networks Crossword Puzzles
Digital Crossword Awesome Privacy Week '25 2025-01-27
Across
- A key document that explains how an individual's data is stored, used, and shared.
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- The process of removing personal identifiers from datasets.
- The act of removing or disguising personal identifiers from datasets.
- A tool used to record every keystroke typed on a keyboard.
- The practice of protecting systems, networks, and programs from digital attacks.
- Data that describes and gives information about other data.
- Theft Fraudulent use of someone's personal data to commit crimes.
- A browser feature that prevents storing history, cookies, and site data.
- Malicious software that locks users out of their data until a ransom is paid.
Down
- AI-generated media that mimics real people and can be used for deception.
- Unauthorized access or damage to computer systems and networks.
- Small files stored on a user’s browser to track online activities.
- Malicious software designed to harm or exploit computers and networks.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- A U.S. law that gives California residents rights over their personal data.
- Publishing private or identifying information about someone online without consent.
- A tool that encrypts internet connections to enhance privacy.
- A European Union law that regulates data protection and privacy.
- Software vulnerability unknown to developers and exploited by hackers.
23 Clues: A tool used to record every keystroke typed on a keyboard. • Malicious software that secretly gathers user information. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Mixed: Intermediate/Advanced 10 2024-02-06
Ciencia y tecnología 2025-02-27
22 Clues: cure • laptop • health • online • illness • website • internet • username • symptoms • password • to upload • to update • cell phone • to comment • to download • text message • email address • to surf the web • social networks • electronic devices • to connect to the internet • to disconnect from the internet
Basic Network Glossary Crossword 2017-03-03
Across
- A program that requests data from a server
- Computer program that serves data using certain protocols in response to a request from a client
- Allows data communication between digital and analogue devices
- Communication across distance via cable, telephone, telegraph or broadcasting
- An intranet that can be partially accessed by certain outside users that lets businesses to share information over the Internet securely
- World-Wide Web, network of servers that serve hypertext documents to respond to client requests
- Device that can be accessed by a network using a unique address
- Most used cable LAN technology
- Two or more nodes that exchange information electronically
- Small group of data that forms a part of a larger thing like a webpage
- A length of wires insulated with plastic or rubber, used for sending data between a computer and the peripherals or between nodes and networks.
- Allows wireless nodes to connect to Internet
Down
- Network of computer networks, public or private, which may use any data protocol
- The ID that every node has to access the network, unique to each one
- A private network that uses TCP/IP
- Device that forwards packets between networks
- Radius spams larger than LAN (over cities/countries etc.) and can use private or public network like the Internet
- Agreed method for exchanging data
- Transmission Control Protocol over Internet Protocol, IP sorts data by type and sends in packet. TCP makes sure it is received properly
- Radius limited to nodes that are close together and are connected directly by cables or microwave transmission
20 Clues: Most used cable LAN technology • Agreed method for exchanging data • A private network that uses TCP/IP • A program that requests data from a server • Allows wireless nodes to connect to Internet • Device that forwards packets between networks • Two or more nodes that exchange information electronically • Allows data communication between digital and analogue devices • ...
Basic Network Glossary Crossword 2017-03-03
Across
- Most used cable LAN technology
- World-Wide Web, network of servers that serve hypertext documents to respond to client requests
- Allows data communication between digital and analogue devices
- The ID that every node has to access the network, unique to each one
- A program that requests data from a server
- Small group of data that forms a part of a larger thing like a webpage
- A private network that uses TCP/IP
- Radius limited to nodes that are close together and are connected directly by cables or microwave transmission
- Radius spams larger than LAN (over cities/countries etc.) and can use private or public network like the Internet
- Allows wireless nodes to connect to Internet
- An intranet that can be partially accessed by certain outside users that lets businesses to share information over the Internet securely
- A length of wires insulated with plastic or rubber, used for sending data between a computer and the peripherals or between nodes and networks.
Down
- Communication across distance via cable, telephone, telegraph or broadcasting
- Computer program that serves data using certain protocols in response to a request from a client
- Two or more nodes that exchange information electronically
- Agreed method for exchanging data
- Transmission Control Protocol over Internet Protocol, IP sorts data by type and sends in packet. TCP makes sure it is received properly
- Network of computer networks, public or private, which may use any data protocol
- Device that can be accessed by a network using a unique address
- Device that forwards packets between networks
20 Clues: Most used cable LAN technology • Agreed method for exchanging data • A private network that uses TCP/IP • A program that requests data from a server • Allows wireless nodes to connect to Internet • Device that forwards packets between networks • Two or more nodes that exchange information electronically • Allows data communication between digital and analogue devices • ...
Awesome Privacy Week '25 2025-01-27
Across
- A security system that monitors and controls incoming and outgoing network traffic.
- An extra layer of security that requires more than just a password.
- Malicious software designed to harm or exploit computers and networks.
- A European Union law that regulates data protection and privacy.
- A tool that encrypts internet connections to enhance privacy.
- A U.S. law that gives California residents rights over their personal data.
- The practice of protecting systems, networks, and programs from digital attacks.
- Publishing private or identifying information about someone online without consent.
- AI-generated media that mimics real people and can be used for deception.
- Small files stored on a user’s browser to track online activities.
- A tool used to record every keystroke typed on a keyboard.
- A browser feature that prevents storing history, cookies, and site data.
- The act of removing or disguising personal identifiers from datasets.
- A key document that explains how an individual's data is stored, used, and shared.
Down
- The process of removing personal identifiers from datasets.
- The process of encoding information to prevent unauthorized access.
- Malicious software that secretly gathers user information.
- Software vulnerability unknown to developers and exploited by hackers.
- A cyber attack where attackers trick individuals into revealing sensitive information.
- Theft Fraudulent use of someone's personal data to commit crimes.
- Unauthorized access or damage to computer systems and networks.
- Data that describes and gives information about other data.
- Malicious software that locks users out of their data until a ransom is paid.
23 Clues: Malicious software that secretly gathers user information. • A tool used to record every keystroke typed on a keyboard. • The process of removing personal identifiers from datasets. • Data that describes and gives information about other data. • A tool that encrypts internet connections to enhance privacy. • ...
Data Communications & Networks I 2012-10-07
Across
- T-1 systems use ___________ for signaling.
- The common name used for a circuit carrying multiplexed voice channels that is used the telephone company is:
- Ethernet LANs use___________ for signaling.
- A set of specific rules and procedures for the control of communications in a network is called a:
- signal When we speak into a standard telephone today our voice is represented by
- DS stands for:
- A simple waveform used internally in digital electronic equipment and personal computers is:
- Is used to "wake" the receiver.
- A ________ pathway between two nodes or devices.
- The fundamental analog signal is called a ___________.
- The frequency range required for transmitting.
- ASCII, Extended ASCII and Unicode are examples of:
Down
- The input and output connections on a multiplexer are called:
- To determine the voltage magnitude of each sample and compare it to a reference voltage.
- Multiple Data Terminating Equipment sharing physical transmission facility through common Data Communication Equipment is called:
- The smallest element of data.
- Particular format of electrical pulses.
- What kind of sign transmits light pulses over a glass fiber?
- When a pulse has the same polarity as the preceding pulse this is called______
- The most common topology used in LAN implementation is the?
- A transmission mode in which information can only be transmitted in one direction.
- The device/process used to convert analog signals into digital signals is called a:
- The gradual loss of a transmission signal as it travels over a distance is called:
- The most common technique for voice digitization is called:______ Modulation
- Digital +5 volt and 0 or -5 volt pulses are represented as ____ digits 0 and 1.
- A network topology known for its redundancy and commonly used on internet WAN links is the ______ topology?
- An analog modulation technique that uses two different frequencies at the same amplitude to represent a binary code?
27 Clues: DS stands for: • The smallest element of data. • Is used to "wake" the receiver. • Particular format of electrical pulses. • T-1 systems use ___________ for signaling. • Ethernet LANs use___________ for signaling. • The frequency range required for transmitting. • A ________ pathway between two nodes or devices. • ASCII, Extended ASCII and Unicode are examples of: • ...
Networks & Graphs Vocabulary Review 2018-02-28
Across
- The number of lines that go into a point.
- In the graph there is at least one line that exist between any two points.
- In the graph each vertex is used exactly once and the starting and ending vertices are the same.
- A line which starts and ends at the same point.
- A point that only has lines going into it.
- Points on a graph.
- In the graph all vertices are adjacent to each other.
- A graph that starts and ends at different points
- A graph that starts and ends at the same point.
- In the graph each edge is used exactly once and the starting and ending vertices are the not the same.
- The lines that connect the vertices.
Down
- Amount of lines that meet at a specific point.
- The graph each vertex is used exactly once and the starting and ending vertices are not the same.
- In the graph each edge is used exactly once and the starting and ending vertices are the same.
- In the graph the edges have direction, like a one-way street.
- Two points next to each other that share more than one line.
- Two points next to each other connected by a line.
- The number of lines that leave out of a point.
- A point that only has lines leaving out of it.
- A route you can tke from one point to another, sometimes through multiple edges.
20 Clues: Points on a graph. • The lines that connect the vertices. • The number of lines that go into a point. • A point that only has lines going into it. • Amount of lines that meet at a specific point. • The number of lines that leave out of a point. • A point that only has lines leaving out of it. • A line which starts and ends at the same point. • ...
Networks and topologies (J277) 2025-06-02
Across
- A server that stores website content and delivers web pages.
- A network confined to a small geographical area.
- A device that allows wireless devices to connect to a network (acronym).
- A network model where all computers share resources directly.
- A network that spans a large geographical area.
- The delay before a transfer of data begins.
- A client application used to access web pages.
- A device that forwards data packets between computer networks.
- A network topology where every node is connected to every other node.
- A network topology where all devices connect to a central hub.
- A common type of wired transmission media.
- Remote computing services accessed over the Internet.
- A device that connects devices in a network and filters traffic.
- Hardware that allows a computer to connect to a network (acronym).
Down
- Transmission media using light to carry data.
- A numerical label assigned to each device on a computer network.
- In a client-server model, a computer that requests services.
- The maximum data transfer rate of a network.
- An advantage of the star topology due to its hub.
- A global system of interconnected computer networks.
- In a client-server model, a computer that provides services.
- A key advantage of mesh topology, providing multiple paths for data.
- Providing space on a server for a website.
- A system that translates domain names into IP addresses (acronym).
24 Clues: A common type of wired transmission media. • Providing space on a server for a website. • The delay before a transfer of data begins. • The maximum data transfer rate of a network. • Transmission media using light to carry data. • A client application used to access web pages. • A network that spans a large geographical area. • ...
Data Communication and Networks 2025-11-23
Across
- – Topology with central hub
- – Maximum data rate of a channel
- – Model defining seven network layers
- – Horizontal division of network functions
- – Single backbone cable topology
- – Topology forming a closed loop
- – Forwards frames based on MAC address
- – Dedicated physical path switching
- – Transfer of digital information between devices
- – Connects networks using different protocols
- – Entire message sent from node to node
- – Actual successful data transfer rate
- – Private network extended to external users
Down
- – Group of interconnected computers
- – Divides data into packets
- – Physical or logical arrangement of a network
- – Sending data from sender to receiver
- – Forwarding data from source to destination
- – Private network within an organization
- – Metropolitan Area Network
- – Time delay in data transmission
- – Forwards packets using IP addresses
- – Combination of two or more topologies
- – Worldwide network of networks
- – Local Area Network
- – Protocol suite enabling the internet
- – Wide Area Network
- – Signal travel through a medium
- – Basic networking device that repeats signals
- – Topology with multiple redundant paths
30 Clues: – Wide Area Network • – Local Area Network • – Divides data into packets • – Topology with central hub • – Metropolitan Area Network • – Worldwide network of networks • – Maximum data rate of a channel • – Single backbone cable topology • – Topology forming a closed loop • – Signal travel through a medium • – Time delay in data transmission • – Group of interconnected computers • ...
COMPUTER VISION FOR HEALTHCARE APPLICATIONS 2024-02-25
14 Clues: Vision • Forests • detection • Operations • Parameters • interaction • Recognition • Neural Networks • Vector Machines • Assisted Living • Appearance Models • systems in surgery • Detection and Tracking: • rehabilitation and training
R&D Engineering Bootcamp 2019-11-18
Across
- VMware NSX as the Foundation for the ________ Cloud Network
- Cloud__________ Business Unit
- IT Priority: Transform __________ and Security
- Lets you run multiple operating systems and applications on a single server
- IT Priority: _______ the Cloud Journey
- Networking and ____________ Business Unit
- _________services augment one or more logical networks and/or connect multiple logical networks together.
- product and ______ Services
- The'P' in our EPIC2 Values
Down
- Software that runs as the operating system of the ESX system
- good companies solve problems. Great companies create_________.
- How many dogs does Jenn have?
- A strategy where organizations leverage both on-premises and cloud enabling rapid portability of applications, and operational consistency across their entire environment
- IT Priority: Empowering the ______ Workspace
- VMware's beloved CEO
- Software_______data Center
- ________is VMware’s software-defined storage solution.
- ________ agility is the ability to process information with ease, speed & optimize mental flexibility
18 Clues: VMware's beloved CEO • Software_______data Center • The'P' in our EPIC2 Values • product and ______ Services • How many dogs does Jenn have? • Cloud__________ Business Unit • IT Priority: _______ the Cloud Journey • Networking and ____________ Business Unit • IT Priority: Empowering the ______ Workspace • IT Priority: Transform __________ and Security • ...
crossword 28 2018-07-17
26 Clues: use • boy • boys • than • this • again • comes • young • to do • social • lesser • become • banking • through • networks • no, none • more often • music offer • differences • broad, wide • well, surely • almost , nearly • boys, young people • presence, existense • foreigner, immigrant • native, autochthonous
Technology 2015-06-09
Across
- a device that accepts text and graphic output from a computer and transfers the information to paper
- a program that interacts with a particular device or special (frequently optional) kind of software
- a is a device that channels incoming data
- the primary text input device of a computer
- a private network that is contained within an enterprise
- a wireless, portable personal computer with a touch screen interface
- a cellular telephone with an integrated computer and other features not originally associated with telephones
- a term used to describe telecommunications in which electromagnetic waves carry the signal
- a small device that a computer user pushes across a desk surface in order to point to a place on a display
- is a device that routes traffic between virtual local area networks
Down
- the physical aspect of computers, telecommunications, and other devices
- a computer program that provides services to other computer programs
- a term for any small mobile hand-held device that provides computing and information
- a worldwide system of computer networks - a network of networks
- a device that accepts information (in the form of digitalized data) and manipulates it for some result
- a general term for the various kinds of programs used to operate computers and related devices
- the requesting program or user in a client/server relationship
- a series of points or nodes interconnected by communication paths.
