networks Crossword Puzzles
UVC 1 2014-05-26
Across
- The literal, face-value meaning of a sign (438)
- The broad but indispensable shared sets of values and beliefs through which individuals live out their complex relations in a range of social networks (23)
- All the social, cultural, and historical meanings that are added to a signs literal meaning (436)
- The general term we use for words, sounds or images which carry meaning (Hall, 18).
Down
- The ideological meaning of a sign that is expressed through connotation. It allows the connotative meaning of a particular thing or image to appear to be denotative, hence literal or natural (450)
- The use of language and images to create meaning about the world around us (12)
- The production of meaning in cultural products (439)
7 Clues: The literal, face-value meaning of a sign (438) • The production of meaning in cultural products (439) • The use of language and images to create meaning about the world around us (12) • The general term we use for words, sounds or images which carry meaning (Hall, 18). • ...
Cyber Security 2022-07-07
Across
- The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- A cyber attack intended to redirect a website's traffic to another, fake site.
- A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- Observing a person's private information over their shoulder eg cashpoint machine PINs.
- A computer program or system intended to distinguish human from machine input
- A form of identification and authentication which relies on comparing scans of e.g. your face
7 Clues: A computer program or system intended to distinguish human from machine input • A cyber attack intended to redirect a website's traffic to another, fake site. • Observing a person's private information over their shoulder eg cashpoint machine PINs. • A form of identification and authentication which relies on comparing scans of e.g. your face • ...
ieee photonics 2024-03-03
Across
- Celebrated annually in the state of Kerala, this festival features traditional boat races and cultural performances.
- South Indian dessert made from rice, milk, sugar, and flavored with cardamom and nuts.
- Popular South Indian breakfast dish made from semolina, vegetables, and spices
Down
- South Indian film industry based in Chennai produces movies primarily in Tamil but also in other languages
- Located in Karnataka, this UNESCO World Heritage Site is known for its well-preserved ruins of ancient temples and monuments, including the iconic Stone Chariot
- South Indian state known as the "Land of Spices," famous for its rich cultural heritage and backwater networks
- Indian classical dance form known for its graceful movements and intricate footwork
7 Clues: Popular South Indian breakfast dish made from semolina, vegetables, and spices • Indian classical dance form known for its graceful movements and intricate footwork • South Indian dessert made from rice, milk, sugar, and flavored with cardamom and nuts. • ...
Internet layers crossword 2022-10-02
Across
- CSMA/CD uses this to ensure a WiFi device can only transmit when there is a free channel available
- a peer that downloads many files but does not make available any new content for the community as a whole
- a set of data that describes and gives information about other data
Down
- protocol used in peer-to-peer networks when sharing files between peers
- this is a central server that stores details about other computers that make up the swarm
- splitting up of a file when using peer-to-peer
- a peer that has downloaded a file (or pieces of a file) and has then made it available to other peers in the swarm
7 Clues: splitting up of a file when using peer-to-peer • a set of data that describes and gives information about other data • protocol used in peer-to-peer networks when sharing files between peers • this is a central server that stores details about other computers that make up the swarm • ...
Overview and Medical Environment 2023-08-15
Across
- CVO _________ a specific Healthcare Organization Handles Organization-Specific credentialing, bigger the system the more customers - part of a not-for-profit organization - may be for-profit and have customers outside of the organization
- More than 40 years - vision is to advance healthcare environment that maximizes patient experience- recognition for professionals
- __________Care, Medical Office/Surgical Center Structures vary widely depending on size
Down
- COV ________ Contracts with many outside organizations - typically for-profit company - must satisfy the accreditation requirements/needs of customers
- __________Environment consists of Board of Trustees - Medical Staff Executive Committee - Departments - Committees
- ___________ Collectively describe commercial third-party payers, healthcare networks and healthplans
- ___________ Consists of Directors - Contract/Sales - Credentialing Staff - Human Resources - Bus. Intel/IT/Data Analyst
7 Clues: __________Care, Medical Office/Surgical Center Structures vary widely depending on size • ___________ Collectively describe commercial third-party payers, healthcare networks and healthplans • __________Environment consists of Board of Trustees - Medical Staff Executive Committee - Departments - Committees • ...
Bilingual Speech Perception 2019-12-02
Across
- bilinguals, a similar degree of proficiency and behavioral performance
- system, each language represented in separate systems
- system, identical items are represented in a single underlying neural substrate common to both, but different items have own-language representations
- speech, systematic deviation of a particular native speech norm; Determined by phonetic differences and similarities between the native norm of the foreign-accented speaker and the native listener; Phonetically-based speech distortion
- bilinguals, L1 and L2 are used in different contexts
- context-specific selection of language norms; common in coordinated bilinguals
- Simultaneous, bilinguals exposed to L2 since a young age
Down
- Sequential, bilinguals exposed to L2 at an older age
- system, larger language system contains two subsystems
- bilinguals, unbalanced degree of proficiency and behavioral performance across language competences
- period, Back-frontal cortical development in infants
- switching, top-down controlled and can be modulated by language dominance. It is typically more effortful to switch back to the dominant language (L1)
- bilinguals, L1 and L2 share contextual frames
- of primary perceptual cues from the dominant language background; Very common in unbalanced early bilinguals and long-term immigrants
- system, undifferentiated representations
- Listeners adapt easily to accents
- of secondary perceptual cues; common in unbalanced late bilinguals
- local switching "my laptop no function"
- control, Bilinguals seem to recruit cognitive control networks associated with the processing of effortful speech and executive functioning
- switching, global switching across full language competences
20 Clues: Listeners adapt easily to accents • local switching "my laptop no function" • system, undifferentiated representations • bilinguals, L1 and L2 share contextual frames • Sequential, bilinguals exposed to L2 at an older age • period, Back-frontal cortical development in infants • bilinguals, L1 and L2 are used in different contexts • ...
Bilingual Speech Perception 2019-12-02
Across
- each language represented in separate systems
- Bilinguals seem to recruit cognitive control networks associated with the processing of effortful speech and executive functioning
- of primary perceptual cues from the dominant language background; Very common in unbalanced early bilinguals and long-term immigrants
- Listeners adapt easily to accents
- top-down controlled and can be modulated by language dominance. It is typically more effortful to switch back to the dominant language (L1)
- identical items are represented in a single underlying neural substrate common to both, but different items have own-language representations
- a similar degree of proficiency and behavioral performance
- L1 and L2 share contextual frames
- unbalanced degree of proficiency and behavioral performance across language competences
- larger language system contains two subsystems
- systematic deviation of a particular native speech norm; Determined by phonetic differences and similarities between the native norm of the foreign-accented speaker and the native listener; Phonetically-based speech distortion
- bidirectional influence between two or more language competences; a common characteristic of bilingual speech that is manifested in different ways
- context-specific selection of language norms; common in coordinated bilinguals
- bilinguals exposed to L2 at an older age
- of secondary perceptual cues; common in unbalanced late bilinguals
Down
- global switching across full language competences
- L1 and L2 are used in different contexts
- local switching "my laptop no function"
- bilinguals exposed to L2 since a young age
- undifferentiated representations
- Back-frontal cortical development in infants
21 Clues: undifferentiated representations • Listeners adapt easily to accents • L1 and L2 share contextual frames • local switching "my laptop no function" • L1 and L2 are used in different contexts • bilinguals exposed to L2 at an older age • bilinguals exposed to L2 since a young age • Back-frontal cortical development in infants • each language represented in separate systems • ...
Beneficial Vocabulary Crossword (no spaces) 2020-10-29
Across
- the ability for newer consoles to play old games
- Designed by the owner of the console
- games involving a unique set of cards
- a quick, involuntary movement
- a device designed to fairly give a random number
- entertaining devices that are not games
- a party where players connect to local networks to play games
- physical games
- a person's learning, problem solving, and reasoning ability
- the speed in which an individual can react
- the mental acclimatization to disturbing events
- how the body remembers how to react
- an activity in which players attempt to see who is best
- a setting in which a video game takes place
- some of humankind's first competitions
Down
- How well your body performs in tandem
- role playing game
- a board game with an elaborate environment
- the degree in which a player becomes involved in the game world
- an agreement to use the source code to develop games for a specific console
- the collection of all body movements
- the code used in game creation
- interacting with a group environment
- Skill or Ability at performing physical tasks
- an activity with rules, a win condition, and an environment
- games that require mental analysis and problem solving
- when players connect to games online
- read only memory
- a social phenomenon in which an individual does not interact with real life
- participation in entertaining activities
30 Clues: physical games • read only memory • role playing game • a quick, involuntary movement • the code used in game creation • how the body remembers how to react • Designed by the owner of the console • the collection of all body movements • interacting with a group environment • when players connect to games online • How well your body performs in tandem • ...
The Human Body Crossword by Eshitha 2020-06-11
Across
- Dioxide What gas is ruining our planet's atmosphere?
- The 8th element on the periodic table and the single most vital element to life
- A series of chemical reactions that breakdown food
- A set of rules, an arrangement of things, or a group of related things that work toward a common goal
- A chemical reaction that breaks down larger molecules
- system A system that helps you breath
- A process where particles move from an area of high concentration to an area of low concentration
- Blood vessels that have valves to prevent the blood flowing backwords
- Unwanted or unusable materials
Down
- system A system that circulate your blood and transports nutrients
- They do most of the work in cells and are required to make the body's tissues and organs
- cellular respiration something that occurs in every cell of almost every living thing.
- An organ that helps you breath
- usable food for green plants ;sugar
- The smallest unit of of life, the building blocks of life
- The power house of the cell
- Small blood vessels that form networks throughout the bodily tissues.
- A chemical reaction that builds large molecules
- It is an important part of a healthy diet and gives you energy.
- system A system that helps you breakdown the food you eat
- Blood vessels carries blood away from the heart and toward other tissues and organs
- The energy that runs the cells in our bodies.
- What makes up an ocean?
23 Clues: What makes up an ocean? • The power house of the cell • An organ that helps you breath • Unwanted or unusable materials • usable food for green plants ;sugar • system A system that helps you breath • The energy that runs the cells in our bodies. • A chemical reaction that builds large molecules • A series of chemical reactions that breakdown food • ...
Arshad and Mehdi Crossword challenge 2020-07-09
Across
- the intellectual and practical activity encompassing the systematic study of the structure and behaviour of the physical and natural world through observation and experiment.
- load (something, especially a gun that has been fired) again.
- is a unit prefix meaning "one billionth"
- a type of computer memory that can be accessed randomly;
- the recording, reproducing, or broadcasting of moving visual images
- copy (data) from one computer system to another, typically over the Internet.
- a group of binary digits or bits (usually eight) operated on as a unit
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program
- have a particular belief or idea.
- able to move quickly and easily.
- most famouse agile framework for developing
Down
- the administration of an organization
- facts and statistics collected together for reference or analysis.
- a collection of instructions that can be executed by a computer to perform a specific task
- scheduling system for lean manufacturing and just-in-time manufacturing
- is a finite sequence of well-defined
- an individual or collaborative enterprise that is carefully planned to achieve a particular aim
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- scripting language that is especially suited to web development
- a person responsible for controlling or administering an organization or group of staff
- forming an essential foundation or starting point; fundamental
21 Clues: able to move quickly and easily. • have a particular belief or idea. • is a finite sequence of well-defined • the administration of an organization • is a unit prefix meaning "one billionth" • most famouse agile framework for developing • a type of computer memory that can be accessed randomly; • load (something, especially a gun that has been fired) again. • ...
Chapter 17 Vocab 2021-10-28
Across
- Type of mining where vertical shafts are dug deep into the ground and networks of tunnels are dug
- A nuclear reaction where a heavy nucleus splits spontaneously and releases energy
- Formal term of a severe nuclear reactor accident that results in cor damage from overheating
- Energy source that is readily available or can be replaced easily
- Radioactive _____ material made from the use or reprocessing of nuclear fuel
- Energy that CANNOT be replaced easily/in a short period of time
- The ability to do work and/or cause a change
- Mining where layers of surface soil and rock are removed to expose a resource
- Deposit of loose sand or partially consolidated sandstone containing petroleum
- _____ energy is released during nuclear fission/fusion
Down
- Nuclear reaction in which atomic nuclei of low atomic number fuse to form a heavier nucleus
- Fine grained sedimentary rock from which oil can be extracted
- Chemicals obtained from petroleum and natural gas
- Energy ____ is when you reduce the amount of energy consumption by using less energy
- Energy produced by the flow and interaction of electrons
- Burning the chemical reaction when a fuel combines rapidly with oxygen
- The energy produced by motion
- The energy that an object has because of its position/shape
- Acid ____ refers to the overflow of acidic water from metal or coal mines
- How much of the energy put into a system actually does useful work
- Liquid mixture of hydrocarbons
21 Clues: The energy produced by motion • Liquid mixture of hydrocarbons • The ability to do work and/or cause a change • Chemicals obtained from petroleum and natural gas • _____ energy is released during nuclear fission/fusion • Energy produced by the flow and interaction of electrons • The energy that an object has because of its position/shape • ...
ICT chapter 3 & 4 Crossword 2021-12-01
Across
- Hardware device which have a number of devices or computer connected to them
- A type of disc which holds around 4.7GB and is non-volatile
- , Devices that store data in the form of magnetised dots
- , Devices that save data as pattern of dots which can be read by light
- Systems not very far away from each other geographically
- A type of disc which holds around 800MB of data and is non-volatile
- ‘Modulator demodulator’ is a device that converts a computer's digital signal into analogue signal
- , Files stored in a sequence which has to be searched through one by one
Down
- Gives the location of a device on the internet
- A short range wireless data transfer
- A serial access medium used for magnetic recordings
- Devices that connect a LAN to another LAN
- , Type of storage that ensures data is stored permanently so it can be used again at a later date
- Enable data packets to be routed between the different networks
- Receives information from a network via it's connection
- , Files which do not need to be searched through one by one
- A small device that connects to a computer and stores data
- A unique number that identifies a device connected to the internet
- A replacement of DVDs which hold 25-50GB
- They connect a number of devices or computers together to form a LAN but more efficient than hubs
20 Clues: A short range wireless data transfer • A replacement of DVDs which hold 25-50GB • Devices that connect a LAN to another LAN • Gives the location of a device on the internet • A serial access medium used for magnetic recordings • Receives information from a network via it's connection • , Devices that store data in the form of magnetised dots • ...
Respiratory System 2018-02-09
Across
- / each of a pair of serous membranes lining the thorax and enveloping the lungs
- / It affects voice modulation through expansion or contraction
- / the main muscle of respiration
- cartilage / the ring-shaped cartilage of the larynx
- / any of the minute branches into which a bronchus divides.
- / A fluid secreted by the cells of the alveoli
- / the drawing in of breath; inhalation.
- / a flap of cartilage at the root of the tongue, which is depressed during swallowing to cover the opening of the windpipe.
- / the membrane-lined cavity behind the nose and mouth, connecting them to the esophagus.
- / attached to the larynx and the esophagus
- / the hollow muscular organ forming an air passage to the lungs and holding the vocal cords in humans and other mammals; the voice box.
Down
- / any of the many tiny air sacs of the lungs which allow for rapid gaseous exchange.
- / are shell-shaped networks of bones, vessels, and tissue within the nasal passageways
- pleura / thin serous membrane tissue layer that sticks to the lung surface.
- cords / makes your voice
- / is a connective tissue found in many areas of the body
- / a large cartilage of the larynx, a projection of which forms the Adam's apple in humans.
- / exhalation of breath.
- / inflammation of the mucous membrane in the bronchial tubes.
- / the action of breathing.
- volume / The volume of air remaining in the lungs after a maximal expiratory effort.
- / connected to the oral cavity
- / attached to the nasal cavity
23 Clues: / exhalation of breath. • cords / makes your voice • / the action of breathing. • / connected to the oral cavity • / attached to the nasal cavity • / the main muscle of respiration • / the drawing in of breath; inhalation. • / attached to the larynx and the esophagus • / A fluid secreted by the cells of the alveoli • ...
ING2 New Technologies 2016-11-17
Across
- noun meaning "logiciels malveillants"
- It's easy to waste time when you __________ online.
- We debated whether MacOS or Linux was the better _______ _______.
- My battery is running low, I need to _____ _____ to the mains supply.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- "technologie de pointe" = _____ _____ _____ _____ technology.
- To send documents or programmes from your computer to a larger system using the internet.
- compound noun meaning "raccourci clavier"
- verb meaning "affecter"
- The conversion of data into a form that cannot be easily understood by unauthorized people.
Down
- compound noun meaning "bourrage papier"
- I saw a fabulous film last week entitled I Robot. Scientists built a robot modeled on the human brain. It is a great example of a _____ ______.
- When making copies, a great way to save paper is to do _____-______ printing.
