networks Crossword Puzzles
Computer Science Basics 2024-09-08
Across
- An electrical component that limits the flow of current in a circuit.
- A high-level programming language named after a popular French mathematician and philosopher.
- The language of 0s and 1s used by computers.
- The physical components of a computer system.
- A structure that stores multiple values in a single variable, accessed by an index.
- A step-by-step procedure or formula for solving a problem.
- A sequence of characters surrounded by double or single quotes.
- A device used to store digital data, such as documents, photos, and software.
- A logic gate that outputs true only if both inputs are true.
Down
- A type of loop that executes as long as a specified condition is true.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A small-sized type of volatile computer memory that provides high-speed data access to the processor.
- Software that acts as an intermediary between computer hardware and software.
- A program that translates high-level source code into machine code.
- A network device that forwards data packets between computer networks.
- The smallest unit of data in computing, represented as 0 or 1.
- The core component of an operating system, managing system resources and communication between hardware and software.
17 Clues: The language of 0s and 1s used by computers. • The physical components of a computer system. • A step-by-step procedure or formula for solving a problem. • A logic gate that outputs true only if both inputs are true. • The smallest unit of data in computing, represented as 0 or 1. • A sequence of characters surrounded by double or single quotes. • ...
Engagement Metrics 2024-10-09
Across
- For polls and questions, the total number of responses received.
- The number of unique users who have seen a post.
- The total number of comments made on a post.
- Specifically on Twitter, the number of times a tweet is retweeted.
- The percentage of users who click on a link in a post.
- The number of times a video or post has been viewed.
- How often a user or brand is mentioned in posts by others.
- The number of times users express approval of a post.
- The average amount of time users spend engaging with a post or profile.
Down
- The overall engagement (likes, comments, shares) divided by total followers or reach.
- The number of new followers gained or lost over a period.
- The number of times users save a post for later reference (common on platforms like Instagram).
- The number of views on ephemeral content, like Instagram or Facebook Stories.
- The total number of times a post is displayed, regardless of interaction.
- Various emotional responses (e.g., love, wow) on platforms like Facebook.
- The percentage of viewers who watched a video to the end.
- How often a post is shared by users, spreading it to their own networks.
17 Clues: The total number of comments made on a post. • The number of unique users who have seen a post. • The number of times a video or post has been viewed. • The number of times users express approval of a post. • The percentage of users who click on a link in a post. • The number of new followers gained or lost over a period. • ...
Invertebrate Vocab Crossword 2016-02-24
Across
- circulatory system/a system in which blood is always pumped throughout the body
- internal skeleton made of bone and cartilage
- hard, external, supporting structure that develops from the ectoderm
- digestive tract
- circulatory system/a system in which a fluid in a cavity called the hemocoel bathes the organs directly with oxygen and nutrients
- vascular system/the networks of blood vessels within the organism
Down
- part of a larger structure, such as the body of an organism, that is set off by natural or arbitrary boundaries
- phase in the life cycle of many animals during which a rapid change from the immature organism to the adult takes place; an example is the change from larva to adult in insects
- animal that does not have a backbone
- mass of nerve cells
- eye composed of many light detectors separated by pigment cells
- body cavity that contains internal organs
- feeler that is on the head of an invertebrate, such as a crustacean or an insect, and that senses touch, taste, or smell
13 Clues: digestive tract • mass of nerve cells • animal that does not have a backbone • body cavity that contains internal organs • internal skeleton made of bone and cartilage • eye composed of many light detectors separated by pigment cells • vascular system/the networks of blood vessels within the organism • ...
Invertebrate Vocab Crossword 2016-02-24
Across
- hard, external, supporting structure that develops from the ectoderm
- phase in the life cycle of many animals during which a rapid change from the immature organism to the adult takes place; an example is the change from larva to adult in insects
- eye composed of many light detectors separated by pigment cells
- animal that does not have a backbone
- part of a larger structure, such as the body of an organism, that is set off by natural or arbitrary boundaries
- feeler that is on the head of an invertebrate, such as a crustacean or an insect, and that senses touch, taste, or smell
Down
- body cavity that contains internal organs
- internal skeleton made of bone and cartilage
- circulatory system/a system in which blood is always pumped throughout the body
- mass of nerve cells
- circulatory system/a system in which a fluid in a cavity called the hemocoel bathes the organs directly with oxygen and nutrients
- digestive tract
- vascular system/the networks of blood vessels within the organism
13 Clues: digestive tract • mass of nerve cells • animal that does not have a backbone • body cavity that contains internal organs • internal skeleton made of bone and cartilage • eye composed of many light detectors separated by pigment cells • vascular system/the networks of blood vessels within the organism • ...
Technology and AI vocabulary 2024-05-29
Across
- The science of making machines that can think like humans.
- A portable and wearable electronic device in form of a watch that can do things not related to showing the time.
- The practice of protecting systems, networks and programs from digital attacks.
- A machine that does tasks without the help of a person.
- A mobile electronic device that work as a computer but is small enough to fit in a person's hand.
- It is basically the Internet. More specifically, it is to all the things that you have remotely and unlimited access over the internet.
Down
- An electronic device that can store and process information.
- A person that has the ability to influence the behaviour or opinions of others.
- A flying robot that can be remotely controlled or fly autonomously.
- A set of steps used to solve a specific problem.
- A computer program that simulates and processes human conversation (either written or spoken), allowing humans to interact with digital devices as if they were communicating with a real person.
- A technology that allows devices to communicate with each other without cables.
- Small, portable personal computer.
13 Clues: Small, portable personal computer. • A set of steps used to solve a specific problem. • A machine that does tasks without the help of a person. • The science of making machines that can think like humans. • An electronic device that can store and process information. • A flying robot that can be remotely controlled or fly autonomously. • ...
ARCADIA CROSSWORD 2024-07-09
Across
- a system that uses only 1's and 0's
- What gets wetter as it dries?
- in geometry what is the line that just does'nt let go of a circle
- software library developed by google for building and tuning neural networks
- The more you take, the more you leave behind. What am I?
- What has keys but can't open locks?
- What can be cracked, made, told, and played?
- python library
Down
- What is the main ingredient in guacamole?
- I speak without a mouth and hear without ears. I have no body, but I come alive with the wind. What am I?
- I can be found on the cover of books, I crown the top of articles, and I name movies and songs. Without me, you'd have no clue what you're looking at your answer to the final destination lies here. What am I?
- may 1st is a monday, then may 31st will be?
- I have an infinite number of points that are all the same distance from a central point. What am I?
13 Clues: python library • What gets wetter as it dries? • a system that uses only 1's and 0's • What has keys but can't open locks? • What is the main ingredient in guacamole? • may 1st is a monday, then may 31st will be? • What can be cracked, made, told, and played? • The more you take, the more you leave behind. What am I? • ...
Office equipment 2024-03-13
Across
- computer programs necessary for directing the computer hardware to perform specific functions; refers to the application programs
- is a type of application software that manages the operations of a medical practice and is available from a variety of companies.
- Anything you plug into a computer—for example, a printer, USB flash drive, monitor, or scanner.
- software application that allows searching or browsing within CPT, HCPCS, ICD-9, and ICD-10 code sets, and Medicare coding guidelines.
- times when the computer systems are not operating.
- produces hard copies from computer files
Down
- allow patients to communicate with the practice and providers, using a secure username and password
- are used by hospitals, providers’ offices, and clinics to send and receive information over telephone lines.
- a system of interconnected computer networks by which to access information from all over the world.
- suite includes multiple applications programs bundled together, often with related functions.
- the visible parts of a computer system (keyboard, disk drive, monitor, and printers).
- permit providers to be contacted regardless of where they are.
- spoken words; recorded voice communication.
13 Clues: produces hard copies from computer files • spoken words; recorded voice communication. • times when the computer systems are not operating. • permit providers to be contacted regardless of where they are. • the visible parts of a computer system (keyboard, disk drive, monitor, and printers). • ...
Smart cities 2025-10-24
Across
- shared travel services such as buses, trains, and trams available for public use
- the effort to ensure that all citizens can participate equally in digital and social opportunities
- a device that measures air quality and pollution levels in real time
- the practice of meeting current needs without compromising the ability of future generations to meet theirs
- electronic tools and systems that generate, store, or process data to enhance urban functions
- the protection of computer systems and networks from digital attacks or unauthorized access
- the integration of digital technology into transportation to improve efficiency and sustainability
Down
- a structured process for collecting, analyzing, and managing information in a smart city
- the design of systems and services that can be used easily by everyone, including people with disabilities
- a device that converts sunlight into electrical energy for sustainable power generation
- energy from sources that naturally replenish, such as solar, wind, or hydro power
- an urban area that uses digital technology and data to improve the quality of life for its citizens
- a device that monitors and records vehicle movement for traffic management and safety
13 Clues: a device that measures air quality and pollution levels in real time • shared travel services such as buses, trains, and trams available for public use • energy from sources that naturally replenish, such as solar, wind, or hydro power • a device that monitors and records vehicle movement for traffic management and safety • ...
TECHNOLOGY 2026-02-09
Across
- a piece of electronic equipment designed for a specific purpose, such as a phone, tablet, or computer
- off to stop a service, connection, or supply, for example the internet or electricity
- a piece of electronic equipment designed for a specific purpose, such as a phone or tablet
- to return a computer, device, or system to its original settings or to restart it
- to make an exact duplicate of a file, document, or piece of information
- to enter a system or website by using a username and password
- a device worn over the ears or in the ears for listening to music, sounds, or audio privately
Down
- an electronic device used to take photos and record videos in digital form
- a portable electronic device used to store and play music and other media files
- a person who gains unauthorized access to computer systems or networks
- a portable computer that can be used for work, study, or entertainment
- to hear and pay attention to sounds, music, or speech
- when a computer or program suddenly stops working or shuts down unexpectedly
- a system that uses satellites to show the exact position of a person, vehicle, or device
14 Clues: to hear and pay attention to sounds, music, or speech • to enter a system or website by using a username and password • a person who gains unauthorized access to computer systems or networks • a portable computer that can be used for work, study, or entertainment • to make an exact duplicate of a file, document, or piece of information • ...
flows of products 2018-07-02
Across
- transport and time costs have been - - - - - - - by the process of containerization
- transaction costs have been - - - - - - - by the improvement in flows of data
- a collection of different companies or organisationd which may be involved in different business activities but all report to one parent company
- a system of standardised transport that uses large standard-sized steel comtainers to transport goods.
- a deliberate policy by gouvernment to impose restrictions on trade in goods and services with other countries.
Down
- what does WTO stand for ? they encouraged the reduce in tarrifs in trade
- improvements of global telephone networks has made communication ...
- information flows are gouverned by the movement of people through - - - - - - - - -
- A tax or duty placed on imported goods with the intention of making them more expensive to consumers ,so that they do not sell at a lower price.
- live media coverage avalible on a global scale because of - - - - - - - - - technology
10 Clues: improvements of global telephone networks has made communication ... • what does WTO stand for ? they encouraged the reduce in tarrifs in trade • transaction costs have been - - - - - - - by the improvement in flows of data • information flows are gouverned by the movement of people through - - - - - - - - - • ...
Yelo 2013-05-01
Across
- Programming language that allows applets to run within a web browser
- Is a self-replicating program that is harmful to networks
- Is a form of social engineering where the attacker pretends to represent a legitimate outside organization, such as a bank
- Help to keep data and equipment functioning and provide access only to appropriate people
- Software, is software designed specifically to detect, disable, and remove viruses, worms, and Trojans before they infect a computer
- Also known as junk mail, is unsolicited e-mail, as shown in Figure 1. In most cases, spam is used as a method of advertising
Down
- Is a program written with malicious intent and sent out by attackers
- Events or attacks that steal, damage, or destroy equipment, such as servers, switches, and wiring
- Is a software program that displays advertising on your computer
- Employees have access to data, equipment, and the network
10 Clues: Is a self-replicating program that is harmful to networks • Employees have access to data, equipment, and the network • Is a software program that displays advertising on your computer • Programming language that allows applets to run within a web browser • Is a program written with malicious intent and sent out by attackers • ...
Crossword Unit 2 2013-07-21
Across
- involving or employing compulsion; compelling; necessary; essential.
- physical exertion, esp for the purpose of development, training, or keeping fit.Example My father like do an excercise.
- to examine or investigate, esp systematically.Example In the TV's has programs about explorers.
- the single worldwide computer network that interconnects other computer networks, on which end-user services.
Down
- a gregarious and intelligent anthropoid ape, Pan troglodytes, inhabiting forests in central W Africa.
