networks Crossword Puzzles
Windows Operating System 2024-10-08
Across
- - Known for its friendly interface and reliability.
- - Designed for home networks to manage data.
- - A version of Vista designed for business users.
- - The latest version with a new interface and features.
- - Combines desktop and mobile features with regular updates.
- - A professional version of Windows 10 with advanced features.
- - The first graphical operating system for PCs.
- - Improved internet features and hardware support.
- - An update to Windows 8 with improved usability.
- - A professional OS designed for networks and servers.
Down
- - A business-oriented version of Windows XP.
- - Early version with better graphics and multitasking.
- - Designed for server management and networking.
- - A version of Windows for server management.
- - A stable version aimed at businesses and professionals.
- - Better performance and user-friendly design than Vista.
- - Introduced the Start menu and a new user interface.
- - Introduced a touchscreen-friendly, tile-based interface.
- - Featured enhanced visuals and security improvements.
- - Focused on home users with multimedia features.
20 Clues: - A business-oriented version of Windows XP. • - Designed for home networks to manage data. • - A version of Windows for server management. • - The first graphical operating system for PCs. • - Designed for server management and networking. • - A version of Vista designed for business users. • - An update to Windows 8 with improved usability. • ...
Cyber attacks 2025-12-19
Across
- malicious act of collecting and publishing and individuals private info
- trying many passwords until one works
- fake emails or messages that trick users into giving information
- force trying many passwords until one works
- malicious code that attaches to legitimate files
- networks of infected devices controlled by an attacker
- phishing via text messages
- recoding keystrokes to steal credentials
- a cyber-enabled attack that involves sending a SWAT team to unsuspecting victim
Down
- displays unwanted ads, often tracking user behavior
- malware disguised as legitimate software
- pretending to be a trusted device by faking an IP address
- encrypts files and demands payment
- luring victims with something enticing
- self replicating malware that spreads across networks
- phishing via phone calls
16 Clues: phishing via phone calls • phishing via text messages • encrypts files and demands payment • trying many passwords until one works • luring victims with something enticing • malware disguised as legitimate software • recoding keystrokes to steal credentials • force trying many passwords until one works • malicious code that attaches to legitimate files • ...
Deep Learning Techniques 2025-03-31
Across
- function used to introduce non-linearity into the output of a neuron
- A modeling error that occurs when a function is too closely fit to a limited set of data points.
- computational model inspired by the way biological neural networks
- A regularization technique where randomly selected neurons are ignored during training
Down
- A layer in a neural network that applies convolution operations to the input.
- Descent An optimization algorithm used to minimize the loss function in neural networks.
- One complete pass
- An open-source software library for dataflow and differentiable programming across a range of tasks.
- A popular activation function that stands for Rectified Linear Unit.
- algorithm used to train neural networks by adjusting weights
10 Clues: One complete pass • algorithm used to train neural networks by adjusting weights • computational model inspired by the way biological neural networks • function used to introduce non-linearity into the output of a neuron • A popular activation function that stands for Rectified Linear Unit. • ...
7th Entrepreneurship & Computer Networks 2022-03-21
Across
- an amount of money that is made from
- a plan to improve your business
- a goal that you had for your market
- a letter to contact a prospective employer
- a sale of a unit of items
- losing all your money mostly by lowns
- where your total revenue equals your total cost
- when you make a product and sell it
- Something you benefit and get money from
Down
- someone who makes the finished project
- a thing that is legal separate from its owners
- a place to store data
- an idea that you are making for your business
- sharing thing with other business people or groups
- a job that has lots of professionals
- Making a product and putting a price
- Something you fill out to get a job
- someone that sells the things that you produce
- something that is almost owned by one compony
- A place to buy things
- something you do with someone else
21 Clues: a place to store data • A place to buy things • a sale of a unit of items • a plan to improve your business • something you do with someone else • a goal that you had for your market • Something you fill out to get a job • when you make a product and sell it • an amount of money that is made from • a job that has lots of professionals • Making a product and putting a price • ...
Data Communications & Networks I 2012-10-07
Across
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- The fundamental analog signal is called a ___________.
- Ethernet LANs use___________ for signaling.
- The input and output connections on a multiplexer are called:
- T-1 systems use ___________ for signaling.
- DS stands for:
- The smallest element of data.
- A ________ pathway between two nodes or devices.
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- Is used to "wake" the receiver.
- ASCII, Extended ASCII and Unicode are examples of:
- signal When we speak into a standard telephone today our voice is represented by
- Particular format of electrical pulses.
Down
- The frequency range required for transmitting.
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
- A simple waveform used internally in digital electronic equipment and personal computers is:
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- What kind of sign transmits light pulses over a glass fiber?
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- The most common technique for voice digitization is called:______ Modulation
- When a pulse has the same polarity as the preceding pulse this is called______
- The gradual loss of a transmission signal as it travels over a distance is called:
- A transmission mode in which information can only be transmitted in one direction.
- The most common topology used in LAN implementation is the?
- The device/process used to convert analog signals into digital signals is called a:
- A set of specific rules and procedures for the control of communications in a network is called a:
27 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • A ________ pathway between two nodes or devices. • ASCII, Extended ASCII and Unicode are examples of: • ...
Data Communications & Networks II 2012-10-07
Across
- At the TCP/IP network access layer, the protocol data unit is called a ___________.
- At this layer, speed and latency are of the utmost concer...
- Another name for CIDR is:
- A short range device used for ID cards, security devices and can replace UPC code.
- A condition when a communications link, path or network experiences a load that exceeds it's capacity is ___________.
- MAN stands for:
- UDP Protocol is ___________ technology.
- Which harware device might be found in the access layer of the Cisco model?
- Acronym for Classless Inter-Domain Routing
- PING stands for __________.
- The TCP/IP Internet layer corresponds to the OSI ___ layer.
- Acronym for Wide Area Network
- The first 48 bits of an Ethernet frame is the ________.
- If multiple errors are detected in an ATM packet the packet is:
- Bandwidth is typically represented in bits per ________.
Down
- At the TCP/IP host-to-host layer the protocol data unit is called a ____________.
- At the TCP/IP internet layer the protocol data unit is called a __________.
- CSU stands for:
- The TCP/IP host-to-host layer corresponds to the OSI____ layer.
- ATM stands for:
- Implementing dynamic NAT automatically creates a __________ between your internal network and outside networks.
- Filtering, flooding and transmitting frames is the function of a _____________.
- A disadvantage of satellite communication is a ______ delay
- The transmission of light pulses over glass fiber is called _________ signaling.
- TCP Protocol is ________ circuit technology.
- Particular format of electrical pulses.
- An example of a routed protocol would be ____.
- The inter-network processor that is an interface between two different or dissimilar networks.
- An increasingly popular method of distributing network at home is the _ _ _ _.
- Older network designs always placed the router at the ______ of the network.
30 Clues: CSU stands for: • ATM stands for: • MAN stands for: • Another name for CIDR is: • PING stands for __________. • Acronym for Wide Area Network • UDP Protocol is ___________ technology. • Particular format of electrical pulses. • Acronym for Classless Inter-Domain Routing • TCP Protocol is ________ circuit technology. • An example of a routed protocol would be ____. • ...
OCR Computer Science Networks 2024-04-16
Across
- Techniques to exploit humans on a computer network
- When a cable is used by multiple connections
- Hardware number for each device
- Attack type where a network is overloaded with lots of traffic
- Bluetooth is an example of this
- Attack type where lots of possibilities to a login is attempted
- Connection type where each device hosts services
- Software that causes harm to a computer
- Network device that connects multiple devices together
- A device's location on a network
- Connection type where one device hosts all services
Down
- Protocol for converting URLs into IP Addresses
- Piece of hardware that allows a computer to connect to a network
- A very large WAN
- A type of network with devices spread over a large geographical area
- Connection to a network when you are on another network on the internet
- A device that connects two networks together
- A device that hosts files/services
- Topology where there is one central device
- Small piece of data that is transmitted over a network
- Connection type that is more secure and faster
- Portion of the internet that stores web pages
- Software that renders web pages
- Topology where each device connects to multiple other devices
- COnnection type where is is easier to add another device
- A device that connects to a server
- The rate at which data is transmitted on a network
27 Clues: A very large WAN • Hardware number for each device • Bluetooth is an example of this • Software that renders web pages • A device's location on a network • A device that hosts files/services • A device that connects to a server • Software that causes harm to a computer • Topology where there is one central device • When a cable is used by multiple connections • ...
Computer Networks Crossword Puzzle 2026-04-01
Across
- Network area where collisions occur
- Used for error reporting
- Ensures priority handling of traffic
- Separating combined signals at destination
- Combining fragmented packets
- Actual rate of successful data transfer
- Regulates data transmission speed
- Maps IP address to MAC address
- Allows multiple frames before acknowledgment
- Devices receiving broadcast messages
- Dividing network into smaller parts
Down
- Combining multiple signals into one
- Removing headers and trailers at receiver
- Technique to prevent network overload
- Identifies errors in data transmission
- Maps private IP to public IP
- Process of adding headers and trailers to data
- Breaking large packets into smaller units
- Variation in packet delay
- Used to verify data integrity
20 Clues: Used for error reporting • Variation in packet delay • Maps private IP to public IP • Combining fragmented packets • Used to verify data integrity • Maps IP address to MAC address • Regulates data transmission speed • Network area where collisions occur • Combining multiple signals into one • Dividing network into smaller parts • Ensures priority handling of traffic • ...
Computer 2025-05-28
Across
- | Any device connected to a network
- | A unique number given to every device on a network
- | Software used to explore websites
- | Changes website names into numerical addresses
- | A set of rules for digital communication
- | A wireless method of connecting to a network
- | Connects multiple devices within a network
- | A small area network, used at home or in offices
Down
- | A computer that provides data or services to others
- | Directs data between different networks
- | Protects a network from unauthorised access
- | Maximum amount of data that can be transferred
- | A common wired connection for local networks
- | Device that connects computers to the internet via telephone lines
- | A network covering a large geographical area
15 Clues: | Any device connected to a network • | Software used to explore websites • | Directs data between different networks • | A set of rules for digital communication • | Connects multiple devices within a network • | Protects a network from unauthorised access • | A common wired connection for local networks • | A wireless method of connecting to a network • ...
Tech Talk:A Crossword on Networking 2025-06-09
Across
- A device that connects networks
- Provides internet access to devices
- A small network,often in homes or schools
- A set of rules in data communication
- A main computer in a network
- A large network connecting countries
- Address A unique number identifying a device on a network
- A area where two devices exchange data
Down
- This protects networks from threats
- A network device that is used to connect all the computer in a network with each other
- A address identifying websites
- A type of cable used in weird connections
- Connects multiple devices in a network
- A wireless internet technology
- A computer network that is mainly created for an individual person
15 Clues: A main computer in a network • A address identifying websites • A wireless internet technology • A device that connects networks • This protects networks from threats • Provides internet access to devices • A large network connecting countries • A set of rules in data communication • Connects multiple devices in a network • A area where two devices exchange data • ...
Networking Concepts 2025-06-07
Across
- : Converts digital data into signals for transmission
- : Internet-based storage and computing services
- : Unauthorized access to or manipulation of computer systems
- : Software designed to detect and remove malicious software
- : Wireless networking technology
- : Fraudulent attempt to obtain sensitive information
- : Principles that govern behavior in digital environments
- : Local Area Network, usually within a building
- : Malicious software intended to harm or exploit systems
- : Device that forwards data packets between networks
Down
- : Process of converting data into code to protect it
- : Secret word or phrase to access a system or data
- Address : Unique number assigned to each device on a network
- : Security system that controls incoming and outgoing traffic
- : Global system of interconnected networks
15 Clues: : Wireless networking technology • : Global system of interconnected networks • : Internet-based storage and computing services • : Local Area Network, usually within a building • : Secret word or phrase to access a system or data • : Process of converting data into code to protect it • : Fraudulent attempt to obtain sensitive information • ...
