networks Crossword Puzzles
Love (fraud) is in the air 2024-02-06
Across
- Email messages that claim to be from a reputable business or organization and deceives individuals into disclosing private personal information
- The "S" in MISP
- "______" is software that my grant a scammer remote access to a computer and collects personal information from member device without their knowledge
- A favorite sweet treat of choice enjoyed by many during this holiday
- Criminals begin “_________ scams” by romancing unknowing victims-to-be, gaining their trust and making promises of love and new lives together.
- A classic flower that symbolizes love
Down
- The "I" in MISP
- "_____________" is the act of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
- A symbol of Valentine’s day - identified by a baby / angel holding a bow and arrow
- The holiday celebrated on February 14th - "________'s Day"
- These are scam attempts that come via text message
- Valentine’s Day revolves around showing "_____" for those you are close to
- The "M" in MISP
- "________" is when Scammers create a "false" or "shadow copy" of a real website, email or phone number which is indistinguishable from the real thing.
14 Clues: The "I" in MISP • The "S" in MISP • The "M" in MISP • A classic flower that symbolizes love • These are scam attempts that come via text message • The holiday celebrated on February 14th - "________'s Day" • A favorite sweet treat of choice enjoyed by many during this holiday • Valentine’s Day revolves around showing "_____" for those you are close to • ...
Computers 2024-07-09
Across
- duplicating text, data, files, or disks, producing two or more of the same file or segments of data.
- a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- files embedded within online communication channels such as emails, instant messages, or social networks.
- a secret word or phrase that must be used to gain admission to a place.
- occurs when a computer program such as a software application or an operating system stops functioning properly and exits.
- a small device that connects to a computer and allows you to store and copy information.
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
Down
- a computer transferring data and generating a hard copy.
- the process of collecting data from one device and sending it to another device.
- a type of data storage device that is used in laptops and desktop computers
- It converts physical documents into digital files that can be stored, edited, and shared electronically.
- eliminating a file, text, or another object from the computer hard drive or other media.
- make a spare copy of data or a disk.
- load (software) into a computer
14 Clues: load (software) into a computer • make a spare copy of data or a disk. • a computer transferring data and generating a hard copy. • a secret word or phrase that must be used to gain admission to a place. • a type of data storage device that is used in laptops and desktop computers • the process of collecting data from one device and sending it to another device. • ...
Cybersecurity Awareness Month - 2023 2023-10-17
Across
- an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
- one of the biggest ransomware attacks
- an unwanted software designed to throw advertisements up on your screen, most often within a web browser
- a set of changes to a computer program or its supporting data designed to update, fix, or improve
- a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
- is an authentication method that requires the user to provide two or more verification factors to gain access
Down
- a malware that misleads users of its true intent by disguising itself as a standard program
- a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
- designed to detect and destroy computer viruses
- validating the user identity
- will you stop clicking phishing links?
- a self-replicating virus that does not alter files but resides in active memory and duplicates itself
- a type of characters that you should use in your passwords
- harmful software
14 Clues: harmful software • validating the user identity • one of the biggest ransomware attacks • will you stop clicking phishing links? • designed to detect and destroy computer viruses • a type of characters that you should use in your passwords • a malware that misleads users of its true intent by disguising itself as a standard program • ...
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Spies on you, stealing information like passwords and credit card numbers
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- Keeps track of every key you type and sends it to the hacker.
- IF someone is completely _______ they cant be traced.
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
- A group of computers all being controlled by a remote hacker to perform illegal activity.
Down
- Displays ads on your computer. May slow down your computer
- Blocks you from accessing your files until you pay a ransom.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Something used to protect Against Viruses
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
Data 101 Recap 2024-05-30
Across
- Refers to a service that allows data to be stored on remote servers accessed via the internet, providing scalable and flexible storage solutions.
- Information stored and managed within an organisation's own physical infrastructure and servers, rather than on remote servers or in the cloud.
- Information collected from sources outside an organisation.
- Information that is organised in a predefined format, such as databases or spreadsheets, making it easy to search, analyse, and process.
- Something that data can bring to an organisation.
- Information that is generated within an organization.
- Information about other data.
- Information that is accessible to everyone.
Down
- All aspects of online activity, including communication, commerce, entertainment, and information exchange, conducted via digital technologies such as the internet and computer networks.
- Information that is freely available to anyone for use and distribution.
- Network of interconnected devices embedded with sensors, software, and connectivity, enabling them to collect and exchange data for various applications and services.
- Information that is confidential and not intended to be publicly disclosed.
- Information that lacks a predefined format, such as text documents, images, videos, and social media posts, making it more complex to analyse and process.
- Laws or rules enacted by a governing body.
14 Clues: Information about other data. • Laws or rules enacted by a governing body. • Information that is accessible to everyone. • Something that data can bring to an organisation. • Information that is generated within an organization. • Information collected from sources outside an organisation. • Information that is freely available to anyone for use and distribution. • ...
iPay Puzzle 2024-05-17
Across
- Marketing of goods or services by means of telephone calls
- commercial transactions conducted electronically on the internet.
- the digital innovation arm of the Inteltec Group
- an Emirati start-up that aims to revolutionize the e-commerce industry by streamlining middle-mile package transportation across the GCC.
- provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.
- it makes your interconnection easier.
- monthly issue of latest updates within our company
- He does development, implementation of comprehensive core accounting, budgeting, financial reporting, and regulatory compliance
Down
- a GCC leading company in engineering and realization of Telecom Networks and Systems.
- provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.ne Stop Shop For E-Payment Solutions
- Provider of delivery services to ensure packages reach their destination seamlessly.
- Leveraging the support of a family business group, strategically partner with visionary entrepreneurs to craft the next wave of out-of-this-world startups.
- A global conference that covers the latest trends, market disruptors and technologies shaping the digital commerce world
- It's a set of strategies and techniques used to improve the visibility of a website
14 Clues: it makes your interconnection easier. • the digital innovation arm of the Inteltec Group • monthly issue of latest updates within our company • Marketing of goods or services by means of telephone calls • commercial transactions conducted electronically on the internet. • It's a set of strategies and techniques used to improve the visibility of a website • ...
types of crime 2025-12-04
Across
- offences committed by organisations, usually in the pursuit of profit for the company rather than the benefit of individuals.
- theft or intentional damage to things owned by an individual, group or organisation.
- offences which damage the natural world, with resulting harm to humans, other living things and the environment.
- criminal activities carried out by a group of (often young) people, who have a territory and a defined leadership and internal organisation.
- offences which have a clear goal. For example may include theft or burglary.
- involves the use or threat of physical force which will harm the victim.
Down
- non-violent crime committed by middle class people for financial gain.
- offences in which the victim is targeted because of a certain characteristics, related to, for example age, faith, sexuality or race.
- any crime or illegal activity committed on through or using the internet.
- crime involving use of new technologies.
- criminal activities which are planned and carried out by powerful groups.
- offences in which the offender and the victim live in the same family home or are in a relationship.
- offences involving emotions, which are usually unplanned.
- offences which are worldwide, involving international networks.
14 Clues: crime involving use of new technologies. • offences involving emotions, which are usually unplanned. • offences which are worldwide, involving international networks. • non-violent crime committed by middle class people for financial gain. • involves the use or threat of physical force which will harm the victim. • ...
Week 1 Puzzle 2020-08-25
Across
- This is an example of "something you know"--one of the key factors in MFA.
- Approximately $6 trillion is planned on being spent on this by 2021.
- General term for the type of device most often connecting to public WiFi.
- This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
- Globally, one of these attacks every 39 seconds.
- By 2025, there will be an estimated 75 billion of these devices connected to the internet.
- 95% of cybersecurity breaches involve this type of error.
Down
- Any incident that results in unauthorized access to computer data, applications, networks or devices.
- The most dangerous type of WiFi.
- This is an example of "something you are"--one of the key factors of MFA.
- This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
- To increase your personal internet security, consider turning off the "save password" feature in this.
- 93% of these organizations have experienced a data breach within the past 3 years.
- Software that is created specifically to help detect, prevent and remove malicious software.
14 Clues: The most dangerous type of WiFi. • Globally, one of these attacks every 39 seconds. • 95% of cybersecurity breaches involve this type of error. • Approximately $6 trillion is planned on being spent on this by 2021. • This is an example of "something you are"--one of the key factors of MFA. • ...
Digital Literacy-Kavon 2024-06-13
Across
- Blocks you from accessing your files until you pay a ransom.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Spies on you, stealing information like passwords and credit card numbers
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Keeps track of every key you type and sends it to the hacker.
- Something used to protect Against Viruses
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
- Displays ads on your computer. May slow down your computer
- IF someone is completely _______ they cant be traced.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- A group of computers all being controlled by a remote hacker to perform illegal activity.
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Blocks you from accessing your files until you pay a ransom.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Spies on you, stealing information like passwords and credit card numbers
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Keeps track of every key you type and sends it to the hacker.
- Something used to protect Against Viruses
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
- Displays ads on your computer. May slow down your computer
- IF someone is completely _______ they cant be traced.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- A group of computers all being controlled by a remote hacker to perform illegal activity.
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
travel, communication, airplane, news, letter, text message, e-mial, radio, internet,boat,bus, motorcycle. cable car, truck, horse 2024-10-17
Across
- small wheel or roller, specifically the wheel of a gun-carriage.(N)
- message:A brief electronic message sent between mobile phones.(N)
- powered heavier-than-air aircraft with fixed wings.(N)news:New information of interest. (N)
- An open-seated motor-powered vehicle with two wheels.(N)
- A craft used for transportation of goods, fishing, racing, recreational cruising, or military use on or in the water, propelled by oars or outboard motor or inboard motor or by wind. (N)
- written or printed communication, generally longer and more formal than a note.(N)
- motor vehicle for transporting large numbers of peoplealong roads.(N)
- A hoofed mammal, of the genus Equus, often used throughout history for riding and draft work.
Down
- Any set of computer networks that communicate using the Internet Protocol. (N)
- concept or state of exchanging data or informationbetween entities.
- To be on a journey, often for pleasure or business and with luggage; to go from one place to another.(V,N)
- car:A streetcar moved by gripping to rotating loop of cable running along the track.(N)
- technology that allows for the transmission of sound or other signals by modulation of electromagnetic waves.(N)
- spelling of email (N)
14 Clues: spelling of email (N) • An open-seated motor-powered vehicle with two wheels.(N) • message:A brief electronic message sent between mobile phones.(N) • concept or state of exchanging data or informationbetween entities. • small wheel or roller, specifically the wheel of a gun-carriage.(N) • motor vehicle for transporting large numbers of peoplealong roads.(N) • ...
Computing Careers Group Members Name: 2022-05-06
Across
- __________________ create systems to protect information networks and websites from cyber attacks and other security breaches.
- __________________ is considered to be one of the most widely recognized forces affecting work and how it is changing.
- As a ____________________ you are responsible for creating new programs for an organization.
- _________________ are responsible for designing, developing, and testing computer components, such as circuit boards, routers, and memory devices.
- They develop and improve the data resources used to store and retrieve critical information.
- Individuals who watch over a team of programmers and analysts to complete projects.
Down
- ______________ analyze a company's technology needs and oversee the implementation of appropriate data systems.
- _________________assess an organization's computer systems and recommend changes to hardware and software to improve the company.
- which team installs new software, troubleshoots, and repairs software problems
- Which department in an organisation is responsible for the hardware software and network of computers in a company
- __________________design, implement, and maintain networking and data communication systems.
- ____________________ invent technology that solves complex problems in fields like science, medicine, and business.
- They need to be fluent in the computer languages that are used to write the code for programs.
- Communication Skills and broad knowledge of technology and computer systems help computer science individuals excel in this role.
- Who creates Websites
15 Clues: Who creates Websites • which team installs new software, troubleshoots, and repairs software problems • Individuals who watch over a team of programmers and analysts to complete projects. • __________________design, implement, and maintain networking and data communication systems. • ...
CYBERSECURITY - PHISHING 2021-12-01
Across
- phishing emails may contain _____ to Malicious websites
- Email scam or attempt to trick you into giving your password or personal information
Down
- consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
- Someone who seeks and exploits weaknesses in a computer system or computer network.
4 Clues: phishing emails may contain _____ to Malicious websites • Someone who seeks and exploits weaknesses in a computer system or computer network. • Email scam or attempt to trick you into giving your password or personal information • consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
IT Jobs and Responsibilities Vocabulary 2023-05-25
Across
- They may also build software to complete recent activities, perform old ones or send data more effectively and efficiently.
- They can work on operating systems, video games, middleware, commercial applications or network control systems.
- Their goal is to keep hackers out of a company's or organisation's computer system to protect data.
Down
- They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop.
- manage the daily operations of computer networks.
5 Clues: manage the daily operations of computer networks. • Their goal is to keep hackers out of a company's or organisation's computer system to protect data. • They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop. • ...