- a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display
- the electronic holding place for instructions and data that your computer's microprocessor can reach quickly
20 Clues: a is a device that channels incoming data • the primary text input device of a computer • a private network that is contained within an enterprise • the requesting program or user in a client/server relationship • a worldwide system of computer networks - a network of networks • a series of points or nodes interconnected by communication paths. • ...
anatomy of a computer 2019-09-12
Across
- one dot on a screen
- a copy of a file or set of files
- main circuit board of the computer
- having two values,like 0 and 1
- device that displays computer out put
Down
- upgrades your computers pictures
- turns your pc off and on
- Digital devices that takes single pictures
- connects several networks and controls the traffic of data among the networks
- Place in a computer case to put drives and other devices
- record a file to storage
- main memory,violated memory that is erased when the power is turned off
12 Clues: one dot on a screen • turns your pc off and on • record a file to storage • having two values,like 0 and 1 • upgrades your computers pictures • a copy of a file or set of files • main circuit board of the computer • device that displays computer out put • Digital devices that takes single pictures • Place in a computer case to put drives and other devices • ...
NEURAL NETWORKS AND DEEP LEARNING 2024-02-21
Across
- Layer - Receives data in a neural network
- - Basic unit of early neural networks
- Learning - Complex neural networks for advanced tasks
Down
- Function - Determines output of a neuron
- Layer - Provides final results in a neural network
- - Characteristics of the input data
- - Large dataset for image recognition
- Network - Network of interconnected perceptrons
- Layers - Intermediate layers in a neural network
- - Individual points of color in an image
10 Clues: - Characteristics of the input data • - Large dataset for image recognition • - Basic unit of early neural networks • Function - Determines output of a neuron • - Individual points of color in an image • Layer - Receives data in a neural network • Network - Network of interconnected perceptrons • Layers - Intermediate layers in a neural network • ...
Computer Networks - MAP - Quiz 2016-10-03
Across
- services with more bandwidth that a telephone service
- number of samples per second
- routers are divided into this
- The rules and conventions used in this conversation
- A set of layers and protocols of a network
- unwanted energy from the source
- lots of data passing over a single line
- distance between two maxima/minima
Down
- number of oscillations per second
- unreliable, connection-less protocol
- set of primitives (operations) available to a user process
- incoming packet send through all outgoing lines
- connection that allows traffic in only one way
- Transfer data to all
- loss of energy as signal propagates
- packet used to inform congestion
- calculated for error detection
- network of networks
- used for naming in the internet
- reliable, connection-oriented protocol
20 Clues: network of networks • Transfer data to all • number of samples per second • routers are divided into this • calculated for error detection • unwanted energy from the source • used for naming in the internet • packet used to inform congestion • number of oscillations per second • distance between two maxima/minima • loss of energy as signal propagates • ...
Technology Alejandra 2022-02-16
Across
- a defect in batteries where they remembered another charge as their 💯 if not discharged fully
- HDMI
- device that detects some type of input from the physician environment
- software installed in the computer to print
- connections of several devices
- a network that extends over a metropolitan area
- are used to connect devices in networks
Down
- sensor the technology equivalent of a bats’echolocation
- USB
- “holes” to connect a device to a router with a cable
- DPI
- single location network in which all devices belong to the same person
12 Clues: USB • DPI • HDMI • connections of several devices • are used to connect devices in networks • software installed in the computer to print • a network that extends over a metropolitan area • “holes” to connect a device to a router with a cable • sensor the technology equivalent of a bats’echolocation • device that detects some type of input from the physician environment • ...
Neural Nets in Image & Language 2024-04-13
Across
- Various uses of neural networks in medical diagnostics, treatment planning, and patient care.
- Field of study focused on enabling computers to understand, interpret, and generate human language.
- Task in NLP to identify and classify elements.
- Process of identifying objects or patterns in images using neural networks.
Down
- Computing systems inspired by the biological neural networks of animal brains.
- Type of neural network architecture commonly used for image processing tasks.
- Architecture used for image recognition tasks.
- Neural network architecture designed to handle sequential data and maintain memory across time steps.
- State-of-the-art neural network architecture for natural language processing tasks.
9 Clues: Architecture used for image recognition tasks. • Task in NLP to identify and classify elements. • Process of identifying objects or patterns in images using neural networks. • Type of neural network architecture commonly used for image processing tasks. • Computing systems inspired by the biological neural networks of animal brains. • ...
Computer Science Crossword Puzzle 2016-02-21
Across
- Universal resource Locator
- Domain Name System
- Composed of HTML tags and multimedia files
- A tool for using the web and its content
- The guy whose video we were required to watch about Large Networks
- A computer created by apple
- Having the exclusive right to use (legal matters)
- The main technology for local area networks
Down
- Can be embedded in Webpages to show content
- Not influenced by personal feelings or opinions in considering and representing facts
- An application that lets you create html files
- The act of telling a story
- Using a computer to gain access to gain information
- Wide-area-network
- An item you click on a webpage where you can go to another site or content
- An area to store data on computers
- Using someone's copyright without permission but isn't taking the whole content
- Another word for imitating someone else
18 Clues: Wide-area-network • Domain Name System • Universal resource Locator • The act of telling a story • A computer created by apple • An area to store data on computers • Another word for imitating someone else • A tool for using the web and its content • Composed of HTML tags and multimedia files • Can be embedded in Webpages to show content • ...
SN33003FP Chapter 1 Crossword 2024-07-03
Across
- Sensors and alert networks that warn of potential attacks.
- Comprehensive databases of known vulnerabilities shared worldwide to prevent attacks.
- Highly trained hackers who steal secrets or commit sabotage for their government.
- Threats posed by the increasing use of mobile devices to access enterprise information.
- Sharing of critical information about serious attacks to prevent similar ones.
- Ethical hackers who discover weaknesses in networks or computer systems to improve their security.
- Framework for implementing cybersecurity measures within an organization.
- Black hat hackers who steal money from consumers and businesses.
- Unethical hackers who exploit weaknesses in networks or computer systems for personal gain.
- Legislation to discourage cyberattacks and punish cyber criminals.
- Challenges posed by the huge amount, high speed, and diverse types of data needing protection.
Down
- Threats from employees or partners with inside access and knowledge.
- Gray hat hackers who protest against political and social ideas by leaking sensitive information.
- Gray hat hackers who exploit vulnerabilities and report them to vendors for rewards.
- Teenagers or hobbyists with little skill who hack for fun, not profit.
- Threats that exploit weaknesses to gain access to internal resources.
- Technology connecting billions of devices to the Internet, affecting data protection needs.
- Hackers between white and black hat who may find and report vulnerabilities or publish them for others to exploit.
18 Clues: Sensors and alert networks that warn of potential attacks. • Black hat hackers who steal money from consumers and businesses. • Legislation to discourage cyberattacks and punish cyber criminals. • Threats from employees or partners with inside access and knowledge. • Threats that exploit weaknesses to gain access to internal resources. • ...
Cyber Safety Irene 2016-05-30
Across
- Engine something you can search information on
- a program that lets you find,see and hear material on website
- a giant collection of networks of networks
- an add that automatically comes onto the screen
- a starting point on the web
- Tag the nickname a user has chosen to be identified by when playing Internet Games
- a security system to keep your things safe
- a search engine visual for parents mostly
- to upload information to the web
Down
- a bad thing that can ruin your device
- a website to search with
- a name that a user selects for you
- a thing you can chat on with family and friends
- to send information from your computer to another computer
- an adviser that teaches you how to use technology
- a secret code to open something
- a program,or set of instructions
- a method of sending short messages
- something you can send to others
- a small hand-controlled divide for pointing and clicking
20 Clues: a website to search with • a starting point on the web • a secret code to open something • something you can send to others • to upload information to the web • a program,or set of instructions • a name that a user selects for you • a method of sending short messages • a bad thing that can ruin your device • a search engine visual for parents mostly • ...
Computer Science 2024-03-21
Across
- Analyse de données
- Contrôle de version
- Apprentissage profond
- Interface utilisateur (IU)
- Algorithmes
- Système d'exploitation (SE)
- Développement web
- Cryptage
- Décryptage
- Réalité augmentée (RA)
- Matériel informatique
- Vision par ordinateur
- Expérience utilisateur (UX)
- Algorithme
- Réalité virtuelle (RV)
- Langage de programmation
- Robotique
- Base de données
- Apprentissage automatique
- Intelligence artificielle (IA)
- Structure de données
- Internet des objets (IdO)
- Architecture logicielle
Down
- Informatique quantique
- Technologie de l'information (TI)
- Développement de logiciels
- Compilateur
- Cybersécurité
- Informatique en nuage
- Arrière plan
- Frontal
- development Développement d'applications mobiles
- Génie logiciel
- Graphisme informatique
- Exploration de données
- Réseaux neuronaux artificiels
- networks Réseaux neuronaux
- Débogage
- Programmation
- Réseau
40 Clues: Réseau • Frontal • Cryptage • Débogage • Robotique • Décryptage • Algorithme • Compilateur • Algorithmes • Cybersécurité • Arrière plan • Programmation • Génie logiciel • Base de données • Développement web • Analyse de données • Contrôle de version • Structure de données • Apprentissage profond • Informatique en nuage • Matériel informatique • Vision par ordinateur • Informatique quantique • Graphisme informatique • ...
Alan 2024-06-11
Across
- Software designed to detect and destroy computer viruses.
- A device that outputs printed documents.
- A wireless technology standard for exchanging data.
- A device used to make voice calls.
- The main circuit board of a computer.
- A peripheral used to input text into a computer.
- A mobile operating system developed by Google.
- A device that forwards data packets between computer networks.
- It is the digital part of a computer
- A method of exchanging digital messages over the Internet.
Down
- It is the phisical part of the computer
- An electronic device for storing and processing data.
- A device that projects images onto a screen.
- A unit of data storage.
- A data storage device using solid-state memory.
- An output device that displays information in visual form.
- A global network that connects millions of private, public, academic, business, and government networks.
- A portable computer.
- Computer hard drive (abbreviated).
- A network security system that monitors and controls incoming and outgoing network traffic.
20 Clues: A portable computer. • A unit of data storage. • A device used to make voice calls. • Computer hard drive (abbreviated). • It is the digital part of a computer • The main circuit board of a computer. • It is the phisical part of the computer • A device that outputs printed documents. • A device that projects images onto a screen. • ...
NETWORKING CONCEPTS 2025-05-23
Across
- Wireless technology used to interconnect devices
- One star network is connected with other star networks
- Larger network than LAN
- Simplest form of network
- Certain sets of rules that determine how data should be transferred
- Most commonly used network card
- Provides a direct contact b/w source and destination
- Computer network restricted to an organization
Down
- Each computer in a network
- Connects your computer to the available internet connection
- Connects computer located at distant places
- Group of computers linked together
- User is given a unique login name and password
- Connects two different types of networks with each other
- Each node is connected to every other node in the network
- each device is connected to a central computer using point to point connection
- used in both LAN and WAN topologies
- used to connect all the computers in a network
- Cover a range of less than 10 meters
- Represents wireless local area network
20 Clues: Larger network than LAN • Simplest form of network • Each computer in a network • Most commonly used network card • Group of computers linked together • used in both LAN and WAN topologies • Cover a range of less than 10 meters • Represents wireless local area network • Connects computer located at distant places • User is given a unique login name and password • ...
Social Studies Review 2023-04-16
Across
- A trade route stretching from China to Europe.
- Creator of the Mongol Empire.
- Movement of raw materials from colonies to be manufactured.
- The expanding of world trade networks and economies.
- The expansion of lifestyles over global networks.
- Political decisions having international impacts.
- The rise of factories and manufactured goods.
- One of the largest empires in history.
Down
- The process of becoming more globally interconnected.
- The process of conquering and settling other lands.
- The numbering system we use today.
- Materials such as wood, iron, coal, etc.
- The destruction of a group of people or culture.
- One country dominating another politically, economically, and militarily.
- Empire that conquered and colonized much of Central and South America.
- Discovered the New World for Europeans in 1492.
- Economic system where trade and industry are controlled by private individuals.
- Silks, spices, and other expensive items.
18 Clues: Creator of the Mongol Empire. • The numbering system we use today. • One of the largest empires in history. • Materials such as wood, iron, coal, etc. • Silks, spices, and other expensive items. • The rise of factories and manufactured goods. • A trade route stretching from China to Europe. • Discovered the New World for Europeans in 1492. • ...
Internet Hardware 2022-10-03
Across
- A boxy device that connects a device to the internet
- This is a physical or software barrier between secured networks and outside connections
- wireless access point
- A network of routers that create a single wireless network connection
- Where multiple devices are connected to a central hub
Down
- multiple devices that communicate with each other
- a computer system that hosts websites
- local area network
- network interface card
- Wide area network
- A boxy device that directs traffic between networks and devices
- This is a cable that is used to connect multiple devices
12 Clues: Wide area network • local area network • wireless access point • network interface card • a computer system that hosts websites • multiple devices that communicate with each other • A boxy device that connects a device to the internet • Where multiple devices are connected to a central hub • This is a cable that is used to connect multiple devices • ...
