networks Crossword Puzzles

A mango shaped space 2019-04-10

A mango shaped space crossword puzzle
Across
  1. the notional environment in which communication over computer networks occurs.
  2. a system of complementary medicine in which fine needles are inserted in the skin at specific points along what are considered to be lines of energy (meridians), used in the treatment of various physical and mental conditions.
  3. an instruction written by a medical practitioner that authorizes a patient to be issued with a medicine or treatment.
  4. remove (a substance) from the surface of a liquid.
  5. finely experienced and aware
  6. having a harshly concussive, disagreeable, or discordant effect
  7. relating to the ability to interpret or become aware of something through the senses.
  8. depending on the will or pleasure of another
  9. attractive or interesting.
  10. a regulation requiring people to remain indoors between specified hours, typically at night.
  11. something that is sent out
Down
  1. a religious song or poem of praise to God or a god.
  2. to affect with visions or imaginary perceptions
  3. an interesting and exciting quality.
  4. a person's emotional state or the atmosphere of a place as communicated to and felt by others.
  5. the immaterial essence, animating principle, or actuating cause of an individual life
  6. a chemical substance that is usually produced by an animal
  7. full of yearning or desire
  8. a strip of wood or stone forming the bottom of a doorway and crossed in entering a house or room.
  9. a classroom where pupils report especially at the beginning of each school day
  10. walk or move around with ostentatious, exaggerated movements.

21 Clues: full of yearning or desireattractive or interesting.something that is sent outfinely experienced and awarean interesting and exciting quality.depending on the will or pleasure of anotherto affect with visions or imaginary perceptionsremove (a substance) from the surface of a liquid.a religious song or poem of praise to God or a god....

Technology 2019-08-25

Technology crossword puzzle
Across
  1. set of things working together to make a meaningful result
  2. a message given to the web browser by the web server
  3. a network security system
  4. protects computer networks from unauthorized access
  5. a facility that allows electronics to be connected with internet
  6. the nature of electronic technology
  7. the situation when devices are ready to exchange data
  8. a robot with a human appearance
  9. a small device which sends wifi to other devices nearby
  10. means of communication between two devices
  11. stores and processes data
  12. a transmission of data for using the internet to electronic devices
  13. retrieving something from the internet
  14. facts or numbers collected for analysis
  15. a computer program which navigates through web pages
Down
  1. made or adapted for a particular purpose
  2. a program language used in smartphone industries earlier
  3. something that can be plugged into a multi-plug
  4. something that produces current
  5. a self-contained component
  6. a global computer network
  7. a private computer network for communication
  8. to move something from one device to another
  9. to assign something specific
  10. a short rang e wireless connection to any electronic device
  11. coded instructions to run something
  12. set of instructions use to operate a computer
  13. a file format developed by adobe including text formatting and image
  14. Some thing that connects electronic machines
  15. a small device by which data can be stored and plugged in with a computer

30 Clues: a network security systema global computer networkstores and processes dataa self-contained componentto assign something specificsomething that produces currenta robot with a human appearancethe nature of electronic technologycoded instructions to run somethingretrieving something from the internetfacts or numbers collected for analysis...

Bilingual Speech Perception 2019-12-02

Bilingual Speech Perception crossword puzzle
Across
  1. control, Bilinguals seem to recruit cognitive control networks associated with the processing of effortful speech and executive functioning
  2. Sequential, bilinguals exposed to L2 at an older age
  3. switching, top-down controlled and can be modulated by language dominance. It is typically more effortful to switch back to the dominant language (L1)
  4. switching, global switching across full language competences
  5. bilinguals, unbalanced degree of proficiency and behavioral performance across language competences
  6. of primary perceptual cues from the dominant language background; Very common in unbalanced early bilinguals and long-term immigrants
  7. local switching "my laptop no function"
  8. context-specific selection of language norms; common in coordinated bilinguals
  9. system, identical items are represented in a single underlying neural substrate common to both, but different items have own-language representations
  10. bilinguals, L1 and L2 share contextual frames
  11. period, Back-frontal cortical development in infants
  12. system, undifferentiated representations
  13. system, each language represented in separate systems
Down
  1. of secondary perceptual cues; common in unbalanced late bilinguals
  2. bilinguals, L1 and L2 are used in different contexts
  3. speech, systematic deviation of a particular native speech norm; Determined by phonetic differences and similarities between the native norm of the foreign-accented speaker and the native listener; Phonetically-based speech distortion
  4. bilinguals, a similar degree of proficiency and behavioral performance
  5. Listeners adapt easily to accents
  6. system, larger language system contains two subsystems
  7. Simultaneous, bilinguals exposed to L2 since a young age

20 Clues: Listeners adapt easily to accentslocal switching "my laptop no function"system, undifferentiated representationsbilinguals, L1 and L2 share contextual framesbilinguals, L1 and L2 are used in different contextsSequential, bilinguals exposed to L2 at an older ageperiod, Back-frontal cortical development in infants...

DTIN The Internet 2024-09-09

DTIN The Internet crossword puzzle
Across
  1. The part of a web address that leads to a specific file
  2. A call made over the internet
  3. The last part of a domain name like .com or .edu
  4. Enables speaking to others over the internet
  5. A collection of related web pages
  6. Saving a web link for future reference
  7. Business transactions over the internet
  8. An internet system for sending messages
  9. To transfer data from the internet to a device
  10. A website that connects people for interaction
  11. A global network of networks
  12. An electronic document on the web
  13. A clickable text or image that links to another web page
  14. Translates domain names to IP addresses
  15. A method for securing data on the internet
  16. A program to view web pages
Down
  1. To send data from a device to the internet
  2. A platform for real-time typed conversation
  3. The first page displayed by a website
  4. Unique numbers identifying a device's location
  5. A unique address of a page on the web
  6. A protocol for file transfer on the network
  7. Internet-based platform for financial transactions
  8. A website used to find information on the web
  9. A text-based name corresponding to an IP address
  10. Websites for uploading and viewing media
  11. A special browser for smartphones
  12. An online journal where users post content
  13. A server that delivers web pages
  14. Symbols that define the content of web pages

30 Clues: A program to view web pagesA global network of networksA call made over the internetA server that delivers web pagesA collection of related web pagesA special browser for smartphonesAn electronic document on the webThe first page displayed by a websiteA unique address of a page on the webSaving a web link for future reference...

Digital Wonders: The NFT Universe Unveiled 2024-03-22

Digital Wonders: The NFT Universe Unveiled crossword puzzle
Across
  1. A common file format for images, often used for digital art NFTs.
  2. Cryptocurrency of the Ethereum network, commonly used to buy NFTs.
  3. The potential impact of NFTs on traditional art sales and copyright norms.
  4. Duplicate or copy of a popular NFT or collection, often with slight variations.
  5. The process of creating or issuing a new NFT on the blockchain.
  6. A popular marketplace for buying, selling, and discovering NFTs.
  7. Online platforms or spaces where NFTs are displayed and sold.
  8. Describes an NFT that is uncommon or has unique traits within a collection.
  9. An offer made by a buyer to purchase an NFT at a specified price.
Down
  1. Verification method for the authenticity and ownership of an NFT.
  2. A type of NFT that represents ownership or a claim over physical or digital assets.
  3. The action of buying, selling, or exchanging NFTs between parties.
  4. Buying NFTs and selling them quickly for profit.
  5. A symbol or graphic representation on a screen of a file, option, or command related to NFTs.
  6. Computers that maintain and secure blockchain networks, vital for NFT transactions.
  7. A three-dimensional NFT that uses light patterns to display images.
  8. The act of locking up a cryptocurrency to receive rewards, sometimes related to NFT platforms.
  9. The category of NFTs that includes digital paintings, sculptures, and multimedia.
  10. A predefined maximum amount of NFTs that can be minted in a particular collection.
  11. Searching for specific NFTs or collections in marketplaces.

20 Clues: Buying NFTs and selling them quickly for profit.Searching for specific NFTs or collections in marketplaces.Online platforms or spaces where NFTs are displayed and sold.The process of creating or issuing a new NFT on the blockchain.A popular marketplace for buying, selling, and discovering NFTs....

Compters 2024-07-10

Compters crossword puzzle
Across
  1. lower and upper limits of data
  2. related commands that are divided into tabs
  3. founded Facebook
  4. name of person who first introduced email in 1972
  5. a precise sequence of instructions for successfully carrying out a task
  6. when the computer performs more than one task at a time
  7. expands the window to full screen
  8. city in California that is headquarter for Yahoo
  9. a program that is loaded onto your computer without you knowing and hinders the normal function of the computer
  10. displays a menu of commands for opening, saving, and printing
  11. digit number
  12. the person that tells the computer what to do
  13. coping for one computer system to another
  14. name of browser Marc Anderson and Jim Clark founded in 1994
Down
  1. a particular order
  2. physical objects of the system
  3. to produce data in legible alphanumeric or graphic form
  4. a system which information can be be expressed by combinations of the digits of 1 and 0
  5. a set of codes designed to allow certain task to happen
  6. a small visual display of the app
  7. search for something or someone on the internet
  8. random access memory
  9. internal storage location
  10. allows more than one application
  11. an error
  12. follows a program, designed to compute
  13. an electronic device for for storing and processing data
  14. a system or set of principles underlying the arrangements of elements in a computer
  15. software/hardware protection between network and outside world
  16. to operate interactively
  17. software/ hardware that allows connections to other networks

31 Clues: an errordigit numberfounded Facebooka particular orderrandom access memoryto operate interactivelyinternal storage locationphysical objects of the systemlower and upper limits of dataallows more than one applicationa small visual display of the appexpands the window to full screenfollows a program, designed to compute...

Y9 ICT IGCSE Review Term 1 2025-01-06

Y9 ICT IGCSE Review Term 1 crossword puzzle
Across
  1. Short-range wireless communication technology for data exchange
  2. Hardware that allows a device to connect to a network
  3. Injury caused by repetitive motions, often affecting wrists or hands
  4. Technology for identifying individuals based on physical traits
  5. Data storage based on magnetic fields
  6. Programs used to perform specific tasks
  7. AI designed to simulate human expertise in solving problems
  8. Text-based interface for interacting with computers
  9. Learning using computer software or tools
  10. Network device that forwards data to specific devices
Down
  1. Printer type that sprays ink onto paper to create images
  2. Allows users to interact visually with a system
  3. Device that connects two separate networks, enabling communication
  4. Technology using light for data reading and writing
  5. Security system that controls incoming and outgoing network traffic
  6. Unique address assigned to each network interface card
  7. Temporary storage for data that is lost when powered off
  8. Software designed to detect and remove malicious programs
  9. Popular wireless internet communication standard
  10. Technology for identifying and tracking objects using radio waves
  11. Address used to identify devices on a network
  12. Storage with no moving parts, faster and more durable
  13. Type of barcode that can be scanned quickly
  14. Permanent storage that retains data even when powered off
  15. Remote data storage and computing over the internet
  16. Small-scale network used for personal devices
  17. Latest version of the internet protocol addressing system
  18. Device that connects multiple devices on a network, sending data to all

28 Clues: Data storage based on magnetic fieldsPrograms used to perform specific tasksLearning using computer software or toolsType of barcode that can be scanned quicklyAddress used to identify devices on a networkSmall-scale network used for personal devicesAllows users to interact visually with a systemPopular wireless internet communication standard...