CS Principles 2022 2022-04-22
Across
- Spotify adds a ___ layer to streamed songs which prevents their subscribers from listening to the songs anywhere besides Spotify apps.
- A baked good. Also something that tracks information about a user visiting a website.
- A __ license is used when an author wants to give other people the right to share, use, and build upon a work that the author has created.
- The bandwidth of a computer network is the maximum amount of ____ that can be sent in a fixed amount of time.
- Gives the creator legal rights to determine whether their work can be copied and under what conditions
- Algorithms with exponential or factorial efficiencies are examples of algorithms that run in a(n) ___ amount of time
- ROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise
- For example, a = b evaluates to ____ if a and b are equal
- A rogue Access Point is a ____ access point that gives unauthorized access to secure networks
Down
- Analog data are values that change ____ , rather than in discrete intervals, over time.
- unscrambling data
- The protocols used in the Internet are ___
- JPG images use a ___ compression technique
- Dynamic routing allows for ____ of the Internet
- wikipedia is an example of ____ because many online users combine their efforts
- A protocol is an agreed upon set of ____ that specify the behavior of a system.
16 Clues: unscrambling data • The protocols used in the Internet are ___ • JPG images use a ___ compression technique • Dynamic routing allows for ____ of the Internet • For example, a = b evaluates to ____ if a and b are equal • ROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise • ...
Revision : Marketing Analytics 2025-01-04
Across
- ________ data is measured as whole numbers: 1, 2, 3, ..
- networks _______ are algorithms that are trained to recognize patterns in data that are non-linear.
- _________ measures the frequency of the specific association rule.
- language processing (NLP) ________ is a branch of artificial intelligence (AI) used to identify patterns by reading and understanding meaning from human language.
- data includes text, images, videos, and sensor data.
- learning _________uses an algorithm to build neural network models that classify or predict target variables.
- Market basket analysis, sometimes referred to by marketers as _________ discovery, uses purchase transaction data to identify associations between products or combinations of products and services that occur together frequently.
Down
- ______ analytics is used to build models based on the past to explain the
- The ________ algorithm is used to calculate frequently co-occurring items in a transaction dataset.
- learning _______ is a statistical method of learning that can be trained without human intervention to understand and identify
- ______ data analysis provides a summary of the main characteristics within the data.
- _________ data is made up of records that are organized in rows and columns.
- between previously established variables.
- _______ data exist when values are selected from a group of categories
- ___________ is a situation where the predictor variables are highly correlated with each other.
- In the _________ layer, the model arrives at a prediction.
16 Clues: between previously established variables. • data includes text, images, videos, and sensor data. • ________ data is measured as whole numbers: 1, 2, 3, .. • In the _________ layer, the model arrives at a prediction. • _________ measures the frequency of the specific association rule. • _______ data exist when values are selected from a group of categories • ...
Myles Osborne AI Cybersecurity Word Search 2025-03-08
Across
- The use of largely automatic equipment in a system of operation or production.
- in Science
- Society: A concept that refers to a society increasingly preoccupied with the future and safety, generating the notion of risk.
- The practice of protecting systems, networks, and programs from digital attacks.
- Intelligence: The simulation of human intelligence processes by machines, especially computer systems.
- Inclination or prejudice for or against one person or group, especially in a way considered to be unfair.
- The state of not being equal, especially in status, rights, and opportunities.
- The belief that every problem has a solution, especially technological solutions to societal issues.
- The process by which individuals become more concerned with their own lives and identities rather than traditional societal roles.
Down
- The fact or condition of being accountable; responsibility.
- The quality of being done in an open way without secrets.
- Reliance on the integrity, strength, ability, or surety of a person or thing; confidence.
- The ability to recognize forces of socialization and alter one's place in the social structure.
- in Science
- A rule or directive made and maintained by an authority.
- The process by which businesses or other organizations develop international influence or start operating on an international scale.
- Moral principles that govern a person's behavior or the conducting of an activity.
17 Clues: in Science • in Science • A rule or directive made and maintained by an authority. • The quality of being done in an open way without secrets. • The fact or condition of being accountable; responsibility. • The use of largely automatic equipment in a system of operation or production. • ...
Introduction to Internet 2013-10-06
Across
- a technology which allows to interact via two way video and audio transmission simultaneously .
- a unique address of every page on internet.
- An online process that involves instant text messaging between two or more users.
- A link that allows the user to visit websites without typing new address.
- A new development in the field of Internet which allows the user to access information without the use of a telephone line.
- Microsoft Internet Explorer and Google Chrome are examples of a software called.
- a company that provides individuals and other companies to access the internet.
- a language used to create web pages .
Down
- A network of networks
- another name for `online shopping` which is a new concept of purchasing goods sitting at home.
- is an example of transferring large amounts of data across the internet.
- The first network that came into existence.
- A collection of computers that are linked together.
- The first page of particular website displayed by the web browser.
- an electronic device which converts analog signals to digital signals and vice/versa.
- A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
- A collection of one or more related web pages linked with one another to form a global web of information.
- A method of communication in which one can accept, forward, delivers and stores messages digitally.
18 Clues: A network of networks • a language used to create web pages . • The first network that came into existence. • a unique address of every page on internet. • A collection of computers that are linked together. • The first page of particular website displayed by the web browser. • is an example of transferring large amounts of data across the internet. • ...
Introduction to Internet 2013-10-06
Across
- a company that provides individuals and other companies to access the internet.
- A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
- another name for `online shopping` which is a new concept of purchasing goods sitting at home.
- is an example of transferring large amounts of data across the internet.
- An online process that involves instant text messaging between two or more users.
- A collection of computers that are linked together.
- The first page of particular website displayed by the web browser.
- A method of communication in which one can accept, forward, delivers and stores messages digitally.
- a language used to create web pages .
Down
- a technology which allows to interact via two way video and audio transmission simultaneously .
- Microsoft Internet Explorer and Google Chrome are examples of a software called.
- A new development in the field of Internet which allows the user to access information without the use of a telephone line.
- A link that allows the user to visit websites without typing new address.
- A collection of one or more related web pages linked with one another to form a global web of information.
- The first network that came into existence.
- A network of networks
- an electronic device which converts analog signals to digital signals and vice/versa.
- a unique address of every page on internet.
18 Clues: A network of networks • a language used to create web pages . • The first network that came into existence. • a unique address of every page on internet. • A collection of computers that are linked together. • The first page of particular website displayed by the web browser. • is an example of transferring large amounts of data across the internet. • ...
Assignment 6 - Activities 2016-02-21
Across
- a hypertext document connected to the World Wide Web; 2 words
- type of communication where both sender and receiver are active at same time
- using neutral rather than subjective language; 2 words
- computer or program that manages access to a centralized resource in a network
- companies that sell connection to the internet; abbreviated
- a group of information on a computer that can be software programs or data
- the exclusive legal right, given to an originator to print, publish, film, etc. and to authorize others to do the same
- use of a computer to gain unauthorized access to data in a system
Down
- an auxiliary memory to store data from which high-speed retrieval is possible
- a related group of networked computers
- used to view web pages and navigate between them via hyperlinks; 2 words
- the Internet is primarily this type of communication system
- files that can be embedded in web pages and displayed by a browser
- legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights' holders; 2 words
- a system or program that allows the user to edit text; 2 words
- person successfully masquerades as another by falsifying data
- the main technology for local area networks such as connecting all computers in a lab or building
- the codes or tags that browsers use to create web pages
18 Clues: a related group of networked computers • using neutral rather than subjective language; 2 words • the codes or tags that browsers use to create web pages • the Internet is primarily this type of communication system • companies that sell connection to the internet; abbreviated • a hypertext document connected to the World Wide Web; 2 words • ...
easy 2024-04-04
Across
- a type of network where anyone can connect without authentication, often found in cafes, airports, etc.
- Method of protecting your accounts with more than one form of authentication.
- A scam where attackers impersonate someone from within the organization to trick employees into sending money or sensitive information.
- A method of encrypting data during transmission over a network, often used in public networks to enhance security.
Down
- Technique used to erase visible data from the screen to prevent unauthorized access.
5 Clues: Method of protecting your accounts with more than one form of authentication. • Technique used to erase visible data from the screen to prevent unauthorized access. • a type of network where anyone can connect without authentication, often found in cafes, airports, etc. • ...
Bruin AI Crossword Puzzle Week 10 2023-12-04
Across
- The mental process of acquiring knowledge and understanding through thought, experience, and the senses.
- Principles of right and wrong governing the conduct of individuals and organizations, particularly important in AI and technology
- The inclination or prejudice for or against something, often influencing decision-making and algorithms.
Down
- A supervised learning algorithm used in training artificial neural networks.
- The process of making something as effective or functional as possible, often used in the context of algorithms and models.
5 Clues: A supervised learning algorithm used in training artificial neural networks. • The mental process of acquiring knowledge and understanding through thought, experience, and the senses. • The inclination or prejudice for or against something, often influencing decision-making and algorithms. • ...
Chapter 5- SALTING 2022-09-10
Across
- It is the process of translating a random phrase into a code
- It is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- It is the act of entering as many passwords or passphrases as possible until eventually is guessing your password correctly
Down
- It is a string of characters used to verify the identity of a user during the authentication process
- It is adding on purpose more characters
5 Clues: It is adding on purpose more characters • It is the process of translating a random phrase into a code • It is a string of characters used to verify the identity of a user during the authentication process • It is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks • ...
Cybersecurity Fundamentals Chapter 8 2022-11-08
Across
- US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- poorly enforced security policies, no awareness of security
- the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- open source linux security distribution.
- disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- a method of testing the areas of weakness in systems by using various malicious techniques.
- includes the users who access the organization's information system.
Down
- assess computer, computer systems, networks, or applications for weakness.
- a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- laws prohibit undesired behaviors.
- intercept and log network traffic
- provides free analysis and warning service to internet users and organizations.
- help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.
14 Clues: intercept and log network traffic • laws prohibit undesired behaviors. • open source linux security distribution. • poorly enforced security policies, no awareness of security • includes the users who access the organization's information system. • assess computer, computer systems, networks, or applications for weakness. • ...
Show How Much You Know About Social Engineering 2025-09-04
Across
- Cybercriminals use social engineering to get users to share confidential information or download this.
- A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
- A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
- The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
- The highest defense rating for passwords is "____"
- A single compromised password can put your organization's security and personal information at ____.
- This is a common way cyber villains get into computer networks.
Down
- This password level uses simple passwords and the same password for every account.
- The password defense rating for a "Level 1: Beginner" is "____".
- An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
- The name of the character that uses "convince" and "impersonate" attacks.
- The human firewall manifesto recommends using this for every account.
- Cybercriminals rely on being able to convince users to click on these.
- The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.
14 Clues: The highest defense rating for passwords is "____" • This is a common way cyber villains get into computer networks. • The password defense rating for a "Level 1: Beginner" is "____". • The human firewall manifesto recommends using this for every account. • Cybercriminals rely on being able to convince users to click on these. • ...
ICT terminology 2013-09-03
Across
- world wide web
- Uniform resource locator. A ______ is the address of a specific Web site or file on the Internet
- Web browser is the program people use to access the World Wide Web
- media _______ is a collection of Internet-based communities
- Short for Wireless Fidelity.
- an Internet _________ acts as a marker for a Web site.
- ____________ can locate relevant Web sites when users enter search terms or phrases
- The _________ is the primary user interface of a computer
- an avatar specifically refers to a character that represents an online user.
- the _______ spreads across the globe and consists of countless networks and computers, allowing millions of people to share information
Down
- address it is another word for url
- The mouse cursor is most often an arrow that you can use to point to different objects on your screen
- The term ________ is often used synonymously with "computer screen" or "display
- Originating from the name of Hormel's canned meat, now also refers to junk e-mail or irrelevant postings
- A smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages
- Short for Web Log
- the group of letters you have to type in before you can log into a website.
- Information communication technology. ICT refers to technologies that provide access to information through telecommunications
18 Clues: world wide web • Short for Web Log • Short for Wireless Fidelity. • address it is another word for url • an Internet _________ acts as a marker for a Web site. • The _________ is the primary user interface of a computer • media _______ is a collection of Internet-based communities • Web browser is the program people use to access the World Wide Web • ...
INQUSITIVE 2020-11-01
Across
- a printed circuit board containing the principal components of a computer or other device.
- This was invented in Germany around 1440 by Johannes Gutenberg.
- The _________ is the movement that happens as a result of the INPUT.
- This is a magnet made by an electric current. It usually has an iron core.
- Is a common type of network cable used with wired networks
- The first ever programming language developed.
- Technical word for 'stretching' liquid aluminium.
- A programming error that causes a program to behave in an unexpected way.
Down
- First mobile robot capable of reasoning about it's surrounding.
- The branch of technology that deals with the design, construction, operation, and application of robots.