- a person known well to another and regarded with liking, affection, and loyalty; an intimate.Example My cousin like make friends all days.
- an institution or building at which children and young people usually under 19 receive education.
- a writer of novels.Example my grandfather are novelist.
- a statement or account that describes; representation in words.
- the act or process of acquiring knowledge, esp systematically during childhood and adolescence.Example The education is important for the development of people.
10 Clues: a writer of novels.Example my grandfather are novelist. • a statement or account that describes; representation in words. • involving or employing compulsion; compelling; necessary; essential. • to examine or investigate, esp systematically.Example In the TV's has programs about explorers. • ...
Globalisation Terminology 2013-11-22
Across
- Multiple nations bound together into a collective trading entity by treaties, economic union, or military force.
- Investment by a company based in one nation into organisations, industries and projects in another nation.
- The practice of implementing one standard or design of a certain device or process across a group or buisiness
- A corporation that is officially established in more than one nation
- The increasing of global interconnectivity.
Down
- The act of tailoring a product produced in one country for being sold in a different country (e.g dubbing a movie)
- An area across which importa quotas, tarrifs, and goods preferences do not apply.
- The gradual development of industrial infrastructure, such as factories and plants over an area
- Tangible or non-tangible movement from area to area. Can include culture, data, resources, people, etc.
- A point of intersection for multiple networks; A crossroad for global trade routes and flows.
10 Clues: The increasing of global interconnectivity. • A corporation that is officially established in more than one nation • An area across which importa quotas, tarrifs, and goods preferences do not apply. • A point of intersection for multiple networks; A crossroad for global trade routes and flows. • ...
Computer 2015-07-22
Across
- / _____________ is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM).
- / A ____________ represents its layout or structure from the point of view of data flow
- / _________ allows wireless transmission of audio.
- / The popularity of computer networks sharply increased with the creation of the ________________ in the 1990s.
- / In a ____________, all data flows through one centralized device.
Down
- / WiFi uses ____________ to allow two devices to communicate with one another.
- / ______________ allow devices in different rooms to efficiently share a broadband Internet connection, enable people to more easily share their files and printers within the network, and help with overall network security.
- / a _________ is a type of socket where cable plug is inserted
- Positioning System (GPS)/ _____________ is a space-based navigation system that provides location and time information in all weather conditions.
- / ___________ devices typically produce a better signal when used outside or by a window.
10 Clues: / _________ allows wireless transmission of audio. • / a _________ is a type of socket where cable plug is inserted • / In a ____________, all data flows through one centralized device. • / WiFi uses ____________ to allow two devices to communicate with one another. • / A ____________ represents its layout or structure from the point of view of data flow • ...
internet security 2021-03-01
Across
- software designed to collect information from computers for commercial or criminal purposes
- black-hat hackers
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a program designed to prevent spyware from gaining access to the internal network.
- horses malicious programs disguised as innocent-looking files or embedded within legitimate software
Down
- a deceptive scheme or trick used to cheat someone out of something, especially money
- the illegal copying and distribution of copyrighted software, information, music and video files
- self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks.
- programs that spread by attaching themselves to executable files or documents
- certificate an electronic way of proving your identity, when you are doing business on the Internet
10 Clues: black-hat hackers • programs that spread by attaching themselves to executable files or documents • a program designed to prevent spyware from gaining access to the internal network. • a deceptive scheme or trick used to cheat someone out of something, especially money • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- They are software programs created to automatically perform specific operations
- It is a string of characters used to verify the identity of a user during the authentication process.
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
Down
- It is a global system of interconnected computer networks
- It is a type of malware that functions by spying on user activity without their knowledge.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- It is a type of malware that automatically delivers advertisements.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Starter task - Cyber Security 2021-07-14
Across
- It is a type of malware that automatically delivers advertisements.
- They are software programs created to automatically perform specific operations
- a person with deep understanding of computer systems and software, and who uses that knowledge to somehow subvert that technology.
- It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- This is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent
Down
- It is a global system of interconnected computer networks
- It is a string of characters used to verify the identity of a user during the authentication process.
- It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- It is a form of malware that essentially holds a computer system captive while demanding a ransom.
- It is a type of malware that functions by spying on user activity without their knowledge.
10 Clues: It is a global system of interconnected computer networks • It is a type of malware that automatically delivers advertisements. • They are software programs created to automatically perform specific operations • It is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ...
Unit 3 Vocabulary word puzzle 2023-09-08
Across
- a kind of business model that takes advantage of ecosystems, facilitating transactions between large networks of users such as sellers and buyers
- a document that contains important information about an organisation, including details about what the organisation does, its goals, available assets and mission
- a person or a financial company that acts both as a broker, making investments for customers, and as a dealer making investments for themselves
- favorable or advantageous; resulting in good
- a piece of information that is discovered during an official examination of a problem, situation, or object
Down
- the act of putting money, effort, time, etc. into something to make a profit or get an advantage, or the money, effort, time
- a person who gives advice in a particular field
- relating to money or currency.
- give work to (someone) and pay them for it
- the illegal process of making large amounts of money generated by criminal activity
10 Clues: relating to money or currency. • give work to (someone) and pay them for it • favorable or advantageous; resulting in good • a person who gives advice in a particular field • the illegal process of making large amounts of money generated by criminal activity • ...
Digital Citizen Vocab 2023-09-11
Across
- Small text files placed on your device by the sites you visit that collect information about your device and your activity
- Design Features or aspects of a device or app that prioritize what's good for people's lives
- Status you currently have or built
- Guaranteed by our constitution , federal and state laws
- Closely linked to freedom of expression and privacy, are those that allow people to access, use, create and publish digital media, as well as access and use computers, other electronic devices and communications networks.
Down
- Practice the use of technology in a safe, ethical, and respectful way
- Protection from being observed or tracked by others, including the government, the public, or selected individuals or groups
- When people share something they later regret
- All the information online about a person either posted by that person or others, intentionally or unintentionally
- Something we do automatically without thinking
10 Clues: Status you currently have or built • When people share something they later regret • Something we do automatically without thinking • Guaranteed by our constitution , federal and state laws • Practice the use of technology in a safe, ethical, and respectful way • Design Features or aspects of a device or app that prioritize what's good for people's lives • ...
Vocab Nonfiction 2024-01-28
Across
- The curious student approached the professor after class with a _____ about a concept discussed during the lecture.
- The success of the documentary hinged on the _____ of the eyewitness accounts and archival footage.
- Researchers are using social networks to _____ surveys and collect data for their studies.
- The editorial criticized the film for its perceived _____ bias, arguing that it portrayed a one-sided perspective.
- The _____ behavior of the customer service representative left a negative impression on the frustrated customer.
Down
- The community worked together to _____ a sense of unity and cooperation among its members.
- In certain cultures, there are _____ rules of etiquette that are widely understood but rarely explicitly discussed.
- The team's achievement was a _____ of individual talents, collaboration, and effective communication.
- The _____ committed against the indigenous community sparked outrage and demands for immediate action to address historical injustices.
- The artist carefully selected colors and shapes to create a _____ composition that conveyed a specific mood and message.
10 Clues: The community worked together to _____ a sense of unity and cooperation among its members. • Researchers are using social networks to _____ surveys and collect data for their studies. • The success of the documentary hinged on the _____ of the eyewitness accounts and archival footage. • ...
CS OATS October 2019 Crossword Puzzle 2019-10-04
Across
- Malware that can replicate itself in order to spread the infection to other connected computers.
- The past tense of when a bad actor gained unauthorized access to a system.
- Software which protects systems from malware like Trojans, viruses, worms, spyware, and more.
- Malware that prevents you from accessing files on your computer by holding your data hostage.
- Practice of sending emails to trick users into revealing personal information.
- A defensive technology, that acts as a virtual or physical barrier, designed to keep unauthorized users off networks.
- Malicious software that allows a hacker to gain remote access to a computer through a “back door”.
Down
- A group of computers, printers and devices that are interconnected and governed as a whole.
- An access method that enables access to a private network over a public network such as the Internet.
- Malicious software that disrupts a system or allows a bad actor to gain access to a system.
10 Clues: The past tense of when a bad actor gained unauthorized access to a system. • Practice of sending emails to trick users into revealing personal information. • A group of computers, printers and devices that are interconnected and governed as a whole. • Malicious software that disrupts a system or allows a bad actor to gain access to a system. • ...
Fact or fiction 2020-05-19
Across
- :known to be real and what somebody claims it is and not a copy
- : television
- :a way of criticizing a person, an idea or an institution in which you use humour to show their faults or weaknesses; a piece of writing that uses this type of criticism
- :to feel certain that something is true or that somebody is telling you the Truth
- :the activity of broadcasting programmes for people to listen to; the programmes that are broadcast
- :ideas or statements that may be false or present only one side of an argument that are used in order to gain support for a political leader, party, etc.
Down
- :that cannot be trusted or depended on
- :a person whose job is teaching, especially in a school
- :a person whose job is to collect and write news stories for newspapers, magazines, radio, television or online news sites
- :an international computer network connecting other networks and computers from companies, universities, etc.
10 Clues: : television • :that cannot be trusted or depended on • :a person whose job is teaching, especially in a school • :known to be real and what somebody claims it is and not a copy • :to feel certain that something is true or that somebody is telling you the Truth • :the activity of broadcasting programmes for people to listen to; the programmes that are broadcast • ...
Media 2020-05-18
Across
- it is a form of communication used all over the world, it is a means of communication different from the others, used in companies as one of the main communication tools, for this reason it must be efficient and professional.
- World Day is celebrated on May 17th.
- ...is a collective designation of the media outlets that exercise Journalism and other informational communication functions.
- Have stations
- The first appeared between 1946 and 1947
Down
- ...is the most used technology in the world.
- it is a periodical publication of an informative, journalistic or entertainment nature, generally aimed at the general public.
- Is one of the printed media
- it is also called seventh art, or, in certain contexts cinematography.
- networks In the former there was only the exchange of messages between users, in the current ones, there is the exposure of profiles with personal information, photos, as well as much more comprehensive forms of communication.
10 Clues: Have stations • Is one of the printed media • World Day is celebrated on May 17th. • The first appeared between 1946 and 1947 • ...is the most used technology in the world. • it is also called seventh art, or, in certain contexts cinematography. • ...
KANINI SECONDARY SCHOOL GRADE 10D TEST 2 2023 2023-03-06
Across
- ....software are developed to make the user more effective and efficient in his or her everyday job
- A....specialist is a person who sets up, support and maintain networks
- .... is the process of writing instructions for the computer
- A computer .... is a person who installs, maintains and repairs computer systems and equipments.
Down
- .....software consists of the programs that controls the operations of the computer and its devices
- ... is a person who develops or designs a program or software
- A computer...is a person responsible for maintaining and control of computer systems and normally works in a server room or a data centre
- A ... software is made to a specific user needs and customised for a specific task
- .... software is a general purpose program that can perform many tasks and not limited
- A computer ...is a profession or a job available to those who have done computer courses or program.
10 Clues: ... is a person who develops or designs a program or software • .... is the process of writing instructions for the computer • A....specialist is a person who sets up, support and maintain networks • A ... software is made to a specific user needs and customised for a specific task • ...
Technology in our lives 2024-12-21
Across
- – The practice of meeting current needs without harming future generations or the environment.
- – The use of machines or technology to perform tasks without human assistance.
- Computing – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
- – The practice of protecting computers, networks, and data from unauthorized access or attacks.
- – The science of building and using materials or devices at the nanoscale (extremely small sizes).
Down
- Intelligence – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
- – The process of creating new ideas, methods, or products that bring improvement or solve problems.
- Reality (AR) – A technology that overlays digital information or images on the real-world environment.
- – The ability to connect devices or systems to each other for communication and data exchange.
- Learning – A field of AI where computers learn from data and improve their performance without being explicitly programmed.
10 Clues: – The use of machines or technology to perform tasks without human assistance. • – The practice of meeting current needs without harming future generations or the environment. • – The ability to connect devices or systems to each other for communication and data exchange. • ...
cybersecurity 2024-11-12
Across
- What do you call the set of secret characters used to access accounts and secure information?
- What is malicious software that disguises itself as legitimate software?
- What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- What is a deceptive email that tricks users into giving sensitive information?
- What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- What is the process of verifying the identity of a user before granting access to a system?
- What type of attack overwhelms a system with traffic, causing it to crash?
- What do you call a software program that replicates itself and spreads to other computers?
- What is the act of attempting to gain unauthorized access to a computer or network?
- What is a tool that filters incoming and outgoing network traffic to secure a network?