- Darn! I can't print my report because the ______ ______ has run out.
- An area on the right side of the Taskbar on the Windows interface used to display the status of various functions, such as speaker volume and modem transmission.
- Trace and correct faults in a mechanical or electronic system
- You didn't get John's email? Don't worry, I'll _______ it to you.
- An image that shows the contents of a computer display
- All the lights have gone out. I think the fuse must have ______.
- ______ _______ to the bottom of the page and you'll see the FAQ link.
20 Clues: verb meaning "affecter" • noun meaning "logiciels malveillants" • compound noun meaning "bourrage papier" • compound noun meaning "raccourci clavier" • It's easy to waste time when you __________ online. • An image that shows the contents of a computer display • Trace and correct faults in a mechanical or electronic system • ...
DIGI CIT Vocab Words 2016-05-27
Across
- something that has some sort of risk/reward
- putting some out in the world that is yours
- never giving in and keeping a level head
- to have a change to do something
- changing something copyrighted especially music to add value
- Giant game where people play with/agaisnt eachother
- a compression using like or as
- some who you can bestow trust on
- peer to peer, network that allows sharing
- where someone can see another's web page, but doesn't comment
- to chart something
- an audio file of which you listen to
- be in a state where you can be hurt
- the taking of copyrighted material and selling it for profit
- a generalization about another person
- define how copyright is used
- when you use copyrighted material you must change it in a way and this is called ______
Down
- a thing that will take your money and value
- anybody can use w/o any punishment
- Not the right thing to do
- a short message text or pic
- is digitized content that can be transmitted over the internet or computer networks.
- give others inspiration and help their self-essteem
- unsuspected problem or danger
- directly coping someone else's work
- usaully news or something that can be seen by others on internet
- a slightly changed sence and used for comedy
- a plan that is somewhat sketchy
- Pictures, illustrations, symbols
- someone who says a comment that helps you
30 Clues: to chart something • Not the right thing to do • a short message text or pic • define how copyright is used • unsuspected problem or danger • a compression using like or as • a plan that is somewhat sketchy • to have a change to do something • some who you can bestow trust on • Pictures, illustrations, symbols • anybody can use w/o any punishment • ...
Ascend 2016-01-17
Across
- Most customer loyalty is attributed to the customer’s ___ experience
- The size of sales reps’ networks on ___ correlates with exceeding quotas
- One reason why scientists don’t default to NGS over dPCR
- The college classmate with whom Gajus cofounded Fluidigm
- According to the Challenger sales model, it’s the biggest sales asset
- Fluidigm brand positioning aims to ___ the complex
- This Fluidigm system uses big panels to resolve single-cell heterogeneity
- cell Key Callisto customers’ genomics specialization
- Most frequently cited type of protein studied using CyTOF
- The elastomeric rubber material used to produce IFCs
- One of the two primary target markets for Polaris
- CyTOF technology tags antibodies with isotopes made of ___
Down
- This valve is the foundation of Fluidigm the IFC
- Juno targets 96 SNPs for this
- Our company mission statement is to empower and ___ customers
- A genuine ___ involves contraction of muscles at the corners of the mouth, and also around the eyes forming crow’s feet
- What punctuation usage should be avoided with the Fluidigm name
- Juno sequences up to 5,000 DNA variants for this functionality
- The first instrument in the marketplace for digital PCR
- The most popular research area where mass cytometry is currently used
- Engineers in the 1970s discovered how technical principles behind the ___ industry could be applied to liquids in life sciences
- Research shows that people retain nearly 40% less information when their arms and legs are ___
- The segment of C1, Callisto and Juno researchers who are Biomark prospects
23 Clues: Juno targets 96 SNPs for this • This valve is the foundation of Fluidigm the IFC • One of the two primary target markets for Polaris • Fluidigm brand positioning aims to ___ the complex • cell Key Callisto customers’ genomics specialization • The elastomeric rubber material used to produce IFCs • The first instrument in the marketplace for digital PCR • ...
Awesome Geosome 2 2013-06-28
Across
- _____ activity cycle was discovered through the study of sunspots.
- Natural gas requires _____ treatment plants to process.
- An example of insect-borne disease.
- An international convention that is set up with the goal of reducing levels of greenhouse gases in the atmosphere.
- What is the geographical name of the greenhouse effect that poses negative impacts in the atmosphere?
- An example of halocarbons, which is a greenhouse gas.
- Burning fossil fuels produces a large amount of energy that is _____ for human activities.
- North and central America, Europe and Asia are countries that emit the largest carbon dioxide from ____ processes.
- _____ factors causes the concentration of greenhouse gases in the atmosphere to increase.
- Public transport in cities often requires _____ infrastructure such as road networks and comprehensive bus feeder system.
- Warmed surface of the earth _____ longwave radiation to the atmosphere.
- A practice that has contributed to the increase of greenhouse gases in the atmosphere.
- Countries are contributing more to global carbon dioxide emission due to their _____ industrialization.
Down
- A severe and rare weather _____ will results in significant economic losses and the loss of lives.
- An increasing number of people living in urban areas.
- using less energy to provide same service.
- Efforts made to reduce energy consumption.
- X-rays, microwaves and radio waves are example of ______ radiation.
- Global _____ occurs when the dust and ash particles reflect solar energy back into space.
- _____ second largest contributor of greenhouse gases.
20 Clues: An example of insect-borne disease. • using less energy to provide same service. • Efforts made to reduce energy consumption. • An increasing number of people living in urban areas. • An example of halocarbons, which is a greenhouse gas. • _____ second largest contributor of greenhouse gases. • Natural gas requires _____ treatment plants to process. • ...
Space Communications and Navigation 2014-02-21
Across
- Internship at NASA's Glenn Research Center
- What space clocks currently utilize
- Services that GNSS constellations provide
- Number of missions supported by SCaN
- Enhancing the Deep Space Network
- Implement flexible capabilities that meet diverse NASA mission needs
- Reconfigured antenna used by students
- Investing in small businesses
- Programmable radios
- Space Communications and Navigation
- Designating portions of spectrum
- Element used in new space clocks; also a planet
- Pursuing the implementation of data standards results in
- First successful test of Disruption Tolerant Networking
- Grant with the university and Near Earth Network antenna
- Russian radionavigation system
- Reconfigured antenna used for teaching purposes
- Network with a ground segment and space segment
Down
- Studying the future of relay communications
- Demonstrated 622 megabits per second downlink from the Moon
- Develop space communication and navigation network of the future
- Number of NASA communication networks
- Type of spectrum
- Type of spectrum that utilizes light to transmit information
- Something that can interrupt a laser
- Space segment of the Space Network
- Regulates interstate and international communications
- Network with the big antennas
- Type of engineering that looks at the big picture
- First long-term period optical communication project
- Play a game and become the network manager
- What level is your technology
- United States space-based radionavigation system
- Network with NASA-owned and commercial stations
- Assigns frequencies and approves the spectrum needs of new systems
35 Clues: Type of spectrum • Programmable radios • Network with the big antennas • Investing in small businesses • What level is your technology • Russian radionavigation system • Enhancing the Deep Space Network • Designating portions of spectrum • Space segment of the Space Network • What space clocks currently utilize • Space Communications and Navigation • ...
Data Communications 2015-04-21
Across
- IP ___________ is where I am located
- pulses change width according to amplitude of analog signal
- wireless network for short
- device that connects multiple nodes without routing ability
- boost and reshapes a signal along a long telcom link
- a device that interfaces between two LANs with different protocols
- the computer on the network that runs the LAN and determines how the system operates
- the processing of altering signals by digital computing methods such as filtering and compression
- two wires that are intertwined
- electronic equipment connected as a node on the network that performs bidirectional communication between two LANs
- name associated with the conversion from time domain to frequency domain
Down
- pulses change amplitude according to the amplitude of analog signal
- the software that makes it possible to navigate and explore the Web and to access and display information
- pulses change position according to the amplitude of analog signal
- software that monitors all incoming data and establishes organization guidelines
- a type of code consisting of patterns of 0s and 1s
- the process of encoding data in such a way as to obscure its meaning and content
- device that intelligently directs traffic between networks
- topology where nodes are connected like spokes of a wheel
- device that intelligently delivers packets to appropriate nodes
- one of more incorrect bits in a transmission
- topology in which all the nodes in a LAN are connected to a common cable
22 Clues: wireless network for short • two wires that are intertwined • IP ___________ is where I am located • one of more incorrect bits in a transmission • a type of code consisting of patterns of 0s and 1s • boost and reshapes a signal along a long telcom link • topology where nodes are connected like spokes of a wheel • ...
The World of Internet 2015-04-18
Across
- A code or program which damages or destroys computers.
- This allows computers and smartphones to connect to the Internet wirelessly within a particular area.
- It means Uniform Resource Locator
- Also called the electronic mail wherein you can send and receive message in an instant.
- It means Read-only memory
- A device used to manipulate information and is programmable.
- A super highway network that connects smaller networks.
- A person who illegally opens or have access to other people’s computers or accounts.
- It means Local Area Network
- An acronym which means Hyper Text Markup Language.
- It is a group of two or more computer systems linked together.
- One of the most common format of picture in the internet.
Down
- A device connecting one local area network to another.
- Wide Web Has the acronym of www which often refers to the internet.
- Response test usually letters and numbers that shows if the user is human or not.
- The founder is Steve Jobs that is a multinational corporation that sells devices, softwares and has online services.
- A device that connects a computer to a phone line.allowing a computer to talk to other computers through the phone system.
- Harassing or threatening the young through the use of the internet.
- It means Random Access Memory which makes up of memory modules.
- program that is used to look at various kinds of Internet resources. (Example is Mozilla Firefox)
20 Clues: It means Read-only memory • It means Local Area Network • It means Uniform Resource Locator • An acronym which means Hyper Text Markup Language. • A code or program which damages or destroys computers. • A device connecting one local area network to another. • A super highway network that connects smaller networks. • ...
Lesson 27 Vocabulary 2015-05-06
Across
- software applications that can be accessed in a Web browser
- first graphical browser
- controls how Web pages are formatted or displayed
- publishing files to the Internet that can be streamed or downloaded
- name that identifies a web site or computer on the Internet
- format designed to syndicate news articles online
- small text filecreated by some Web pages when visiting that store information such as preferences
- Web site that features useful information and links
- temporary storage area for collecting data
- allows computers to download and upload files on the internet
- collection of related HTML Web pages on the Web
- numerical addressing system that uniquely identifies computers and networks linked to the Internet
- electronic document similar to an ID card
- when a piece of data matches your search words
- collective Web site tthat can be edited by anyone
Down
- first page that is displayed when a browser is launched
- managing the security of message transmissions on the Internet
- defines how messages are formatted and transmitted over the Web
- address that tells the browser where to locate a Web paage
- Web sites where users can modify the content
- computer that uses services of another program
- online community that provides interaction for groups of people
- set of rules for Windows that controls applications that are downloaded from the Internet and run in a browser
- changes imagery of Earth into valuable information
24 Clues: first graphical browser • electronic document similar to an ID card • temporary storage area for collecting data • Web sites where users can modify the content • computer that uses services of another program • when a piece of data matches your search words • collection of related HTML Web pages on the Web • controls how Web pages are formatted or displayed • ...
Chapter 19 2015-02-06
Across
- image of what a person thinks something should be
- communication used to inform, persuade, and entertain other people
- provide info about people, events, or relationships
- a system that uses technical means to transmit information from one place to another
- to amuse people as they participate in or observe events
- to send a message from one place to another
- end of a communication channel that gathers and decodes a message
- to convince people to act in a certain way
- interconnected networks of computers that share information
- communication computer controlled operations use
- unwanted sounds or signals that are mixed with desired info
Down
- the unorganized facts and figures collected by people and machines
- communication that starts, changes, or ends a machines operation
- arranged data for human use
- feelings that can be communicated
- system that prepares and reproduces engineering drawings and technical illustrations
- changing a message into a format that can be transmitted
- used to display machine operating conditions
- communication that uses technology to communicate through a printed medium
- using photos to communicate an idea
- info learned and applied to a task
- anything that impairs the accurate communication of a message
- to change coded info back into a recognizable form
- a carrier
- providing information in an entertaining way
- creating a situation in which people want to gain info
- communication that depends on electromagnetic waves to carry a message
27 Clues: a carrier • arranged data for human use • feelings that can be communicated • info learned and applied to a task • using photos to communicate an idea • to convince people to act in a certain way • to send a message from one place to another • used to display machine operating conditions • providing information in an entertaining way • ...
Programming 2015-01-21
Across
- World Wide Web
- Movie that has to do with hacking and black coated people.
- A quantity or amount.
- Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
- Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
- The programs and other operating information used by a computer.
- Console that has access to the internet.
- A process that leads from an original formulation of a computing problem to executable computer programs.
- Software framework developed by Microsoft that runs primarily on Microsoft Windows.
- The person's first name who made this crossword.
- IDE and RAD tool written in wxWidgets.
Down
- A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Built the .net framework.
- A notation resembling a simplified programming language, used in program design.
- Code which contains numbers like 1's and 0's.
- A type of software that allows you to perform specific tasks.
- American Standard Code for Information Interchange.
- A list of instructions that tell a computer what to do.
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
20 Clues: World Wide Web • A quantity or amount. • Built the .net framework. • IDE and RAD tool written in wxWidgets. • Console that has access to the internet. • Code which contains numbers like 1's and 0's. • The person's first name who made this crossword. • American Standard Code for Information Interchange. • A list of instructions that tell a computer what to do. • ...
Programming 2015-01-21
Across
- The person's first name who made this crossword.
- Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
- A list of instructions that tell a computer what to do.
- Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
- Software framework developed by Microsoft that runs primarily on Microsoft Windows.
- Movie that has to do with hacking and black coated people.
- The programs and other operating information used by a computer.
- A process that leads from an original formulation of a computing problem to executable computer programs.
- A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
- Console that has access to the internet.
- Code which contains numbers like 1's and 0's.
- A quantity or amount.
Down
- IDE and RAD tool written in wxWidgets.
- A type of software that allows you to perform specific tasks.
- A notation resembling a simplified programming language, used in program design.
- Built the .net framework.
- World Wide Web
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
- American Standard Code for Information Interchange.
20 Clues: World Wide Web • A quantity or amount. • Built the .net framework. • IDE and RAD tool written in wxWidgets. • Console that has access to the internet. • Code which contains numbers like 1's and 0's. • The person's first name who made this crossword. • American Standard Code for Information Interchange. • A list of instructions that tell a computer what to do. • ...
Internet Communication Technology Crossword 2014-03-20
Across
- Name using to connect to programs, web side or game
- Name of a picture what can be used for presentation and logos
- Wireless connection to internet
- program what allows you to go on the internet
- Program what keeps your computer secure from viruses
- Displays view from computer
- Command/program what deletes all files from memory device
- How to transfer files from the internet
- name of a cable what transfers local area networks (LAN)
- Name of a card what add extra memory to mobile devices
- Style of a text
- default windows program what allows us to write notes
- Unit smaller than megabyte
- Sprite what represents mouse on the monitor
- Language/program what is used to operate, make or active a game or program – Java
Down
- The most hated computer virus
- Program that could damage your computer
- Link what is going to send you into another web side
- computer from Apple Company
- Combination of letters what allow us to connect to program, web side or game
- Name of the most popular operating system
- Picture what change look of a file
- Movement of the sprite
- Wireless technology what allows to send files to another device near you
- These are little squares, hard visible on HD multimedia pixels
- Name of icon what takes you to main menu
- Bar with tools
- place where you can talk/ write to other users
28 Clues: Bar with tools • Style of a text • Movement of the sprite • Unit smaller than megabyte • computer from Apple Company • Displays view from computer • The most hated computer virus • Wireless connection to internet • Picture what change look of a file • Program that could damage your computer • How to transfer files from the internet • Name of icon what takes you to main menu • ...
Library Media Words - Volume 1 2014-04-16
Across
- raw information or facts about something that can be used in calculating, reasoning, or planning
- relating to or connected to a computer or telecommunications system (as the Internet)
- something told or written that is not fact or a made-up story
- use as sources of information
- a popular search engine and free apps service
- a set of sheets of paper bound together
- a programmable usually electronic machine that can store, get back again, and work with data
- data which has been recorded, classified, organized, related, or interpreted within a framework so that meaning emerges
- the application of information or something learned
- a system for sending messages between computers
- not made or coming from something else or firsthand
Down
- a person or a publication that supplies information
- topics that are more specific
- a communications system that connects computers and computer networks all over the world
- literature or cinema that is not fictional
- something (as a picture, chart, or film) that appeals to the sight
- supply secondhand information
- topics that are too broad, less specific
- published at regular intervals, such as weekly, monthly
- a means of communication and source of information
- a digital book
- a history of a person's life
- a place that provides information or ideas to everyone in many material formats such as books, magazines, etc.
