the internet.
- Everyone can use this, it is worldwide.
- A word, phrase, or image that you can click and jump to a site. This is usually blue in color and is underlined.
- Junk mail or irrelevant postings to a newsgroup or bulletin board.
- A popular type of network cable that is used for wired networks.
Down
- A saved shortcut that directs your browser to a specific webpage.
- A barrier. It only allows trusted data to flow into your computer. It will not allow unauthorized data into your computer. This is between a trusted system or network and outside connections.
- Every device has one of these. This is how your device is identified.
- The act of posting or sending offensive messages over the internet.
- Describes the maximum data transfer rate of an internet connection.
- A computer that provides data to other computers.
- A type of virus that replicates itself, but doesn't alter any of the files on your computer or device.
15 Clues: The physical parts of a computer. • Going from site to site with a purpose. • Everyone can use this, it is worldwide. • Going from site to site without a purpose. • A computer that provides data to other computers. • This refers to the process of receiving data over the internet. • A popular type of network cable that is used for wired networks. • ...
AI / 90s Pop 2025-02-14
Across
- A type of artificial intelligence that can learn and adapt to new situations independently
- A technique that uses a network of nodes to model complex patterns in data.
- Iconic '90s boy band known for "I Want It That Way."
- A method of machine learning where an agent learns by interacting with its environment.
- "Waterfalls" and "No Scrubs" were hits for this R&B group.
- A logical addressing system used in networks, often associated with the Internet.
- First name of the artist who released "My Heart Will Go On."
Down
- Last name of the artist who had a hit with "Genie in a Bottle."
- The last name of the singer known for the 1995 hit "You Oughta Know."
- A type of neural network layer used primarily in processing sequential data.
- An approach to AI that focuses on building systems with a general understanding akin to human intelligence.
- The first name of the famous test designed to measure a machine's ability to exhibit intelligent behavior.
- First name of the female lead singer of the '90s band The Cranberries.
- A machine learning technique that uses multiple models to improve prediction accuracy.
- '90s rock band with the hit song "Under the Bridge."
15 Clues: Iconic '90s boy band known for "I Want It That Way." • '90s rock band with the hit song "Under the Bridge." • "Waterfalls" and "No Scrubs" were hits for this R&B group. • First name of the artist who released "My Heart Will Go On." • Last name of the artist who had a hit with "Genie in a Bottle." • ...
Communication 2023-10-30
Across
- Speaking Addressing a large audience or group, often on a specific topic or subject.
- Sharing information, news, or entertainment with a wide audience through media outlets.
- Creating messages and information through the use of written words and text.
- Sending short written messages via mobile devices or computers.
- Calls Real-time communication that allows people to see and hear each other, often via apps or software.
- The act of paying attention to what others are saying and understanding their messages.
- Electronic messages sent and received through the internet or other networks.
- Media Online platforms that enable people to share information and connect with others.
Down
- Displaying and explaining information to an audience, often using visual aids.
- The exchange of words and ideas between people, often in a friendly manner.
- A device used for voice communication over long distances.
- Language A visual and physical language used by the Deaf and hard of hearing communities.
- Expressing thoughts and ideas through words and verbal communication.
- A conversation where one person asks questions and another provides answers, often for assessment or information gathering.
- Language Non-verbal communication through gestures, facial expressions, and posture.
15 Clues: A device used for voice communication over long distances. • Sending short written messages via mobile devices or computers. • Expressing thoughts and ideas through words and verbal communication. • The exchange of words and ideas between people, often in a friendly manner. • Creating messages and information through the use of written words and text. • ...
Gen AI and LLM - Set 3 2024-11-18
Across
- A set of instructions written in code that directs the behavior of a program.
- An algorithm that categorizes data into predefined classes or labels.
- The initial instruction or question given to an AI model to generate a response.
- The result produced by an AI model after processing input data.
- An algorithm used for training neural networks by adjusting weights based on error gradients.
- A visual representation created or processed by AI systems.
- A type of model that learns to generate new data points from a training dataset.
- A learning paradigm where agents learn by receiving rewards or penalties for their actions.
- A type of machine learning where models learn patterns without labeled training data.
Down
- A learning approach where a model performs tasks it hasn’t explicitly been trained on.
- Relating to meaning in language, crucial for understanding context in AI models.
- Technology that converts written text into spoken words.
- An unobserved variable that influences observed data in statistical models.
- Human languages, like English or Spanish, that AI systems aim to understand and generate.
- The process of making small adjustments to improve a pre-trained model's performance.
15 Clues: Technology that converts written text into spoken words. • A visual representation created or processed by AI systems. • The result produced by an AI model after processing input data. • An algorithm that categorizes data into predefined classes or labels. • An unobserved variable that influences observed data in statistical models. • ...
globalisation 2025-05-15
Across
- imperialism (n) – the imposition of one culture over another, often through media or consumer products
- (n) – government policies that restrict international trade to protect domestic industries
- workforce (n) – the international labor pool involved in production and services
- corporation (TNC) (n) – a company that operates across national borders
- market economy (n) – an economic system based on supply and demand with little government control
- (n) – the removal of government controls from an industry or sector
- (n) – the process of making things uniform or similar across cultures or regions
Down
- (n) – the state of being connected with each other through various networks (economic, social, technological)
- liberalisation (n) – the removal or reduction of trade barriers (like tariffs or quotas)
- (adj/n) – a company operating in several countries
- gap (n) – the growing difference in income or living standards between different groups or countries
- (n) – moving business operations to another country to reduce costs
- (n) – the practice of hiring external firms or workers to perform tasks or services
- integration (n) – the unification of economic policies between different states or countries
- chain (n) – the sequence of processes involved in the production and distribution of goods
15 Clues: (adj/n) – a company operating in several countries • (n) – moving business operations to another country to reduce costs • (n) – the removal of government controls from an industry or sector • corporation (TNC) (n) – a company that operates across national borders • workforce (n) – the international labor pool involved in production and services • ...
CS Principles 2022 2022-04-22
Across
- When someone tries to get you to give them your personal information.
- In Nepal, what makes internet access difficult?
- When a kid gets mad while playing an online multiplayer game, they claim they are a hacker and threaten to reveal your IP ______
- a ___ decides where a packet goes by using the destination address
- The ability for a packet to reach its destination increases its ________
- The smallest piece of information in a computer
- a ____ name maps to an IP address
- the maximum bit rate of a system
- What type of system can experience failure and still continue to operate.
- A computer stores the destination IP address in the IP _____ header
Down
- A global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol.
- A computer that provides shared resources to network users.
- Using an algorithm and a key to convert message data into a form that is not understandable without that key.
- A small program attached to another program or data file. It replicates itself by attaching itself to other programs.
- A sequence of unambiguous instructions for solving a problem
15 Clues: the maximum bit rate of a system • a ____ name maps to an IP address • In Nepal, what makes internet access difficult? • The smallest piece of information in a computer • A computer that provides shared resources to network users. • A sequence of unambiguous instructions for solving a problem • a ___ decides where a packet goes by using the destination address • ...
NETWORKING CONCEPTS 2025-06-12
Across
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- also known as Local Area Network.
- a device that connects two different types of networks with each other.
- a type of topology in which each node is connected to every other node in the network.
- a computer network created for an individual.
- short form of Wide Area Network.
- a type of topology uses a single communication line to which all nodes are directly connected.
- a type of topology in which all the nodes in the network are connected in a circular manner.
Down
- certain sets of rules that determine how data should be transferred.
- refers to a computer network restricted to an organisation.
- Each computer in a network.
- refers to the layout in which the various components of a network are connected and communicated with each other.
- also known as Metropolitan Area Network.
- a network device that is used to connect all the computers in a network with each other.
- a type of topology in which each device is connected to a central computer using a poin to point connection.
15 Clues: Each computer in a network. • short form of Wide Area Network. • also known as Local Area Network. • also known as Metropolitan Area Network. • a computer network created for an individual. • refers to a computer network restricted to an organisation. • certain sets of rules that determine how data should be transferred. • ...
Crossword Design 2022-03-15
Across
- (2 words) Drawings that show parts in detail using a large scale
- (2 words) A short list of the essential requirements for the design
- (2 words) An idiom that suggests that anything can go wrong will go wrong
- (3 words) The process known by the acronym CAD
- (2 words) GA drawings that show whole structures using a small scale
- The size of items in a drawing in relation to their real size
- (2 words) Drawings that show designs in simplified form e.g. for pipe and duct networks
- An early version of a drawing that has or may have many further versions
Down
- (2 words) A criticism levelled at engineers who add excessive factors of safety to a design
- (3 words) The process known by the acronym FEA ComputationalFluidDynamics (3 words) The process known by the acronym CFD
- (2 words) A view having or appearing to have length and breadth but no depth
- A sketch may be developed into this type of initial drawing
- Documents which describe the materials, sizes and technical requirements of components
- (2 words) A cut-through view to see inside a model
- (2 words) A view having or appearing to have length, breadth, and depth
15 Clues: (3 words) The process known by the acronym CAD • (2 words) A cut-through view to see inside a model • A sketch may be developed into this type of initial drawing • The size of items in a drawing in relation to their real size • (2 words) Drawings that show parts in detail using a large scale • (2 words) A short list of the essential requirements for the design • ...
Elisa's Internet Terms 2021-10-28
Across
- Going from site to site with a purpose.
- Going from site to site without a purpose.
- The physical parts of a computer.
- This refers to the process of receiving data over the internet.
- Everyone can use this, it is worldwide.
- A word, phrase, or image that you can click and jump to a site. This is usually blue in color and is underlined.
- Junk mail or irrelevant postings to a newsgroup or bulletin board.
- A popular type of network cable that is used for wired networks.
Down
- A saved shortcut that directs your browser to a specific webpage.
- A barrier. It only allows trusted data to flow into your computer. It will not allow unauthorized data into your computer. This is between a trusted system or network and outside connections.