- A program on a computer that tells it how to communicate with an add-on piece of equipment
- A wheel used for pulling or raising a weight
- use of computer programs to create 2D or 3D graphical representations of the real product.
- A circuit in which all parts are connected end to end to provide a single path of current.
- This was first discovered in the 1930s with the first operational plant coming in the 1950s.
- Thomas Edison is credited with designing this in 1879.
- Pivot point around which a lever turns
- The generic word for an application, document, control panel, or other computer data.
18 Clues: Pivot point around which a lever turns • A wheel used for pulling or raising a weight • The first ever programming language developed. • Technical word for 'stretching' liquid aluminium. • Thomas Edison is credited with designing this in 1879. • Is a common type of network cable used with wired networks • ...
legal terms - general 2022-05-05
Across
- power networks
- an annual plan by Congress to spend more than it collects in tax revenues
- the total of all prior spending by all Congresses in the past that spent in excess of revenues
- what political leaders who want the Supreme Court to only follow a strict and historically narrow interpretation of the Constitution and the powers of the judiciary prefer
- powers given to Congress to have individuals give evidence
- the leaders of Congress who have the duty of connecting the House and Senate leaders to the regular members
- members of Congress are expected to work for their party affiliation
- votes by Congress to allow the old budget to continue before the new one is voted upon
Down
- what happens when a president refuses to sign a bill during the last 9 days of a Congressional session
- Senate de-facto leader
- members of Congress expected to serve the needs of their constituents
- amendments attached to bills that do not pertain to the main goal of the bill
- Congress’ main method of controlling the power of the bureaucratic agencies
- removing a federal official from office
- a leader awaiting their replacement
- rules that are usually applied in floor debates to make the system move a little quicker
- members of Congress trying to be both representatives and policymakers
- when a president uses powers like executive orders, the “Bully-Pulpit”, and “war-making”
18 Clues: power networks • Senate de-facto leader • a leader awaiting their replacement • removing a federal official from office • powers given to Congress to have individuals give evidence • members of Congress are expected to work for their party affiliation • members of Congress expected to serve the needs of their constituents • ...
Tyson S. 2024-01-09
Across
- data about data
- An agreed-upon set of rules that specify the behavior of some system
- representing information using only two options
- an ordered collection of elements
- any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- a written description of how a command or piece of code works or was developed.
- a named reference to a value that can be used repeatedly throughout a program.
- an ordered sequence of characters
- representing information using ten options.
- maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
Down
- the practice of obtaining input or information from a large number of people via the Internet
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- Value a data type that is either true or false
- an individual value in a list that is assigned a unique index
- the process of accessing each item in a list one at a time.
- 8 bits
- data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
18 Clues: 8 bits • data about data • an ordered collection of elements • an ordered sequence of characters • representing information using ten options. • Value a data type that is either true or false • representing information using only two options • the process of accessing each item in a list one at a time. • an individual value in a list that is assigned a unique index • ...
CROSSWORD INTEGRATION on ICT 2024-09-29
Across
- This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
- It refers to the physical components of a computerthat you can touch and see
- These devices display or output data from a computer
- This software helps manage a company's interactions with current and potential customers
- This is harmful software designed to damage or disrupt systems
- It involves organizing and maintaining data processes efficiently
- This type of software helps users perform specific tasks like writing or calculating
- This is a set of instructions that tells a computer how to perform tasks
- It involves protecting computers and networks from unauthorized access or attacks
- It integrates core business processes into a single system
Down
- This allows users to store and access data over the internet instead of local hardware
- These devices allow users to enter data into a computer
- It manages the hardware and software resources of a computer system
- This is a security system that controls the incoming and outgoing network traffic
- It refers to the unauthorized access or manipulation of computer systems
- It secures access to systems or information using a secret combination of characters
- This includes all technologies used to handle telecommunications, broadcasting, and information systems
- It involves encoding information so that only authorized parties can understand it
18 Clues: These devices display or output data from a computer • These devices allow users to enter data into a computer • It integrates core business processes into a single system • This is harmful software designed to damage or disrupt systems • It involves organizing and maintaining data processes efficiently • ...
Tech Puzzle Showdown 2025-04-11
Across
- Most commonly used tool for automating web browsers
- A meeting held at the end of a sprint to discuss what went well, what didn't, and how to improve.
- High Level Web Framework that encourages rapid development and clean, pragmatic design
- World's leading customer relationship management (CRM) platform
- A signal that temporarily halts the CPU to handle events.
- A mechanism where one class acquires the properties and behaviors of another class
- A cloud-based data warehousing platform
- Practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage
- A tool for API testing
Down
- An architectural style that structures an application as a collection of loosely coupled services
- A decentralized digital ledger that securely records, stores, and verifies data across a network of computers
- Open-source operating system that is widely used for its stability, security, and flexibility
- A measure of the amount of work a team can complete in a single sprint
- The oldest high-level programming language that is still in use today
- Programming language that is known for its use in data analysis and machine learning
- A game engine for developing 2D and 3D games.
- Open-source and NoSQL database designed for handling large volumes of data
- A command line interface and programming language that lets users interact with a computer's operating system
18 Clues: A tool for API testing • A cloud-based data warehousing platform • A game engine for developing 2D and 3D games. • Most commonly used tool for automating web browsers • A signal that temporarily halts the CPU to handle events. • World's leading customer relationship management (CRM) platform • The oldest high-level programming language that is still in use today • ...
AWS Services All 2025-05-08
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources
- A managed distributed streaming platform often compared to Apache Kafka.
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka. • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
11.5 Vocab 2023-03-30
Across
- Allows devices to connect in a PAN
- The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
- used with the WPA and WPA2 wireless security standards
- a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
- increases bandwidth by using multiple antennas for both the transmitter and receiver
- developed by Cisco to address security concerns in RADIUS
- a key component of windows active directory
- a standard for local area networks created by IEEE-SA
Down
- a network that requires no authentication to connect to and is used in public
- introducd in 2018, and update to WPA2
- an open standard protocol used to authenticate users onto a network
- A communication method used on cards with a range of 2 inches
- the most commonly used access method
- introduced in 2004, a wireless security service
- an enhancement to MIMO that allows multiple users to use the same channel
- Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
- uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
18 Clues: Allows devices to connect in a PAN • the most commonly used access method • introducd in 2018, and update to WPA2 • a key component of windows active directory • introduced in 2004, a wireless security service • a standard for local area networks created by IEEE-SA • used with the WPA and WPA2 wireless security standards • ...
test 2023-09-12
Across
- Equivalent ot EU Data Protection Bill in India
- These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
- A digital form of social engineering to deceive individuals into providing sensitive information
- The process of transforming plaintext into ciphertext
- Old way of breaking phone
- Computer Malicious Program
- attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
- in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
- secure online service that allows users to connect remotely to another network
- spyware software that records every keystroke made on a computer’s keyboard
- security framework that controls access to computer resources, enforces policies, and audits usage
- algorithms to create convincing fake videos or audio recordings
- Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
- type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
- type of attack which uses a fraudulent server with a relay address
- model that forms the basis for the development of security systems
- A capability to limit network traffic between networks and/or information systems
18 Clues: Old way of breaking phone • Computer Malicious Program • Equivalent ot EU Data Protection Bill in India • The process of transforming plaintext into ciphertext • algorithms to create convincing fake videos or audio recordings • type of attack which uses a fraudulent server with a relay address • model that forms the basis for the development of security systems • ...
AWS Services 2025-04-15
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces.
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data.
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources.
- A managed distributed streaming platform often compared to Apache Kafka
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
cyber security 2017-06-30
3 Clues: malicious code • spreads through the inbox and makes a copy of itself • practical networks to send copies of the original code to other computers
Internet 2021-06-06
Across
- is also a wide area network (known as_____), WAN
- as the networks grow larger it is then creating a massive connection we called,
Down
- is defined simply as communication at a distance (Merriam-Webster).
- network, is a pool of computer devices (hardware) that are programmed (software) to connect and communicate to each other to share information.
4 Clues: is also a wide area network (known as_____), WAN • is defined simply as communication at a distance (Merriam-Webster). • as the networks grow larger it is then creating a massive connection we called, • network, is a pool of computer devices (hardware) that are programmed (software) to connect and communicate to each other to share information.
Unit 5 2022-05-10
Across
- Cyber bullies often write ... comments in social networks.
- Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
- Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
- Julia and Weronika are good friends. They always ... for each other.
- Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.
5 Clues: Cyber bullies often write ... comments in social networks. • Julia and Weronika are good friends. They always ... for each other. • Nikita fell in love with Lena. He wants to organize a ... dinner for her. • Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen. • ...
Unit 5 2022-05-10
Across
- Cyber bullies often write ... comments in social networks.
- Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
- Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
- Julia and Weronika are good friends. They always ... for each other.
- Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.
5 Clues: Cyber bullies often write ... comments in social networks. • Julia and Weronika are good friends. They always ... for each other. • Nikita fell in love with Lena. He wants to organize a ... dinner for her. • Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen. • ...
Networking concept puzzle 2025-06-07
Across
- Area Network This kind of network connects more computers located at distinct places.
- It is a device that connects two different types of networks with each other.
- Card It Is used to physically attach a computer to a network.
Down
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
5 Clues: Card It Is used to physically attach a computer to a network. • It is a device that connects two different types of networks with each other. • Area Network This kind of network connects more computers located at distinct places. • It is a network device that is used to connect all the computers in a network with each other. • ...
Entrepreneurship crosswordpuzzle 2020-09-23
Across
- it is a combination of two companies into one larger company.
- strategy, a process that can allow an organisation to concentrate its resources on the optimal opportunities.
- display of information about the product on its container, packaging or the product.
- it helpps thousands of individuals to be their own boss and own operate their own business.
- a brand or a part of a brand that is given legal protection against its use by another firms.
- a corporate action in which a company buys most if not all of the target company's ownership stakes in order to assume control of the target firm
- symbol of product/ services of the company.
Down
- business making use of social networks to communicate with customers is called.
- the combined value of the merging firm exceeds the individual value of the merged firms.
- its is a delberate , planned and sustained effort to establish and maintain mutual understanding between an organisation and stakeholders.
- most important element of marketting mix.
- 4th element of marketing mix and refers to all activities undertaken to make the product known to the customer.
12 Clues: most important element of marketting mix. • symbol of product/ services of the company. • it is a combination of two companies into one larger company. • business making use of social networks to communicate with customers is called. • display of information about the product on its container, packaging or the product. • ...
krizaljka_sp 2021-05-16
Across
- VECTOR PROTOCOL Protocol that determines the best path based on information about how far the packet destination is.
- Protocol establishes a connection between computers before sending data
- Protocols used to exchange information about networks between autonomous systems.
- Protocols used to determine the best routes to a destination within the same autonomous system.
- Type of OSPF packet that contains a list of neighbors of the router sending the packet
- Examples of IGP protocol
Down
- PROTOCOLS Protocols that do not send a network mask when exchanging information between routers.
- possibility of upgrading, ie how many routers can be in the network without disturbing the required convergence time
- STATUS PROTOCOL Protocol that works in such a way that each router knows the network topology and does not send the entire routing table, but all routers send only information about the state of connections in the form of small LSA (Link State Advertisement) packets.
- Protocol sends data directly to a specific computer without checking whether the system is ready to receive or not
- The layer is responsible for reliable data transfer between devices
- Example is the EEA protocol.
12 Clues: Examples of IGP protocol • Example is the EEA protocol. • The layer is responsible for reliable data transfer between devices • Protocol establishes a connection between computers before sending data • Protocols used to exchange information about networks between autonomous systems. • ...
Industrial Revolution 2023-05-10
Across
- An economic concept that states that the price of a good rises and falls depending on how many people want it
- An increase in the percentage and in the number of people living in urban settlements.
- A system in which society, usually in the form of the government, owns and controls the means of production.
- Development of a system which supports machine production of goods
- Individuals who start new businesses, introduce new products and improve management techniques
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
Down
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- A belief that ultimate power resides in the people.
- An economic system based on private ownership of capital
- A belief that limited government insures order competitive markets and personal opportunity.
- A belief that the government can and should achieve justice and equality of opportunity.
12 Clues: A belief that ultimate power resides in the people. • An economic system based on private ownership of capital • Development of a system which supports machine production of goods • A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793 • An increase in the percentage and in the number of people living in urban settlements. • ...
lesson 30 2015-05-15
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Deciphers the information in an SSL Certificate.
- Encrypts the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- A malicious program that records keystrokes.
- Hackers using spyware to control your browser
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Security feature used for larger networks that controls computers from one point.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
Cybersecurity Vocab 2021-12-09
Across
- any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
- an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
- a general term for when a perpetrator positions himself in a conversation between a user and an application
- tries to find two inputs producing the same hash value
- consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- if we change a character of the plaintext, then several characters of the ciphertext should change
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
- a method in cryptography by which cryptographic keys are exchanged between two parties
- a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
- the art or process of deciphering coded messages without being told the key.