- characterized by electronic and computerized technology
- the sending, receiving, or reproducing of sound
25 Clues: a digital book • a history of a person's life • topics that are more specific • use as sources of information • supply secondhand information • a set of sheets of paper bound together • topics that are too broad, less specific • literature or cinema that is not fictional • a popular search engine and free apps service • a system for sending messages between computers • ...
Library Media Words - Volume 1 2014-04-16
Across
- a set of sheets of paper bound together
- supply secondhand information
- data which has been recorded, classified, organized, related, or interpreted within a framework so that meaning emerges
- a digital book
- something told or written that is not fact or a made-up story
- characterized by electronic and computerized technology
- use as sources of information
- a communications system that connects computers and computer networks all over the world
- not made or coming from something else or firsthand
- topics that are more specific
- a means of communication and source of information
- raw information or facts about something that can be used in calculating, reasoning, or planning
Down
- the application of information or something learned
- a popular search engine and free apps service
- published at regular intervals, such as weekly, monthly
- a person or a publication that supplies information
- a programmable usually electronic machine that can store, get back again, and work with data
- literature or cinema that is not fictional
- a history of a person's life
- topics that are too broad, less specific
- a place that provides information or ideas to everyone in many material formats such as books, magazines, etc.
- something (as a picture, chart, or film) that appeals to the sight
- relating to or connected to a computer or telecommunications system (as the Internet)
- the sending, receiving, or reproducing of sound
- a system for sending messages between computers
25 Clues: a digital book • a history of a person's life • supply secondhand information • use as sources of information • topics that are more specific • a set of sheets of paper bound together • topics that are too broad, less specific • literature or cinema that is not fictional • a popular search engine and free apps service • the sending, receiving, or reproducing of sound • ...
Lesson 24 Vocab 2016-04-18
Across
- convert analog signals to digital vice versa
- a small simple inexpensive device that joins multiple computers together
- allows specific users outside the organization to access all internal information systems
- supports telephone service and is in the world's collection of interconnected commercial and government-owned voice-oriented systems
- describes a software architectural model relationship
- a recent wireless technology that can deliver maximum speed of up tp 7 Mbps to your phone, computer, or car
- hardware that can be one of many types of servers
- shows resources such as the printer, programs, and other hardware
- examines a fingerprint, a voice pattern, or the iris or retina of an eye
- all computers are equal
Down
- provides connection speeds more that 30 times faster than dial-up connections
- can include telephone systems, fiber optics, microwaves, or any combination of these
- internet connection technology that provides for the transfer of information to a computer
- uses coaxial cable to send and receive data
- people who break into computer systems to steal services and information
- high end programs designed to provide network control and include special functions for connection computers and other devices into a network
- fiber optic telephone line that can transmit up to 1.544 megabits per second
- a variation of the lan that uses to physical wires
- designed for people within the organization
- worldwide system composed of thousands of smaller networks
- software program such as internet explorer
- connects wans and lans
22 Clues: connects wans and lans • all computers are equal • software program such as internet explorer • uses coaxial cable to send and receive data • designed for people within the organization • convert analog signals to digital vice versa • hardware that can be one of many types of servers • a variation of the lan that uses to physical wires • ...
Geography crossword puzzle 2022-07-04
Across
- What is a physical area on the Earth’ surface called?
- What is the movement of people from rural to urban areas called?
- What is the area of the earth’s surface that holds special meaning for people?
- What job opportunities are called?
- What is a physical area on the earth’s surface called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment that has not been affected by people?
- Refers to our surroundings and can either be physical or human.
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
Down
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- Refers to surface runoff that results from melting snow.
- What are the disadvantages of going to a city called?
- What is the increase in the proportion of people living in urban areas called?
- What is poor air quality affecting half the world’s urban population called?
- Consist of living and non-living things that are found naturally.
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is a built up area called?
- What is the number of people living in a unit area of land called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
22 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • Refers to surface runoff that results from melting snow. • ...
Cardiovascular System - Abigail Granado 2024-03-22
Across
- Pumps blood through the system
- A fibroserous sac that encloses the heart
- Prevent the back flow of blood between chambers between R atrium and ventricle
- Chest
- Localized balloon like dilation of a blood vessel usually an artery
- Procedure in which controlled electrical shocks are sent through the heart to restore normal cardiac rhythm
- Abnormal heartbeats that disrupt the regular ventricular rhythm of the heart
- Pulse
- condition in which the atria beat more rapidly than the ventricles, causing quivering movement
- Narrowing of the coronary arteries, resulting in a insufficient blood supply to the heart
- Test Procedure that tests how efficiently the heart pumps blood
- Inflammation of the inner larger of the heart muscle
- Tissue death in the heart muscle resulting from an obstructed artery
- Reads your hearts electrical impulses
- Disease resulting from reduced blood flow from the heart
- A radiograph test that uses a contrast agent and a camera to take pictures of the blood flow in arteries
Down
- instrument to measure pressure
- surgical opening
- Procedure to stop atrial or ventricular fibrillation
- Vessels that deliver blood to tissues
- Narrowing;Tightening
- Mass of solid, liquid or gas that travels through the blood stream
- Networks of small vessels that perfuse tissue
- A surgical procedure in which plaque is removed from the lining of an artery
- Raid spontaneous contractions of the muscle fibers in the atria or ventricles
25 Clues: Chest • Pulse • surgical opening • Narrowing;Tightening • instrument to measure pressure • Pumps blood through the system • Vessels that deliver blood to tissues • Reads your hearts electrical impulses • A fibroserous sac that encloses the heart • Networks of small vessels that perfuse tissue • Procedure to stop atrial or ventricular fibrillation • ...
Networking Crossword 2024-06-13
Across
- What "URL" stands for (no space).
- What "UTP" stands for (no space).
- Specific address assigned to a device (no space).
- Maximum rate of which data can be transferred. Measured by bitrate.
- 1000 of these form a kilobyte.
- The type of connector that is used by a UTP.
- The time it takes for data to travel from sender to receiver.
- 1000 of these form a gigabyte.
- What the internet was modeled after.
- 1000 of these form a megabyte.
- What "www" stands for (no space).
- 1000 of these form a terabyte.
Down
- Follows hyperlinks in webpages to create a search index.
- Sends data using radio waves.
- The number of people that own the internet.
- The ranking system used by Google (no space).
- The part of a motherboard a fiber optic cable is plugged into.
- 8 of these form a byte.
- What "ISP" stands for (no space).
- The thing that every URL starts with (and what it stands for)(no space).
- The number of bits transferred per second.
- Is used for wireless connections. Also found within this classroom. (no space.)
- Can connect multiple devices in the same location.
- A top level domain name used for websites trying to make money (period included).
- Sends a signal to every computer on a local area network. Considered old and obsolete.
- A collection of local area networks.
- Can send a signal to a specific computer connected on a local area network.
27 Clues: 8 of these form a byte. • Sends data using radio waves. • 1000 of these form a kilobyte. • 1000 of these form a gigabyte. • 1000 of these form a megabyte. • 1000 of these form a terabyte. • What "URL" stands for (no space). • What "UTP" stands for (no space). • What "ISP" stands for (no space). • What "www" stands for (no space). • What the internet was modeled after. • ...
Networking Crossword 2024-06-13
Across
- Sends a signal to every computer on a local area network. Considered old and obsolete.
- Specific address assigned to a device (no space).
- What "www" stands for (no space).
- 8 of these form a byte.
- 1000 of these form a megabyte.
- What "ISP" stands for (no space).
- Maximum rate of which data can be transferred. Measured by bitrate.
- Is used for wireless connections. Also found within this classroom. (no space.)
- The time it takes for data to travel from sender to receiver.
- What the internet was modeled after.
- A collection of local area networks.
- The thing that every URL starts with (and what it stands for)(no space).
Down
- 1000 of these form a terabyte.
- What "UTP" stands for (no space).
- 1000 of these form a gigabyte.
- 1000 of these form a kilobyte.
- The number of bits transferred per second.
- The part of a motherboard a fiber optic cable is plugged into.
- What "URL" stands for (no space).
- Can connect multiple devices in the same location.
- The ranking system used by Google (no space).
- The type of connector that is used by a UTP.
- Follows hyperlinks in webpages to create a search index.
- Can send a signal to a specific computer connected on a local area network.
- The number of people that own the internet.
- Sends data using radio waves.
- A top level domain name used for websites trying to make money (period included).
27 Clues: 8 of these form a byte. • Sends data using radio waves. • 1000 of these form a terabyte. • 1000 of these form a gigabyte. • 1000 of these form a kilobyte. • 1000 of these form a megabyte. • What "UTP" stands for (no space). • What "www" stands for (no space). • What "ISP" stands for (no space). • What "URL" stands for (no space). • What the internet was modeled after. • ...
Figma Crossword 2024-07-25
Across
- an area of the canvas to create your designs in
- an app's or website's navigational structure
- creating a consistent, efficient, and scalable way of working across your entire design project.
- create your own vector networks from scratch
- create interactive flows that explore how a user may interact with your designs
- creating or selecting a system of typefaces and fonts to express the written word
- the gradual transition between colors
- filler and/or placeholder text in designs
Down
- blueprint of your website or application
- reusable object in your designs
- stored values that represent design attributes or saved states
- the practice of designing products and services for users of various abilities
- arrange layers on the canvas in relation to one another
- a set of related web pages located under a single domain name, typically produced by a single person or organization
- a personalized fictional character created to represent a user type that might use a site, brand, or product in a similar way
- share designs with others, move content between tools, or save copies of your work outside of Figma
- create designs that grow to fill or shrink to fit, and reflow as their contents change
- aligning objects within a frame
- A visual collaborative whiteboard by Figma where teams can diagram, brainstorm, and organize ideas together
- controls the empty or white space between the boundary of an auto layout frame and the frame's child objects
20 Clues: reusable object in your designs • aligning objects within a frame • the gradual transition between colors • blueprint of your website or application • filler and/or placeholder text in designs • an app's or website's navigational structure • create your own vector networks from scratch • an area of the canvas to create your designs in • ...
Artificial Intelligence 2023-07-13
Across
- Isaac Asimov's collection of short stories about robots
- Field of study that focuses on teaching machines to understand and interpret human language
- AI technique for training agents to interact with a virtual environment
- Tony Stark's AI assistant in Iron Man comics
- Area of AI that focuses on visual perception and understanding
- Movie in which Scarlett Johansson voices an AI
- AI technique inspired by the structure and function of the human brain
- AI algorithm that uses a reward system to learn optimal behavior
- Measure of uncertainty in a random variable
- AI technique that involves breaking down a problem into smaller subproblems
- AI algorithm inspired by the behavior of ants, bees, and other social insects
- Statistical measure of how well a model performs
- Machine learning technique that mimics human learning
Down
- AI algorithm that learns from past experiences
- Neural network layer that connects every neuron to every other neuron
- AI system that performs tasks without explicit instructions
- Video game featuring an AI character named GlaDOS
- AI technique for clustering similar data points together
- Method for reducing the dimensions of a dataset
- Mathematical function that maps inputs to outputs in a neural network
- Framework for deep learning developed by Google
- Popular open-source machine learning library
- Android officer from Star Trek: The Next Generation
- Term for humans blended with robots
- Common activation function used in neural networks
- Subset of AI that deals with understanding and generating human language
26 Clues: Term for humans blended with robots • Measure of uncertainty in a random variable • Tony Stark's AI assistant in Iron Man comics • Popular open-source machine learning library • AI algorithm that learns from past experiences • Movie in which Scarlett Johansson voices an AI • Method for reducing the dimensions of a dataset • ...
Operational Crossword 2022-12-12
Across
- used to identify high risk, red flags and/or fraudulent activity on accounts opened within a certain time frame
- system that allows electronic submission of documents to backoffice for maintenance and review
- a document used to authenticate a client
- in compliance or good standing
- electronic transmission of funds
- business continuity plan
- expedited funds availability act
- manual testing of banks communication and monitoring
- intentional act or failure to act that causes or creates a risk or harm to an older adult
- balance manipulation of totals to show cashbox in balance
- currency transaction report
- minimizing of loss and risk by detailing accountabilities and providing consistent expectations across the footprint
- tool used to navigate how we manage our workforce
Down
- reflection of outages via spreadsheet of all cash handling associates
- protection of personnel,hardware,software,networks and data from actions or events that could cause serious harm or damage
- inquires or examines fraudulent activity to ensure policy-procedure is being followed
- Intentionally false and meant to harm or deceive
- verification of deposit items received from financials centers
- an illegal copy of a document
- a surprise or random count to prevent internal fraud, identify counting errors and protect the banks assets
- description of the emotional,physical and/or financial impact suffered due to the result of a crime
- image replacement document
- teller cash recycler
- secure container used to store valuables
- imitation of something
25 Clues: teller cash recycler • imitation of something • business continuity plan • image replacement document • currency transaction report • an illegal copy of a document • in compliance or good standing • electronic transmission of funds • expedited funds availability act • a document used to authenticate a client • secure container used to store valuables • ...
The Alpha Wireless Christmas Crossword 2022-12-13
Across
- The SI unit of frequency, equal to one cycle per second (5)
- One of our US customers (6)
- The 'blue lions' bridge stadium featuring Alpha Antennas (8)
- Passive Intermodulation (3)
- When something is hidden for aesthetic purposes (11)
- One of our Irish customers (7)
- One of our key values in how we treat each other (5)
- A round or cylindrical container (8)
- What we make, plural (8)
Down
- Changing the way wireless networks are built (6)
- Work together to grow a ... business (11)
- Where to go to find information about each product (9)
- The short form of describing a non-conductive material with conductive lines printed or etched on it (3)
- Developing a particular skill to a desired standard by instruction and practice (8)
- The AW3871 is an example of this type of antenna
- An arc of the horizon measured between a fixed point (such as true north) and the vertical circle passing through the center of an object usually in astronomy and navigation clockwise from the north point through 360 degrees (7)
- The flat shape of some of our products (5)
- Think differently, encourage.... (10)
- The location of our team in the southern hemisphere (9)
- We value when we do this constructively (9)
- The condition of being protected from or unlikely to cause danger, risk, or injury (6)
- A plan or drawing produced to show the look and function of an object before it is made (6)
22 Clues: What we make, plural (8) • One of our US customers (6) • Passive Intermodulation (3) • One of our Irish customers (7) • A round or cylindrical container (8) • Think differently, encourage.... (10) • Work together to grow a ... business (11) • The flat shape of some of our products (5) • We value when we do this constructively (9) • ...
Tech Terms 2022-05-10
Across
- Scenes and objects appear real
- Portable document format
- An example of a browser
- Website contains personal reflections
- An input device
- Copying data from a computer to another
- Creations of the mind
- Data that could identitfy an individual
- Monitors incoming/outcoming network traffic
- Directs the processing of programs
- Storage unit of roughly one million bytes
- Shutting down and restarting
- Modulates and demodulates electrical signals
- Piece of data stored and retrieved later
- An example of a search engine
- Stands for central processing unit
- Disrupt, damage, or gain unauthorized access
- Technology for connecting devices in area
Down
- You can't touch it
- Data is stored as the processor needs it
- An output device
- Securing digital data using mathematical techniques
- Hardware that stores digital content
- A group of bits operated on as a unit
- Language understood by computers
- An address to a website
- Most basic unit of information in computing
- Translates domain names to IP addresses
- Hypertext markup language
- Memory chip containing permanent data
- Numbers identifies any device on a network
- Way to backup info on a computer
- Network connects computers all around
- You can touch it
- Software that is released under a license
- Acts as platform to enable applications to run
- Ties computer components together
- Passes info between computer networks
- The world wide web
39 Clues: An input device • An output device • You can touch it • You can't touch it • The world wide web • Creations of the mind • An example of a browser • An address to a website • Portable document format • Hypertext markup language • Shutting down and restarting • An example of a search engine • Scenes and objects appear real • Language understood by computers • Way to backup info on a computer • ...
Computer Fundamentals 2024-09-25
Across
- The smallest unit of data in computing, a 1 or 0.
- The end of a filename that indicates its format.
- Devoted to processing data for rendering images and video.
- A small electronic component used to switch signals (1 or 0) in a computer.
- A device that absorbs and dissipates heat from electronic components.
- A storage device with no moving parts.
- A device that manages data between computer networks.
- The "beat" of a CPU that determines how fast it processes instructions.
- The language computers use, consisting of 1s and 0s.
- Volatile memory used by a computer to store data temporarily.
- A unit of frequency, equal to one cycle per second.
Down
- A 3 Gigahertz CPU has 3 _____ clock cycles per second.
- A wireless technology for exchanging data over short distances.
- Data or commands entered into a computer.
- A type of memory that retains data even without power.
- A group of 8 bits, used to store a single character.