Computer Network 2025-09-16
Across
- of dividing large IP packets into smaller pieces. (FRAGMENT)
- of virtual circuit, a connectionless model. (DATAGRAM)
- routing protocol that uses areas. (OSPF)
- of breaking messages into smaller units for transmission. (PACKETIZING)
- method for delivering data to multiple receivers. (MULTICAST)
- gateway protocol for inter-domain routing. (BGP)
- multiple networks together. (INTERNETWORKING)
- network service model. (VC)
- protocol of the internet for addressing and routing. (IP)
- used for error reporting and diagnostics. (ICMP)
Down
- by the network to applications, defines performance and guarantees. (SERVICE)
- path forwarding multicast routing protocol. (DVMRP)
- to evaluate the “cost” of a route in routing algorithms. (METRICS)
- that assigns IP addresses dynamically. (DHCP)
- internet protocol with larger address space. (IPV6)
- vector routing protocol used in small networks. (RIP)
- used to map IP to MAC addresses. (ARP)
17 Clues: network service model. (VC) • used to map IP to MAC addresses. (ARP) • routing protocol that uses areas. (OSPF) • that assigns IP addresses dynamically. (DHCP) • multiple networks together. (INTERNETWORKING) • gateway protocol for inter-domain routing. (BGP) • used for error reporting and diagnostics. (ICMP) • path forwarding multicast routing protocol. (DVMRP) • ...
social networks 2013-11-21
Across
- to keep your things safe
- fake profiles
- your own things
- where you type in facebook
Down
- to contact people where they can see your face
- the thing to tell your information to close friends
- its what you press you block sombody from seeing your things or messaging you
- a social network that is often what peadifiles use
- the thing you use to log in or to contact humans
9 Clues: fake profiles • your own things • to keep your things safe • where you type in facebook • to contact people where they can see your face • the thing you use to log in or to contact humans • a social network that is often what peadifiles use • the thing to tell your information to close friends • its what you press you block sombody from seeing your things or messaging you
Computer Networks 2019-03-01
Across
- data is split into... and sent across the network
- What you desperately need every time you go on social media
- a procedure or rule
- how much data can be processed at a time
- connecting a number of computers to form a local network
- Domain names server
Down
- many computers connected together
- a number given to any computer with internet access
- used to connect things together
9 Clues: a procedure or rule • Domain names server • used to connect things together • many computers connected together • how much data can be processed at a time • data is split into... and sent across the network • a number given to any computer with internet access • connecting a number of computers to form a local network • ...
Wireless Networks 2020-10-24
Data Communications & Networks I 2012-10-07
Across
- T-1 systems use ___________ for signaling.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- A transmission mode in which information can only be transmitted in one direction.
- When a pulse has the same polarity as the preceding pulse this is called______
- The device/process used to convert analog signals into digital signals is called a:
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- ASCII, Extended ASCII and Unicode are examples of:
- FHSS is an important feature of this.
- DS stands for:
- The most common topology used in LAN implementation is the?
- The most common technique for voice digitization is called:______ Modulation
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- What kind of sign transmits light pulses over a glass fiber?
- A simple waveform used internally in digital electronic equipment and personal computers is:
Down
- Is used to "wake" the receiver.
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- A ________ pathway between two nodes or devices.
- The smallest element of data.
- signal When we speak into a standard telephone today our voice is represented by
- The input and output connections on a multiplexer are called:
- Ethernet LANs use___________ for signaling.
- The frequency range required for transmitting.
- A set of specific rules and procedures for the control of communications in a network is called a:
- A PAN protocol that is popular in home automation controls.
- The gradual loss of a transmission signal as it travels over a distance is called:
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- The fundamental analog signal is called a ___________.
- Particular format of electrical pulses.
- What is the acronym for Personal Area Network?
30 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • FHSS is an important feature of this. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • What is the acronym for Personal Area Network? • ...
technology 2023-05-08
Across
- perceiving, synthesizing, and inferring information
- describes a wide range of technologies that reduce human intervention in processes
- the activity of electronically buying or selling
- a set of computer programs and associated documentation and data
- the use of computers to create,process, store, retrieve and exchange all kinds of data and information.
Down
- includes the physical parts of a computer
- is the protection of computer systems and networks from attack by malicious actors
- a family of wireless network protocols based on the IEEE 802.11 family of standards
- the transfer of information between two or more points without the use of an electrical conductor.
- a database is an organized collection of data stored and accessed electronically.
- the global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
- is the most important processor in a given computer.
- a device that accepts information (in the form of digitalized data)
- a scientific and engineering discipline that studies and applies the principles of physics to design, create, and operate devices that manipulate electrons and other charged particles.
- the application of scientific knowledge for practical purposes, especially in industry.
15 Clues: includes the physical parts of a computer • the activity of electronically buying or selling • perceiving, synthesizing, and inferring information • is the most important processor in a given computer. • a set of computer programs and associated documentation and data • a device that accepts information (in the form of digitalized data) • ...
JCromwell - Network Devices 2023-01-04
Across
- A generic name for all-in-one security appliance
- passively monitors traffic on the network
- Is a type of NIC that is used to connect to 802.11 wireless networks.
- introduced to divide LANs into segments, it keeps a record of all the devices on each segment it can also then filter network traffic between LAN segments.
- an access point provides network access to wireless devices, such as laptops and tablets.
- can have all the functionality of a switch or a wireless AP.
- _______ switches come with additional features that the network administrator can configure to improve the functionality and security of the network.
- ___________ network controller is a device in the cloud that allows administrators to manage network devices.
- Is primarily used to regenerate weak signals.
Down
- legacy systems have ________ microchips
- responds immediately and does not allow any malicious traffic to pass
- protects data and equipment on a network from unauthorized access
- This type of NIC is connected to the usb slot and is used to access networks.
- extends the reach of a network because it regenerates the electrical signal.
- This type of NIC is used to connect to Ethernet networks.
- _____ panels can be powered or unpowered.
- _________ switches are less complicated and expensive.
- is a method for powering devices that don’t have a battery or a access to a power outlet.
- an endpoint management server can _______ an end devices connection to the network.
19 Clues: legacy systems have ________ microchips • passively monitors traffic on the network • _____ panels can be powered or unpowered. • Is primarily used to regenerate weak signals. • A generic name for all-in-one security appliance • _________ switches are less complicated and expensive. • This type of NIC is used to connect to Ethernet networks. • ...
nweg crossword 2024-08-13
Across
- - Clue: "A device that forwards data packets between computer networks."
- - Clue: "A hardware component that allows a computer to connect to a network."
- - Clue: "A system that translates domain names into IP addresses."
- - Clue: "The amount of data processed by a system in a given amount of time."
- Address - Clue: "A unique string of numbers separated by periods that identifies each computer using the Internet Protocol."
- - Clue: "A service that encrypts your internet traffic and protects your online identity."
- - Clue: "A device that connects devices in a network and uses packet switching to forward data."
- - Clue: "A unit of data that is routed between an origin and a destination on the internet or other networks."
- - Clue: "The maximum rate of data transfer across a given path."
- Balancing - Clue: "Distributing network or application traffic across multiple servers."
- - Clue: "A server that acts as an intermediary for requests from clients seeking resources from other servers."
Down
- - Clue: "The variability in packet arrival times."
- - Clue: "The delay before a transfer of data begins following an instruction."
- - Clue: "The practice of dividing a network into two or more smaller networks."
- - Clue: "The process of converting information into a code to prevent unauthorized access."
- - Clue: "A network security system that monitors and controls incoming and outgoing network traffic."
- - Clue: "The time taken for a data packet to travel from source to destination."
- - Clue: "A unique name that identifies a wireless network."
- - Clue: "A network management protocol used to dynamically assign IP addresses."
- - Clue: "A mechanism that ensures the efficient use of network resources."
20 Clues: - Clue: "The variability in packet arrival times." • - Clue: "A unique name that identifies a wireless network." • - Clue: "The maximum rate of data transfer across a given path." • - Clue: "A system that translates domain names into IP addresses." • - Clue: "A device that forwards data packets between computer networks." • ...
Network Devices P Savelle 2023-01-03
Across
- in larger networks, administrators typically use managed switches so it can be configured with a ____ and port security
- air gapping is the process of physically _______ legacy systems from other networks and the internet
- this device provides network access to wireless devices like laptops
- firewalls use ___ to determine what is permitted and what is denied from network access
- this network interface card connects to 802.11 WIFI standard
- switches uses the switching ____ to determine which port to use to reach the MAC address
- this device extends how far a signal can travel
- _____ systems provide dedicated input and output instructions to a specialized device
Down
- this device is used as a place to collect incoming cable runs from various networking devices throughout a facility
- ______ switches don't have a management interafce
- hubs regenerate the electrical signal which extends the reach of the _____
- this operation responds immediately and does not let malicious traffic to pass
- bridges reduce the amount of _____ between devices
- ___ is a method for giving power to devices that dont have a bettery or dont have access to a power outlet
- in larger networks, this device connects to switches which then connects to LAN's
- endpoint management servers can _____ end devices connection to a network if it does not meet the criteria
- this device includes all of the functionality of IDS/IPS as well as firewall services
- what other form factor are NIC's available in?
- this operation passivley monitors traffic on a network
19 Clues: what other form factor are NIC's available in? • this device extends how far a signal can travel • ______ switches don't have a management interafce • bridges reduce the amount of _____ between devices • this operation passivley monitors traffic on a network • this network interface card connects to 802.11 WIFI standard • ...
BYTETRAIL 13 2025-02-25
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
BYTETRAIL 13 2025-02-25
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
Mixed: Intermediate/Advanced 95 2024-02-09
Careers at eGov Jamaica Limited 2025-01-22
Across
- Install, configure, and maintain organizations’ computer networks and systems
- Define, develop, test, analyze, and maintain new software applications in support of the achievement of business requirements
- Preserving of the integrity, accuracy and privacy of all records
Down
- Creating or updating layouts of a specific space using software
- Use data to form business insights and recommend changes in businesses and other organizations
- Build the systems used to protect computer systems and networks and track incidents
- Support, troubleshoot, and maintain computer servers and networks
- Build, maintain and strengthen a company's relationship with a client
- Sources and purchases goods and services on behalf of their organization
- A person authorized to review and verify the accuracy of records
10 Clues: Creating or updating layouts of a specific space using software • Preserving of the integrity, accuracy and privacy of all records • A person authorized to review and verify the accuracy of records • Support, troubleshoot, and maintain computer servers and networks • Build, maintain and strengthen a company's relationship with a client • ...
COSC CrossWord 2016-02-24
Across
- stands for Hypertext Markup Language
- a group of information on a computer that can be opened by programs
- suffix added to a file to indicate the name of the app to run
- preferred type of language when writing for the web
- preferred type of navigational system
- agency that governs fair use
- networks that are not geographically close
- stands for domain name system
- HTML indicator that labels a format
- reference to a resource on the internet
Down
- can be embedded in web pages
- networks that are geographically close
- legal permission to produce or copy a product
- used to view web pages
14 Clues: used to view web pages • can be embedded in web pages • agency that governs fair use • stands for domain name system • HTML indicator that labels a format • stands for Hypertext Markup Language • preferred type of navigational system • networks that are geographically close • reference to a resource on the internet • networks that are not geographically close • ...
Priya's NWEG Crossword Puzzle 2023-08-29
Across
- Converting data into a secure code to prevent unauthorized access during transmission.
- Devices that direct data packets between networks, determining optimal paths for transmission.
- Verifying the identity of users, devices, or systems accessing the network.
- The ability of a network to handle increased traffic and growth without performance degradation.
- The flow of data packets through a network, varying in volume and type.
- The speed, efficiency, and effectiveness of network operations and data transmission.
- The ability of devices to establish and maintain connections within a network.
Down
- The time delay between sending and receiving data across a network, affecting response time.
- Establishes secure connections over public networks, ensuring privacy.
- The underlying framework and components that support network operations.
- Creating virtual instances of resources like servers, networks, or storage for efficient utilization.
- The consistency and stability of network operations and services.
- Converting data into a secure code to prevent unauthorized access during transmission.
- Duplication of critical network components to ensure availability in case of failures.
- The capacity of a network to transmit data quickly, often measured in bits per second.
- Security devices that control incoming and outgoing network traffic based on predefined rules.
- Devices that connect devices within a local network and facilitate data exchange.
- Measures to protect network data from unauthorized access, breaches, and cyber threats.
- Continuous observation of network activities and performance for troubleshooting and optimization.
- The amount of data that can be transmitted successfully over a network in a given time.
20 Clues: The consistency and stability of network operations and services. • Establishes secure connections over public networks, ensuring privacy. • The flow of data packets through a network, varying in volume and type. • The underlying framework and components that support network operations. • ...
byte trail 0 2025-03-05
Across
- Duplication for fault tolerance
- Cryptocurrency ledger technology
- Starting a system by loading software
- Protects networks from threats
- Structure of a database, including tables, views, and indexes
Down
- Data structure with Last-In-First-Out order
- Device that connects multiple networks
- Manages hardware and software
- Operation to combine rows from two or more tables
- Set of vertices connected by edges
10 Clues: Manages hardware and software • Protects networks from threats • Duplication for fault tolerance • Cryptocurrency ledger technology • Set of vertices connected by edges • Starting a system by loading software • Device that connects multiple networks • Data structure with Last-In-First-Out order • Operation to combine rows from two or more tables • ...
Computer Networking Quiz 2023-02-06
Across
- Email is the exchange of computer-stored messages from one user to one or more recipients via the internet.
- a series of numbers that identifies any device on a network
- a standard that defines how to establish and maintain a network conversation by which applications can exchange data.
- a worldwide system of computer networks
- a set of computers sharing resources to communicate
- a basic unit of data that's grouped together and transferred over a computer network,
- A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
Down
- the transfer of data from one digital device to another.