Vocabulario 5a (EC) 2025-01-02

Vocabulario 5a (EC) crossword puzzle
Across
  1. ______ comida = to nibble or eat small bites
  2. a ____ = often
  3. Lo _____ = I am sorry
  4. to climb
  5. to dive
  6. the theater
  7. to get together
  8. I would like to
  9. a ____ = sometimes
  10. por ______ = of course
  11. hasta _____ = until then
  12. una ______ de arte = an art gallery
  13. ver una _____ de teatro = to see a theater play
  14. to ski
  15. to communicate
  16. to have fun
  17. mirar/ir a un ______ = to watch; attend a match/game of
  18. unfortunately
  19. las _____ sociales = social networks/social media
  20. Me _____ = I would love to
  21. hacer = to hike
  22. hacer _____ = to be cold
  23. to get a tan
  24. un ____ = a little
  25. hacer ____ = to be hot
  26. tener _____ de = to feel like doing something
Down
  1. hacer ____ = to make plans
  2. De _____ = agreed
  3. frequently
  4. _____ tiempo con = to spend time with
  5. _____ a = to connect with
  6. cool
  7. stadium
  8. to rain
  9. to surf
  10. Nos _____ en = We can meet at (place)
  11. estar = to be cloudy
  12. to meet up; to find each other
  13. hacer = to snowboard
  14. hacer = to go kayaking
  15. _____ en bicicleta de montaña = to go mountain biking
  16. estar = to be sunny
  17. to meet up
  18. Estaba ____ en = I was thinking about...
  19. Nos ____ a la(s) = We can meet at (time)
  20. to snow
  21. qué ____ = what a shame
  22. una _____ de arte = art exhibition
  23. to get bored
  24. _____ el tiempo = all the time
  25. bowling alley
  26. Me ______ = I would like to

52 Clues: coolto skito divestadiumto rainto surfto snowto climbfrequentlyto meet upthe theaterto have funto get boredto get a tanunfortunatelybowling alleya ____ = oftento communicateto get togetherI would like tohacer = to hikeDe _____ = agreeda ____ = sometimesun ____ = a littleestar = to be sunnyestar = to be cloudyhacer = to snowboard...

20 words crossword puzzle ICT 2025-01-08

20 words crossword puzzle ICT crossword puzzle
Across
  1. A request for information about a certain topic.
  2. A collection of pages or files linked together and available on the world wide web.
  3. Usually defines as a personal or noncommercial web site that uses a dated log format.\
  4. Another way to describe having access to the internet or actively using the internet.
  5. small pictures that represent the program on your computer.
  6. This is the printed/paper copy of a file from the computer.
  7. It is an unwanted email from someone we don't know.
  8. The web page that your browser is set to use when it starts up, or the main page of any website.
  9. This is a file that has been added to an e-mail.
  10. To search for information on the web in a random non-linear way.
Down
  1. A special software package that connects to a network and provides data.
  2. Refers to all computer networks on the internet.
  3. Animated faces that express different emotions.
  4. To leave a message on a newsgroup or bulletin board.
  5. A way to quickly access a favorite website by saving it in your browser.
  6. Illegally copying copyrighted software, music or movies.
  7. The act of moving from page to page and website to website online.
  8. This is where all of the messages that you send are kept.
  9. It is a series of letters and numbers that identifies a location.
  10. A real-time communication over the internet.

20 Clues: A real-time communication over the internet.Animated faces that express different emotions.Refers to all computer networks on the internet.A request for information about a certain topic.This is a file that has been added to an e-mail.It is an unwanted email from someone we don't know.To leave a message on a newsgroup or bulletin board....

ML Cross Word 2025-03-16

ML Cross Word crossword puzzle
Across
  1. Process of teaching a model using data
  2. Adjusting model settings to optimize performance
  3. Collection of data used for training or testing models
  4. Mathematical function used in clustering and classification
  5. Ratio of true positives to predicted positives
  6. Model that splits data based on feature values
  7. Open-source deep learning framework by Google
  8. Ratio of true positives to actual positives
  9. Algorithm that finds the best boundary between classes
  10. Python library for classical machine learning algorithms
  11. Line that best represents data
  12. Popular deep learning library developed by Facebook
  13. Computational model inspired by the human brain
  14. Subset of ML using neural networks with multiple layers
  15. Table that describes model performance in classification
Down
  1. Ensemble learning technique using multiple decision trees
  2. Process of deriving useful information from raw data
  3. Output generated by a machine learning model
  4. Classification with two possible output categories
  5. ML technique where agents learn by interacting with an environment
  6. ML technique where the model learns from labeled data
  7. Function that transforms data into a higher-dimensional space
  8. ML technique for predicting continuous values
  9. Probabilistic graphical model using Bayes' theorem
  10. Grouping similar data points without labeled categories
  11. Choosing the most relevant attributes for a model
  12. Data point that differs significantly from others
  13. True negative rate in classification problems
  14. Process of removing errors and inconsistencies from data
  15. Automated workflow for ML model development
  16. Measure of how many predictions are correct

31 Clues: Line that best represents dataProcess of teaching a model using dataRatio of true positives to actual positivesAutomated workflow for ML model developmentMeasure of how many predictions are correctOutput generated by a machine learning modelML technique for predicting continuous valuesOpen-source deep learning framework by Google...

extra credit GROWTH 2025-04-30

extra credit GROWTH crossword puzzle
Across
  1. the world had 2,043 in 2017
  2. everywhere
  3. trade and with the accumulation of private possessions that enrich our brief lives, and it creates intangible values of accomplishment and satisfaction
  4. 3 letter _ (increased body heights, higher life expectancies), greater material security and comfort (be it mea­sured by disposable incomes or owner­ship of labor-­easing devices), and unpre­ce­ dented degrees of communication and mobility
  5. the ability to change
  6. _6th and 13th 1500 and 1800
  7. holy people
  8. Had monks belonging to sects that espouse austere simplicity.
  9. ­were created by the collision of Indian and Eurasian
  10. Plant with rare resources
Down
  1. _10th letter compulsive collectors (however refined their tastes may be) and mentally sick hoarders who turn their abodes into garbage dumps
  2. 3 letter _ railway networks, expansion of steamship travel, rising production of steel, invention and deployment of internal combustion engines and electricity, rapid urbanization, improved sanitation, rising life expectancy—­began to take place at unpre­ce­dented rates during the
  3. proposing to control the Earth’s climate through ...
  4. the state of not being definitively determined or known, often involving uncertainty or ambiguity
  5. (length, mass, time, electric current, temperature, amount of substance, luminous intensity)9th letter a _
  6. Talked about as being primitive
  7. the name of the author 7th is _
  8. 7th letter is _A quin­tes­sen­tial marker of modern growth
  9. it took more than three centuries for the population of ----- to double to 400,000
  10. a metric unit of square measure, equal to 100 ares (2.471 acres or 10,000 square meters).

20 Clues: everywhereholy peoplethe ability to changePlant with rare resourcesthe world had 2,043 in 2017_6th and 13th 1500 and 1800Talked about as being primitivethe name of the author 7th is _proposing to control the Earth’s climate through ...­were created by the collision of Indian and Eurasian7th letter is _A quin­tes­sen­tial marker of modern growth...

Computer 2025-06-16

Computer crossword puzzle
Across
  1. - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
  2. Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
  3. Hacking - Hacking done for good causes, such as national security
  4. - Installing a single licensed copy of software onto multiple computers against license terms
  5. - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
  6. - Enables you to connect your computer to the internet over a telephone line
  7. - The process of transforming data into unreadable code
  8. - A network device used to connect all computers in a network with each other
  9. - Each node is connected to every other node in the network (Mesh Topology)
  10. - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
  11. - Unwanted bulk email from unknown sources
Down
  1. Piracy - Copying and distributing software illegally
  2. - Using or imitating another person's work as one's own
  3. - The process of converting encrypted information back into readable form
  4. - Illegal intrusion into a computer system or network
  5. - All the nodes in the network are connected in a circular manner (Ring Topology)
  6. - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
  7. - A device that connects two different types of networks with each other
  8. - Criminal activities using computer, network, or internet to cause harm to individuals or devices
  9. - Each computer in a network

20 Clues: - Each computer in a network- Unwanted bulk email from unknown sourcesPiracy - Copying and distributing software illegally- Illegal intrusion into a computer system or network- Using or imitating another person's work as one's own- The process of transforming data into unreadable codeHacking - Hacking done for good causes, such as national security...

Ch2- Network Hardware Essentials 2025-02-25

Ch2- Network Hardware Essentials crossword puzzle
Across
  1. virtual local area network
  2. What IP address class is used for large networks and starts with "10.x.x.x"?
  3. A layer 3 device that doesn’t forward broadcasts
  4. What type of cable is used to connect two similar devices, such as two computers or two switches, directly without the need for a hub or router?
  5. What symbol in Packet Tracer automatically selects the correct cable type when connecting devices?
  6. Which device in Packet Tracer is used to assign IP addresses automatically to devices on a network?
  7. A multiport repeater that broadcasts data to all connected devices
  8. A network message addressed to only one computer on the LAN
  9. What type of cable is used for high-speed, long-distance communication
  10. The name assigned to a wireless network
  11. A tool used in Packet Tracer to check connectivity between devices
Down
  1. What table does a switch use to forward frames?
  2. What is the term for a port on a hub or switch that is used to connect to another hub or switch without requiring a crossover cable?
  3. A network device that uses MAC addresses to forward frames
  4. The type of cable used to connect a PC to a switch
  5. The Packet Tracer device that simulates internet connectivity
  6. A device that regenerates signals to extend transmission
  7. A device that connects a wired network to a wireless network
  8. What type of IP address is manually configured and does not change over time?
  9. network interface card

20 Clues: network interface cardvirtual local area networkThe name assigned to a wireless networkWhat table does a switch use to forward frames?A layer 3 device that doesn’t forward broadcastsThe type of cable used to connect a PC to a switchA device that regenerates signals to extend transmissionA network device that uses MAC addresses to forward frames...

Exemplary Travels. Hayool. Pd. 1. 2024-10-18

Exemplary Travels. Hayool. Pd. 1. crossword puzzle
Across
  1. The "ship of the desert" that revolutionized trade across the Sahara.
  2. The bacterium responsible for the Black Death, which traveled along trade routes.
  3. Major center of learning and trade in Mali during the 14th century.
  4. Dynasty established by Kublai Khan, marking Mongol control over China.
  5. Native American urban centers in the Southwest known for massive trade networks and cultural development.
  6. West African storytellers who preserved history through oral traditions.
  7. Roadside inns that supported merchants and travelers on ancient trade routes.
  8. Chinese ships that dominated trade in the South China Sea.
  9. Moroccan explorer who traveled over 75,000 miles across the Islamic world.
Down
  1. Settlements of people outside their homeland, fostering cross-cultural interactions.
  2. Nickname for European naval powers who dominated global trade routes during the Age of Exploration.
  3. Ming dynasty ruler who sponsored Zheng He's maritime expeditions and oversaw the construction of the Forbidden City.
  4. Tower in Delhi built by Muslim rulers, symbolizing the spread of Islam in India.
  5. Early form of currency that facilitated trade along the Silk Road.
  6. Massive temple complex built in Cambodia during the Khmer Empire.
  7. Wealthy ruler of Mali, famous for his pilgrimage to Mecca.
  8. Mongol ruler who led the destruction of Baghdad, marking the end of the Abbasid Caliphate.
  9. A method of fast communication and transportation used by the Mongols across their empire.
  10. Ming dynasty admiral who led massive maritime expeditions across the Indian Ocean.
  11. Native American city near present-day St. Louis.

20 Clues: Native American city near present-day St. Louis.Wealthy ruler of Mali, famous for his pilgrimage to Mecca.Chinese ships that dominated trade in the South China Sea.Massive temple complex built in Cambodia during the Khmer Empire.Early form of currency that facilitated trade along the Silk Road....

Slande Cheridor 2024-12-07

Slande Cheridor crossword puzzle
Across
  1. testers who are paid to probe networks and report vulnerabilities
  2. what the user has (smart card or key)
  3. a server role that makes it possible for administrators to take control of Microsoft product updates
  4. The most widely used method for encrypting data
  5. security features that enable administrators to control who has access to the network
  6. an industry-standard client/server protocol that offers centralized control
  7. security features that enable administrators to control what users can do after they are logged on to the network
  8. used in a Windows domain environment and provides mutual authentication
  9. backs up the disk sector by sector to create an exact image of the disk’s contents
  10. framework for other protocols that provide encryption and authentication
  11. A common tool used by many Linux administrators
  12. a good security enhancement for servers that aren’t physically secure
Down
  1. can be set in the Local Security Policy console found in Administrative Tools
  2. allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
  3. tool used to delete unneeded files in Windows
  4. disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
  5. a unique biometric identifying trait. What the user is
  6. document that describes the rules governing access to an organization’s information resources
  7. creates a barrier between two entities
  8. prevents people from using eavesdropping technology

20 Clues: what the user has (smart card or key)creates a barrier between two entitiestool used to delete unneeded files in WindowsThe most widely used method for encrypting dataA common tool used by many Linux administratorsprevents people from using eavesdropping technologya unique biometric identifying trait. What the user is...