10 Clues: What is malicious software that disguises itself as legitimate software? • What type of attack overwhelms a system with traffic, causing it to crash? • What is a deceptive email that tricks users into giving sensitive information? • What is the act of attempting to gain unauthorized access to a computer or network? • ...
HS4015 W10 Presentation 2025-03-25
Across
- A form of surrogacy, framed to be noble, sacrificial and out of goodwill
- This term describes the result of the lack of commercial exchanges that require regulation in commercial surrogacy
- The ethical principles and values that guide how surrogacy is practiced and perceived
- According to Rudrappa, the task of this term is to challenge, and rethink the possessive investment in nuclear families that underwrite both markets and kinship networks (2 words)
- The term used to refer to the quantitative calculation and qualitative judgement of reproductive laborers’ bodies
- Schurr and Militz’s reading uses this country as a case study
Down
- The qualitative, immersive study of surrogacy practices, focusing on the lived experiences of surrogate mothers
- The detachment of the surrogate baby from those who have participated in its (re-)production
- In organization of market encounters, intended parents are considered as…
- How surrogacy is framed, talked about, and understood in public discourse, media, and society. i.e. ~~Colonialism
10 Clues: Schurr and Militz’s reading uses this country as a case study • A form of surrogacy, framed to be noble, sacrificial and out of goodwill • In organization of market encounters, intended parents are considered as… • The ethical principles and values that guide how surrogacy is practiced and perceived • ...
Crossword 2025-04-09
Across
- Protection or resistance against something harmful, like cyber-attacks in this context.
- The basic physical systems and structures (like networks, roads, or cables) needed for operation.
- The main, central part of a network that connects different parts together and carries most of the data.
- Relating to the use of thin glass or plastic fibers to transmit data as light signals.
- A method of converting data into a secret code to prevent unauthorized access.
- The process of combining parts into a whole, like combining classical and quantum systems in the same network
Down
- A quantum phenomenon where particles become linked and instantly affect each other, no matter the distance between them.
- The act of sharing or delivering something across a range or network.
- A formal meeting where people discuss topics, often related to science, tech, or business.
- A connection point within a network where data is received, transmitted, or processed
10 Clues: The act of sharing or delivering something across a range or network. • A method of converting data into a secret code to prevent unauthorized access. • A connection point within a network where data is received, transmitted, or processed • Relating to the use of thin glass or plastic fibers to transmit data as light signals. • ...
Browsing safely 2025-06-22
Across
- Criminal activity intended to harm anyone using a computer and an internet connection.
- THEFT- Act of stealing and misusing someone's personal informations.
- A program that disturbs the normal functioning of the computer.
- Computer program, designed to identify, prevent,and remove viruses from a computer.
- An illegal entry into a computer system or network.
Down
- Collection of technologies,processes, and practices designed to protect networks,computers, program,and data from attack,damage,or unauthorised access.
- The act of sending an email to a user and misleading him to believe that it is from a trusted person or organisation.
- Illegal method to get money or other things that belong to a bank or it's customers.
- Unethical hackers,extract confidential information from users and use this information to execute fraudulent tasks online
- A software that helps in preventing unauthorised access to you computer by blocking communication.
10 Clues: An illegal entry into a computer system or network. • A program that disturbs the normal functioning of the computer. • THEFT- Act of stealing and misusing someone's personal informations. • Computer program, designed to identify, prevent,and remove viruses from a computer. • Illegal method to get money or other things that belong to a bank or it's customers. • ...
Aspects related to Social, economic and environmental development 2025-07-17
Across
- Food water,shelter, clothing, medical care.
- The ability to read, speak, listen effectively and write.
- Basic physical and organizational structures needed for a society to function;such as transport networks, communication links and buildings that show development.
- The chances that may be available for individuals to get jobs related to job availability,required skills and career development and growth.
Down
- Money given for a specific purpose, frequently by government and not acquiring payment.
- The value of valuable goods and capital owned by a person, organi,ation ,or a country compared to their liabilities.
- The rights that people have relating to their equality between races,genders,cultures,religions and the rights of disabled people,children and the elderly.
- The process of facilitating learning,or the acquisition of knowledge, skills,beliefs, and habits.
- Number of deaths within a population over a certain period expressed as a rate.
- The act of helping or assisting.
10 Clues: The act of helping or assisting. • Food water,shelter, clothing, medical care. • The ability to read, speak, listen effectively and write. • Number of deaths within a population over a certain period expressed as a rate. • Money given for a specific purpose, frequently by government and not acquiring payment. • ...
CYBERCRIMES 2024-12-02
Across
- offering computer repair, network troubleshooting, and IT support services to make money illegally.
- Unsolicited bulk messages from unfamiliar organizations, companies, and groups are sent to large numbers of users
- cybercriminals make a direct contact with you through phone calls, emails, or even in person.
- steal personal data, including passwords, data about the bank account, credit cards, debit cards, social security, and other sensitive information to steal money
Down
- are malicious software to gain unauthorized access to systems and steal important data.
- use email spoofing to extract confidential information such as credit card numbers, social security number
- Controlled by remote attackers called - bot herders
- Encrypts files and information through public-key encryption and asks for money for unlocking it
- temporarily or completely interrupts servers and networks that are successfully running to make the website unavailable
- partial or complete acquisition of important data and information, breaching privacy.
10 Clues: Controlled by remote attackers called - bot herders • partial or complete acquisition of important data and information, breaching privacy. • are malicious software to gain unauthorized access to systems and steal important data. • cybercriminals make a direct contact with you through phone calls, emails, or even in person. • ...
5G-Advanced Acronyms 2025-08-22
Across
- Creates multiple customized virtual networks on a single physical network, like VIP lanes for specific tasks.
- Provides ultra-fast speeds for buffer-free streaming, quick downloads, and immersive experiences.
- A "5G Lite" standard that provides efficient connectivity for small, battery-powered devices like wearables.
- Connects millions of smart devices and sensors simultaneously to power the Internet of Things (IoT).
Down
- Enables instant, ultra-reliable communication with zero lag for critical real-time applications.
- The universal technology standard that defines how all 5G devices wirelessly connect to the network.
- Represents a pure, end-to-end 5G network, independent of 4G, that unlocks its full potential.
- The official technical name for a 5G base station or cell tower.
- Processes data at the edge of the network, closer to the user, for faster app performance and lower latency.
- Uses multiple antennas to transmit and receive more data at once, dramatically increasing network speed and capacity.
10 Clues: The official technical name for a 5G base station or cell tower. • Represents a pure, end-to-end 5G network, independent of 4G, that unlocks its full potential. • Enables instant, ultra-reliable communication with zero lag for critical real-time applications. • Provides ultra-fast speeds for buffer-free streaming, quick downloads, and immersive experiences. • ...
E-commerce 2025-12-09
Across
- The pandemic created ________ growth in online grocery shopping, a sector that had been slow to digitalize.
- Consumer demand for same-day delivery continues to ________, pushing logistics companies to invest heavily in automation.
- The advent of the "buy now, pay later" (BNPL) option is beginning to _______ consumer spending habits.
- Sophisticated tracking software now ________ companies to provide customers with real-time updates on their deliveries.
Down
- To compete with giants like Amazon, smaller retailers must develop a ________ supply chain that can handle peak season demand without failure.
- The ________ of sophisticated tracking software has allowed companies to provide real-time delivery updates.
- Advanced warehouse robotics can dramatically ________ human error in the picking and packing process.
- Successful e-commerce brands use social media to actively ________ with their community and gather feedback.
- The ________ of cross-border e-commerce has forced logistics firms to master complex international customs rules.
- Logistics networks must constantly ________, integrating new technologies like AI and drones.
10 Clues: Logistics networks must constantly ________, integrating new technologies like AI and drones. • Advanced warehouse robotics can dramatically ________ human error in the picking and packing process. • The advent of the "buy now, pay later" (BNPL) option is beginning to _______ consumer spending habits. • ...
inter 2026-01-01
Across
- a time interval during which there is a temporary cessation of something
- a program that translates and executes source language statements one line at a time; someone who mediates between speakers of different languages
- make a break in; destroy the peace or tranquility of
- get involved, so as to alter or hinder an action, or through force or threat of force
- occurring among or involving several people
- concerning or belonging to all or at least two or more nations; from or being of other countries
Down
- speak abruptly, especially as an interruption
- a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
- involving and relating to the mutual relations of states especially of the United States
- capable of acting on or influencing each other; relating to a program or interface that responds to the user's input
10 Clues: occurring among or involving several people • speak abruptly, especially as an interruption • make a break in; destroy the peace or tranquility of • a time interval during which there is a temporary cessation of something • get involved, so as to alter or hinder an action, or through force or threat of force • ...
English 2021-01-21
Across
- a large natural elevation of the earth's surface rising abruptly from the surrounding level; a large steep hill.
- the basic or inherent features, character, or qualities of something.
- is the rapid oxidation of a material in the exothermic chemical process of combustion, releasing heat, light, and various reaction products
- them to realize the nature of their problems"
- horizontal plane"
- is an inorganic, transparent, tasteless, odorless, and nearly colorless chemical substance
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Down
- cheeks were pressed together as they danced"
- a flightless swift-running African bird with a long neck, long legs, and two toes on each foot. It is the largest living bird, with males reaching a height of up to 2.75 m.
- star round which the earth orbits.
- move rhythmically to music, typically following a set sequence of steps.
- guide is also available on the internet"
- a flat surface on which a straight line joining any two points on it would wholly lie.
- set off down the mountain"
14 Clues: horizontal plane" • set off down the mountain" • star round which the earth orbits. • guide is also available on the internet" • cheeks were pressed together as they danced" • them to realize the nature of their problems" • the basic or inherent features, character, or qualities of something. • move rhythmically to music, typically following a set sequence of steps. • ...
Intro to Cyber CH 2 2021-09-19
Across
- malware designed to modify operating systems to allow unauthorized remote access through a backdoor
- malware designed to automatically perform actions over the Internet
- any computer code that can be used to steal data, bypass access controls, or harm or compromise a system
- an attack that interrupts network services to users, devices, or applications
- act of using an exploit against a vulnerability with the goal of breaking into the target system
- improper use of practices that manage physical control of equipment, data, or applications
Down
- way of gaining access to resources that manipulates individuals into performing actions or divulging confidential information
- malicious code that replicates itself independently by exploiting vulnerabilities in networks
- after an attack, technique used for ways of communicating about the attack to employees and clients, investigation of the attack, and measures to prevent future attacks
- use of multiple techniques to compromise a target
- carries out malicious operations while appearing to have a desired function
- type of hardware or software defect that malicious users attempt to exploit
- malware designed to track the actions of users and capture data
13 Clues: use of multiple techniques to compromise a target • malware designed to track the actions of users and capture data • malware designed to automatically perform actions over the Internet • carries out malicious operations while appearing to have a desired function • type of hardware or software defect that malicious users attempt to exploit • ...
India in the middle ages --Madison Lott 2025-03-13
Across
- which empire is located in the mountain region of northwest of the Indus River valley and known for enlarging territories with military tatics
- Strongest empire in the Islamic world and from the 1300s
- Where did the Bhakti movement originate?
- Spent most of their life as a religious teacher, emphasized importance of works in a language
- Southeast Asia, adopted Hindu and Buddhism ideas and adopted Indian religion & culture, in the Gupta empire
- Empire conquered many other empires and established commercial trading networks
Down
- What group of people spread Hindu and Buddhist ideas to SOutheast Asia
- Believes Buddha as a teacher, understanding the way to gain Nirvana, transforming oneself by moral conduct and meditation
- Buddhist monk who helped transmit texts from India to central and East Asia
- the entire northern India and was Hindu
- Princess, famous for her religious devotion
- What Muslim scholars learn and borrow from Hindu scholars
- Believes Buddha as a God, Believe the 8 practices to bring end of personal suffering, Also believe to be able to follow the Eightfold Path
13 Clues: the entire northern India and was Hindu • Where did the Bhakti movement originate? • Princess, famous for her religious devotion • Strongest empire in the Islamic world and from the 1300s • What Muslim scholars learn and borrow from Hindu scholars • What group of people spread Hindu and Buddhist ideas to SOutheast Asia • ...
Network Devices 2022-11-07
Across
- A digital-interface device used to connect data terminal equipment,
- A device that can both transmit and receive communications, in particular a combined radio transmitter and receiver.
- A computer that sits between different networks or applications
- A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Down
- An electrical network consisting basically of four impedances connected in series to form a rectangle,
- Provides you with a digital connection that allows you to communicate by using any combination of voice, data, and videos
- A standard that defines the way in which Internet communications and other advanced services are provided on wireless mobile devices
- A device for making and breaking the connection in an electric circuit.