- Where you physical plug your computer or a docking station into a wall jack.
- computer networks that are not connected by cables of any kind.
- a measure of the data transfer rate or capacity of a given network.
- a computer program or device that provides a service to another computer program.
- An established set of rules that determine how data is transmitted between different devices in the same network.
- Networking hardware used to connect one network device to other network devices.
- a physical or virtual appliance that passes information between two or more packet-switched computer networks.
- A set of physical or network devices that are essential for communication.
16 Clues: a worldwide system of computer networks • a set of computers sharing resources to communicate • the transfer of data from one digital device to another. • a series of numbers that identifies any device on a network • computer networks that are not connected by cables of any kind. • a measure of the data transfer rate or capacity of a given network. • ...
Times 2 by Kerry Simpson 2013-02-22
Across
- The IP address of the original computer.
- Uses short-range radio links.
- A set of protocols defined by 7 layers.
- What happen when you have identical IP's on two different networks.
- Network address ranges are divided into A,B,C.
- Appended to the data before transmission.
- Uses only 10% of the software of Bluetooth.
- Extends the range of traditional Ethernet wirelines
- The most commonly used twisted pair wire.
- The NAT that maps unregistered IP's to registered IP's.
- A type of network use as campus LAN.
- Used to control un-acknowledged data segments.
- A high level route representing many lower level routes.
- The ports that can be duplicate without respect to the application
- A device where every port is it's own separate segment.
- The number that can be sub netted when using CIDR.
Down
- Uses SMTP
- Acts on behalf of another device.
- Makes interconnection possible for networks.
- The IP address of the receiving computer.
- This layer provides mechanical interface.
- Guaranteed bandwidth between and two locations.
- A type of switch most commonly found in large WAN networks
- Exceeds load capacity.
- This layer does data reformatting
- Each wire of a 4-pair UTP.
- Converts layer 3 IP to layer 2 MAC address.
- The type of address that are 32 bits long and 4 bits at a time.
- Confined to line of sight.
- Covers unlimited geographical area.
- Maintains and/or terminates connections.
- Cuts communication on or off between two computers.
- Uses the digits 0 and 1
33 Clues: Uses SMTP • Exceeds load capacity. • Uses the digits 0 and 1 • Each wire of a 4-pair UTP. • Confined to line of sight. • Uses short-range radio links. • Acts on behalf of another device. • This layer does data reformatting • Covers unlimited geographical area. • A type of network use as campus LAN. • A set of protocols defined by 7 layers. • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Computer Science-Networks 2019-05-17
Across
- computer on a network
- gaining unauthorised access to a computer or data
- connects computers to form a network
- network of your own devices
- wireless technology for transmitting data
- computers that cover a small area
Down
- network that spans across countries
- system to protect against unauthorised access
- cable used to connect computers to the network
- hardware used to connect multiple devices
- computer that holds data to be shared with other computers
- data sent between devices
- rules for how messages are sent across network
13 Clues: computer on a network • data sent between devices • network of your own devices • computers that cover a small area • network that spans across countries • connects computers to form a network • hardware used to connect multiple devices • wireless technology for transmitting data • system to protect against unauthorised access • cable used to connect computers to the network • ...
IB ITGS - Networks 2012-11-30
Across
- a connection with much greater bandwidth than modems have
- a network where the computers are close to each other
- a type of network that uses high speed fiber optics to transfer data
- is a method of connecting LAN's or connecting a device to the internet wirelessly
- a netwrok spread over a large area, like the Internet
- fake sites that try to retrieve the user information by tricking the user to believe that it is the real site, they are usually opened because of a type-o
Down
- blocks unauthorized data transfers
- messages that people do not want, that waste their time
- is a way for devices to comunicate with each other wirelessly, mostly used with accessories
- broadcasts messages to all devices
- a user of a network also called a node
- improved version of a hub, can carry multiple messages of the network
- enables every computer to be the client and the server on the network
13 Clues: blocks unauthorized data transfers • broadcasts messages to all devices • a user of a network also called a node • a network where the computers are close to each other • a netwrok spread over a large area, like the Internet • messages that people do not want, that waste their time • a connection with much greater bandwidth than modems have • ...
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales, nueral networks • automático, Machine learning
dasd 2021-04-30
25 Clues: If • Tap • List • Loop • Else • Print • Array • Cyber • Sprite • Python • Commit • If else • Settings • Function • Variable • Autonomous • cybersecurity • activo, Uptime • flotante, Float • entero, Integer • el lazo, For loop • while, While loop • binarios Binary numbers • neuronales nueral networks • automático Machine learning
World Wide Web and Applications of Computers 2024-03-30
Across
- Users
- finances
- process to convey information
- research
- connects computer networks
- teachers
- written questions
- process in web
- Surfing
- storage of websites
- an operation
Down
- doctors
- input data and instructions
- farm
- Designs and Build
- used to sell products
- drawing conclusions
- soldiers
- a technological device
- products and services
20 Clues: farm • Users • doctors • Surfing • finances • research • soldiers • teachers • an operation • process in web • Designs and Build • written questions • drawing conclusions • storage of websites • used to sell products • products and services • a technological device • connects computer networks • input data and instructions • process to convey information
study crossword 2019-10-11
Across
- advanced research projects agency network
- made for computers to communicate seamlessly
- global system of interconnected computer networks
- defense advanced research project agency
- application software
Down
- small bits of data sent from a file
- blocks data until ransom is paid
- operating software by Microsoft
- way to check if website is good
9 Clues: application software • operating software by Microsoft • way to check if website is good • blocks data until ransom is paid • small bits of data sent from a file • defense advanced research project agency • advanced research projects agency network • made for computers to communicate seamlessly • global system of interconnected computer networks
Chapter 5 - Networks 2021-07-15
Across
- used to surf the Internet
- device required to connect to the ISP
- a device used to provide a wired connection to wireless devices in a network
- a computer that shares its resources with connected devices
- connects 2 different networks
- a type of cable
- an ISP in Sri Lanka
Down
- method used to identify a device on a network
- when two or more computers are connected togther and communication and sharing of resources take place
- a devices address on the Internet
- they transfer data in the form of light
- a devices used to connect multiple wired devices in a network
- any device that wants to connect to a network needs this component
13 Clues: a type of cable • an ISP in Sri Lanka • used to surf the Internet • connects 2 different networks • a devices address on the Internet • device required to connect to the ISP • they transfer data in the form of light • method used to identify a device on a network • a computer that shares its resources with connected devices • ...
intro to networks 2024-01-10
Across
- network which is larger than a LAN but smaller than a WAN,which can cover several buildings in a single city, such as a university campus.
- is a network client which is a device or software that can work both online and offline
- network covering a small area such as a single building.
- a network owned by single company or organization
- network in which each node can share its files with all the other nodes. Each node has its own data and there is no central server.
- wireless local area network
Down
- network that is centered around a person or their workspace.
- which allows a device to access a LAN without a wired connection.
- is a group of two or more computers connected with one another for the purpose of sharing data and resources
- a network owned by communication carrier eg telecoms such as China mobile, china telecom, china Unicom.
- network that uses separate dedicated servers and specific client workstations.All client computers are connected to the dedicated servers.
- is a network client dependent on access to server for constant access to files and to allow apps run uninterrupted
- network covering a very large geographical area such as a country or continent.
13 Clues: wireless local area network • a network owned by single company or organization • network covering a small area such as a single building. • network that is centered around a person or their workspace. • which allows a device to access a LAN without a wired connection. • network covering a very large geographical area such as a country or continent. • ...
Data Communication Networks 2023-11-06
13 Clues: OSI • LAN • TCP/IP • IEEE802.11 • IEEE 802.22 • IEEE 802.16 • Set of Rules • Mbps to Gbps • Wireless LAN Technology • Energy Efficient Metrics • Perfomance,Relaiability,Security • Elelctroncis Industries Association • Test, Evaluate and standardize new technologies
TV Production Chapter 1 Vocab 2024-10-15
Across
- What type of tv is used to communicate relevant information to a specific audience.
- Home Video records ____________events and activites
- Franklin Delano Roosevelt delivered the first ___________________ speech in 1939.
- Closed circuit TV (CCTV) is where the signal is sent through wires and serves only extremely small, private, ________________________ area.
- One of the most famous examples of home video is the Zapruder film of the assassination of President ________________.
- Commercial broadcast television is a type of tv production facility is for profit but the signal is sent through an ____________________
- TV that aims to inform the public is ___________________ television
- A tv ad for a product or service
Down
- Small scale video production companies mainly produce ______________ events and commercials for local businesses.
- A broadcast station that plays content of a specific network
- Subscriber television fee for service programming where customers pay scheduled fees and the signals are transported by _______________ transmission or underground cables
- The process of making a specified number of program episodes available for lease to other networks for a fee.
- The television signal travels through the air from one antenna to another antenna
- Local origination is programming made in a specific ______________________ area.
- A corporation that bundles programming and makes it available to affiliates .
- Large scale video production companies produce multi camera large budget programming gor broadcast ______________ or cable networks.
- A form of CCTV that is usually used for security
17 Clues: A tv ad for a product or service • A form of CCTV that is usually used for security • Home Video records ____________events and activites • A broadcast station that plays content of a specific network • TV that aims to inform the public is ___________________ television • A corporation that bundles programming and makes it available to affiliates . • ...
Las redes sociales 2017-01-26
15 Clues: too • users • I post • laptop • a post • message • to post • networks • to share • a tablet • connection • email (6-11) • to send (e...) • to send (m...) • chatrooms (4/2/4)
Data Communications & Networks I 2012-10-07
Across
- T-1 systems use ___________ for signaling.
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- Ethernet LANs use___________ for signaling.
- A set of specific rules and procedures for the control of communications in a network is called a:
- signal When we speak into a standard telephone today our voice is represented by
- DS stands for:
- A simple waveform used internally in digital electronic equipment and personal computers is:
- Is used to "wake" the receiver.
- A ________ pathway between two nodes or devices.
- The fundamental analog signal is called a ___________.
- The frequency range required for transmitting.
- ASCII, Extended ASCII and Unicode are examples of:
Down
- The input and output connections on a multiplexer are called:
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- The smallest element of data.
- Particular format of electrical pulses.
- What kind of sign transmits light pulses over a glass fiber?
- When a pulse has the same polarity as the preceding pulse this is called______
- The most common topology used in LAN implementation is the?
- A transmission mode in which information can only be transmitted in one direction.
- The device/process used to convert analog signals into digital signals is called a:
- The gradual loss of a transmission signal as it travels over a distance is called:
- The most common technique for voice digitization is called:______ Modulation
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
27 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • A ________ pathway between two nodes or devices. • ASCII, Extended ASCII and Unicode are examples of: • ...
Networks & Graphs Vocabulary Review 2018-02-28
Across
- The number of lines that go into a point.
- In the graph there is at least one line that exist between any two points.
- In the graph each vertex is used exactly once and the starting and ending vertices are the same.
- A line which starts and ends at the same point.
- A point that only has lines going into it.
- Points on a graph.
- In the graph all vertices are adjacent to each other.
- A graph that starts and ends at different points
- A graph that starts and ends at the same point.
- In the graph each edge is used exactly once and the starting and ending vertices are the not the same.
- The lines that connect the vertices.
Down
- Amount of lines that meet at a specific point.
- The graph each vertex is used exactly once and the starting and ending vertices are not the same.
- In the graph each edge is used exactly once and the starting and ending vertices are the same.
- In the graph the edges have direction, like a one-way street.
- Two points next to each other that share more than one line.
- Two points next to each other connected by a line.
- The number of lines that leave out of a point.
- A point that only has lines leaving out of it.
- A route you can tke from one point to another, sometimes through multiple edges.
20 Clues: Points on a graph. • The lines that connect the vertices. • The number of lines that go into a point. • A point that only has lines going into it. • Amount of lines that meet at a specific point. • The number of lines that leave out of a point. • A point that only has lines leaving out of it. • A line which starts and ends at the same point. • ...
Networks and topologies (J277) 2025-06-02
Across
- A server that stores website content and delivers web pages.
- A network confined to a small geographical area.
- A device that allows wireless devices to connect to a network (acronym).
- A network model where all computers share resources directly.
- A network that spans a large geographical area.
- The delay before a transfer of data begins.
- A client application used to access web pages.
- A device that forwards data packets between computer networks.
- A network topology where every node is connected to every other node.
- A network topology where all devices connect to a central hub.
- A common type of wired transmission media.
- Remote computing services accessed over the Internet.
- A device that connects devices in a network and filters traffic.
- Hardware that allows a computer to connect to a network (acronym).
Down
- Transmission media using light to carry data.
- A numerical label assigned to each device on a computer network.
- In a client-server model, a computer that requests services.
- The maximum data transfer rate of a network.