- Every device has one of these. This is how your device is identified.
- The act of posting or sending offensive messages over the internet.
- Describes the maximum data transfer rate of an internet connection.
- A computer that provides data to other computers.
- A type of virus that replicates itself, but doesn't alter any of the files on your computer or device.
15 Clues: The physical parts of a computer. • Going from site to site with a purpose. • Everyone can use this, it is worldwide. • Going from site to site without a purpose. • A computer that provides data to other computers. • This refers to the process of receiving data over the internet. • A popular type of network cable that is used for wired networks. • ...
2.1.1-22353469 2021-11-24
Across
- Separation of the control and management planes.
- A measurement of how much data a network, which is made up of two or more devices that connect with one another, can transmit.
- Do not have the intelligence to select the optimum path for data packets.
- A collection of rules that govern the transmission of data between devices on the same network.
- Two insulated copper wires that are twisted together.
- It's been used to transport cable communications.
Down
- A computer network device that links other devices.
- Used to send data, internet data, video, and phone communications.
- A computer or system that connects to other computers to share resources, data, services, or applications.
- The most important piece of hardware for getting computers to talk to one another.
- In telecommunications, a network node that links two networks with separate transmission methods.
- Incoming and outgoing network traffic are monitored and filtered by a network security device.
- Stores and forwards frames between the bridge's various segments.
- A collection of computers or other devices linked by Ethernet or Wi-Fi inside a single, limited region.
- A device that allows the router's wireless signals to be forwarded to a greater region.
15 Clues: Separation of the control and management planes. • It's been used to transport cable communications. • A computer network device that links other devices. • Two insulated copper wires that are twisted together. • Stores and forwards frames between the bridge's various segments. • Used to send data, internet data, video, and phone communications. • ...
3.02 Vocabulary 2014-05-19
Across
- Unit that controls all of the work of a computer; frequently called the “brains” of the computer
- Computer term for processed information, or the final product obtained from the computer
- Special software that allows an individual to view information on the Internet
- Worksheet created by using a computer’s ability to perform high-speed mathematical calculations; used for budgets, accounts, and financial records
- Device that converts outgoing messages from a computer into a form that can be sent over telephone lines
- technologist Assist with cardiac catheterization procedures and angioplasty
- Operates an instrument called an electroencephalograph, which records the electrical activity of the brain
- (Clinical) Laboratory Technician (MLT) Study tissues, fluids, and cells of the human body to help determine the presence and/ or cause of disease
Down
- Computer term for information that is entered into a computer
- A system of linked computers that share information communication
- The use of video, audio, and computer systems to provide medical and/ or health care services
- A group of related records in a computerized system
- Machine or physical components of a computer system
- Programs or instructions that allow computer hardware to function intelligently
- A collection of related data in a computer
15 Clues: A collection of related data in a computer • A group of related records in a computerized system • Machine or physical components of a computer system • Computer term for information that is entered into a computer • A system of linked computers that share information communication • technologist Assist with cardiac catheterization procedures and angioplasty • ...
BC Newsletter 2016-02-08
Across
- Throw away all food that has come in contact with the ____ water.
- The program that is responsible for establishing the framework is called the ____.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- The first thing to do when there is an active shooter in the building if possible is ____.
- ____scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- You should always be careful before opening any ____ that is unfamiliar to you.
Down
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- The Zika virus is transmitted through ____ bites.
- If escape is not possible, then ____.
- ____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for ____ purposes.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- ____ virus can be transmitted from pregnant mother to her baby.
- Only as a last resort, you must ____ the active shooter.
15 Clues: If escape is not possible, then ____. • The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • ____ virus can be transmitted from pregnant mother to her baby. • Throw away all food that has come in contact with the ____ water. • ...
BC Newsletter 2016-02-18
Across
- Cyber ____ is one of the number one threats against networks, computers, programs and data.
- ____ Response Team is a group of staff that assists in evacuation.
- The program that is responsible for establishing the Business Continuity framework is called the ____.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- Take pictures of damage to your property for ____ purposes.
- Throw away all food that has come in contact with the ____ water.
- Only as a last resort, you must ____ the active shooter.
- You should always be careful before opening any ____ that is unfamiliar to you.
Down
- ____ virus can be transmitted from pregnant mother to her baby.
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- The Zika virus is transmitted through ____ bites.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- ____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- During an active shooter if escape is not possible, then ____.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
BC Newsletter 2016-02-10
Across
- ____ virus can be transmitted from pregnant mother to her baby.
- Active shooter is defined as an individual ____ engaged in killing or attempting to kill people in a confined and other populated area.
- Each supervisor needs to have a Supervisor ____ form filled out in advance with their staffs’ names.
- Throw away all food that has come in contact with the ____ water.
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- Cyber ____ is now one of the number one threats against networks, computers, programs and data.
- Only as a last resort, you must ____ the active shooter.
Down
- During an active shooter if escape is not possible, then ____.
- The program that is responsible for establishing the Business Continuity framework is called the ____.
- Take pictures of damage to your property for ____ purposes.
- ____ Response Team is a group of staff that assists in evacuation.
- The Zika virus is transmitted through ____ bites.
- You should always be careful before opening any ____ that is unfamiliar to you.
- The first thing to do when there is an active shooter in the building, if possible, is ____.
- scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
15 Clues: The Zika virus is transmitted through ____ bites. • Only as a last resort, you must ____ the active shooter. • Take pictures of damage to your property for ____ purposes. • During an active shooter if escape is not possible, then ____. • ____ virus can be transmitted from pregnant mother to her baby. • ...
BC 2016-02-04
Across
- Throw away all food that has come in contact with the ____ water.
- _____ virus can be transmitted from a pregnant mother to her baby
- Avoid standing water, it could be ____ charged from things such as fallen power lines.
- Each Supervisor needs to have a Supervisor ____ form filled out in advance with their staff's names.
- Active shooter is defined as an individual _____ engaged in killing or attempting to kill people in a confined and other populated area.
- The first thing to do when confronted with an active shooter if possible is _____.
- The program that is responsible for establishing the framework is called the ____.
- Only as a last resort, you must _____ the active shooter.
Down
- The virus is transmitted through ______ bites.
- You should always be careful before opening any ___ that is unfamiliar to you.
- If escape is not possible, then _____.
- _____ Response Team is a group of staff that assist in evacuation.
- Take pictures of damage to your property for _____ purposes.
- _____ scams are fraudulent emails used to collect personal and financial information or infect your computer with malware and viruses.
- Cyber ____ is now one of the number one threats against networks, computers, programs, and data.
15 Clues: If escape is not possible, then _____. • The virus is transmitted through ______ bites. • Only as a last resort, you must _____ the active shooter. • Take pictures of damage to your property for _____ purposes. • Throw away all food that has come in contact with the ____ water. • _____ virus can be transmitted from a pregnant mother to her baby • ...
Industrial Age 2023-03-28
Across
- a building or group of buildings where goods are manufactured
- New type of water transportation used steam instead of sails
- German writer and economist, founded modern socialism/marxism/communism
- modern definition of being obsessed with owning and purchasing goods and services
- was essentially the working, class working in factories and mines, often for little compensation (think Karl Marx)
- political program which set Japan on the path of centralization, industrialization and imperialism
- ideology that focuses on the idea that “the greatest good for the greatest number of people”
Down
- introduced laissez-faire/capitalism
- individuals who buy a partial ownership directly from the company when it is formed
- ideology that encourages overthrowing the upper class
- included the middle class and investors who owned machinery and factories where workers produced goods (think Karl Marx)
- the proportion of people living in towns and cities
- an association of workers, formed to bargain for better working conditions and higher wages
- A building in which several families rent rooms or apartments, often with little sanitation or safety.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds
15 Clues: introduced laissez-faire/capitalism • the proportion of people living in towns and cities • ideology that encourages overthrowing the upper class • New type of water transportation used steam instead of sails • a building or group of buildings where goods are manufactured • German writer and economist, founded modern socialism/marxism/communism • ...
Aria Categories 2017-07-20
Across
- Should be used when sending troubleshooting steps to the customers (Resolution 1)
- Aria keeps showing Setup Active (Issue Level 2)
- Label we should use when using the Replacement Tool for In-Warranty cases
- Error message shown when the Aria detects overweight (Issue Level 2)
- Fitbit Connect shows that there is no network available (Issue Level 2)
- No networks are visible during the setup process after getting a new internet provider (Issue Level 2)
- Message received when the network has a MAC filtering (Issue Level 2)
- Aria keeps showing step on, step off (Issue Level 2)
- Aria is not sending information to the account and all the requirements are correct (Issue Level 2)
Down
- Label we use when a coupon code is provided to the customer (Resolution 1)
- Used when we cannot pair a tracker through a mobile device (Issue Level 2)
- Used when trackers are not syncing through a mobile device (Issue level 2)
- We asked for information to clarify the issue (Resolution 1)
- Message we see when the password is incorrect and the network has been changed
- Use it when customer is reporting general setup issues (Issue level 2)
15 Clues: Aria keeps showing Setup Active (Issue Level 2) • Aria keeps showing step on, step off (Issue Level 2) • We asked for information to clarify the issue (Resolution 1) • Error message shown when the Aria detects overweight (Issue Level 2) • Message received when the network has a MAC filtering (Issue Level 2) • ...
Renaissance Chapter 3 - Kaylee & Indira 2023-12-12
Across
- A person who campaigns to bring about political or social change.
- Were people who studied Greek and Roman writings and art and applied classical ideas in their own lives and work.
- People who paid artists to produce works.
- A humanist who brought 240 Greek manuscripts and made copies and translations of them.
- To be born again and a complete spiritual change.
- A person who adopts a system of thought that centres on humans and their values, capacities, and worth; concern with the interests, needs and welfare of humans.