8 Clues: A computer that sits between different networks or applications • A digital-interface device used to connect data terminal equipment, • A device for making and breaking the connection in an electric circuit. • An electrical network consisting basically of four impedances connected in series to form a rectangle, • ...
Information technology 2021-02-09
Across
- - a pointing device that replaces the mouse most commonly found in laptops.
- port is universal in the sense that it can be used to connect many different devices to a computer
- - an internet service for sending text or multimedia messages
- - a computer program that provides services for corresponding programs normally running on other computers
Down
- is a type of computer program that edits plain text Such programs are sometimes known as "notepad" software
- is a network device that is used to connect different computer networks
- is used for permanent connection of power sources with its receivers
- - stands for Content Management System It is a website with an administration panel that allows you to change the content independently and free of charge without programming knowledge
8 Clues: - an internet service for sending text or multimedia messages • is used for permanent connection of power sources with its receivers • is a network device that is used to connect different computer networks • - a pointing device that replaces the mouse most commonly found in laptops. • ...
Choice HW 2021-03-03
Across
- a group that aimed to help African Americans be physically, mentally, politically, and socially (National Association for the Advancement of Colored People)
- groups that made loans and provided legal assistance
- Liberal Mexicano, a group of Mexican Americans organizing for their own benefit (similar to the Urban League)
- Progress, the progress of equality between races (specifically black and white)
- League, a group of people dedicated to provide religious education, to help, and to defend Jewish people
Down
- Movement, a movement that denounced the idea of gradual progress
- the process of changing immigrant ways of life to that of Americans
- League, a networks of over 100 groups of black employment agencies and relief efforts to help African Americans get settled and find work
8 Clues: groups that made loans and provided legal assistance • Movement, a movement that denounced the idea of gradual progress • the process of changing immigrant ways of life to that of Americans • Progress, the progress of equality between races (specifically black and white) • ...
Digital Citizenship 2023-02-08
Across
- content or devices that allow people to share information, communicate, and collaborate over internet or computer networks.
- information that can be used to identify you because it is unique to you.
- using media in a way that feels healthy and in balance with other life activities.
- When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Down
- an attempt to trick someone online, usually with the intention of stealing money or private information.
- behaviors we do often or regularly with digital media devices.
- a type of crime in which your private information is stolen and used for criminal activity.
- to engage in activities that don't involve devices, apps or the internet.
8 Clues: behaviors we do often or regularly with digital media devices. • information that can be used to identify you because it is unique to you. • to engage in activities that don't involve devices, apps or the internet. • using media in a way that feels healthy and in balance with other life activities. • ...
Vocabulary Crossword 2015-04-27
Across
- – Originally known as Web Log. Blogs are websites that contains dated text entries about a particular topic.
- – list of websites/sources used to write a report
- – A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
- – Software program that is designed to damage files on a computer that receives it. Viruses replicate and can spread to other applications and operating system software.
Down
- – Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
- – An unauthorized person who secretly gains access to computer files.
- NAME–extensions of the web address based on whether the domain belongs to a commercial enterprise
- - A bully who operates online, in cyberspace
8 Clues: - A bully who operates online, in cyberspace • – list of websites/sources used to write a report • – An unauthorized person who secretly gains access to computer files. • NAME–extensions of the web address based on whether the domain belongs to a commercial enterprise • ...
Daily Ethernet Puzzle 2025-10-17
4 Clues: Improved Ethernet offering speeds of up to 100 Mbps. • This was the original standard, offering speeds of up to 10 Mbps • Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs. • Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
4.1-Globalization 2014-09-02
Across
- Trade / the movement of goods and services among nations without political or economic restricitons.
- Economy / the increasing interaction of the world's economies with one another as a single market instead of in many national markets.
- / the increasing connectivity and interdependence of the world's economies, societies, and cultures because of advances in communication, technology, trade, international investment, movement of currency, and migration.
Down
- / a company produces goods domestically and sells them outside the country.
- Corporations / organizations with multinational management and ownership that manufacture and market products in many different countries.
- / the buying and selling of products and services through computer networks.
- / a company buys goods outside the country and resells them domestically.
7 Clues: / a company buys goods outside the country and resells them domestically. • / a company produces goods domestically and sells them outside the country. • / the buying and selling of products and services through computer networks. • Trade / the movement of goods and services among nations without political or economic restricitons. • ...
SMELL 2025-01-09
Across
- detect and transmit odorant information to the central nervous system
- a distinctive, typically pleasant smell
- The space inside the nose. The nasal cavity lies above the bone that forms the roof of the mouth
- the part projecting above the mouth on the face of a person or animal, containing the nostrils and used for breathing and smelling
Down
- a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
- A rounded mass of tissue that contains several types of nerve cells that are involved in the sense of smell
- the faculty by which the mind stores and remembers information
7 Clues: a distinctive, typically pleasant smell • the faculty by which the mind stores and remembers information • detect and transmit odorant information to the central nervous system • The space inside the nose. The nasal cavity lies above the bone that forms the roof of the mouth • ...
Invention 2 2024-04-09
Across
- Electronic device capturing and storing digital images, replacing traditional film cameras in photography.
- Machine-readable representation of data, consisting of parallel lines of varying widths, revolutionizing retail inventory management.
- Electronic banking device enabling customers to perform financial transactions without the need for a bank teller.
Down
- Process of determining the precise order of nucleotides within a DNA molecule, enabling advances in genetics and biotechnology.
- Integrated circuitry containing the functions of a central processing unit, revolutionizing computing and technology.
- Portable cassette player introduced by Sony, allowing users to listen to music on the go with headphones.
- Networking technology facilitating the transmission of data between computers over local area networks (LANs).
7 Clues: Portable cassette player introduced by Sony, allowing users to listen to music on the go with headphones. • Electronic device capturing and storing digital images, replacing traditional film cameras in photography. • Networking technology facilitating the transmission of data between computers over local area networks (LANs). • ...
CISCO PARTNER ENABLEMENT SESSION 2025-10-01
Across
- With Cisco Secure Firewall you can now __________ your network, workload, and application security.
- Cisco creates the infrastructure you need to transform how you connect, protect, and innovate in the __________ era.
- Zero trust helps enable secure ________ for users and devices and within apps, across networks, and clouds.
Down
- Cisco provides 24/7, award-winning _________ support services, online and by phone to customers, partners, resellers, and distributors who hold valid Cisco service contracts.
- Cisco enables ________ security.
- Cisco _______ is the leader in cloud controlled WiFi, routing, and security. Secure and scalable.
- Small and medium businesses (SMBs) require products and solutions designed to scale, innovate, and ___________ in a digital-first world.
7 Clues: Cisco enables ________ security. • Cisco _______ is the leader in cloud controlled WiFi, routing, and security. Secure and scalable. • With Cisco Secure Firewall you can now __________ your network, workload, and application security. • Zero trust helps enable secure ________ for users and devices and within apps, across networks, and clouds. • ...
Human Right Heros 2016-01-05
Across
- This organization helps people that were in disaster or war and provides them food and stuff and helps people that dont have the access to food or water
- International fights the abuses of human rights and protects them and tryies to provide human rights for all
- Organization that inteprets the african charter on human rights and they protect and promote human rights
Down
- They build networks among nations to enable solidarity and build peace among people
- Helps people get rights and protects them and promotes and protect and fights for human rights for everyone
- A organization that fights for the human rights for colored people
- Defends the rights of all people worldwide
7 Clues: Defends the rights of all people worldwide • A organization that fights for the human rights for colored people • They build networks among nations to enable solidarity and build peace among people • Organization that inteprets the african charter on human rights and they protect and promote human rights • ...
Left Arm Veins & Ateries 2017-03-08
Across
- Digital Veins: network of veins formed by the dorsal metacarpal veins.
- Arch/ formed predominantly by the ulnar artery
- Cephalic/a variable vein that passes along the radial border of the forearm to join the cephalic vein near the elbow.
- Artery/is the largest branch of the axillary artery.
- Vein/runs up the lateral side of the arm from the hand to the shoulder.
- Vein/drain oxygen-depleted blood from the forearm.
- Artery/travels down the radial side of the forearm to the wrist.
Down
- Artery/supplies blood to the upper part of the chest.
- Vein/ passes along the back of the forearm on the ulnar side for a distance and then curves to the surface below the elbow.
- Vein/ a paired large vein, one on either side of the body.
- Artery/ the major blood vessel of the (upper) arm.
- Vein/ a large blood vessel that conveys blood from the lateral aspect of the thorax, axilla (armpit) and upper limb toward the heart.
- Palmar Arch/one of the arterial networks found in the hand.
13 Clues: Arch/ formed predominantly by the ulnar artery • Artery/ the major blood vessel of the (upper) arm. • Vein/drain oxygen-depleted blood from the forearm. • Artery/is the largest branch of the axillary artery. • Artery/supplies blood to the upper part of the chest. • Vein/ a paired large vein, one on either side of the body. • ...
InfoSec Crossword Puzzle 2022-10-29
Across
- The process of confirming the correctness of the claimed identity.
- A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
- A technology that allows us to access our files and/or services through the internet from anywhere in the world.
- A malicious application or script that can be used to take advantage of a computer’s vulnerability.
- A set of programs that tell a computer to perform a task.
- A technique used by hackers to obtain sensitive information.
- The most widely-installed LAN technology.
Down
- A type of malware that functions by spying on user activity without their knowledge.
- A term to describe connecting multiple separate networks together.
- the process of transforming an encrypted message into its original plaintext.
- A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.
- Another kind of malware that allows cybercriminals to remotely control your computer.
- The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.
13 Clues: The most widely-installed LAN technology. • A set of programs that tell a computer to perform a task. • A technique used by hackers to obtain sensitive information. • A term to describe connecting multiple separate networks together. • The process of confirming the correctness of the claimed identity. • ...
Tech crossword 2023-03-06
Across
- a very small, portable, solid-state hard drive that can be inserted into a USB port for storage and retrieval of data.
- reasonable and limited use of copyrighted material so as not to infringe upon copyright
- the rules of etiquette that apply when communicating over computer networks, especially the internet.
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
- acceptable use policy
- A digital identity is information used by computer systems to represent an external agent – a person, organization, application, or device.
- local area network
- wide area network
Down
- the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.: works granted such right by law on
- a part of a mechanical or electrical system
- a piece of writing or other work reflecting such unauthorized use or imitation
- An external serial bus interface standard for connecting peripheral devices to a computer, as in USB port or USB cable.
- A device or unit that operates separately from the CPU but is connected to it, as a mouse, printer, speaker, etc.
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
14 Clues: wide area network • local area network • acceptable use policy • a part of a mechanical or electrical system • a piece of writing or other work reflecting such unauthorized use or imitation • reasonable and limited use of copyrighted material so as not to infringe upon copyright • ...
Computers 2023-06-23
Across
- A small device used to move the cursor on the computer screen and make selections
- A set of keys or buttons used for inputting letters, numbers, and commands into the computer
- Programs or applications that provide instructions for the computer to perform tasks
- A system for sending, receiving, and storing electronic messages over computer networks
- An electronic device that produces a hard copy or printed version of digital documents or images
- browser A software application used to access and view websites and webpages on the internet
Down
- A collection of data or information stored on a computer under a specific name
- Devices that produce sound or audio output from the computer
- A pair of audio devices worn over the ears to listen to sound or music from the computer
- A global network of computers that allows communication and access to information
- A machine that can store, process, and retrieve data, and perform various tasks
- The physical components of a computer system, such as the processor, memory, and storage devices
- A screen or display used to show information and images from the computer
13 Clues: Devices that produce sound or audio output from the computer • A screen or display used to show information and images from the computer • A collection of data or information stored on a computer under a specific name • A machine that can store, process, and retrieve data, and perform various tasks • ...
Chapter 10: Crimes Against Property 2024-04-24
Across
- unlawful taking of a car by someone who intends only to use it temporarily.
- the taking of money or property by a person to whom it has been entrusted.
- Form of larceny in which a person takes items from a store without paying or intending to pay.
- Unlawful taking of another's property with the intent to steal it.
- the deliberate and malicious burning of another person's property.
- the unlawful taking of property from a person's immediate possession by force or intimidation
Down
- actions that involve computers and networks in criminal activities.
- a crime in which the perpetrator uses a force or intimidation to steal a car from a driver.
- receiving or buying property that is known or reasonably believed to be stolen.
- taking property illegally through threats of harm.
- the deliberate destruction or defacement of another person's property; also known as malicious mischief.
- breaking and entering a building with intentions of committing a crime.
- the act of making a fake document or altering a real one with the intentions to commit fraud.