12 Clues: tries to find two inputs producing the same hash value • the art or process of deciphering coded messages without being told the key. • a method in cryptography by which cryptographic keys are exchanged between two parties • the attacker has access to pairs of known plaintexts and their corresponding ciphertexts. • ...
Keywords 2022-05-11
Across
- a computer network security system that restricts internet traffic in, out, or within a private network
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Network computer, computer program, or device that processes requests from a client
- The part of a network that handles the major traffic.
- the transmission of a file from one computer system to another, usually larger computer system
- A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- a computer-based application for the exchange of messages between users
Down
- Any computer hardware or software device that requests access to a service provided by a server.
- A physical or virtual appliance that passes information between two or more packet-switched computer networks
- the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
- the overall time something takes to complete.
- electronic devices used to store data,
12 Clues: electronic devices used to store data, • the overall time something takes to complete. • The part of a network that handles the major traffic. • a computer-based application for the exchange of messages between users • Network computer, computer program, or device that processes requests from a client • ...
Datawarehousing and Data Mining CA 3- Crossword Puzzle 2024-04-16
Across
- DM functionality that provides a concise and succinct summarization of the given collection of data
- ___________________ databases store image, audio, and video data.
- A spatial database that stores spatial objects that change with time is called a database
- Data pre-processing step in KDD in which Data relevant to the analysis task are retrieved from the database
- Data pre-processing step in which multiple data sources may be combined
- Data pre-processing step to remove noise and inconsistent data
Down
- Geographical Maps can be represented in _________ format, where roads, bridges, buildings, and lakes are represented as unions or overlays of basic geometric constructs, such as points,lines, polygons, and the partitions and networks formed by these components.
- DM functionality of comparison of the target class with one or a set of comparative classes
- database typically stores relational data that include time-related attributes
- ______________ analysis describes and models regularities or trends for objects whose behavior changes over time.
- _____________ database stores sequences of ordered events, with or without a concrete notion of time.
- Data objects that do not comply with the general behavior or model of the data.
12 Clues: Data pre-processing step to remove noise and inconsistent data • ___________________ databases store image, audio, and video data. • Data pre-processing step in which multiple data sources may be combined • database typically stores relational data that include time-related attributes • ...
Recruitment Procedures and External Validity 2024-10-20
Across
- What process involves inviting eligible participants to be part of a research study
- What term refers to the extent to which study results can be generalized to the broader population
- What is a major threat to external validity, where results apply only to the study sample
- What is an important factor to consider in maintaining external validity during recruitment
- Which concept involves making sure that results are generalizable to real-world scenarios
- Which recruitment strategy involves using existing networks of participants to enroll others
Down
- Which term refers to ensuring participants give informed agreement to take part in the study
- What term is used for the group of people who are asked to participate in a study
- What is a key element in recruitment to avoid underrepresentation of certain groups
- What process ensures that the sample is representative of the broader population being studied
- What term describes the selection of participants based on criteria relevant to the research question
- What term is used to describe the accuracy of inferences made from a study about other settings or groups
12 Clues: What term is used for the group of people who are asked to participate in a study • What is a key element in recruitment to avoid underrepresentation of certain groups • What process involves inviting eligible participants to be part of a research study • What is a major threat to external validity, where results apply only to the study sample • ...
Browsing Safely 2025-05-30
Across
- It refers to the act of stealing and misusing someone's personal information
- Set of programs that disrupts the normal functioning of a computer
- It is the use of illegal methods to get money or other things that belong to a bank or its costumers
- It is the process of befriending children on social media to facilitate online
- Act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation
- An act of harming or harassing using information technology in a deliberate manner
Down
- It is a collection of technologies,processes and practices designed to protect networks,computers,programs and data from attack,damage or unauthorised access
- It refers to an illegal entry into a computer system or network
- A software that prevents unauthorised access
- A program used to remove viruses
- Any criminal activity intended to harm anyone using a computer or an internet connection
- The receiver of a message is fooled into believing that the message received by him is from a trusted source
12 Clues: A program used to remove viruses • A software that prevents unauthorised access • It refers to an illegal entry into a computer system or network • Set of programs that disrupts the normal functioning of a computer • It refers to the act of stealing and misusing someone's personal information • ...
AWS Services 2025-04-07
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data.
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources.
- A managed distributed streaming platform often compared to Apache Kafka.
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka. • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
LCaravelli-Network Devices 2023-01-04
Across
- security should be top of mind when the technician recommends and installs this type of system
- a method for powering devices that do not have a battery or access to a power outlet
- does not allow packets to enter the target system without first being analyzed
- commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility
- a generic name for an all in one network appliance
- a device in the cloud that allows network administrators to manage network devices
- Every device on a network has a unique media access control ___ address
- receives data from one port and sends it to all other ports
Down
- its main purpose is to regenerating weak signals
- typically responsible for monitoring all you end devices on your network
- networking systems that are no longer supported but are still in operation in today’s networks
- a more common term for power over ethernet
- uses various techniques for determining what is and what is not permitted in a network segment
- provides the physical connection to the network at the PC or other end device
- passively monitors traffic on the network
- switches come with additional features that the network administrator can configure to improve the network
- bridges and hubs are now considered legacy devices because of the benefits and low cost of ________
- introduced to divide LANs into segments
18 Clues: introduced to divide LANs into segments • passively monitors traffic on the network • a more common term for power over ethernet • its main purpose is to regenerating weak signals • a generic name for an all in one network appliance • receives data from one port and sends it to all other ports • Every device on a network has a unique media access control ___ address • ...
Is DIS Your Handle? 2024-01-18
Across
- Joint Intelligence Command provide ______, relevant, and timely intelligence for early warning and decision-making for the SAF’s operations.
- Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders.
- Alongside our soldiers, sailors and airmen, are the _____ of the new frontier.
Down
- The DIS will defend and dominate in the digital domain. As part of an _____ SAF, the DIS will enhance Singapore’s security, from peace to war.
- The symbols of DIS comprises of our crest, logo and _____.
- Is DIS Your Handle?
- WHAT WE DO. The DIS defends the SAF’s digital domain, from cyber incident response and threat hunting, to electronic protection of our networks and _____, to digital threats to our servicemen’s psychological defence.
7 Clues: Is DIS Your Handle? • The symbols of DIS comprises of our crest, logo and _____. • Alongside our soldiers, sailors and airmen, are the _____ of the new frontier. • Who are we? We are historians, electrical engineers, psychologists, computer _____, communicators, and leaders. • ...
Geography crossword puzzle 2022-07-04
Across
- What is a physical area on the Earth’ surface called?
- What is the movement of people from rural to urban areas called?
- What is the area of the earth’s surface that holds special meaning for people?
- What job opportunities are called?
- What is a physical area on the earth’s surface called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment that has not been affected by people?
- Refers to our surroundings and can either be physical or human.
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- Refers to surface runoff that results from melting snow.
- What are the disadvantages of going to a city called?
- What is the increase in the proportion of people living in urban areas called?
- What is poor air quality affecting half the world’s urban population called?
- Consist of living and non-living things that are found naturally.
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is a built up area called?
- What is the number of people living in a unit area of land called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
22 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • Refers to surface runoff that results from melting snow. • ...
Geography crossword puzzle 2022-07-04
Across
- What is a physical area on the Earth’ surface called?
- What is the movement of people from rural to urban areas called?
- What is the area of the earth’s surface that holds special meaning for people?
- What job opportunities are called?
- What is a physical area on the earth’s surface called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment that has not been affected by people?
- Refers to our surroundings and can either be physical or human.
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- Refers to surface runoff that results from melting snow.
- What are the disadvantages of going to a city called?
- What is the increase in the proportion of people living in urban areas called?
- What is poor air quality affecting half the world’s urban population called?
- Consist of living and non-living things that are found naturally.
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is a built up area called?
- What is the number of people living in a unit area of land called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
22 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • Refers to surface runoff that results from melting snow. • ...
Geography crossword puzzle 2022-07-04
Across
- What is a physical area on the Earth’ surface called?
- What is the movement of people from rural to urban areas called?
- What is the area of the earth’s surface that holds special meaning for people?
- What job opportunities are called?
- What is a physical area on the earth’s surface called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment that has not been affected by people?
- Refers to our surroundings and can either be physical or human.
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- Refers to surface runoff that results from melting snow.
- What are the disadvantages of going to a city called?
- What is the increase in the proportion of people living in urban areas called?
- What is poor air quality affecting half the world’s urban population called?
- Consist of living and non-living things that are found naturally.
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is a built up area called?
- What is the number of people living in a unit area of land called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
22 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • Refers to surface runoff that results from melting snow. • ...
Geography crossword puzzle 2022-07-04
Across
- What is the environment that has not been affected by people?
- What is the increase in the proportion of people living in urban areas called?
- What is the area of the earth’s surface that holds special meaning for people?
- What is an area with dense transport networks and densely packed buildings called
- What are the disadvantages of going to a city called?
- Refers to surface runoff that results from melting snow.
- Refers to our surroundings and can either be physical or human.
- What is the pollution caused by an increase in LED usage?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
- What is a built up area called?
- What job opportunities are called?
- What are the advantages of going to a city called?
Down
- What is a physical area on the earth’s surface called?
- What is poor air quality affecting half the world’s urban population called?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment where people live on farms and villages called?
- Consist of living and non-living things that are found naturally.
- What is the number of people living in a unit area of land called?
- What is the movement of people from rural to urban areas called?
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
- What is a physical area on the Earth’ surface called?
22 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • Refers to surface runoff that results from melting snow. • ...
Science - Ethan Dao 2017-03-30
Across
- a compound of hydrogen and carbon
- substance that can be broken down by bacteria
- is a process of reacting monomer molecules together in a chemical reaction to form polymer chains or three-dimensional networks
- substance that increases the reaction
- The separation of a substance into simpler substances or basic elements.
- the quality or state of being physically strong.
- one atom or compound will steal electrons from another atom or compound
- a molecule that can be bonded to other identical molecules to form a polymer.
- the relative amount of a particular substance contained within a solution or mixture or in a particular volume of space
- theory theory stating the particles involved in a chemical reaction
Down
- the speed at which a chemical reaction proceeds.
- its a chemical reaction in which an acid and a base react quantitatively with each other
- make (a liquid) thinner or weaker by adding water or another solvent to it.
- the combination of components or elements to form a connected whole.
- a substance which has a molecular structure built up chiefly
- a reaction that involves energy
- is an ion that exists in the same form on both the reactant and product sides of a chemical reaction
- the action or process of precipitating a substance from a solution.
- is one that completely ionizes (dissociates) in a solution (provided there is sufficient solvent).
- acid A concentrated acid is an acid solution with a high molar concentration of hydrogen ions
20 Clues: a reaction that involves energy • a compound of hydrogen and carbon • substance that increases the reaction • substance that can be broken down by bacteria • the speed at which a chemical reaction proceeds. • the quality or state of being physically strong. • a substance which has a molecular structure built up chiefly • ...
Media and Information Literacy 2020-01-08
Across
- collect and edit reports of articles about current events for information
- it is the World Wide Web that allows one to easily and instantaneously access types of information
- a weekly publication of opinion and news from the 3 regions of northern Luzon and Central Luzon
- collections of various facts
- these are used in looking for a great deal of information
- it is mostly used by students for research and it refers to a group of articles
- also known as community media
- it covers a large variety of topics
Down
- cover a large variety of articles and images of up-to-date information
- it's just focusing on a distinct field of study
- it reaches a large audience through written, spoken or broadcast communication
- its composed of collection of articles that may also provide short summaries and it is cited in newspaper, journals, etc
- it sends information and messages and also sends visual images through channels
- it is composed of millions of networks that are connected by networking technologies
- it is defined as the knowledge that is unique to a given culture or society
- refers to an organized collection of records items found in the library
- it is a newspaper and an online news website that covering the 3 regions of Northern Luzon
- a weekly newspaper created only for the people of Baguio City
- place where different kinds of books found
- it refers to sending sounds signal from transmitter through the air as radio waves
20 Clues: collections of various facts • also known as community media • it covers a large variety of topics • place where different kinds of books found • it's just focusing on a distinct field of study • these are used in looking for a great deal of information • a weekly newspaper created only for the people of Baguio City • ...
Technology vocabulary 2021-03-16
Across
- something reduced in volume to its full volume
- transfer a file or program to a smaller computer
- strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
- publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
- a worldwide network of computer networks
- decompress
- science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
- a short line of text that a web site puts on your computer's hard drive when you access the web site
- crime committed using a computer and the internet
- set up for a particular purpose
Down
- a facial expression represented by a sequence of characters
- an organized body of related information
- the symbolic arrangement of data in a computer program
- (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
- a listing of the computer files stored in memory
- the activity of converting data or information into code
- transfer out of a database or document
- (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
- the exclusive right to sell a work
- put into a format that can be read or processed by computers
- storage a data storage device that is not the main memory of a computer
- locate and correct errors in a computer program
22 Clues: decompress • set up for a particular purpose • the exclusive right to sell a work • an organized body of related information • a worldwide network of computer networks • transfer out of a database or document • something reduced in volume to its full volume • locate and correct errors in a computer program • crime committed using a computer and the internet • ...