- Relating to the intelligent.
- The art of making speeches.
Down
- One who studies the truth and principles underlying human conduct and knowledge and the nature of the universe.
- A painting painted by Leonardo da Vinci.
- The language that people spoke, such as Italian, French, and English-became more accesable.
- A politically independent city and the rural area or hinterland around it.
- People in the the middle ages that were seen as craftspeople rather than artists.
- The rural area around a City State.
- Describes a complex way of life that came about as people began to develop networks or urban settlements.
15 Clues: The art of making speeches. • Relating to the intelligent. • The rural area around a City State. • A painting painted by Leonardo da Vinci. • People who paid artists to produce works. • To be born again and a complete spiritual change. • A person who campaigns to bring about political or social change. • ...
Peter Stincer 2024-01-09
Across
- a sequence of homogeneously typed data.
- 8 bits
- refers to the signals sent out from the computer.
- refers to the information or data sent to a computer for processing.
- constructs defined within programming languages which behave generally like functions, but which differ syntactically or semantically.
- any statistical relationship, whether causal or not, between two random variables
- A way of representing information using only two options.
- an approximate representation of the distribution of numerical data.
Down
- finding and resolving bugs (errors or defects) in computer programs, software, or systems.
- A process for reducing the number of bits needed to represent something in which some information is lost or thrown away. This process is not reversible.
- the representation of some entity that can be manipulated by a program.
- Deliberate duplication or partial duplication of circuitry, information, data, or system components.
- device that forwards data packets between computer networks.
- a string of characters used to uniquely identify a location in a directory structure.
- a syntactic entity in a programming language that may be evaluated to determine its value[1] or fail to terminate, in which case the expression is undefined.
15 Clues: 8 bits • a sequence of homogeneously typed data. • refers to the signals sent out from the computer. • A way of representing information using only two options. • device that forwards data packets between computer networks. • refers to the information or data sent to a computer for processing. • an approximate representation of the distribution of numerical data. • ...
Colton GH 2024-01-09
Across
- An agreed-upon set of rules that specify the behavior of some system.
- data about data
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- a collection of program statements. Programs run (or “execute”) one command at a time
- a named group of programming instructions. Also referred to as a “procedure”
- choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
- A type of computer that forwards data across a network
Down
- form of program documentation written into the program to be read by people and which do not affect how a program runs
- the series of connections between computing devices on a network starting with a sender and ending with a receiver
- the practice of obtaining input or information from a large number of people via the Internet
- 8 bits
- an ordered sequence of characters
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristic.
- The unique number assigned to each device on the Internet.
- typically represented as a 0 or 1
15 Clues: 8 bits • data about data • an ordered sequence of characters • typically represented as a 0 or 1 • A type of computer that forwards data across a network • The unique number assigned to each device on the Internet. • An agreed-upon set of rules that specify the behavior of some system. • a named group of programming instructions. Also referred to as a “procedure” • ...
CS Principles Exam Review 2024-04-25
Across
- Determines how to address nodes on the network + how to route data from one node to a destination node (2 words)
- 8 bits
- Problem cannot be solved in a reasonable amount of time
- Problem Is the sky blue? (2 words)
- A type of computer malware that can make copies of itself
- Algorithms with ________ ________ run in an UNREASONABLE amount of time
- Someone tried to trick me on a phone call by pretending to be my relative, this was voice _______
Down
- Wireless access point that gives unauthorized access to secure networks (3 words)
- _________ key encryption involves one key for both encryption & decryption
- Globe at Night was a _______ ____ project (2 words)
- Sound waves is an example of _____ data
- _______ Computing Refers to MULTIPLE PROCESSORS on a single computer system (2 words)
- When deciding on a restaurant to dine at, an individual might consider only the overall rating on a review site. This is a ______
- Compressing data in a way that discards some data and makes it impossible to recover the origional
- An error where a there's a mistake in an algorithm or program that causes it to behave unexpectedly or return the incorrect value
15 Clues: 8 bits • Problem Is the sky blue? (2 words) • Sound waves is an example of _____ data • Globe at Night was a _______ ____ project (2 words) • Problem cannot be solved in a reasonable amount of time • A type of computer malware that can make copies of itself • Algorithms with ________ ________ run in an UNREASONABLE amount of time • ...
Gen AI and LLM - Set 2 2024-11-18
Across
- An input given to a model to generate a response or output.
- The primary output of language models, consisting of written words.
- A conversational interaction, often facilitated by AI.
- Adjusting a pre-trained model on a smaller dataset for specific tasks.
- A type of neural network architecture that underpins many modern LLMs.
- A unit of text processed by language models, typically a word or subword.
- A modeling error where a model learns noise in the training data instead of the underlying pattern.
- The surrounding information that helps models understand the meaning of text.
Down
- A learning approach where a model performs tasks without specific training examples for those tasks.
- Information used to train AI models, including text and images.
- The process of teaching a model using large datasets to improve its performance.
- Referring to models that can create new content, such as text or images.
- A numerical representation of words or phrases in vector space for better processing by models.
- The act of generating predictions or outputs from a trained model.
- A mechanism in neural networks that allows models to focus on relevant parts of the input data when generating output.
15 Clues: A conversational interaction, often facilitated by AI. • An input given to a model to generate a response or output. • Information used to train AI models, including text and images. • The act of generating predictions or outputs from a trained model. • The primary output of language models, consisting of written words. • ...
Revision : Marketing Analytics (Part 1) 2025-01-04
Across
- ______ analytics is used to build models based on the past to explain the
- learning _________uses an algorithm to build neural network models that classify or predict target variables.
- data includes text, images, videos, and sensor data.
- language processing (NLP) ________ is a branch of artificial intelligence (AI) used to identify patterns by reading and understanding meaning from human language.
- between previously established variables.
- ___________ is a situation where the predictor variables are highly correlated with each other.
Down
- ________ data is measured as whole numbers: 1, 2, 3, ..
- _________ measures the frequency of the specific association rule.
- In the _________ layer, the model arrives at a prediction.
- networks _______ are algorithms that are trained to recognize patterns in data that are non-linear.
- ______ data analysis provides a summary of the main characteristics within the data.
- learning _______ is a statistical method of learning that can be trained without human intervention to understand and identify
- Market basket analysis, sometimes referred to by marketers as _________ discovery, uses purchase transaction data to identify associations between products or combinations of products and services that occur together frequently.
- _________ data is made up of records that are organized in rows and columns.
- _______ data exist when values are selected from a group of categories
15 Clues: between previously established variables. • data includes text, images, videos, and sensor data. • ________ data is measured as whole numbers: 1, 2, 3, .. • In the _________ layer, the model arrives at a prediction. • _________ measures the frequency of the specific association rule. • _______ data exist when values are selected from a group of categories • ...
PUZZACT 2025-02-25
Across
- Resistance unit defining voltage-current proportionality in conductive materials.
- Transform used to analyze signals by decomposing them into sinusoids of varying frequencies.
- Mathematical operation used in signal processing and system analysis to determine system output.
- Passive element that opposes rapid current variations by storing energy in a magnetic field.
- High-gain differential amplifier with nearly infinite input impedance and near-zero output impedance in ideal conditions.
- Mechanical switching device ensuring unidirectional torque by cyclically reversing current in DC machines.
- Semiconductor device allowing unidirectional current flow with exponential I-V characteristics.
Down
- Physicist whose laws describe charge and energy conservation in electrical networks.
- Theorem that simplifies a linear electrical network to an equivalent single-source circuit.
- Integral of magnetic field intensity over a surface, determining electromagnetic induction effects.
- Voltage-controlled transistor with high input impedance, used in switching and amplification.
- Condition in circuits where inductive and capacitive reactances cancel, maximizing voltage/current at a specific frequency.
- Theorem that expresses a network as an ideal current source in parallel with impedance.
- Component that stores energy in an electric field and has reactance inversely proportional to frequency.
- Rotating or moving part in an electromechanical system that interacts with a magnetic field.
15 Clues: Resistance unit defining voltage-current proportionality in conductive materials. • Physicist whose laws describe charge and energy conservation in electrical networks. • Theorem that expresses a network as an ideal current source in parallel with impedance. • Theorem that simplifies a linear electrical network to an equivalent single-source circuit. • ...
English 2021-01-21
Across
- a large natural elevation of the earth's surface rising abruptly from the surrounding level; a large steep hill.
- the basic or inherent features, character, or qualities of something.
- is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products
- them to realize the nature of their problems"
- horizontal plane"
- is an inorganic, transparent, tasteless, odorless, and nearly colorless chemical substance
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- cheeks were pressed together as they danced"
- a flightless swift-running African bird with a long neck, long legs, and two toes on each foot. It is the largest living bird, with males reaching a height of up to 2.75 m.
- star round which the earth orbits.
- move rhythmically to music, typically following a set sequence of steps.
- guide is also available on the internet"
- a flat surface on which a straight line joining any two points on it would wholly lie.
- set off down the mountain"
14 Clues: horizontal plane" • set off down the mountain" • star round which the earth orbits. • guide is also available on the internet" • cheeks were pressed together as they danced" • them to realize the nature of their problems" • the basic or inherent features, character, or qualities of something. • move rhythmically to music, typically following a set sequence of steps. • ...
Computing 2016-04-10
Across
- Mozilla Firefox
- a band of frequencies used in radio and television transmission, especially as used by a particular station
- an arrangement of intersecting horizontal and vertical lines.
- computer
- a self-contained program or piece of software designed to fulfil a particular purpose; an application, especially as downloaded by a user to a mobile device.
- a video camera connected to a computer, allowing its images to be seen by Internet users.
Down
- used to store files
- a digital audio file made available on the Internet for downloading to a computer or portable media player, typically available as a series, new instalments of which can be received by subscribers automatically.
- used in socialmedia networks
- a hypertext document connected to the World Wide Web.