My Crossword Puzzle 2022-09-30
Across
- Wireless capable devices and networks to connect through a wireless standard
- Directs traffic between networks and devices
- Stores web server software and a website's component files
- Devices or nodes linked together, branching off other devices or nodes
- Large network of information that is not tied to a single location
- Collection of devices connected together in one physical location
Down
- One central hub acts as a conduit to transmit messages
- Network multiple computers together
- Communication and interaction between devices
- Enforces a network boundary
- Modulates and demodulates analog carrier signals
- Connect to a network
12 Clues: Connect to a network • Enforces a network boundary • Network multiple computers together • Directs traffic between networks and devices • Communication and interaction between devices • Modulates and demodulates analog carrier signals • One central hub acts as a conduit to transmit messages • Stores web server software and a website's component files • ...
M3--Lesson 25: Networks 2016-01-04
Across
- Wireless technology that can deliver max speeds of up to 7mbps to your cell phone, home computer, or a car.
- Type of fiber-optic telephone line; provides phone service for a commercial building.
- Internet connection technology that provides for the transfer of info over copper telephone lines.
- Link from one computer to another through which data can be transmitted.
- A server that acts as an intermediary between a user and the Internet.
- Computer configuration in which one or more computers on the network acts as a server.
- Communications hardware device that facilitates the transmission of data.
- Computer architecture in which all of the computers on a network are equal; no computer designated as the server.
- Computer network that covers a large geographical area.
- Expert computer user that invades someone else's computer.
- An ISP that provides connection speeds more than 30 times faster than dial-up connections.
- Junction where information arrives and is then forwarded in one or more directions to other computers or devices.
- Allows outside organizations to access internal info systems.
Down
- Device that uses coaxial cable to send and receive data.
- Variation of LAN that uses no physical wires.
- High end programs designed to provide network control and include special functions for connecting computers.
- Device on a network
- Security measure that uses authentication that examines a fingerprint, voice pattern, etc. to gain access to a secure area.
- Creates a buffer between an internal network and the internet.
- The largest network used as a communication tool.
- Designed for exclusive use of computer users within an organization.
- Computer that uses the services of another program.
- Computer that handles requests for data, email, file transfers, and other network services.
- World's collection of interconnected commercial and government-owned voice-oriented systems.
- A device that directs traffic on a network by dividing data into smaller packets that travel by different routes and then are reassembled at their destination.
- Series of connected personal computers within a confined space, such as an office building.
26 Clues: Device on a network • Variation of LAN that uses no physical wires. • The largest network used as a communication tool. • Computer that uses the services of another program. • Computer network that covers a large geographical area. • Device that uses coaxial cable to send and receive data. • Expert computer user that invades someone else's computer. • ...
Groups, Networks, and Organizations 2017-02-08
Across
- George Ritzer's term describing the spread of bureaucratic rationalization and the accompanying increases in efficiency and dehumanization.
- A three-person social group.
- A group that provides a standard of comparison against which we evaluate ourselves.
- In very cohesive groups, the tendency to enforce a high degree of conformity among members, creating a demand for unanimous agreement.
- Authority based in laws, rules, and procedure, not in the heredity or personality of any individual leader.
- A theory of group formation and maintenance that stresses the need of individual members to feel a sense of belonging.
- A temporary gathering of people in a public place: members might interact but don't identify with each other and do not remain in contact.
- Social groups whos interactions are mediated through informed technologies.
- A group that one identifies with and feels a loyalty toward.
- Collections of people who share a physical location, but don't have lasting relations.
- The application of economic logic to human activity; the use of formal rules and regulations in order to maximize efficiency without consideration of subjective or individual concerns.
- Exerting group controls over others' decisions.
- Power that is backed by a source of threat.
- A collection of people that share some attribute, can identify with each other, and interact with each other.
- The people who are most important to our self.
- Leadership concerned with maintaining emotional and rational harmony with a group.
- A two-person social group.
- People who share one or more attributes, but lack a sense f common identity or belonging.
- Groups toward which an individual feels opposition, rivalry, or hostility.
Down
- The legitimate right to wield power.
- The web of direct and indirect ties connecting an individual to other people who may also affect the individual.
- Power that is supported by persuasion.
- Leadership that is task or goal orientated.
- Authority based in the perception of remarkable personal qualities in a leader.
- The ability to control the actions of others.
- Authority based in a custom, birthright, or divine right.
- A type of secondary group designed to perform tasks efficiently, characterized by specialization, technical competency, hierarchy, written rules, impersonality, and formal written communication.
- The patterns of interaction between groups and individuals.
- The phenomenon in which as more individuals are added to a task, each individual contributes a little less; a source of inefficiency when working in teams.
- Groups larger and less intimate than primary groups.
- The sense of solidarity or loyalty that individuals feel toward a group to which they belong.
- Connections between individuals.
32 Clues: A two-person social group. • A three-person social group. • Connections between individuals. • The legitimate right to wield power. • Power that is supported by persuasion. • Leadership that is task or goal orientated. • Power that is backed by a source of threat. • The ability to control the actions of others. • The people who are most important to our self. • ...
Data Communications & Networks II 2012-10-07
Across
- Acronym for Classless Inter-Domain Routing
- Older network designs always placed the router at the ______ of the network.
- UDP Protocol is ___________ technology.
- Particular format of electrical pulses.
- Implementing dynamic NAT automatically creates a __________ between your internal network and outside networks.
- ATM stands for:
- At the TCP/IP network access layer, the protocol data unit is called a ___________.
- Filtering, flooding and transmitting frames is the function of a _____________.
- A disadvantage of satellite communication is a ______ delay
- Which harware device might be found in the access layer of the Cisco model?
- PING stands for __________.
- If multiple errors are detected in an ATM packet the packet is:
- The TCP/IP Internet layer corresponds to the OSI ___ layer.
Down
- CSU stands for:
- Bandwidth is typically represented in bits per ________.
- Acronym for Wide Area Network
- The inter-network processor that is an interface between two different or dissimilar networks.
- MAN stands for:
- An increasingly popular method of distributing network at home is the _ _ _ _.
- The TCP/IP host-to-host layer corresponds to the OSI____ layer.
- An example of a routed protocol would be ____.
- At this layer, speed and latency are of the utmost concer...
- A short range device used for ID cards, security devices and can replace UPC code.
- The transmission of light pulses over glass fiber is called _________ signaling.
- The first 48 bits of an Ethernet frame is the ________.
- Another name for CIDR is:
- TCP Protocol is ________ circuit technology.
- At the TCP/IP host-to-host layer the protocol data unit is called a ____________.
- At the TCP/IP internet layer the protocol data unit is called a __________.
- A condition when a communications link, path or network experiences a load that exceeds it's capacity is ___________.
30 Clues: CSU stands for: • MAN stands for: • ATM stands for: • Another name for CIDR is: • PING stands for __________. • Acronym for Wide Area Network • UDP Protocol is ___________ technology. • Particular format of electrical pulses. • Acronym for Classless Inter-Domain Routing • TCP Protocol is ________ circuit technology. • An example of a routed protocol would be ____. • ...
Graphs and Networks #2 2020-08-01
Across
- A vertex that is not connected to any other vertex
- A point in a graph that represents an object
- A trail that starts and ends at the same vertex
- A route through a graph from one vertex to another along the edges
- A line in a graph that connects two vertices
- A graph that has no isolated vertices and no separate parts
- A graph that has numbers associated with its edges
- A graph that can be drawn so that no two edges cross over
- An edge that connects a vertex to itself
- A square matrix that records the number of edges connecting each pair of vertices
- A diagram that shows the connections between objects
- The number of edges attached to a vertex
Down
- A graph with directions associated with the edges
- An open path that visits every vertex of the graph
- A graph that does not have any loops or multiple edges
- A walk that has no repeated edges
- An edge that if removed would leave the graph no longer connected
- A closed trail that involves every edge of the graph
- A walk that starts and ends at different vertices
- A walk that starts and ends at the same vertex
- A closed path that visits every vertex of the graph
- A closed path
- A walk that has no repeated edges AND no repeated vertices
- A weighted graph where the weights represent physical quantities such as distance time or cost
- An area in a graph enclosed between edges
25 Clues: A closed path • A walk that has no repeated edges • An edge that connects a vertex to itself • The number of edges attached to a vertex • An area in a graph enclosed between edges • A point in a graph that represents an object • A line in a graph that connects two vertices • A walk that starts and ends at the same vertex • A trail that starts and ends at the same vertex • ...
Networks and Founding Teams 2024-11-25
Across
- – It concerns connecting people which will be beneficial for each other’s business.
- – A state university owned by the government that offers incubation programs.
- – They are hired to fill the need for talents in a business.
- – They are great sources for entrepreneurs to be successful in business.
- – A place for startups that offer support staff and equipment for development.
- media – A trend today for making it easy to build a network.
- – The Philippines is known for launching and nurturing these.
- – Founding members should be _______.
- – A partnership program between Globe telco-backed Kickstart Ventures and web engineering firm Proudcloud.
- – An individual who makes the hardest decisions, and the one that is looked up to.
- – An individual who always completes tasks whether complex or not.
- – The quality of an entrepreneur that enables to be reached out by others to effectively network.
- – They do not have salary and only earn from equity, but they are the basis as to when a company fails or succeeds.
- – A good source of new customers for entrepreneurs who wants to achieve business goals easier.
Down
- – The possibility to achieve something. It involves joint ventures, client leads, and partnership, etc.
- – Not only invests in money but also in relationships as well.
- – Comes from the business owner that can help an entrepreneur to improve business and personal life.
- – The country that uses Rotary Club membership to network both personal and business matters.
- – The means to exchange knowledge and information to one another.
- – It is considered vital in networking. It involves passing learned lessons about life and business to others.
- - The scope of mentor-driven business network by accelerators.
- – The last name of Mark Zuckerberg’s mentor.
- – The scope of mentor-driven business network by incubators.
- Clubs – Ideal networking groups for entrepreneurs who aims to combine services to their communities.
- – A place for existing business that helps them achieve growth.
- – They are ought to join business meetings, events, awards, and seminars, to personally interact with people in the industry.
- Animal – An individual who is a strong salesperson.
- Team – These offer a good chance for the success of a startup. They cannot be changed.
- – A phenomena that cannot be avoided and that needs to be accepted to operate a business with positivity.
- – The company that has an incubator entitled “Ideaspace Foundation”
30 Clues: – Founding members should be _______. • – The last name of Mark Zuckerberg’s mentor. • Animal – An individual who is a strong salesperson. • – They are hired to fill the need for talents in a business. • – The scope of mentor-driven business network by incubators. • media – A trend today for making it easy to build a network. • ...
Technology Terms 2023-08-16
Across
- A point within a network that interconnects with other networks
- currently connected to a network or to the Internet.
- A set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers
- refers to unsolicited email messages sent for marketing purposes
- A piece of code or data created by a web server and stored on a user's computer.
- a standard or set of rules that computers and other devices use when communicating with one another.
- A measure of computer processor storage and real and virtual memory
- a microprocessor that performs many functions and calculations that make your computer run
- refers to a software program that has been developed to do harm to other computers.
- the most common way of connecting computers on a network with a wired connection.
- a way of sending messages over the internet.
- a saved link to a particular Web page
- the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet
- o load and initialize the operating system on a computer
- A software program that allows you to surf the web
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider
Down
- the number of distinct pixels that make up the display on a computer monitor. It is denoted in DPI (dots per inch)
- a website's text and information, as opposed to its design and structure
- measures designed to protect your computer, device or network from cybercrime
- the smallest unit of measurement in computing
- a device that allows computers to transmit information to each other via ordinary telephone lines
- the maximum amount of data that can travel a communications path in a given time
- the brains of your computer. It is responsible for performing calculations and tasks that make programs work
- he reduction of the size of a file
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet
- to archive and compress them into one file of smaller size using a program
- a piece of programming code inserted into other programming to cause damage
- the process of converting electronic data to an unrecognizable or encrypted form, one that cannot be easily understood by unauthorized parties
- a set of computers on a network that are managed as a unit
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a technology that allows computers and other devices to communicate via a wireless signal
31 Clues: he reduction of the size of a file • a saved link to a particular Web page • a way of sending messages over the internet. • the smallest unit of measurement in computing • A software program that allows you to surf the web • currently connected to a network or to the Internet. • o load and initialize the operating system on a computer • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
Networked Entertainment in Computer Networks 2025-05-21
Across
- Protocol used to control streaming media sessions
- Software that compresses and decompresses media files
- Direct sharing of files between users over a network
- Television content delivered over Internet Protocol networks
- Playing games over the internet with others
- Temporary storage to ensure smooth playback of streaming media
- Popular streaming service for movies and series
- Maximum data transfer rate of a network
- Quality measure for network performance, especially in streaming
Down
- Playing video or audio content directly from the internet
- Protocol used for voice communication over IP networks
- Variation in packet arrival time, affecting streaming quality
- Delay between a user's action and the response in streaming
- Method of sending data to multiple recipients simultaneously
- Device used to receive and decode digital television broadcasts
15 Clues: Maximum data transfer rate of a network • Playing games over the internet with others • Popular streaming service for movies and series • Protocol used to control streaming media sessions • Direct sharing of files between users over a network • Software that compresses and decompresses media files • Protocol used for voice communication over IP networks • ...
DCS 2017-06-26
Across
- combined Digital and analogue signal
- display where alarms can be suppressed temporarily
- Bumpless transfer
- topology where every node can hear every message
- Communication in one direction only
- Maximum number of items to be displayed on a trend graph
- graphical display
- feedforward controller
- displays all eight slots together
- symbol is K
- field Devices
- related to effect of work environment on health
- topology with automatic acknowledgement of messages
- Has a hold device
- Error checking method
Down
- Live graphical display of PV
- Units designed to connect dissimilar networks
- Number of controller slots
- All digital signal
- Management layer for finances
- connects two separate networks to form a logical network
- one of the inputs to feedforward controller
- 4-20mA signal
- K Type
- Display is also called Control studio in Delta V
- ratio station
- All functions available at this level
- Type of barrier in intrinsic safety
- hub fails the whole network fails
29 Clues: K Type • symbol is K • 4-20mA signal • ratio station • field Devices • Bumpless transfer • graphical display • Has a hold device • All digital signal • Error checking method • feedforward controller • Number of controller slots • Live graphical display of PV • Management layer for finances • displays all eight slots together • hub fails the whole network fails • ...