- An advantage of the star topology due to its hub.
- A global system of interconnected computer networks.
- In a client-server model, a computer that provides services.
- A key advantage of mesh topology, providing multiple paths for data.
- Providing space on a server for a website.
- A system that translates domain names into IP addresses (acronym).
24 Clues: A common type of wired transmission media. • Providing space on a server for a website. • The delay before a transfer of data begins. • The maximum data transfer rate of a network. • Transmission media using light to carry data. • A client application used to access web pages. • A network that spans a large geographical area. • ...
Data Communication and Networks 2025-11-23
Across
- – Topology with central hub
- – Maximum data rate of a channel
- – Model defining seven network layers
- – Horizontal division of network functions
- – Single backbone cable topology
- – Topology forming a closed loop
- – Forwards frames based on MAC address
- – Dedicated physical path switching
- – Transfer of digital information between devices
- – Connects networks using different protocols
- – Entire message sent from node to node
- – Actual successful data transfer rate
- – Private network extended to external users
Down
- – Group of interconnected computers
- – Divides data into packets
- – Physical or logical arrangement of a network
- – Sending data from sender to receiver
- – Forwarding data from source to destination
- – Private network within an organization
- – Metropolitan Area Network
- – Time delay in data transmission
- – Forwards packets using IP addresses
- – Combination of two or more topologies
- – Worldwide network of networks
- – Local Area Network
- – Protocol suite enabling the internet
- – Wide Area Network
- – Signal travel through a medium
- – Basic networking device that repeats signals
- – Topology with multiple redundant paths
30 Clues: – Wide Area Network • – Local Area Network • – Divides data into packets • – Topology with central hub • – Metropolitan Area Network • – Worldwide network of networks • – Maximum data rate of a channel • – Single backbone cable topology • – Topology forming a closed loop • – Signal travel through a medium • – Time delay in data transmission • – Group of interconnected computers • ...
Wireless & Emerging Networks crossword 2026-03-04
Across
- Antenna signal processing method that steers transmission direction
- Network of interconnected smart physical devices
- Space-based communication relay with high propagation delay
- Light-based medium immune to electromagnetic interference
- Reduction of signal strength over distance
- Multiple access technique used in LTE downlink
- Intelligent radio capable of dynamic spectrum access
- High-frequency spectrum above 24 GHz
- Software-programmable radio communication system
- Long-range low-power IoT communication technology
Down
- Organization that develops mobile communication standards
- Signal propagation phenomenon causing fading
- Fifth generation mobile network enabling ultra-low latency
- 5G antenna technology using large number of antennas
- All-IP 4G cellular communication standard
- 5G category supporting ultra-reliable low-latency communication
- Number of bits transmitted per second
- Device that collects environmental data in IoT
- Constellation-based modulation using amplitude and phase
- Common satellite orbit used for communication
- Parallel subcarrier transmission method that reduces inter-symbol interference
- Spatial multiplexing technique that increases channel capacity
22 Clues: High-frequency spectrum above 24 GHz • Number of bits transmitted per second • All-IP 4G cellular communication standard • Reduction of signal strength over distance • Signal propagation phenomenon causing fading • Common satellite orbit used for communication • Device that collects environmental data in IoT • Multiple access technique used in LTE downlink • ...
Unidad 2: La ciencia y tecnología 2025-04-26
Across
- Scientist
- To download
- Progress
- Invention
- Surgery
- Connections
- sociales Social networks
- electrónicos Electronic devices
- Advancement
- Password
- Thread
- Physiology
- To access
- Physics
- Report
- Biology
- Computer science
- To charge
Down
- Survey
- Innovation
- Graphics
- Engineer
- Wireless
- Research/investigation
- Data
- Access
- Statistics
- Link
- Surgeon
29 Clues: Data • Link • Survey • Access • Thread • Report • Surgery • Physics • Surgeon • Biology • Progress • Graphics • Engineer • Wireless • Password • Scientist • Invention • To access • To charge • Innovation • Statistics • Physiology • To download • Connections • Advancement • Computer science • Research/investigation • sociales Social networks • electrónicos Electronic devices
Word Wall 2021-08-25
20 Clues: list • nanny • goals • scrape • ration • increase • affection • authorized • evaluation • abnormality • better suited • possibilities • immune response • allergic reaction • clear and distinct • injury caused by heat • learning through listening • most advanced stage of HIV • functional neural networks • suitable for a particular age
Internet Hardware 2022-10-03
Across
- local area network
- a computer system that hosts websites
- Wide area network
- This is a cable that is used to connect multiple devices
- A boxy device that directs traffic between networks and devices
- multiple devices that communicate with each other
Down
- Where multiple devices are connected to a central hub
- A boxy device that connects a device to the internet
- A network of routers that create a single wireless network connection
- wireless access point
- This is a physical or software barrier between secured networks and outside connections
- network interface card
12 Clues: Wide area network • local area network • wireless access point • network interface card • a computer system that hosts websites • multiple devices that communicate with each other • A boxy device that connects a device to the internet • Where multiple devices are connected to a central hub • This is a cable that is used to connect multiple devices • ...
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Basic Network Glossary Crossword 2017-03-03
Across
- A program that requests data from a server
- Computer program that serves data using certain protocols in response to a request from a client
- Allows data communication between digital and analogue devices
- Communication across distance via cable, telephone, telegraph or broadcasting
- An intranet that can be partially accessed by certain outside users that lets businesses to share information over the Internet securely
- World-Wide Web, network of servers that serve hypertext documents to respond to client requests
- Device that can be accessed by a network using a unique address
- Most used cable LAN technology
- Two or more nodes that exchange information electronically
- Small group of data that forms a part of a larger thing like a webpage
- A length of wires insulated with plastic or rubber, used for sending data between a computer and the peripherals or between nodes and networks.
- Allows wireless nodes to connect to Internet
Down
- Network of computer networks, public or private, which may use any data protocol
- The ID that every node has to access the network, unique to each one
- A private network that uses TCP/IP
- Device that forwards packets between networks
- Radius spams larger than LAN (over cities/countries etc.) and can use private or public network like the Internet
- Agreed method for exchanging data
- Transmission Control Protocol over Internet Protocol, IP sorts data by type and sends in packet. TCP makes sure it is received properly
- Radius limited to nodes that are close together and are connected directly by cables or microwave transmission
20 Clues: Most used cable LAN technology • Agreed method for exchanging data • A private network that uses TCP/IP • A program that requests data from a server • Allows wireless nodes to connect to Internet • Device that forwards packets between networks • Two or more nodes that exchange information electronically • Allows data communication between digital and analogue devices • ...
Basic Network Glossary Crossword 2017-03-03
Across
- Most used cable LAN technology
- World-Wide Web, network of servers that serve hypertext documents to respond to client requests
- Allows data communication between digital and analogue devices
- The ID that every node has to access the network, unique to each one
- A program that requests data from a server
- Small group of data that forms a part of a larger thing like a webpage
- A private network that uses TCP/IP
- Radius limited to nodes that are close together and are connected directly by cables or microwave transmission
- Radius spams larger than LAN (over cities/countries etc.) and can use private or public network like the Internet
- Allows wireless nodes to connect to Internet
- An intranet that can be partially accessed by certain outside users that lets businesses to share information over the Internet securely
- A length of wires insulated with plastic or rubber, used for sending data between a computer and the peripherals or between nodes and networks.
Down
- Communication across distance via cable, telephone, telegraph or broadcasting
- Computer program that serves data using certain protocols in response to a request from a client
- Two or more nodes that exchange information electronically
- Agreed method for exchanging data
- Transmission Control Protocol over Internet Protocol, IP sorts data by type and sends in packet. TCP makes sure it is received properly
- Network of computer networks, public or private, which may use any data protocol
- Device that can be accessed by a network using a unique address
- Device that forwards packets between networks
20 Clues: Most used cable LAN technology • Agreed method for exchanging data • A private network that uses TCP/IP • A program that requests data from a server • Allows wireless nodes to connect to Internet • Device that forwards packets between networks • Two or more nodes that exchange information electronically • Allows data communication between digital and analogue devices • ...
Awesome Privacy Week '25 2025-01-27
Across
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- Malicious software designed to harm or exploit computers and networks.
- A European Union law that regulates data protection and privacy.
- A tool that encrypts internet connections to enhance privacy.
- A U.S. law that gives California residents rights over their personal data.
- The practice of protecting systems, networks, and programs from digital attacks.
- Publishing private or identifying information about someone online without consent.
- AI-generated media that mimics real people and can be used for deception.
- Small files stored on a user’s browser to track online activities.
- A tool used to record every keystroke typed on a keyboard.
- A browser feature that prevents storing history, cookies, and site data.
- The act of removing or disguising personal identifiers from datasets.
- A key document that explains how an individual's data is stored, used, and shared.
Down
- The process of removing personal identifiers from datasets.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- Software vulnerability unknown to developers and exploited by hackers.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- Theft Fraudulent use of someone's personal data to commit crimes.
- Unauthorized access or damage to computer systems and networks.
- Data that describes and gives information about other data.
- Malicious software that locks users out of their data until a ransom is paid.
23 Clues: Malicious software that secretly gathers user information. • A tool used to record every keystroke typed on a keyboard. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Ciencia y tecnología 2025-02-27
22 Clues: cure • laptop • health • online • illness • website • internet • username • symptoms • password • to upload • to update • cell phone • to comment • to download • text message • email address • to surf the web • social networks • electronic devices • to connect to the internet • to disconnect from the internet
Mixed: Intermediate/Advanced 10 2024-02-06
COMPUTER VISION FOR HEALTHCARE APPLICATIONS 2024-02-25
14 Clues: Vision • Forests • detection • Operations • Parameters • interaction • Recognition • Neural Networks • Vector Machines • Assisted Living • Appearance Models • systems in surgery • Detection and Tracking: • rehabilitation and training
R&D Engineering Bootcamp 2019-11-18
Across
- VMware NSX as the Foundation for the ________ Cloud Network
- Cloud__________ Business Unit
- IT Priority: Transform __________ and Security
- Lets you run multiple operating systems and applications on a single server
- IT Priority: _______ the Cloud Journey
- Networking and ____________ Business Unit
- _________services augment one or more logical networks and/or connect multiple logical networks together.
- product and ______ Services
- The'P' in our EPIC2 Values
Down
- Software that runs as the operating system of the ESX system
- good companies solve problems. Great companies create_________.
- How many dogs does Jenn have?
- A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
- IT Priority: Empowering the ______ Workspace
- VMware's beloved CEO
- Software_______data Center
- ________is VMware’s software-defined storage solution.
- ________ agility is the ability to process information with ease, speed & optimize mental flexibility
18 Clues: VMware's beloved CEO • Software_______data Center • The'P' in our EPIC2 Values • product and ______ Services • How many dogs does Jenn have? • Cloud__________ Business Unit • IT Priority: _______ the Cloud Journey • Networking and ____________ Business Unit • IT Priority: Empowering the ______ Workspace • IT Priority: Transform __________ and Security • ...
Technology 2015-06-09
Across
- a device that accepts text and graphic output from a computer and transfers the information to paper
- a program that interacts with a particular device or special (frequently optional) kind of software
- a is a device that channels incoming data
- the primary text input device of a computer
- a private network that is contained within an enterprise
- a wireless, portable personal computer with a touch screen interface
- a cellular telephone with an integrated computer and other features not originally associated with telephones
- a term used to describe telecommunications in which electromagnetic waves carry the signal
- a small device that a computer user pushes across a desk surface in order to point to a place on a display
- is a device that routes traffic between virtual local area networks
Down
- the physical aspect of computers, telecommunications, and other devices
- a computer program that provides services to other computer programs
- a term for any small mobile hand-held device that provides computing and information
- a worldwide system of computer networks - a network of networks
- a device that accepts information (in the form of digitalized data) and manipulates it for some result
- a general term for the various kinds of programs used to operate computers and related devices
- the requesting program or user in a client/server relationship
- a series of points or nodes interconnected by communication paths.