Chaper 17 Vocab 2021-10-28
Across
- _____ energy is released during nuclear fission/fusion
- Liquid mixture of hydrocarbons
- a nuclear reaction where a heavy nucleus splits spontaneously and releases energy
- deposit of loose sand or partially consolidated sandstone containing petroleum
- nuclear reaction in which atomic nuclei of low atomic number fuse to form a heavier nucleus
- Acid ____ refers to the overflow of acidic water from metal or coal mines
- Chemicals obtained from petroleum and natural gas
- Mining where layers of surface soil and rock are removed to expose a resource
- Energy produced by the flow and interaction of electrons
- Energy source that is readily available or can be replaced easily
- The energy that an object has because of its position/shape
Down
- radioactive _____ material made from the use or reprocessing of nuclear fuel
- Burning the chemical reaction when a fuel combines rapidly with oxygen
- fine grained sedimentary rock from which oil can be extracted
- The energy produced by motion
- Energy ____ is when you reduce the amount of energy consumption by using less energy
- Energy that CANNOT be replaced easily/in a short period of time
- Type of mining where vertical shafts are dug deep into the ground and networks of tunnels are dug
- How much of the energy put into a system actually does useful work
- formal term of a severe nuclear reactor accident that results in cor damage from overheating
- The ability to do work and/or cause a change
21 Clues: The energy produced by motion • Liquid mixture of hydrocarbons • The ability to do work and/or cause a change • Chemicals obtained from petroleum and natural gas • _____ energy is released during nuclear fission/fusion • Energy produced by the flow and interaction of electrons • The energy that an object has because of its position/shape • ...
Spelling Bee, Week 27 2023-04-07
Across
- extremely unpleasant.
- situated in the west, or directed toward or facing the west.
- the surroundings or conditions in which a person, animal, or plant lives or operates.
- an object or flat figure in an elongated rectangle or oval shape.
- a state in the western United States
- a view or opinion that is incorrect because based on faulty thinking or understanding.
- preoccupy or fill the mind of (someone) continually, intrusively, and to a troubling extent.
- reasoning conducted or assessed according to strict principles of validity.
- done or occurring again several times in the same way.
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a greenish-blue color.
- no longer produced or used; out of date.
- act or course of action to which a person is morally or legally bound; a duty or commitment.
- easily perceived or understood; clear, self-evident, or apparent.
- block (an opening, path, road, etc.); be or get in the way of.
- a means of solving a problem or dealing with a difficult situation.
- more than one; several.
- an instrument or device for measuring the magnitude, amount, or contents of something, typically with a visual display of such information.
- an upright pillar, typically cylindrical and made of stone or concrete, supporting an entablature, arch, or other structure or standing alone as a monument.
- the action of delivering letters, packages, or ordered goods.
20 Clues: extremely unpleasant. • a greenish-blue color. • more than one; several. • a state in the western United States • no longer produced or used; out of date. • done or occurring again several times in the same way. • situated in the west, or directed toward or facing the west. • the action of delivering letters, packages, or ordered goods. • ...
Terms from Chapter 2 2013-09-20
Across
- Browser used on both computers and mobile devices
- Informational website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order
- Symbols used in online communications that express emotion
- The code of acceptable behaviors users should follow while on the Internet
- The transmission of messages via a computer network
- Each electronic document on the web; can contain text, graphics, audio, and video
- Capability of accessing media content while it downloads
- Software that enables users with an Internet connection to access and view webpages on computers or mobile devices
- An Internet café that provides computers with Internet access, usually for a fee
- A website that offers a variety of Internet services from a single, convenient location
- A collaborative website that allows users to create, add to, modify, or delete the content via their browser
- Google's browser
Down
- Links to preferred websites
- A real-time typed conversation that takes place on a computer or mobile device with many other online users
- A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals
- A business transaction that occurs over an electronic network such as the Internet
- A collection of related webpages, which are stored on a web server
- Visual representation of nontext information such as a drawing, chart, or photo
- Mozilla Corporation's browser
- A worldwide collection of electronic documents
20 Clues: Google's browser • Links to preferred websites • Mozilla Corporation's browser • A worldwide collection of electronic documents • Browser used on both computers and mobile devices • The transmission of messages via a computer network • Capability of accessing media content while it downloads • Symbols used in online communications that express emotion • ...
Library Media Words - Volume 1 2014-04-16
Across
- something (as a picture, chart, or film) that appeals to the sight
- a means of communication and source of information
- a person or a publication that supplies information
- a system for sending messages between computers
- relating to or connected to a computer or telecommunications system (as the Internet)
- a set of sheets of paper bound together
- use as sources of information
- published at regular intervals, such as weekly, monthly
- topics that are too broad, less specific
- a place that provides information or ideas to everyone in many material formats such as books, magazines, etc.
- raw information or facts about something that can be used in calculating, reasoning, or planning
Down
- a popular search engine and free apps service
- the sending, receiving, or reproducing of sound
- a programmable usually electronic machine that can store, get back again, and work with data
- topics that are more specific
- supply secondhand information
- a communications system that connects computers and computer networks all over the world
- a history of a person's life
- data which has been recorded, classified, organized, related, or interpreted within a framework so that meaning emerges
- something told or written that is not fact or a made-up story
- literature or cinema that is not fictional
- a digital book
- the application of information or something learned
- not made or coming from something else or firsthand
- characterized by electronic and computerized technology
25 Clues: a digital book • a history of a person's life • topics that are more specific • supply secondhand information • use as sources of information • a set of sheets of paper bound together • topics that are too broad, less specific • literature or cinema that is not fictional • a popular search engine and free apps service • the sending, receiving, or reproducing of sound • ...
Programming 2015-01-21
Across
- Code which contains numbers like 1's and 0's.
- A list of instructions that tell a computer what to do.
- Movie that has to do with hacking and black coated people.
- Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
- Built the .net framework.
- American Standard Code for Information Interchange.
- A process that leads from an original formulation of a computing problem to executable computer programs.
- World Wide Web
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
- Software framework developed by Microsoft that runs primarily on Microsoft Windows.
Down
- The person's first name who made this crossword.
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
- A notation resembling a simplified programming language, used in program design.
- A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
- A type of software that allows you to perform specific tasks.
- Console that has access to the internet.
- The programs and other operating information used by a computer.
- IDE and RAD tool written in wxWidgets.
- A quantity or amount.
20 Clues: World Wide Web • A quantity or amount. • Built the .net framework. • IDE and RAD tool written in wxWidgets. • Console that has access to the internet. • Code which contains numbers like 1's and 0's. • The person's first name who made this crossword. • American Standard Code for Information Interchange. • A list of instructions that tell a computer what to do. • ...
Cyber safty dona 2016-06-08
Across
- Service Provider (ISP)
- unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.
- copy a file from one of your computer system to another via the Internet (usually your computer or a mobile phone, it can also be dangerous sometimes . )
- unwanted messages which may contain threats
- and blogs
- computing
- scam that involves sending a fraudulent e-mail soliciting credit card, social security, or other personal information from an unsuspecting user.
- generic term for any company that can connect you directly to the Internet.
- even families and acquaintances
- on the Internet threatening or implying violent behavior, displaying suicidal tendencies
- fights where scornful and offensive messages are posted on websites ,
- spam
Down
- virus
- excluding someone from an online group
- viruses are maliciously-designed programs that infect computers by hiding themselves inside normal, harmless programs.
- to channel surfing on a television, Internet one involves users browsing around various websites following whatever interests them.
- that some people that will hack in really easily and will Steal thing.
- into someone's email or other online accounting and sending messages that will cause embarrassments
- internet-related illegal activity.
- when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.
- is a virus also a worm which spreads by .
- number tracking feature of Internet browsers that shows all the recent websites visited.
22 Clues: spam • virus • and blogs • computing • Service Provider (ISP) • even families and acquaintances • internet-related illegal activity. • excluding someone from an online group • is a virus also a worm which spreads by . • unwanted messages which may contain threats • fights where scornful and offensive messages are posted on websites , • ...
DIGI CIT Vocab Words 2016-05-27
Across
- usaully news or something that can be seen by others on internet
- the taking of copyrighted material and selling it for profit
- to have a change to do something
- Not the right thing to do
- changing something copyrighted especially music to add value
- Giant game where people play with/agaisnt eachother
- anybody can use w/o any punishment
- putting some out in the world that is yours
- is digitized content that can be transmitted over the internet or computer networks.
- be in a state where you can be hurt
- Pictures, illustrations, symbols
- a short message text or pic
- a thing that will take your money and value
- when you use copyrighted material you must change it in a way and this is called ______
- directly coping someone else's work
- to chart something
Down
- never giving in and keeping a level head
- something that has some sort of risk/reward
- where someone can see another's web page, but doesn't comment
- peer to peer, network that allows sharing
- a plan that is somewhat sketchy
- a slightly changed sence and used for comedy
- someone who says a comment that helps you
- a compression using like or as
- give others inspiration and help their self-essteem
- define how copyright is used
- a generalization about another person
- an audio file of which you listen to
- some who you can bestow trust on
- unsuspected problem or danger
30 Clues: to chart something • Not the right thing to do • a short message text or pic • define how copyright is used • unsuspected problem or danger • a compression using like or as • a plan that is somewhat sketchy • to have a change to do something • some who you can bestow trust on • Pictures, illustrations, symbols • anybody can use w/o any punishment • ...
HEMTECH 2017 Crossword 2017-05-07
Across
- / Measure of explosive power
- / inventor of AK - 47
- / '.TMP' extension refers usually to what kind of file?
- / a network whose elements may be separated by some distance, It usually involves two or more small networks and dedicated high-speed telephone lines
- / a non metal that remains liquid at room temperature
- / The fluid property, due to which, mercury does not wet the glass is
- / Reading of a barometer going down is an indication of
- / India's first satellite Aryabhatta was launched by
- / Standard explosive used for determining F of I
- / Anti tank missile developed by DRDO
- / Most Famous Secondary explosive
- / Made from a variety of materials, it inhibits the flow of current
- / The speed of your net access is defined in terms of
- / Ship launched prithvi variant missile
- / How many bits is a byte
Down
- / Gas used as disinfectant in drinking water
- / A given signal's second harmonic is twice the given signal's __________ frequency
- / Company where vulcanised rubber was invented
- / Knot is a unit of speed of
- / Optic fibres are mainly used for
- / Who invented the railway engine
- / He discovered the law of floating bodies
- / Rifle used by Indian Army
- / Mode is which Computers calculate numbers
- / 52 cal. Artillery gun developed by DRDO
- / The letter D in "DOS" stand for
- / unit for measuring the amplitude of a sound
- / Wood is the main raw material for the manufacture of
28 Clues: / inventor of AK - 47 • / How many bits is a byte • / Rifle used by Indian Army • / Knot is a unit of speed of • / Measure of explosive power • / Who invented the railway engine • / The letter D in "DOS" stand for • / Most Famous Secondary explosive • / Optic fibres are mainly used for • / Anti tank missile developed by DRDO • / Ship launched prithvi variant missile • ...
CIS 228 Review Terms Crossword Puzzle 2018-03-07
Across
- Elected on OSPF multiaccess networks to manage LSA flooding.
- Allows ports to transition from blocking to forwarding immediately.
- Switch ports closest to the root bridge in terms of overall cost to the root bridge.
- IEEE link aggregation standard.
- A dynamic interior routing protocol based on the DUAL algorithm.
- Defines how quickly the routers in the network topology share routing information and reach a state of consistent knowledge.
- A Cisco-proprietary protocol that aids in the automatic creation of EtherChannel links.
- Designed by Cisco to allow for gateway redundancy without any additional configuration on end devices.
- Prevents information from being sent out the same interface from which it was received.
- Also called OSPF area 0.
- Type of adjacency between DR and non-DR router.
Down
- Occurs when there are so many broadcast frames caught in a Layer 2 loop that all available bandwidth is consumed.
- An OSPF configuration that requires a hierarchical network design and contains multiple areas.
- Can cause an issue that may create EIGRP routing problems.
- A protocol used to discover neighbors, form adjacencies, and monitor the state of a neighbor.
- The default VTP domain name.
- The area of a network that is impacted when a critical device or network service experiences problems.
- Reduces administration of VLANs in a switched network.
- A dynamic interior routing protocol based on the SPF algorithm.
- Aggregates multiple switched links together to load balance over redundant paths between two devices.