PARTS OF A COMPUTER 2024-06-05
Across
- (Central Processing Unit) - Brain of the computer.
- - Enclosure for computer components.
- - Main circuit board of the computer.
- - Connects a laptop to multiple peripherals.
- - Screen that displays information.
- - Pointing device on laptops.
- State Drive - Faster storage device.
- - Connects to wired networks.
- Card - Handles rendering of images and videos.
- - Powers the BIOS memory.
- - Device for digitizing documents.
- - Dissipates heat from components.
- - Allows for additional cards to be added.
- - Processes audio data.
- - Camera for video conferencing.
- - Interface for connecting external devices.
Down
- - Reads and writes CDs and DVDs.
- - Storage device for files and programs.
- - Device for printing documents.
- - Input device for audio.
- - Lights indicating power status.
- - Connects to wireless networks.
- - Connects the computer to a network.
- - Keeps the computer from overheating.
- - Firmware for booting the computer.
- - Output device for sound.
- - Input device with keys for typing.
- (Random Access Memory) - Temporary memory used for running programs.
- Supply - Provides power to the computer.
- - Pointing device for navigation.
30 Clues: - Processes audio data. • - Input device for audio. • - Powers the BIOS memory. • - Output device for sound. • - Pointing device on laptops. • - Connects to wired networks. • - Reads and writes CDs and DVDs. • - Device for printing documents. • - Connects to wireless networks. • - Camera for video conferencing. • - Lights indicating power status. • ...
Chapter 3 2012-09-05
Across
- accessing computers or networks without permission?
- browser lets you find and veiw web pages?
- a scheme used to take money under false pretenses?
- term often used to describe rules for proper online behavior?
- electronic transfer of messages?
- users can post messages?
- virus a destructive program?
- computer that links with another computer is called?
Down
- theft A that person can pretend to be the person to own there information
- names URL contains this example:www.nasa.gov
- a special hardware and software is called a _______.
- Search engines such as google find the _______ of a word?
- resource locator a address for a website EXAMPLE:www.google.com
- a web of computer networks that spans the earth?
- Wide Web An important part of the internet?
15 Clues: users can post messages? • virus a destructive program? • electronic transfer of messages? • browser lets you find and veiw web pages? • Wide Web An important part of the internet? • names URL contains this example:www.nasa.gov • a web of computer networks that spans the earth? • a scheme used to take money under false pretenses? • ...
Chapter 3 2012-09-05
Across
- a word used to find a certain site
- accessing computers or networks without permission
- allows users to post messages for others to read
- the electronic transfer of messages
- a web of computer networks that spans the earth.
- the selling and buying of products on the Internet
- a list of sites that you created
- a scheme used to take money under false pretenses
Down
- theft when someone steals somebody's identity
- moral standards or values
- names URL's contain these
- Wide Web a system of computers that can handle documents formatted in a special language
- a term often used to describe rules for proper online behavior\
- a feature to find information
- any unsolicited or unwanted message
15 Clues: moral standards or values • names URL's contain these • a feature to find information • a list of sites that you created • a word used to find a certain site • the electronic transfer of messages • any unsolicited or unwanted message • theft when someone steals somebody's identity • allows users to post messages for others to read • ...
Green IT Crossword 2023-11-27
Across
- What is the most common greenhouse gas?
- ... energy is energy from resources that are naturally replenished on a human timescale
- The act or process of consuming
- The short name of malicious software
- Unwanted or unusable materials
- The protection of computer systems and networks from attacks by malicious actors
- Your mostly used device
- The process of converting waste materials into new materials and objects
- The production and discharge of something, especially gas or radiation
Down
- ... is a social goal for people to co-exist on Earth over a long time
- Make smaller or less in amount, degree, or size
- Tool for reporting spam and physhing emails
- What kind of footprint is associated with global warming?
- The network of networks
- The action of one object coming forcibly into contact with another
- Our platform of communication
- The process of encoding information
- Ticketing system
18 Clues: Ticketing system • The network of networks • Your mostly used device • Our platform of communication • Unwanted or unusable materials • The act or process of consuming • The process of encoding information • The short name of malicious software • What is the most common greenhouse gas? • Tool for reporting spam and physhing emails • ...
GLian - Network Devices 2023-01-03
Across
- protects data and equipment on a network from unauthorized access
- receives data from one port and sends it to others
- low cost, microsegments a LAN
- uses IP addresses to forward traffic to other networks
- unsupported systems still used in modern networks (hyphen space)
- uses radio waves to connect to wireless NIC(acronym)
- passively monitors traffic on a network(acronym)
- collects incoming cable runs in a facility (hyphen space)
- a cloud device that allows administrators to manage network devices (hyphen spaces)
- all inbound and outbound traffic flows through a...(acronym)
Down
- related to many legacy systems (hyphen space)
- divides and filters LAN segments
- monitors all end devices in a network (acronym)
- regenerates weak signals
- basically an all in on security system (acronym)
- uses existing electrical wiring to connect devices (acronym)
- provides physical connection to network
- method for powering devices without a battery or outlet (acronym)
18 Clues: regenerates weak signals • low cost, microsegments a LAN • divides and filters LAN segments • provides physical connection to network • related to many legacy systems (hyphen space) • monitors all end devices in a network (acronym) • basically an all in on security system (acronym) • passively monitors traffic on a network(acronym) • ...
abigail chalfont 2019-02-26
16 Clues: thief • public • danger • to kill • to show • website • game show • interview • sports show • to be bored • cartoon show • horror movie • to be arrested • social networks • to be in love with • the star of the show
Network and Cable 2021-01-27
Across
- It is a type of cabling that is used in local area networks to connect a PC to a network hub and router.
- It is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 185 meters.
- It is a type of cabling that can be used to connect two network devices directly, without the need for a router in the middle.
- A type of network cable that uses glass or plastic to transmit data.
Down
- It is a type of copper cabling that has two or four pairs of wires.
- It is a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500 meters.
- It is a type of fiber-optic cable that has a thicker core than a single-mode cable.
- It is a type of fiber-optic cable that has a very thin core.
- It is a type of copper cabling that is used for telephone communications and most Ethernet networks.
- It is a copper-cored cable surrounded by heavy shielding.
10 Clues: It is a copper-cored cable surrounded by heavy shielding. • It is a type of fiber-optic cable that has a very thin core. • It is a type of copper cabling that has two or four pairs of wires. • A type of network cable that uses glass or plastic to transmit data. • It is a type of fiber-optic cable that has a thicker core than a single-mode cable. • ...
Jack Dempsey networks crossword 2019-12-12
Across
- sends and receives radio waves via a wireless router
- any hardware connected to a computer
- a group of two or more computers which are connected together.
- (_*_) NIC: built into every mobile networked device capable of connecting to the internet
- the type of topology the internet is
- an application that runs on the internet
- (_*_) broadband: the delivery of an internet service using mobile phone technology
- enables computer and file server to communicate
- language used to make web pages
- a type of topology with all computers connecting to a single central switch/server
Down
- a type of topology with data going through all computers until reaching the server
- (_*_) of (_*_) things: a term used to describe the increasing number of devices being connected to the internet
- person who buys up web domain names
- designed to enable a range of portable devices to connect in a close proximity
- an agreed set of rules on a network for finding and receiving data
- (_*_) fibre: allows data to be transmitted much faster than other technologies
- a type of topology with one backbone cable connecting all the computers
- a single connection point for a group of computers.
- connects two or more networks together
19 Clues: language used to make web pages • person who buys up web domain names • any hardware connected to a computer • the type of topology the internet is • connects two or more networks together • an application that runs on the internet • enables computer and file server to communicate • a single connection point for a group of computers. • ...
computing 2024-01-16
Across
- = a communications standard for delivering data and messages through networks.
- =The capacity at which a network can transmit data.
- =a system of rules
- network=where you physically plug your computer
- address =the unique identifying number assigned to every device connected to the internet.
- =a computer or system that provides resources, data, services
- cable =a cord that runs from a router, modem, or network switch to your computer
- =a small segment of a larger message.
Down
- Transmission =The transfer of data from one digital device to another
- Network =interconnected computing devices
- network = a computer network that makes use of Radio Frequency
- =the central or main part of something
- =a global network of billions of computers
- = device that connects two or more packet-switched networks
- = a communication method
- hardware =physical devices that facilitate communication
16 Clues: =a system of rules • = a communication method • =a small segment of a larger message. • =the central or main part of something • Network =interconnected computing devices • =a global network of billions of computers • network=where you physically plug your computer • =The capacity at which a network can transmit data. • ...
Cyber Warfare 2022-08-08
Across
- Where you can find GCHQ
- The use of computer technology to disrupt the activities of a state or organisation.
- Activists enthusiastic about hacking with neither good nor bad intentions.
- Term for a recently discovered exploit/weakness.
- "Father" of code-breaking.
- Act of compromising digital devices and networks through unauthorised access.
Down
- Where Joan Clarke worked during WW2.
- Breaks into protected systems and networks with permission to test their security.
- Malicious computer worm uncovered in 2010.
- UK's intelligence agency.
- Another term for "Malicious Software".
- Cyber criminals with malicious intent.
- A type of computer program that replicates itself by modifying other computer programs and inserting its own code.
- Code created by German's during WW2.
- Overwhelming a service or network with internet traffic.
15 Clues: Where you can find GCHQ • UK's intelligence agency. • "Father" of code-breaking. • Where Joan Clarke worked during WW2. • Code created by German's during WW2. • Another term for "Malicious Software". • Cyber criminals with malicious intent. • Malicious computer worm uncovered in 2010. • Term for a recently discovered exploit/weakness. • ...
Wordplay 2021-11-26
Across
- Network infrastructure used commonly for mobile networks
- Global competence assessment tool
- A general-purpose, concurrent, functional programming language, and a garbage-collected runtime system associated with Ericsson
- Device or computer program which encodes or decodes a data stream or signal
- Your guide on Ericsson's ethical business conduct
- One of your Core value
- Voluntary project within Ericsson build to provide answer to queries
- Corporate title of person in-charge of Quality
- An Ericsson Product within BDGS-OSS portfolio
Down
- Signal which are Continuous and time varying in nature
- Ericsson’s learning platform and one-stop shop for learning
- Policy on mobile connection
- Centralized supervision, monitoring & maintenance place of Enterprise IT
- Which never sleeps
- Ericsson's competition in Networks
- Multiple customer units addressing OPCOs are controlled under a single umbrella
- A program on people transformation comprising of 5 principles
- Annual recognition event
- Setup in India to realize the objectives of the National Digital Communications Policy of the Government of India
- Comprises of our theme for SDEA 2021
20 Clues: Which never sleeps • One of your Core value • Annual recognition event • Policy on mobile connection • Global competence assessment tool • Ericsson's competition in Networks • Comprises of our theme for SDEA 2021 • An Ericsson Product within BDGS-OSS portfolio • Corporate title of person in-charge of Quality • Your guide on Ericsson's ethical business conduct • ...
Web Terms 2015-09-26
Across
- paragraph tag
- tag used to enclose website title
- uses keywords to find matching websites
- a group of information on a computer that can be software programs or data
- both sender and receiver are active at same time
- pictures, videos, music, graphics
- tag that encloses all of HTML coding
- codes or tags the browsers use to create webpages
- tag used to give emphasis
- universal communication medium
- networks that are geographically close
- tag that encloses almost all of the HTML coding and content
Down
- use of copyright materials belonging to someone other than yourself
- smallest heading tag
- visits websites to build an index
- popular search engine
- sender and receiver are active at different times
- using a false identity to complete another person's work
- used to connect all computers in an area or building
- tag used to give emphasis through bolding
- ownership of multimedia
- a system attached to UT resources to capture data packets
- networks that are not geographically close
- biggest heading tag
24 Clues: paragraph tag • biggest heading tag • smallest heading tag • popular search engine • ownership of multimedia • tag used to give emphasis • universal communication medium • visits websites to build an index • tag used to enclose website title • pictures, videos, music, graphics • tag that encloses all of HTML coding • networks that are geographically close • ...
Computer Network 2025-04-20
Across
- : This type of network has no central server
- : The full form of URL
- : The OSI layer responsible for logical addressing
- : Device that connects different networks together
- : Cyberattack that overwhelms a server with traffic
- : Wi-Fi security protocol (e.g., WPA2)
- : The full form of LAN
- : Software that controls access to or from a network
- : Network that spans across cities or countries
Down
- : Medium used in wired networks for data transmission
- : Unique address used to identify a device on a network
- : Protocol for sending emails
- : The process of converting data into a secure format
- : A unique physical address assigned to each network interface
- : This protocol ensures reliable communication at the Transport layer
- : Protocol used to transfer files over the Internet
- : Network type within a small area, like a school or home
- : Smallest unit of data in a network
- : OSI layer that ensures data is formatted and encrypted
- : A device used to amplify or regenerate signals
20 Clues: : The full form of URL • : The full form of LAN • : Protocol for sending emails • : Smallest unit of data in a network • : Wi-Fi security protocol (e.g., WPA2) • : This type of network has no central server • : Network that spans across cities or countries • : A device used to amplify or regenerate signals • : The OSI layer responsible for logical addressing • ...
CN 2025-07-31
Across
- A method used to avoid collisions in wireless networks
- Noise and signal loss over a medium is called.
- Multiplexing method that assigns separate frequencies
- The rate at which bits are transmitted.
- Layer that deals with user interfaces and APIs
- Adds source and destination IP addresses
- A way to uniquely identify devices in a LAN.
- Controls frame flow and retransmissions
- A device that connects multiple networks together
- Converts analog signals back into digital form
- Layer responsible for electrical and mechanical interface.
Down
- Technique that allows multiple signals to travel simultaneously on the same channel.
- Smallest unit of data in a network
- A network device used to regenerate signals
- Encapsulates data into frames
- Used to establish, maintain and terminate network connections.