- Our computer lab is an example of this type of network.
- A computer that provides data to other computers in a network.
- A measurement meaning one-billionth, often used in technology.
- The main circuit board of a computer that holds essential components.
- The material used in transistors that allows them to switch between on and off states.
- A component that stores and releases electrical energy.
- A format for storing high quality audio on PCs.
23 Clues: A storage device with no moving parts. • Data or commands entered into a computer. • A format for storing high quality audio on PCs. • The end of a filename that indicates its format. • The smallest unit of data in computing, a 1 or 0. • A unit of frequency, equal to one cycle per second. • A group of 8 bits, used to store a single character. • ...
Chapter 4 IT246 2025-03-24
Across
- A grouping of numbers separated by a dot and is an 8 bit-value that ranges from 0-255
- Acronym for File Transfer Protocol
- is one or more IP addresses excluded from the IP address scope.
- An IP address tied to a specific MAC address
- Is connection less and designed for small amounts of data.
- It is where PC’s and other devices store learned IP address-MAC address pairs.
- It is used to specify a destination and the source of the Application-layer protocols.
- Is designed for transfer of information in complex networks.
- Is used to connect to a device across a network via a command-line interface. (Hint: starts with a T)
Down
- Acronym for Address Resolution Protocol
- When a SYN-ACK segment is returned, the client completes a what?
- Prevents a destination from becoming overwhelmed by data, which results in dropped packets.
- Is when the protocols for the internetwork layer is only focused on one packet at a time.
- Is used to speed up communication for DNS clients and they maintain a DNS cache, it is called?
- Is when data is contained in a zone.
- Acronym for Internet Control Message Protocol
- Similar to the Cyclic redundancy check but to protect data integrity.
- Allows computers and other devices to contact their primary DNS server.
- Is a database of hostname and IP address pairs.
- It is when there is a set of rules and procedures for communication and behavior or etiquette.
20 Clues: Acronym for File Transfer Protocol • Is when data is contained in a zone. • Acronym for Address Resolution Protocol • An IP address tied to a specific MAC address • Acronym for Internet Control Message Protocol • Is a database of hostname and IP address pairs. • Is connection less and designed for small amounts of data. • ...
Year 11 GCSE 2025-05-01
Across
- A network that covers a large geographical area
- Hardware and software that together form a system
- A number system using only the digits 0 and 1
- A type of software that helps maintain or enhance the computer system
- A legal framework governing the use and storage of personal data
- A method of reducing the amount of data required to store a file
- A type of network where all devices are connected to a central hub or switch
- A table showing the output of a logic gate or circuit for all possible inputs
- The part of the CPU that performs arithmetic and logical operations
- A collection of organised data
- A type of cyber threat that attempts to trick users into revealing sensitive information
- The number of bits used to represent the colour of a single pixel
Down
- A type of network that connects devices within a limited geographical area
- Software that performs tasks for the user
- A security method that restricts access to a network based on physical address
- A global network of interconnected computer networks
- A security method that uses mathematical algorithms to scramble data
- A measure of the number of samples taken per second when digitising sound
- The main circuit board of a computer
- Software that controls and manages the computer hardware and provides a platform for application software
- Temporary storage for frequently accessed data or instructions
- The component of a computer that carries out instructions
22 Clues: A collection of organised data • The main circuit board of a computer • Software that performs tasks for the user • A number system using only the digits 0 and 1 • A network that covers a large geographical area • Hardware and software that together form a system • A global network of interconnected computer networks • ...
Crossword on unit 5 2025-04-29
Across
- – Library for image processing and computer vision tasks.
- – Advantage of AI reducing human errors.
- – Predictive analytics output in business intelligence.
- – AI-generated realistic fake videos.
- – Fundamental units in neural networks.
- – Statistical visualization library built on top of Matplotlib.
- – Method used in ChatGPT to fine-tune responses.
- – Ethical concern in AI regarding fairness.
- – Refers to Gemini’s capability to handle various data types.
- – Healthcare use case of AI for detecting disease.
- – Creating charts and graphs with AI tools like Seaborn.
- – Google’s multimodal AI model supporting text, images, audio, and video.
- – AI-powered software that responds to voice or text commands.
- – Critical area in AI development involving responsible use.
- – AI tool used for content generation and copywriting.
- – Meta’s open-source deep learning framework.
Down
- – Notebook interface used with Matplotlib and Seaborn.
- – AI process of generating predictions from data.
- – AI model tuning for specific industry needs.
- – Machine learning platform developed by Google Brain.
- – Feature of AI that personalizes suggestions (e.g., Netflix).
- – Google AI tool for tracking and predicting user behavior.
- – AI capability that saves time by performing repetitive tasks.
- – AI application area in cybersecurity and fraud detection.
- – Field where OpenCV is applied (e.g., object detection).
- – OpenAI's conversational chatbot using the GPT architecture.
- – Google's cloud-based notebook for AI development.
- – Specialized processors used by Google for AI tasks.
- – The type of data handled by Google Speech-to-Text.
- – Python library for static and interactive data visualization.
30 Clues: – AI-generated realistic fake videos. • – Fundamental units in neural networks. • – Advantage of AI reducing human errors. • – Ethical concern in AI regarding fairness. • – Meta’s open-source deep learning framework. • – AI model tuning for specific industry needs. • – Method used in ChatGPT to fine-tune responses. • – AI process of generating predictions from data. • ...
Peer-To-Peer Quiz 2 2025-02-25
Across
- Attaching a computer to a network requires a ___
- All computers connected to the hub must share the amount of bandwidth the hub provides
- Before a computer can transmit data to the AP, it must first send a short ___ message
- _________ is making a connection between devices such as two switches, to expand a network
- ________ networks rarely stand by themselves
- When a device can send or receive, but not both at the same time, it’s called
- A multiport repeater is commonly called a
- Most APs operate at anywhere from __ Mbps to several Gbps
- Indicator lights glow (usually green) when a ____ has been made to a device on the other end of the cable
- A traditional repeater has ___ ports or connections
- If no other stations are trying to send data, the AP responds with a ___ message
Down
- A switch maintains a
- A common operating speed is __ Mbps
- At the heart of a wireless LAN is the wireless __
- When a device can send data and receive data simultaneously, it’s called
- The amount of data that can be transferred on a network during a specific interval
- Job is receiving bit signals generated by NICs
- The first step in a switch's operation is that it receives a _____
- Used to interconnect multiple computers so that they can communicate with one another
- the rightmost port has a button next to it for changing the port’s configuration, this port is called
20 Clues: A switch maintains a • A common operating speed is __ Mbps • A multiport repeater is commonly called a • ________ networks rarely stand by themselves • Job is receiving bit signals generated by NICs • Attaching a computer to a network requires a ___ • At the heart of a wireless LAN is the wireless __ • A traditional repeater has ___ ports or connections • ...
Golden Age of Islamic Civilization (Christopher Lucgjonaj) 2025-02-25
Across
- Successor of Muhammad, a religious Muslim leader who would lead a caliphate or dynasty
- Muslims used this ability to jump social ranks
- Beautiful handwriting used to make advancements to art, also found in the Quran
- Muslim scholars translated works of philosophers from which country
- Muslims used this method to sell and receive goods, services, and ideas.
- Muslim Surgeons developed a way to treat this by drawing fluid out of the eye lenses with hollow needles
- Persian physician who made advancements in diagnosing and treating diseases
- This European country had many Muslim Universities which made huge advancements
- Sacred Book of Islam which most laws and rules were based on
- This caliph established Baghdad as the greatest center of Muslim learning
- This Arab thinker set standards for the scientific study of history
Down
- Muslims created which structure for emergencies, injuries, etc
- This dynasty expanded from Spain to the Indus River, spreading Islam throughout the world
- This form of art and design was used to build mosques and other types of structures throughout the Muslim world.
- Popular Muslim poet who wrote the Shah Namah, and made many advancements in poetry
- These people built vast trade networks throughout the Muslim world
- Greatest center of learning, which allowed for advancements of knowledge
- Which Muslim mathematician pioneered the study of Algebra
- Which Ancient Greek did Muslim scholars study for advances in mathematics
- People constantly moving; had large impacts on Muslim trade
20 Clues: Muslims used this ability to jump social ranks • Which Muslim mathematician pioneered the study of Algebra • People constantly moving; had large impacts on Muslim trade • Sacred Book of Islam which most laws and rules were based on • Muslims created which structure for emergencies, injuries, etc • These people built vast trade networks throughout the Muslim world • ...
American History Crossword Puzzle 2025-06-05
Across
- A person that wanted to end slavery.
- The first ten amendments to the Constitution.
- Lewis and ______ were sent to explore the Louisiana Territory.
- ___________ of Confederation was the first constitution of the United States.
- These were imposed on the colonies to pay war debts from the French and Indian War.
- __________ Act required colonists to house British soldiers in their homes.
- ________ Railroad was a series of secret networks runaways took to try to escape slavery.
- This was one of the largest battle and turning point of the Civil War.
- A group of people ruled or governed by another country.
- This was the event that started the Civil War.
- The period after the Civil War that was about rebuilding the country.
Down
- To refuse to use or by as an act of protest.
- The leader of the Patriot army.
- The fist shots of the American Revolution were fired here.
- This group wanted to remain under British control.
- A document that grants permission to start a colony.
- This group was in favor of independence from Britain.
- This person served as a guide and translator for the Corps of Discovery.
- This holiday commemorates the end of slavery in the US.
- New Jersey, New York, Delaware, and Pennsylvania.
- ___________ Destiny was the believe that America was meant to expand across the continent.
- This person was the main author of the Declaration of Independence.
- The election of this person led to Southern states seceding.
23 Clues: The leader of the Patriot army. • A person that wanted to end slavery. • To refuse to use or by as an act of protest. • The first ten amendments to the Constitution. • This was the event that started the Civil War. • New Jersey, New York, Delaware, and Pennsylvania. • This group wanted to remain under British control. • ...
angielski zawodowy 2025-05-22
Across
- To store data permanently on a computer
- A device used to store data permanently
- Temporary memory used to store data while the computer is running
- The brain of the computer that processes data
- A powerful computer that provides services or resources to other computers
- A single box in a spreadsheet where you enter data
- A design for text characters used in documents
- A structured collection of data stored electronically
- A device that forwards data between computer networks
- A program used for writing and editing text
- Text style that slants letters to the right
- A specific category of information in a database
Down
- A mathematical instruction used in spreadsheets to calculate values
- The positioning of text (left, center, right, justified)
- A file that organizes data in rows and columns, often used for calculations
- A unique number identifying a device on a network
- A collection of web pages under a single domain name
- A connector on a computer used for data transfer and peripheral devices
- A program used to find websites and online information
- A clickable element that links to another webpage
- A group of connected computers that share resources
- A request for data or information from a database
- The way users interact with a computer or software
- A set of data arranged in rows and columns in a database
- Text style that makes letters thicker and darker
25 Clues: To store data permanently on a computer • A device used to store data permanently • A program used for writing and editing text • Text style that slants letters to the right • The brain of the computer that processes data • A design for text characters used in documents • Text style that makes letters thicker and darker • ...
Ni 2025-09-22
Across
- : Large-scale criminal enterprises (plural) (Down)
- : Ability, skills, or resources that allow action (Across)
- : Efforts to stop acts of terror (Down)
- : Relating to boundaries between countries (Down)
- ASEANAPOL Crossword Puzzle
- : An area or part of the world (Down)
- : Abbreviation for ASEAN Police — ASEAN____ (Down)
- : Official inquiries or probes (Down)
- : Working jointly, especially by sharing information or resources (Down)
- : Fundamental entitlements and freedoms of people (Down)
- : Countries that belong to a group (Down)
- : State of being free from danger or threats (Down)
- : The systematic process of gathering, documenting, and using data in investigations (Across)
- : Crime that crosses digital networks (Across)
- : Material proof presented in legal cases (Across)
- : The carrying out of planned tasks or missions (Down)
- : A planned set of actions toward achieving something (Across)
Down
- : The legal authority to make decisions or judgments (Across)
- : Crime involving money-based wrongdoing (Down)
- : International police organization (Down)
- : The act of working together toward a common goal (Across)
- : Efforts to stop bad things before they happen (Down)
- : Illegal drug production, distribution, or use (Across)
- : Capital city where many ASEANAPOL meetings are held (Across)
- : Association of Southeast Asian Nations (Down)
- : The action of transporting illegal goods or people (Across)
- : Information especially secret or confidential used for strategic purposes (Down)
- : Across multiple nations (Down)
- : Formal agreement or rules governing behavior (Down)
- : Teaching or preparing members in skills or knowledge (Across)
30 Clues: ASEANAPOL Crossword Puzzle • : Across multiple nations (Down) • : An area or part of the world (Down) • : Official inquiries or probes (Down) • : Efforts to stop acts of terror (Down) • : Countries that belong to a group (Down) • : International police organization (Down) • : Crime that crosses digital networks (Across) • : Crime involving money-based wrongdoing (Down) • ...
RU ITEC411 2025-10-22
Across
- The study of what is right and wrong especially in human actions
- When jobs are lost because machines or computers take over
- Dilemma A situation where the right action is unclear or has both good and bad outcomes
- Divide The gap between people who have access to technology and those who do not
- The right to keep personal information safe and undisclosed
- A moral approach that focuses on duties and rules rather than results
- Offs Giving up one benefit in order to gain another like privacy for convenience
- Tools and systems created to make tasks easier or more efficient
- The idea that the best action is the one that helps the most people
- The duty to use technology in a fair and moral way
Down
- Networking Websites or apps that let people share and connect online
- Using machines or software to perform work without human help
- Speech The right to express opinions without government control
- Intelligence Machines or programs that can think and learn like humans
- Rights Basic freedoms every person is born with such as life and liberty
- Protection of computers data or networks from harm or misuse
- Of Change How quickly technology develops and spreads in modern life
- The results or effects that come from actions good or bad
- How technology connects people and businesses around the world
- Technology Tools designed to help people with disabilities use computers or devices
20 Clues: The duty to use technology in a fair and moral way • The results or effects that come from actions good or bad • When jobs are lost because machines or computers take over • The right to keep personal information safe and undisclosed • Protection of computers data or networks from harm or misuse • Using machines or software to perform work without human help • ...
HS2 Cryptic Crossword 2025-10-20
Across
- Building for the future without depleting resources
- Word dreaded by rail enthusiasts
- Tilt of the railway track on curves
- Starting point for many HS2 debates
- The route — both political and physical
- Earth moved during tunnelling — not the ending of a movie
- How you dig tunnels — and how the delays feel
- What keeps the line grounded — literally
- Type of electric line powering high-speed trains
- Street name with a new station in Birmingham
- Hills that made HS2 dig deep
- The process of awarding construction contracts
- Town once considered for HS2 stops
- Distance between the two rails
- Relating to the impact of construction on nature and communities
- Economic revitalisation around HS2 stations
Down
- What happened to HS2’s northern leg in 2023
- Key reason for project delays or cuts
- Rails laid for trains to run on
- County with long stretches of HS2 tunnelling
- Tall steel tower carrying overhead power lines
- Profession designing and constructing HS2
- City at the heart of HS2’s first phase
- Action to reduce negative effects — especially on wildlife or heritage
- The problem-solver behind every viaduct
- Major factor leading to HS2 “reset”
- Bridge structure allowing HS2 to cross valleys and rivers
- Southern starting point of the HS2 route
- Ensuring HS2 connects with other rail networks
- Company responsible for parts of the build
- When the government hits “Ctrl+Alt+Del” on HS2
- Structure projecting horizontally, key in bridge design
32 Clues: Hills that made HS2 dig deep • Distance between the two rails • Rails laid for trains to run on • Word dreaded by rail enthusiasts • Town once considered for HS2 stops • Tilt of the railway track on curves • Starting point for many HS2 debates • Major factor leading to HS2 “reset” • Key reason for project delays or cuts • City at the heart of HS2’s first phase • ...
25339 2025-11-04
Across
- Model suggesting optimal decisions or actions
- Finding hidden patterns in unlabeled data
- Software used to create interactive visuals
- Google’s serverless data warehouse for analytics
- Data that provides information about other data
- Making choices based on factual data insights
- Tool for data connection and transformation in Excel and Power BI
- Estimating future business trends using analytics
- Performing data analysis using cloud computing resources
- Combining data from multiple sources into one view
- Non-relational database system for handling large unstructured data
- Mathematical framework for achieving the best result
- Using statistical models to predict future outcomes
- Moral principles guiding responsible data use
- Learning based on rewards and penalties
Down
- Processing data through interconnected neural structures
- Immediate analysis of streaming data
- Process of removing personal identifiers from data
- Machine learning technique using labeled data
- Subset of AI using neural networks with multiple layers
- Simulation of human intelligence by machines
- Stages through which data passes from creation to deletion
- Identifying and evaluating potential business risks
- Moving data between systems or storage types
- Selecting and transforming variables for model building
- Model explaining what has happened in the data
- Identifying unusual patterns that do not conform to expected behavior
- Continuous flow of real-time data from sources
- Tool to evaluate and compare multiple decision options
- Protecting data from unauthorized access or corruption
- Presenting key metrics visually for quick insight
31 Clues: Immediate analysis of streaming data • Learning based on rewards and penalties • Finding hidden patterns in unlabeled data • Software used to create interactive visuals • Simulation of human intelligence by machines • Moving data between systems or storage types • Model suggesting optimal decisions or actions • Machine learning technique using labeled data • ...
om 2025-11-12
Across
- Allows investors to gain benefit or suffer losses of investments without directly investing in securities.