Russia Comp Gov 2025-11-17

Russia Comp Gov crossword puzzle
Across
  1. Russian court with judicial review (on Putin's request)
  2. Russia and Nigeria are both one (thanks to oil)
  3. describes electoral methods of both Federal Assembly and Mexican Congress
  4. Gorbachev restructuring reforms introducing limited market and political change
  5. System combining directly elected president with a prime minister and cabinet
  6. Formerly the Russian Communist party but now the Liberal Democratic Party of Russia
  7. founder of Smart Voting, now dead
  8. Soviet-era party appointment system whose networks still shape Russian elites
  9. can change internal boundaries and ratify treaties
  10. run by "super-governors"
  11. term of office for both Putin and Sheinbaum
  12. Eg. Republic of Altai vs Altai Krai
  13. Restive North Caucasus region with separatist conflict against Moscow
Down
  1. Putin's role during Medvedev's presidency
  2. Business magnates in Russia, created during shock therapy
  3. Gorbachev policy of openness that loosened censorship and controls
  4. Term for Russia’s controlled elections, media, and opposition
  5. Russian state-controlled natural gas giant often used as a foreign policy tool
  6. Rough functional equivalent of the UK House of Commons, but with far less independence
  7. Russian equivalent of Mexico’s old PRI-style dominant party
  8. Long-serving Russian president associated with managed democracy
  9. Fortress-like seat of Russian executive power in Moscow
  10. Using legal rules to serve those in power rather than to limit the state
  11. Putin ally who served one term as president before returning to prime minister
  12. The new KGB/FSB

25 Clues: The new KGB/FSBrun by "super-governors"founder of Smart Voting, now deadEg. Republic of Altai vs Altai KraiPutin's role during Medvedev's presidencyterm of office for both Putin and SheinbaumRussia and Nigeria are both one (thanks to oil)can change internal boundaries and ratify treatiesRussian court with judicial review (on Putin's request)...

FINISH DIGTIAL CITIZENSHIPS CROSSWARD FOR FREE CAR EXTENDED WARENTY 2025-12-01

FINISH DIGTIAL CITIZENSHIPS CROSSWARD FOR FREE CAR EXTENDED WARENTY crossword puzzle
Across
  1. legal protection for any piece of tangible forms
  2. using someone elses words or work for your own use without any credit
  3. bullying online, social media, text, any use of techonoly
  4. a type of crime scammers commit when pretending to be legit sources to hack or steal data
  5. Data that tracks your history online
  6. an instrument used to measure mass
  7. ability to access and analyze all forms of commucation
  8. principals that influence someone's behaviors or beliefs
  9. computer systems used for learning through human intelegence
  10. awareness of thoughts and feelings
  11. the use of graphics, sounds, ect to enhance real life in digital settings
  12. understanding or sharing feelings with an indivual
Down
  1. allows limited use of copyrighted items for criticsm, research, ect
  2. ethical use of technology
  3. Someone who uses the internet responsibly
  4. technology obsession
  5. information used to trick people
  6. incorrect information
  7. data like name, address, socail security number, ect
  8. someone who witnesses something happen
  9. a feature used to restrict or allow software, apps, ect
  10. rules for appropriate behavior online
  11. profiles, usernames, ect
  12. someone who witnesses something and tries to do something about it
  13. ability to control how information is used, shared, ect
  14. converting data to unreadable code
  15. protection for networks and data from scammers
  16. an organization that helps empower people for culture and knowledge
  17. time spent on devices
  18. process of following calculations for opperations

30 Clues: technology obsessionincorrect informationtime spent on devicesprofiles, usernames, ectethical use of technologyinformation used to trick peoplean instrument used to measure massconverting data to unreadable codeawareness of thoughts and feelingsData that tracks your history onlinerules for appropriate behavior online...

AI crossword 2023-09-17

AI crossword crossword puzzle
Across
  1. The highest form of AI which surpasses human intelligence and ability, potentially able to improve itself autonomously.
  2. These are the main building blocks of neural networks, similar to neurons in the human brain.
  3. The branch of AI that enables computers to understand and interpret visual information from the world.
  4. A subset of AI that allows computers to understand, interpret, and generate human language.
Down
  1. A broad branch of machine learning based on learning data representations, as opposed to task-specific algorithms.
  2. This type of AI specializes in performing a narrow task and its intelligence is confined to a narrow domain.
  3. Theprocess of machines learning from data to identify patterns and make decisions with little to no human intervention.

7 Clues: A subset of AI that allows computers to understand, interpret, and generate human language.These are the main building blocks of neural networks, similar to neurons in the human brain.The branch of AI that enables computers to understand and interpret visual information from the world....

Self-Directed Learner 2023-09-29

Self-Directed Learner crossword puzzle
Across
  1. A hybrid learning model that combines both traditional in-person instruction and online or digital learning components
  2. challenges or obstacles that adult learners may face, such as lack of access to education, work-life balance, or motivation issues.
  3. A theory that emphasizes learning in the digital age, where learners connect to resources and networks to acquire knowledge.
Down
  1. The practice of effectively allocating time for learning activities, work, and personal responsibilities.
  2. The concept of continuous learning and skill development throughout one's life’
  3. A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior
  4. he theory and practice of teaching and educating adults, emphasizing self-directed learning and the unique needs of adult learners.

7 Clues: The concept of continuous learning and skill development throughout one's life’The practice of effectively allocating time for learning activities, work, and personal responsibilities.A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior...

BM2501 2019-10-28

BM2501 crossword puzzle
Across
  1. _____ marketing describes any strategy that encourages individuals to pass on a marketing message to others, creating the potential for exponential growth in the message's exposure and influence.
  2. _____ marketing involves staging an event that generates excitement, curiosity and publicity to provide information to consumers.
  3. Word of mouth marketing is when a consumer’s interest in a company’s product or service is reflected in their daily _____.
Down
  1. Social currency is derived from social _____ theory.
  2. Social ______ refers to the actual and potential resources from presence in social networks and communities
  3. _____ messages are required to allow others to effortlessly transfer messages to one another.

6 Clues: Social currency is derived from social _____ theory._____ messages are required to allow others to effortlessly transfer messages to one another.Social ______ refers to the actual and potential resources from presence in social networks and communities...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

Information Security 2024-05-07

Information Security crossword puzzle
Across
  1. Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock.
  2. describes methods for ensuring that data stored on a computer system is protected against unauthorized access.
  3. is a very broad term that includes spyware, ransomware, and viruses.
Down
  1. is a computer user who enters/breaks into computer systems using hacking tools for their own personal gain without permission.
  2. is a type of malware that enters in system and hides as if it is a legitimate program.
  3. spread on their own through computer networks and don’t require the infected program to execute to activate.

6 Clues: is a very broad term that includes spyware, ransomware, and viruses.is a type of malware that enters in system and hides as if it is a legitimate program.Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock....

Computer System Servicing 2- Software Applications and Vi 2025-01-23

Computer System Servicing 2- Software Applications and Vi crossword puzzle
Across
  1. infecting applications on a host computer
  2. they can completely cripple entire computer networks and can easily replicate and spread by using the internet to transfer to devices connected to the network.
  3. virus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself.
Down
  1. virus disguised to look like something it is not
  2. This allows cyber criminals to attack major websites, such as social networking sites, email providers, and any site that enables user input or reviews.
  3. they can delete data and replace it with their own file content or code

6 Clues: infecting applications on a host computervirus disguised to look like something it is notthey can delete data and replace it with their own file content or codevirus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself....

NETWORKING QUIZ 2025-05-17

NETWORKING QUIZ crossword puzzle
Across
  1. Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
  2. A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
  3. terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
  1. Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
  2. Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
  3. Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
  4. are five key terminologies used in performing network security:

7 Clues: are five key terminologies used in performing network security:terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats....

VID for the Enterprise 2024-01-24

VID for the Enterprise crossword puzzle
Across
  1. Provide users with on-demand access to software applications, allowing them to use the software without worrying about the complexities of installation, maintenance, or infrastructure management
  2. Enables users to run applications, process data, and perform various computational tasks without the need for owning physical hardware.
  3. Enables communication and connectivity between various resources and services within a cloud environment
  4. protecting data, systems, and networks from unauthorized access, attacks, and damage.
Down
  1. Refers to the physical components, such as servers, storage devices, and networking equipment, that form the foundation of cloud computing
  2. Provides users with scalable and flexible data storage solutions over the internet
  3. Offers development tools, middleware, automated deployment, scalability, and maintenance and updates
  4. provides a level of abstraction between the physical hardware resources and the virtualized resources that users interact with

8 Clues: Provides users with scalable and flexible data storage solutions over the internetprotecting data, systems, and networks from unauthorized access, attacks, and damage.Offers development tools, middleware, automated deployment, scalability, and maintenance and updates...

Happy ageing! 2019-04-17

Happy ageing! crossword puzzle
Across
  1. ______ Nation is a national initiative to harness infocomm technologies, networks and big data to create tech-enabled solutions.
  2. There are 6 different categories of NSA courses: 1) Health & Wellness, 2) IT & Science, 3) Media, Arts & Design, 4) Ageing & Life Skills, 5) Finance & Business and 6)________
  3. What kind of software should I install to prevent malware infection?
Down
  1. NSA has ad-hoc learning opportunities such as ________ Learning Programme that match youths and seniors in a group learning environment.
  2. A method in which cyber criminals use to fraudulently obtain your personal and financial information such as your login details, bank account numbers and credit card numbers.
  3. Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense.
  4. _______ is also known as for malicious software.
  5. A "guitar" that has 4 strings instead of 6.

8 Clues: A "guitar" that has 4 strings instead of 6._______ is also known as for malicious software.What kind of software should I install to prevent malware infection?Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense....

paper 2 2022-12-13

paper 2 crossword puzzle
Across
  1. Attempting to gain access to a computer system that you do not have permission to access
  2. Ensuring that sensitive data is only disclosed to necessary personnel, such as employee records are only processed by staff within the HR department
  3. The right of all people to keep their personal data confidential
  4. The process of scrambling data so it can be securely stored, or sent securely over networks so that it can be understood only by its intended recipient
Down
  1. an assessment of the practicality of a project or system
  2. Collective term for unwanted and damaging software such as viruses, ransomware, worms and Trojan horses
  3. Security measure that controls incoming and outgoing network traffic using a set of rule
  4. Duplicated data to a separate storage media in case the original data is lost
  5. Anyone who has an interest in, or is affected by, the development of a product or the actions of an organisation

9 Clues: an assessment of the practicality of a project or systemThe right of all people to keep their personal data confidentialDuplicated data to a separate storage media in case the original data is lostSecurity measure that controls incoming and outgoing network traffic using a set of rule...

techno-addictions 2022-10-06

techno-addictions crossword puzzle
Across
  1. Disproportionate inclination towards the use of technologies, which limit human freedom and generate dependence.
  2. Feeling of not being able to live without the Internet, which is detrimental to your personal and professional relationships.
  3. Category of games based on impulsive play, which require payment to advance and access better features.
  4. Impulsive search for information at the first possible symptom of discomfort or disease.
Down
  1. Feeling of anxiety, when you cannot use your cell phone.
  2. Tendency to forget the information or where we can get it, by always using Google for any query on the Internet.
  3. Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks.
  4. The action of undervaluing those who accompany you, when you pay attention to your cell phone instead of them.
  5. Phantom' vibration, feeling that the phone is vibrating when in fact it has not vibrated and no input has been registered.

9 Clues: Feeling of anxiety, when you cannot use your cell phone.Impulsive search for information at the first possible symptom of discomfort or disease.Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks.Category of games based on impulsive play, which require payment to advance and access better features....

Chapter 13: Education 2019-05-08

Chapter 13: Education crossword puzzle
Across
  1. an overemphasis on credentials (e.g. college degrees) for signaling social status or qualifications for a job
  2. when members of a negatively stereotyped group are placed in a situation where they fear they may confirm those stereotypes
  3. a set of policies that grant preferential treatment to a number of particular subgroups within the population – typically women and historically disadvantaged racial minorities
  4. the symbolic and interactional resources that people use to their advantage in various situations
Down
  1. the information, knowledge of people, and connections that help individuals enter, gain power in, or otherwise leverage social networks
  2. hypothesis stating that parental resources are finite and that each additional child gets a smaller amount of them
  3. the nonacademic and less overt socialization functions of schooling
  4. a way of dividing students into different classes by ability or future plans
  5. the process through which academic, social, and cultural skills are developed

9 Clues: the nonacademic and less overt socialization functions of schoolinga way of dividing students into different classes by ability or future plansthe process through which academic, social, and cultural skills are developedthe symbolic and interactional resources that people use to their advantage in various situations...