- The physical path between sender and receiver
- Layer that provides encryption and compression
- Type of network topology where each device connects to a central hub.
- Breaks data into segments and ensures reliable delivery.
- A simple electrical circuit model for physical layer
21 Clues: Encapsulates data into frames • Smallest unit of data in a network • The rate at which bits are transmitted. • Controls frame flow and retransmissions • Adds source and destination IP addresses • A network device used to regenerate signals • A way to uniquely identify devices in a LAN. • The physical path between sender and receiver • ...
Technical quiz 2023-10-04
Across
- perations that don't require synchronization.
- A method for training neural networks.
- A versatile programming language.
- The virtual environment of computer networks.
- Software that serves web pages to users.
Down
- Software with freely available source code.
- Delay in data transmission.
- High-speed storage for frequently accessed data.
- The smallest unit of a digital image.
9 Clues: Delay in data transmission. • A versatile programming language. • The smallest unit of a digital image. • A method for training neural networks. • Software that serves web pages to users. • Software with freely available source code. • perations that don't require synchronization. • The virtual environment of computer networks. • ...
CROSSWORDZ 2021-11-26
Across
- Your guide on Ericsson's ethical business conduct
- Which never sleeps
- Corporate title of person in-charge of Quality
- Network infrastructure used commonly for mobile networks
- Setup in India to realize the objectives of the National Digital Communications Policy of the Government of India
- Voluntary project build to provide answer to queries
- Comprises of our theme for SDEA 2021
- One of your Core value
- A general-purpose, concurrent, functional programming language, and a garbage-collected runtime system
Down
- Program on mobile connection
- Device or computer program which encodes or decodes a data stream or signal
- Global competence assessment tool
- Annual recognition event
- Multiple units addressing OPCOs are controlled under a single umbrella
- A program on people transformation comprising of 5 principles
- Centralized supervision, monitoring & maintenance place of Enterprise IT
- Ericsson's competition in Networks
- Ericsson’s learning platform and one-stop shop for learning
- Signal which are Continuous as time varying in nature
- The solution to the lack of communication between enterprise apps
20 Clues: Which never sleeps • One of your Core value • Annual recognition event • Program on mobile connection • Global competence assessment tool • Ericsson's competition in Networks • Comprises of our theme for SDEA 2021 • Corporate title of person in-charge of Quality • Your guide on Ericsson's ethical business conduct • Voluntary project build to provide answer to queries • ...
Module 7 and 8 2017-03-21
Across
- Connects networks (uses IP addresses)
- Data flows in one direction one at a time
- Data flows in a one-way transmission
- similar to placing a regular, non-registered, letter in the mail.
- A type of cable constructed of either copper or aluminum and carries data in form of electrical signals
- analogous to sending packages that are tracked from source to destination
- A type of copper cabling used for telephone communications and most Ethernet Networks
- Wireless Local Area Network
- Local Area Network
- Personal Area Network
Down
- Fifth layer of the OSI Model
- Data flows in both directions at the same time
- A type of cable that uses light to transmit signal
- Seventh layer of the OSI Model
- Receives data on one port and then sends it out on all other ports
- Power over Ethernet
- First layer of the OSI Model
- Internet Control Message Protocal
- Metropolitan Area Network
- Wide Area Network
20 Clues: Wide Area Network • Local Area Network • Power over Ethernet • Personal Area Network • Metropolitan Area Network • Wireless Local Area Network • Fifth layer of the OSI Model • First layer of the OSI Model • Seventh layer of the OSI Model • Internet Control Message Protocal • Data flows in a one-way transmission • Connects networks (uses IP addresses) • ...
Pre-Training AI Executive Workshop 2025-03-24
Across
- ผู้เชี่ยวชาญด้านการออกแบบและปรับแต่ง Prompt เพื่อให้โมเดล AI สร้างผลลัพธ์ที่ตรงความต้องการ
- การเรียนรู้จากข้อมูลที่ไม่มีป้ายคำตอบ เพื่อค้นหารูปแบบหรือกลุ่มในข้อมูลด้วยตัวเอง
- การใช้โมเดล AI เพื่อพยากรณ์หรือทำนายเหตุการณ์ในอนาคต เช่น ยอดขายหรือแนวโน้มตลาด
- ช่วงตรวจสอบโมเดลด้วยข้อมูลใหม่ที่ไม่เคยเห็นในการฝึก เพื่อประเมินประสิทธิภาพ
- การปรับโมเดลที่ฝึกไว้แล้ว (Pretrained) ให้เข้ากับงานเฉพาะด้านด้วยข้อมูลใหม่จำนวนน้อย
- โมเดลเข้ารหัส-ถอดรหัสเชิงความน่าจะเป็น ที่สามารถสร้างข้อมูลใหม่ได้อย่างหลากหลาย
- ชั้นที่ซ่อนอยู่ระหว่างอินพุตและเอาต์พุตใน Neural Networks ทำหน้าที่สกัดคุณลักษณะเชิงลึก
- ชั้นภายในโครงข่ายประสาทเทียม ซึ่งใช้ประมวลผลและถ่ายทอดข้อมูลสู่ชั้นถัดไป
- การประมวลผลเสียงพูดเพื่อแปลงเป็นข้อความให้คอมพิวเตอร์เข้าใจ
- การแก้ปัญหาโดยลองทุกความเป็นไปได้เท่าที่มี จนกว่าจะพบคำตอบที่ถูกต้อง
- ข้อมูลที่สร้างขึ้นโดยโมเดลหรือกระบวนการประดิษฐ์ เพื่อใช้แทนข้อมูลจริงในงานต่างๆ
- ข้อมูลที่มีป้ายกำกับชัดเจน เช่น รูปสุนัขพร้อมระบุว่าเป็น ‘สุนัข’ ให้โมเดลใช้ฝึก
- เทคนิคทำให้คอมพิวเตอร์ ‘เห็น’ และวิเคราะห์รูปภาพหรือวิดีโอได้
- การผสานผลของหลาย Decision Trees เพื่อเพิ่มความแม่นยำของการทำนาย
- โมเดลคู่ระหว่างตัวสร้างกับตัวแยกแยะ ที่แข่งขันกันเพื่อผลิตข้อมูลใหม่ที่สมจริง
- ข้อมูลที่ไม่มีป้ายกำกับ โมเดลต้องหาความสัมพันธ์หรือโครงสร้างเอง
- เทคโนโลยีที่ทำให้เครื่องจักรสามารถเลียนแบบการเรียนรู้หรือพฤติกรรมคล้ายมนุษย์
- สถาปัตยกรรมโมเดลที่ใช้กลไกการมุ่งความสนใจ (Attention) ทำงานได้ดีในการประมวลผลข้อความ
- ปัญญาประดิษฐ์ที่มีความฉลาดเหนือกว่ามนุษย์ในทุกด้าน (ยังเป็นแนวคิดในอนาคต)
Down
- แนวทาง AI ที่มุ่งเน้นการสร้างเนื้อหาใหม่ เช่น ข้อความ ภาพ เสียง แทนการวิเคราะห์อย่างเดียว
- การเรียนรู้โดยมีตัวอย่างอินพุตและคำตอบที่ถูกต้อง ให้โมเดลฝึกจับคู่ระหว่างทั้งสอง”
- ช่วงที่โมเดลกำลังเรียนรู้และปรับค่าพารามิเตอร์จากตัวอย่างข้อมูลที่จัดเตรียมไว้
- ตัวแปรภายในโมเดล (เช่น น้ำหนักหรือเวคเตอร์) ที่โมเดลปรับค่าเพื่อให้ทำนายได้ดีขึ้น
- โมเดลสร้างข้อมูลใหม่โดยจำลองกระบวนการกระจายแล้วย้อนกลับ จนได้ผลงานที่มีความละเอียด”
- การทำนายตัวเลขต่อเนื่อง เช่น ราคาหุ้น หรืออุณหภูมิในอนาคต
- ปัญญาประดิษฐ์ที่มีความสามารถกว้างเทียบเท่ามนุษย์ในหลากหลายงานและสถานการณ์
- การเรียนรู้ด้วยรางวัลและบทลงโทษ เพื่อปรับพฤติกรรมของเอเจนต์ให้บรรลุเป้าหมาย
- การทำให้คอมพิวเตอร์เรียนรู้จากข้อมูลเพื่อคาดการณ์หรือจำแนกผลลัพธ์โดยอัตโนมัติ
- โปรแกรมโต้ตอบข้อความหรือเสียงกับผู้ใช้ โดยเลียนแบบพฤติกรรมการสนทนาของมนุษย์
- โมเดลภาษาขนาดใหญ่ที่สร้างข้อความได้หลากหลาย โดยฝึกล่วงหน้าบนข้อมูลจำนวนมาก
- การจัดกลุ่มข้อมูลที่มีลักษณะคล้ายกันเข้าด้วยกัน โดยไม่มีป้ายกำกับล่วงหน้า
- โมเดลที่ใช้โครงสร้างแตกแขนงเหมือนต้นไม้ เพื่อแบ่งข้อมูลตามคุณสมบัติทีละขั้น
- หน่วยประมวลผลกราฟิกที่เก่งงานประมวลผลขนาน นิยมใช้เร่งความเร็วในการฝึกโมเดล AI
- ระบบหรือซอฟต์แวร์ที่ทำงานด้วยตัวเองโดยอัตโนมัติ พร้อมตัดสินใจและเรียนรู้ได้อย่างอิสระ
- ปัญญาประดิษฐ์ที่เก่งหรือเชี่ยวชาญเฉพาะด้าน เช่น แยกแยะภาพ แม่นยำกว่ามนุษย์ในงานจำเพาะ
- โครงข่ายประสาทเทียมที่ใช้ฟิลเตอร์สไลด์ผ่านข้อมูล (โดยเฉพาะรูปภาพ) เพื่อดึงคุณลักษณะ
- โครงข่ายที่จำลองการทำงานของเซลล์ประสาทในสมอง เพื่อประมวลผลข้อมูลแบบเชิงลึก
- การให้โมเดล AI แสดงลำดับการคิดหรือเหตุผลกลางคัน เพื่อคาดการณ์คำตอบได้โปร่งใสขึ้น
- การเรียนรู้เชิงลึกด้วย Neural Networks หลายชั้น เพื่อสกัดข้อมูลเชิงซับซ้อน
- การจัดข้อมูลให้อยู่ในหมวดหมู่ต่าง ๆ เช่น จำแนกอีเมลเป็นสแปมหรือไม่สแปม
- โมเดลภาษาขนาดใหญ่ที่ผ่านการฝึกด้วยข้อมูลจำนวนมาก เพื่อเข้าใจและสร้างข้อความ
- ขั้นตอนแบ่งข้อความออกเป็นหน่วยย่อย เช่น คำหรือสัญลักษณ์ ก่อนป้อนเข้าระบบ AI
- อาการที่โมเดล Generative AI สร้างคำตอบหรือข้อมูลที่ไม่ตรงกับข้อเท็จจริงโดยไม่ตั้งใจ
- ข้อความหรือคำสั่งนำที่เราป้อนให้โมเดล เพื่อกระตุ้นให้สร้างหรือโต้ตอบตามเป้าหมาย
- ระบบ AI ที่มีความสามารถในการใช้ตรรกะหรือกฎความรู้ เพื่อสรุปผลหรือให้คำแนะนำ
45 Clues: การทำนายตัวเลขต่อเนื่อง เช่น ราคาหุ้น หรืออุณหภูมิในอนาคต • การประมวลผลเสียงพูดเพื่อแปลงเป็นข้อความให้คอมพิวเตอร์เข้าใจ • เทคนิคทำให้คอมพิวเตอร์ ‘เห็น’ และวิเคราะห์รูปภาพหรือวิดีโอได้ • การผสานผลของหลาย Decision Trees เพื่อเพิ่มความแม่นยำของการทำนาย • ข้อมูลที่ไม่มีป้ายกำกับ โมเดลต้องหาความสัมพันธ์หรือโครงสร้างเอง • ...
NETWORKING CONCEPT 2025-07-29
Across
- Sends data to all devices in the network
- Network limited to a small geographic area
- Network that spans a large geographic area
- Connects different types of networks and finds best route
- Topology with a single communication backbone
- Sends data only to the intended recipient device
- Layout of a network’s components and connections
- A single computer in a network
- Peripheral device used to get hard copies of documents
- Device that converts digital signals into analog and vice versa
- Private network used within an organisation
Down
- Short-range wireless communication technology
- Wireless technology for local area networks
- Group of connected computers and devices
- Something shared in a network like data or hardware
- Topology where devices connect through a central hub
- Central computer managing network resources
- Computer that accesses shared resources from a server
- Topology where data travels in a circular path
- Topology where each node connects to every other node
20 Clues: A single computer in a network • Sends data to all devices in the network • Group of connected computers and devices • Network limited to a small geographic area • Network that spans a large geographic area • Wireless technology for local area networks • Central computer managing network resources • Private network used within an organisation • ...
Technical quiz 2023-10-04
Across
- perations that don't require synchronization.
- A method for training neural networks.
- A versatile programming language.
- The virtual environment of computer networks.
- Software that serves web pages to users.
Down
- Software with freely available source code.
- Delay in data transmission.
- High-speed storage for frequently accessed data.
- The smallest unit of a digital image.
9 Clues: Delay in data transmission. • A versatile programming language. • The smallest unit of a digital image. • A method for training neural networks. • Software that serves web pages to users. • Software with freely available source code. • perations that don't require synchronization. • The virtual environment of computer networks. • ...
Day1 2025-06-16
Across
- - Structural levels in neural networks
- - Basic unit of neural networks
- - S-shaped activation function for binary classification
- - AI that defeated Go world champion
Down
- - Process of teaching AI systems
- - Linear activation function (Rectified Linear Unit)
- - Type of neural network for image processing
- - Robot that received Saudi citizenship
- - Function for multi-class probability output
9 Clues: - Basic unit of neural networks • - Process of teaching AI systems • - AI that defeated Go world champion • - Structural levels in neural networks • - Robot that received Saudi citizenship • - Type of neural network for image processing • - Function for multi-class probability output • - Linear activation function (Rectified Linear Unit) • ...