- The person or company to whom the check is written.
- A booklet used to record bank transactions on an account.
- Checks issued by the company but not yet presented for payment and cleared from the bank account.
- Account type where drawings are done through checks.
- Cards linked with VISA or Mastercard networks that allow payments in various establishments.
- The cash-in-bank account of the entity recorded in its books.
- A sum of money placed or kept in a bank account.
- The amount of cash requested to receive back from a check deposit.
- The person or entity responsible for writing the check.
Down
- Cash received by an entity but not yet processed and posted by the bank.
- A unique string of numbers identifying the owner of an account.
- Involves removing funds from a bank account.
- Simplest bank account used for safekeeping.
- An optional line on a check helpful for knowing why the check was written.
- A written, dated, and signed instrument that directs a bank to pay a specific sum of money.
- Proof that the depositor is authorizing the bank to get money from an account.
- Investment placement with no withdrawal over the contracted period.
- A card used to make transactions in a machine.
- Paper or coin currency entered on a bank deposit slip.
20 Clues: Simplest bank account used for safekeeping. • Involves removing funds from a bank account. • A card used to make transactions in a machine. • A sum of money placed or kept in a bank account. • The person or company to whom the check is written. • Account type where drawings are done through checks. • Paper or coin currency entered on a bank deposit slip. • ...
LIVING ONLINE 2015-08-24
Across
- Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
- Copying something created by someone else not giving credit
- Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
- Wireless technology used to network computers together and to other devices like printers or servers.
- Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
- Any field in a form on a Web page or other document where the user can enter text.
- Saved URL
- Unique name given to each network and used to identify specific e-mail and Web servers.
- Buying and selling products and ser¬vices by bidding over the Internet
- Sending an existing e-mail message on to a new recipient
- Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
- Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
- Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
- Standards used to control how data is sent over a network
- Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
- Boolean search operator that requires both search terms to be included in the search results
- Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
- E-mail attack or scam designed to gather information from a user while appearing to be safe
- Disposing of paper and other products so they can be processed for reuse
Down
- Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
- Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
- Businesses that have a physical location.
- Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
- A program or feature used to block spam or e-mail messages from specific senders
- Any machine attached to a network: client, server, printer, and so on.
- Most popular search engine.
- Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
- Part of an IP address that defines the network from which a user is then accessing the Internet.
- Bad hacker who creates malicious programs to break into computers and do harm
- Microsoft’s dedicated e-mail soft¬ware program.
- Default Web page that opens when a browser is launched.
- Used by machines like an ATM to conduct secure transactions.
- Unsolicited e-mail message sent by someone you don’t know.
- Boolean operator that excludes specific words from search results.
- Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
- A delivered e-mail message has been ___________.
36 Clues: Saved URL • Most popular search engine. • Businesses that have a physical location. • Microsoft’s dedicated e-mail soft¬ware program. • A delivered e-mail message has been ___________. • Default Web page that opens when a browser is launched. • Sending an existing e-mail message on to a new recipient • Standards used to control how data is sent over a network • ...
LIVING ONLINE 2015-08-17
Across
- Used by machines like an ATM to conduct secure transactions.
- Saved URL
- Sending an existing e-mail message on to a new recipient
- Default Web page that opens when a browser is launched.
- Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
- Copying something created by someone else not giving credit
- Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
- Businesses that have a physical location.
- Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
- Wireless technology used to network computers together and to other devices like printers or servers.
- Bad hacker who creates malicious programs to break into computers and do harm
- Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
- E-mail attack or scam designed to gather information from a user while appearing to be safe
- Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
- Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
- Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
- Any machine attached to a network: client, server, printer, and so on.
- Boolean search operator that requires both search terms to be included in the search results
Down
- Standards used to control how data is sent over a network
- Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
- Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
- Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
- Unsolicited e-mail message sent by someone you don’t know.
- Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
- A program or feature used to block spam or e-mail messages from specific senders
- Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
- Most popular search engine.
- Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
- Microsoft’s dedicated e-mail soft¬ware program.
- Boolean operator that excludes specific words from search results.
- Any field in a form on a Web page or other document where the user can enter text.
- Part of an IP address that defines the network from which a user is then accessing the Internet.
- Buying and selling products and ser¬vices by bidding over the Internet
- Disposing of paper and other products so they can be processed for reuse
- Unique name given to each network and used to identify specific e-mail and Web servers.
- A delivered e-mail message has been ___________.
36 Clues: Saved URL • Most popular search engine. • Businesses that have a physical location. • Microsoft’s dedicated e-mail soft¬ware program. • A delivered e-mail message has been ___________. • Default Web page that opens when a browser is launched. • Sending an existing e-mail message on to a new recipient • Standards used to control how data is sent over a network • ...
Tencho Definitions 2022-02-25
Across
- Data data that contains greater variety, arriving in increasing volumes and with more velocity
- a course of study made available over the internet without charge to a very large number of people.
- posting a single message or piece of content to multiple destinations.
- Networks a computer system modeled on the human brain and nervous system.
- the state or quality of being efficient.
- 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
- the formation of ideas or concepts.
- Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
- a form of entertainment
- business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
- Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
- Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- the state, fact, quality, or condition of being singular.
- someone who would like to start a business and thinks and talks about doing so, but never gets started.
Down
- a mobile device used while watching television especially to access supplementary content or applications
- a person, company, or technology that changes the way an industry operates.
- reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
- fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
- the correct or acceptable way of communicating on the internet
- Leader one whose views on a subject are taken to be authoritative and influential.
- a person who introduces new methods, ideas, or products.
- denoting or relating to a period of a thousand years.
- Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
- a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
- take (something) illicitly; steal.
- an image, video, advertisement, etc., that is circulated rapidly on the internet.
- Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
- the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
- is King you should focus on putting out good content frequently and consistently.
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- short for key performance indicator.
- or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
33 Clues: a form of entertainment • take (something) illicitly; steal. • the formation of ideas or concepts. • short for key performance indicator. • the state or quality of being efficient. • denoting or relating to a period of a thousand years. • a person who introduces new methods, ideas, or products. • the state, fact, quality, or condition of being singular. • ...
Network Security Fundamentals 2022-04-25
Across
- This type of vulnerability might include TCP/IP Protocol weaknesses, Operating System Weaknesses, and Network Equipment weaknesses.
- A type of access attack that is implemented using brute force, trojan horse, and packet sniffers.
- This physical threat includes physical damage to servers, routers, switches, cabling plant, and workstations
- A type of network attack that is defined by the unauthorized manipulation of data, system access, or user privileges.
- Similar to a virus in that it replicates functional copies of itself, but it is standalone software and does not require a host program or human help to propagate.
- The degree of weakness in a network or a device.
- An infected host.
- Short for "malicious software".
- A network of zombies.
- A harmful piece of software that looks legitimate. They self-replicate and must spread through user interaction such as opening an email attachment or downloading and running a file from the internet.
- Similar to a DoS attack, but it originates from multiple, coordinated sources.
- A type of access attack where a threat actor uses a compromised system as a base for attacks against other targets.
- This type of vulnerability might include lack of a written security policy, politics, lack of authentication continuity, logical access controls not applied, software and hardware installation and changes not following policy, and a nonexistence disaster recovery plan.
- This physical threat includes poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.
Down
- This physical threat includes voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
- A type of network attack that is defined by the discovery and mapping of systems, services, or vulnerabilities.
- A type of malware that propagates by inserting a copu of itself into, and becoming part of, another program. It spread from one computer to the other.
- Prevents or allows access by specific application types based on port numbers.
- A type of access attack where the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
- This type of vulnerability might include unsecured user accounts, system accounts, with easily guessed password, misconfigured internet services, unsecure default settings, and misconfigured network equipment.
- Prevents or allows access based on IP or MAC addresses.
- An internet tool used to easily determine the IP address space assigned to a given corportation or entity.
- Has the capability to recognize and filter out specific types of attacks, such as a denial of service (DoS).
- This physical threat includes temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
- Also called a host. It is an individual computer system or devices that acts as a network client.
- A type of access attack where a threat actor uses aunauthorized privileges to gain access to a system, possibily compromisng the target.
- A type of network attach that is defined by the disabling or corruption of networks, systems, or services.
- Resides between two or more networks, controls the traffic between them, and helps prevent unauthorized access.
- Prevents or allows access to websites based on specific URLs or keywords.
- Enables a network administrator to apply specific policies for hosts connected to that network.
30 Clues: An infected host. • A network of zombies. • Short for "malicious software". • The degree of weakness in a network or a device. • Prevents or allows access based on IP or MAC addresses. • Prevents or allows access to websites based on specific URLs or keywords. • Prevents or allows access by specific application types based on port numbers. • ...
Cyber Defense Terms 2023-11-20
Across
- a program that uses virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing
- the process of verifying the identity of a user or piece of information and the veracity of information provided, e.g. with a password or other credential
- a bit of code that provides additional, revised, or updated data for an operating system or application
- cybersecurity services that operate from within a network and not at the endpoint and can therefore protect any connected device regardless of model or operating system
- features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children
- the concept of continuing to operate without interruption despite an emergency situation
- Secure __________ Layer is the standard security technology for establishing an encrypted link between a web server and a browser
- Indicators of ___________ are bits of forensic data from system log entries or files that identify potentially malicious activity on a system or network
- An Intrusion ____________ System is a network security system designed to prevent network penetration by malicious actors
- __________ Assessment is a structured process used to identify and evaluate various risks that an organization might be exposed to
- the concept of ensuring that data and systems have not been accessed or modified and are therefore accurate and trustworthy
Down
- a control list that allows and denies elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system
- Completely Automated Public Turing test to tell Computers and Humans Apart - a challenge-response test commonly used by websites to verify the user is a real human and not a bot
- a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs
- a process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- ____________ Authentication combines a static password with an external authentication device such as a phone or email for added security
- Security __________ Response is a planned approach to addressing and managing the reaction after a cyber attack or network security breach
- a list of permitted items that are automatically let through whatever gate is being used, e.g. allowed sites, users, email addresses
- creating an isolated environment on a network that mimics a regular computer in order to safely execute suspicious code without risking harm
- a digital boundary that is defined for a system or domain and within which a specified security policy is applied
- extends a private network across a public network - essentially a virtual, secure corridor
- a facility where information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts
- a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating
- the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit
24 Clues: the concept of continuing to operate without interruption despite an emergency situation • extends a private network across a public network - essentially a virtual, secure corridor • a bit of code that provides additional, revised, or updated data for an operating system or application • ...
Technology 2024-01-10
Across
- person who receives something
- a device which copies pictures and documents so that they can be stored on a computer
- person that a letter, etc. is addressed to
- mobile phone that also has some of the functions of a computer, for example the facility to use apps and the internet
- designed to do a particular job
- a system for connecting to the internet or sending data over computer networks using radio waves instead of wires
- move your finger quickly across the screen of an electronic device such as a mobile phone or small computer in order to move text, pictures, etc. or give commands
- made to appear to exist by the use of computer software, for example on the internet
- device that is placed inside a car engine, clock, radio, etc. and that produces the electricity that makes it work
- act of putting electricity into a battery; the electricity in a battery
- small computer that is easy to carry, with a large touch screen and usually without a physical keyboard
- connected with technology
- series of electrical waves that carry sounds, pictures or messages, for example to a radio, television or mobile phone
- piece of software that you can download to a device such as a smartphone or tablet, for example to look up information or to play a game,
- number of computers and other devices that are connected together so that equipment and information can be shared
- the set of letters that you can touch to write on a smartphone or tablet
Down
- screen on a computer, phone, etc. that allows you to give instructions to the device by touching areas on it
- available on or done using the internet or other computer network
- object or a piece of equipment that has been designed to do a particular job
- process of keeping information, etc. on a computer; the way it is kept
- a machine for printing text on paper, especially one connected to a computer
- person who receives something
- join something to the main supply of electricity, gas, water, etc. or to another piece of equipment
- act of giving wrong information about something; the wrong information that is given
- send data to another computer
- small computer that can work with a battery and be easily carried
- international computer network connecting other networks and computers that allows people to share information around the world
- message sent using the Twitter™ social media service
- small device on which you can store and read texts taken from the internet; an application on a device that enables you to do this
- place the thumb and a finger of one hand on the screen of an electronic device such as a mobile phone or small computer and move them together or apart, to make the image on the screen appear smaller or larger
- UP move higher through text or graphics on a computer
- get data from another computer, usually using the internet
- DOWN move lower through text or graphics on a computer
- phone connection that uses wires carried on poles or under the ground, in contrast to a mobile phone
- MEDIA software programs used for social networking
- hit something quickly and lightly
- official system used for sending and delivering letters, packages, etc.
37 Clues: connected with technology • person who receives something • person who receives something • send data to another computer • designed to do a particular job • hit something quickly and lightly • person that a letter, etc. is addressed to • MEDIA software programs used for social networking • message sent using the Twitter™ social media service • ...
Chapter 7: Vocabulary 2023-12-04
Across
- ,closed communication systems in which individual beliefs are amplified or reinforced by repetition; they may increase social and political polarization because users do not encounter opposing views
- ,the tendency to favor information that confirms a person's existing beliefs; it involves discounting evidence that could disprove or challenge those beliefs
- ,political blogs and talk shows where the writer or host provides highly opinionated personal commentary, usually through conversations with guests; these formats blur the boundaries between objective journalism and subjective reporting
- ,organizations that adhere to the principles of journalism by doing original, balanced, factual reporting; using unpaid, credible sources; conducting interviews ethically; and avoiding personal bias by editors or reporters
- ,communication methods such as television and radio; they tend to take the form of one publisher (e.g., a television station) to many (viewers)
- ,the media's designation of some issues, events, or people as important and others not
- ,false, inaccurate, or misleading information in the media, especially social media; often targeting political candidates and leaders, mis_information can include mani_pulated or fabricated content, satire, and parody content to the public via airwaves on electromagnetic frequencies
- ,the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs
- ,news reporting and political commentary by ordinary citizens and bystanders, advocacy groups, and eyewitnesses to crises, often using cell phone images or video and distributed via social media
- ,giant, often global, corporations that control a wide array of media, including television networks, movie studios, record companies, cable channels, book and newspaper publishers, and digital media outlets
Down
- ,websites that pull together news from a wide range of online sources and make them available on one platform or page; news aggregators can be a way to avoid partisan or filtered news, providing a broad overview of the news of the day from many sources
- ,digital sites that are owned and managed by newspapers, follow the principles of journalism, and deliver content like that of print newspapers, with similar story layout for all users regardless of location, demographic characteristics, partisanship, or friend networks
- ,the process of calling attention to some issues, and not others, when reporting on political events and officials
- ,reporting that involves being as accurate, fair, and balanced as possible, relying on original sources, being transparent about citing sources, and presenting multiple viewpoints
- ,news organizations that mix opinion-driven journalism with factual reporting in order to appeal to consumers who are ideologically liberal or conservative; often characterized by ideological agenda setting, priming, and framing
- ,the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking
- ,software programs that analyze the viewing, liking, and commenting data of all of a platform's users, as well as individual users' prior data, to present users with additional content tailored to their individual interests instead of ordering posts based on the most recently published (as broadcast media do)
- ,partisan media environments in which users are exposed primarily to opinions and information that conform to their existing beliefs; constructed by algorithms that analyze and then personalize each user's online experience
- ,a form of reporting in which the media adopt a skeptical or hostile posture toward the government and public officials
- ,print and digital forms of communication—including television, newspapers, radio, the internet, and social media sites—that convey information to large audiences
- ,the process of presenting information from a certain perspective in order to shape the audience's understanding of that information
21 Clues: ,the media's designation of some issues, events, or people as important and others not • ,the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs • ,the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking • ...
AP US History Period 9 2024-04-29
Across
- The simulation of human intelligence by computer systems, enabling tasks such as problem-solving, learning, and decision-making, with applications ranging from robotics to data analysis.
- A landmark healthcare reform law signed by President Barack Obama in 2010, aimed at expanding access to healthcare coverage, reducing healthcare costs, and improving the quality of care in the United States.