- the quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.
- wireless internet
- a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.
13 Clues: computer • Mozilla Firefox • wireless internet • used to store files • used in socialmedia networks • a hypertext document connected to the World Wide Web. • an arrangement of intersecting horizontal and vertical lines. • a video camera connected to a computer, allowing its images to be seen by Internet users. • ...
C.S hardware 2022-05-14
Across
- the rate at which someone or something moves or operates or is able to move or operate.
- protect (a network or system) from unauthorized access with a ________.
- a mobile phone, computer...
- where the wires are kept
- a unit of information equal to one thousand million (109) or (strictly) 230 bits.
Down
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- A ______ is responsible for organizing communication between computer networks
- copy (data) from one computer system to another, typically over the internet.
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- the main means of mass communication (broadcasting, publishing, and the internet) regarded collectively.
- firewalled network"
- company that provides Internet connections and services to individuals and organizations
13 Clues: firewalled network" • where the wires are kept • a mobile phone, computer... • protect (a network or system) from unauthorized access with a ________. • copy (data) from one computer system to another, typically over the internet. • A ______ is responsible for organizing communication between computer networks • ...
Securing Your Computer 2013-11-02
Across
- Extraneous messages sent on the internet to a large number of people, which can sometimes contain harmful programs.
- Even your computer's _________ account should be locked and secured. If it is not locked, this allows anyone to be able to create an account on your computer and access crucial files.
- Companies like Windows are always releasing new patches to make your security better; however, they can only work if you _________ them. It is smart to set Windows to automatically do this.
- If you receive an e-mail from your bank saying they need your personal information to "update" their books or for other reasons, you should delete the e-mail and ________ your bank by phone.
- A __________ software or hardware-based security system for your network that controls the traffic of importing and exporting data. It decides what to let though, and what to "burn".
- Passwords should be __________ for each site used. Never use the same one for every site/account.
- Protects your computer from programs that often operates without your permission.
- _____________ from the internet when you are not using it to avoid threats from online.
- When using protective software and other programs, it is vital to be sure these programs are __________ frequently.
- The _________ you use should be secure. This is what is used to search for online websites, images, articles, etc.
Down
- Your computers security programs may not pick up on some random ___________ or e-mail attachments, so be sure to ignore them because they can contain harmful software.
- A software program that tracks what has been typed on your computer. It is smart to have anti-___________ software on your computer to help secure information.
- Many locations like restaurants and cafes offer an open network for _________ use. Even though it is convenient, you should never trust these networks. Your computer is much more secure by using locked networks.
- Since any system can be at risk to invasion, it is extremely important to back up your _______ on another device.
- ___________ your computer when it is not in use. By doing this you make it a lot harder for online hackers and programs to find their way into your network.
- Any software that is intrusive or hostile is considered ___________.
- Always be aware of what you are ___________ and that it is safe. It is often used when wanting to transfer, copy, or take information.
- Protective software used to secure your computer from malicious software, such as viruses.
- Used to secure your computer and accounts. Should be 8 or more characters, and should have a combination of letters, numbers, and symbols.
- Always be sure to make your home Wi-Fi connection __________ to avoid the scanning and hacking of your network/computer.
- When dealing with important personal information online, always be sure to look for a ___________ emblem up by the browser address bar, or make sure that the address bar is green. This displays proof of the website being encrypted (secure).
- Performs behaviors without your consent (advertising, collection of personal information, computer configuration changes).
22 Clues: Any software that is intrusive or hostile is considered ___________. • Protects your computer from programs that often operates without your permission. • _____________ from the internet when you are not using it to avoid threats from online. • Protective software used to secure your computer from malicious software, such as viruses. • ...
Digital Citizenship Crossword 2015-01-15
Across
- A small piece of data sent from a website and stored in a user's web browser while the user is browsing said website.
- Using etiquette online and on networks
- Unauthorized use or reproduction of another's work.
- Sources that are reliable,accurate,and trustworthy.
- A standard document that allows the district to out line the rights, responsibilities, and authority of its network.
- Websites and applications that allow users to create and share content or to participate in social networking.
- A regular business that has expanded its activities to operate also on the internet.
- Digitized content that can be transmitted over the web or other computer network
- The process of searching for and/or retrieving requested information from online databases.
- To send someone sexually explicit photos or messages through technology devices.
- This activity usually uses e-mail, cell phones, text, etc.
- A virtual community were members interact with each other through the Internet.
- A place were particular ideas and views can be shared.
- The transmission of audio and images (as an event) through the internet.
- The appropriate and responsible use of technology
- An addiction of which a person's online life is more important then real-life relationships and friends.
- The fraudulent gain and use of someone's private identifying information.
- Data relating to the population and particular groups within it.
- The trail you leave when using technology.
- The study of people's efficacy in their working environment
- The process of growing and expanding to exist throughout the entire world.
- A person or group that ruthlessly exploits others through the Internet.
- Describes the conditions that copyrighted material may be used without permission.
- An application that authorizes credit-card payments for online businesses.
- When someone presents information that is not necessary or unwanted.
- An icon or figure representing a particular person in computer games, Internet forums, etc.
Down
- A person who uses online communication to bully others.
- The environment in witch communication over computer networks occur.
- Against one thing, person, or group compared to another in a way that is unfair.
- The method used to boost the ranking of a website in results given by a search engine.
- The gap between those who have a ready-to-use computer and internet; and those who don't.
- When one person reveals him/herself to another through communication.
- The act of manipulating an account user of giving information by posing as a real business.
- To manage or influence skillfully, especially in an unfair manner.
- The Practice of making people and businesses look best on the internet.
- A legal right given to a person(s) that protects and claims the person(s) original work, preventing others from claiming, copying, and using the person(s) work without permission.
- Commercial transitions conducted electronically on the internet.
- Learning through social and content interactions using personal electronic devices.
- Insulting and hostile interaction between two Internet users.
- The personality presented to or perceived by others about a single person.
40 Clues: Using etiquette online and on networks • The trail you leave when using technology. • The appropriate and responsible use of technology • Unauthorized use or reproduction of another's work. • Sources that are reliable,accurate,and trustworthy. • A place were particular ideas and views can be shared. • A person who uses online communication to bully others. • ...
AI Practical Work 2 2021-12-17
Across
- Local search algorithm that starts with an arbitrary solution to a problem, then
- simulation of human intelligence processes by machines, especially computer systems.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Adaptive resonance theory: describes a number of neural network models which use supervised and unsupervised learning methods, and address problems such as pattern recognition and prediction.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- algorithm for supervised learning of binary classifiers.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- computerized system composed of multiple interacting intelligent agents.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Artificial Immune Systems: machine learning systems inspired by theoretical immunology.
- test of a machine's ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
- Logic programming language associated with artificial intelligence and computational linguistics.
- Autonomous entity that learns and uses knowledge to achieve its goals.
Down
- Algorithm for supervised learning of artificial neural networks using gradient descent.
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each other.
- interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- to find a better solution by making incremental changes to it.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- Finite sequence of well-defined computer instructions to solve a computation problem.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Elementary unit of an artificial neural network.
- Biological correspondent of the weights in an artificial neural network.
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- interdisciplinary branch of computer science and engineering. It involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
29 Clues: Elementary unit of an artificial neural network. • algorithm for supervised learning of binary classifiers. • to find a better solution by making incremental changes to it. • Autonomous entity that learns and uses knowledge to achieve its goals. • Biological correspondent of the weights in an artificial neural network. • ...
AI Practical Work 2 2021-12-17
Across
- IBM’s question-answering computer system that is capable of answering questions posed in natural language.
- Algorithm for supervised learning of artificial neural networks using gradient descent.
- Artificial Immune Systems: machine learning systems inspired by theoretical
- Logic programming language associated with artificial intelligence and computational linguistics.
- Computer program developed by DeepMind that uses machine learning (artificial neural networks) to identify the best moves to win the board game “Go”.
- Realistic humanoid robot designed for research, education, and entertainment, and helps promote public discussion about Artificial Intelligence ethics and the future of robotics. Developed by the Hong Kong-based company Hanson Robotics.
- Autonomous entity that learns and uses knowledge to achieve its goals.
- Biological correspondent of the weights in an artificial neural network.
- Finite sequence of well-defined computer instructions to solve a computation
- and unsupervised learning methods, and address problems such as pattern recognition and prediction.
- Local search algorithm that starts with an arbitrary solution to a problem, then
- Java Agent Development Framework: software framework for the development of an intelligent agent, implemented in Java.
- computerized system composed of multiple interacting intelligent agents.
- Branch of mathematics used to model the strategic interaction between different players in a context with predefined rules and outcomes.
- algorithm for supervised learning of binary classifiers.
- interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers.
- simulation of human intelligence processes by machines, especially computer systems.
Down
- Type of machine learning and artificial intelligence that imitates the way humans gain certain types of knowledge.
- Uninformed search algorithm that aims to find a path to the goal node which has the lowest cumulative cost.
- act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution.
- Adaptive resonance theory: describes a number of neural network models which use
- to find a better solution by making incremental changes to it.
- Elementary unit of an artificial neural network.
- test of a machine's ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human.
- Type of artificial intelligence that allows software applications to become more accurate at predicting outcomes without being explicitly programmed to do so.
- Fully connected network with each node connecting to every other node, including itself. The nodes compete against each other by sending out inhibiting signals to each
- Computing systems that are based on a collection of nodes that simulate the neurons in the human brain.
- Restricted Boltzmann Machine: generative stochastic artificial neural network that can learn a probability distribution over its set of inputs.
- interdisciplinary branch of computer science and engineering.
- Learning rule that describes how the neuronal activities influence the connection between neurons.
- involves design, construction, operation, and use of robots and has as its goal to design machines that can help and assist humans.