HOW TO SPEAK SO THAT PEOPLE WANT TO LISTEN 2024-06-05
X STD VOCATIONAL IT- FA1 2014 2014-07-11
Across
- An example for Internet Service Provider
- A network device that connects different types of networks
- A network layout in which each computer connected to two other computers on either side
- Networks in which certain computers have special dedicated tasks, providing services to other computers
- A wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices
Down
- A global system of interconnected computer networks
- A set of standards used for mobile devices and mobile telecommunication services and network
- Application based Instant Messaging Software
- A device that converts digital computer signals into analog signals and vice versa
- A switching technique in which a dedicated path is established between the endpoints before data is transferred
10 Clues: An example for Internet Service Provider • Application based Instant Messaging Software • A global system of interconnected computer networks • A network device that connects different types of networks • A device that converts digital computer signals into analog signals and vice versa • ...
Unit 6 urban vocab 2025-03-24
Technology 2017-06-13
Across
- end result
- any device used to input data and commands into the computer
- ______ production in a loop
- time period in which stone was used
- the exploitation of biological processes for industrial and other purposes
- the distance between successive crests of a wave, especially points in a sound wave or electromagnetic wave
- _____ production for unique items
- a new invention
- _____ energy using heat
- to know something
- a computer that manages access to a centralized resource or service in a network
- device that converts information
Down
- any device that accepts processed data (information) from the computer and presents the results to the user
- genetically altered or modified organism
- first physical design
- the application of scientific knowledge for practical purposes, especially in industry.
- a place, person, or thing from which something comes or can be obtained
- a device that sends signals
- groups of interconnected computers and networks designed to share resources
- reveals the message
20 Clues: end result • a new invention • to know something • reveals the message • first physical design • _____ energy using heat • ______ production in a loop • a device that sends signals • device that converts information • _____ production for unique items • time period in which stone was used • genetically altered or modified organism • ...
Tech Terms 2022-11-28
Across
- a networking device that forwards data packets between computer networks
- #1 thing a computer does
- browser
- #4 thing a computer does
- copying data from one computer to another
- software designed to cause disruption computers,servers,and computer networks
- central processing unit
- #2 thing a computer does
- command for copy
- systems the software that supports a computer's basic operation
- browser
- search engine
- a unit of information equal to around one million bytes
- LAN connecting computers together in a wired network
Down
- you wanna ____ when you're lagging or glitchy
- address internet protocol
- #3 thing a computer does
- hyper text markup language
- magnetic storage for computers
- portable document format
- 0101010101
- uniform resource locater
- a network security system that monitors incoming and outgoing network traffic
- small blocks of data created by web servers
- the smallest unit of data
- search engine
- a hardware device that converts data from digital formats into analog transmission
- command for paste
- a group of binary digits
29 Clues: browser • browser • 0101010101 • search engine • search engine • command for copy • command for paste • central processing unit • #3 thing a computer does • #1 thing a computer does • #4 thing a computer does • portable document format • uniform resource locater • #2 thing a computer does • a group of binary digits • address internet protocol • the smallest unit of data • hyper text markup language • ...
Tech Terms 2022-11-28
Across
- command for paste
- the smallest unit of data
- a unit of information equal to around one million bytes
- a network security system that monitors incoming and outgoing network traffic
- copying data from one computer to another
- uniform resource locater
- a networking device that forwards data packets between computer networks
- systems the software that supports a computer's basic operation
- address internet protocol
- browser
- browser
- #1 thing a computer does
- command for copy
- a group of binary digits
- search engine
Down
- 0101010101
- search engine
- #2 thing a computer does
- LAN connecting computers together in a wired network
- magnetic storage for computers
- small blocks of data created by web servers
- software designed to cause disruption computers,servers,and computer networks
- a hardware device that converts data from digital formats into analog transmission
- portable document format
- central processing unit
- #4 thing a computer does
- #3 thing a computer does
- hyper text markup language
- you wanna ____ when you're lagging or glitchy
29 Clues: browser • browser • 0101010101 • search engine • search engine • command for copy • command for paste • central processing unit • #2 thing a computer does • uniform resource locater • portable document format • #4 thing a computer does • #1 thing a computer does • #3 thing a computer does • a group of binary digits • the smallest unit of data • address internet protocol • hyper text markup language • ...
Networking Terms 2024-11-15
Across
- device that converts data for transmission over a phone line or cable
- central point for connecting multiple devices in a network
- device that boosts network signals over long distances
- device that acts as an entry point between different networks
- any device connected to a network
- device that connects and manages data flow between devices
- local area network covering a small geographic area
- unique identifier assigned to devices on a network
- system of interconnected devices for communication
- network connection without physical cables
Down
- device that accepts data transmissions
- standard technology for wired network connections
- computer or device connected to a network
- device that connects and filters traffic between two network segments
- server acting as an intermediary for client requests
- wireless technology for connecting devices to a network
- initiates and transmits data in a communication
- system for monitoring and controlling incoming/outgoing network traffic
- wide area network covering large geographic areas
- device that directs data packets between networks
20 Clues: any device connected to a network • device that accepts data transmissions • computer or device connected to a network • network connection without physical cables • initiates and transmits data in a communication • standard technology for wired network connections • wide area network covering large geographic areas • device that directs data packets between networks • ...
Networking Concepts 2025-06-08
Across
- A basic device that connects multiple devices in a network
- A network spread over a large geographic area
- Wireless network technology
- Address A unique number assigned to each device on a network
- A device that directs data packets between computer networks
- Translates domain names to IP addresses
- A computer that requests data from a server
- A small unit of data sent over a network
- A network limited to a small area like a home or office
- Set of rules for communication between devices
- A computer that provides data to other computers
- Connects two different networks
Down
- The maximum data transfer rate of a network
- A device that connects devices in a LAN and filters data
- A security system to prevent unauthorized access
- Converts digital data to signals for transmission over phone lines
- A group of connected computers
- A company that provides internet access
- The physical layout of a network
- A common wired networking technology
20 Clues: Wireless network technology • A group of connected computers • Connects two different networks • The physical layout of a network • A common wired networking technology • A company that provides internet access • Translates domain names to IP addresses • A small unit of data sent over a network • The maximum data transfer rate of a network • ...
Artificial Intelligence 2024-11-08
Across
- AI stands for artificial___________
- A classic example of AI
- The type of AI that creates original content
- This is modeled after the human brain
- In this type of learning, knowledge gained from one task is used to improve another
- Neural networks are made of these
Down
- This type of learning uses trial and error
- AI allows computers to simulate_____
- Used to train algorithms
- Machine learning uses algorithms to create_____
- learning A subset of machine learning that uses layered neural networks
11 Clues: A classic example of AI • Used to train algorithms • Neural networks are made of these • AI stands for artificial___________ • AI allows computers to simulate_____ • This is modeled after the human brain • This type of learning uses trial and error • The type of AI that creates original content • Machine learning uses algorithms to create_____ • ...
Computers and Careers 2022-09-27
Across
- the quality of being honest
- skills required to complete specific tasks
- ___ Engineer; applies mathematical analysis and the principles of computer science
- Network_______; designs and sets up computer networks.
- responsible for the day-to-day operation of computer networks.
- 2 words;helps customers troubleshoot problems
Down
- the state of keeping or being kept secret or private.
- middleman between business and IT
- skills used to interact with people effectively
- Careful and persistent work or effort.
- _____ writer; creates user manuals and support guides
- write codes that allow computer to function properly.
12 Clues: the quality of being honest • middleman between business and IT • Careful and persistent work or effort. • skills required to complete specific tasks • 2 words;helps customers troubleshoot problems • skills used to interact with people effectively • the state of keeping or being kept secret or private. • _____ writer; creates user manuals and support guides • ...
Primary Care Networks 2019-10-01
Across
- Primary Care Networks
- Pharmacy Quality Scheme
- NHS England and Improvement
- Community Pharmacy Contractual Framework
- Clinical Commissioning Groups
- Local Pharmaceutical Committees
Down
- Local Medical Committee
- Directed Enhanced Service
- General Practice
- Pharmaceutical Services Negotiating Committee
- NHS Long Term Plan
- Community Pharmacy Consultation Service
- Integrated Care systems
13 Clues: General Practice • NHS Long Term Plan • Primary Care Networks • Local Medical Committee • Pharmacy Quality Scheme • Integrated Care systems • Directed Enhanced Service • NHS England and Improvement • Clinical Commissioning Groups • Local Pharmaceutical Committees • Community Pharmacy Consultation Service • Community Pharmacy Contractual Framework • ...
Networks (Grade 6) 2025-01-07
Across
- is the maximum amount of data that can be transmitted in a network in a specific time
- global positioning system
- is a unique name for each user in the system
- it is a networked device that serves data to other devices
- the data is split into pieces
- is where a video or sound file is played over an internet connection
Down
- using more than its capability
- a private network that is only available within an organization
- is 8 bits
- junk mail
- scrambling the information
- without using wires
- access something they are not allowed to
13 Clues: is 8 bits • junk mail • without using wires • global positioning system • scrambling the information • the data is split into pieces • using more than its capability • access something they are not allowed to • is a unique name for each user in the system • it is a networked device that serves data to other devices • ...
WAN Concepts 2022-03-27
Across
- A type of cable that has allowed ethernet to be used as a WAN access option.
- A type of network that is connected to several LANs within a limited geographical area.
- A legacy packet-switched option
- A type of technology that uses an unlicensed radio spectrum to send and receive data.
- large high-capacity networks used to interconnect service provider networks and to create a redundant network.
- A ___ switched network establishes a dedicated circuit between endpoints before users can communicate.
- A type of topology that has dedicated leased-line connections from the edge point to the provider.
Down
- WANs are a ____ network that spans over a large geographic area.
- This outlines the expected services related to the reliability and availability of the connection.
- A type of WAN that's dedicated to a single customer.
- The physical location in a building or complex that officially separates the CPE from the service provider equipment
- A type of network that connects multiple access nodes of the service provider
- An encrypted connection between private networks over a public network.
13 Clues: A legacy packet-switched option • A type of WAN that's dedicated to a single customer. • WANs are a ____ network that spans over a large geographic area. • An encrypted connection between private networks over a public network. • A type of cable that has allowed ethernet to be used as a WAN access option. • ...
Networking Year Two 2017-02-24
Across
- Dynamically addresses devices allocated by these servers and can change regularly.
- Wide Area Network, Computers generally linked over a wide area, Business will not own the medium used to connect the machines e.g. telephone system , Files are not very secure
- A set of rules that govern the transmission of data
- Any type of local area network (LAN) in which the nodes (computers or computing devices, often portable devices) are not connected by wires but use radio waves to transmit data between them.
- For a transmission medium, the range of signal frequencies it may transmit. (Hz)
- 32 bits, written as dotted decimal addresses.E.g. 192.168.27.234
- Trademarked IEEE 802.11 technologies that support wireless networking of home and business networks.
- A system in which some computers (the clients), request services provided by other computers, the servers.
- A device that receives packets or from one host (computer) or router and uses the destination IP address that they contain to pass them correctly formatted, to another host (computer) or router.
- contains a database of IP addresses and domain name mappings.
- The full address used to find files on the Internet.
- Local Area Network, Computers generally linked over a small area, Business will have control over the medium used to connect the machines , LAN's are secure ,LAN's can share hardware as well as software & data
Down
- the complete domain name for a computer on the internet.
- IP range that has to be regetered with Internet Registries.
- e.g. 10.0.0.0 – 10.255.255.255 or 172.16.0.0 – 172.31.255.255 or 192.168.0.0 – 192.168.255.255
- a global interconnection of computers and networks.
- introduced to split large networks into smaller networks.
- a service provided on the Internet.
- A network that has no dedicated servers. All computers are of equal status and can both share resources themselves and use resources from other computers, ie they are peers.
- (Internet Corporation for Assigned Names and Numbers) oversees the allocation of domain names and addresses.
- A computer that provides shared resources to network users.
- 128 bit address introduced to solve the problem of diminishing address space.
- The number of bits transmitted per second (bps)
- The rate at which signals on a wire may change.
- IP range that cannot be found on the internet
25 Clues: a service provided on the Internet. • IP range that cannot be found on the internet • The number of bits transmitted per second (bps) • The rate at which signals on a wire may change. • a global interconnection of computers and networks. • A set of rules that govern the transmission of data • The full address used to find files on the Internet. • ...
Computer Science 2020-11-16
Across
- A basic unit of information in computing and digital communications
- It's an electronic device used to make holes
- It is intelligence demonstrated by machines
- A service that makes website accessible via the World Wide Web
- It's an organized collection of data
- A computer expert with advanced technical knowledge
- Physical parts of a computer
- A computer program that converses in natural language
- A hand-held pointing device that detects two-dimensional motion relative to a surface
- User who has all permissions on the system
- It's a system software that manages computer hardware, software resources, and provides common services for computer programs
- It's firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs
- It's the process of improving the quality and quantity of website traffic to a website or a web page from search engines
- A program that transforms source code into object code
- It is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks and wide area networks
- A method of exchanging messages between people using electronic devices
- A software application that provides comprehensive facilities to computer programmers for software development
- Tt's the global system of interconnected computer networks
Down
- A peripheral device which makes a persistent representation of graphics or text, usually on paper
- An object that has been intentionally placed into orbit
- A system used for reporting and data analysis, and is considered a core component of business intelligence
- A communication endpoint in computer networking
- An end-point in a communication across a network or the Internet
- A computer program used to prevent, detect, and remove malware
- It's a spreadsheet developed by Microsoft,It features calculation, graphing tools, pivot tables, and a macro programming language
- A small, portable personal computer
- A common means for unrelated objects to communicate with each other
- It's cause a malfunction in a computer program
- You can have light with it
- A piece of computer hardware or software that provides functionality for other programs or devices
- It is a domain-specific language used in programming and designed for managing data held in a relational database management system
- A set of instructions that describes how to perform a specific task to a computer
32 Clues: You can have light with it • Physical parts of a computer • A small, portable personal computer • It's an organized collection of data • User who has all permissions on the system • It is intelligence demonstrated by machines • It's an electronic device used to make holes • It's cause a malfunction in a computer program • A communication endpoint in computer networking • ...