20 Clues: Also called OSPF area 0. • The default VTP domain name. • IEEE link aggregation standard. • Type of adjacency between DR and non-DR router. • Reduces administration of VLANs in a switched network. • Can cause an issue that may create EIGRP routing problems. • Elected on OSPF multiaccess networks to manage LSA flooding. • ...
computer application technology 2018-09-04
Across
- it infect the computer
- it manipulates data
- generates control signals that direct the operation of memory and the datapath
- physical component of computer
- is used for observing,checking or keeping a continuous record of something
- spreedsheet developed by microsoft
- the brain of a computer
- fraudulent practice of sending emails
- a computer device
- operate a computer or typewriter
- it defines different structures in a database
- personal area network
- short last name or street name
- monetary
- paste images
- tool used to manipulate data in the database
- electronic device
- to put information on it and use it later
Down
- the programs and operating information
- a type of browser
- display either a list of values that is retrieved from a table or query
- local area network
- text or combination of text and numbers stored as text
- a computer program with a graphical user interface for displaying HTML files, used to navigate the World Wide Web.
- long blocks of text
- all the components of computer attached to it
- to move or position cursor
- external devices such as keyboards, mice, disks, and networks that provide input to the processor
- global computer network
- a collection of interrelated data
- facts and statistics collected together for reference or analysis
- liquid crystal display
- hypertext markup language
- africa an african country
- a contraction of malicious software
- holds instructions and most of the data for currently executing programs
36 Clues: monetary • paste images • a type of browser • a computer device • electronic device • local area network • it manipulates data • long blocks of text • personal area network • it infect the computer • liquid crystal display • the brain of a computer • global computer network • hypertext markup language • africa an african country • to move or position cursor • physical component of computer • ...
United States Review 2018-12-06
Across
- Perfect climate for citrus fruits
- The NE had towns built specifically for this resource
- These bring in blizzards into a very populated part of the US
- Because of our post industrial economy most jobs are
- The SW is famous for this resource, it is what made Houston and Dallas big cities
- Cold weather forest
- The NW is famous for this industry
- The Rust Belt is known for this
- The tech industry is in the norther part of this state
- The vast lowlands in the interior of the continental United States
- The US has a ______________ capitalist economy
- Country that colonized the Eastern Seaboard
- The United States has a vast amount of these, it made us an economic powerhouse
- The NE part of the country is famous for this delicious resource
- The dairy land of America is in this region
Down
- Roads, canals, airports, railroads, and electronic networks
- From this highest point, rivers flow east or west
- Wherever you had major ports or railroad stops these popped up
- These are the highest peaks in the United States
- The government of the United States is a mix of democracy and this
- The way people from the South Pacific made it to the Americas
- The land/ice bridge the nomads crossed to get here
- The import to the New World that had the biggest effect on the native population
- These winds move weather across our continent
24 Clues: Cold weather forest • The Rust Belt is known for this • Perfect climate for citrus fruits • The NW is famous for this industry • Country that colonized the Eastern Seaboard • The dairy land of America is in this region • These winds move weather across our continent • The US has a ______________ capitalist economy • These are the highest peaks in the United States • ...
ICT chapter 3 & 4 Crossword 2021-12-01
Across
- Hardware device which have a number of devices or computer connected to them
- A type of disc which holds around 4.7GB and is non-volatile
- , Devices that store data in the form of magnetised dots
- , Devices that save data as pattern of dots which can be read by light
- Systems not very far away from each other geographically
- A type of disc which holds around 800MB of data and is non-volatile
- ‘Modulator demodulator’ is a device that converts a computer's digital signal into analogue signal
- , Files stored in a sequence which has to be searched through one by one
Down
- Gives the location of a device on the internet
- A short range wireless data transfer
- A serial access medium used for magnetic recordings
- Devices that connect a LAN to another LAN
- , Type of storage that ensures data is stored permanently so it can be used again at a later date
- Enable data packets to be routed between the different networks
- Receives information from a network via it's connection
- , Files which do not need to be searched through one by one
- A small device that connects to a computer and stores data
- A unique number that identifies a device connected to the internet
- A replacement of DVDs which hold 25-50GB
- They connect a number of devices or computers together to form a LAN but more efficient than hubs
20 Clues: A short range wireless data transfer • A replacement of DVDs which hold 25-50GB • Devices that connect a LAN to another LAN • Gives the location of a device on the internet • A serial access medium used for magnetic recordings • Receives information from a network via it's connection • , Devices that store data in the form of magnetised dots • ...
Grant M period 1 2024-02-06
Across
- The device that is used to display images, text, video,
- an online cloud storage service from Microsoft
- Used to connect computers with electronic devices such as smartphones, printers, scanners, and keyboards.
- A animated picture that is most commonly used in text
- from a computer to a remote device or to the internet
- Text files with pieces of data
- is what comes between the @ in your email address
- Refers to the physical elements of a computer
- A worldwide network that links computer networks
- Is storage which allows you to create and store files online
- a computer file format for the storage of digital images.
Down
- another word for internet.
- a wireless networking technology
- the address of a web page
- a type of image file that is used on the internet.
- a collection of instructions, programs, and data that tell a computer how to perform specific tasks.
- To send data to a file or program.
- wirless that can connect to speakers, phones, ETC
- To move or copy data
- a file format that provides an electronic image
- To bring data into a file or program
- suite A collection of commonly used softwar
- An page that will transfer you to another page if you click on it
- The search bar at the top of the screen is called
- is the primary place to display and organize apps on a screen.
25 Clues: To move or copy data • the address of a web page • another word for internet. • Text files with pieces of data • a wireless networking technology • To send data to a file or program. • To bring data into a file or program • suite A collection of commonly used softwar • Refers to the physical elements of a computer • an online cloud storage service from Microsoft • ...
The Internet 2024-01-19
Across
- address,number assigned to every device
- interconnected digital environment
- search bar
- needed to unlock access
- messaging others
- the exchange of information and ideas among people
- information that has been translated
- easy to go computer
- need this to have internet
- to lookup something
- internet gets people to...
- Apple device
- keep up with your snap score
- World Wide Web, WWW...
- cloud, backup your data in the...
- Computer networks
- Media, an outlet where you post for all to see
- internet mail
- when you are not online
- the computer program
- the internet
- needed to get into something
- used to reach the internet
- The number one search engine
- the boomer social media
- on the go
Down
- downloadable things on your phone
- where you go to see what is happening
- when you are not offline you are...
- a computer company
- hit that SUBSCRIBE button!
- a person's name
- a type of search engine
- the scary part of the internet
- website, starts with WWW and ends with .com
- A type of email, also sounds like a chocolate milk
- biggest online shopping site
- intended to take your information
- social media where you share your posts
- humans
- harming someone on the internet
- camera on computers
- the bird app
- another word for phone
- not login but...
- a type of search engine
- the earth
- place you go to look up
- messages
- hit this and it brings you to a website
50 Clues: humans • messages • the earth • on the go • search bar • Apple device • the bird app • the internet • internet mail • a person's name • messaging others • not login but... • Computer networks • a computer company • easy to go computer • to lookup something • camera on computers • the computer program • World Wide Web, WWW... • another word for phone • needed to unlock access • a type of search engine • ...
Cardiovascular System - Abigail Granado 2024-03-22
Across
- Disease resulting from reduced blood flow from the heart
- Carries blood from the body to the R atrium
- surgical opening
- Narrowing;Tightening
- Test Procedure that tests how efficiently the heart pumps blood
- Procedure to stop atrial or ventricular fibrillation
- Pulse
- A surgical procedure in which plaque is removed from the lining of an artery
- Prevent the back flow of blood between chambers between R atrium and ventricle
- Narrowing of the coronary arteries, resulting in a insufficient blood supply to the heart
- instrument to measure pressure
- Procedure in which controlled electrical shocks are sent through the heart to restore normal cardiac rhythm
- Inflammation of the inner larger of the heart muscle
- condition in which the atria beat more rapidly than the ventricles, causing quivering movement
- Networks of small vessels that perfuse tissue
Down
- Pumps blood through the system
- Mass of solid, liquid or gas that travels through the blood stream
- A radiograph test that uses a contrast agent and a camera to take pictures of the blood flow in arteries
- Reads your hearts electrical impulses
- Raid spontaneous contractions of the muscle fibers in the atria or ventricles
- A fibroserous sac that encloses the heart
- Chest
- Abnormal heartbeats that disrupt the regular ventricular rhythm of the heart
- Tissue death in the heart muscle resulting from an obstructed artery
- Localized balloon like dilation of a blood vessel usually an artery
- Vessels that deliver blood to tissues
26 Clues: Pulse • Chest • surgical opening • Narrowing;Tightening • Pumps blood through the system • instrument to measure pressure • Reads your hearts electrical impulses • Vessels that deliver blood to tissues • A fibroserous sac that encloses the heart • Carries blood from the body to the R atrium • Networks of small vessels that perfuse tissue • ...
Tech Terms 2024-04-11
Across
- A small application with limited functionality
- Time delay in a system
- Not physically existing but made to appear so by software
- The discovery and communication of meaningful patterns in data
- The programs and other operating information used by a computer
- A unit of information equal to one sextillion bytes
- A device that forwards data packets
- A set of rules governing the exchange of data
- A unit of information equal to one trillion bytes
- A unit of information equal to one billion bytes
- A point of interaction between components
- A step-by-step procedure for calculations
- A group of interconnected computers
- An area of control or a sphere of knowledge
- The core of an operating system
- A hardware or software component that stores data
- A high-level programming language
- Relating to the smallest possible unit of any physical property
Down
- The practice of protecting systems and networks from digital attacks
- A standard for the short-range wireless interconnection
- A unit of information equal to one septillion bytes
- A network security system
- Software with source code that anyone can inspect
- The process of converting information into code
- The address of a web page
- Data transmission capacity, measured in bits
- A reference in a document to another section or page
- Software designed to disrupt or damage a computer system
- A markup language for documents containing structured information
- A structured set of data held in a computer
30 Clues: Time delay in a system • A network security system • The address of a web page • The core of an operating system • A high-level programming language • A device that forwards data packets • A group of interconnected computers • A point of interaction between components • A step-by-step procedure for calculations • An area of control or a sphere of knowledge • ...
DC9111 2024-08-09
Across
- A framework used to manage and mitigate cybersecurity risks.
- A cybersecurity tool used to monitor, detect, and respond to threats.
- - The process of converting data into a code to prevent unauthorized access.
- The practice of finding and fixing security flaws.
- A common online attack method involving fraudulent emails.
- A network security device that monitors and filters incoming and outgoing traffic.
- An open-source intelligence gathering technique.
- A term for ethically hacking a system.
- An organized event where hackers test their skills.
- The art of disguising communication within another medium.
- A type of malware that demands payment for the return of stolen data.
- The practice of attacking a system to test its security.
- A person who finds and reports security vulnerabilities for rewards.
- A malicious program that spreads across systems and networks.
- A type of attack where multiple systems flood a target with traffic.
Down
- The exploitation of software vulnerabilities by malicious hackers.
- The unauthorized access of data in transit.
- A cryptographic key used in public key cryptography.
- A protocol used for secure internet communication.
- The process of analyzing network traffic for malicious activity.
- An organization that sets standards for securing information systems.
- A type of attack that overwhelms a system with traffic.
- A hidden malicious software that provides backdoor access.
- A form of social engineering to manipulate users into giving up confidential information.
- A global, decentralized group known for hacktivism.
- A popular TV series about a hacker with dissociative identity disorder.
26 Clues: A term for ethically hacking a system. • The unauthorized access of data in transit. • An open-source intelligence gathering technique. • The practice of finding and fixing security flaws. • A protocol used for secure internet communication. • An organized event where hackers test their skills. • A global, decentralized group known for hacktivism. • ...
Tech01 2025-02-05
Across
- - A feed format for delivering regularly updated content.
- - A document format that preserves layout and fonts.
- - The top-level directory in a file system.
- - A browser feature allowing multiple web pages at once.
- - A pre-designed layout for creating documents quickly.
- - A data unit equal to about one trillion bytes.
- - Input method using spoken commands.
- - A fast storage device with no moving parts.
- - A measure of a computer processor’s speed.
- - A data structure following the “last in, first out” rule.
- - The core of an operating system.
- - A short number code for secure authentication.
- - Short for configuration, settings that adjust software behavior.
- - The process of finding and fixing code errors.
- - A logic system with only true or false values.
Down
- - Automated instructions executed by programs.
- - Temporary storage to speed up processes.
- - Software programmed into hardware devices.
- - A unique address identifying devices on the internet.
- - A small update fixing bugs or vulnerabilities.
- - A sequence of executable commands within a program.
- - Organizes data into rows and columns.
- - Firmware that starts up your computer.
- - Something that exists digitally, not physically.
- - A temporary connection between a user and a service.
- - A node that connects different networks.
- - A layout system for organizing digital content.
- - A display technology known for deep blacks and vivid colors.
- - A line of tasks waiting to be processed.
- - A digital key used in secure authentication.