- a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display
- the electronic holding place for instructions and data that your computer's microprocessor can reach quickly
20 Clues: a is a device that channels incoming data • the primary text input device of a computer • a private network that is contained within an enterprise • the requesting program or user in a client/server relationship • a worldwide system of computer networks - a network of networks • a series of points or nodes interconnected by communication paths. • ...
crossword 28 2018-07-17
26 Clues: use • boy • boys • than • this • again • comes • young • to do • social • lesser • become • banking • through • networks • no, none • more often • music offer • differences • broad, wide • well, surely • almost , nearly • boys, young people • presence, existense • foreigner, immigrant • native, autochthonous
Computer Networks - MAP - Quiz 2016-10-03
Across
- services with more bandwidth that a telephone service
- number of samples per second
- routers are divided into this
- The rules and conventions used in this conversation
- A set of layers and protocols of a network
- unwanted energy from the source
- lots of data passing over a single line
- distance between two maxima/minima
Down
- number of oscillations per second
- unreliable, connection-less protocol
- set of primitives (operations) available to a user process
- incoming packet send through all outgoing lines
- connection that allows traffic in only one way
- Transfer data to all
- loss of energy as signal propagates
- packet used to inform congestion
- calculated for error detection
- network of networks
- used for naming in the internet
- reliable, connection-oriented protocol
20 Clues: network of networks • Transfer data to all • number of samples per second • routers are divided into this • calculated for error detection • unwanted energy from the source • used for naming in the internet • packet used to inform congestion • number of oscillations per second • distance between two maxima/minima • loss of energy as signal propagates • ...
anatomy of a computer 2019-09-12
Across
- one dot on a screen
- a copy of a file or set of files
- main circuit board of the computer
- having two values,like 0 and 1
- device that displays computer out put
Down
- upgrades your computers pictures
- turns your pc off and on
- Digital devices that takes single pictures
- connects several networks and controls the traffic of data among the networks
- Place in a computer case to put drives and other devices
- record a file to storage
- main memory,violated memory that is erased when the power is turned off
12 Clues: one dot on a screen • turns your pc off and on • record a file to storage • having two values,like 0 and 1 • upgrades your computers pictures • a copy of a file or set of files • main circuit board of the computer • device that displays computer out put • Digital devices that takes single pictures • Place in a computer case to put drives and other devices • ...
Technology Alejandra 2022-02-16
Across
- a defect in batteries where they remembered another charge as their 💯 if not discharged fully
- HDMI
- device that detects some type of input from the physician environment
- software installed in the computer to print
- connections of several devices
- a network that extends over a metropolitan area
- are used to connect devices in networks
Down
- sensor the technology equivalent of a bats’echolocation
- USB
- “holes” to connect a device to a router with a cable
- DPI
- single location network in which all devices belong to the same person
12 Clues: USB • DPI • HDMI • connections of several devices • are used to connect devices in networks • software installed in the computer to print • a network that extends over a metropolitan area • “holes” to connect a device to a router with a cable • sensor the technology equivalent of a bats’echolocation • device that detects some type of input from the physician environment • ...
NEURAL NETWORKS AND DEEP LEARNING 2024-02-21
Across
- Layer - Receives data in a neural network
- - Basic unit of early neural networks
- Learning - Complex neural networks for advanced tasks
Down
- Function - Determines output of a neuron
- Layer - Provides final results in a neural network
- - Characteristics of the input data
- - Large dataset for image recognition
- Network - Network of interconnected perceptrons
- Layers - Intermediate layers in a neural network
- - Individual points of color in an image
10 Clues: - Characteristics of the input data • - Large dataset for image recognition • - Basic unit of early neural networks • Function - Determines output of a neuron • - Individual points of color in an image • Layer - Receives data in a neural network • Network - Network of interconnected perceptrons • Layers - Intermediate layers in a neural network • ...
Neural Nets in Image & Language 2024-04-13
Across
- Various uses of neural networks in medical diagnostics, treatment planning, and patient care.
- Field of study focused on enabling computers to understand, interpret, and generate human language.
- Task in NLP to identify and classify elements.
- Process of identifying objects or patterns in images using neural networks.
Down
- Computing systems inspired by the biological neural networks of animal brains.
- Type of neural network architecture commonly used for image processing tasks.
- Architecture used for image recognition tasks.
- Neural network architecture designed to handle sequential data and maintain memory across time steps.
- State-of-the-art neural network architecture for natural language processing tasks.
9 Clues: Architecture used for image recognition tasks. • Task in NLP to identify and classify elements. • Process of identifying objects or patterns in images using neural networks. • Type of neural network architecture commonly used for image processing tasks. • Computing systems inspired by the biological neural networks of animal brains. • ...
SN33003FP Chapter 1 Crossword 2024-07-03
Across
- Sensors and alert networks that warn of potential attacks.
- Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- Highly trained hackers who steal secrets or commit sabotage for their government.
- Threats posed by the increasing use of mobile devices to access enterprise information.
- Sharing of critical information about serious attacks to prevent similar ones.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Framework for implementing cybersecurity measures within an organization.
- Black hat hackers who steal money from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- Legislation to discourage cyberattacks and punish cyber criminals.
- Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- Threats from employees or partners with inside access and knowledge.
- Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who hack for fun, not profit.
- Threats that exploit weaknesses to gain access to internal resources.
- Technology connecting billions of devices to the Internet, affecting data protection needs.
- Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.
18 Clues: Sensors and alert networks that warn of potential attacks. • Black hat hackers who steal money from consumers and businesses. • Legislation to discourage cyberattacks and punish cyber criminals. • Threats from employees or partners with inside access and knowledge. • Threats that exploit weaknesses to gain access to internal resources. • ...
Computer Science Crossword Puzzle 2016-02-21
Across
- Universal resource Locator
- Domain Name System
- Composed of HTML tags and multimedia files
- A tool for using the web and its content
- The guy whose video we were required to watch about Large Networks
- A computer created by apple
- Having the exclusive right to use (legal matters)
- The main technology for local area networks
Down
- Can be embedded in Webpages to show content
- Not influenced by personal feelings or opinions in considering and representing facts
- An application that lets you create html files
- The act of telling a story
- Using a computer to gain access to gain information
- Wide-area-network
- An item you click on a webpage where you can go to another site or content
- An area to store data on computers
- Using someone's copyright without permission but isn't taking the whole content
- Another word for imitating someone else
18 Clues: Wide-area-network • Domain Name System • Universal resource Locator • The act of telling a story • A computer created by apple • An area to store data on computers • Another word for imitating someone else • A tool for using the web and its content • Composed of HTML tags and multimedia files • Can be embedded in Webpages to show content • ...
Cyber Safety Irene 2016-05-30
Across
- Engine something you can search information on
- a program that lets you find,see and hear material on website
- a giant collection of networks of networks
- an add that automatically comes onto the screen
- a starting point on the web
- Tag the nickname a user has chosen to be identified by when playing Internet Games
- a security system to keep your things safe
- a search engine visual for parents mostly
- to upload information to the web
Down
- a bad thing that can ruin your device
- a website to search with
- a name that a user selects for you
- a thing you can chat on with family and friends
- to send information from your computer to another computer
- an adviser that teaches you how to use technology
- a secret code to open something
- a program,or set of instructions
- a method of sending short messages
- something you can send to others
- a small hand-controlled divide for pointing and clicking
20 Clues: a website to search with • a starting point on the web • a secret code to open something • something you can send to others • to upload information to the web • a program,or set of instructions • a name that a user selects for you • a method of sending short messages • a bad thing that can ruin your device • a search engine visual for parents mostly • ...
Computer Science 2024-03-21
Across
- Analyse de données
- Contrôle de version
- Apprentissage profond
- Interface utilisateur (IU)
- Algorithmes
- Système d'exploitation (SE)
- Développement web
- Cryptage
- Décryptage
- Réalité augmentée (RA)
- Matériel informatique
- Vision par ordinateur
- Expérience utilisateur (UX)
- Algorithme
- Réalité virtuelle (RV)
- Langage de programmation
- Robotique
- Base de données
- Apprentissage automatique
- Intelligence artificielle (IA)
- Structure de données
- Internet des objets (IdO)
- Architecture logicielle
Down
- Informatique quantique
- Technologie de l'information (TI)
- Développement de logiciels
- Compilateur
- Cybersécurité
- Informatique en nuage
- Arrière plan
- Frontal
- development Développement d'applications mobiles
- Génie logiciel
- Graphisme informatique
- Exploration de données
- Réseaux neuronaux artificiels
- networks Réseaux neuronaux
- Débogage
- Programmation
- Réseau
40 Clues: Réseau • Frontal • Cryptage • Débogage • Robotique • Décryptage • Algorithme • Compilateur • Algorithmes • Cybersécurité • Arrière plan • Programmation • Génie logiciel • Base de données • Développement web • Analyse de données • Contrôle de version • Structure de données • Apprentissage profond • Informatique en nuage • Matériel informatique • Vision par ordinateur • Informatique quantique • Graphisme informatique • ...
Alan 2024-06-11
Across
- Software designed to detect and destroy computer viruses.
- A device that outputs printed documents.
- A wireless technology standard for exchanging data.
- A device used to make voice calls.
- The main circuit board of a computer.
- A peripheral used to input text into a computer.
- A mobile operating system developed by Google.
- A device that forwards data packets between computer networks.
- It is the digital part of a computer
- A method of exchanging digital messages over the Internet.
Down
- It is the phisical part of the computer
- An electronic device for storing and processing data.
- A device that projects images onto a screen.
- A unit of data storage.
- A data storage device using solid-state memory.
- An output device that displays information in visual form.
- A global network that connects millions of private, public, academic, business, and government networks.
- A portable computer.
- Computer hard drive (abbreviated).
- A network security system that monitors and controls incoming and outgoing network traffic.
20 Clues: A portable computer. • A unit of data storage. • A device used to make voice calls. • Computer hard drive (abbreviated). • It is the digital part of a computer • The main circuit board of a computer. • It is the phisical part of the computer • A device that outputs printed documents. • A device that projects images onto a screen. • ...
NETWORKING CONCEPTS 2025-05-23
Across
- Wireless technology used to interconnect devices
- One star network is connected with other star networks
- Larger network than LAN
- Simplest form of network
- Certain sets of rules that determine how data should be transferred
- Most commonly used network card
- Provides a direct contact b/w source and destination
- Computer network restricted to an organization
Down
- Each computer in a network
- Connects your computer to the available internet connection
- Connects computer located at distant places
- Group of computers linked together
- User is given a unique login name and password
- Connects two different types of networks with each other
- Each node is connected to every other node in the network
- each device is connected to a central computer using point to point connection
- used in both LAN and WAN topologies
- used to connect all the computers in a network
- Cover a range of less than 10 meters
- Represents wireless local area network
20 Clues: Larger network than LAN • Simplest form of network • Each computer in a network • Most commonly used network card • Group of computers linked together • used in both LAN and WAN topologies • Cover a range of less than 10 meters • Represents wireless local area network • Connects computer located at distant places • User is given a unique login name and password • ...
Social Studies Review 2023-04-16
Across
- A trade route stretching from China to Europe.
- Creator of the Mongol Empire.
- Movement of raw materials from colonies to be manufactured.
- The expanding of world trade networks and economies.
- The expansion of lifestyles over global networks.
- Political decisions having international impacts.
- The rise of factories and manufactured goods.
- One of the largest empires in history.
Down
- The process of becoming more globally interconnected.
- The process of conquering and settling other lands.
- The numbering system we use today.
- Materials such as wood, iron, coal, etc.
- The destruction of a group of people or culture.
- One country dominating another politically, economically, and militarily.
- Empire that conquered and colonized much of Central and South America.
- Discovered the New World for Europeans in 1492.
- Economic system where trade and industry are controlled by private individuals.
- Silks, spices, and other expensive items.
18 Clues: Creator of the Mongol Empire. • The numbering system we use today. • One of the largest empires in history. • Materials such as wood, iron, coal, etc. • Silks, spices, and other expensive items. • The rise of factories and manufactured goods. • A trade route stretching from China to Europe. • Discovered the New World for Europeans in 1492. • ...
M3--Lesson 25: Networks 2016-01-04
Across
- Wireless technology that can deliver max speeds of up to 7mbps to your cell phone, home computer, or a car.
- Type of fiber-optic telephone line; provides phone service for a commercial building.
- Internet connection technology that provides for the transfer of info over copper telephone lines.
- Link from one computer to another through which data can be transmitted.
- A server that acts as an intermediary between a user and the Internet.
- Computer configuration in which one or more computers on the network acts as a server.
- Communications hardware device that facilitates the transmission of data.
- Computer architecture in which all of the computers on a network are equal; no computer designated as the server.
- Computer network that covers a large geographical area.
- Expert computer user that invades someone else's computer.
- An ISP that provides connection speeds more than 30 times faster than dial-up connections.
- Junction where information arrives and is then forwarded in one or more directions to other computers or devices.
- Allows outside organizations to access internal info systems.
Down
- Device that uses coaxial cable to send and receive data.
- Variation of LAN that uses no physical wires.
- High end programs designed to provide network control and include special functions for connecting computers.
- Device on a network
- Security measure that uses authentication that examines a fingerprint, voice pattern, etc. to gain access to a secure area.
- Creates a buffer between an internal network and the internet.
- The largest network used as a communication tool.
- Designed for exclusive use of computer users within an organization.
- Computer that uses the services of another program.
- Computer that handles requests for data, email, file transfers, and other network services.
- World's collection of interconnected commercial and government-owned voice-oriented systems.
- A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
- Series of connected personal computers within a confined space, such as an office building.