- A grassroots movement advocating for racial justice and equality, particularly in response to police brutality and systemic racism against Black communities, sparked by the acquittal of Trayvon Martin's killer in 2013.
- A social movement that emerged in the wake of sexual harassment and assault allegations against high-profile individuals, aiming to raise awareness about sexual violence, support survivors, and advocate for institutional change.
- The process of increasing interconnectedness and interdependence among countries, economies, and cultures, facilitated by advances in technology, transportation, and communication.
- Digital or virtual currencies that use cryptography for security and operate independently of central banks or governments
- The use of violence, intimidation, or coercion for political, religious, or ideological purposes, often targeting civilians or non-combatants
- The process of urban redevelopment or revitalization, often resulting in the displacement of lower-income residents and the transformation of neighborhoods into higher-income, more affluent areas.
- a political ideology characterized by its advocacy for assertive foreign policy, promotion of democracy, and belief in the use of military force to spread American values and interests abroad.
- Online platforms and technologies that enable users to create, share, and exchange information and content
Down
- The economic policies implemented during the presidency of Ronald Reagan, characterized by tax cuts, deregulation, and a focus on supply-side economics to stimulate economic growth.
- The disproportionate imprisonment of individuals, particularly from marginalized communities such as Black and Hispanic populations, resulting from harsh sentencing laws, racial bias, and socioeconomic factors.
- The manipulation of an organism's genetic material using biotechnology techniques
- A military campaign initiated by President George W. Bush in response to the 9/11 attacks, aimed at combating terrorism, eliminating terrorist networks, and promoting democracy and stability in the Middle East and beyond.
- A federal agency established in 2002 in response to the 9/11 attacks, tasked with protecting the United States from terrorist threats, securing borders, and coordinating emergency response efforts.
- Measures and practices aimed at protecting computer systems, networks, and data from cyber threats such as hacking, malware, and data breaches
- A conservative political movement that emerged in the early 21st century, characterized by opposition to government spending, taxation, and regulation, and advocating for limited government and fiscal responsibility.
- known for being the first African American president, his healthcare reform initiative (Affordable Care Act), and efforts to address economic recovery and climate change.
- A public health crisis involving the misuse, addiction, and overdose deaths related to prescription opioids, heroin, and synthetic opioids such as fentanyl, leading to widespread social and economic consequences.
- The eighth and final leader of the Soviet Union, serving as General Secretary of the Communist Party from 1985 until 1991 and is widely known for his policies of glasnost (openness) and perestroika (restructuring), which aimed to reform the Soviet political and economic systems, but ultimately led to the dissolution of the Soviet Union and the end of the Cold War.
20 Clues: The manipulation of an organism's genetic material using biotechnology techniques • Online platforms and technologies that enable users to create, share, and exchange information and content • Digital or virtual currencies that use cryptography for security and operate independently of central banks or governments • ...
Ad-Hoc Networks - BTEC DIT C3 2023-09-27
Across
- Using an ad-hoc network means a user can connect to the internet without using the ____ allowance on their phone
- Personal _________. Several devices connected via tethering.
- A type of wi-fi that anyone can access. Often used in public spaced
Down
- Wireless method of connecting over a short distance
- Enables a device to share its internet connection with other devices
- Type of cable that can be used for a wired connection
- Network ___ . A code used to allow authorised uses onto a network
7 Clues: Wireless method of connecting over a short distance • Type of cable that can be used for a wired connection • Personal _________. Several devices connected via tethering. • Network ___ . A code used to allow authorised uses onto a network • A type of wi-fi that anyone can access. Often used in public spaced • ...
6th Grade Computers Vocabulary 3 2017-11-08
Across
- an online journal where people post about their experiences
- a worldwide network of computer networks
- a method of transmitting or receiving data over a computer network as a steady, continuous flow, allowing playback to start while still downloading
- used for any high speed Internet Access that is always on and faster than dial up access
- to give something electronically to someone else on the internet
- the branch of engineering that deals with the use of computers and telecommunications to retrieve and store and transmit information
- the symbolic arrangement of data in a computer program
Down
- taking something in print and using a computer device, like a scanner to put it on your computer
- a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)
- a point of interaction between a computer system and a user
- transfer a file to your computer from another computer
- distribute (multimedia files) over the internet for playback on a mobile device or a personal computer. You Tube is an example
12 Clues: a worldwide network of computer networks • transfer a file to your computer from another computer • the symbolic arrangement of data in a computer program • an online journal where people post about their experiences • a point of interaction between a computer system and a user • to give something electronically to someone else on the internet • ...
Computer Crossword Puzzle 2018-10-11
Across
- is a software application for accessing information on the World Wide Web.
- is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
- is the smallest unit of measurement greater than a byte. It precedes the megabyte, which contains 1,000,000 bytes.
- refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
- is the most common format for storing and transmitting photographic images on the World Wide Web.
Down
- is a computer-aided manufacturing (CAM) device that creates three-dimensional objects.
- the process of converting information or data into a code, especially to prevent unauthorized access.
- is a networking device that forwards data packets between computer networks.
- uniform resource locator (URL) is the address of a resource on the Internet.
- A computer network is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication.
- to arrange (something, such as material to be printed or stored data).
- is a programming language that produces software for multiple platforms.
12 Clues: to arrange (something, such as material to be printed or stored data). • is a programming language that produces software for multiple platforms. • is a software application for accessing information on the World Wide Web. • is a networking device that forwards data packets between computer networks. • ...
IC3 Lesson 30 2015-05-18
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Deciphers the information in an SSL Certificate.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- Security feature used for larger networks that controls computers from one point.
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Encrypts the information in an SSL Certificate.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- A malicious program that records keystrokes.
- A program that hackers use to capture IDs and passwords on a network.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
Chem 2023-11-16
Across
- A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
- the process of becoming an acid or the act of making something become an acid
- the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
- H₂CO₃
- the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
- When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
- a principle of chemistry used to predict the rates of chemical reactions
- the abundance of a constituent divided by the total volume of a mixture
- CO2
- A state in which the rate of the forward reaction equals the rate of the backward reaction
- a measure of how acidic/basic water is
- a process that leads to the chemical transformation of one set of chemical substances to another.
12 Clues: CO2 • H₂CO₃ • a measure of how acidic/basic water is • the abundance of a constituent divided by the total volume of a mixture • a principle of chemistry used to predict the rates of chemical reactions • the process of becoming an acid or the act of making something become an acid • ...
Chem 2023-11-16
Across
- A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
- the process of becoming an acid or the act of making something become an acid
- the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
- H₂CO₃
- the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
- When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
- a principle of chemistry used to predict the rates of chemical reactions
- the abundance of a constituent divided by the total volume of a mixture
- CO2
- A state in which the rate of the forward reaction equals the rate of the backward reaction
- a measure of how acidic/basic water is
- a process that leads to the chemical transformation of one set of chemical substances to another.
12 Clues: CO2 • H₂CO₃ • a measure of how acidic/basic water is • the abundance of a constituent divided by the total volume of a mixture • a principle of chemistry used to predict the rates of chemical reactions • the process of becoming an acid or the act of making something become an acid • ...
Chem 2023-11-16
Across
- A molecule is a group of two or more atoms held together by attractive forces known as chemical bonds
- the process of becoming an acid or the act of making something become an acid
- the science of studying networks of interacting molecules, to create new functions from a set of molecules with different hierarchical levels and emergent properties
- H₂CO₃
- the plants, animals, and other organisms that live in the salt water of seas or oceans
Down
- When a change is made to an equilibrium system, the system moves to counteract the imposed change and restore the system to a new equilibrium.
- a principle of chemistry used to predict the rates of chemical reactions
- the abundance of a constituent divided by the total volume of a mixture
- CO2
- A state in which the rate of the forward reaction equals the rate of the backward reaction
- a measure of how acidic/basic water is
- a process that leads to the chemical transformation of one set of chemical substances to another.
12 Clues: CO2 • H₂CO₃ • a measure of how acidic/basic water is • the abundance of a constituent divided by the total volume of a mixture • a principle of chemistry used to predict the rates of chemical reactions • the process of becoming an acid or the act of making something become an acid • ...
Internet 2023-12-18
Across
- Transfer data from a computer to a central computer or website
- Media Websites and applications that enable users to create and share content or participate in social networking
- Copying data from one computer to another or to a device
- A global computer network providing a variety of information and communication facilities
- A location connected to the Internet that maintains one or more pages on the World Wide Web
- A program with a graphical user interface for displaying HTML files, used to navigate the internet
- A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly
Down
- Engine A program that searches for and identifies items in a database matching keywords provided by the user
- Software specifically designed to harm or exploit devices, networks, or data
- A secret word or phrase that must be used to gain access to something
- Transmitting or receiving data, especially video and audio, over a computer network in real-time
- A network security system that monitors and controls incoming and outgoing network traffic
12 Clues: Copying data from one computer to another or to a device • Transfer data from a computer to a central computer or website • A secret word or phrase that must be used to gain access to something • Software specifically designed to harm or exploit devices, networks, or data • ...
13 Facts of Chapter 17.1 2019-04-17
Across
- Every ___ years, national elections are held to select all representatives and one-third of the senators.
- The most important communication tool for a presidential candidate is __________.
- Direct _________ to candidates or parties also come from political action committees, or PACs.
- To be elected president, a candidate must win 270 of the 538 available _________ votes.
- The 1974 campaign finance law established public funding for presidential _________.
- The BRCA banned soft money donations to national _________ parties, but it raised the limit for individual direct donations to $2,000.
Down
- In the 2008 elections, presidential and congressional candidates spent more than $4 _______.
- President Obama used social networks such as YouTube and ________
- ____________________ (two words, no spaces) are one of the possibilities that television offers for a candidate to shape his or her image to voters.
- The __________ Campaign Reform Act (BRCA) targeted issue advertising and soft money donations to national political parties.
- _______ races in the spring help narrow the field of candidates.
- In 2004, Howard Dean was the first to raise significant contributions on the Web and to gain support through www.______.com.
12 Clues: _______ races in the spring help narrow the field of candidates. • President Obama used social networks such as YouTube and ________ • The most important communication tool for a presidential candidate is __________. • The 1974 campaign finance law established public funding for presidential _________. • ...
Redalert ICS CTF 2019-07-23
Across
- This is an attack on bluetooth connections which allows for complete takeover of targeted devices.
- This Device receives information from connected sensors or input devices, processes the data, and triggers outputs based on pre-programmed parameters.
- May sometime be known as Industroyer
- Security enclaves, usually located logically between the inside and outside interface at a firewall, also called extranets
- This computer worm targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program.
Down
- A microprocessor-controlled electronic device that transmit telemetry data to a master system and uses messages from the master supervisory system to control connected objects.
- This is a high level communication protocol to create personal area networks for low powered/bandwith needs.
- The world’s most murderous malware
- A network security measure employed on one or more computers to physically isolated from another network.
- This malware was reported to be involved with the 2015 cyber attacks in Ukraine
- A RAT targeting the ICS industry by the hacking group Dragonfly
- This ICS SCADA protocol has a input validation vulnerability that allows an attacker send the device into infinite loop.
12 Clues: The world’s most murderous malware • May sometime be known as Industroyer • A RAT targeting the ICS industry by the hacking group Dragonfly • This malware was reported to be involved with the 2015 cyber attacks in Ukraine • This is an attack on bluetooth connections which allows for complete takeover of targeted devices. • ...
HTHSCI 3GG3 - Policy Development (3I+E Model) Crossword 2020-12-04
Across
- ____ cake federalism, where there exists shared powers between the federal and state/provincial government
- The ability to overturn government decisions
- Type of influence which can include money (e.g., political donations) and in-kind benefits (e.g, foot soldiers). Common example with physicians where they can voice their opposition to patients
- _____ cake federalism, where there exists reserved powers delegated to provinces/states
- Type of influence which can include engendering an anticipatory reaction and influencing public opinion
- Encompasses knowledge/beliefs about "what is" and values/mass opinion about "what ought to be"
- Factors that can trigger action towards policy development, examples include political, economical, or technological changes
Down
- The OMA is considered a ___ pluralist policy network
- A policy is more likely to be developed if influential interest groups face _____ benefits
- A policy is more likely to be developed if influential interest groups face _____ costs
- A change to the private delivery model of healthcare services in Ontario (core-bargain) would be considered a highly ___ change
- Part of the 3I+E model that encompasses government structures, policy legacies, and policy networks
12 Clues: The ability to overturn government decisions • The OMA is considered a ___ pluralist policy network • A policy is more likely to be developed if influential interest groups face _____ costs • _____ cake federalism, where there exists reserved powers delegated to provinces/states • ...
Safety Online 2024-04-20
Across
- a self-replicating type of malware that spreads across computer networks by exploiting vulnerabilities in operating systems or network protocols
- unauthorized access to computer systems, typically with the intention of stealing or destroying data
- a type of software designed to detect and remove malicious software from computer systems
- a type of malicious software that replicates itself and spreads to other computer systems or files by attaching its code to host programs or documents
- unwanted electronic messages, typically sent in bulk
- malicious software
- malicious software designed to secretly monitor and collect information about a user's activities on an electronic device
Down
- a type of malware that masquerades as legitimate software to deceive users into installing it on their systems
- a software patch or release containing fixes, improvements, or new features designed to enhance the performance of a program
- a type of cyber attack in which attackers attempt to deceive individuals by posing as trustworthy entities in electronic communications
- a security system that monitors and controls incoming and outgoing network traffic
- a secret combination of characters, used to authenticate a user's identity and grant access to a computer system
12 Clues: malicious software • unwanted electronic messages, typically sent in bulk • a security system that monitors and controls incoming and outgoing network traffic • a type of software designed to detect and remove malicious software from computer systems • unauthorized access to computer systems, typically with the intention of stealing or destroying data • ...
Datawarehousing and Data Mining Crossword Puzzle 2024-04-13
Across
- DM functionality of summarization DM functionality of the general characteristics or features of a target class of data
- _____________ database stores sequences of ordered events, with or without a concrete notion of time.
- database typically stores relational data that include time-related attributes
- Data pre-processing step in which multiple data sources may be combined
- DM functionality of comparison of the target class with one or a set of comparative classes
- Data pre-processing step to remove noise and inconsistent data
Down
- A __________ database that stores spatial objects that change with time is called a spatiotemporal database
- ______________ analysis describes and models regularities or trends for objects whose behavior changes over time.
- Geographical Maps can be represented in _________ format, where roads, bridges, buildings, and lakes are represented as unions or overlays of basic geometric constructs, such as points,lines, polygons, and the partitions and networks formed by these components.
- Data pre-processing step in which Data relevant to the analysis task are retrieved from the database
- ___________________ databases store image, audio, and video data.
- Data objects that do not comply with the general behavior or model of the data.
12 Clues: Data pre-processing step to remove noise and inconsistent data • ___________________ databases store image, audio, and video data. • Data pre-processing step in which multiple data sources may be combined • database typically stores relational data that include time-related attributes • ...
18CSE455T-Database Security and Privacy Crossword2 2024-05-30
Across
- Structured collection of data organized into rows and columns, forming the foundation for database (5)
- Process of restoring database functionality and data integrity after a security incident or failure (8)
- Method of encoding data to prevent unauthorized access, ensuring confidentiality (10)
- Unauthorized access or breach into a database system, posing a threat to its security (9)
- Secret code used to authenticate and grant access to a database system, often paired with a username (8)
- Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7)
- Deceptive technique used to trick users into revealing sensitive information, often via fraudulent emails or websites (8)
Down
- Unauthorized access or leakage of sensitive data from a database system, compromising its integrity (6)
- Process of granting or denying access rights to users based on their authenticated identity (13)
- Barrier preventing unauthorized access to a database system from external networks, controlling traffic (8)
- Process of verifying user identity for accessing database resources (13)
- The process of decoding encrypted data to make it readable, often requiring an encryption key (10)
12 Clues: Process of verifying user identity for accessing database resources (13) • Method of encoding data to prevent unauthorized access, ensuring confidentiality (10) • Unauthorized access or breach into a database system, posing a threat to its security (9) • Unauthorized attempt to gain access to a database system or exploit its vulnerabilities (7) • ...
Crossword for Examen de Mesa2 2023-06-27
Across
- It is a digital ledger of transactions that is duplicated and distributed across the network of computer systems.(10)
- It refers to the set of instructions, or a system of rules, written in a particular programming language.(4)
- A generic term describing all kinds of computer programs, applications and operating systems.(8)
- It is an interdisciplinary science with multiple approaches in machine learning.(2)
- It is the science and engineering that focuses on the design and manufacture of extremely small devices .(14)
- It allows us to describe how information will be displayed on web pages.(4)
- Robot vision that allow gather information about its environment.(6)
Down
- Concurrent execution of two or more tasks by a processor.(12)
- It is the process of protecting the computer systems, networks, devices, and programs.(13)
- It is the fundamental part of an OS responsible of management and file access .(6)
- Its role is to respond with maximum relevance to questions asked by internet users .(7)
- Converts a program to a language that the computer understands.(8)
12 Clues: Concurrent execution of two or more tasks by a processor.(12) • Converts a program to a language that the computer understands.(8) • Robot vision that allow gather information about its environment.(6) • It allows us to describe how information will be displayed on web pages.(4) • ...