30 Clues: - The core of an operating system. • - Input method using spoken commands. • - Organizes data into rows and columns. • - Firmware that starts up your computer. • - Temporary storage to speed up processes. • - A node that connects different networks. • - A line of tasks waiting to be processed. • - The top-level directory in a file system. • ...
Internet Technologies 2025-01-08
Across
- A real-time communication over the internet.
- A way to quickly access a favorite web site by saving it in your browser.
- Usually defines as a personal or noncommercial web site that uses a dated log format.
- The web page that your browser is set to use when it starts up, or the main page of any website.
- The act of moving from page to page and website to website online
- It is a series of letters and numbers that identify a location.
- This is the printed/paper copy of a file from the computer.
- To search for information on the web in a random , non-linear way.
- A special software package that connects to a network and provides data.
- An animated faces that express different emotions.
Down
- Refers to all computer networks on the internet.
- This is a file that has been added to an e-mail.
- illegally copying copyrighted software, music or movies.
- A request for information about certain topic.
- A collection of "pages" or files linked together and available on the world Wide Web.
- Small pictures that represent the program on your computer.
- A popular term for someone who accesses computer information either legally or illegally
- It is an unwanted email from someone we don't know.
- Another way to describe having access to the internet or actively using the internet.
- This is where all of the messages that you send are kept.
20 Clues: A real-time communication over the internet. • A request for information about certain topic. • Refers to all computer networks on the internet. • This is a file that has been added to an e-mail. • An animated faces that express different emotions. • It is an unwanted email from someone we don't know. • illegally copying copyrighted software, music or movies. • ...
RU ITEC411 2025-10-22
Across
- The duty to use technology in a fair and moral way
- Offs Giving up one benefit in order to gain another like privacy for convenience
- Creating new ideas or methods that improve technology or society
- Speech The right to express opinions without government control
- When jobs are lost because machines or computers take over
- The idea that the best action is the one that helps the most people
- The results or effects that come from actions good or bad
- Dilemma A situation where the right action is unclear or has both good and bad outcomes
- Tools and systems created to make tasks easier or more efficient
- A moral approach that focuses on duties and rules rather than results
- Networking Websites or apps that let people share and connect online
Down
- Technology Tools designed to help people with disabilities use computers or devices
- Using machines or software to perform work without human help
- How technology connects people and businesses around the world
- Divide The gap between people who have access to technology and those who do not
- The study of what is right and wrong especially in human actions
- Intelligence Machines or programs that can think and learn like humans
- The right to keep personal information safe and undisclosed
- Rights Basic freedoms every person is born with such as life and liberty
- Of Change How quickly technology develops and spreads in modern life
- Protection of computers data or networks from harm or misuse
21 Clues: The duty to use technology in a fair and moral way • The results or effects that come from actions good or bad • When jobs are lost because machines or computers take over • The right to keep personal information safe and undisclosed • Protection of computers data or networks from harm or misuse • Using machines or software to perform work without human help • ...
25339 2025-10-26
Across
- Model suggesting optimal decisions or actions
- Finding hidden patterns in unlabeled data
- Software used to create interactive visuals
- Google’s serverless data warehouse for analytics
- Data that provides information about other data
- Making choices based on factual data insights
- Tool for data connection and transformation in Excel and Power BI
- Estimating future business trends using analytics
- Performing data analysis using cloud computing resources
- Combining data from multiple sources into one view
- Non-relational database system for handling large unstructured data
- Mathematical framework for achieving the best result
- Using statistical models to predict future outcomes
- Moral principles guiding responsible data use
- Learning based on rewards and penalties
Down
- Processing data through interconnected neural structures
- Immediate analysis of streaming data
- Process of removing personal identifiers from data
- Machine learning technique using labeled data
- Subset of AI using neural networks with multiple layers
- Simulation of human intelligence by machines
- Stages through which data passes from creation to deletion
- Identifying and evaluating potential business risks
- Moving data between systems or storage types
- Selecting and transforming variables for model building
- Model explaining what has happened in the data
- Identifying unusual patterns that do not conform to expected behavior
- Continuous flow of real-time data from sources
- Tool to evaluate and compare multiple decision options
- Protecting data from unauthorized access or corruption
- Presenting key metrics visually for quick insight
31 Clues: Immediate analysis of streaming data • Learning based on rewards and penalties • Finding hidden patterns in unlabeled data • Software used to create interactive visuals • Simulation of human intelligence by machines • Moving data between systems or storage types • Model suggesting optimal decisions or actions • Machine learning technique using labeled data • ...
Techonology 2019-03-25
Across
- websites and applications that enable users to create and share content or to participate in social networking
- an aircraft or flying device which does not have a human pilot onboard
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Down
- a person who uses computers to gain unauthorized access to data
- a mobile phone that performs many of the functions of a computer, typically having a touchscreen interface, Internet access, and an operating system capable of running downloaded apps
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
- a computer that is portable and suitable for use while travelling
- a method of exchanging mails between people using electronic devices
8 Clues: a person who uses computers to gain unauthorized access to data • a computer that is portable and suitable for use while travelling • a method of exchanging mails between people using electronic devices • an aircraft or flying device which does not have a human pilot onboard • ...
TECHNICAL VOCABULARY 2015-02-25
Across
- how fast data flows on a given transmission path. The width of the range of frequencies that an electronic signal occupies on a given transmission medium.
- when you send a file from one computer to another, you.............it.
- a fiber optic line that can carry sixty times more data than a residential modem. They are used by businesses to connect to ISPs.
- an access point to the Internet. It's a physical location that houses servers, routers and ATM switches.
Down
- a network that covers a broad area.
- Today there are high capacity...............that connect networks across the globe. They are composed of trunk cables.
- a fiber optic line that can support hundreds of even thousands of computers on a single network.
- when you receive a file from another computer, you..........it.
8 Clues: a network that covers a broad area. • when you receive a file from another computer, you..........it. • when you send a file from one computer to another, you.............it. • a fiber optic line that can support hundreds of even thousands of computers on a single network. • ...
Vaping Health Risks 2025-10-29
Across
- a chronic disease characterized by compulsive drug seeking and use
- the process of informing individuals, especially youth, about the health risks associated with using e-cigarettes and providing guidance to prevent or quit the behavior
- products, strategies, or behaviors used to either replace vaping or to help a person stop using nicotine products entirely
- adolescents and young adults, typically those aged 12–24 years
Down
- a traditional tobacco product that involves burning tobacco for smoking
- the highly addictive, psychoactive chemical that is added to e-liquids to be inhaled as an aerosol, or “vapor,” by the user
- primarily due to its nicotine content, can negatively impact _________ and learning by altering brain networks
- the swelling and irritation of body tissues, especially the lungs, caused by inhaling chemicals and particles from e-cigarette aerosols
8 Clues: adolescents and young adults, typically those aged 12–24 years • a chronic disease characterized by compulsive drug seeking and use • a traditional tobacco product that involves burning tobacco for smoking • primarily due to its nicotine content, can negatively impact _________ and learning by altering brain networks • ...
D.A.T.A. Lab Crossword 2014-03-03
Across
- A person or agency considered to interface wise counsel or prophetic predictions or precognition of the future, inspired by the gods.
- A group of neighboring stars.
- The ability to querying very large databases for knowledge discovery.
- The entire protein complement of a given organism.
- The company that developed .
- The field of endeavor that relates to the collection, organization and analysis of large amounts of biological data using networks of computers and databases.
- This SQL Server data structure is commonly found in books.
Down
- An open-source software framework for storage and large scale processing of data sets on clusters of commodity hardware.
- The structural or descriptive information about data.
- A random process in which the probabilities of discrete states in a series depend only on the properties of the immediately preceding state or the next preceeding state.
- A vast array of heterogeneous data stored in a single logical data repository for querying and manipulation methods.
- An organized collection of data to model relevant aspects of reality in a way that supports processes requiring this information.
12 Clues: The company that developed . • A group of neighboring stars. • The entire protein complement of a given organism. • The structural or descriptive information about data. • This SQL Server data structure is commonly found in books. • The ability to querying very large databases for knowledge discovery. • ...
Health Assessment Chapters 31 Jarvis 7th ed. Laboratory Manual for Physical Examination & Health Assessment 2015-09-30
Across
- multidimensional assessment (physical examination and assessments of mental status, functional status, social and economic status, pain, and physical environment for safety)
- perceived strain by the person who cares for an older, chronically ill, or disabled person
- activities that an older adult performs as a family member or as a member of society or community
- assessment of an individual's spiritual health
- informal supports accessed by older adults (family members, close friends, neighbors, church societies, neighborhood groups, and senior centers)
- assessment of an individual's home environment and community systems (includes hazards)
Down
- ability of person to perform activities necessary to live in modern society
- systematic assessment that includes assessment of an individual's activities of daily living, instrumental activities and tasks associated with current life roles
- supportive services provided in the home
- tasks that are necessary for self-care
- mental status assessments (attention, memory, orientation, language, visuospatial skills, and higher cognitive functions
- assessment of health and well-being of an individual's caregiver
12 Clues: tasks that are necessary for self-care • supportive services provided in the home • assessment of an individual's spiritual health • assessment of health and well-being of an individual's caregiver • ability of person to perform activities necessary to live in modern society • assessment of an individual's home environment and community systems (includes hazards) • ...
ismael crosword 2019-11-13
Across
- a set of keys used to input text
- is the main printed circuit board (PCB) found in general purpose computers and other expandable systems
- a device to digitize paper documents
- is a hand-held pointing device that detects two-dimensional motion relative to a surface
- a cathode ray tube or liquid crystal display
Down
- is a graphics standard for video display controller first introduced with the IBM PS/2 line of computers in 1987
- data network, a digital telecommunications network
- an output device that displays information in pictorial form
- is a peripheral device which makes a persistent representation of graphics or text on paper.
- is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code
- is an industry standard that establishes specifications for cables and connectors and protocols for connection, communication and power supply between computers, peripheral devices and other computers.
- is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions.
12 Clues: a set of keys used to input text • a device to digitize paper documents • a cathode ray tube or liquid crystal display • data network, a digital telecommunications network • an output device that displays information in pictorial form • is a hand-held pointing device that detects two-dimensional motion relative to a surface • ...
Redalert CTF 2019-08-05
Across
- This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
- This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
- This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
- May sometime be known as Industroyer
- The world’s most murderous malware
Down
- Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
- A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
- This malware was reported to be involved with the 2015 cyber-attacks in Ukraine
- This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
- This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
- A network security measure employed on one or more computers to physically isolated from another network.
- A RAT targeting the ICS industry by the hacking group Dragonfly
12 Clues: The world’s most murderous malware • May sometime be known as Industroyer • A RAT targeting the ICS industry by the hacking group Dragonfly • This malware was reported to be involved with the 2015 cyber-attacks in Ukraine • This is an attack on bluetooth connections which allows for complete takeover of targeted devices. • ...
Chem 2023-11-16
Across
- A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
- the process of becoming an acid or the act of making something become an acid
- the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
- H₂CO₃
- the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
- When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
- a principle of chemistry used to predict the rates of chemical reactions
- the abundance of a constituent divided by the total volume of a mixture
- CO2
- A state in which the rate of the forward reaction equals the rate of the backward reaction
- a measure of how acidic/basic water is
- a process that leads to the chemical transformation of one set of chemical substances to another.
12 Clues: CO2 • H₂CO₃ • a measure of how acidic/basic water is • the abundance of a constituent divided by the total volume of a mixture • a principle of chemistry used to predict the rates of chemical reactions • the process of becoming an acid or the act of making something become an acid • ...
Piaget 2023-06-19
Across
- Tweaking old schemes or building new ones when new experiences reveal that one's current schemes do not perfectly describe the external environment
- A specific way of understanding experiences
- When the brain is using schemes to understand the external environment more that it is changing or modifying current schemes
- A young child using his schemes to understand his external environment
- This type of behaviour is the result of the simultaneous combination of schemes to address a problem
- This Reaction is the repetition of an originally random behaviour which eventually leads to the adaptation of schemes
Down
- The cognitive discomfort that a child feels during periods where their cognitive development is fast
- Creating and using schemes that apply to one's external world
- This approach provides opportunities to tweak current schemes by preforming a repetitive action slightly differently and examining the results
- A baby's first schemes are patterns of these
- A process where schemes are linked with other schemes to form networks
- The large amount of new schemes created in this stage make it the most complicated stage of development
12 Clues: A specific way of understanding experiences • A baby's first schemes are patterns of these • Creating and using schemes that apply to one's external world • A process where schemes are linked with other schemes to form networks • A young child using his schemes to understand his external environment • ...
Business (Promotion) 2023-04-28
Across
- The combination of promotional materials used by a business to communicate with its customers.
- A form of online marketing which places advertisements on web pages showing the results from search engine queries.
- Involves information and techniques used by businesses to make consumers aware of products and to persuade them to buy those products now and in the future.