The Mafia 2024-01-29

The Mafia crossword puzzle
Across
  1. and sell protection to businesses and resolve disputes among both criminal and legitimate actors.
  2. a system or organization in which people or groups are ranked one above the other according to status or authority
  3. the state, which he defined as the monopoly of legitimate force over a given territory
  4. a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences.in order to obtain directly or indirectly, a financial or material benefit.
  5. a pattern of relationships between and among individuals and social groups
  6. hierarchies consisting of a limited number of mafiosi drawn from networks of socially close people
Down
  1. monopolize the provision of some illicit service or product utilizing Violence
  2. also known as team leaders
  3. a real, active, and operating commercial or entrepreneurial undertaking which produces services or goods for profit

9 Clues: also known as team leadersa pattern of relationships between and among individuals and social groupsmonopolize the provision of some illicit service or product utilizing Violencethe state, which he defined as the monopoly of legitimate force over a given territory...

Living Online 2015-08-24

Living Online crossword puzzle
Across
  1. Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
  2. Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
  3. Wireless technology used to network computers together and to other devices like printers or servers.
  4. Any machine attached to a network: client, server, printer, and so on.
  5. Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
  6. Copying something created by someone else not giving credit
  7. Bad hacker who creates malicious programs to break into computers and do harm
  8. Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
  9. Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
  10. A program or feature used to block spam or e-mail messages from specific senders
  11. Standards used to control how data is sent over a network
  12. Businesses that have a physical location.
  13. Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
  14. Boolean operator that excludes specific words from search results.
  15. Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
  16. Unique name given to each network and used to identify specific e-mail and Web servers.
  17. A delivered e-mail message has been ___________.
  18. Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
  19. E-mail attack or scam designed to gather information from a user while appearing to be safe
Down
  1. Disposing of paper and other products so they can be processed for reuse
  2. Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
  3. Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
  4. Saved URL
  5. Part of an IP address that defines the network from which a user is then accessing the Internet.
  6. Buying and selling products and ser¬vices by bidding over the Internet
  7. Boolean search operator that requires both search terms to be included in the search results
  8. Sending an existing e-mail message on to a new recipient
  9. Any field in a form on a Web page or other document where the user can enter text.
  10. Microsoft’s dedicated e-mail soft¬ware program.
  11. Most popular search engine.
  12. Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
  13. Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
  14. Used by machines like an ATM to conduct secure transactions.
  15. Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
  16. Default Web page that opens when a browser is launched.
  17. Unsolicited e-mail message sent by someone you don’t know.

36 Clues: Saved URLMost popular search engine.Businesses that have a physical location.Microsoft’s dedicated e-mail soft¬ware program.A delivered e-mail message has been ___________.Default Web page that opens when a browser is launched.Sending an existing e-mail message on to a new recipientStandards used to control how data is sent over a network...

HOI 2020-02-25

HOI crossword puzzle
Across
  1. / a series of coded software instructions to control the operation of a computer or other machine
  2. social network / is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
  3. / a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
  4. reader / s a mobile electronic device that is designed primarily for the purpose of reading digital e-books
  5. / combining 2 or more functions in a unit.
  6. / an extra copy of data on a computer.
  7. engine / is designed to carry out web search, which means to search the World Wide Web
  8. device / A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
  9. console / a piece of electronic equipment for playing games on
  10. / cause to occur or operate at the same time or rate
  11. computing / is an application of environmental science which offers economically possible solutions that conserve natural environment and its resources
  12. device / is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
  13. / an application, downloaded usually by a mobile user.
  14. / is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
  15. / a program with graphic interface on a world wide web.
  16. / a location connected to the Internet that maintains one or more pages on the World Wide Web
  17. / a group or system of interconnected people or things
  18. device / is any piece of computer hardware equipment which converts information into human-readable form.
  19. server / a computer program that distributes web pages as they are requisitioned
Down
  1. / type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
  2. drive / a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
  3. media player / a handheld electronic device for playing digital media such as audio and video files
  4. device convergence / means the ability to view the same multimedia content from different types devices and thanks to the digitization of content
  5. / short-range wireless interconnection of devices.
  6. / a program or piece of software made to fulfill a purpose.
  7. storage / a model of computer data storage in which the digital data is stored in logical pools.
  8. / a machine for printing text or pictures onto paper, especially one linked to a computer.
  9. / the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
  10. / synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
  11. / the programs and other operating information used by a computer.
  12. device / a wearable device is a technology that is worn on the human body
  13. / a computer or computer program which manages access to a centralized resource or service in a network
  14. / the faculty by which the mind stores and remembers information
  15. / is basically a system of Internet servers that support specially formatted documents.

34 Clues: / an extra copy of data on a computer./ combining 2 or more functions in a unit./ short-range wireless interconnection of devices./ cause to occur or operate at the same time or rate/ an application, downloaded usually by a mobile user./ a group or system of interconnected people or things/ a program with graphic interface on a world wide web....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  2. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  3. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  4. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  5. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  6. Type of attacker that Promote political ideology.
  7. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  8. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
  9. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  10. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
Down
  1. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  2. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  3. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  4. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  5. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  6. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  7. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  8. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  9. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of programming code is attached to a file, so that when the infected file is opened, the code executes
  10. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  11. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  12. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  13. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.

23 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  2. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  3. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  4. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  5. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  6. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  7. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  8. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  9. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  10. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  11. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  12. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  13. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
Down
  1. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
  2. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  3. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  4. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
  5. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  6. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  7. Type of attacker that Promote political ideology.
  8. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  9. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  10. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.

23 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  2. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
  3. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  4. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  5. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  6. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  7. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  8. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  9. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  10. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  11. Type of attacker that Promote political ideology.
  12. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Down
  1. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  2. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  3. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  4. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  5. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  6. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  7. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  8. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  9. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  10. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes

22 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  2. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  3. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  4. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
  5. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  6. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
  7. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  8. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  9. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  10. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  11. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  12. Type of attacker that Promote political ideology.
Down
  1. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  2. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  3. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  4. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  5. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
  6. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  7. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  8. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
  9. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  10. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.

22 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

Final Review 2023-11-27

Final Review crossword puzzle
Across
  1. Contains users and computer settings and policies.
  2. This configuration change allows admins to improve VoIP.
  3. The amount of time that the data can be stored in the DNS cache.
  4. This technology is also referred to as a PAN.
  5. A group of networks that are geographically isolated but are connected by ISPs.
  6. This email protocol is used to send emails.
  7. Changing this value in Task Manager provides adequate attention from the system CPU to a process.
  8. A secure remote access protocol.
  9. Is used to encrypt the entire volume.
  10. IP address on the 169.254.0.0 network assigned by hosts to themselves.
  11. Public key encryption happens in this OSI model layer.
  12. File Access Protocol which can be protected.
  13. Windows admin utility that allows admins to aggregate different admin tools.
  14. A list that contains information on allowed and denied access to folders and files.
  15. Tis virtualization component provides the hardware needed.
  16. The DNS servers hold the original and official DNS records for a specific domain.
  17. This kernel component moves the data of an app not currently being accessed from RAM to a paging file.
  18. This email Protocol is used to retrieve emails.
  19. In a TCP connection hosts send this packet to establish a connection.
  20. The rights granted to a user or group to access files and folders.
  21. A thin layer of software that resides between the virtual machine and hardware.
  22. This Linux command is used to change permissions.
  23. This attribute is unique for all objects in a domain.
  24. Is responsible for converting logical data into an acceptable form for transmission.
  25. Hubs physical topology.
  26. This OSI model layer is responsible for end-to-end communication.
  27. This command allows you to resolve a hostname to its associated IP address.
  28. A type of system software on SOHO routers.
  29. This type of Windows installation is used when a compatible OS needs to be upgraded.
Down
  1. .com, .net, and .ca are registered under this DNS server.
  2. This topology describes how the network's computers are connected.
  3. TCP protocol sends this to start the handshake negotiation.
  4. A reliable Transport layer protocol.
  5. Is a lightweight Active Directory Protocol.
  6. In this network type, organization resources are shared with suppliers.
  7. A file created by the hypervisor to store data.
  8. The process of proving someone's identity.
  9. This application layer protocol uses TCP port 3389.
  10. Simple Multi-tenancy is associated with this cloud type.
  11. This wireless feature allows a printer connection with the least effort.
  12. Type of network is available privately to employees.
  13. Disabling this option creates unique permissions for a folder.
  14. These types of groups are created mainly for permissions.
  15. This application layer protocol uses TCP port 389.
  16. This cloud solution delivers everything a developer needs.
  17. This backup solution backs up every file that has changed since the last full backup.
  18. This VPN provides both authentication and encryption.
  19. The network name on a wireless network.
  20. The frequency at which your router sends and receives signals.
  21. This reference model is created to interpret network communication.
  22. This command in the Linux system is used to search for text.
  23. Uses TCP port 22 for remote access.
  24. This transport layer protocol is used when speed is the main concern.
  25. This device interconnects multiple networks to each other.

54 Clues: Hubs physical topology.A secure remote access protocol.Uses TCP port 22 for remote access.A reliable Transport layer protocol.Is used to encrypt the entire volume.The network name on a wireless network.The process of proving someone's identity.A type of system software on SOHO routers.Is a lightweight Active Directory Protocol....

CAT cross word 2024-10-09

CAT cross word crossword puzzle
Across
  1. Software that is available for use at no cost but may have restrictions on usage or distribution
  2. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
  3. Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
  4. Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
  5. The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
  6. A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
  7. A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
  8. A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
  9. Processing Unit, the primary component of a computer that performs most of the processing tasks.
  10. A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
  11. (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
  12. A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
  13. A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
  14. Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
  1. Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
  2. Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
  3. Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
  4. Central Processing Unit, the primary component of a computer that performs most of the processing tasks
  5. Malicious software designed to harm or exploit any programmable device or network.
  6. Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
  7. Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
  8. Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
  9. A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
  10. A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
  11. Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
  12. Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.

26 Clues: Malicious software designed to harm or exploit any programmable device or network.Software that is available for use at no cost but may have restrictions on usage or distributionProcessing Unit, the primary component of a computer that performs most of the processing tasks....

Cyber Security Review 2021-09-08

Cyber Security Review crossword puzzle
Across
  1. Use IP Address to pass the data between networks
  2. Reduce collisions because split the
  3. is software/hardware based network security system that controls the in and out network traffic
  4. _____________ Control Protocol
  5. Downloads onto a computer disguised as a legitimate program
  6. software intentionally designed to harm a network, server, or computer
  7. Data arriving to a _____ port is repeated on all the other ports
  8. Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
  9. Intentionally disrupting, defacing or destroying a Web site
  10. Destroy data when certain conditions are met
  11. is an object, person, or other entity that represents a constant danger to an asset
  12. is a flexible filament of very clear glass capable of carrying information in the form of light
  13. This address is a 48 bits long binary number unique for every network card
  14. A type of software security
  15. These IPs do not change. Whether you
  16. translates the locally significant source address into a globally unique address
  17. Is a device that plugs into a motherboard and provides ports for the network cable connections
  18. Doesn’t needs user intervention to replicates
  19. These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
  20. Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
  21. is a series of LANs linked together to form a network in an extended area
  22. Type of network that consists of a series of computers linked together to form a network in a circumscribed location
  23. person who intends to gain unauthorized access to a computer systems
  24. It forward the information based on MAC address list and ports
  25. your machine or reboot your router it remains the
Down
  1. Topology in which all nodes indirectly connect to each other through one or more switches
  2. A group of computers and associated devices that are connected by communications facilities
  3. These losses refer to damages of the operating capability of an organisation
  4. Its purpose is to regenerate signals distorted by transmission loss due to attenuation
  5. is a network that is spread over a very small area
  6. domains
  7. These losses refer to damages to the wealth of an organisation
  8. Activated when infected program is loaded in memory and executed by its own or a user action
  9. between computers on a network plural)
  10. In this topology data travels in one direction using a control signal called a ‘token’
  11. Fraudulent email leading to a fraudulent website
  12. Network topology where all the nodes are joined to one cable
  13. The practice and study of techniques for secure communication
  14. A type of physical security
  15. cable type that is commonly used on Ethernet networks
  16. is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
  17. to a computing device or node when it’s connected to a network
  18. is a temporary IP address that is
  19. Is a set of rules that governs the
  20. occurs when someone steals your personal information to commit crimes in your name
  21. the process of converting plaintext to ciphertext

46 Clues: domainsA type of physical securityA type of software security_____________ Control Protocolis a temporary IP address that isIs a set of rules that governs theReduce collisions because split theThese IPs do not change. Whether youbetween computers on a network plural)Destroy data when certain conditions are met...