31 Clues: Elementary unit of an artificial neural network. • algorithm for supervised learning of binary classifiers. • interdisciplinary branch of computer science and engineering. • to find a better solution by making incremental changes to it. • Autonomous entity that learns and uses knowledge to achieve its goals. • ...
Unit 3/4 vocab 2022-11-22
Across
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- The process of luring someone into a relationship by means of a fictional online persona.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- A user on social media who has established credibility in a specific industry.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
Down
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Chapter 3 & 4 Vocabulary Crossword Puzzle 2022-11-04
Across
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- (Search Engine Optimization) The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
Down
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A user on social media who has established credibility in a specific industry.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- The process of luring someone into a relationship by means of a fictional online persona.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Units 3 and 4 Vocabulary: Kasten Ritter 2022-11-04
Across
- A marketing strategy that leverages a business’ employees' networks to increase brand awareness and their branded content's organic reach.
- A user on social media who has established credibility in a specific industry.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos and infographics on one’s social channels.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
Down
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, digital marketing provides two-way communication between businesses and prospective customers.
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The process used to optimize a website's technical configuration, content relevance and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, search engines rank them better.
- is how one’s communication style reflects on their brand. It is important to consider making one’s brand voice distinct to stand out from competitors.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, social media optimization can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- The process of luring someone into a relationship by means of a fictional online persona.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. Good automation tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The specific group of people desired by various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is clicked.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Dreyson Crossword 2025-09-09
Across
- they are are small text files to to gather together your data and store various amount of types of information logins and user settings their purpose is to identify and remember your information.
- It is a system of hardware and infrastructure, like cables and routers, that allows devices around the world to exchange data and information.
- is an electro-mechanical data storage device that stores and retrieves digital data
- a computing device designed to fit on top of a typical office desk.
- are a clam like shape with a flat panel screen on the top part of the inside, with a keyboard at the bottom for your typing
- primary component responsible for executing instructions, performing calculations, and managing most of the computer's functions.
- A computer's short term memory , where the data that the processor is currently using is stored
- an instrument or device used for observing, checking, or keeping a continuous record of a process or quantity.
- the theory and development of computer systems able to perform tasks that normally require a human intelligence
- a mouse, keyboard, or printer, that connect to a computer to provide input, output, or storage
- the practice of pretending on social media to be someone different, in order to trick or attract another person
- used online to get awnsere or pictures
- a quotation from or reference to a book, paper, or author,
Down
- is a computer program that simulates human conversation with an end user.
- the ability to responsibly use digital technologies,and the internet to find,, use, share, and create i google
- is a mobile device that combines traditional mobile technology with more advanced computing abilities.
- A global system of interconnected Networks That links up worldwide
- the responsible, respectful and safe, use of technology in daily life, along with online safety, and privicy
- a combined device for modulation for example, between the digital data of a computer and the analog signal of a phone line
- the digital age, consumers are more connected than ever before through smartphones and apps. With millions of options at their fingertips, standing out in the crowded app marketplace is a constant challenge for developers. How exactly do certain apps like Instagram, Facebook, and Tinder become such a ubiquitous part of everyday life? What is it about their design that keeps users constantly checking and engaging? While features like push notifications and endless scrolling feeds clearly play a role, the retention and addictiveness of consumer apps also stems from more subtle psychological techniques built into their core experience
- programmable electronic device that stores, retrieves, and processes data by following a set of instructions.
- a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
- a compact string of numbers, letters, and symbols that a computer uses to find a resource on a network and act upon it
- is a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
24 Clues: used online to get awnsere or pictures • a quotation from or reference to a book, paper, or author, • A global system of interconnected Networks That links up worldwide • a computing device designed to fit on top of a typical office desk. • is a computer program that simulates human conversation with an end user. • ...
UNIT 3 & 4 VOCAB, COMPOSITION AND MEDIA ANALYSIS 2026-03-30
Across
- The number of times one’s content is displayed, no matter if it was clicked or not.
- The use of social media networks to manage and grow an organization’s message and online presence. As a digital marketing strategy, it can be used to increase awareness of new products and services, connect with customers, and mitigate potential damaging news.
- Any marketing methods conducted through electronic devices which utilize some form of a computer. Unlike other marketing strategies, this strategy provides two-way communication between businesses and prospective customers.
- A business methodology that attracts customers by creating valuable content and experiences tailored to them.
- A user on social media who has established credibility in a specific industry.
- A psychological phenomenon where people assume the actions of others in an attempt to reflect correct behavior for a given situation. In essence, it’s the notion that, since others are doing it, I should be doing it, too.
- The use of electronic communication to harass a person, typically by sending messages of an intimidating or threatening nature.
- This represents how many people looked at one’s post. This information can be used to measure how large one’s audience is since it counts individual users.
- The practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the internet.
- The extent to which consumers are familiar with the distinctive qualities or image of a particular brand of goods or services.
- The process of luring someone into a relationship by means of a fictional online persona.
- A set of tools designed to streamline and simplify some of the most time-consuming responsibilities of the modern marketing and sales roles. These tools help businesses identify their audience, design the right content, and automatically trigger actions based on schedules and customer behavior.
Down
- The process used to advance a website's technical configuration, content relevance, and link popularity so its pages can become easily findable, more relevant and popular towards user search queries, and as a consequence, they are ranked better.
- The specific group of people that various groups (like companies, influencers, politicians, etc.) want to reach with their marketing message.
- An internet advertising model used to drive traffic to websites, in which an advertiser pays a publisher when the ad is selected digitally.
- A person who has subscribed to receive updates from a specific user on a social media platform including Facebook and Twitter.
- A marketing strategy that leverages a business’ staff networks to increase brand awareness and their branded content's organic reach.
- Filtering through all the interesting content across the web and sharing the best news, articles, videos, and infographics on one’s social channels.
- This is how one’s communication style reflects on their brand. It is important to consider making one’s brand style distinct to stand out from competitors.
- This is someone who supports one’s brand on social media. They often offer video testimonials and share them to create peer marketing opportunities to the people, group, or company that they support.
20 Clues: A user on social media who has established credibility in a specific industry. • The number of times one’s content is displayed, no matter if it was clicked or not. • The process of luring someone into a relationship by means of a fictional online persona. • ...
Urban Places 2012-09-13
Across
- an example of a small rural town that has declined due to the growth of a larger regional urban centre
- an international bank situated in world cities
- a community based project to improve the living conditions often hindered by the lack of financial resources
- Non Government Organisations are charity based and assist the poor in improving living conditions
- larger regional urban centres that attract people from surrounding towns due to better facilities such as education, entertainment, employment, medical and retail
- a very large urban agglomeration of at least 8 million in the developing school
Down
- economic activities that are not regulated by labour and taxation laws
- global command and control centres
- a challenge of living in a mega-city
- a flow of capital information goods services and people are measures of the relationship between world cities
10 Clues: global command and control centres • a challenge of living in a mega-city • an international bank situated in world cities • economic activities that are not regulated by labour and taxation laws • a very large urban agglomeration of at least 8 million in the developing school • ...
Swaggiest Crossword.... Be the first to finish and return to Hailee Hinthorne for a prize!! 2014-01-21
Across
- A picture taken of yourself that is planned to be uploaded to Facebook, Myspace or any other sort of social networking website.
- Appearance ,style ,or the way he or she presents them selves.
- You Only Love Oreos
- The vigorously shaking of your Gluteus Maximus
- A stupid thing people put in front of random words for no reason. It is just the pound sign you can find it on social networks like Facebook or Twitter.
Down
- Daughter of Billy Ray CYRUS
- Definitions are too mainstream.
- A person who really sucks at a game but refuses to learn/listen to people who are skilled.
- Europeans and Americans tend to argue over pointlessly till the end of time as to which version of the game is "right". Example: Futbol
- A diva, mostly from urban cities and ghettos, that has reason to believe she is every mans eye candy. Unfortunately, she's wrong.
10 Clues: You Only Love Oreos • Daughter of Billy Ray CYRUS • Definitions are too mainstream. • The vigorously shaking of your Gluteus Maximus • Appearance ,style ,or the way he or she presents them selves. • A person who really sucks at a game but refuses to learn/listen to people who are skilled. • ...
Internet 2021-03-01
Across
- self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks...
- the illegal copying and distribution of copyrighted software, information, music and video files, is widespread...
- software created to damage or alter the computer data or its operations....
- bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details...
- Computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft...
Down
- a program designed to prevent spyware from gaining access to the internal network...
- programs that spread by attaching themselves to executable files or documents...
- malicious programs disguised as innocent-looking files or embedded within legitimate software...
- software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software...
- email fraud to obtain money or valuables...
10 Clues: email fraud to obtain money or valuables... • software created to damage or alter the computer data or its operations.... • programs that spread by attaching themselves to executable files or documents... • a program designed to prevent spyware from gaining access to the internal network... • ...
Computer 2021-03-02
Across
- It is a small, portable personal computer .
- It is a input device used for converting sound waves into electrical energy variations which may then be amplified, transmitted, or recorded.
- It is an electronic device that is used as a display unit for a computer.
- It is a device which converts an electrical audio signal into a corresponding sound.
Down
- Inventor of world wide web
- It is an input device that allows a person to enter letters, numbers, and other symbols.
- It is the main component of the computer, also called the "brain" of the computer.
- It is a device that accepts text and graphic output from a computer and transfers the information to paper
- It is a handheld hardware input device that controls a cursor in a GUI and can move and select text, icons, files, and folders
- It is the global system of interconnected computer networks.
10 Clues: Inventor of world wide web • It is a small, portable personal computer . • It is the global system of interconnected computer networks. • It is an electronic device that is used as a display unit for a computer. • It is the main component of the computer, also called the "brain" of the computer. • ...
Chapter 05 Part 03 2017-05-31
Across
- What is the least likely use of his botnet?
- When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called what?
- What is a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
- What can be used to create a software registration number, sometimes illegally?