13 Clues: taking property illegally through threats of harm. • Unlawful taking of another's property with the intent to steal it. • the deliberate and malicious burning of another person's property. • actions that involve computers and networks in criminal activities. • breaking and entering a building with intentions of committing a crime. • ...
Global Gridlock 2025-07-05
Across
- Warfare A modern form of warfare involving attacks on a country's digital systems and networks
- Describes the emerging global order with several power centers like BRICS, EU, and the US.
- A tax imposed on imports or exports to regulate trade and generate revenue. (6 letters)
- The analytical framework underpinning discussions on maritime strategy, energy corridors, and alliances.
- Temporary halt in fighting, often during negotiations
- The use of violence and intimidation by non-state actors, often targeting civilians, to achieve political goals
Down
- Penalties imposed by countries or international bodies to influence a nation’s behavior, often through trade or financial restrictions.
- India’s Cold War doctrine, reinterpreted as a form of “issue-based alignment” in the modern context.
- India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack
- A high-level diplomatic meeting of heads of state. (6 letters)
- An economic and geopolitical bloc central to India’s global strategy.
- Involving or affecting two sides, especially two countries. (9 letters)
- A concept linked to India’s defense diplomacy and strategic posture, especially in border and nuclear policy.
13 Clues: Temporary halt in fighting, often during negotiations • A high-level diplomatic meeting of heads of state. (6 letters) • An economic and geopolitical bloc central to India’s global strategy. • Involving or affecting two sides, especially two countries. (9 letters) • India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack • ...
CROSSWORD 2025-11-20
Across
- A type of blood vessel that carries deoxygenated blood from the heart to the lungs
- These components of blood are part of the immune system and defend the body against infection
- The protein in red blood cells that transports oxygen
- The largest artery in the body, which carries oxygenated blood out of the left ventricle
- A blood vessel that carries deoxygenated blood back to the heart
- The continuous movement of blood through the body
- A type of blood vessel that carries oxygenated blood from the lungs back to the heart
Down
- the main organ of the circulatory system that pumps blood throughout the body
- The liquid component of blood, consisting mainly of water, in which red and white blood cells are suspended
- Small, disk-shaped cells without a nucleus that are involved in blood clotting
- These cells are responsible for transporting oxygen in the blood
- The smallest blood vessels, which form networks where the exchange of materials between blood and tissues occurs
- A blood vessel that carries oxygenated blood away from the heart to the rest of the body
13 Clues: The continuous movement of blood through the body • The protein in red blood cells that transports oxygen • These cells are responsible for transporting oxygen in the blood • A blood vessel that carries deoxygenated blood back to the heart • the main organ of the circulatory system that pumps blood throughout the body • ...
Think Different - iSecure 2017-10-25
Across
- A type of online scam where criminals send an email that appears to be from a legitimate company asking you to provide sensitive information
- Users shall not enter sensitive areas without
- If someone calls you to say that you've won a huge sweepstakes that you never entered, it's probably a
Down
- The process of organizing data into categories for its most effective and efficient use
- You are typically required to change these every 45 days and are not to share them with anyone (including IT personnel)
- users shall report any lost or stolen device to the
- Malware that can replicate itself and is spread usually over networks to cause harm
7 Clues: Users shall not enter sensitive areas without • users shall report any lost or stolen device to the • Malware that can replicate itself and is spread usually over networks to cause harm • The process of organizing data into categories for its most effective and efficient use • ...
Unit 2: Social Media Vocabulary Review 2023-09-28
Across
- Is a website which promotes or sells products and services. Both buyers and sellers are connected through these platforms.
- Group of people who can see the content you share online.
- The information, products, videos, and all the data you share on your social networks
- Based on posting digital audio content. It often lasts longer than one hour and may be listened to by other internet users through their computers or their MP3 players.
- The continuously updated page you see on a social media website.
Down
- Refers to the blocking of unwanted content on the web.
- Is a program operating on a computer or any electronic device.
7 Clues: Refers to the blocking of unwanted content on the web. • Group of people who can see the content you share online. • Is a program operating on a computer or any electronic device. • The continuously updated page you see on a social media website. • The information, products, videos, and all the data you share on your social networks • ...
EDTC5325 Crossword -Laura Glass 2014-03-26
Across
- A hardware device that routes data from a local area network (LAN) to another network connection.
- Card that makes the connection between the computer and the network cable.
- Technology often used for wireless keyboards and wireless printing.
- Carries data to smaller lines of transmission.
- A piece of computer hardware or software that accesses a service made available by a server.
- A computer that provides data to other computers.
- Address A numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
- Limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users.
- Describes the arrangement of systems on a computer network.
- Networks that span long distances via telephone lines, fiber-optic cables, or satellite links.
Down
- The most common type of connection computers use in a local area network (LAN).
- The maximum data transfer rate of a network or Internet connection.
- A site that offers Internet access over a wireless local area network (Starbucks).
- An Ethernet network cable
- A type of connector commonly used for Ethernet networking.
- Computer network limited to a small area such as an office building or university,
- Technology that allows an electronic device to exchange data or connect to the internet wirelessly.
17 Clues: An Ethernet network cable • Carries data to smaller lines of transmission. • A computer that provides data to other computers. • A type of connector commonly used for Ethernet networking. • Describes the arrangement of systems on a computer network. • Technology often used for wireless keyboards and wireless printing. • ...
PRIN Word Search 2021-05-10
Across
- global system of interconnected computer networks
- the industry leading spreadsheet software program
- a way of connecting computers together in a local area network or LAN
- the central unit of a computer system that performs arithmetic and logic operations
- a form of computer memory that can be read and changed in any order
- an American multinational technology company
- contain all the data in your PC, from the operating system to music, movies and video games
- a part of the system that holds the internal factors of a computer together
- a presentation program
- usually refers to something using digits, particularly binary digits
Down
- receive audio input from a device such as a computer
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- the electronic circuitry that executes instructions comprising a computer program
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- portable Document Format
17 Clues: a presentation program • portable Document Format • an American multinational technology company • global system of interconnected computer networks • the industry leading spreadsheet software program • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
PRIN Word Search 2021-05-10
Across
- contain all the data in your PC, from the operating system to music, movies and video games
- the central unit of a computer system that performs arithmetic and logic operations
- the electronic circuitry that executes instructions comprising a computer program
- a way of connecting computers together in a local area network or LAN
- global system of interconnected computer networks
- portable Document Format
- a hand-held pointing device that detects two-dimensional motion relative to a surface
- a family of wireless network protocols which are commonly used for local area networking of devices and Internet access
- a part of the system that holds the internal factors of a computer together
- usually contains significant sub-systems, such as the central processor, the chipset's input/output and memory controllers, interface connectors, and other components integrated for general use
Down
- an American multinational technology company
- the industry leading spreadsheet software program
- usually refers to something using digits, particularly binary digits
- short-range wireless technology standard used for exchanging data between fixed and mobile devices over short distances
- a form of computer memory that can be read and changed in any order
- a presentation program
- receive audio input from a device such as a computer
17 Clues: a presentation program • portable Document Format • an American multinational technology company • the industry leading spreadsheet software program • global system of interconnected computer networks • receive audio input from a device such as a computer • a form of computer memory that can be read and changed in any order • ...
ICT652 CHAPTER 4 2023-10-30
Across
- child pornography is considered as child _____
- is a ____ to disseminate information classified as an official secret
- remove ____ material is one of the alternative to control offensive speech online
- ____ is the process of transferring ownership of a business in public sector (a government) to the private sector.
- state may make law in respect of matters in the _____
- ____ is the act or process of removing or reducing state regulation
- the purpose of anonymity is to hide certain _____
- Government has the power to ____ the license from people if there are threat to the government
Down
- parliament may make law in respect of matters in the _____
- is the political right to communicate one's opinions and ideas via ____
- the title for this chapter is the censorship in ____
- (COPA)is the Abbreviation for the Child Online _____ Act
- Quality or state of being anonymous is the definition of _____
- ______is one of the way to control offensive speech in the cyberspace
- Net ____is a principle that supports no restrictions by Internet service providers or governments on consumers' access to networks that participate in the Internet.
- ____is applied to control media content to avoid unnecessary disturbance to the national security.
- Share issue privatization (SIP) ,Asset sale privatization ,Voucher privatization and Privatization from below is the ____ of Privatization
17 Clues: child pornography is considered as child _____ • the purpose of anonymity is to hide certain _____ • the title for this chapter is the censorship in ____ • state may make law in respect of matters in the _____ • (COPA)is the Abbreviation for the Child Online _____ Act • parliament may make law in respect of matters in the _____ • ...
Software Part 3 2020-08-10
Across
- A small picture used to represent a file or program in a GUI interface
- the type of storage that is not changed even when the computer is turned off
- A deliberately harmful computer program designed to create annoying glitches or destroy data
- 1,024,576 bytes or 1,024 kilobytes; enough storage to approximately equal a 600 page paperback book; generally abbreviated Mb
- A list of operations avalaible to the user of a program
- Any device that olds computer data
- Software provided at a minimal cost to users who are on their honor to send in payment to the programmer
- The type of storage that changes; when the computer is turned off, the RAM memory is erased
- A network of computer networks encompassing
- A collection of computers that are connected
Down
- 1,024 bytes; usually abbreviated KB
- A graphical representation of program activities; a row of icons used to perform tasks in a program
- A program that allows the user to create primarily text documents
- A program arranged in rows and colums that manipulates numbers
- A computer´s unique address or number on the internet
- Any of a number of hardware devices connected to a CPU
- A screen in a software program that permits the user to view several programs at one time
17 Clues: Any device that olds computer data • 1,024 bytes; usually abbreviated KB • A network of computer networks encompassing • A collection of computers that are connected • A computer´s unique address or number on the internet • Any of a number of hardware devices connected to a CPU • A list of operations avalaible to the user of a program • ...
MHI - Crossword 2024-08-27
Across
- Abbreviation for the digital version of a patient's medical history
- The ability of different health information systems to work together within and across organizational boundaries
- Largest hospital network and health research organizationin Canada
- An online platform that gives patients access to their health information and the ability to communicate with healthcare providers
- Last Name of MHI Program Director
- An independent, not-for-profit corporation dedicated to AI research
- The use of telecommunications technology to provide clinical healthcare from a distance
- The simulation of human intelligence in machines, often used in predictive analytics (2 words)
Down
- The practice of protecting systems, networks, and programs from digital attacks in the healthcare industry
- A MHI Prof is the founder of this company that creates digital health solutions
- UofT website where you can find your transcript
- State of physical, emotional, and mental exhaustion often experienced by healthcare professionals due to prolonged stress
- Permission given by a patient to share their personal health information with others.
- The largest academic science and health science library in Canada
- The social media platform used mainly for networking
- The institution that the MHI Program falls under
- The sequence of processes through which a piece of work passes from initiation to completion in healthcare settings
17 Clues: Last Name of MHI Program Director • UofT website where you can find your transcript • The institution that the MHI Program falls under • The social media platform used mainly for networking • The largest academic science and health science library in Canada • Largest hospital network and health research organizationin Canada • ...
Crossword Puzzle 2025-03-01
Across
- COMMUNICATION-The process of exchanging information effectively (14 letters)
- COMMUNICATION- A type of communication that involves sharing personal experiences (10 letters)
- TECHNOLOGY AND SOCIETY- A field exploring the societal impact of science and technology (16 letters)
- ERA- The current era characterized by widespread use of digital technology (11 letters)
- THE SELF- The study of the self and its development (15 letters)
- A key aspect of self-concept: your sense of who you are (8 letters)
- COMMUNICATION- A type of communication that uses technology to connect people across distances (10 letters)
- A type of reasoning used to solve mathematical problems (7 letters)
Down
- COMMUNICATION- A type of communication used to persuade or influence (12 letters)
- A key element of self-understanding: your values and beliefs (10 letters)
- A characteristic of effective communication: being clear and easy to understand (8 letters)
- A branch of mathematics dealing with numbers and their relationships (11 letters)
- INTELLIGENCE- The ability to understand and manage one's emotions (11 letters)
- A key element of self-understanding: your beliefs about your abilities (11 letters)
- A branch of mathematics dealing with shapes and spaces (9 letters)
- STORAGE- The use of computers and networks to store and share information (10 letters)
- The application of scientific knowledge to solve practical problems (10 letters)
- A branch of mathematics used in data analysis and prediction (10 letters)
18 Clues: THE SELF- The study of the self and its development (15 letters) • A branch of mathematics dealing with shapes and spaces (9 letters) • A key aspect of self-concept: your sense of who you are (8 letters) • A type of reasoning used to solve mathematical problems (7 letters) • A key element of self-understanding: your values and beliefs (10 letters) • ...