SET 4 2023-01-22

SET 4 crossword puzzle
Across
  1. A technology that deals with the manipulation and control of matter at the atomic and molecular level
  2. Activity of pinpointing and resolving issues with softwares/technology
  3. protective barrier for computer networks and systems, like a security guard for your online information
Down
  1. A software that takes the source code of a program and turns it into machine  code that the computer can understand
  2. A digital code or symbol that represents an asset or a right, like a digital coupon or a gift card

5 Clues: Activity of pinpointing and resolving issues with softwares/technologyA digital code or symbol that represents an asset or a right, like a digital coupon or a gift cardA technology that deals with the manipulation and control of matter at the atomic and molecular level...

Cyber Security Awareness (3) 2024-10-15

Cyber Security Awareness (3) crossword puzzle
Across
  1. Probability of a cyberattack or data breach causing loss or exposure to an organization
  2. Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
  3. practice of protecting systems, networks, and programs from digital attacks
Down
  1. Text files that contain small amounts of data about a user that can be used for both good and bad purposes
  2. malicious program that can spread to a computer or network router without the user's knowledge or permission

5 Clues: practice of protecting systems, networks, and programs from digital attacksProbability of a cyberattack or data breach causing loss or exposure to an organizationText files that contain small amounts of data about a user that can be used for both good and bad purposes...

Tencho Definitions 2022-02-25

Tencho Definitions crossword puzzle
Across
  1. a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
  2. denoting or relating to a period of a thousand years.
  3. Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
  4. take (something) illicitly; steal.
  5. content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
  6. the state, fact, quality, or condition of being singular.
  7. a mobile device used while watching television especially to access supplementary content or applications
  8. someone who would like to start a business and thinks and talks about doing so, but never gets started.
  9. Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
  10. Data data that contains greater variety, arriving in increasing volumes and with more velocity
  11. fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
  12. Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
  13. business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
  14. Leader one whose views on a subject are taken to be authoritative and influential.
  15. Networks a computer system modeled on the human brain and nervous system.
  16. a course of study made available over the internet without charge to a very large number of people.
  17. the formation of ideas or concepts.
  18. a person, company, or technology that changes the way an industry operates.
Down
  1. a form of entertainment
  2. or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
  3. the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
  4. is King you should focus on putting out good content frequently and consistently.
  5. short for key performance indicator.
  6. a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
  7. reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
  8. an image, video, advertisement, etc., that is circulated rapidly on the internet.
  9. 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
  10. Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
  11. the correct or acceptable way of communicating on the internet
  12. posting a single message or piece of content to multiple destinations.
  13. the state or quality of being efficient.
  14. Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
  15. a person who introduces new methods, ideas, or products.

33 Clues: a form of entertainmenttake (something) illicitly; steal.the formation of ideas or concepts.short for key performance indicator.the state or quality of being efficient.denoting or relating to a period of a thousand years.a person who introduces new methods, ideas, or products.the state, fact, quality, or condition of being singular....

Chapter3_Internet Crime 2017-08-03

Chapter3_Internet Crime crossword puzzle
Across
  1. ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
  2. Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
  3. ______is a harmful program that resides in the active memory of the computer and duplicates itself.
  4. They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
  5. ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
  6. A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
  7. type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
  8. ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
  9. type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
  10. ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of prpgramming code is attached to a file, so that when the infected file is opened, the code executes
  11. ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
  12. Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Down
  1. Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
  2. In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
  3. ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
  4. Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
  5. Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
  6. ______is a program in which malicious code is hidden inside a seemingly harmless program.
  7. Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
  8. Type of attacker that Promote political ideology.
  9. ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
  10. ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
  11. Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.

23 Clues: Type of attacker that Promote political ideology.______is a program in which malicious code is hidden inside a seemingly harmless program.______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.______is a harmful program that resides in the active memory of the computer and duplicates itself....

PC PRO Chap 9 Key Terms 2020-03-06

PC PRO Chap 9 Key Terms crossword puzzle
Across
  1. The plastic casing around an electronic device's screen.
  2. A mobile communications standard used by 5G.
  3. A feature that measures the vertical and horizontal orientation of the device.
  4. A port on a mobile device that enables devices to exchange data without using cables.
  5. A troubleshooting tool that identifies issues in installed apps.
  6. A system power state where they system appears to be off, but volatile memory is refreshed and some components remain powered so the computer can wake up quickly if it receives input from a keyboard, LAN, or USB device.
  7. A troubleshooting tool for Wi-Fi connectivity issues that identifies the number of broadcasting APs, displays the signal strength and channel of each wireless network, and obtains wireless network information such as the network type, data activity, and service provider.
  8. A semiconductor device that emits light when an electric current passes through it.
  9. A physical location where you can obtain wireless Internet access using a wireless local area network (WLAN) with a router connected to an internet service provider.
  10. Connecting one device to another.
  11. A power supply that converts DC power from a computer to AC power for a screen.
  12. The package file format used by the Android operating system for the distribution and installation of mobile apps and middleware.
  13. A unique number given to every single mobile phone. The number is typically found behind the battery.
Down
  1. A proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector.
  2. A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
  3. A wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).
  4. A troubleshooting tool for cellular network connectivity issues that reports signal strength, interference number of cell towers in the area, the location of each cell tower, and mobile network information such as the network type, data activity, and service provider.
  5. A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.
  6. Detects the physical movements of the tablet by measuring its linear acceleration in one dimension.
  7. The light that illuminates an LCD screen so that images on the screen are visible.
  8. A telecommunications interface standard used on an Integrated Services Digital Network (ISDN) to carry multiple DS0 voice and data transmissions between the network and a user.
  9. A database residing in a wireless device that contains information used during the system selection and acquisition process.
  10. An electronic display system that switches pixels on and off using liquid crystals that rotate polarized light.
  11. A space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
  12. A system power state where the system appears to be off and power consumption is reduced to a lower level.
  13. A unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card.

26 Clues: Connecting one device to another.A mobile communications standard used by 5G.The plastic casing around an electronic device's screen.A troubleshooting tool that identifies issues in installed apps.A feature that measures the vertical and horizontal orientation of the device....

EY Technology Review 2023-05-12

EY Technology Review crossword puzzle
Across
  1. Sometimes called a web or internet browser, a browser is a software program used to navigate the world wide web.
  2. Talk To You Later
  3. A company that connect people/homes/networks to the internet. Our ISP is Comcast.
  4. apples version of a word processor
  5. Laugh out loud
  6. Not right now
  7. apples version of presentation software
  8. The connection of the billions of devices, computers, websites, and networks connected together (with wires, signals, satellites etc) sharing information and communicating.
  9. most common spreadsheet software there is. Owned by Microsoft.
  10. Microsoft cloud service
  11. Often called a PDF.A versital file type readable by almost all hardware/software/operating systems.  A very useful way to lock and share files.
  12. Googles Cloud service
  13. googles version of presentation software
  14. Your wireless connection to a network that hopefully is connected to the internet.
  15. one of the big 3 companies known for androids, search engines, gmail
  16. googles version of spreadsheet software
  17. An awesome technology teach
  18. A popular company with a variety of useful software that tend to specialize in multimedia and other creativity packages
  19. Hit Me Up
  20. collection of pages (more then 1) grouped together and published together. Often they have a theme to them. We spoke of the Boulder Boulder site having a registration page, map page, photo page, parking page etc...
  21. when you verify somebody or something is who/what they say they are
  22. Rolling on the floor laughing
  23. A devices that converts your data/requests into transferable packets the be sent/received across the internet. Your connection to the ISP whom connects you to the internet
Down
  1. A bookmark, sometimes called a “favorite,” saves a web page’s address. Allows you to access your favorites without typing…
  2. If you are connected to the internet.
  3. big 3 company known for iphones, ipads, graphics, macs, music
  4. big 3 companies known for productivity software Office, PCs, etc
  5. a single page/document containing information posted on the internet for people to see/use
  6. Thank goodness it's Friday
  7. googles version of a word processor
  8. IOT… what the internet has become now that everything we have is pretty much monitoring, connected, and communicating on a network… fridgerator, car, phone, printer, AC, … The dryer telling date the laundry was done.
  9. Microsofts version of presentation software
  10. Let Me Know
  11. When you use more then on form of information to verify/authenticate.  Commonly something you 'know' (like password, phrase, dob) and something you 'have" that is physical like an ID badge, finger print, eye scan etc.
  12. apples version of spreadsheet software
  13. When you shut off your wireless signal to the internet. You can still use your device it just only has access to information stored on it.
  14. microsofts version of a word processor software
  15. The interconnection of information on webpages (and now websites) linked together through the internet. The WWW or "web" is often incorrectly used by people when they mean internet. The Web is not the internet but rather a part of the internet.
  16. Be Right back
  17. 2 or more computers/devices connected together (wired or wireless) sharing information. Think of all the devices in our house connected together.
  18. Plan Do Check Act
  19. If you are not connected to the internet

42 Clues: Hit Me UpLet Me KnowNot right nowBe Right backLaugh out loudTalk To You LaterPlan Do Check ActGoogles Cloud serviceMicrosoft cloud serviceThank goodness it's FridayAn awesome technology teachRolling on the floor laughingapples version of a word processorgoogles version of a word processorIf you are connected to the internet....

stem careers 2023-06-01

stem careers crossword puzzle
Across
  1. take what the network architect has done and ensure the day-to-day operation of these networks runs smoothly.
  2. studies microorganisms
  3. is a scientist who works with designing scientific equipment
  4. spend their time making sure databases run efficiently by securing data and storing it appropriately.
  5. spends their time designing equipment and creating a process for manufacturing chemicals and products.
  6. fix things in house with water
  7. help with money
  8. works with computer
  9. fix peoples eyes
  10. fix peoples insides
  11. cut hair
  12. help students learn
  13. helps doctors
  14. fix engines
  15. fix things with electricity
  16. build things like houses
  17. work with space
  18. fix people's mouths with braces and stuff that hurts
  19. put their engineering skills to use by working on circuit boards, processors, memory devices, networks, and routers by researching, designing, and developing systems.
  20. studies the Earth
  21. do stuff with math like solving hard problems
  22. make food
  23. extract metals or minerals from sites they established may have mineral deposits
  24. use telescopes to study planets
  25. They can take materials and create products from medical devices all the way down to golf clubs
  26. help pets
  27. work with stuff in water
  28. try to improve the quality of products and ensure they are safe
  29. help people with their fitness
  30. work with chemicals
  31. will work closely with a mathematician to design surveys or experiments to collect the data to support or disprove a hypothesis.
  32. design things on the web
  33. work with animals
  34. also known as java developers, spend their time in the nuts and bolts of tech as they build, program, design, and maintain software.
  35. does exactly that; they develop and implement tests to find software issues
Down
  1. make stuff for industrial use
  2. conduct research into fundamental computer and information science to develop solutions to problems.
  3. work with stats
  4. engineer stuff all around
  5. estimate how much things are
  6. is in the name, because these individuals actually design and build large databases
  7. job is to ensure products meet safety standards by monitoring chemical processes
  8. These engineers solve problems surrounding agricultural problems like pollution, power supplies, and the efficiency of agricultural machinery.
  9. design buildings
  10. only focus is to improve human health
  11. takes engineering to the next level by designing ways to extract natural gas and oil from the earth.
  12. strives to improve the environment at all costs.
  13. are similar to archeologists in the sense that they study culture
  14. solves problems
  15. may also get the joy of designing entire electrical systems!
  16. monitors security measures to protect information
  17. work with a variety of structures and chemical properties to manipulate them in order to enhance products or create new ones
  18. spend their time improving business decision making and policy formulation by interpreting applicable mathematical information.
  19. plan transportation
  20. fly planes
  21. make things with computer
  22. help people with their mouth
  23. job is to improve overall human health by investigating diseases and establishing methods to prevent or treat them.
  24. takes their knowledge of mathematics and statistics to solve problems that may occur in the real world.
  25. develop and maintain websites

60 Clues: cut hairmake foodhelp petsfly planesfix engineshelps doctorswork with statssolves problemshelp with moneywork with spacedesign buildingsfix peoples eyesstudies the Earthwork with animalsworks with computerfix peoples insidesplan transportationhelp students learnwork with chemicalsstudies microorganismsbuild things like houses...