- What type of software restricts access to specified websites?
- What is the least likely motive for a DDoS?
Down
- What system does a new federal laboratory use in its high security areas
- What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
- What apps can allow you to lock your mobile device and SIM card remotely
- What terms is used to describe a file a computer creates that records successful and unsuccessful access attempts?
10 Clues: What is the least likely use of his botnet? • What is the least likely motive for a DDoS? • What type of software restricts access to specified websites? • What system does a new federal laboratory use in its high security areas • What apps can allow you to lock your mobile device and SIM card remotely • ...
Information Security Crossword 2017-01-13
Across
- Personal information related to personal data stored on computer systems
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A type of malware that is often disguised as legitimate software.
- Anything that has the potential to cause serious harm to a computer system.
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- You may not divulge this information while you are working for an employer or after you leave.
- A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
Down
- A secret series of characters used to authenticate a person’s identity.
- A flaw or weakness that can be used to attack a system or organization.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A secret series of characters used to authenticate a person’s identity. • A flaw or weakness that can be used to attack a system or organization. • Personal information related to personal data stored on computer systems • ...
Types of Marketing 2021-06-11
Across
- A marketing practice refers to the marketing of products or services to other organisations.
- A marketing strategy of earning money every time you drive a sale.
- A type of SEO technique helps to strengthen the influence and relationship a website has with another website.
- A type of email uses account creation emails, password resets and social media updates for marketing.
Down
- A marketing process of distributing content to your target audience.
- A marketing type used to reach an audience outside their house.
- This marketing method is based on human interaction and the human factor is used as a building trust factor in traditional marketing.
- A Marketing method of engaging with website visitors and converting leads via interactions.
- A Marketing networks with the highest audience engagement rates in social media.
- A form of Internet marketing that involves promotion by increasing their visibility in search results.
10 Clues: A marketing type used to reach an audience outside their house. • A marketing strategy of earning money every time you drive a sale. • A marketing process of distributing content to your target audience. • A Marketing networks with the highest audience engagement rates in social media. • ...
Industrial Revolution 2021-03-26
Across
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- An organization formed by workers to strive for better wages and working conditions
- a policy based on the idea that government should play as small a role as possible i the economy
- Gin A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
Down
- Development of a system which supports machine production of goods
- 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
- An economic system based on private ownership of capital
- Children were viewed as laborers throughout the 19th century.
- An increase in the percentage and in the number of people living in urban settlements.
10 Clues: An economic system based on private ownership of capital • Children were viewed as laborers throughout the 19th century. • Development of a system which supports machine production of goods • An organization formed by workers to strive for better wages and working conditions • ...
The Industrial Revolution By Medha 2021-03-27
Across
- Children were viewed as laborers throughout the 19th century. Many children worked on farms, small businesses, mills and factories.
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
- 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
Down
- Development of a system which supports machine production of goods.
- A belief that ultimate power resides in the people.
- A method of production that brought many workers and machines together into one building
- An increase in the percentage and in the number of people living in urban settlements.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- An economic system based on private ownership of capital
10 Clues: A belief that ultimate power resides in the people. • An economic system based on private ownership of capital • Development of a system which supports machine production of goods. • A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793 • An increase in the percentage and in the number of people living in urban settlements. • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Makayla-Hiring and staffing 2023-09-14
Across
- a form employers use to collection information about you to see if you are a good fit for the position
- the process of actively seeking out, finding and hiring candidates for a specific position or job.
- the ability of a customer to obtain goods or services before payment, based on the trust that payment will be made in the future.
- the process of hiring someone from within your existing business structure to fill a vacant position for your company
Down
- make (a company or organization) smaller by eliminating staff positions.
- When companies recruit candidates who are not a part of the organization
- further the progress of (something, especially a cause, venture, or aim); support or actively encourage.
- a person or organization that employs people
- he means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- Is someone who works for someone or a company/business.
10 Clues: a person or organization that employs people • Is someone who works for someone or a company/business. • make (a company or organization) smaller by eliminating staff positions. • When companies recruit candidates who are not a part of the organization • the process of actively seeking out, finding and hiring candidates for a specific position or job. • ...
Cloud Computing 2024-02-07
Across
- ______Computing is a form of computing in which a single large task is broken into smaller tasks through a distributed system on multiple computer networks.
- Cloud service model offering a development platform with tools and services to build and deploy applications
- Opposite of "downloading" data
- Transforming data into an unreadable format to safeguard it from unauthorized access in the cloud
- Connecting different cloud services and applications from various providers to work together seamlessly
Down
- What type of cloud is designed for the exclusive use of a single organization, not shared with others?
- Having a copy of your data stored in the cloud in case of an outage or disaster
- Open-source cloud platform known for its virtual machines, databases, and AI services
- Open-source software for managing and orchestrating containers in the cloud
- Moving data and applications from on-premises servers to the cloud
10 Clues: Opposite of "downloading" data • Moving data and applications from on-premises servers to the cloud • Open-source software for managing and orchestrating containers in the cloud • Having a copy of your data stored in the cloud in case of an outage or disaster • Open-source cloud platform known for its virtual machines, databases, and AI services • ...
Media-information literacy 2023-03-01
Across
- A specialised device that forwards packets between different network segments based on rules and routing tables
- Various information, data transmitted by means of signals and perceived by a person or a special device.
- A secret combination of numbers, letters, and other characters to gain access to various data or a computer program.
- A device capable of automatically performing a given, variable sequence of operations
- A position in which someone is not in danger of something.
- A method of scientific research by considering individual aspects, properties, components of something.
Down
- A worldwide information computer network that connects both users of computer networks for the exchange of information.
- A broad concept that includes means of communication, ways of transmitting information, as well as the environment they form
- Field of science, studying laws and methods of information processing
- The system of sequential operations for solving the problem.
10 Clues: A position in which someone is not in danger of something. • The system of sequential operations for solving the problem. • Field of science, studying laws and methods of information processing • A device capable of automatically performing a given, variable sequence of operations • ...
ACTIVITY 2023-04-16
Across
- Video __________ is a transmission of synchronized video and audio in real‐time through computer networks in between two or more multipoint (or participants) separated by locations.
- is a free platform to talk about any topic with interactions in the form of comments and feedback.
- communication between you and the multimedia through clicks or commands
- Is the integration of multiple forms of media.
- The central idea on which the work is based on throughout the story, book, or movie.
- are a video and audio program seen and heard all focused on a particular topic or theme through mobile phones, computers, and other portable media instruments.
Down
- Multimedia has this characteristic where you can explore one page to another without having actual pages just like in books.
- Combination of information and entertainment.
- Are attitudes that are treated more like possessions or aspects of the self.
- a non‐linear navigation of jumping for the required information occurred through the created links.
10 Clues: Combination of information and entertainment. • Is the integration of multiple forms of media. • communication between you and the multimedia through clicks or commands • Are attitudes that are treated more like possessions or aspects of the self. • The central idea on which the work is based on throughout the story, book, or movie. • ...
Chapter 1 2023-04-10
Across
- It is the study of computers and computing and their theoretical and practical applications
- It is the color of the visible light spectrum as seen by the human eye
- It is a combination of software, hardware, and communication networks specifically designed to collect useful data for an organization
- Act of disclosing personal information about an individual without his or her consent
- Learn how to optimize your computer workstation to reduce the specific risks of computer vision syndrome, neck and back pain, and carpal tunnel syndrome
Down
- Hacking or intrusion into computer systems for politically or socially motivated purposes
- Hidden collection of Internet sites accessible only by dedicated Web browsers
- Set of commonly agreed-upon principles that govern the use of computers
- Use of a computer by an employee for purposes unrelated to work
- Use of hardware, software, services, and support infrastructure to manage and deliver information using voice, data, and video
10 Clues: Use of a computer by an employee for purposes unrelated to work • It is the color of the visible light spectrum as seen by the human eye • Set of commonly agreed-upon principles that govern the use of computers • Hidden collection of Internet sites accessible only by dedicated Web browsers • ...
Industrial Revolution 2023-05-08
Across
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- Development of a system which supports machine production of goods
- A belief that government can and should achieve justice and equality of opportunity.
- An economic concept that states that the price of a good rises and falls depending on how many people want it
Down
- A belief that limited government insures order competitive markets and personal opportunity.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- A system in which society, usually in the form of the government, owns and controls the means of production.
- A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
- An increase in the percentage and in the number of people living in urban settlements.
- An economic system based on private ownership of capital
10 Clues: An economic system based on private ownership of capital • Development of a system which supports machine production of goods • A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793 • A belief that government can and should achieve justice and equality of opportunity. • ...
LEGAL, ETHICAL AND SOCIETAL ISSUES 2023-03-23
Across
- legal concept that allows the reproduction of copyrighted material for certain purposes without obtaining permission and without paying a fee.
- registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
- means relating to or involving computers or computer networks such as the Internet.
- attempt to obtain sensitive information
- use of electronic communication, typically by sending messages of an intimidating ot threatening nature.
Down
- false and unprivileged statement of fact that is harmful to someone's reputation
- refers to the practice of modifying or altering conputer software and hardware to accomplish a goal
- send each other sexually explicit contents or sexually explicit acts.
- theft the deliberate use of someone else's identity, usually as a method to gain a financial advantage.