Week One Crossword 2024-10-15
Across
- He said that the bourgeoisie are in conflict with the proletariat.
- Collections of people (friends, family, teams) that influence behavior and social norms.
- How people learn values, norms, and behaviors from society throughout their lives.
- Weber believed that Protestants saw financial success as a sign from God and this led to the birth of ___.
- His goal was to get sociology recognized as a separate academic discipline.
- He invented the term "sociology," the study of society.
- Marx believed that the engine of human history is class ____.
- He disagreed with Marx's claim that economics is the central force in social change.
- Our sense of identity, shaped through interactions with others.
Down
- Marx supported ___ as the only way workers could gain control of society.
- Weber believed that ___ was the central force in social change.
- Spencer is known for creating the idea of "survival of the ____."
- Spencer was influenced by ideas similar to Charles Darwin’s theory of ___.
- He thought that societies evolve from "barbarian" to "civilized" forms over time
- Durkheim's research found that people are more likely to commit ___ if their ties to others are weak.
- Social ___ are the benefits (like resources and support) we gain from our social connections and networks.
- The ____ Revolution was one of the biggest influences on Comte's beliefs.
17 Clues: He invented the term "sociology," the study of society. • Marx believed that the engine of human history is class ____. • Weber believed that ___ was the central force in social change. • Our sense of identity, shaped through interactions with others. • Spencer is known for creating the idea of "survival of the ____." • ...
Machine Learning 2026-03-26
Across
- which Data set used for testing an algorithm/model
- which Analytic offers a unique opportunity to identify future trends and allows organizations to act upon them
- which networks are algorithms inspired by the biological brain
- Concerned with building models that separate data into distinct classes.
- process of acquiring training data from population
- this matrix is a table that is often used to describe the performance of a classification model
Down
- task of grouping a set of objects in such a way that objects in the same group
- It’s a branch of mathematics which deals with data
- which Data set used for testing an algorithm/model while tuning model hyperparameters
- the fraction of relevant instances that have been retrieved over the total amount of relevant instances
- the true negative rate or the proportion of negatives that are correctly identified
- Measure of association between two variables that are not designated as either dependent or independent
- which Data set used for fitting an algorithm/model
- This Learning required Trained Label Data
- the positive predictive value or the fraction of the positive predictions that are actually positive
- simply the fraction of the total sample that is correctly identified.
- Machine learning is a subset of
17 Clues: Machine learning is a subset of • This Learning required Trained Label Data • It’s a branch of mathematics which deals with data • which Data set used for testing an algorithm/model • which Data set used for fitting an algorithm/model • process of acquiring training data from population • which networks are algorithms inspired by the biological brain • ...
Living in the IT Era 2019-11-16
Across
- a device, module, machine, or subsystem whose purpose is to detect events or changes in its environment.
- was a convenient way to send a message to associates or friends.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- the code of acceptable internet behavior.
- consists of a worldwide collection of electronic documents.
- the technology by which a process or procedure is performed with minimal human assistance.
- refers to information presented in non-textual forms such as video, sound, and graphics.
- the first page that a Web site displays.
- a malicious program that looks like a legitimate program.
- a communications system connecting two or more computers.
Down
- affects a computer negatively by altering the way the computer works.
- an online or internet-based illegal act.
- a process of receiving information.
- the worldwide computer network that links thousands of smaller networks.
- an online area in which users have written discussions about a particular subject.
- a real-time typed conversation that takes place on a computer.
- the appearance of motion created by displaying a series of still images in sequence.
- a type of malware that can block access to the victim's data.
- a collection of data or computer instructions that tell the computer how to work.
19 Clues: a process of receiving information. • an online or internet-based illegal act. • the first page that a Web site displays. • the code of acceptable internet behavior. • a malicious program that looks like a legitimate program. • a communications system connecting two or more computers. • consists of a worldwide collection of electronic documents. • ...
humanities geographical wordfind 2020-04-30
Across
- The elevation of a geographical location ether higher or lowr that a point.
- plants that are found in a particular area.
- The earth.
- A supply of materials, money and food/ water that people use to build and live off.
- Your attitude towards towards a point of view.
- a way of living within a group.
- The increase of the population of people living in a town or city which spill out in to nearby areas.
- Is the area of biology that deals with organisms and their surrounding.
- An extraordinary or rare occurrence or happenings
- A state that can be maintained for a designated amount of time.
Down
- Characteristics of the of an area.
- A group of people, animals or plants of the same species living in the same area.
- Describes the arrangement of housing or physical features in a area.
- connections between environments of nature and humanity that from a system.
- The research of the physical features of the earth.
- A group or system of links betweet people or things.
- The average temperature, rain fall, wind, atmospheric pressure and other meteorological elements.
- Is a place where a group of people live.
- cycle The cycle in which water moves from the land to the sky and back to earth through the processes of evaporation, condensation and precipitation.
19 Clues: The earth. • a way of living within a group. • Characteristics of the of an area. • Is a place where a group of people live. • plants that are found in a particular area. • Your attitude towards towards a point of view. • An extraordinary or rare occurrence or happenings • The research of the physical features of the earth. • ...
Digital Commerce 2021-10-06
Across
- a part of something
- a device used to enter information into a computer
- it is a free online encyclopedia
- it stands for wide area network and it connects computers over a large area
- it is a way to store digital information
- to copy and paste other people’s work and demand that you did it
- it stands for solid state drive and it use flash memory to store your data
Down
- proper manners
- it stands for central processing unit and it sends signals to control the computer
- it’s a law that gives the owner of their own work, the right to decide what other people can do with it
- to protect your networks from intruders
- it is to intrude into someone else’s privacy and to steal their information by breaking through their computer security
- commercial messages that you did not ask for
- it stands for local area network that connects computers or devices in a building
- it controls the flow of the data from one computer to another
- it stands for hard disk drive and it uses a magnetic storage to save data
- a technology that allows someone to connect a electron device to a computer
- it means that you could use something that someone else created
- it stands for random access memory and it is a memory in your computer that stores your program
19 Clues: proper manners • a part of something • it is a free online encyclopedia • to protect your networks from intruders • it is a way to store digital information • commercial messages that you did not ask for • a device used to enter information into a computer • it controls the flow of the data from one computer to another • ...
Internet Safety Crossword - Kim Chart 2025-02-26
Across
- a type of cybercrime where a criminal poses as a known person
- any criminal that involves a computer network or networked devices
- a frequently updated web page used for personal commentary or business content
- small text files that websites store on your computer to remember information about you and your browsing activity
- the international video recorded assault of individuals
- the trail data you leave when using the internet
- sending fraudulent communications that appear to come from different sources
- an online individual who uses the internet as a means to commit harassment
Down
- the practice of protecting systems networks and digital attacks
- any form of making fun or bullying someone without being in person
- settings controls available on many websites and apps to limit who can access your profile
- the act of someone causing discord online or in person
- an ideal pattern of behavior for internet users about what is acceptable
- sending you intimate or sexual content and asking you to share the same thing in return
- an image digitally altered using image editing software
- any kind of communication over the internet
- a tyoe of malware which prevents you from accessing your device and the data stored on it
- short strings of words in capital letters
- unauthorized use copying or distribution of copyrighted software
19 Clues: short strings of words in capital letters • any kind of communication over the internet • the trail data you leave when using the internet • the act of someone causing discord online or in person • an image digitally altered using image editing software • the international video recorded assault of individuals • ...
Economic Growth 2025-11-17
Across
- Physical structures like roads, railways, ports, and communication networks that support production.
- The value of exports minus imports.
- Raw materials from nature (e.g., oil, minerals) used in production.
- How optimistic firms feel about future economic conditions.
- The total value of all goods and services produced in an economy, adjusted for inflation.
- Economic activity that is not recorded or taxed, so not included in GDP.
- When people who are able and willing to work cannot find a job.
- All people who are able and willing to work.
- The value of all goods and services produced in an economy at current prices, without adjusting for inflation.
- Spending by the government on public and merit goods and wages of public employees.
- An unexpected event that reduces total supply (e.g., bad weather, oil price spike).
- An unexpected event that reduces total demand (e.g., higher interest rates, falling confidence).
Down
- Skills, education, and health of the labour force.
- Payments for which no good or service is exchanged (e.g., unemployment benefits); not included in GDP.
- Business spending on capital goods (machinery, technology) to increase production.
- An increase in the productive capacity of an economy or an increase in real GDP.
- Household spending on goods and services.
- GDP divided by the total population; an indicator of average income per person.
- A fall in total demand and GDP over time; negative economic growth.
19 Clues: The value of exports minus imports. • Household spending on goods and services. • All people who are able and willing to work. • Skills, education, and health of the labour force. • How optimistic firms feel about future economic conditions. • When people who are able and willing to work cannot find a job. • ...
IT English 1 2025-09-14
Across
- to unexpectedly meet or be faced with something or someone
- a person who designs, writes, and tests software and applications
- a professional who protects an organization's computer systems and networks from cyber threats
- a secure, digital, and decentralized record of transactions
- the skill or knowledge that a person has in a particular area
- a security specialist who simulates cyber attacks to find vulnerabilities in computer systems
- teachable abilities or specific knowledge sets, like programming or accounting
- a person who prepares technical drawings and plans for machinery, buildings, or products
Down
- to start a project or task from the very beginning
- the point where a user and a computer system interact
- a person who publicly supports or recommends a particular cause, policy, or group
- a writer who creates the text that guides users through a product, like buttons and menu labels
- giving a lot of information clearly and in a few words
- a person who introduces new methods, ideas, or products
- someone who examines, cleans, and models data to find useful information and support decision-making
- a professional who installs, maintains, and repairs electrical equipment and systems
- an engineer who designs, constructs, and programs robots and robotic systems
- people skills, help you collaborate with people
- an engineer who helps integrate and launch new software or systems for customers
19 Clues: people skills, help you collaborate with people • to start a project or task from the very beginning • the point where a user and a computer system interact • giving a lot of information clearly and in a few words • a person who introduces new methods, ideas, or products • to unexpectedly meet or be faced with something or someone • ...
revision-crossord 2022-12-13
Across
- the unequal accessibility of internet access of information and those without.
- the legal protection employers receive when prosecuting unfair actions within the workplace.
- The process of a device being created, used and recycled or disposed of.
- the abundance of physical objects that can that connect and exchange data with other devices and systems over the Internet or other communications networks.
Down
- simulation of human-intelligence processes by computer systems using machine learning, expert systems
5 Clues: The process of a device being created, used and recycled or disposed of. • the unequal accessibility of internet access of information and those without. • the legal protection employers receive when prosecuting unfair actions within the workplace. • simulation of human-intelligence processes by computer systems using machine learning, expert systems • ...
Cybersecurity 2025-03-28
Across
- artificial image or video (a series of images) generated by a special kind of machine learning called “deep” learning
- The practice of protecting systems, networks, and programs from digital attacks
- a type of cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords, credit card numbers, or personal data
Down
- When you got a phishing email, you should (_____) by clicking report phishing button in Outlook.
- how many KUB(TYREX) stations in PTTEP YADANA Asset in total
- What is the minimum number of characters for PTTEP YADANA Asset user accounts
6 Clues: how many KUB(TYREX) stations in PTTEP YADANA Asset in total • What is the minimum number of characters for PTTEP YADANA Asset user accounts • The practice of protecting systems, networks, and programs from digital attacks • When you got a phishing email, you should (_____) by clicking report phishing button in Outlook. • ...
Finacle KBC24 2013-09-17
Across
- In E-banking, this process checks the accounts at regular intervals to maintain desired balance (8)
- The delay granted by banks for repayment of loan (10)
- The financial assistance given to an insured bank which is suffering a loss of earnings (7)
- The security deposit collected by bank under Murabaha Concept (6,8)
- In ATM Networks, the entity which dispenses the cash and collects transaction fee from card issuing bank (8)
- This Unix command used to get details on how many days the server is up and running (6)
- In Unix O/S, this command used to connect to a remote host (6)
Down
- The e-banking functionality provides Corporate users to upload salary payments (4,6)
- This can be called as an alias for Table, View, Sequence in Oracle (7)
- This Component is responsible for Maintaining Contra Entries in Transaction Creation (7)
- The legal status of a Person / Entity, who is not a position to repay the debts they owe (10)
- This option gives the inventory status for all users (5)
- The menu option for DSA subvention payment (7)
13 Clues: The menu option for DSA subvention payment (7) • The delay granted by banks for repayment of loan (10) • This option gives the inventory status for all users (5) • In Unix O/S, this command used to connect to a remote host (6) • The security deposit collected by bank under Murabaha Concept (6,8) • ...