Chapter 1: Exercise 1 2023-04-04
Across
- _________ digitally enabled of transactions and processes within a firm, involving information systems under the control of the firm.
- _________ is a marketplace extended beyond traditional boundaries and removed from temporal and geographic location.
- _________ is the technology allow the targeting of marketing message to a person’s name, interests, and past purchases.
- _________ available just about everywhere, at all times: at work, at home and elsewhere via mobile devices, anytime.
- _________ digitally enabled commercial transactions between and among organizations and individuals.
- _________ technology is when it allow content generation and social networks.
- _________ richness is when it allow the complexity and content of a message for example we can include video, audio and text messages into the website.
Down
- _________ reach is when the technology allow reaches across national boundaries, around the earth.
- _________ is the technology that allows for two-way communication between merchant and consumer
- _________ density is a condition when the total amount and quality of information available to all market participants.
- In traditional commerce, a _________ is a physical place you visit in order to transact. For example, furniture and television typically motivate the consumer to go someplace to make a purchase
- E-business does not include commercial _________.
- _________ standards is when there is only one set of technology standards used, namely internet standards.
13 Clues: E-business does not include commercial _________. • _________ technology is when it allow content generation and social networks. • _________ is the technology that allows for two-way communication between merchant and consumer • _________ reach is when the technology allow reaches across national boundaries, around the earth. • ...
Employee Selection 2023-08-04
Across
- Legal documents that set out the terms of an agreement between two or more parties
- The feeling of contentment or pleasure that someone experiences when they have met their needs or expectations
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link billions of devices worldwide
- A process of discussion and bargaining between two or more parties in order to reach an agreement
- A computer program that models a real-world situation Simulations can be used to train employees or to test new products or services
- Marks made by people to indicate that they have read and agreed to the terms of a document
Down
- The act of ending someone's employment
- A written document that outlines the terms and conditions of employment for a potential employee
- Successes that someone has achieved
- The act of formally quitting a job
- Relating to the law system
- A way for potential employees to learn more about a company and its culture by visiting the workplace and meeting with employees
12 Clues: Relating to the law system • The act of formally quitting a job • Successes that someone has achieved • The act of ending someone's employment • Legal documents that set out the terms of an agreement between two or more parties • Marks made by people to indicate that they have read and agreed to the terms of a document • ...
Chapter 12 Culture 2016-04-25
Across
- an unjustified negative attitude toward an individual because of the individual's membership in a group
- emphasizes values that serve the self and gives priority to personal goals rather than group goals
- emphasizes values that serve the group by subordinating personal goals to preserve group integrity
- the core of computer-mediated communication. The internet system is worldwide and connects thousands of computer networks, providing and incredible array of information-both positive and negative- that adolescents can access
Down
- a tendency to favor one's own group over other groups
- refers to a grouping of people with similar occupational, educational, and economic characteristics
- the behavior, patterns, beliefs, and all other products of a particular group of people that re passed on from generation to genration
- a dimension of culture based on cultural heritage, national characteristics, race, religion, and language
8 Clues: a tendency to favor one's own group over other groups • emphasizes values that serve the self and gives priority to personal goals rather than group goals • emphasizes values that serve the group by subordinating personal goals to preserve group integrity • refers to a grouping of people with similar occupational, educational, and economic characteristics • ...
Topic 8 2020-11-25
Across
- Provide legislation either friendly or oversight to a interest group.
- Networks, consist of people in Washington-based interest groups, congressional staffs, universities, think tanks & media who debate government policy on a certain subject.
- of Defense, Increase or decrease spending, fund research, military, security measure around the nation.
Down
- groups, Gather electoral support for a congressional candidate by encouraging to vote or money to the candidate.
- Door, the movement of individuals back and forth between the private sector and the public sector
- of Agriculture, Serves as an advocate for those in the farming business.
- a person who tries to influence legislation on behalf of a special interest or a member of a lobby.
- system of government in which most of the important decisions are made by state officials rather than by elected representatives.
- Triangle, policy making relationship between an interest group, congressional committee and bureaucratic agency.
9 Clues: Provide legislation either friendly or oversight to a interest group. • of Agriculture, Serves as an advocate for those in the farming business. • Door, the movement of individuals back and forth between the private sector and the public sector • a person who tries to influence legislation on behalf of a special interest or a member of a lobby. • ...
tim 2013-09-08
Across
- Authorising to perform a particular task or make use of a particular software
- Uniform Resource Locator-an internet address
- Software Commercial software, usually packaged in cellophane wrapping and usually having a higher price tag
- Software that can be freely distributed and used
- 'Try before you buy' software. Software that is provided free and can be copied and distributed, but the licence agreement requires the to pay for the software if they continue using it after a specified period. Some shareware automatically becomes disabled after the free testing period has expired
Down
- A connected set of computers (networks)
- A kind of shareware that allows the user to try the software, but some of the features are disabled
- The right to use, copy or control the work of authors or artists, including software developers
8 Clues: A connected set of computers (networks) • Uniform Resource Locator-an internet address • Software that can be freely distributed and used • Authorising to perform a particular task or make use of a particular software • The right to use, copy or control the work of authors or artists, including software developers • ...
Computer Concepts 2013-11-14
Across
- Local or restricted communication networks, based on TCP/IP and is usually used in organizations or corporations.
- A system designed to prevent unauthorized acces to or from a private network
- When the computer does not have enough RAM,it uses this to compensate for this shortfall.
- It is the intelligent part of the system. Interprets the instructions of the user program and query the status of the inputs.
Down
- A network device that recieves and retransmits amplified signals so that they can retain the necessary strenght to reach their destination.
- Type of communication channel that is transmitted as pulses of light.
- Is 2 or more computers that are linked in order to share resources, exchange files, or allow electronic communications.
- A description os the arrangement of a network including its nodes and connecting lines.
8 Clues: Type of communication channel that is transmitted as pulses of light. • A system designed to prevent unauthorized acces to or from a private network • A description os the arrangement of a network including its nodes and connecting lines. • When the computer does not have enough RAM,it uses this to compensate for this shortfall. • ...
Security Awareness Month - Week 1 2022-10-01
Across
- ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
- Our current password manager.
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
- Flaws in a computer system that weaken the overall security of the device/system.
- Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.
8 Clues: Our current password manager. • Flaws in a computer system that weaken the overall security of the device/system. • Any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint). • ...
Security Awareness Month - Week 1 2022-09-30
Across
- ____ authentication enables password-only logins to be replaced with secure, fast login experiences across websites and apps.
- Our current password manager.
- Any kind of unwanted, unsolicited digital communication that gets sent out in bulk.
- ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint).
Down
- Flaws in a computer system that weaken the overall security of the device/system.
- Phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- ____ authentication requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction.
8 Clues: Our current password manager. • Flaws in a computer system that weaken the overall security of the device/system. • Any kind of unwanted, unsolicited digital communication that gets sent out in bulk. • ____ security automatically recognizes people based on their biological characteristics. (Hint: fingerprint). • ...
Objective 1N: Comparing Some Era 1 States 2024-11-15
Across
- A Mesoamerican state that utilized a tribute system to control its territories and reinforce state authority.
- A South American empire with a centralized government and labor systems like the mit’a to support its vast territory.
- A political structure with autonomous regions or local governance, as seen in the Swahili Coast and some Hindu states.
Down
- A West African empire that controlled trade networks and centralized political authority to maintain power.
- An Islamic state that blended traditional practices with administrative innovations to govern a diverse empire.
- Independent city-states in East Africa that served as major hubs in the Indian Ocean trade network.
- A governance structure where power and authority are concentrated, seen in states like the Inca and Mali Empires.
- A Chinese dynasty that relied on Confucian principles and a bureaucratic system to maintain centralized governance.
8 Clues: Independent city-states in East Africa that served as major hubs in the Indian Ocean trade network. • A West African empire that controlled trade networks and centralized political authority to maintain power. • A Mesoamerican state that utilized a tribute system to control its territories and reinforce state authority. • ...
Marketing 2015-10-05
Across
- all the individuals and households that buy or acquire goods and services for personal computer
- company growth through starting up or acquiring businesses outside the company's current products and market
- the study of human population in terms of size,density,location,age etc
- human wants that are hacked by buying power
- the art and science of choosing target markets and building profitable relationship with them
- a statement of the organization purpose, what it wants to accomplish in the larger environment
- the form humans needs take as they are shaped by culture and individual personality
- factors that are close to the company that can affect it's ability to serve it's customer
- a data that already exists somewhere else
- states of felt deprivation
- a person's pattern of living as expressed in his or her activities,interest, and opinions
- a vast public web of computer networks that connect users all around the world
Down
- the larger societal forces that affect the environment
- the extent in which a product's perceived performance matches a buyers expectation
- the market offering to create superior customer value
- data collected for the specific purpose at hand
- the set of all actual and potential buyers of product or service
- two or more people who interact to accomplish individual or mutual goals
- a research to test hypotheses about cause-and-effect relationship
- obtaining a desired object from someone by offering something in return
20 Clues: states of felt deprivation • a data that already exists somewhere else • human wants that are hacked by buying power • data collected for the specific purpose at hand • the market offering to create superior customer value • the larger societal forces that affect the environment • the set of all actual and potential buyers of product or service • ...
Marketing 2015-10-05
Across
- the set of all actual and potential buyers of product or service
- a person's pattern of living as expressed in his or her activities,interest, and opinions
- data collected for the specific purpose at hand
- a vast public web of computer networks that connect users all around the world
- a data that already exists somewhere else
- the larger societal forces that affect the environment
- the art and science of choosing target markets and building profitable relationship with them
- the market offering to create superior customer value
- a research to test hypotheses about cause-and-effect relationship
- company growth through starting up or acquiring businesses outside the company's current products and market
Down
- a statement of the organization purpose, what it wants to accomplish in the larger environment
- two or more people who interact to accomplish individual or mutual goals
- factors that are close to the company that can affect it's ability to serve it's customer
- all the individuals and households that buy or acquire goods and services for personal computer
- human wants that are hacked by buying power
- the extent in which a product's perceived performance matches a buyers expectation
- the study of human population in terms of size,density,location,age etc
- the form humans needs take as they are shaped by culture and individual personality
- obtaining a desired object from someone by offering something in return
- states of felt deprivation
20 Clues: states of felt deprivation • a data that already exists somewhere else • human wants that are hacked by buying power • data collected for the specific purpose at hand • the market offering to create superior customer value • the larger societal forces that affect the environment • the set of all actual and potential buyers of product or service • ...
Computers Crossword Puzzle 2017-06-01
Across
- Device used for modulation and demodulation
- Presents data
- / A part of a computer that displays images, videos, etc.,
- Short for personal computer
- Gives the power to the computer
- Another drive that can read and write things
- A high-capacity storage device that can read and write things
- Data sent to a browser to track the user's info
- A device that allows things that do things with audio do things
- A device used to store data and perform actions and functions
- Absorbs unneeded heat
- A peripheral device that moves the curser around the screen
- A port where you can plug usbs and peripheral devices into
Down
- Device that connect two or more networks together
- DRIVE Portable storage device like usbs
- Place where energy and information goes into a system
- A flash drive used to store data
- Device that is able to be attached to a computer
- Where the power leaves the computer
- A circuit board that has the most necessary parts of the computer
- Controls what goes on the display screen
- Programs that harm your computer
- Short for Random Access Memory
- code Coding language made up of 1s and 0s
- Cools the computer
- The brain of the computer
- Stores data, connects peripheral devices to the computer
- Devices connectable to the computers that display sounds
- Software that is made to harm your computer
- DISK Flexible removable magnetic disk
30 Clues: Presents data • Cools the computer • Absorbs unneeded heat • The brain of the computer • Short for personal computer • Gives the power to the computer • Short for Random Access Memory • A flash drive used to store data • Programs that harm your computer • Where the power leaves the computer • Controls what goes on the display screen • DISK Flexible removable magnetic disk • ...
FIT E: Vocab Word Quest 2013-05-16
Across
- protection for any published worked
- 1000 yottabyte
- 1000 terabyte
- Ex: DSL, Cable
- Ex:Comcast
- a program the allows you to interact with the computer
- Ex: google
- way to save a file created in word
- responsible rules and behavior to keep you save
- 1000 exabyte
- 1000 zetabyte
- RAM
- personal conduct online
- computer screen
- Ex: optical, mechanical, touch pad
- a short memorable phrase used in advertising
- 1000 kilobyte
- 1000 bytes
- two programs that can work together
- eight bits
- a online, zoomable presentation program
- 1000 megabyte
- allows equipment to handle information that continuously changes
- the process of powering on a computer
Down
- the overall appearance of a document
- a symbol or other design adopted by an organization to identify its product
- the smallest amount of data
- the overall way of how a computer is setup
- CPU
- LCD
- LED
- RTF
- NCSA
- 1000 petabyte
- Ex: mouse, flash drive
- heart of the computer
- 1000 brontobyte
- a close up or preview of a template
- protection of information on computer/networks
- Ex: printer, monitor
- the overall layout of a document
- a brief summery of ones work experience
- an electronic signal that is sent as binary digits
- a way to save a file in adobe
- 1000 gigabyte
- a standard for the short-range wireless interconnection of cellular phones, computers, and other electronic devices
- a pre developed format
47 Clues: CPU • LCD • LED • RTF • RAM • NCSA • Ex:Comcast • Ex: google • 1000 bytes • eight bits • 1000 exabyte • 1000 terabyte • 1000 petabyte • 1000 zetabyte • 1000 kilobyte • 1000 gigabyte • 1000 megabyte • 1000 yottabyte • Ex: DSL, Cable • 1000 brontobyte • computer screen • Ex: printer, monitor • heart of the computer • Ex: mouse, flash drive • a pre developed format • personal conduct online • the smallest amount of data • ...
Programming 2015-01-21
Across
- The person's first name who made this crossword.
- A process that leads from an original formulation of a computing problem to executable computer programs.
- Code which contains numbers like 1's and 0's.
- A list of instructions that tell a computer what to do.
- Relating to or using a system of numerical notation that has 16 rather than 10 as its base.
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- World Wide Web
- Console that has access to the internet.
- A notation resembling a simplified programming language, used in program design.
- A global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide.
Down
- American Standard Code for Information Interchange.
- Movie that has to do with hacking and black coated people.
- A type of software that allows you to perform specific tasks.
- Built the .net framework.
- Client side programming language that runs inside a client browser and processes commands on client computer rather than server.
- Software framework developed by Microsoft that runs primarily on Microsoft Windows.
- IDE and RAD tool written in wxWidgets.
- A graphical representation of a computer program in relation to its sequence of functions (as distinct from the data it processes).
- A quantity or amount.
- The programs and other operating information used by a computer.
20 Clues: World Wide Web • A quantity or amount. • Built the .net framework. • IDE and RAD tool written in wxWidgets. • Console that has access to the internet. • Code which contains numbers like 1's and 0's. • The person's first name who made this crossword. • American Standard Code for Information Interchange. • A list of instructions that tell a computer what to do. • ...
Computers 2015-05-15
Across
- produce data in legible alphanumeric or graphic form
- follows a program, designed to compute
- founded Facebook
- city in California that is headquarter for Yahoo
- name of browser Marc Anderson and Jim Clark founded in 1994
- system a system which information can be be expressed by combinations of the digits of 1 and 0
- a small visual display of the app
- a set of codes designed to allow certain task to happen
- internal storage location
- name of person who first introduced email in 1972
- coping for one computer system to another
- random access memory
- digit number
- expands the window to full screen
- search for something or someone on the internet
- software/ hardware that allows connections to other networks
Down
- physical objects of the system
- displays a menu of commands for opening, saving, and printing
- to operate interactively
- lower and upper limits of data
- allows more than one application
- related commands that are divided into tabs
- a program that is loaded onto your computer without you knowing and hinders the normal function of the computer
- when the computer performs more than one task at a time
- the person that tells the computer what to do
- a precise sequence of instructions for successfully carrying out a task
- a particular order
- a system or set of principles underlying the arrangements of elements in a computer
- software/hardware protection between network and outside world
- an error
30 Clues: an error • digit number • founded Facebook • a particular order • random access memory • to operate interactively • internal storage location • physical objects of the system • lower and upper limits of data • allows more than one application • a small visual display of the app • expands the window to full screen • follows a program, designed to compute • ...