- unprivileged false statement of fact which tends to harm the reputation
10 Clues: attempt to obtain sensitive information • send each other sexually explicit contents or sexually explicit acts. • unprivileged false statement of fact which tends to harm the reputation • false and unprivileged statement of fact that is harmful to someone's reputation • means relating to or involving computers or computer networks such as the Internet. • ...
cw 2023-04-01
Across
- The live and operational version of a blockchain network
- A data structure used in blockchain networks to verify the integrity of data
- A digital signature scheme that allows for more efficient and secure signature verification
- The ability of a blockchain network to handle an increasing number of transactions without sacrificing performance or security
- The price per unit of gas that users pay to execute a transaction on the Ethereum network
Down
- A consensus mechanism where validators are authorized to validate transactions based on their reputation and identity
- A practice in DeFi where users earn rewards for providing liquidity to a decentralized exchange or protocol
- The agreement among network participants on the state of the blockchain
- The base protocol of a blockchain network, where all transactions are validated and recorded
- A type of cryptocurrency that emphasizes privacy and anonymity of transactions and user information
10 Clues: The live and operational version of a blockchain network • The agreement among network participants on the state of the blockchain • A data structure used in blockchain networks to verify the integrity of data • The price per unit of gas that users pay to execute a transaction on the Ethereum network • ...
AI and SC - NB 2021-09-24
Across
- The computational units of the hidden layer are known as ________ neurons.
- In ART, a __________ is performed at Layer 2 to determine which node is closest to the input vector.
- McCulloch and Pitts (1943) are generally recognized as the designers of the _______ neural network.
- ___________ is the method of fine-tuning the weights of a neural net based on the error rate obtained in the previous epoch (i.e., iteration).
- A neural net is an artificial representation of the human brain that tries to simulate its ___________ process.
- ____________Algorithms are adaptive heuristic search algorithm based on the evolutionary ideas of natural selection and genetics.
Down
- A is assigned to each solution depending on how close it actually is to solving the problem.
- A __________ network has at least one feed back loop.
- The neural networks are based on the ____________ architecture of biological brains.
- _________ is a collection of models for unsupervised learning and designed to overcome the problem of learning stability.
10 Clues: A __________ network has at least one feed back loop. • The computational units of the hidden layer are known as ________ neurons. • The neural networks are based on the ____________ architecture of biological brains. • A is assigned to each solution depending on how close it actually is to solving the problem. • ...
AI and SC - NB 2021-09-24
Across
- The computational units of the hidden layer are known as ________ neurons.
- In ART, a __________ is performed at Layer 2 to determine which node is closest to the input vector.
- McCulloch and Pitts (1943) are generally recognized as the designers of the _______ neural network.
- ___________ is the method of fine-tuning the weights of a neural net based on the error rate obtained in the previous epoch (i.e., iteration).
- A neural net is an artificial representation of the human brain that tries to simulate its ___________ process.
- ____________Algorithms are adaptive heuristic search algorithm based on the evolutionary ideas of natural selection and genetics.
Down
- A is assigned to each solution depending on how close it actually is to solving the problem.
- A __________ network has at least one feed back loop.
- The neural networks are based on the ____________ architecture of biological brains.
- _________ is a collection of models for unsupervised learning and designed to overcome the problem of learning stability.
10 Clues: A __________ network has at least one feed back loop. • The computational units of the hidden layer are known as ________ neurons. • The neural networks are based on the ____________ architecture of biological brains. • A is assigned to each solution depending on how close it actually is to solving the problem. • ...
WE ARE EVEN ONLINE. 2022-06-06
Across
- Facts provided or learned about something or someone.
- A response that is often provided as an answer or reaction to a blog post or message on a social network.
- It is when your device is connected to the internet.
Down
- Websites and applications that enable users to create and share content or to participate in social networking.
- Content shared on social media through a user's profile.
- Have a particular opinion, belief, or idea about someone or something.
- Someone who has established credibility in a specific industry, has access to a huge audience and can persuade others to act based on their recommendations.
- Represents a user who chooses to see all of another user's posts in their content feed.
- The distribution of web/blog content across social media networks.
- A form of engagement on Facebook. In addition to Likes, reactions include Love, Haha, Wow, Sad, and Angry.
10 Clues: It is when your device is connected to the internet. • Facts provided or learned about something or someone. • Content shared on social media through a user's profile. • The distribution of web/blog content across social media networks. • Have a particular opinion, belief, or idea about someone or something. • ...
WE ARE CHRISTIANS EVEN ONLINE. 2022-06-06
Across
- Websites and applications that enable users to create and share content or to participate in social networking.
- Someone who has established credibility in a specific industry, has access to a huge audience and can persuade others to act based on their recommendations.
- The distribution of web/blog content across social media networks.
- Content shared on social media through a user's profile.
- Facts provided or learned about something or someone.
Down
- A response that is often provided as an answer or reaction to a blog post or message on a social network.
- A form of engagement on Facebook. In addition to Likes, reactions include Love, Haha, Wow, Sad, and Angry.
- It is when your device is connected to the internet.
- Represents a user who chooses to see all of another user's posts in their content feed.
- Have a particular opinion, belief, or idea about someone or something.
10 Clues: It is when your device is connected to the internet. • Facts provided or learned about something or someone. • Content shared on social media through a user's profile. • The distribution of web/blog content across social media networks. • Have a particular opinion, belief, or idea about someone or something. • ...
ICT CONCEPTS 2024-09-29
Across
- REMOTE SERVERS ACCESSED VIA THE INTERNET THAT PROVIDE STORAGE, COMPUTING POWER, AND SERVICES ON DEMAND.
- AN ORGANIZED COLLECTION OF DATA THAT CAN BE EASILY ACCESSED, MANAGED, AND UPDATED.
- A METHOD OF EXCHANGING DIGITAL MESSAGES OVER THE INTERNET, ALLOWING USERS TO SEND AND RECEIVE INFORMATION QUICKLY.
- A GLOBAL NETWORK OF INTERCONNECTED COMPUTERS THAT COMMUNICATE USING STANDARDIZED PROTOCOLS, ENABLING INFORMATION SHARING AND ACCESS TO RESOURCES.
- A GROUP OF INTERCONNECTED DEVICES THAT CAN COMMUNICATE AND SHARE RESOURCES WITH EACH OTHER.
Down
- A COLLECTION OF PROGRAMS AND APPLICATIONS THAT INSTRUCT A COMPUTER ON HOW TO PERFORM SPECIFIC TASKS.
- AN ELECTRONIC DEVICE THAT PROCESSES DATA AND PERFORMS CALCULATIONS ACCORDING TO A SET OF INSTRUCTIONS.
- THE PROCESS OF WRITING INSTRUCTIONS FOR COMPUTERS TO EXECUTE, TYPICALLY USING A SPECIFIC PROGRAMMING LANGUAGE.
- THE PHYSICAL COMPONENTS OF A COMPUTER SYSTEM, INCLUDING THE CPU, MEMORY, STORAGE, AND PERIPHERALS.
- MEASURES AND PROTOCOLS IMPLEMENTED TO PROTECT COMPUTER SYSTEMS, NETWORKS, AND DATA FROM UNAUTHORIZED ACCESS AND ATTACKS.
10 Clues: AN ORGANIZED COLLECTION OF DATA THAT CAN BE EASILY ACCESSED, MANAGED, AND UPDATED. • A GROUP OF INTERCONNECTED DEVICES THAT CAN COMMUNICATE AND SHARE RESOURCES WITH EACH OTHER. • THE PHYSICAL COMPONENTS OF A COMPUTER SYSTEM, INCLUDING THE CPU, MEMORY, STORAGE, AND PERIPHERALS. • ...
Gadgets 2024-04-06
Across
- the part of a radio, television, or computer, or of a piece of electrical equipment for playing recorded sound
- a small piece of equipment that you connect to a computer to store information
- a name for a piece of equipment for charging an electronic device
- a device for storing information in computers or digital cameras
- a watch that has many of the features of a smartphone or a computer
Down
- a piece of equipment that you speak into to make your voice louder
- the set of keys on a computer or typewriter
- an electronic device that deals with communications between two or more computer networks
- a device that records moving pictures and sound and allows these to be broadcast on the internet as they happen
- a small device that you move across a surface in order to move a cursor on your computer screen
10 Clues: the set of keys on a computer or typewriter • a device for storing information in computers or digital cameras • a piece of equipment that you speak into to make your voice louder • a name for a piece of equipment for charging an electronic device • a watch that has many of the features of a smartphone or a computer • ...
Word Wall W4Q3 1st block 2022-02-03
Across
- The _________ at our school, helps represent and deliver news daily.
- After I get my promotion from COO, I will be the _________ of the company.
- The best form of _________ is social media because you can voice your opinion.
- Time of visit, page visited, and time spent on each page is the kind of data that _________ collects; however, it's not free...you can purchase a subscription through Google directly.
- The _________ for the lottery ticket I bought is not worth the risk.
- I am getting my _________ and will be majoring in marketing.
Down
- Amazon uses the ________ model because it only invites reputable businesses to sell its products directly to customers.
- _________ helped get my clothing brand peak above higher selling brands because of how much website traffic it produced.
- Most corporations invest in a(n) _________ because it helps streamline their customer data.
- Companies are finding cheaper suppliers and services by participating in _________ networks, such as Slack, Costco, Sam's Club.
10 Clues: I am getting my _________ and will be majoring in marketing. • The _________ at our school, helps represent and deliver news daily. • The _________ for the lottery ticket I bought is not worth the risk. • After I get my promotion from COO, I will be the _________ of the company. • The best form of _________ is social media because you can voice your opinion. • ...
crossword_software_lvl1 2022-11-14
Across
- the process of creating a set of instructions that tell a computer how to perform a task
- A software that converts an assembly language code to machine code.
- open source front-end development framework for the creation of websites and web apps.
- An organized collection of data stored and accessed electronically.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- A software program that translates computer code written in one programming language into another language.
Down
- A kind of software used to prevent, scan, detect and delete viruses from a computer.
- A software application capable of organizing, storing and analyzing data in tabular form.
- a list set of instructions, used to solve problems or perform tasks, based on the understanding of available alternatives.
- a set of related web pages located under a single domain name, typically produced by a single person or organization.
10 Clues: A software that converts an assembly language code to machine code. • An organized collection of data stored and accessed electronically. • A kind of software used to prevent, scan, detect and delete viruses from a computer. • open source front-end development framework for the creation of websites and web apps. • ...