Unit 2 Vocabulary Quiz 2025-10-02

Unit 2 Vocabulary Quiz crossword puzzle
Across
  1. Lotus Society: a secret society that began organizing to overthrow the Yuan Dynasty
  2. Horde: Batu's army that pushed westward through Russia and then into Europe
  3. an arrangement to receive cash, goods, or services now and pay for them in the future
  4. Economy: using money rather than bartering with commodities like cowrie shells or salt
  5. Ocean Slave Trade: slaves from eastern Africa were sold in northern Africa, the Middle east, and India. This led to African customs spreading throughout these areas
  6. the four regional Mongol kingdoms that arose after the death of Genghis Khan
  7. Compass: navigation tool for determining direction that allowed ships to travel without following the coast
  8. Bow: a versatile weapon that provided the Mongol cavalry with superior range, accuracy, and mobility, contributing to their military dominance and conquests
  9. a central component of Mongol society, characterized by their mobile lifestyle, reliance on animal husbandry, and skilled horsemanship, which enabled the Mongols to establish a vast empire through their expertise in mounted warfare and strategic mobility
  10. of Exchange: documents stating the holder was legally promised payment of a set amount on a set date
  11. continual eating of grasses or their roots without allowing them to regrow which led to abandonment of cities outside of Great Zimbabwe in the late 1400s
  12. Mongolica: the period of Mongolian peace between the 13th and 14th centuries
  13. settlements of people away from their homeland arising from trade
  14. Rudders: invented by the Chinese and made steering ships easier and more stable
  15. invented in China in the 9th century; used in siege warfare like cannons in the Song Dynasty
  16. Trade: route across the Sahara Desert; traded for gold and salt, created caravan routes, economic benefit for controlling dessert, camels and camel saddles were crucial in the development of these trade networks; facilitated the spread of Islam
  17. Weapons: portable towers and catapults
  18. Money: a system of credit developed in China that allowed a person to deposit money at one location and withdraw it at another
  19. Diffusion: the spread of ideas, religions and products often resulting from trade
Down
  1. a military unit consisting of approximately 10,000 soldiers, led by a commander known as a noyan, and formed the backbone of the Mongol military organization during their conquests
  2. groups of people traveling together for mutual protection, often with pack animals such as camels
  3. Ships: Arab ships with lateen sails; strongly influenced European ship design; facilitated trade in the Indian Ocean networks
  4. Bubonic Plague: Mongol conquests brought fleas that carried the bubonic plague to Asia and Europe
  5. Houses: issued bills of exchange; model for modern banks
  6. heavy winds that affected trade routes in the Indian Ocean
  7. Hanseatic League: a commercial alliance that formed between northern German cities and Scandinavia in the 13th century
  8. Sail: triangular shaped sail that could catch wind from many different directions
  9. Saddle: saddles developed by South Arabians as the use of the camel spread
  10. a fine blue and white ware from China
  11. Chinese sailing ship that developed during the Song Dynasty
  12. (or caravansary): inns that popped up about 100 miles apart (the distance camels could go before they needed water) along the routes of the Silk Roads
  13. an instrument used to determine latitude by measuring the position of the stars
  14. meeting of Mongol chieftains in 1206 where Temujin "Genghis Khan” was elected khan of the Mongolian Kingdom
  15. Script: system of writing that Genghis Khan adopted for the Mongol Empire
  16. Erosion: overuse of farmland and deforestation reduced agricultural production in feudal Europe

35 Clues: a fine blue and white ware from ChinaWeapons: portable towers and catapultsHouses: issued bills of exchange; model for modern banksheavy winds that affected trade routes in the Indian OceanChinese sailing ship that developed during the Song Dynastysettlements of people away from their homeland arising from trade...

CHAPTER 18 TERMS 2020-09-10

CHAPTER 18 TERMS crossword puzzle
Across
  1. Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
  2. contain events triggered by applications or programs determined by their programmers
  3. Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
  4. the facility to which the message refers.
  5. a device that test the speed of data transfer in the network.
  6. are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
  7. detects unwanted attempts to manipulate network systems and/or environments
  8. a single digit code from 0 to 7 that indicates the severity of the message.
  9. most popular form of TCP scanning
  10. displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
  11. is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
  12. used for sniffing wireless networks
  13. protocol analyzers such as load testing, connectivity testing, and throughput testing.
  14. contain events generated by Windows system component, including drivers and services that started or failed to start.
  15. the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
  16. analyzes protocols
  17. looks inside every packet on a network segment.
Down
  1. text string containing detailed information about the even being reported.
  2. the standard level of performance of a certain device or to the normal operating capacity for your whole network.
  3. date and time of a message.
  4. a text string that uniquely describes the message.
  5. a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
  6. a powerful enterprise (large corporate environment) network intrusion and prevention system.
  7. a device that test the speed of data transfer in the network.
  8. contain security events like valid logon attempts and potential security problems
  9. a term for software products and services combining security information management and security event management.
  10. is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
  11. stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
  12. sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
  13. a software tool designed to search a host for open ports.
  14. a combination cable tester and network analyzer, only better because it comes with more options.
  15. is a computer security device that monitors network and/or system activities for any strange or malicious behavior
  16. scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
  17. a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
  18. Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
  19. supports plaintext authentication with community strings and uses only UDP.
  20. an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.

37 Clues: analyzes protocolsdate and time of a message.most popular form of TCP scanningused for sniffing wireless networksthe facility to which the message refers.looks inside every packet on a network segment.a text string that uniquely describes the message.a software tool designed to search a host for open ports....

AWS Quiz III 2022-06-10

AWS Quiz III crossword puzzle
Across
  1. is an edge computing, data migration, and edge storage device that comes in two Options.
  2. is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
  3. is a highly available and scalable cloud Domain Name System (DNS) web service.
  4. provides a single location to track the progress of application migrations across multiple AWS and partner solutions
  5. is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
  6. is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
  7. is an object storage service that offers industry-leading scalability, data availability, security, and performance.
  8. is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
  9. lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
  10. provides alerts and remediation guidance when AWS is experiencing events that might affect you.
  11. is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
  12. provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
  1. makes it easy to establish a dedicated network connection from your premises to AWS.
  2. running on AWS
  3. is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
  4. gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
  5. can migrate your data to and from most widely used commercial and open-source databases.
  6. is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
  7. is a networking service that improves the availability and performance of the applications that you offer to your global users.
  8. enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
  9. provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
  10. is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
  11. provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
  12. is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
  13. is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
  14. makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
  15. is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
  16. helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

28 Clues: running on AWSis a highly available and scalable cloud Domain Name System (DNS) web service.makes it easy to establish a dedicated network connection from your premises to AWS.is an edge computing, data migration, and edge storage device that comes in two Options....

The Media 2024-03-26

The Media crossword puzzle
Across
  1. print and digital forms of communication—including television, newspapers, radio, the internet, and social media sites—that convey information to large audiences
  2. news organizations that mix opinion-driven journalism with factual reporting in order to appeal to consumers who are ideologically liberal or conservative; often characterized by ideological agenda setting, priming, and framing
  3. news reporting and political commentary by ordinary citizens and bystanders, advocacy groups, and eyewitnesses to crises, often using cell phone images or video and distributed via social media
  4. the tendency to favor information that confirms a person's existing beliefs; it involves discounting evidence that could disprove or challenge those beliefs
  5. the requirement that broadcasters provide candidates for the same political office with equal opportunities to communicate their messages to the public
  6. false, inaccurate, or misleading information in the media, especially social media; often targeting political candidates and leaders, mis_information can include mani_pulated or fabricated content, satire, and parody content to the public via airwaves on electromagnetic frequencies
  7. the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs
  8. websites that pull together news from a wide range of online sources and make them available on one platform or page; news aggregators can be a way to avoid partisan or filtered news, providing a broad overview of the news of the day from many sources
  9. digital sites that are owned and managed by newspapers, follow the principles of journalism, and deliver content like that of print newspapers, with similar story layout for all users regardless of location, demographic characteristics, partisanship, or friend networks
  10. communication methods such as television and radio; they tend to take the form of one publisher (e.g., a television station) to many (viewers)
Down
  1. partisan media environments in which users are exposed primarily to opinions and information that conform to their existing beliefs; constructed by algorithms that analyze and then personalize each user's online experience
  2. a Federal Communications Commission regulation giving individuals the right to respond to personal attacks made on a radio or television broadcast
  3. closed communication systems in which individual beliefs are amplified or reinforced by repetition; they may increase social and political polarization because users do not encounter opposing views
  4. the process of calling attention to some issues, and not others, when reporting on political events and officials
  5. a form of reporting in which the media adopt a skeptical or hostile posture toward the government and public officials
  6. reporting that involves being as accurate, fair, and balanced as possible, relying on original sources, being transparent about citing sources, and presenting multiple viewpoints
  7. giant, often global, corporations that control a wide array of media, including television networks, movie studios, record companies, cable channels, book and newspaper publishers, and digital media outlets
  8. the process of presenting information from a certain perspective in order to shape the audience's understanding of that information
  9. software programs that analyze the viewing, liking, and commenting data of all of a platform's users, as well as individual users' prior data, to present users with additional content tailored to their individual interests instead of ordering posts based on the most recently published (as broadcast media do)
  10. the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking
  11. the media's designation of some issues, events, or people as important and others not

21 Clues: the media's designation of some issues, events, or people as important and others notthe putting forth of opinion and information that is consistent with the consumer's preexisting beliefsthe publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking...

Unit 2 Terms 2024-10-28

Unit 2 Terms crossword puzzle
Across
  1. An economic system in which private actors own and control property in accord with their interests,
  2. Informal settlements within cities that have inadequate housing and squalid, miserable living conditions.
  3. a series of protests that resulted in violence and millions of dollars in damages.
  4. Newly landed immigrants seeking opportunities and looking for work needed affordable housing.
  5. American inventor and business magnate and the founder of Ford Motor Co, famous for inventing the Model T automobile
  6. An American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.
  7. A spanish-speaking quarter in a town or city
  8. The act of giving privilege or financial encouragement to a person or organization.
  9. collective refusal by employees to work under the conditions required by employers.
  10. The negotiations between union and management representatives over salaries, benefits, and working conditions
  11. processes that involve different activities that lead to the extraction of raw materials from the earth
  12. Scottish-born American inventor, scientist, and teacher of the deaf whose foremost accomplishments were the invention of the telephone
Down
  1. A violent strike at the Homestead Works in Pittsburgh over a lock out following a decision to cut wages by nearly 20%.
  2. The concentration of human populations into discrete areas
  3. an agreement between an employer and an employee in which the employee agrees not to join or remain a member of a labor union as a condition of employment.
  4. State and local laws passed from the end of Reconstruction in 1877 through the mid-1950s by which white southerners reasserted their dominance by denying African Americans basic social, economic, and civil rights, such as the right to vote.
  5. Successfully used a steam engine to drill for oil near Titusville, Pennsylvania and started the oil boom.
  6. A collection of articles which Steffens had written for McClure's Magazine, it reports on the workings of corrupt political machines in several major cities in the US
  7. Accomplished inventor and a painter, he developed an electric telegraph and then co-developed morse Code
  8. American aviation pioneers generally credited with inventing, building, and flying the world's first successful airplane.
  9. May 4, 1886, a labor protest rally near Chicago's Haymarket Square turned into a riot after someone threw a bomb at police.
  10. Fought for better wages, reasonable hours and safer working conditions.
  11. Land, labor, and capital resources, and entrepreneurship
  12. The use of a blast of hot air to purify molten iron and convert it into steel.
  13. The federal legislation that created a system in which federal employees were chosen based upon competitive exams.
  14. An organization linked to a political party that often controlled local government.
  15. An economic and political system that demands state ownership and control of the fundamental means of production and the distribution of wealth.
  16. Rail networks, bridges, energy systems, wastewater services, aviation networks, roadways, drinking water systems
  17. American mechanical engineer who sought to improve industrial efficiency
  18. Highlighted the dangerous working and living conditions for families working in the meatpacking industry in early 20th century Chicago and focuses on an immigrant family from Lithuania

30 Clues: A spanish-speaking quarter in a town or cityLand, labor, and capital resources, and entrepreneurshipThe concentration of human populations into discrete areasFought for better wages, reasonable hours and safer working conditions.American mechanical engineer who sought to improve industrial efficiency...