26 Clues: Device on a network • Variation of LAN that uses no physical wires. • The largest network used as a communication tool. • Computer that uses the services of another program. • Computer network that covers a large geographical area. • Device that uses coaxial cable to send and receive data. • Expert computer user that invades someone else's computer. • ...
Groups, Networks, and Organizations 2017-02-08
Across
- George Ritzer's term describing the spread of bureaucratic rationalization and the accompanying increases in efficiency and dehumanization.
- A three-person social group.
- A group that provides a standard of comparison against which we evaluate ourselves.
- In very cohesive groups, the tendency to enforce a high degree of conformity among members, creating a demand for unanimous agreement.
- Authority based in laws, rules, and procedure, not in the heredity or personality of any individual leader.
- A theory of group formation and maintenance that stresses the need of individual members to feel a sense of belonging.
- A temporary gathering of people in a public place: members might interact but don't identify with each other and do not remain in contact.
- Social groups whos interactions are mediated through informed technologies.
- A group that one identifies with and feels a loyalty toward.
- Collections of people who share a physical location, but don't have lasting relations.
- The application of economic logic to human activity; the use of formal rules and regulations in order to maximize efficiency without consideration of subjective or individual concerns.
- Exerting group controls over others' decisions.
- Power that is backed by a source of threat.
- A collection of people that share some attribute, can identify with each other, and interact with each other.
- The people who are most important to our self.
- Leadership concerned with maintaining emotional and rational harmony with a group.
- A two-person social group.
- People who share one or more attributes, but lack a sense f common identity or belonging.
- Groups toward which an individual feels opposition, rivalry, or hostility.
Down
- The legitimate right to wield power.
- The web of direct and indirect ties connecting an individual to other people who may also affect the individual.
- Power that is supported by persuasion.
- Leadership that is task or goal orientated.
- Authority based in the perception of remarkable personal qualities in a leader.
- The ability to control the actions of others.
- Authority based in a custom, birthright, or divine right.
- A type of secondary group designed to perform tasks efficiently, characterized by specialization, technical competency, hierarchy, written rules, impersonality, and formal written communication.
- The patterns of interaction between groups and individuals.
- The phenomenon in which as more individuals are added to a task, each individual contributes a little less; a source of inefficiency when working in teams.
- Groups larger and less intimate than primary groups.
- The sense of solidarity or loyalty that individuals feel toward a group to which they belong.
- Connections between individuals.
32 Clues: A two-person social group. • A three-person social group. • Connections between individuals. • The legitimate right to wield power. • Power that is supported by persuasion. • Leadership that is task or goal orientated. • Power that is backed by a source of threat. • The ability to control the actions of others. • The people who are most important to our self. • ...
Data Communications & Networks II 2012-10-07
Across
- Acronym for Classless Inter-Domain Routing
- Older network designs always placed the router at the ______ of the network.
- UDP Protocol is ___________ technology.
- Particular format of electrical pulses.
- Implementing dynamic NAT automatically creates a __________ between your internal network and outside networks.
- ATM stands for:
- At the TCP/IP network access layer, the protocol data unit is called a ___________.
- Filtering, flooding and transmitting frames is the function of a _____________.
- A disadvantage of satellite communication is a ______ delay
- Which harware device might be found in the access layer of the Cisco model?
- PING stands for __________.
- If multiple errors are detected in an ATM packet the packet is:
- The TCP/IP Internet layer corresponds to the OSI ___ layer.
Down
- CSU stands for:
- Bandwidth is typically represented in bits per ________.
- Acronym for Wide Area Network
- The inter-network processor that is an interface between two different or dissimilar networks.
- MAN stands for:
- An increasingly popular method of distributing network at home is the _ _ _ _.
- The TCP/IP host-to-host layer corresponds to the OSI____ layer.
- An example of a routed protocol would be ____.
- At this layer, speed and latency are of the utmost concer...
- A short range device used for ID cards, security devices and can replace UPC code.
- The transmission of light pulses over glass fiber is called _________ signaling.
- The first 48 bits of an Ethernet frame is the ________.
- Another name for CIDR is:
- TCP Protocol is ________ circuit technology.
- At the TCP/IP host-to-host layer the protocol data unit is called a ____________.
- At the TCP/IP internet layer the protocol data unit is called a __________.
- A condition when a communications link, path or network experiences a load that exceeds it's capacity is ___________.
30 Clues: CSU stands for: • MAN stands for: • ATM stands for: • Another name for CIDR is: • PING stands for __________. • Acronym for Wide Area Network • UDP Protocol is ___________ technology. • Particular format of electrical pulses. • Acronym for Classless Inter-Domain Routing • TCP Protocol is ________ circuit technology. • An example of a routed protocol would be ____. • ...
Graphs and Networks #2 2020-08-01
Across
- A vertex that is not connected to any other vertex
- A point in a graph that represents an object
- A trail that starts and ends at the same vertex
- A route through a graph from one vertex to another along the edges
- A line in a graph that connects two vertices
- A graph that has no isolated vertices and no separate parts
- A graph that has numbers associated with its edges
- A graph that can be drawn so that no two edges cross over
- An edge that connects a vertex to itself
- A square matrix that records the number of edges connecting each pair of vertices
- A diagram that shows the connections between objects
- The number of edges attached to a vertex
Down
- A graph with directions associated with the edges
- An open path that visits every vertex of the graph
- A graph that does not have any loops or multiple edges
- A walk that has no repeated edges
- An edge that if removed would leave the graph no longer connected
- A closed trail that involves every edge of the graph
- A walk that starts and ends at different vertices
- A walk that starts and ends at the same vertex
- A closed path that visits every vertex of the graph
- A closed path
- A walk that has no repeated edges AND no repeated vertices
- A weighted graph where the weights represent physical quantities such as distance time or cost
- An area in a graph enclosed between edges
25 Clues: A closed path • A walk that has no repeated edges • An edge that connects a vertex to itself • The number of edges attached to a vertex • An area in a graph enclosed between edges • A point in a graph that represents an object • A line in a graph that connects two vertices • A walk that starts and ends at the same vertex • A trail that starts and ends at the same vertex • ...
Networks and Founding Teams 2024-11-25
Across
- – It concerns connecting people which will be beneficial for each other’s business.
- – A state university owned by the government that offers incubation programs.
- – They are hired to fill the need for talents in a business.
- – They are great sources for entrepreneurs to be successful in business.
- – A place for startups that offer support staff and equipment for development.
- media – A trend today for making it easy to build a network.
- – The Philippines is known for launching and nurturing these.
- – Founding members should be _______.
- – A partnership program between Globe telco-backed Kickstart Ventures and web engineering firm Proudcloud.
- – An individual who makes the hardest decisions, and the one that is looked up to.
- – An individual who always completes tasks whether complex or not.
- – The quality of an entrepreneur that enables to be reached out by others to effectively network.
- – They do not have salary and only earn from equity, but they are the basis as to when a company fails or succeeds.
- – A good source of new customers for entrepreneurs who wants to achieve business goals easier.
Down
- – The possibility to achieve something. It involves joint ventures, client leads, and partnership, etc.
- – Not only invests in money but also in relationships as well.
- – Comes from the business owner that can help an entrepreneur to improve business and personal life.
- – The country that uses Rotary Club membership to network both personal and business matters.
- – The means to exchange knowledge and information to one another.
- – It is considered vital in networking. It involves passing learned lessons about life and business to others.
- - The scope of mentor-driven business network by accelerators.
- – The last name of Mark Zuckerberg’s mentor.
- – The scope of mentor-driven business network by incubators.
- Clubs – Ideal networking groups for entrepreneurs who aims to combine services to their communities.
- – A place for existing business that helps them achieve growth.
- – They are ought to join business meetings, events, awards, and seminars, to personally interact with people in the industry.
- Animal – An individual who is a strong salesperson.
- Team – These offer a good chance for the success of a startup. They cannot be changed.
- – A phenomena that cannot be avoided and that needs to be accepted to operate a business with positivity.
- – The company that has an incubator entitled “Ideaspace Foundation”
30 Clues: – Founding members should be _______. • – The last name of Mark Zuckerberg’s mentor. • Animal – An individual who is a strong salesperson. • – They are hired to fill the need for talents in a business. • – The scope of mentor-driven business network by incubators. • media – A trend today for making it easy to build a network. • ...
Internet Hardware 2022-10-03
Across
- A boxy device that connects a device to the internet
- This is a physical or software barrier between secured networks and outside connections
- wireless access point
- A network of routers that create a single wireless network connection
- Where multiple devices are connected to a central hub
Down
- multiple devices that communicate with each other
- a computer system that hosts websites
- local area network
- network interface card
- Wide area network
- A boxy device that directs traffic between networks and devices
- This is a cable that is used to connect multiple devices
12 Clues: Wide area network • local area network • wireless access point • network interface card • a computer system that hosts websites • multiple devices that communicate with each other • A boxy device that connects a device to the internet • Where multiple devices are connected to a central hub • This is a cable that is used to connect multiple devices • ...
My Crossword Puzzle 2022-09-30
Across
- Wireless capable devices and networks to connect through a wireless standard
- Directs traffic between networks and devices
- Stores web server software and a website's component files
- Devices or nodes linked together, branching off other devices or nodes
- Large network of information that is not tied to a single location
- Collection of devices connected together in one physical location
Down
- One central hub acts as a conduit to transmit messages
- Network multiple computers together
- Communication and interaction between devices
- Enforces a network boundary
- Modulates and demodulates analog carrier signals
- Connect to a network
12 Clues: Connect to a network • Enforces a network boundary • Network multiple computers together • Directs traffic between networks and devices • Communication and interaction between devices • Modulates and demodulates analog carrier signals • One central hub acts as a conduit to transmit messages • Stores web server software and a website's component files • ...
Technology Terms 2023-08-16
Across
- A point within a network that interconnects with other networks
- currently connected to a network or to the Internet.
- A set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers
- refers to unsolicited email messages sent for marketing purposes
- A piece of code or data created by a web server and stored on a user's computer.
- a standard or set of rules that computers and other devices use when communicating with one another.
- A measure of computer processor storage and real and virtual memory
- a microprocessor that performs many functions and calculations that make your computer run
- refers to a software program that has been developed to do harm to other computers.
- the most common way of connecting computers on a network with a wired connection.
- a way of sending messages over the internet.
- a saved link to a particular Web page
- the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet
- o load and initialize the operating system on a computer
- A software program that allows you to surf the web
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider
Down
- the number of distinct pixels that make up the display on a computer monitor. It is denoted in DPI (dots per inch)
- a website's text and information, as opposed to its design and structure
- measures designed to protect your computer, device or network from cybercrime
- the smallest unit of measurement in computing
- a device that allows computers to transmit information to each other via ordinary telephone lines
- the maximum amount of data that can travel a communications path in a given time
- the brains of your computer. It is responsible for performing calculations and tasks that make programs work
- he reduction of the size of a file
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet
- to archive and compress them into one file of smaller size using a program
- a piece of programming code inserted into other programming to cause damage
- the process of converting electronic data to an unrecognizable or encrypted form, one that cannot be easily understood by unauthorized parties
- a set of computers on a network that are managed as a unit
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a technology that allows computers and other devices to communicate via a wireless signal
31 Clues: he reduction of the size of a file • a saved link to a particular Web page • a way of sending messages over the internet. • the smallest unit of measurement in computing • A software program that allows you to surf the web • currently connected to a network or to the Internet. • o load and initialize the operating system on a computer • ...
Jack Dempsey networks crossword 2019-12-12
Across
- sends and receives radio waves via a wireless router
- any hardware connected to a computer
- a group of two or more computers which are connected together.
- (_*_) NIC: built into every mobile networked device capable of connecting to the internet
- the type of topology the internet is
- an application that runs on the internet
- (_*_) broadband: the delivery of an internet service using mobile phone technology
- enables computer and file server to communicate
- language used to make web pages
- a type of topology with all computers connecting to a single central switch/server
Down
- a type of topology with data going through all computers until reaching the server
- (_*_) of (_*_) things: a term used to describe the increasing number of devices being connected to the internet
- person who buys up web domain names
- designed to enable a range of portable devices to connect in a close proximity
- an agreed set of rules on a network for finding and receiving data
- (_*_) fibre: allows data to be transmitted much faster than other technologies
- a type of topology with one backbone cable connecting all the computers
- a single connection point for a group of computers.