Lesson 25 Vocabulary 2015-04-24
Across
- to save or transfer data to a storage device or folder to save space or organize data
- electronic communication that allows use to send and receive real time text messages from those who are online
- the space in some application windows that displays the name of an open folder or object
- a document, image, figure, or other file that you can attach to en e-mail
- text or graphics added to the end of an outgoing e-mail message
- transmission of electronic messages over networks
- e-mail software provided with Windows Vista
Down
- using a ell phone or other mobile device to send and receive written messages
- the unique address used to send e-mail to someone
- a list of e-mail addresses you can use to send the same message to a group
- unsolicited e-mail that is sent to many people at the same time to promote products and services
- a software application installed on a local PC, network, or Web
- a list of e-mail addresses you can use to send the same message to a group
- when an e-mail is sent and broken down into smaller chunks
14 Clues: e-mail software provided with Windows Vista • the unique address used to send e-mail to someone • transmission of electronic messages over networks • when an e-mail is sent and broken down into smaller chunks • text or graphics added to the end of an outgoing e-mail message • a software application installed on a local PC, network, or Web • ...
1.1-1.2 vocab 2022-09-06
Across
- the use of computers to simulate a real or imagined environment that appears as a three-dimensional
- involves reducing electricity consumed and environmental waste generated when using technology
- Alarm clocks, coffeemakers, thermostats, streetlights, navigation systems, and much more
- descriptive text added to an object, such as a picture or drawing
- the technological use of logic and prior experience to simulate human intelligence
Down
- the gap between those who have access to technology and those who not
- stores data on a chip instead of a magnetic stripe
- an environment where processors are embedded in every product imaginable, and these things communicate with one another via the Internet or wireless networks.
- the use of technology by a companies employees
- technology uses audio output to describe the contents of the screen
- a computer that functions as one component in a larger product
- a type of VR that uses an image of an actual place or thing and adds digital information to it
- a freestanding booth usually placed in a public area that can contain a display device
13 Clues: the use of technology by a companies employees • stores data on a chip instead of a magnetic stripe • a computer that functions as one component in a larger product • descriptive text added to an object, such as a picture or drawing • technology uses audio output to describe the contents of the screen • ...
11 General BME 2025-07-02
Across
- those a person wants to avoid being associated with.
- one of four psychological factors influencing purchasing decisions.
- Network naturally forming networks of employees or other business related entities casually forming outside of the business.
- refers to the quantity of a good or service that producers are willing and able to offer at various price levels.
- skimming an example of the marketing mix
- individuals or groups that a person wishes to compare with
- of ethics the set of rules and expectations for the business that states the ethical principles staff are expected to have and the values of the workplace culture.
- the quantity of a good or service that consumers are willing and able to purchase at various price levels
Down
- attributes of the consumer population such as gender, income levels and age
- is an example of the marketing mix
- Share The percentage of a market controlled by a particular company or product.
- trader exclusive owner of the business
- Mix the strategic framework of the 4P's used to plan and executive the marketing plan
13 Clues: is an example of the marketing mix • trader exclusive owner of the business • skimming an example of the marketing mix • those a person wants to avoid being associated with. • individuals or groups that a person wishes to compare with • one of four psychological factors influencing purchasing decisions. • ...
Global Gridlock 2025-07-05
Across
- The use of violence and intimidation by non-state actors, often targeting civilians, to achieve political goals
- The analytical framework underpinning discussions on maritime strategy, energy corridors, and alliances.
- India’s Cold War doctrine, reinterpreted as a form of “issue-based alignment” in the modern context.
- India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack
- Temporary halt in fighting, often during negotiations
- A tax imposed on imports or exports to regulate trade and generate revenue. (6 letters)
Down
- A concept linked to India’s defense diplomacy and strategic posture, especially in border and nuclear policy.
- Describes the emerging global order with several power centers like BRICS, EU, and the US.
- Penalties imposed by countries or international bodies to influence a nation’s behavior, often through trade or financial restrictions.
- A high-level diplomatic meeting of heads of state. (6 letters)
- Involving or affecting two sides, especially two countries. (9 letters)
- An economic and geopolitical bloc central to India’s global strategy.
- Warfare A modern form of warfare involving attacks on a country's digital systems and networks
13 Clues: Temporary halt in fighting, often during negotiations • A high-level diplomatic meeting of heads of state. (6 letters) • An economic and geopolitical bloc central to India’s global strategy. • Involving or affecting two sides, especially two countries. (9 letters) • India’s 2025 strike on terror camps in Pakistan after the Pahalgam attack • ...
Intro to Cybersecurity Vocabulary 2025-10-14
Across
- set of security controls designed to protect payment account security such as credit or debit card transactions
- protection of digital devices and their connected networks from danger and threats as well as protecting personal information on a system by detecting, preventing and responding to attacks
- crime committed over the internet
- short for "malicious software" and covers threats such as viruses, worms, Trojan horses, ransomware and the numerous other programs used by hackers to gain access to or damage sensitive information on a computer
- set of policies and procedures meant to improve and guide an organization’s cybersecurity practices
- occur when hackers or malicious software gains unauthorized access to a system, examples include: hacker cracking passwords, breaking into a server or changing a user’s privileges on their system
Down
- set of best practice recommendations for information security management
- unique skills for a specific area
- attempt to steal, damage or destroy information on a device or computer system
- individual who participates in hacking
- abilities needed to communicate and work with others
- prevents a user from accessing a system
- act of skirting or breaking through security boundaries
13 Clues: unique skills for a specific area • crime committed over the internet • individual who participates in hacking • prevents a user from accessing a system • abilities needed to communicate and work with others • act of skirting or breaking through security boundaries • set of best practice recommendations for information security management • ...
haley's internet crossword puzzle 2013-03-26
Across
- a list of citations that appear at the end of a paper, article, chapter or book
- A global network of thousands of other computer networks that offers e-mail and information retrieval services to millions of people.
Down
- A bully who operates online, in cyberspace; To bully online
- Text or graphics that, when clicked, will connect the user to a new web page or another place on the same page.
- To renew or revitalize; To reload a webpage on the internet
- unauthorized person who secretly gains access to computer files.
- a piece of writing that has been copied from someone else and is presented as being your own work
- tabs name for a way to display information on websites. Website tabs
8 Clues: A bully who operates online, in cyberspace; To bully online • To renew or revitalize; To reload a webpage on the internet • unauthorized person who secretly gains access to computer files. • tabs name for a way to display information on websites. Website tabs • a list of citations that appear at the end of a paper, article, chapter or book • ...
isai jimenez internet Crossword Puzzle 2013-12-02
Across
- USE The fair use doctrine provides educators with the right to make reasonable copies of copyrighted materials without specific consent of the author for purposes of criticism, comment, news reporting, teaching, scholarship, or research.
- An unauthorized person who secretly gains access to computer files.
- software used to view various kinds of Internet resources found on the Web.
- A bully who operates online, in cyberspace; To bully online
Down
- To renew or revitalize; To reload a webpage on the internet
- NETWORKS online communit
- a restricted computer network; a private network created using World
- Software program that is designed to damage files on a computer that receives it. Viruses replicate (reproduce) and can spread to other application and operating system software. ies where people meet, socialize
8 Clues: NETWORKS online communit • To renew or revitalize; To reload a webpage on the internet • A bully who operates online, in cyberspace; To bully online • An unauthorized person who secretly gains access to computer files. • a restricted computer network; a private network created using World • ...
Choice HW 2021-03-03
Across
- a group that aimed to help African Americans be physically, mentally, politically, and socially (National Association for the Advancement of Colored People)
- groups that made loans and provided legal assistance
- Liberal Mexicano, a group of Mexican Americans organizing for their own benefit (similar to the Urban League)
- Progress, the progress of equality between races (specifically black and white)
- League, a group of people dedicated to provide religious education, to help, and to defend Jewish people
Down
- Movement, a movement that denounced the idea of gradual progress
- the process of changing immigrant ways of life to that of Americans
- League, a networks of over 100 groups of black employment agencies and relief efforts to help African Americans get settled and find work
8 Clues: groups that made loans and provided legal assistance • Movement, a movement that denounced the idea of gradual progress • the process of changing immigrant ways of life to that of Americans • Progress, the progress of equality between races (specifically black and white) • ...
Jobs 2024-05-08
Across
- A person who takes care of money matters in a company, including planning, keeping records, and making financial reports.
- A designer who creates things like websites and graphics using computer software.
- Someone who makes sure that products are made correctly, on time, and within budget in a factory.
- A worker in a store who helps customers find products and buy them.
Down
- A professional who manages computer systems, helps with technical problems, and keeps computer networks safe.
- A person who leads a team to sell products or services and tries to meet sales goals.
- Someone who plans and organizes projects, manages teams, and makes sure the project finishes successfully.
- A worker who helps manage the office by doing tasks like organizing files, scheduling meetings, and supporting other staff.
8 Clues: A worker in a store who helps customers find products and buy them. • A designer who creates things like websites and graphics using computer software. • A person who leads a team to sell products or services and tries to meet sales goals. • Someone who makes sure that products are made correctly, on time, and within budget in a factory. • ...
Strategy Quiz 2024-08-08
Across
- What is the word for converting the pieces of a process into a digital format to accelerate the connection between people, processes, and technologies
- The Repositioning the Belden Brand Initiative focuses on creating a Brand strategy that conveys the "Belden of the _________"
- Orchestration, What is the word for when data is received and transported where it needs to go via integrated networks?
- How many strategic initiatives are there?
Down
- What is the word for "untapped opportunities"
- What locations are designed to create and validate solutions with customers and partners before we install them?
- To Market, Which bucket of strategic initiatives does the "Generating Revenue through Whitespace" fall into?
- Hundred Twenty, Belden has been at the forefront of innovation for how many years?
8 Clues: How many strategic initiatives are there? • What is the word for "untapped opportunities" • Hundred Twenty, Belden has been at the forefront of innovation for how many years? • To Market, Which bucket of strategic initiatives does the "Generating Revenue through Whitespace" fall into? • ...
IoT Crossword 2024-10-06
Across
- A distributed computing paradigm that brings computation and data storage closer to the location where it is needed, enhancing response times and saving bandwidth
- A set of rules for transmitting data between IoT devices
Down
- A component that takes action based on data, such as opening a valve or turning on a light.
- A technology using radio waves to identify and track objects, used in IoT systems.
- A device that detects and measures changes in the environment, sending data for processing.
- A device that connects IoT devices to the internet or local networks.
- A network of servers used to store and manage data over the internet, essential for IoT.
- A connection point in a network where data is collected or transmitted.
8 Clues: A set of rules for transmitting data between IoT devices • A device that connects IoT devices to the internet or local networks. • A connection point in a network where data is collected or transmitted. • A technology using radio waves to identify and track objects, used in IoT systems. • ...
FAKE NEWS, ΠΝΕΥΜΑΤΙΚΑ ΔΙΚΑΙΩΑΜΑΤΑ & ΠΕΙΡΑΤΕΙΑ ΛΟΓΙΣΜΙΚΟΥ 2025-03-31
Across
- Είναι πιθανό να χάσετε... ή δεδομένα με την εγκατάστασή του στον υπολογιστή σας
- Η προώθηση μέσω του Διαδικτύου παράνομων αντιγράφων έργων πνευματικής ιδιοκτησίας (π.χ. μουσικής, ταινιών, ηλεκτρονικών βιβλίων, προγραμμάτων) θεωρείται...πράξη
- Έτσι ονομάζεται το δικαίωμα που αποκτά κάποιος σε ένα πρωτότυπο δημιούργημα
- Πνευματική ...είναι το σύνολο των εξουσιών που δίνει ο νόμος στον ιδιοκτήτη ενός πνευματικού έργου
Down
- Το Διαδίκτυο αποτελεί το κυριότερο μέσο διακίνησης ... λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων (peer to peer networks)
- Αφορά στην παράνομη αντιγραφή και χρήση προγραμμάτων χωρίς την άδεια του δημιουργού τους και στην παράνομη αναπαραγωγή
- Όλες οι πληροφορίες που καταχωρίζονται στο διαδίκτυο δεν είναι...