Proteins 2020-12-16
Across
- the reversible process of adding oxygen
- term used for the 11 nonessential amino acids made by the body
- a mixture of fluids locked in a tangled 3D mesh of denatured and coagulated protein
- proteins made from strong, elastic, helix-shaped strands that form networks
- the 3D structure of an entire amino acid chain
- nutrient with a structure composed of carbon, hydrogen, oxygen, nitrogen, and usually sulfur
- the order the amino acids occur in a chain
- the result of oxidation or dehydrogenation of an alcohol
- the iron-building protein pigment in muscle that provides color
- formed by bubbling gas through a mixture, beating or whipping, and depressurization
- a permanent denaturation that results when liquid or semi-liquid proteins form solid or semisoft clots
Down
- the shape of sections of an amino acid
- covalent bonds between 2 protein molecules at side chains containing sulfur
- a chain of amino acids bound together by peptide bonds
- any change in shape of a protein molecule without breaking the peptide bonds
- organic subunits of proteins
- type of bond formed when 2 amino acids combine and water is released
- the reversible process of removing oxygen
- water-repelling
- side chains that are less soluble in water and are attached to another compound of the same type, such as lipids or cholesterol
- term used for the 9 essential amino acids that are not made by the body and must be supplied by the diet
21 Clues: water-repelling • organic subunits of proteins • the shape of sections of an amino acid • the reversible process of adding oxygen • the reversible process of removing oxygen • the order the amino acids occur in a chain • the 3D structure of an entire amino acid chain • a chain of amino acids bound together by peptide bonds • ...
Proteins 2020-12-16
Across
- proteins made from strong, elastic, helix-shaped strands that form networks
- the 3D structure of an entire amino acid chain
- the reversible process of adding oxygen
- a permanent denaturation that results when liquid or semi-liquid proteins form solid or semisoft clots
- the reversible process of removing oxygen
- any change in shape of a protein molecule without breaking the peptide bonds
- a mixture of fluids locked in a tangled 3D mesh of denatured and coagulated protein
- term used for the 11 nonessential amino acids made by the body
- the iron-building protein pigment in muscle that provides color
- type of bond formed when 2 amino acids combine and water is released
- side chains that are less soluble in water and are attached to another compound of the same type, such as lipids or cholesterol
Down
- covalent bonds between 2 protein molecules at side chains containing sulfur
- the order the amino acids occur in a chain
- the shape of sections of an amino acid
- a chain of amino acids bound together by peptide bonds
- formed by bubbling gas through a mixture, beating or whipping, and depressurization
- organic subunits of proteins
- water-repelling
- the result of oxidation or dehydrogenation of an alcohol
- term used for the 9 essential amino acids that are not made by the body and must be supplied by the diet
- nutrient with a structure composed of carbon, hydrogen, oxygen, nitrogen, and usually sulfur
21 Clues: water-repelling • organic subunits of proteins • the shape of sections of an amino acid • the reversible process of adding oxygen • the reversible process of removing oxygen • the order the amino acids occur in a chain • the 3D structure of an entire amino acid chain • a chain of amino acids bound together by peptide bonds • ...
Government 2022-04-04
Across
- of order rules that are usually applied in floor debates to make the system move a little quicker
- Congress giving agencies powers to operate
- members of Congress trying to be both representatives and policymakers
- a leader awaiting their replacement
- when a president uses powers like executive orders, the “Bully-Pulpit”, and “war-making”
- Congress votes of appropriation spending
- an annual plan by Congress to spend more than it collects in tax revenues
- Congress’ main method of controlling the power of the bureaucratic agencies
- removing a federal official from office
Down
- members of Congress are expected to serve the needs of their constituents
- what political leaders who want the Supreme Court to only follow a strict and historically narrow interpretation of the Constitution and the powers of the judiciary prefer
- Senate de-facto leader
- the total of all prior spending by all Congresses in the past that spent in excess of revenues
- what happens when a president refuses to sign a bill during the last 9 days of a Congressional session
- powers given to Congress to have individuals give evidence
- members of Congress are expected to work for their party affiliation
- votes by Congress to allow the old budget to continue before the new one is voted upon
- power networks
- the leaders of Congress who have the duty of connecting the House and Senate leaders to the regular members
- amendments attached to bills that do not pertain to the main goal of the bill
20 Clues: power networks • Senate de-facto leader • a leader awaiting their replacement • removing a federal official from office • Congress votes of appropriation spending • Congress giving agencies powers to operate • powers given to Congress to have individuals give evidence • members of Congress are expected to work for their party affiliation • ...
Cisco CyberHunt Crossword 2022-04-06
Across
- Usually consists of eight bits
- What indicates your computer's virtual location in a network?
- Sending an email, posting photos on a social media site and using your webcam
- The act of working from a remote location bu using computers and networking technology.
- What is used to connect multiple devices on the same network within a building or campus?
- The password is sent to the server using ________ command
- What is SMTP's (Simple Mail transfer Protocol) most common form?
- What are a group of computers in a small geographic area a part of?
- The amount of data that is transferred under real life conditions.
- most expensive wired media
- example of wireless communication device
- Device which converts between digital and analogue signals, e.g. telephone line to computer.
- Nodes are another name of
Down
- A private network that is set up similarly to the internet and is accesses via a Web browser
- A method of transmitting data in which data is sent out to all nodes on a network and is retrieved only by the intended recipient.
- The purpose of scrambling data so it can be sent securely over networks.
- A network that uses a central device connected directly to several other devices
- A computer and network connection
- Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape.
- Multipoint topology is called
- What is the most basic networking device that connects multiple computers or network devices together?
21 Clues: Nodes are another name of • most expensive wired media • Multipoint topology is called • Usually consists of eight bits • A computer and network connection • example of wireless communication device • The password is sent to the server using ________ command • What indicates your computer's virtual location in a network? • ...
Vietnam War Crossword 2022-04-22
Across
- Orange, A chemical sent in orange barrels used to defoliate the jungle and fine the enemy’s hiding spots which led to serious health problems in humans and animals
- Type of warfare used
- Who helped out the Vietcong grow
- What would they bake to hide bombs inside
- A war policy in Vietnam initiated by Nixon in June of 1969.
- Parallel, How was Vietnam divided
- The burden of the war fell on who
- Acronym for 2,000 unaccounted soldiers
- US helicopter type used in Vietnam
- Chi Minh, Who controlled North Vietnam
- Anticommunist Dictator of South Vietnam
- Vietnam, What was the Democratic French controlled part of Vietnam
Down
- Who led South Vietnam after Diems overthrow and death
- of Tonkin, Where did 2 U.S. ships allegedly get attacked by North Vietnam
- Who had control over Vietnam before WW2
- North Vietnamese Radicals
- Who controlled South Vietnam
- Theory, The US theory that stated if one country would fall to communism then they all would
- State, Where did the national guard open fire on student protesters
- Who was elected in 1969 and promised to withdraw troops in Vietnam
- palm, Jelly substance dropped from airplanes which stuck to things, burned off clothes and skin
- Lai Massacre, In 1968 American troops massacred women and children in Vietnamese village My Lai
- Where did 20,000 boat people die
- Vietnam, Which part of Vietnam did communism influence
- What did the Vietcong build to connect village and city networks
25 Clues: Type of warfare used • North Vietnamese Radicals • Who controlled South Vietnam • Who helped out the Vietcong grow • Where did 20,000 boat people die • Parallel, How was Vietnam divided • The burden of the war fell on who • US helicopter type used in Vietnam • Acronym for 2,000 unaccounted soldiers • Chi Minh, Who controlled North Vietnam • ...
Computer Studies Crossword 2022-04-27
Across
- is this crossword good?
- where a LAN cable connects to
- a secret word or phrase that must be used to gain admission to a place
- acronym for the computer component that manages the graphics in a game
- network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- what is smaller than a byte
- the speed of a monitor is measured in this
- short term memory storage device and is volotile
- a technique of loading a program into a ncomputer by means of a few initial instructions which enable the introduction of the rest of the program from an input device.
- a networking device that forwards data packets between computer networks
- memory content that is lost when the power is interrupted or switched off.
Down
- what we use to type
- the acronym for a fast storage device
- what we use to browse for data
- the acronym of one of the most components in a computer that manages the computer components
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- a small segment of a larger message
- the most popular OS
- a portable storage device
- what programming language usually starts with public static void main(String[] args) {...
- used to get a physical copy of a digital document
- what measuring unit is internet speed usually measured in?
22 Clues: what we use to type • the most popular OS • is this crossword good? • a portable storage device • what is smaller than a byte • where a LAN cable connects to • what we use to browse for data • a small segment of a larger message • the acronym for a fast storage device • the speed of a monitor is measured in this • short term memory storage device and is volotile • ...
Geography Crossword 2022-07-09
Across
- What is the pollution related to and primarily caused by unnecessary honking called?
- area What is a place called when it's below sea level.
- What is the increase in the proportion of people living in urban areas called?
- What are the advantages of going to a city called?
- What is the movement of people from rural to urban areas called?
- refers to our surroundings and can either be physical or human.
- What job opportunities are called?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is a physical area on the earth’s surface called?
- What is a physical area on the Earth’ surface called?
Down
- What is the pollution caused by an increase in LED usage?
- What is the number of people living in a unit area of land called?
- What is the environment that has not been affected by people?
- What is poor air quality affecting half the world’s urban population called?
- What is a built up area called?
- Consist of living and non-living things that are found naturally.
- What are the disadvantages of going to a city called?
- What is the environment where people live on farms and villages called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
- What is the area of the earth’s surface that holds special meaning for people?
21 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • area What is a place called when it's below sea level. • What is a physical area on the earth’s surface called? • ...
Cyber quiz 2022-09-12
Across
- a cyber attacker who uses software and other methods to steal information
- An error, flaw, failure, or fault in a computer program.
- Programs that automatically execute tasks as ordered by the creator
- Cryptocurrency, a form of electronic cash
- any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Attaching a phone number or email address to an account for heightened security
- secret word or phrase that is used to access a computer system
- Confirmation of someone's identity using a password or fingerprint
- previously unknown, bug, flaw, or backdoor in software can lead to attacks and damage.
- allows you to create a secure connection to another network using the internet.
- programs and other operating systems used by a computer.
Down
- protecting computers, networks, programs, and data from unauthorized access
- taking advantage of human trust to gain access to private information
- An alternative way to access software typically unauthorized.
- The physical and tangible parts of a computer
- typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded they can piggybank onto programs to corrupt data or do other damage.
- Creating a fake identity on a social network account to target a specific victim
- Hacking that is meant to do minimal damage
- string of numbers used to identify each computer using the internet on a network.
- predate viruses and have infected systems since mainframes were the only computers in existence. capable of self-replication
20 Clues: Cryptocurrency, a form of electronic cash • Hacking that is meant to do minimal damage • The physical and tangible parts of a computer • An error, flaw, failure, or fault in a computer program. • programs and other operating systems used by a computer. • An alternative way to access software typically unauthorized. • ...
SLA crossword 2021-04-08
Across
- "how" knowledge
- a student's anxiety, low self esteem, or lack of motivation can cause mental block for successful learning
- to converse with and exchange ideas with someone.
- expresses how sentient or alive the referent of a noun is
- Language learners produce, either in speaking or writing
- Stresses neural networks – the ability to make connections/associations between various related concepts.
- hypothesis which holds nothing is learned until it has been noticed
- theory proposing that humans possess innate faculties related to the acquisition of language
- a hypothesis that holds acquired knowledge acts as internal editor for learner's utterance
Down
- metaphorical place where learner co-construct knowledge in collaboration with an interlocutor
- a theory that holds that there are conscious and sub-conscious processes for learning languages
- simplified version of a language that's sometimes used by native speakers when addressing non-native speakers
- ___ awareness (the ability to see language as a code and separate it from its symbolic meaning)
- "that" knowledge
- a theory which states all behaviors are learned through interaction with the environment
- a method of language teaching inspired by behaviourism and based around the repetition of correct sentences
- (appropriate processing) How you learn it is similar to how you remember it
- claimed that all the errors made in learning the L2 could be attributed to 'interference' by the L1
- a hypothesis that holds learners' acquire language when exposed to linguistically higher input
- According to the theory, people use language cues for communication.
20 Clues: "how" knowledge • "that" knowledge • to converse with and exchange ideas with someone. • Language learners produce, either in speaking or writing • expresses how sentient or alive the referent of a noun is • hypothesis which holds nothing is learned until it has been noticed • According to the theory, people use language cues for communication. • ...
ICT Crossword Puzzle 2022-10-14
Across
- An output device that is like a tv
- Puts information including letters, words and numbers into your computer
- plays DVDs produced under both the DVD-Video and DVD-Audio
- To point to a place on a display screen
- An output hardware device that connects to a computer to generate sound
- a computer software package that performs a specific function directly for an end user or, in some cases, for another application
- Copies to the clipboard
- a personal computing device designed to fit on top of a typical office desk
- The backbone of the computer
- receives data and permanently writes it on a chip
- To keep the inner mechanics cooled off
- Pastes from the clipboard
Down
- A silvery-gray substance that you apply to a processor before installing a cooling solution
- to render graphics
- a worldwide system of computer networks
- a removable magnetic storage medium that allows recording of data
- a unit that measures display device performance in video captures and playback and video games
- generates the video signal sent to a computer display
- Where all your permanent computer data is stored
- a personal computer generally smaller than a briefcase that can easily be transported
- Provides components with electric power
- The heart of the computer
- to click, scroll, zoom in and out, switch between tab on your laptop
- faster than regular hard drives
- Stores short term memory in the processor
25 Clues: to render graphics • Copies to the clipboard • The heart of the computer • Pastes from the clipboard • The backbone of the computer • faster than regular hard drives • An output device that is like a tv • To keep the inner mechanics cooled off • a worldwide system of computer networks • To point to a place on a display screen • Provides components with electric power • ...
Amaze - November 23 2023-11-15
Across
- Temporary storage of frequently accessed data for quick access
- Unit of digital information storage
- Network point that acts as an entrance to another network
- Storage's virtual counterpart
- Software distribution model in which a service provider hosts applications
- Machine Emulation of a computer system
- Key element in network topology
- Ring Type of computer network technology
- Backbone of any computer network
- Networking device that connects devices together
- Network security system that monitors and controls incoming and outgoing network traffic
- Process of converting information or data into a code to prevent unauthorised access
- Essential for 24/7 IT operations
- Networking utility tool used to test the reachability of a host
- Data centre facility where a business can rent space for servers and other computing hardware
- Common method of networking computers in a LAN
Down
- Creation of a virtual version of something, like a server or network
- Basic unit of digital data
- Software designed to disrupt, damage, or gain unauthorised access
- Permanent software programmed into a hardware device
- Centralised data storage system
- Time taken for a packet to reach its destination
- High-speed internet initials
- Measure of data transfer speed
- Set of rules governing the exchange or transmission of data
- Essential for data redundancy
- Place where internet networks connect
- Technique to minimise data loss
- Tunnel Encrypted, secure pathway through a public network
- Common connection point for devices in a network
30 Clues: Basic unit of digital data • High-speed internet initials • Storage's virtual counterpart • Essential for data redundancy • Measure of data transfer speed • Centralised data storage system • Key element in network topology • Technique to minimise data loss • Backbone of any computer network • Essential for 24/7 IT operations • Unit of digital information storage • ...
Homeostasis/Skeletal 2023-10-11
Across
- smooth, white tissue that covers the ends of the bones where they come together to form joints; found in diarthrodial joints
- this system usually takes the body out of homeostasis during childbirth
- a struture of the body that monitors the values of your body's variables;
- this is an example of a flat bone that protects the heart
- upper jaw bone which is a paired facial bone
- skull encloses the brain which assists in this function of the skeletal system
- a structure of the body that can change the value of a variable in response to a signal from the control center
- bone that looks like a butterfly
- strongest bone on the face
- this suture divides the parietal bones
- this is visible during a growing long bone; afterwards, it changes to a line.
- bone that attaches to the tongue
- patella is this type of bone
Down
- these are short bones of the hand;
- shell-shaped bones in the lower part of the nose
- bone growth
- networks of bone with many marrow filled spaces
- bone located near the tear ducts
- type of tissue that lines the digestive tract and respiratory tract
- process of manufacturing blood cells; starts with an "h"
- phalanges are this type of bone
- an example of irregular bone that sits superior to the coccyx
- red blood cells are made here in which it some of it turns to yellow when matured.
23 Clues: bone growth • strongest bone on the face • patella is this type of bone • phalanges are this type of bone • bone located near the tear ducts • bone that looks like a butterfly • bone that attaches to the tongue • these are short bones of the hand; • this suture divides the parietal bones • upper jaw bone which is a paired facial bone • ...