- connects two or more networks together
19 Clues: language used to make web pages • person who buys up web domain names • any hardware connected to a computer • the type of topology the internet is • connects two or more networks together • an application that runs on the internet • enables computer and file server to communicate • a single connection point for a group of computers. • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
Networked Entertainment in Computer Networks 2025-05-21
Across
- Protocol used to control streaming media sessions
- Software that compresses and decompresses media files
- Direct sharing of files between users over a network
- Television content delivered over Internet Protocol networks
- Playing games over the internet with others
- Temporary storage to ensure smooth playback of streaming media
- Popular streaming service for movies and series
- Maximum data transfer rate of a network
- Quality measure for network performance, especially in streaming
Down
- Playing video or audio content directly from the internet
- Protocol used for voice communication over IP networks
- Variation in packet arrival time, affecting streaming quality
- Delay between a user's action and the response in streaming
- Method of sending data to multiple recipients simultaneously
- Device used to receive and decode digital television broadcasts
15 Clues: Maximum data transfer rate of a network • Playing games over the internet with others • Popular streaming service for movies and series • Protocol used to control streaming media sessions • Direct sharing of files between users over a network • Software that compresses and decompresses media files • Protocol used for voice communication over IP networks • ...
Green IT Crossword 2023-11-27
Across
- What is the most common greenhouse gas?
- ... energy is energy from resources that are naturally replenished on a human timescale
- The act or process of consuming
- The short name of malicious software
- Unwanted or unusable materials
- The protection of computer systems and networks from attacks by malicious actors
- Your mostly used device
- The process of converting waste materials into new materials and objects
- The production and discharge of something, especially gas or radiation
Down
- ... is a social goal for people to co-exist on Earth over a long time
- Make smaller or less in amount, degree, or size
- Tool for reporting spam and physhing emails
- What kind of footprint is associated with global warming?
- The network of networks
- The action of one object coming forcibly into contact with another
- Our platform of communication
- The process of encoding information
- Ticketing system
18 Clues: Ticketing system • The network of networks • Your mostly used device • Our platform of communication • Unwanted or unusable materials • The act or process of consuming • The process of encoding information • The short name of malicious software • What is the most common greenhouse gas? • Tool for reporting spam and physhing emails • ...
GLian - Network Devices 2023-01-03
Across
- protects data and equipment on a network from unauthorized access
- receives data from one port and sends it to others
- low cost, microsegments a LAN
- uses IP addresses to forward traffic to other networks
- unsupported systems still used in modern networks (hyphen space)
- uses radio waves to connect to wireless NIC(acronym)
- passively monitors traffic on a network(acronym)
- collects incoming cable runs in a facility (hyphen space)
- a cloud device that allows administrators to manage network devices (hyphen spaces)
- all inbound and outbound traffic flows through a...(acronym)
Down
- related to many legacy systems (hyphen space)
- divides and filters LAN segments
- monitors all end devices in a network (acronym)
- regenerates weak signals
- basically an all in on security system (acronym)
- uses existing electrical wiring to connect devices (acronym)
- provides physical connection to network
- method for powering devices without a battery or outlet (acronym)
18 Clues: regenerates weak signals • low cost, microsegments a LAN • divides and filters LAN segments • provides physical connection to network • related to many legacy systems (hyphen space) • monitors all end devices in a network (acronym) • basically an all in on security system (acronym) • passively monitors traffic on a network(acronym) • ...
Chapter 3 2012-09-05
Across
- accessing computers or networks without permission?
- browser lets you find and veiw web pages?
- a scheme used to take money under false pretenses?
- term often used to describe rules for proper online behavior?
- electronic transfer of messages?
- users can post messages?
- virus a destructive program?
- computer that links with another computer is called?
Down
- theft A that person can pretend to be the person to own there information
- names URL contains this example:www.nasa.gov
- a special hardware and software is called a _______.
- Search engines such as google find the _______ of a word?
- resource locator a address for a website EXAMPLE:www.google.com
- a web of computer networks that spans the earth?
- Wide Web An important part of the internet?
15 Clues: users can post messages? • virus a destructive program? • electronic transfer of messages? • browser lets you find and veiw web pages? • Wide Web An important part of the internet? • names URL contains this example:www.nasa.gov • a web of computer networks that spans the earth? • a scheme used to take money under false pretenses? • ...
Chapter 3 2012-09-05
Across
- a word used to find a certain site
- accessing computers or networks without permission
- allows users to post messages for others to read
- the electronic transfer of messages
- a web of computer networks that spans the earth.
- the selling and buying of products on the Internet
- a list of sites that you created
- a scheme used to take money under false pretenses
Down
- theft when someone steals somebody's identity
- moral standards or values
- names URL's contain these
- Wide Web a system of computers that can handle documents formatted in a special language
- a term often used to describe rules for proper online behavior\
- a feature to find information
- any unsolicited or unwanted message
15 Clues: moral standards or values • names URL's contain these • a feature to find information • a list of sites that you created • a word used to find a certain site • the electronic transfer of messages • any unsolicited or unwanted message • theft when someone steals somebody's identity • allows users to post messages for others to read • ...
Jamiah Cybersecurity Crossword 2026-04-02
Across
- - Fake messages used to trick people into giving information
- - Protection of computer networks from threats
- - A malicious program that spreads by attaching to files
- - Software designed to harm or exploit a computer system
- - Malware that hides deep in a system to avoid detection
- - Malware that spreads across networks without user action
- - A secret word used to access accounts
Down
- - The process of converting data into a secure code
- - Software that secretly tracks user activity
- - A system that blocks unauthorized access to a network
- - Software that detects and removes malware
- - Malware that locks files and demands payment
- - The trail of data you leave online
- - A person who gains unauthorized access to systems
- - A login method requiring two forms of verification
15 Clues: - The trail of data you leave online • - A secret word used to access accounts • - Software that detects and removes malware • - Software that secretly tracks user activity • - Malware that locks files and demands payment • - Protection of computer networks from threats • - The process of converting data into a secure code • ...
DCS 2017-06-26
Across
- combined Digital and analogue signal
- display where alarms can be suppressed temporarily
- Bumpless transfer
- topology where every node can hear every message
- Communication in one direction only
- Maximum number of items to be displayed on a trend graph
- graphical display
- feedforward controller
- displays all eight slots together
- symbol is K
- field Devices
- related to effect of work environment on health
- topology with automatic acknowledgement of messages
- Has a hold device
- Error checking method
Down
- Live graphical display of PV
- Units designed to connect dissimilar networks
- Number of controller slots
- All digital signal
- Management layer for finances
- connects two separate networks to form a logical network
- one of the inputs to feedforward controller
- 4-20mA signal
- K Type
- Display is also called Control studio in Delta V
- ratio station
- All functions available at this level
- Type of barrier in intrinsic safety
- hub fails the whole network fails
29 Clues: K Type • symbol is K • 4-20mA signal • ratio station • field Devices • Bumpless transfer • graphical display • Has a hold device • All digital signal • Error checking method • feedforward controller • Number of controller slots • Live graphical display of PV • Management layer for finances • displays all eight slots together • hub fails the whole network fails • ...
PARTS OF A COMPUTER 2024-06-05
Across
- (Central Processing Unit) - Brain of the computer.
- - Enclosure for computer components.
- - Main circuit board of the computer.
- - Connects a laptop to multiple peripherals.
- - Screen that displays information.
- - Pointing device on laptops.
- State Drive - Faster storage device.
- - Connects to wired networks.
- Card - Handles rendering of images and videos.
- - Powers the BIOS memory.
- - Device for digitizing documents.
- - Dissipates heat from components.
- - Allows for additional cards to be added.
- - Processes audio data.
- - Camera for video conferencing.
- - Interface for connecting external devices.
Down
- - Reads and writes CDs and DVDs.
- - Storage device for files and programs.
- - Device for printing documents.
- - Input device for audio.
- - Lights indicating power status.
- - Connects to wireless networks.
- - Connects the computer to a network.
- - Keeps the computer from overheating.
- - Firmware for booting the computer.
- - Output device for sound.
- - Input device with keys for typing.
- (Random Access Memory) - Temporary memory used for running programs.
- Supply - Provides power to the computer.
- - Pointing device for navigation.
30 Clues: - Processes audio data. • - Input device for audio. • - Powers the BIOS memory. • - Output device for sound. • - Pointing device on laptops. • - Connects to wired networks. • - Reads and writes CDs and DVDs. • - Device for printing documents. • - Connects to wireless networks. • - Camera for video conferencing. • - Lights indicating power status. • ...
computing 2024-01-16
Across
- = a communications standard for delivering data and messages through networks.
- =The capacity at which a network can transmit data.
- =a system of rules
- network=where you physically plug your computer
- address =the unique identifying number assigned to every device connected to the internet.
- =a computer or system that provides resources, data, services
- cable =a cord that runs from a router, modem, or network switch to your computer
- =a small segment of a larger message.
Down
- Transmission =The transfer of data from one digital device to another
- Network =interconnected computing devices
- network = a computer network that makes use of Radio Frequency
- =the central or main part of something
- =a global network of billions of computers
- = device that connects two or more packet-switched networks
- = a communication method
- hardware =physical devices that facilitate communication
16 Clues: =a system of rules • = a communication method • =a small segment of a larger message. • =the central or main part of something • Network =interconnected computing devices • =a global network of billions of computers • network=where you physically plug your computer • =The capacity at which a network can transmit data. • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
abigail chalfont 2019-02-26
16 Clues: thief • public • danger • to kill • to show • website • game show • interview • sports show • to be bored • cartoon show • horror movie • to be arrested • social networks • to be in love with • the star of the show
Wordplay 2021-11-26
Across
- Network infrastructure used commonly for mobile networks
- Global competence assessment tool
- A general-purpose, concurrent, functional programming language, and a garbage-collected runtime system associated with Ericsson
- Device or computer program which encodes or decodes a data stream or signal
- Your guide on Ericsson's ethical business conduct
- One of your Core value
- Voluntary project within Ericsson build to provide answer to queries
- Corporate title of person in-charge of Quality
- An Ericsson Product within BDGS-OSS portfolio
Down
- Signal which are Continuous and time varying in nature
- Ericsson’s learning platform and one-stop shop for learning
- Policy on mobile connection
- Centralized supervision, monitoring & maintenance place of Enterprise IT
- Which never sleeps
- Ericsson's competition in Networks
- Multiple customer units addressing OPCOs are controlled under a single umbrella
- A program on people transformation comprising of 5 principles
- Annual recognition event
- Setup in India to realize the objectives of the National Digital Communications Policy of the Government of India
- Comprises of our theme for SDEA 2021
20 Clues: Which never sleeps • One of your Core value • Annual recognition event • Policy on mobile connection • Global competence assessment tool • Ericsson's competition in Networks • Comprises of our theme for SDEA 2021 • An Ericsson Product within BDGS-OSS portfolio • Corporate title of person in-charge of Quality • Your guide on Ericsson's ethical business conduct • ...
Web Terms 2015-09-26
Across
- paragraph tag
- tag used to enclose website title
- uses keywords to find matching websites
- a group of information on a computer that can be software programs or data
- both sender and receiver are active at same time
- pictures, videos, music, graphics
- tag that encloses all of HTML coding
- codes or tags the browsers use to create webpages
- tag used to give emphasis
- universal communication medium
- networks that are geographically close
- tag that encloses almost all of the HTML coding and content
Down
- use of copyright materials belonging to someone other than yourself
- smallest heading tag
- visits websites to build an index
- popular search engine
- sender and receiver are active at different times
- using a false identity to complete another person's work
- used to connect all computers in an area or building
- tag used to give emphasis through bolding
- ownership of multimedia
- a system attached to UT resources to capture data packets
- networks that are not geographically close
- biggest heading tag
24 Clues: paragraph tag • biggest heading tag • smallest heading tag • popular search engine • ownership of multimedia • tag used to give emphasis • universal communication medium • visits websites to build an index • tag used to enclose website title • pictures, videos, music, graphics • tag that encloses all of HTML coding • networks that are geographically close • ...
Computer Network 2025-04-20
Across
- : This type of network has no central server
- : The full form of URL
- : The OSI layer responsible for logical addressing
- : Device that connects different networks together
- : Cyberattack that overwhelms a server with traffic
- : Wi-Fi security protocol (e.g., WPA2)
- : The full form of LAN
- : Software that controls access to or from a network
- : Network that spans across cities or countries
Down
- : Medium used in wired networks for data transmission
- : Unique address used to identify a device on a network
- : Protocol for sending emails
- : The process of converting data into a secure format
- : A unique physical address assigned to each network interface
- : This protocol ensures reliable communication at the Transport layer
- : Protocol used to transfer files over the Internet
- : Network type within a small area, like a school or home
- : Smallest unit of data in a network
- : OSI layer that ensures data is formatted and encrypted
- : A device used to amplify or regenerate signals
20 Clues: : The full form of URL • : The full form of LAN • : Protocol for sending emails • : Smallest unit of data in a network • : Wi-Fi security protocol (e.g., WPA2) • : This type of network has no central server • : Network that spans across cities or countries • : A device used to amplify or regenerate signals • : The OSI layer responsible for logical addressing • ...
CN 2025-07-31
Across
- A method used to avoid collisions in wireless networks
- Noise and signal loss over a medium is called.
- Multiplexing method that assigns separate frequencies
- The rate at which bits are transmitted.