Week 13 Quiz 2014-04-03

Week 13 Quiz crossword puzzle
Across
  1. how rapidly a system and the units within it change
  2. a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
  1. a term economists use to refer to situations where a product becomes more valuable once many people use it
  2. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
  3. a state of the world involving networks of interdependence at multicontinental distances
  4. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”

6 Clues: how rapidly a system and the units within it changea state of the world involving networks of interdependence at multicontinental distancesa term economists use to refer to situations where a product becomes more valuable once many people use it...

Week 13 Quiz 2014-04-03

Week 13 Quiz crossword puzzle
Across
  1. A state of the world involving networks of interdependence at multicontinental distances
  2. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
  3. A term economists use to refer to situations where a product becomes more valuable once many people use it
  4. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
  5. A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
  1. How rapidly a system and the units within it change

6 Clues: How rapidly a system and the units within it changeA state of the world involving networks of interdependence at multicontinental distancesA term economists use to refer to situations where a product becomes more valuable once many people use it...

IPPS G3 - Week 13 Quiz 2017-03-22

IPPS G3 - Week 13 Quiz crossword puzzle
Across
  1. a state of the world involving networks of interdependence at multicontinental distances
  2. how rapidly a system and the units within it change
  3. a term economists use to refer to situations where a product becomes more valuable once many people use it
Down
  1. a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
  2. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
  3. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”

6 Clues: how rapidly a system and the units within it changea state of the world involving networks of interdependence at multicontinental distancesa term economists use to refer to situations where a product becomes more valuable once many people use it...

Activity 1 2024-08-25

Activity 1 crossword puzzle
Across
  1. The use and development of computer systems that are able to learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
  2. A system of interconnected public web pages accessible through the Internet.
  3. The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks.
Down
  1. The simulation of human intelligence processes by machines, especially computer systems.
  2. The process of exchanging information and ideas.
  3. A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers.

6 Clues: The process of exchanging information and ideas.A system of interconnected public web pages accessible through the Internet.The simulation of human intelligence processes by machines, especially computer systems.The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks....

if 2024-03-16

if crossword puzzle
Across
  1. Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer.
  2. A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules.
  3. Solana aims to address scalability issues faced by other blockchain networks, such as __________, by utilizing innovative technologies.
  4. Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer.
Down
  1. Nanotechnology involves the study and manipulation of materials at the __________ level, leading to unique properties and behaviors.
  2. Solana was founded by Anatoly __________ in 2017, with the goal of providing a scalable blockchain solution for decentralized applications.

6 Clues: Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer.Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer.A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules....

Tutorial 9 2023-10-11

Tutorial 9 crossword puzzle
Across
  1. theory that argues that a firm's sustained competitive advantage is based on its valuable and rare resources
  2. excess resources a company has that can be leveraged to successfully adjust to situations
  3. theory that argues that information on a company's financial health is not available to all parties in a market at the same time.
  4. the tendency for positive impressions of an organisation in one area to positively influence one's opinion or feelings in other areas
Down
  1. the practices of commerce applied to the public sector in order to deliver greater financial value
  2. economic decisions are affected by the social networks in which economic actors operate

6 Clues: economic decisions are affected by the social networks in which economic actors operateexcess resources a company has that can be leveraged to successfully adjust to situationsthe practices of commerce applied to the public sector in order to deliver greater financial value...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

Organizations 2019-06-04

Organizations crossword puzzle
Across
  1. One of 27 institutes and centers that make up the National Institutes of Health
  2. A nonprofit academic medical center based in Rochester, Minnesota
Down
  1. Its mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society
  2. Is also one of the 4 major style guides for academic papers

4 Clues: Is also one of the 4 major style guides for academic papersA nonprofit academic medical center based in Rochester, MinnesotaOne of 27 institutes and centers that make up the National Institutes of HealthIts mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society

Crossword about the World wide web 2021-07-15

Crossword about the World wide web crossword puzzle
Across
  1. It is a popularized file type due to its high standard of quality and easily downloadable size.
  2. defines the main content of the HTML document
  3. is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on 15 June 1987.
  4. allow web developers to arrange data into rows and columns.
  5. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  6. what is the <br> tag in html.
Down
  1. is a hypertext document provided by a website and displayed to a user in a web browser. A website typically consists of many web pages linked together in a coherent fashion.
  2. is a formal language comprising a set of strings that produce various kinds of machine code output.
  3. standard markup language for documents designed to
  4. defines the main content of the HTML document

10 Clues: what is the <br> tag in html.defines the main content of the HTML documentdefines the main content of the HTML documentstandard markup language for documents designed toallow web developers to arrange data into rows and columns.It is a popularized file type due to its high standard of quality and easily downloadable size....

Cyber security and EthicsCross Word 2023-08-25

Cyber security and EthicsCross Word crossword puzzle
Across
  1. Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
  2. The use of a computer and telecommunication devices as an instrument to perform illegal activities
  3. An area of data protection that concerns the proper handling of sensitive data
  4. Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
  5. Extortion software that can lock your computer and then demand a ransom for its release.
Down
  1. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  2. Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
  3. Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  4. Unsolicited messages sent in bulk by email

9 Clues: Unsolicited messages sent in bulk by emailAn area of data protection that concerns the proper handling of sensitive dataExtortion software that can lock your computer and then demand a ransom for its release.The use of a computer and telecommunication devices as an instrument to perform illegal activities...

Hack Con Cyber Security 2022-04-01

Hack Con Cyber Security crossword puzzle
Across
  1. authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
  2. a network security device that monitors and filters incoming and outgoing network traffic
  3. a way of scrambling data so that only authorized parties can understand the information
  4. an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
  5. wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
  1. hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
  2. a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
  3. malware that employs encryption to hold a victim's information for profit.
  4. a type of social engineering attack often used to steal user data, including login credentials and credit card numbers

9 Clues: malware that employs encryption to hold a victim's information for profit.a way of scrambling data so that only authorized parties can understand the informationa network security device that monitors and filters incoming and outgoing network traffic...

Unit 5.1 Describe the Possible Issues Arise from Organisation’s Social Media Platforms 2022-10-10

Unit 5.1 Describe the Possible Issues Arise from Organisation’s Social Media Platforms crossword puzzle
Across
  1. It refers to the response to current topics and trends while creating relevant and original content to interest their audience.
  2. When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as?
  3. Leaks, harassment and hate speech belongs to which non-related topics?
  4. False context, imposter content, manipulated content and fabricated content belongs to which non-related topics?
  5. Resulted from brands which planned posts way ahead of time, and adopt a ‘set and forget’ style. What is this issue known as?
  6. When users were unable to access, load their newsfeed, send messages due to the website server is facing downtime. What is this issue known as?
Down
  1. Wrong information are conveyed to customers, this issue is known as?
  2. Contents such as posts, reviews, pictures and more; that is created and shared by any users via social media networks is known as___.
  3. False connection and Misleading information belongs to which non-related topics?

9 Clues: Wrong information are conveyed to customers, this issue is known as?Leaks, harassment and hate speech belongs to which non-related topics?False connection and Misleading information belongs to which non-related topics?When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as?...

POSC003 G1 Week 13 Quiz 2014-04-02

POSC003 G1 Week 13 Quiz crossword puzzle
Across
  1. How rapidly a system and the units within it change
  2. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
Down
  1. A term economists use to refer to situations where a product becomes more valuable once many people use it
  2. A state of the world involving networks of interdependence at multicontinental distances
  3. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
  4. A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points

6 Clues: How rapidly a system and the units within it changeA state of the world involving networks of interdependence at multicontinental distancesA term economists use to refer to situations where a product becomes more valuable once many people use it...

Browsing Safely 2025-05-23

Browsing Safely crossword puzzle
Across
  1. It is an act of harming and harassing using information technology in a deliberate manner
  2. It is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
  3. It refers to an illegal entry into a computer system or network
Down
  1. It is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access
  2. It is a process of befriending children on social media to facilitate online or physical sexual abuse
  3. It is the short form of Vital Information Resources Under Seize

6 Clues: It is the short form of Vital Information Resources Under SeizeIt refers to an illegal entry into a computer system or networkIt is an act of harming and harassing using information technology in a deliberate mannerIt is a process of befriending children on social media to facilitate online or physical sexual abuse...

Cyber Sys Ops Block IV - Unit 6 2019-01-24

Cyber Sys Ops Block IV - Unit 6 crossword puzzle
Across
  1. This wired IDS sits on AF networks "listening" for suspicious activity. Generates reports for the AFNOSC (acronym).
  2. Vulnerability scanners compare details about a targeted system against a list of known security ____.
  3. ____ devices pretend to be legitimate access points in order to gather information from those devices connecting to them.
  4. Wireless ____ tools are intended for attacking wireless access points.
  5. An ____ Intrusion Detection System is also known as an Intrusion Prevention System.
  6. NIDS cannot analyze ____ packets.
  7. SNORT is an ____ source Network-based Intrusion Detection and Prevention System.
  8. ____ NIDS abilities include detection of rogue devices and wireless attack tools.
Down
  1. ____ records attributes of the host computer's memory and then monitors it to ensure it hasn't been modified (acronym).
  2. Host-based Intrusion Detections Systems primarily use ____ installed on a specific host.
  3. A ____ Scanner is a software application designed to probe a server or host for open ports.
  4. ____ scanning software detects and classifies system weaknesses in computers & network devices. Run from an attacker's POV.
  5. The function of an IDS is to ___ network traffic and computer settings to detect patterns indicating known intrusion attempts
  6. An Intrusion Detection System scans, audits and monitors network infrastructure for signs of attacks in ____.
  7. A major drawback of ____ is it cannot analyze encrypted packets (acronym).

15 Clues: NIDS cannot analyze ____ packets.Wireless ____ tools are intended for attacking wireless access points.A major drawback of ____ is it cannot analyze encrypted packets (acronym).SNORT is an ____ source Network-based Intrusion Detection and Prevention System.____ NIDS abilities include detection of rogue devices and wireless attack tools....

COMMUNICATION - ENTERPRISE 2020-09-02

COMMUNICATION - ENTERPRISE crossword puzzle
Across
  1. an individual who contributes fund to a limited company in return for shares in that company
  2. a summary of what has taken place at a meeting
  3. the provision of information about the date, time and place of a forthcoming meeting
  4. messages between people in an enterprise that are spoken, such as in face-to-face conversation
  5. the official channels of communication used within an enterprise
  6. messages between people on the same organisational level of an enterprise
  7. messages between people on different organisational levels of an enterprise ie upwards and downwards
  8. a yearly meeting of shareholders that a limited company is usually legally required to hold
Down
  1. the process of communication in a non-verbal way through conscious or unconscious gestures, movements and mannerisms
  2. messages between people in an enterprise that are actually written down, as in a letter
  3. the unofficial channels of communication used within an enterprise
  4. global system of interconnected computer networks that provides an extensive range of information resources and services
  5. a computer system that shares information resources and services within a particular enterprise
  6. a document that is written to provide information, analyse an issue and make recommendation.
  7. a list of items that will be discussed at a forthcoming meeting

15 Clues: a summary of what has taken place at a meetinga list of items that will be discussed at a forthcoming meetingthe official channels of communication used within an enterprisethe unofficial channels of communication used within an enterprisemessages between people on the same organisational level of an enterprise...

Technology 2020-10-23

Technology crossword puzzle
Across
  1. A group or system of interconnected people or things
  2. A machine resembling a human being and able to replicate certain human movements and functions automatically
  3. Tools, machinery, and other durable equipment
  4. A recording of moving visual images made digitally or on videotape
  5. A spoken message left by a caller on a voicemail system
  6. A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
  7. A set of related web pages located under a single domain name, typically produced by a single person or organization
  8. The working or use of telephones
  9. The branch of physics and technology concerned with the design of circuits using transistors and microchips, and with the behaviour and movement of electrons in a semiconductor, conductor, vacuum, or gas
Down
  1. The programs and other operating information used by a computer
  2. the action or process of transmitting something, or the state of being transmitted
  3. A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
  4. art of sending out music or pictures through radio waves
  5. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  6. Device for making calls

15 Clues: Device for making callsThe working or use of telephonesTools, machinery, and other durable equipmentA group or system of interconnected people or thingsA spoken message left by a caller on a voicemail systemart of sending out music or pictures through radio wavesThe programs and other operating information used by a computer...