Artificial Intelligence 2022-11-14
Across
- Companies in power can use AI to spread disinformation about a rival company, to increase the value of their own company.
- A developing field of AI, often used in relation to the justice system, that raises concerns of privacy, ethics, and racial inequalities.
- Access to impactful resources, weapon and security technology, and private information.
- Processing power far above the human mind, completes tasks with greater speed and accuracy.
Down
- A series of coded software instructions to control the operation of AI programs.
- Caused by exploitation of networks and data and could cause loss of information and identity theft.
- A feeling among the general public due to lack of transparency and increasing invasiveness.
- The key issue behind the economic, racial, and technological disparities of AI.
- The process of making these technological advances.
- The moral principal behind the publics concerns with privacy, invasiveness, and the decisions of leading AI developers.
10 Clues: The process of making these technological advances. • The key issue behind the economic, racial, and technological disparities of AI. • A series of coded software instructions to control the operation of AI programs. • Access to impactful resources, weapon and security technology, and private information. • ...
Data Transmission 2022-07-13
Across
- the actual data being carried in a data packet
- a bit (either 0 or 1) added to a byte of data in the most significant bit position; this ensures that the byte follows the correct even parity or odd parity protocol (2 words)
- data that can be sent on one direction only
- the process of making data meaningless using encryption keys; without the correct decryption key the data cannot be decoded
Down
- data that arrives at the destination with the bits no longer synchronised
- a type of encryption key which is only to the single computer/user
- a device that enables data packets to be moved between different networks, for example to join LAN to a WAN
- the time interval allowed to elapse before an acknowledgement is received correctly
- a horizontal and vertical parity check on a block of data being transmitted (2 words)
- a type of encryption key that is known to all users (2 words)
10 Clues: data that can be sent on one direction only • the actual data being carried in a data packet • a type of encryption key that is known to all users (2 words) • a type of encryption key which is only to the single computer/user • data that arrives at the destination with the bits no longer synchronised • ...
ENGLISH EXPERTS CROSSWORD 2022-09-01
Across
- The smallest structural unit of a living organism
- A collection of networks that have one or more functions
- The double-membrane organelles found in most eukaryotic organisms are the
- The largest solid organ and largest gland in the human body
- Groups of cells that have the same function and shape are called
- The type of cell that covers the entire surface of the body
- One of the plant organs that grows from twigs, usually green and mainly functions as a catcher of energy from sunlight for photosynthesis
Down
- Pigments that are owned by various organisms and become one of the molecules that play a major role in photosynthesis are
- Small, dense organelles that are found in cells and act as sites for protein synthesis are called
- Fibers that connect the organs of the body with the central nervous system and between parts of the nervous system with others.
10 Clues: The smallest structural unit of a living organism • A collection of networks that have one or more functions • The largest solid organ and largest gland in the human body • The type of cell that covers the entire surface of the body • Groups of cells that have the same function and shape are called • ...
Halcyon Puzzle 2022-09-16
Across
- Sony’s portable cd player that launched in 1984 which was later named CD Walkman
- You cant have an identity on the web without one
- name of the nightclub in the movie “Hackers” (1995)
- a written statement declaring publicly the intentions, motives, or views of its issuer
Down
- a slang term for hacking into secure telecommunication networks by mimicking specific tones
- a segacast rhythm game devoted to dancing duels against multi-colored screen-faced aliens or robots
- form of fraud in which an attacker masquerades as a reputable entity or person in email or other forms of communication
- first console of gen 6
- American animated series and sitcom that aired on MTV about NY urban life, based on interviews on real people
- subgenre of dance music that originated from 1990’s London with its gritty mix of deep basslines and rhythms influenced by reggae and hip-hop
10 Clues: first console of gen 6 • You cant have an identity on the web without one • name of the nightclub in the movie “Hackers” (1995) • Sony’s portable cd player that launched in 1984 which was later named CD Walkman • a written statement declaring publicly the intentions, motives, or views of its issuer • ...
Form 4 Crossword 2026-02-11
Across
- The deliberate act of using digital platforms to intimidate, harass, or harm someone through electronic communication
- Stealthy malware designed to hide its presence while maintaining unauthorized access to a computer
- Self-replicating malware that spreads independently across networks without needing a host file or user interaction
- A network of compromised computers controlled remotely by cybercriminals to launch coordinated attacks
- Malware that secretly monitors and records user activities, such as keystrokes, to capture sensitive data
- Voice phishing that uses phone calls to impersonate a trusted entity to trick victims
Down
- A type of malware that encrypts a victim's files and demands a payment to restore access
- Creating a false scenario or pretending to be someone else, such as a bank representative, to manipulate a victim
- Luring victims by offering something enticing, like a free download, which often results in malware installation
- A type of malware that replicates by attaching itself to legitimate files or programs
10 Clues: A type of malware that replicates by attaching itself to legitimate files or programs • Voice phishing that uses phone calls to impersonate a trusted entity to trick victims • A type of malware that encrypts a victim's files and demands a payment to restore access • ...
FBLA Competitions Challenge 2025-10-13
Across
- The machinery and equipment developed from the application of scientific knowledge.
- The practice of protecting systems, networks, and data from digital attacks, ensuring the confidentiality, integrity, and availability of information.
- A formal meeting in which an applicant is asked questions to determine their suitability for a particular job.
- The art of effectively delivering information, ideas, or messages to an audience.
- A commercial operation or company.
- The activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large.
Down
- The process of creating, developing, and managing a new business venture with the goal of making a profit.
- The responsibility for and control of a company or organization
- The branch of knowledge concerned with the production, consumption, and transfer of wealth.
- A crucial function in business that involves the collection, tracking, and correction of financial data.
10 Clues: A commercial operation or company. • The responsibility for and control of a company or organization • The art of effectively delivering information, ideas, or messages to an audience. • The machinery and equipment developed from the application of scientific knowledge. • ...
The One Academy Penang Crossword 2015 (About The Library). 2015-03-29
Across
- Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features.
- A computer network consisting of a worldwide network of computer networks that use the tcp/ip network protocols to facilitate data transmission and exchanges.
- An organized body of related information.
- An alphabetical listing of books, categorized each book by title, author and subject.
- Where library check-in and check-out transactions take place.
- Literacy narratives, collectively, which portray imaginary characters or events, specific novels and short stories.
- A daily or weekly periodical printed on inexpensive paper, and distributed, containing news, opinions, advertisements, and other items of general interest.
Down
- A system that organizes books on library shelves in a specific and repeatable order that makes it easy to find any book and return it to its proper places.
- An account of the series of events making up a person's life, and written, composed or produced by another.
- Prose works other than fiction.
10 Clues: Prose works other than fiction. • An organized body of related information. • Where library check-in and check-out transactions take place. • An alphabetical listing of books, categorized each book by title, author and subject. • Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features. • ...
Hardware of the Internet 2023-03-11
Across
- a device that forwards data packets to the appropriate parts of a computer network.
- to copy or move programs or information into a computer's memory, especially from the internet or a larger computer
- A naming system for computers, services, and other resources in the Internet or other Internet Protocol networks.
- a system for connecting electronic equipment such as computers and electronic organizers to the internet without using wires
- a set of rules or procedures for transmitting data between electronic devices
Down
- a piece of computer hardware or software (computer program) that provides functionality for other programs or devices, called "clients."
- a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- the maximum rate of data transfer across a given path
- to copy or move programs or information to a larger computer system or to the internet
- an organization that provides services for accessing, using, managing, or participating in the Internet
10 Clues: the maximum rate of data transfer across a given path • a set of rules or procedures for transmitting data between electronic devices • a device that forwards data packets to the appropriate parts of a computer network. • to copy or move programs or information to a larger computer system or to the internet • ...
SINGERS 2023-04-22
Across
- - Singer who has risen to fame with many songs and recognized as 'Ferxxo'
- - This is a Spanish singer who draws attention for her incredible nails.
- - This is a singer recognized for making millions of people repeat "eeeooo"
- - This is a British singer with one of the best voices, she started uploading videos to the networks and today she is one of the singers with the most Grammys, her song 'SKYFALL' and 'Rolling in the deep' launched her to fame .
- - Incredible salsa singer that made millions of people dance with her group 'Fruko y sus tesos'
Down
- - Famous singer who performed at the Superbowl halftime show.
- - This singer is recognized for being called 'Bichota'
- - This is the man recognized for moonwalking
- -Singer from Barranquilla recognized for her hip movements.
- - This woman is a singer and actress at the same time, recognized for her song 'MAS FUERTE'
10 Clues: - This is the man recognized for moonwalking • - This singer is recognized for being called 'Bichota' • -Singer from Barranquilla recognized for her hip movements. • - Famous singer who performed at the Superbowl halftime show. • - Singer who has risen to fame with many songs and recognized as 'Ferxxo' • ...
Social Media Safety 2023-05-01
Across
- Community [ ]; A list of rules that Social Media sites make for their users, who must follow them to keep the site safe and respectful.
- How old do you have to be to use most social media?
- Identity [ ]; When hackers pretend to be someone else by stealing their private information.
- Digital [ ]; The trail of information we leave behind us when going online.
Down
- Someone who shares others home addresses, full names, and other private information.
- The safest type of account; people who haven’t been friended only have limited access to it.
- Malicious software that may grant hackers access to sensitive data and damage hardware.
- This can be impacted by your digital footprint; you want this to be good!
- Passwords should contain uppercase and lowercase letters, numbers, and at least one special [ ]
- [ ] wifi networks may expose your information to hackers that are on the same network.
10 Clues: How old do you have to be to use most social media? • This can be impacted by your digital footprint; you want this to be good! • Digital [ ]; The trail of information we leave behind us when going online. • Someone who shares others home addresses, full names, and other private information. • ...