Payment Card Industry and Security 2024-04-10
Across
- The process of securely storing cardholder data after a transaction has been authorized (11 letters)
- Items produced to imitate genuine articles, especially for fraudulent purposes (17 letters)
- A document provided by a third-party assessor confirming an organization's compliance with PCI DSS (10 letters)
- Dividing networks or systems into distinct sections to enhance security (18 letters)
- A practice of restricting access to cardholder data only to those who require it (13 letters)
- The practice of regularly updating software and systems to address vulnerabilities and improve security (7 letters)
- Type of encryption used to secure cardholder data during transmission over public networks (3 letters)
- Systems Mechanisms employed to thwart potential threats or attacks (13 letters)
- Established rules or procedures for communication and data exchange (17 letters)
- This document outlines security requirements for organizations that handle cardholder information (3 letters)
- Illicit practice of capturing payment card data from legitimate transactions (15 letters)
- Flaws or weaknesses in systems that can be exploited by attackers (15 letters)
- The process of securely destroying or rendering cardholder data unusable (16 letters)
- The unique identifier assigned to each credit or debit card transaction (3 letters)
Down
- A tool used to detect and prevent unauthorized access by monitoring and analyzing network traffic (17 letters)
- Term for a system or process that logs and monitors activities within a network or system (9 letters)
- Term for a system that authenticates the identity of users and ensures they have the appropriate permissions (13 letters)
- This type of assessment involves a qualified assessor evaluating an organization's compliance with PCI DSS (18 letters)
- The process of making cardholder data unreadable using cryptographic methods (10 letters)
- Testing This type of testing evaluates systems, networks, and applications for vulnerabilities that could be exploited by attackers (18 letters)
- A technique used to verify the identity of an individual based on their physical characteristics, such as fingerprints or iris scans (10 letters)
- Established rules or principles governing behavior or actions (16 letters)
- Term for security controls that detect and prevent unauthorized access to systems or networks (8 letters)
- The act of deliberately tricking a person or system into revealing confidential information (8 letters)
- Term for an unauthorized individual gaining access to cardholder data (10 letters)
- Wallets Electronic systems for storing and managing payment information securely (12 letters)
26 Clues: Established rules or principles governing behavior or actions (16 letters) • Flaws or weaknesses in systems that can be exploited by attackers (15 letters) • Established rules or procedures for communication and data exchange (17 letters) • Systems Mechanisms employed to thwart potential threats or attacks (13 letters) • ...
TecStep Crossword 2013-11-13
Across
- file A file maintained in a computer-readable form
- A resolution to do something
- How your computer is identified on the internet
- An interconnected system of networks that connect computers around the world
Down
- A small chunk of network data
- The brain of your computer
- Stores all information long term
- A tiny dote of color in an image
- Secret code for information
- A device that forwards data packets between computer networks.
- A memory device in which information can be accessed in any order
11 Clues: The brain of your computer • Secret code for information • A resolution to do something • A small chunk of network data • Stores all information long term • A tiny dote of color in an image • How your computer is identified on the internet • file A file maintained in a computer-readable form • A device that forwards data packets between computer networks. • ...
body 2021-11-01
Across
- a tough slippery membrane
- what branch's into vast networks of still smaller vessels called capillaries
- lower chamber of the heart
- cells pieces in the blood that form clots and seal up cuts
- large blood vessels that carry blood away from the heart
- drives the blood through thousands of miles of blood vessels
Down
- what transports oxygen to other cells
- vessels that are next to your bodys cells
- something that carries blood from capillary networks to veins
- contains heart, blood and blood vessels
- straw colored liquid
- large blood vessels that carry blood back to the heart
- the upper chamber of the heart
13 Clues: straw colored liquid • a tough slippery membrane • lower chamber of the heart • the upper chamber of the heart • what transports oxygen to other cells • contains heart, blood and blood vessels • vessels that are next to your bodys cells • large blood vessels that carry blood back to the heart • large blood vessels that carry blood away from the heart • ...
Social Network 2014-06-03
Across
- Tell every body what´s up with you.
- Everybody who uses social networks need one.
- No like, just +.
- You make it if you wind to tell him how his picture looks.
- If you agree with something you just have to do one klick.
- Some guys have 500+ (not likes).
- To communicate on the Internet.
Down
- Many young people do it in the bathroom and delete 99% of them after doing.
- Somebody post there everything about a travel or about their life.
- One of the most popular social networks.
- Important and popular have many of them.
- Here you can tweet like a bird.
- Message over Message.
13 Clues: No like, just +. • Message over Message. • Here you can tweet like a bird. • To communicate on the Internet. • Some guys have 500+ (not likes). • Tell every body what´s up with you. • One of the most popular social networks. • Important and popular have many of them. • Everybody who uses social networks need one. • You make it if you wind to tell him how his picture looks. • ...
Computer Science 2020-11-16
Across
- A basic unit of information in computing and digital communications
- It's an electronic device used to make holes
- It is intelligence demonstrated by machines
- A service that makes website accessible via the World Wide Web
- It's an organized collection of data
- A computer expert with advanced technical knowledge
- Physical parts of a computer
- A computer program that converses in natural language
- A hand-held pointing device that detects two-dimensional motion relative to a surface
- User who has all permissions on the system
- It's a system software that manages computer hardware, software resources, and provides common services for computer programs
- It's firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs
- It's the process of improving the quality and quantity of website traffic to a website or a web page from search engines
- A program that transforms source code into object code
- It is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks and wide area networks
- A method of exchanging messages between people using electronic devices
- A software application that provides comprehensive facilities to computer programmers for software development
- It's the global system of interconnected computer networks
Down
- A peripheral device which makes a persistent representation of graphics or text, usually on paper
- An object that has been intentionally placed into orbit
- A system used for reporting and data analysis, and is considered a core component of business intelligence
- A communication endpoint in computer networking
- An end-point in a communication across a network or the Internet
- A computer program used to prevent, detect, and remove malware
- It's a spreadsheet developed by Microsoft,It features calculation, graphing tools, pivot tables, and a macro programming language
- A small, portable personal computer
- A common means for unrelated objects to communicate with each other
- It's cause a malfunction in a computer program
- You can have light with it
- A piece of computer hardware or software that provides functionality for other programs or devices
- It is a domain-specific language used in programming and designed for managing data held in a relational database management system
- A set of instructions that describes how to perform a specific task to a computer
32 Clues: You can have light with it • Physical parts of a computer • A small, portable personal computer • It's an organized collection of data • User who has all permissions on the system • It is intelligence demonstrated by machines • It's an electronic device used to make holes • It's cause a malfunction in a computer program • A communication endpoint in computer networking • ...
StepTec Crossword 2013-11-15
Across
- An interconnected system of networks that connect computers around the world
- A resolution to do something
- Stores all information long term
- The brain of your computer
- A small chunk of network data
- A memory device in which information can be accessed in any order
Down
- Secret code for information
- A tiny dote of color in an image
- How your computer is identified on the internet
- file A file maintained in a computer-readable form
- A device that forwards data packets between computer networks.
11 Clues: The brain of your computer • Secret code for information • A resolution to do something • A small chunk of network data • A tiny dote of color in an image • Stores all information long term • How your computer is identified on the internet • file A file maintained in a computer-readable form • A device that forwards data packets between computer networks. • ...
StepTec Crossword 2013-11-15
Across
- An interconnected system of networks that connect computers around the world
- A resolution to do something
- Stores all information long term
- The brain of your computer
- A small chunk of network data
- A memory device in which information can be accessed in any order
Down
- Secret code for information
- A tiny dote of color in an image
- How your computer is identified on the internet
- file A file maintained in a computer-readable form
- A device that forwards data packets between computer networks.
11 Clues: The brain of your computer • Secret code for information • A resolution to do something • A small chunk of network data • A tiny dote of color in an image • Stores all information long term • How your computer is identified on the internet • file A file maintained in a computer-readable form • A device that forwards data packets between computer networks. • ...
choice Board spanish 2022-10-06
15 Clues: beat • shout • fight • to-lie • values • quarrel • vacation • make-bed • obedient • get-along • to-disperse • expectations • social-networks • fold-the-clothes • go-out-for-dinner
Wireless Technology 2024-04-26
Across
- Interconnected systems enabling wireless communication.
- Standards organization responsible for Wi-Fi specifications.
- Guidelines defining wireless technology specifications.
- Allows long-distance wireless communication.
- Transmission of data without physical cables.
Down
- Network enabling mobile communication with base stations in divided regions.
- Wireless technology standard for short-range communication between devices.
- Device allowing wireless devices to connect to a wired network.
- Electromagnetic waves used for wireless communication.
- Range of radio frequencies used for wireless communication.
- Device that provides Wi-Fi and connects to a modem.
- Protection of devices and networks in a wireless environment.
- Wireless networking technology based on IEEE 802.11 standards.
- Network of interconnected nodes providing robust wireless communication.
14 Clues: Allows long-distance wireless communication. • Transmission of data without physical cables. • Device that provides Wi-Fi and connects to a modem. • Electromagnetic waves used for wireless communication. • Interconnected systems enabling wireless communication. • Guidelines defining wireless technology specifications. • ...
Morghan's Crossword 2014-03-20
26 Clues: keep • link • touch • rocket • profile • shyness • in fact • assemble • industry • military • essential • to exceed • to attend • each time • communicate • engineering • refrigerator • to penetrate • to run risks • inauguration • indispensible • talking robots • social networks • grand demonstration • supersonic aircraft • to ask for a day off
Ciencia y tecnología 2022-02-28
24 Clues: cure • online • health • laptop • website • illness • password • internet • symptoms • password • username • to upload • to update • to comment • cell phone • to download • text message • email address • social networks • to surf the web • to add pic/photo • electronic devices • to connect to the internet • to disconnect from internet
Tecnología 2022-02-28
23 Clues: cure • laptop • online • Health • website • password • username • internet • symptoms • to upload • to update • to add pic • cell phone • to comment • to download • text message • email address • social networks • to surf the web • illness/ disease • electronic devices • to connect to the internet • to disconnect from the internet
Computer Science 2020-11-16
Across
- A basic unit of information in computing and digital communications
- It's an electronic device used to make holes
- It is intelligence demonstrated by machines
- A service that makes website accessible via the World Wide Web
- It's an organized collection of data
- A computer expert with advanced technical knowledge
- Physical parts of a computer
- A computer program that converses in natural language
- A hand-held pointing device that detects two-dimensional motion relative to a surface
- User who has all permissions on the system
- It's a system software that manages computer hardware, software resources, and provides common services for computer programs
- It's firmware used to perform hardware initialization during the booting process and to provide runtime services for operating systems and programs
- It's the process of improving the quality and quantity of website traffic to a website or a web page from search engines
- A program that transforms source code into object code
- It is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks and wide area networks
- A method of exchanging messages between people using electronic devices
- A software application that provides comprehensive facilities to computer programmers for software development
- Tt's the global system of interconnected computer networks
Down
- A peripheral device which makes a persistent representation of graphics or text, usually on paper
- An object that has been intentionally placed into orbit
- A system used for reporting and data analysis, and is considered a core component of business intelligence
- A communication endpoint in computer networking
- An end-point in a communication across a network or the Internet
- A computer program used to prevent, detect, and remove malware
- It's a spreadsheet developed by Microsoft,It features calculation, graphing tools, pivot tables, and a macro programming language
- A small, portable personal computer
- A common means for unrelated objects to communicate with each other
- It's cause a malfunction in a computer program
- You can have light with it
- A piece of computer hardware or software that provides functionality for other programs or devices
- It is a domain-specific language used in programming and designed for managing data held in a relational database management system
- A set of instructions that describes how to perform a specific task to a computer
32 Clues: You can have light with it • Physical parts of a computer • A small, portable personal computer • It's an organized collection of data • User who has all permissions on the system • It is intelligence demonstrated by machines • It's an electronic device used to make holes • It's cause a malfunction in a computer program • A communication endpoint in computer networking • ...
Lesson 3 Vocab #1 2023-08-31
Across
- Highlighted or underlined text in a Webpage that, when clicked, links the user to another location or Webpage.
- A worldwide network of interconnected networks.
- A server that resolves domain names into IP addresses.
- The protocol for transporting HTML documents across the Internet.
- An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
- A system that maps uniquely hierarchical names to specific Internet addresses.
- Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices.
- An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
- The data transmission standard for the Internet.
- A group of computers connected within a confined geographic area.
- A node on a network that serves as a portal to other networks.
Down
- An analog device that enables computers to communicate over telephone lines by translating digital data into audio/analog signals (on the sending computer) and then back into digital form (on the receiving computer).
- The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
- A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.
- The highest level in the computer network hierarchy, to which smaller networks typically connect.
- A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system.
- A high-speed direct Internet connection that uses all-digital networks.
- The complete domain name of an Internet computer, such as www.ucorp.biz.
- A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
- An IP address represented in words.
- A device that connects a wireless local area network to a wireless phone network at broadband speeds.
21 Clues: An IP address represented in words. • A worldwide network of interconnected networks. • The data transmission standard for the Internet. • A server that resolves domain names into IP addresses. • A node on a network that serves as a portal to other networks. • The protocol for transporting HTML documents across the Internet. • ...
Year 9 cybersecurity 1 2024-11-05
Across
- A type of malware that infects files and spreads to other systems, often damaging files and affecting system performance.
- A password that combines letters, numbers, and symbols, is at least 8 characters long, and avoids common words to prevent unauthorized access.
- A security system that monitors and controls network traffic, blocking unauthorized access to protect systems from malicious attacks.
- A professional who protects networks and systems from hacking, malware, and other threats by monitoring, installing security measures, and educating users.
- A security process that requires users to provide two forms of identification to access an account, adding an extra layer of protection.
- Unauthorized access to computer systems or networks, often with the intent to steal or modify data.