- Το ... λογισμικό συνήθως δεν ενημερώνεται με διορθωτικές εκδόσεις για την αντιμετώπιση ευπαθειών και έτσι είναι ευάλωτο σε επιθέσεις εισβολέων
8 Clues: Όλες οι πληροφορίες που καταχωρίζονται στο διαδίκτυο δεν είναι... • Έτσι ονομάζεται το δικαίωμα που αποκτά κάποιος σε ένα πρωτότυπο δημιούργημα • Είναι πιθανό να χάσετε... ή δεδομένα με την εγκατάστασή του στον υπολογιστή σας • Πνευματική ...είναι το σύνολο των εξουσιών που δίνει ο νόμος στον ιδιοκτήτη ενός πνευματικού έργου • ...
A spot-the-threat challenge with 8 hidden cybersecurity risks 2025-04-17
Across
- Software that secretly gathers information about a person or organization without their knowledge.
- A cyberattack where a person or program disitself guises as another by falsifying data to gain an advantage.
- A type of malware disguised as legitimate software that tricks users into installing it.
- Malicious software designed to harm, exploit, or disable computers and networks.
- Synthetic media in which a person in an image or video is replaced with someone else's likeness using AI.
Down
- A type of cyberattack where attackers pretend to be a trustworthy entity to steal sensitive information.
- A type of malware that locks or encrypts data and demands payment for its release.
- A network of private computers infected with malicious software and controlled as a group.
8 Clues: Malicious software designed to harm, exploit, or disable computers and networks. • A type of malware that locks or encrypts data and demands payment for its release. • A type of malware disguised as legitimate software that tricks users into installing it. • A network of private computers infected with malicious software and controlled as a group. • ...
Cs Test 2022-10-21
Across
- How long it takes for data packets to travel from one designated point to another.
- A trailer or footer refers to supplemental data (metadata) placed at the end of a block of data being stored or transmitted, which may contain information for the handling of the data block, or simply mark the block's end.
- In networking, a packet is a small segment of a larger message.
- hmmm
Down
- Packet loss occurs when one or more transmitted data packets fail to arrive at their destinations.
- Packet switching is the transfer of small pieces of data across various networks.
- In computing, a payload is the carrying capacity of a packet or other transmission data unit.
- Bandwidth is the data transfer capacity for a computer network in bits per second.
8 Clues: hmmm • In networking, a packet is a small segment of a larger message. • Packet switching is the transfer of small pieces of data across various networks. • How long it takes for data packets to travel from one designated point to another. • Bandwidth is the data transfer capacity for a computer network in bits per second. • ...
Org&Mgt 16Jan2023 2023-01-15
Across
- =current assets/current liabilities
- Employment ________ is an agreement or term of hire that is extended from an employer to
- It is the assignment of authority to another person (normally from a manager to a subordinate) to carry out specific activities.
- She/He creates and maintain brand promotions, company information, and marketing campaigns for their company across several social media networks.
Down
- It involves setting up standards of individuals and organizational performance.
- ______ control is a process by which entities review the quality of all factors involved in production.
- employee to set the terms and conditions of their employment.
- ____ chain is the actual sequence of activities that results in the production of goods and services that have values for customers.
8 Clues: =current assets/current liabilities • employee to set the terms and conditions of their employment. • It involves setting up standards of individuals and organizational performance. • Employment ________ is an agreement or term of hire that is extended from an employer to • ...
Stay Compliant: Crossword Challenge 2024-08-23
Across
- 8. A program that was established to identify & manage potential risk associated with third party
- 2. Any information that when used alone or combine with other information, identifies an individual
- 5. Lilly’s code of business conduct
Down
- 7. The best practice when receiving email from external party
- 1. The practice of manipulating people to gain confidential information through deception
- 3. Fraudulent attempts to trick individuals into revealing sensitive information through fake emails or websites
- 4. Is a “type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.
- 6. Combines several methods of authentication (e.g., a password and a token) to provide greater security when proving your identity
8 Clues: 5. Lilly’s code of business conduct • 7. The best practice when receiving email from external party • 1. The practice of manipulating people to gain confidential information through deception • 8. A program that was established to identify & manage potential risk associated with third party • ...
Find the Terms to Re-energize the Crystals 2025-03-01
Across
- ____ capital refers to social and community networks and the resources that can be accessed through them.
- ____ capital is the knowledge and skills learned by communities of color over generations of resistance to inequity and oppression.
- ___capital is about the knowledge, learning, and practices that are nurtured through kinship and extended family.
- _____ capital refers to multilingualism and other communication skills, including storytelling traditions, art, music, and poetry.
Down
- ____ capital includes the knowledge and resiliency to navigate oppressive and marginalizing systems.
- A framework that focuses on ones strengths in a nontraditional sense
- The last name of the a University of California, Riverside researched whose framework is often highlighted at the UCI College Corps Biweekly Training
- ___capital is about the hopes, dreams, and aspirations that parents pass on to their youth.
8 Clues: A framework that focuses on ones strengths in a nontraditional sense • ___capital is about the hopes, dreams, and aspirations that parents pass on to their youth. • ____ capital includes the knowledge and resiliency to navigate oppressive and marginalizing systems. • ...
fake news/Πνευματικά δικαιώματα/Πειρατεία λογισμικού 2025-03-31
Across
- Ο Παγκόσμιος Ιστός έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε...
- Εκτός από την παραβίαση των δικαιωμάτων πνευματικής ιδιοκτησίας των δημιουργών λογισμικού, το.... λογισμικό είναι πιθανό να βλάψει σοβαρά τον υπολογιστή σας.
- Το... αποτελεί το κυριότερο μέσο διακίνησης πειρατικού λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων (peer to peer networks).
Down
- Σε περιπτώσεις που δεν γίνεται ρητή αναφορά σε πνευματικά δικαιώματα καλό είναι να αναφέρουμε τις... μας.
- Η πειρατεία λογισμικού αφορά στην παράνομη αντιγραφή και χρήση ... χωρίς την άδεια του δημιουργού
- Πνευματικό... είναι το δικαίωμα που αποκτά κάποιος πάνω σε ένα πρωτότυπο πνευματικό δημιούργημα
- οι περισσότεροι...περιέχουν αναλυτική αναφορά στην πνευματική τους ιδιοκτησία..
- Πολλές πληροφορίες δεν είναι μόνο αναληθείς ή εσφαλμένες, αλλά μπορεί να είναι και
8 Clues: οι περισσότεροι...περιέχουν αναλυτική αναφορά στην πνευματική τους ιδιοκτησία.. • Πολλές πληροφορίες δεν είναι μόνο αναληθείς ή εσφαλμένες, αλλά μπορεί να είναι και • Ο Παγκόσμιος Ιστός έφερε επανάσταση στον τρόπο που αναζητούμε και αποκτούμε πρόσβαση σε... • Πνευματικό... είναι το δικαίωμα που αποκτά κάποιος πάνω σε ένα πρωτότυπο πνευματικό δημιούργημα • ...
communication system in canada 2014-01-13
Across
- a system that converts acoustic vibrations to electrical signals in order to transmit sound, typically voices, over a distance using wire or radio.
- stated that the world is becoming a global village
- is the physical transfer of data over a point-to-point or point-to-multipoint communication sysytem
Down
- a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
- idea that the world is becoming like one large of improvements in communication
- is the transfer of information from one place to another
- a device that receives television signals and reproduces them on a screen.
7 Clues: stated that the world is becoming a global village • is the transfer of information from one place to another • a device that receives television signals and reproduces them on a screen. • idea that the world is becoming like one large of improvements in communication • ...
α2ομαδα5 2021-03-22
Across
- Εκτός από την παραβίαση των δικαιωμάτων πνευματικής ιδιοκτησίας των δημιουργών λογισμικού, το παράνομο λογισμικό είναι πιθανό να βλάψει σοβαρά τον υπολογιστή μας
- ονομαζεται... προστασιας η αλλιως firewall
- τους χρησιμοποιουμε για να κρατησουμε τα αρχεια μας ασφαλη
Down
- μπορουμε να παρουμε τετοιες απο σαιτ οπως η (βικιπαιδια)
- άλλα άτομα μπορούν να συνδεθούν με τον υπολογιστή του και να ξεκινήσουν να παίρνουν το αρχείο (δηλαδή να κάνουν download). Το αρχείο που είχε αρχικά ο seeder, μοιράζεται στα άτομα σε κομμάτια. (αγγλικά με ελληνικούς χαρακτήρες)
- αυτο αποτελεί το κυριότερο μέσο διακίνησης πειρατικού λογισμικού είτε μέσω ιστότοπων είτε μέσω ομότιμων δικτύων διαμοιρασμού αρχείων(peer to peer networks).
- Το παράνομο λογισμικό μπορεί να είναι μολυσμένο με κακόβουλο λογισμικό
7 Clues: ονομαζεται... προστασιας η αλλιως firewall • μπορουμε να παρουμε τετοιες απο σαιτ οπως η (βικιπαιδια) • τους χρησιμοποιουμε για να κρατησουμε τα αρχεια μας ασφαλη • Το παράνομο λογισμικό μπορεί να είναι μολυσμένο με κακόβουλο λογισμικό • ...
fintech 2024-03-05
Across
- digitally distributed, decentralized, public ledger that exists across a network
- type of technology that is considered environmentally friendly based on its production process or its supply chain
- the practice of protecting systems, networks, and programs from digital attacks
Down
- utilization of technology, for example, big data and artificial intelligence(AI), to offer an alternative to conventional wealth management firms
- the use of technology innovations to bring in savings and efficiency to the insurance industry model
- management of regulatory monitoring, reporting, and compliance within the financial industry through technology
- any payments that involve technology, such as paying bus fare with a QR code or tapping a mobile phone on a credit card reader
7 Clues: the practice of protecting systems, networks, and programs from digital attacks • digitally distributed, decentralized, public ledger that exists across a network • the use of technology innovations to bring in savings and efficiency to the insurance industry model • ...
Computer network puzzle 2023-02-07
Across
- two or more devices connected together to create a computer network
- an established set of rules that determine how data is transmitted between different devices in the same network
- a set of physical or network devices that are essential for interaction and communication between hardware units operational on a computer network.
Down
- a node that broadcasts data to every computer or Ethernet-based device connected to it.
- a physical or virtual appliance that passes information between two or more packet-switched computer networks.
- a computer-based application for the exchange of messages between users
- These cables are essentially the carrier or media through which data flows.
7 Clues: two or more devices connected together to create a computer network • a computer-based application for the exchange of messages between users • These cables are essentially the carrier or media through which data flows. • a node that broadcasts data to every computer or Ethernet-based device connected to it. • ...
Social Network Theory 2025-06-09
Across
- any social group a person can be involved with
- he was the first to use sociograms to conduct research on social networks
- a theory built on “relationships between and among individuals and how the nature of those relationships influences beliefs and behavior”
Down
- this is a diagram that can show the connections between a network of people
- social network theory doesn’t work well for mass groups of people, but it does work in these
- Social Network was first theorized in small villages in this country in the 1950’s
- this does not play much of a role in SNT as it is about the the influence of relationships
7 Clues: any social group a person can be involved with • he was the first to use sociograms to conduct research on social networks • this is a diagram that can show the connections between a network of people • Social Network was first theorized in small villages in this country in the 1950’s • ...
Think 4, Page 50 2021-05-16
Across
- shell that protects your device of damage
- a piece of equipment that you wear over your ears with a part you can speak into, connected to a telephone or radio
- a piece of equipment or software that finds the best way of sending information between any two networks
Down
- electrical cable that temporarily connects an appliance to the mains electricity supply via a wall socket or extension cord
- an object that allows you to connect two pieces of equipment of different types or sizes
- device connected to a computer that produces images that can be seen on a website
- an object used for connecting a piece of equipment to an electricity supply
- a piece of equipment used for providing a battery with electricity
8 Clues: shell that protects your device of damage • a piece of equipment used for providing a battery with electricity • an object used for connecting a piece of equipment to an electricity supply • device connected to a computer that produces images that can be seen on a website • ...
Cloud Computing Crossword 5 2022-06-13
Across
- Software...networking. The ability to manage networking configuration of a virtualization infrastructure directly from the hypervisor stack.
- In a packet-switched networ, this is the time from the source sending a packet to the destination receiving it.
- Software whose use is allowed without functional restrictions but with a time limit imposed.
- A IP networking concept which virtually isolates networks and create discrete broadcast domains at OSI layer 2.
- Zero... A series of security architectures and best practices for securing on-premises and the cloud.
Down
- The act of creating source or machine code that is difficult for humans to understand.
- The act of segregating an IPv4 network to smaller network segments
- Software to automate the management and configuration of any infrastructure or application at
8 Clues: The act of segregating an IPv4 network to smaller network segments • The act of creating source or machine code that is difficult for humans to understand. • Software whose use is allowed without functional restrictions but with a time limit imposed. • Software to automate the management and configuration of any infrastructure or application at • ...