Down
- Using internet technologies to provide a range of advertising including using email, social media messages and banner advertisements on mobile phones and websites.
- The various places where advertisements may be found such as television, newspapers, or the internet.
- Involves websites and applications which allow users to create and share information, ideas and interests with other individuals, communities and networks.
- These are a form of online marketing which place new browser windows on computer screens.
- The total amount of methods of promotion
- Provides information and allows discussion on the internet with other users producing their own entries or posts.
- The total amount of types of advertising
- A type of advertising that uses bright light
- The first step of the advertising process
12 Clues: The total amount of methods of promotion • The total amount of types of advertising • The first step of the advertising process • A type of advertising that uses bright light • These are a form of online marketing which place new browser windows on computer screens. • The combination of promotional materials used by a business to communicate with its customers. • ...
Networking Basics 2023-08-14
Across
- An address that identifies the network and host address assigned to a device.
- A network that connects several LANs. often limited to a corporation or an organizatio
- A device that is connected to absorb signals and prevent them from reflecting repeatedly back and forth on the cable.
- The term used to describe how devices are connected and how messages flow from device to device.
- An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the internet securely.
Down
- A local or restricted communications network, especially a private network created using World Wide Web software.
- A WAN that uses software to control connectivity.
- A collection of many networks owned by many entities that share information and communicate together.
- The portion of the IP address that identifies the network the device is assigned to.
- A group of computers and associated devices that share a common communications line or wireless link, typically to a server.
- A tunnel interface.
- Computer users and resources within a geographic area the size of a metropolitan area that are connected.
12 Clues: A tunnel interface. • A WAN that uses software to control connectivity. • An address that identifies the network and host address assigned to a device. • The portion of the IP address that identifies the network the device is assigned to. • A network that connects several LANs. often limited to a corporation or an organizatio • ...
Computer architecture 2024-01-09
Across
- A single integrated circuit performing the basic functions of the central processing unit in a small computer.
- The act or process of calculating an answer or amount by using a machine.
- A set of instructions that form part of an electronic device and allow it to communicate with a computer or with other electronic devices.
- Connected to a computer or other device by a wire.
- An amount of something that is used, or the process of using something.
- To open a computer file, a website, etc. in order to look at or change information in it.
Down
- The act or process of executing.
- The process of saving and keeping information, music, etc. on a computer.
- A system for connecting computers into networks (= groups of computers that are used together).
- Not needing wires to make a connection or to communicate.
- The design and structure of a computer system, which controls what equipment can be connected to it and what software can operate on it.
- The main part of a computer which contains the CPU.
12 Clues: The act or process of executing. • Connected to a computer or other device by a wire. • The main part of a computer which contains the CPU. • Not needing wires to make a connection or to communicate. • An amount of something that is used, or the process of using something. • The process of saving and keeping information, music, etc. on a computer. • ...
25 2024-01-05
Across
- The activity of setting up a business or businesses, taking on financial risks in the hope of profit.
- The practice of protecting systems, networks, and programs from digital attacks.
- The use of living systems and organisms to develop or make useful products.
- Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
- The use of largely automatic equipment in a system of operation.
- Capable of being decomposed by bacteria or other living organisms.
Down
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Working from home, making use of the Internet, email, and the telephone.
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
- The ability to be maintained over the long term without harming the environment. (Note: Repeated for variety.)
- Capable of being maintained or continued over the long term.
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device.
12 Clues: Capable of being maintained or continued over the long term. • The use of largely automatic equipment in a system of operation. • Capable of being decomposed by bacteria or other living organisms. • Working from home, making use of the Internet, email, and the telephone. • The use of living systems and organisms to develop or make useful products. • ...
Module 1: Impact of Digital Technology (Part 1 of 2) 2025-04-24
Across
- when software processes or converts data into something meaningful
- raw facts, such as text and numbers used to analyze something or make decisions
- the knowledge and ability to use computers and related technology efficiently, with skill levels ranging from beginner to advanced user
- an electronic device for storing and processing data; devices that can share data using internet or wireless networks
- combining traditional teaching methods with digital tools such as a smartboard and LMS to engage students
- responds to your verbal (natural language)commands, i.e., Amazon's Alexa
- the gap between those who have access to technology and its resources and information; includes affordability and quality
- a computer that functions as one computer component in a larger product and has a specified purpose
Down
- technology that enables computers and machines to simulate human learning and comprehension
- the device itself (i.e., desktop computer) and its components (i.e., keyboard)
- an individual's ability to find, evaluate, and communicate information using digital media platforms
- acronym that when individuals use their personal devices to access work data and information
12 Clues: when software processes or converts data into something meaningful • responds to your verbal (natural language)commands, i.e., Amazon's Alexa • the device itself (i.e., desktop computer) and its components (i.e., keyboard) • raw facts, such as text and numbers used to analyze something or make decisions • ...
Technology 2025-05-12
Across
- A group of computers and other devices connected in some ways so as to be able to exchange data
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- Not natural; Man-made
- Machine resembling a human
- A type of automated machine that can execute specific tasks with little or no human intervention and with speed and precision
- A physical system that uses power to apply forces and control movement to perform an action
Down
- Machines and technologies that can operate without continuous human supervision
- A worldwide system of interconnected computer networks and electronic devices that communicate with each other using an established set of protocols
- The procedure of calculating; determining something by mathematical or logical methods
- Machinery and equipment developed from the application of scientific knowledge
- The bringing about of new ideas, methods, products, services, or solutions that have a significant positive impact and value
- A branch of engineering and computer science that involves the conception, design, manufacture and operation of robots
12 Clues: Not natural; Man-made • Machine resembling a human • Machinery and equipment developed from the application of scientific knowledge • Machines and technologies that can operate without continuous human supervision • The procedure of calculating; determining something by mathematical or logical methods • ...
Exam|Business Role in Society 2025-09-04
Across
- A professor in Mexico who turned the pandemic into a time to weave networks and co-found Tierra Común
- The university where Paola Ricaurte teaches media and digital culture
- Every element within a system influences and is influenced by other elements, creating a web of interconnectedness
- Pattern that is selling a product or service to the highest bidder
- This pattern allows other companies to distribute its goods under their brands, so that it appears as if they are made by them
- The ability to see both the separate elements of a situation and the complex interactions between them
- According to Matthew Prince, what is eating the web?
Down
- A block in the Business Model Canvas that identifies the external organizations or individuals a company must collaborate with to operate successfully
- The conscious and responsible ways a company communicates with and delivers value to its customers and stakeholders
- The company led by Matthew Prince
- A product, project or entire start-up is financed by a crowd of investors who wish to support the underlying idea, typically via the Internet
- Mexican restaurant that empowers homeless youth through training and jobs.
12 Clues: The company led by Matthew Prince • According to Matthew Prince, what is eating the web? • Pattern that is selling a product or service to the highest bidder • The university where Paola Ricaurte teaches media and digital culture • Mexican restaurant that empowers homeless youth through training and jobs. • ...
Chapters 8-9 2025-12-06
Across
- Social __ is the sense of psychological closeness and connection experienced during communication
- The kind of ties in social networks that exist when people have infrequent interaction with acquaintances and limited emotional involvement
- Communication channel factor reflecting whether interaction occurs at the same time or at different times
- The level of richness that works best for simple, routine, broadcast, or archival messages
- When the amount of job information received exceeds processing capacity, resulting in delayed or inaccurate communication
- A psychological state where someone believes they have control over their work and freedom to make decisions, often boosting motivation and performance
- Contingency of power that exists when your skills or resources cannot be replaced by alternatives
Down
- When a person pushes back against influence; actively refusing, delaying, or signaling disagreement
- Use of facts, logical arguments, and emotional appeals to change someone's mind or behavior
- An emotional __ happens when we “catch” or share someone else’s emotions by mimicking their facial expressions and body language
- Final stage of listening where the receiver confirms understanding through verbal or nonverbal feedback
- Power based on accepted authority to request behaviors from others
12 Clues: Power based on accepted authority to request behaviors from others • The level of richness that works best for simple, routine, broadcast, or archival messages • Use of facts, logical arguments, and emotional appeals to change someone's mind or behavior • Social __ is the sense of psychological closeness and connection experienced during communication • ...
Networks of Exchange in AP World History 2024-01-31
Across
- proved to be an invaluable tool for trade and transportation in the Sahara Desert
- trade between sub-Saharan Africa and North Africa that requires travel across the Sahara.
- a person or company involved in wholesale trade, especially one dealing with foreign countries or supplying merchandise.
- exported animal skins, precious metals, and exotic African animals for Asian zoos in return for spice and art.
Down
- a global trade system (an interconnected network of many trade routes) based primarily in the Indian Ocean.
- refers to a network of routes used by traders for more than 1,500 years, from when the Han dynasty of China opened trade
- the world's largest hot desert and the third largest desert behind Antarctica and the Arctic
- a person who works hard or campaigns forcefully for a cause.
- the action of buying and selling goods and services.
9 Clues: the action of buying and selling goods and services. • a person who works hard or campaigns forcefully for a cause. • proved to be an invaluable tool for trade and transportation in the Sahara Desert • trade between sub-Saharan Africa and North Africa that requires travel across the Sahara. • ...
World Unit 2 2023-10-18
Across
- the founder of Mali empire. He crushed his enemies and won control of the gold trade routes along the trans-Saharan trade networks
- a central Asian city where the western and the eastern Silk Roads met; one of the westernmost cities of China, near the border with modern day Afghanistan, Kyrgyzstan, Pakistan, and Tajikistan.
- a Muslim city-state that became wealthy by building a navy and imposing fees on ships that passed through the Strait of Malacca, a narrow inlet that was part of the Indian Ocean trade network. Many ship captains used to travel between ports in India and ports in China.
- Mongol empire that ruled over Iran (Persia) & the Middle East
- Ruler of Mali (r. 1312-1337). His extravagant pilgrimage through Egypt to Mecca in 1324-1325 established the empire's reputation for wealth in the Mediterranean world.
- Mongol khanate founded by Genghis Khan's. It was based in southern Russia and quickly adopted both the Turkic language and Islam.
- ruler of the golden horde; one of Chinggis Khan's grandsons; responsible for the invasion of Russia beginning in 1236.
Down
- Meeting of all Mongol chieftains at which the supreme ruler of all tribes was selected
- The period of approximately 150 years of relative peace and stability created by the Mongol Empire.
- Europeans' name for the Moluccas, islands in Southeast Asia rich in highly desired spices like cinnamon, cloves, and nutmeg which were often traded in the Indian Ocean trade network
- Wrote the Book of Margery Kempe - considered the 1st autobiography in the English language. Chronicles her pilgrimages to holy sites in Europe and Asia. Claimed to have vision that called her to leave the vanities of the world
- (1304-1369) Moroccan Muslim scholar, the most widely traveled individual of his time. He wrote a detailed account of his visits to Islamic lands from China to Spain and the western Sudan. His writings gave a glimpse into the world of that time period.
- (1215-1294) Grandson of Genghis Khan and founder of the Mongol Yuan Dynasty in China.
- Cities along the coast of East Africa that actively participated in Indian Ocean trade: showed syncretism in their language and religion, blending traditional central African beliefs with Islam and Arabic
- Grandson of Chinggis Khan (ca. 1217-1265) who became the first il-khan (subordinate khan) of Persia.
- During the rule of Timur Lane was the most influential capital city, a wealthy trading center known for decorated mosques and tombs; a key trading city along the Silk Roads
- Mali trading city that became a center of wealth and learning thanks to its location in the trans-Saharan trade networks; universities, mosques, and libraries
- (1371-1433) a Chinese mariner, explorer, diplomat, fleet admiral, and court eunuch during China's early Ming dynasty, and often regarded as the greatest admiral in Chinese history. He was originally born as Ma He in a Muslim family and later adopted this new surname conferred by the Yongle Emperor.
18 Clues: Mongol empire that ruled over Iran (Persia) & the Middle East • (1215-1294) Grandson of Genghis Khan and founder of the Mongol Yuan Dynasty in China. • Meeting of all Mongol chieftains at which the supreme ruler of all tribes was selected • The period of approximately 150 years of relative peace and stability created by the Mongol Empire. • ...
crossword 2015-06-28
Across
- Which protocol does Ping use?
- The device perform the data traffic directing functions on the internet or on a large corporate network. It is a device that joins multiple wires or wireless networks It operates at network layer of OSI model. Identify the device
- Loss in signal power as light travels down the fiber is called
Down
- One of the top manufacturers of Network-related equipment. An actual drawing of the Golden Gate Bridge is the logo.
- The moon is a
- What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?
- A popular manufacturer logo represents the integration of analog and digital technology
7 Clues: The moon is a • Which protocol does Ping use? • Loss in signal power as light travels down the fiber is called • A popular manufacturer logo represents the integration of analog and digital technology • One of the top manufacturers of Network-related equipment. An actual drawing of the Golden Gate Bridge is the logo. • ...