- Software that displays unwanted advertisements on a device, which can slow down the system and pose security risks.
- A program designed to detect, prevent, and remove malware, including viruses and spyware, to protect computer systems.
- The process of converting data into a secure format to prevent unauthorized access during transmission over networks.
- The information and data left behind from a user’s online activities, which can be tracked or accessed by others.
Down
- A unique numerical identifier assigned to each device on a network, allowing devices to communicate over the internet or within a local network.
- A method of manipulating people into revealing confidential information, often for malicious purposes, by exploiting trust.
- A service that encrypts internet connections, making online activities more secure and protecting users' identities and data on public networks.
- A text-based interface that allows users to interact with the computer by typing commands rather than using graphical icons.
- A tool used to block unwanted and potentially harmful emails, such as phishing attempts or advertisements, from reaching a user’s inbox.
- Controls that allow users to manage who can view their profiles, posts, and personal information on social platforms.
- A fraudulent attempt to steal personal information by pretending to be a legitimate entity, often using fake emails or messages.
- A virtual point used to identify specific services or applications on a networked device, allowing data to flow to and from the device.
- Malicious software designed to harm, exploit, or otherwise compromise a computer system, including viruses, adware, and spyware.
- A fake public Wi-Fi network set up to steal personal information from users who connect to it.
20 Clues: A fake public Wi-Fi network set up to steal personal information from users who connect to it. • Unauthorized access to computer systems or networks, often with the intent to steal or modify data. • The information and data left behind from a user’s online activities, which can be tracked or accessed by others. • ...
Artificial Intelligence Vocabulary 2025-06-27
Across
- A model architecture primarily used in NLP that understands context in sequences (e.g., ChatGPT is built on one).
- The capacity of an AI to act independently or make choices.
- Vision, AI’s ability to interpret and process visual information from the world.
- The ability to understand and explain how an AI system makes decisions.
- Configuration settings used to control the learning process in machine learning models.
- A set of rules or instructions given to an AI system to help it learn or solve problems.
- Adversarial Networks, Two neural networks competing against each other to improve the quality of generated data.
- A training technique for neural networks where the model adjusts weights to reduce error.
- Simplified rules or strategies used to solve complex problems efficiently.
Down
- Learning, A type of learning where an agent learns to make decisions by receiving rewards or penalties.
- A hypothetical point when AI surpasses human intelligence, possibly leading to unpredictable outcomes.
- Techniques to prevent overfitting in models.
- When a model produces unfair results due to prejudiced training data.
- When a model learns training data too well, including noise, and performs poorly on new data.
- Network, A series of algorithms that mimic the way the human brain processes data.
- Language Processing, The field of AI that focuses on the interaction between computers and human language.
- Learning, Reusing a pre-trained model on a new, related task.
- Descent, An optimization method used to minimize the error in AI models.
- Moral considerations around how AI is used and its societal impacts.
19 Clues: Techniques to prevent overfitting in models. • The capacity of an AI to act independently or make choices. • Learning, Reusing a pre-trained model on a new, related task. • Moral considerations around how AI is used and its societal impacts. • When a model produces unfair results due to prejudiced training data. • ...
Network Materials 2022-02-25
Across
- allows your computer or LAN to connect to larger networks
- a device that transmits and reads radio waves
- a program that reads incoming and outgoing data to check if the transmitted data is within policy.
- Used to connect data terminals
Down
- the object that connects multiple networks on the same protocol together
- the object that connects multiple networks on different protocols
- a network device that allows devices to wirelessly connect to the internet
- sends data packets directly from one device to another
8 Clues: Used to connect data terminals • a device that transmits and reads radio waves • sends data packets directly from one device to another • allows your computer or LAN to connect to larger networks • the object that connects multiple networks on different protocols • the object that connects multiple networks on the same protocol together • ...
can you solve it 2024-08-14
Across
- a system for network security that keeps an eye on and regulates both inbound and outbound network traffic.
- The interval of time between sending and receiving a signal
- a network management protocol that gives devices their IP addresses dynamically on IP networks.
- a gadget that transfers data packets between networks of computers.
- a technique for enhancing both public and private networks' security and privacy.
- The volume of data successfully transferred in a predetermined amount of time from one location to another.
- a fast device on a local area network (LAN) that takes incoming data packets and routes them to the appropriate destination.
Down
- a network node that acts as a gateway to an additional network.
- address a distinct series of digits, divided into groups of two, that serves as an identifier for any computer connected to a network via the Internet Protocol.
- The maximum quantity of data that can be sent in a predetermined amount of time.
- a collection of guidelines controlling how data is transferred or exchanged between devices.
- the mechanism that keeps track of and controls Internet domain names and addresses.
- The divergence in packet arrival duration.
- a technique that permits wireless device connections to the Internet.
14 Clues: The divergence in packet arrival duration. • The interval of time between sending and receiving a signal • a network node that acts as a gateway to an additional network. • a gadget that transfers data packets between networks of computers. • a technique that permits wireless device connections to the Internet. • ...
StepTec Crossword 2013-11-15
Across
- An interconnected system of networks that connect computers around the world
- A resolution to do something
- Stores all information long term
- The brain of your computer
- A small chunk of network data
- A memory device in which information can be accessed in any order
Down
- Secret code for information
- A tiny dote of color in an image
- How your computer is identified on the internet
- file A file maintained in a computer-readable form
- A device that forwards data packets between computer networks.
11 Clues: The brain of your computer • Secret code for information • A resolution to do something • A small chunk of network data • A tiny dote of color in an image • Stores all information long term • How your computer is identified on the internet • file A file maintained in a computer-readable form • A device that forwards data packets between computer networks. • ...
Isla's crossword 2021-09-01
Across
- what is a domain name system?
- what blocks unauthorised access?
- what is a temporary storage space?
- what is powering a computer up from the off position?
- what is a cable used in networks?
- what makes up a picture on a computer?
Down
- what is a file that organizes other files?
- what routes traffic between networks?
- what are text files retained on computers?
- what is an plain old telephone service?
10 Clues: what is a domain name system? • what blocks unauthorised access? • what is a cable used in networks? • what is a temporary storage space? • what routes traffic between networks? • what makes up a picture on a computer? • what is an plain old telephone service? • what is a file that organizes other files? • what are text files retained on computers? • ...
Networking concepts 2025-06-06
Across
- A group of computers linked to share resources
- Network spread across a large area
- Refers to a network restricted to an organization
- Short-range wireless communication technology
- Device that connects your home to the internet
Down
- Device that connects multiple networks together
- Each device is connected to a central hub
- Wireless way of connecting to the internet
- Wired connection technology for networks
- Any device connected to a network
10 Clues: Any device connected to a network • Network spread across a large area • Wired connection technology for networks • Each device is connected to a central hub • Wireless way of connecting to the internet • Short-range wireless communication technology • A group of computers linked to share resources • Device that connects your home to the internet • ...
Chapter 1 2025-05-22
8 Clues: organized center • function group size • being able to read or write • abuse abusive language • hatred or intolerance of others race • childhood childhood infancy through 8 years • education education race/ethnicity or religion • networks networks groups forms when people bonds
Tech Tron 2023 2023-05-18
Across
- is a multidisciplinary field that involves the integration of natural sciences and engineering sciences in order to achieve the application of organisms, cells, parts thereof and molecular analogues for products and services.
- is an interdisciplinary branch of computer science and engineering that involves the design, construction, operation, and use of robots.
- is a family of wired computer networking technologies commonly used in local area networks, metropolitan area networks and wide area networks.
- Intelligence, is the simulation of human intelligence processes by machines, especially computer systems. Specific applications of AI include expert systems, natural language processing, speech recognition and machine vision.
- sometimes called computer programming, is how we communicate with computers.
Down
- a standard for the short range wireless interconnection of mobile phones, computers, and other electronic devices.
- is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
- is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- is a wireless network technology that allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet. It allows these devices to exchange information with one another, creating a network.
- The component of a computer system that controls the interpretation and execution of instructions.
10 Clues: sometimes called computer programming, is how we communicate with computers. • The component of a computer system that controls the interpretation and execution of instructions. • a standard for the short range wireless interconnection of mobile phones, computers, and other electronic devices. • ...
PRBENLC 1 2024-04-29
Across
- possess critical thinking skills in understanding all societal issues
- refers to criminal activities that are conducted using computers, networks, or digital technologies as tools, targets, or mediums.
- means having a good understanding of cybersecurity practices, online etiquette, digital privacy, and the ability to use technology responsibly.
- refers to the status of a user being actively connected and available for interaction on a specific social media platform.
- entails taking responsibility for one's role in cyberspace
- develop an understanding of online security, identity and data management in our own literacy practices
- refers to the understanding, knowledge, and consciousness individuals have about the risks, challenges, and opportunities present in the digital environment
- a term that refers to a new form of literacy that goes beyond traditional literacy skills such as reading and writing
- refers to the digital persona or representation of an individual in the online world.
- global network of interconnected computer networks
- are used to track user activity, store preferences, remember login information, and personalize the browsing experience
- refers to the digital trail or record of one’s online activities, interactions, and presence across digital platforms and networks.
- refers to the practice of protecting computer systems, networks, devices, and data from cyber threats
- a Complex and multifaceted
- develop an understanding of the processes, procedures and systems that lie behind digital technologies rather than the specific elements of software/hardware involved.
- type of cyber attack in which cybercriminals use deceptive tactics to trick individuals into providing sensitive information, such as passwords, usernames, credit card details, or personal data
- is a software program designed to detect, prevent, and remove malicious software
- describe the ability to effectively manage and navigate the vast amount of information available in the digital age
- developing a cultural component of digital literacy
- also known as “Redditors,” can vote on submissions, comment on posts, and engage in discussions on a wide range of topics, interests, and communities.
- short for malicious software
- various forms of communication channels and platforms used to deliver information
Down
- develop the Constructive element It is the need to understand and demonstrate how to take existing resources and content to create something new that benefits our learning.
- refers to a fraudulent scheme or deceptive practice conducted online
- refers to the right of individuals to control their personal information and data in the digital realm.
- refers to a type of malicious software (malware) that is designed to replicate itself and infect computer systems, networks, and devices
- the need to assess and review on our own competence with digital technologies
- deliberate and malicious attempt to compromise, disrupt
- develop the cognitive element by engaging with a wide range of operating systems, platforms, devices and software and looking for developmental and training opportunities that expose to digital or cyber tools.
- Short for web browser
- a popular digital music streaming service that provides users with access to a vast library of music, podcasts, and other audio content.
- refers to any physical hardware component or electronic gadget that is used to perform specific functions, tasks, or operations.
- The one who identify the several of the digital tools that can be used for educational purpose
- pertains to the practices, measures, and awareness individuals need to ensure their security and well-being in the online environment.
- develop an awareness of how digital environment can help people self-organize and foster links with local, national and global organizations.
- individual who possess a range of digital skills
- process of encoding information in such a way that only authorized parties can access and read it
- refers to the virtual environment created by interconnected computer systems and digital networks
- refers to data that has been processed, organized, and presented in a meaningful context for a specific purpose.
- an individual with advanced technical skills and knowledge of computer systems, networks, and software who uses their expertise to gain unauthorized access to digital systems
- type of cybercrime in which an individual’s personal information is stolen and used by someone else without their permission
- collection of web pages that are typically related and interconnected by hyperlinks
- in the digital world is defined as the qualities that a person is expected to have
- cyber literacy also known as
- digital information that is generated, processed, stored, and transmitted within computer systems, networks, and digital platforms.
- this includes understanding the many different ways we can communicate with different devices, including mobile and other digital devices.
- serve as a form of security measure to protect sensitive information
- a popular online video-sharing platform that allows users to watch, upload, share, and comment on videos.
- is used to describe technologies, systems, and processes that operate using digital data and electronic signals
49 Clues: Short for web browser • a Complex and multifaceted • cyber literacy also known as • short for malicious software • individual who possess a range of digital skills • global network of interconnected computer networks • developing a cultural component of digital literacy • deliberate and malicious attempt to compromise, disrupt • ...
Emerging Technologies 2022-11-06
History of CS (days 9-10) 2023-08-29
Across
- (LAN)consists of a computer network at a single site, typically an individual office building or school campus
- an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather than transmitting it over a computer network
- Graphical User Interface; a graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system
- a measure of how much data you can move through an Internet connection in a given amount of time. It is usually measured in bits-per-second
- The comparison of a graphical user interface to a real-life desktop workspac
- the situation that occurs when two or more data packets are sent simultaneously on equipment that can handle only one transfer at a time resulting in the packets colliding and becoming corrupt
- Short for Windows, Icons, Menus and a Pointer: the common features of most graphical user interfaces
Down
- pulling out specific differences to make one solution work for multiple problems
- small chunks of information that have been carefully formed from larger chunks of information
- a networking device that forwards data packets between computer networks
- (MAC)address is a unique identifPacket - Small chunks of information that have been carefully formed from larger chunks of information.
- a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN)
- the arrangement of the devices on a computer network
- a networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device
14 Clues: the arrangement of the devices on a computer network • a networking device that forwards data packets between computer networks • The comparison of a graphical user interface to a real-life desktop workspac • pulling out specific differences to make one solution work for multiple problems • ...
Social Network 2014-06-03
Across
- Some guys have 500+ (not likes).
- You make it if you wind to tell him how his picture looks.
- Tell every body what´s up with you.
- No like, just +.
- Here you can tweet like a bird.
Down
- Everybody who uses social networks need one.
- Message over Message.
- One of the most popular social networks.
- Many young people do it in the bathroom and delete 99% of them after doing.
- To communicate on the Internet.
- Important and popular have many of them.
- Somebody post there everything about a travel or about their life.
- If you agree with something you just have to do one klick.
13 Clues: No like, just +. • Message over Message. • To communicate on the Internet. • Here you can tweet like a bird. • Some guys have 500+ (not likes). • Tell every body what´s up with you. • One of the most popular social networks. • Important and popular have many of them. • Everybody who uses social networks need one. • You make it if you wind to tell him how his picture looks. • ...