- Layer that deals with user interfaces and APIs
- Adds source and destination IP addresses
- A way to uniquely identify devices in a LAN.
- Controls frame flow and retransmissions
- A device that connects multiple networks together
- Converts analog signals back into digital form
- Layer responsible for electrical and mechanical interface.
Down
- Technique that allows multiple signals to travel simultaneously on the same channel.
- Smallest unit of data in a network
- A network device used to regenerate signals
- Encapsulates data into frames
- Used to establish, maintain and terminate network connections.
- The physical path between sender and receiver
- Layer that provides encryption and compression
- Type of network topology where each device connects to a central hub.
- Breaks data into segments and ensures reliable delivery.
- A simple electrical circuit model for physical layer
21 Clues: Encapsulates data into frames • Smallest unit of data in a network • The rate at which bits are transmitted. • Controls frame flow and retransmissions • Adds source and destination IP addresses • A network device used to regenerate signals • A way to uniquely identify devices in a LAN. • The physical path between sender and receiver • ...
CROSSWORDZ 2021-11-26
Across
- Your guide on Ericsson's ethical business conduct
- Which never sleeps
- Corporate title of person in-charge of Quality
- Network infrastructure used commonly for mobile networks
- Setup in India to realize the objectives of the National Digital Communications Policy of the Government of India
- Voluntary project build to provide answer to queries
- Comprises of our theme for SDEA 2021
- One of your Core value
- A general-purpose, concurrent, functional programming language, and a garbage-collected runtime system
Down
- Program on mobile connection
- Device or computer program which encodes or decodes a data stream or signal
- Global competence assessment tool
- Annual recognition event
- Multiple units addressing OPCOs are controlled under a single umbrella
- A program on people transformation comprising of 5 principles
- Centralized supervision, monitoring & maintenance place of Enterprise IT
- Ericsson's competition in Networks
- Ericsson’s learning platform and one-stop shop for learning
- Signal which are Continuous as time varying in nature
- The solution to the lack of communication between enterprise apps
20 Clues: Which never sleeps • One of your Core value • Annual recognition event • Program on mobile connection • Global competence assessment tool • Ericsson's competition in Networks • Comprises of our theme for SDEA 2021 • Corporate title of person in-charge of Quality • Your guide on Ericsson's ethical business conduct • Voluntary project build to provide answer to queries • ...
Module 7 and 8 2017-03-21
Across
- Connects networks (uses IP addresses)
- Data flows in one direction one at a time
- Data flows in a one-way transmission
- similar to placing a regular, non-registered, letter in the mail.
- A type of cable constructed of either copper or aluminum and carries data in form of electrical signals
- analogous to sending packages that are tracked from source to destination
- A type of copper cabling used for telephone communications and most Ethernet Networks
- Wireless Local Area Network
- Local Area Network
- Personal Area Network
Down
- Fifth layer of the OSI Model
- Data flows in both directions at the same time
- A type of cable that uses light to transmit signal
- Seventh layer of the OSI Model
- Receives data on one port and then sends it out on all other ports
- Power over Ethernet
- First layer of the OSI Model
- Internet Control Message Protocal
- Metropolitan Area Network
- Wide Area Network
20 Clues: Wide Area Network • Local Area Network • Power over Ethernet • Personal Area Network • Metropolitan Area Network • Wireless Local Area Network • Fifth layer of the OSI Model • First layer of the OSI Model • Seventh layer of the OSI Model • Internet Control Message Protocal • Data flows in a one-way transmission • Connects networks (uses IP addresses) • ...
Pre-Training AI Executive Workshop 2025-03-24
Across
- ผู้เชี่ยวชาญด้านการออกแบบและปรับแต่ง Prompt เพื่อให้โมเดล AI สร้างผลลัพธ์ที่ตรงความต้องการ
- การเรียนรู้จากข้อมูลที่ไม่มีป้ายคำตอบ เพื่อค้นหารูปแบบหรือกลุ่มในข้อมูลด้วยตัวเอง
- การใช้โมเดล AI เพื่อพยากรณ์หรือทำนายเหตุการณ์ในอนาคต เช่น ยอดขายหรือแนวโน้มตลาด
- ช่วงตรวจสอบโมเดลด้วยข้อมูลใหม่ที่ไม่เคยเห็นในการฝึก เพื่อประเมินประสิทธิภาพ
- การปรับโมเดลที่ฝึกไว้แล้ว (Pretrained) ให้เข้ากับงานเฉพาะด้านด้วยข้อมูลใหม่จำนวนน้อย
- โมเดลเข้ารหัส-ถอดรหัสเชิงความน่าจะเป็น ที่สามารถสร้างข้อมูลใหม่ได้อย่างหลากหลาย
- ชั้นที่ซ่อนอยู่ระหว่างอินพุตและเอาต์พุตใน Neural Networks ทำหน้าที่สกัดคุณลักษณะเชิงลึก
- ชั้นภายในโครงข่ายประสาทเทียม ซึ่งใช้ประมวลผลและถ่ายทอดข้อมูลสู่ชั้นถัดไป
- การประมวลผลเสียงพูดเพื่อแปลงเป็นข้อความให้คอมพิวเตอร์เข้าใจ
- การแก้ปัญหาโดยลองทุกความเป็นไปได้เท่าที่มี จนกว่าจะพบคำตอบที่ถูกต้อง
- ข้อมูลที่สร้างขึ้นโดยโมเดลหรือกระบวนการประดิษฐ์ เพื่อใช้แทนข้อมูลจริงในงานต่างๆ
- ข้อมูลที่มีป้ายกำกับชัดเจน เช่น รูปสุนัขพร้อมระบุว่าเป็น ‘สุนัข’ ให้โมเดลใช้ฝึก
- เทคนิคทำให้คอมพิวเตอร์ ‘เห็น’ และวิเคราะห์รูปภาพหรือวิดีโอได้
- การผสานผลของหลาย Decision Trees เพื่อเพิ่มความแม่นยำของการทำนาย
- โมเดลคู่ระหว่างตัวสร้างกับตัวแยกแยะ ที่แข่งขันกันเพื่อผลิตข้อมูลใหม่ที่สมจริง
- ข้อมูลที่ไม่มีป้ายกำกับ โมเดลต้องหาความสัมพันธ์หรือโครงสร้างเอง
- เทคโนโลยีที่ทำให้เครื่องจักรสามารถเลียนแบบการเรียนรู้หรือพฤติกรรมคล้ายมนุษย์
- สถาปัตยกรรมโมเดลที่ใช้กลไกการมุ่งความสนใจ (Attention) ทำงานได้ดีในการประมวลผลข้อความ
- ปัญญาประดิษฐ์ที่มีความฉลาดเหนือกว่ามนุษย์ในทุกด้าน (ยังเป็นแนวคิดในอนาคต)
Down
- แนวทาง AI ที่มุ่งเน้นการสร้างเนื้อหาใหม่ เช่น ข้อความ ภาพ เสียง แทนการวิเคราะห์อย่างเดียว
- การเรียนรู้โดยมีตัวอย่างอินพุตและคำตอบที่ถูกต้อง ให้โมเดลฝึกจับคู่ระหว่างทั้งสอง”
- ช่วงที่โมเดลกำลังเรียนรู้และปรับค่าพารามิเตอร์จากตัวอย่างข้อมูลที่จัดเตรียมไว้
- ตัวแปรภายในโมเดล (เช่น น้ำหนักหรือเวคเตอร์) ที่โมเดลปรับค่าเพื่อให้ทำนายได้ดีขึ้น
- โมเดลสร้างข้อมูลใหม่โดยจำลองกระบวนการกระจายแล้วย้อนกลับ จนได้ผลงานที่มีความละเอียด”
- การทำนายตัวเลขต่อเนื่อง เช่น ราคาหุ้น หรืออุณหภูมิในอนาคต
- ปัญญาประดิษฐ์ที่มีความสามารถกว้างเทียบเท่ามนุษย์ในหลากหลายงานและสถานการณ์
- การเรียนรู้ด้วยรางวัลและบทลงโทษ เพื่อปรับพฤติกรรมของเอเจนต์ให้บรรลุเป้าหมาย
- การทำให้คอมพิวเตอร์เรียนรู้จากข้อมูลเพื่อคาดการณ์หรือจำแนกผลลัพธ์โดยอัตโนมัติ
- โปรแกรมโต้ตอบข้อความหรือเสียงกับผู้ใช้ โดยเลียนแบบพฤติกรรมการสนทนาของมนุษย์
- โมเดลภาษาขนาดใหญ่ที่สร้างข้อความได้หลากหลาย โดยฝึกล่วงหน้าบนข้อมูลจำนวนมาก
- การจัดกลุ่มข้อมูลที่มีลักษณะคล้ายกันเข้าด้วยกัน โดยไม่มีป้ายกำกับล่วงหน้า
- โมเดลที่ใช้โครงสร้างแตกแขนงเหมือนต้นไม้ เพื่อแบ่งข้อมูลตามคุณสมบัติทีละขั้น
- หน่วยประมวลผลกราฟิกที่เก่งงานประมวลผลขนาน นิยมใช้เร่งความเร็วในการฝึกโมเดล AI
- ระบบหรือซอฟต์แวร์ที่ทำงานด้วยตัวเองโดยอัตโนมัติ พร้อมตัดสินใจและเรียนรู้ได้อย่างอิสระ
- ปัญญาประดิษฐ์ที่เก่งหรือเชี่ยวชาญเฉพาะด้าน เช่น แยกแยะภาพ แม่นยำกว่ามนุษย์ในงานจำเพาะ
- โครงข่ายประสาทเทียมที่ใช้ฟิลเตอร์สไลด์ผ่านข้อมูล (โดยเฉพาะรูปภาพ) เพื่อดึงคุณลักษณะ
- โครงข่ายที่จำลองการทำงานของเซลล์ประสาทในสมอง เพื่อประมวลผลข้อมูลแบบเชิงลึก
- การให้โมเดล AI แสดงลำดับการคิดหรือเหตุผลกลางคัน เพื่อคาดการณ์คำตอบได้โปร่งใสขึ้น
- การเรียนรู้เชิงลึกด้วย Neural Networks หลายชั้น เพื่อสกัดข้อมูลเชิงซับซ้อน
- การจัดข้อมูลให้อยู่ในหมวดหมู่ต่าง ๆ เช่น จำแนกอีเมลเป็นสแปมหรือไม่สแปม
- โมเดลภาษาขนาดใหญ่ที่ผ่านการฝึกด้วยข้อมูลจำนวนมาก เพื่อเข้าใจและสร้างข้อความ
- ขั้นตอนแบ่งข้อความออกเป็นหน่วยย่อย เช่น คำหรือสัญลักษณ์ ก่อนป้อนเข้าระบบ AI
- อาการที่โมเดล Generative AI สร้างคำตอบหรือข้อมูลที่ไม่ตรงกับข้อเท็จจริงโดยไม่ตั้งใจ
- ข้อความหรือคำสั่งนำที่เราป้อนให้โมเดล เพื่อกระตุ้นให้สร้างหรือโต้ตอบตามเป้าหมาย
- ระบบ AI ที่มีความสามารถในการใช้ตรรกะหรือกฎความรู้ เพื่อสรุปผลหรือให้คำแนะนำ
45 Clues: การทำนายตัวเลขต่อเนื่อง เช่น ราคาหุ้น หรืออุณหภูมิในอนาคต • การประมวลผลเสียงพูดเพื่อแปลงเป็นข้อความให้คอมพิวเตอร์เข้าใจ • เทคนิคทำให้คอมพิวเตอร์ ‘เห็น’ และวิเคราะห์รูปภาพหรือวิดีโอได้ • การผสานผลของหลาย Decision Trees เพื่อเพิ่มความแม่นยำของการทำนาย • ข้อมูลที่ไม่มีป้ายกำกับ โมเดลต้องหาความสัมพันธ์หรือโครงสร้างเอง • ...
NETWORKING CONCEPT 2025-07-29
Across
- Sends data to all devices in the network
- Network limited to a small geographic area
- Network that spans a large geographic area
- Connects different types of networks and finds best route
- Topology with a single communication backbone
- Sends data only to the intended recipient device
- Layout of a network’s components and connections
- A single computer in a network
- Peripheral device used to get hard copies of documents
- Device that converts digital signals into analog and vice versa
- Private network used within an organisation
Down
- Short-range wireless communication technology
- Wireless technology for local area networks
- Group of connected computers and devices
- Something shared in a network like data or hardware
- Topology where devices connect through a central hub
- Central computer managing network resources
- Computer that accesses shared resources from a server
- Topology where data travels in a circular path
- Topology where each node connects to every other node
20 Clues: A single computer in a network • Sends data to all devices in the network • Group of connected computers and devices • Network limited to a small geographic area • Network that spans a large geographic area • Wireless technology for local area networks • Central computer managing network resources • Private network used within an organisation • ...