PALOLO 2021-03-29

PALOLO crossword puzzle
Across
  1. Set of information found in a specific internet address.
  2. A secret word or phrase that must be used to gain admission to a place.
  3. An identification used by a person with access to a computer, network, or online service.
  4. A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
  5. An extra part or extension that is or may be attached to something to perform a particular function.
  6. Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
  7. Set of programs and routines that allow the computer to perform certain tasks.
Down
  1. It Is a web where you can find information.
  2. A network service that allows users to send and receive messages using electronic communication networks.
  3. Includes the message content and any attachments.
  4. Unsolicited messages, usually of an advertising nature.
  5. Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
  6. Is the introduction that identifies the emails intent.
  7. A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
  8. Is the area in which you enter important information above the email content area.

15 Clues: It Is a web where you can find information.Includes the message content and any attachments.Is the introduction that identifies the emails intent.Unsolicited messages, usually of an advertising nature.Set of information found in a specific internet address.A secret word or phrase that must be used to gain admission to a place....

Tecnology Baez, Falcon, Macchia. 2021-03-17

Tecnology Baez, Falcon, Macchia. crossword puzzle
Across
  1. Set of information found in a specific internet address.
  2. A secret word or phrase that must be used to gain admission to a place.
  3. An identification used by a person with access to a computer, network, or online service.
  4. A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
  5. An extra part or extension that is or may be attached to something to perform a particular function.
  6. Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
  7. Set of programs and routines that allow the computer to perform certain tasks.
Down
  1. It Is a web where you can find information.
  2. A network service that allows users to send and receive messages using electronic communication networks.
  3. Includes the message content and any attachments.
  4. Unsolicited messages, usually of an advertising nature.
  5. Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
  6. Is the introduction that identifies the emails intent.
  7. A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
  8. Is the area in which you enter important information above the email content area.

15 Clues: It Is a web where you can find information.Includes the message content and any attachments.Is the introduction that identifies the emails intent.Unsolicited messages, usually of an advertising nature.Set of information found in a specific internet address.A secret word or phrase that must be used to gain admission to a place....

Digital citizenship 2017-09-07

Digital citizenship crossword puzzle
Across
  1. The correct way to communicate on the internet.
  2. warning that people are dangerous to children and adults. It is an example of a panic that people experience regarding anyone that they are unfamiliar with.
  3. The knowledge of Maxamizing the users profile.
  4. The information of a person that is on the internet.(online activity)
  5. is freedom extended to all digital technology users, and the behavioral expectations that come with them, but they social media has privllages.
  6. You can put anything you want out in the open.
  7. An appropiate, rebonsible behavior to technology use.
  8. responsibility for actions, which is either ethical or unethical.
  9. Any copying of copyrighted done for a limited and “transformative” purpose, such as to comment upon,or criticize. That can be done without permission from the copyright owner.
Down
  1. Difficult to get.Strong by using upper case/lower case letters, and numbers.
  2. Research is a process of collecting, analyzing, and interpreting information in order to increase our understanding.
  3. Anything you have done onto a search
  4. A way to talk without talking in person.
  5. A person who sends messages that immates, or threats another person.
  6. Websites and networks, you can have a profile that defines you and you can see other people’s profiles.

15 Clues: Anything you have done onto a searchA way to talk without talking in person.The knowledge of Maxamizing the users profile.You can put anything you want out in the open.The correct way to communicate on the internet.An appropiate, rebonsible behavior to technology use.responsibility for actions, which is either ethical or unethical....

Texas History 2022-04-20

Texas History crossword puzzle
Across
  1. an economic model which states that the price at which a good is sold is determined by the good’s supply, and its demand.
  2. the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
  3. Offered by companies to the customers to provide utility and satisfy their wants.
  4. a period of temporary economic decline during which trade and industrial activities are reduced.
  5. Land: natural resources used for production; 2) Labor: human effort that assists in production; 3) Capital: man made resources used in the production process (factories, machinery, tools, equipment, raw materials, wealth); 4) Entrepreneur: person who decides what, where, and how to produce.
  6. first European to map coast of Texas
  7. Mexican. Was not a good person at all
  8. statistical data relating to the population and particular groups within it.
  9. Act of competing
Down
  1. a long and severe recession in an economy or market
  2. the process of increasing the percentage and number of people living in urban settlements.
  3. A financial gain
  4. an economic system in which private businesses operate in competition and largely free of state control.
  5. the domestic marketplace for goods and services operating within the borders of and governed by the regulations of a particular country.
  6. space comprising the earth’s atmosphere and the space beyond.

15 Clues: A financial gainAct of competingfirst European to map coast of TexasMexican. Was not a good person at alla long and severe recession in an economy or marketspace comprising the earth’s atmosphere and the space beyond.statistical data relating to the population and particular groups within it....

Information system MK&Partiban 2023-08-16

Information system MK&Partiban crossword puzzle
Across
  1. What technology connects up to 8 devices in a 10-meter area through low-power, radio-based communication?
  2. One of the IT infrastructure components?
  3. What are the small pieces of software designed to repair vulnerabilities or flaws in a program or system called?
  4. What is the ability of the system to expand to serve a large number of users without breaking down?
  5. What term describes the process of collecting user interaction data from web servers?
  6. What is the combination of hardware and software used to prevent unauthorized access to private networks called?
  7. What data can be accessed but not altered?
  8. One of the open source software(OSS)?
Down
  1. What term encompasses password systems, tokens, smart cards, biometric authentication, and two-factor authentication?
  2. What device is responsible for converting digital signals into analog form and vice versa?
  3. What is often referred to as the world's largest and most extensive network?
  4. What system is designed to capture and integrate customer data from various parts of an organization?
  5. What term describes the integration of social networking technologies into customer relationship management?
  6. What is the term for a CRM system that utilizes data warehouses fed by operational CRM systems and customer touch points?
  7. Specific characteristics of each quantity are called?

15 Clues: One of the open source software(OSS)?One of the IT infrastructure components?What data can be accessed but not altered?Specific characteristics of each quantity are called?What is often referred to as the world's largest and most extensive network?What term describes the process of collecting user interaction data from web servers?...

Vocabulary 2025-05-05

Vocabulary crossword puzzle
Across
  1. Obtaining input or information from a large number of people via the internet
  2. Scientific research conducted in whole or in part by amateur or nonprofessional scientists
  3. A set of rules governing the exchange or transmission of data between devices
  4. A problem-solving approach that finds a satisfactory solution where finding an optimal one is impractical
  5. The maximum amount of data that can be transmitted over a network in a given amount of time
  6. The time it takes for a data packet to travel from source to destination
  7. The system that translates human-readable website names into IP addresses
Down
  1. A system of interlinked hypertext documents and resources accessed through the internet
  2. The capacity for a system to handle growing amounts of work or accommodate growth
  3. The inclusion of extra components that can be used to maintain functionality if other components fail
  4. A method of reducing the size of data to save space or transmission time
  5. A global network that connects millions of private, public, academic, business, and government networks
  6. Data that provides information about other data, such as file size or date created
  7. A numeric system of base 2 that only uses combinations of the digits zero and one
  8. A unique string of numbers separated by periods used to identify devices on a network

15 Clues: A method of reducing the size of data to save space or transmission timeThe time it takes for a data packet to travel from source to destinationThe system that translates human-readable website names into IP addressesObtaining input or information from a large number of people via the internet...

Cyber Ethics 2025-06-02

Cyber Ethics crossword puzzle
Across
  1. The act of harming or harrasing a person through informational technology in a deliberate manner
  2. a program or a set of programs wich disrupts the normal functioning of a device
  3. The practice of sending mails till the mail server gets full
  4. The legal right granted by the law to the creator for his orginal work
  5. Information about a person that exists on the internet because of his online activity
  6. The act of sending an email and misleading the user to belive it is from a trusted source
  7. An illegal intrusion into a computer or network without the user's notice
Down
  1. A criminal activity which involves the use of Compters,Networks and Intrnet connections with the intention to harm an individual or thier device
  2. The process of converting encrypted data into readable form
  3. A malicious technique of tricking a web user into clicking on somthing else from what the user precives he/she is clicking on
  4. The process of transforming data into unreadeable code
  5. Loading a single licenced copy of a software onto multiple computers contrary to licence's terms
  6. The act of copying or imitating another person's work as thier's
  7. A security system that prevents unauthourised people from accessing your system and network
  8. Unwanted bulk e-mails that come from unkown scources

15 Clues: Unwanted bulk e-mails that come from unkown scourcesThe process of transforming data into unreadeable codeThe process of converting encrypted data into readable formThe practice of sending mails till the mail server gets fullThe act of copying or imitating another person's work as thier's...

Information Technology Career Cluster 2025-10-06

Information Technology Career Cluster crossword puzzle
Across
  1. Part of a computer system that is designed to block unauthorized access
  2. A program used to view Web pages.
  3. unwanted e-mail (usually of a commercial nature sent out in bulk)
  4. a small amount of data generated by a website and saved by your web browse to remember information about you.
  5. helps increases or maintains the capabilities of a person with a disability
  6. the process of converting human instructions into a language that a computer can understand and follow
  7. a person who designs, writes and installs computer programs and applications
Down
  1. type of software that can process information on its own without human intervention.
  2. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  3. Measures taken to protect a computer or computer system against unauthorized access or attack
  4. identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
  5. new technologies that aim to conserve the natural environment and resources.
  6. A global network connecting millions of computers, making it possible to exchange information.
  7. The amount of data that can be transmitted over a network in a given amount of time.
  8. the development, maintenance, and use of computer software, systems, and networks

15 Clues: A program used to view Web pages.unwanted e-mail (usually of a commercial nature sent out in bulk)Part of a computer system that is designed to block unauthorized accesshelps increases or maintains the capabilities of a person with a disabilitynew technologies that aim to conserve the natural environment and resources....

Sam computer vocabulary 2014-02-10

Sam computer vocabulary crossword puzzle
Across
  1. A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
  2. A memory device in which information can be accessed in any order.
  3. uniform resource locator; a standardized address of a location on the internet, esp on the World Wide Web
  4. A sequence of adjacent bits, usually eight, operated on as a unit by a computer
  5. computing the representation of each one of a set of numbers, letters, etc, as a unique sequence of bits, as in ASCII
  6. Is the brain of the computer
  7. the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
  8. A computer that processes requests for HTML and other documents that are components of web pages.
  9. internet service provider, a business providing its customers with connection to the internet and other related services
  10. a personal computer small enough to fit conveniently in an individual workspace
  11. An interconnected system of networks that connects computers around the world via the TCP/IP protocol.
  12. the programs and other operating information used by a computer.
  13. Is physical components that make up a computer system.
  14. Universal Serial Bus is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.
  15. The set of routines stored in read-only memory that enable a computer to start the operating system and to communicate with the various devices in the system, such as disk drives, keyboard, monitor, printer, and communications ports.
Down
  1. a model of computer use in which services stored on the internet are provided to users on a temporary basis
  2. a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
  3. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive.
  4. The numerical sequence that serves as an identifier for an Internet server.
  5. This term is used to describe a preset value for some option in a computer program.
  6. A program that accesses and displays files and other data available on the Internet and other networks.
  7. connect as or operate with a network.
  8. intellectual property, esp computer source code, that is made freely available to the general public by its creators
  9. A fast storage buffer in the central processing unit of a computer. Also called cache memory.
  10. Memory hardware that allows fast access to permanently stored data but prevents addition to or modification of the data.
  11. of, relating to, or situated on the edge or periphery of something.
  12. A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.
  13. computing domain name system
  14. In computing, booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset. ...

29 Clues: Is the brain of the computercomputing domain name systemconnect as or operate with a network.Is physical components that make up a computer system.the programs and other operating information used by a computer.A memory device in which information can be accessed in any order.of, relating to, or situated on the edge or periphery of something....

CS101 Vocab Review 2021-08-08

CS101 Vocab Review crossword puzzle
Across
  1. Governs what an authenticated user is allowed to do
  2. Memory that stores values that are being used during processing
  3. The number of bits used to store each sample or value
  4. A signal that changes continuously overtime
  5. A smarter device that has knowledge about the nodes on each bus or LAN
  6. The number of images shown per second of video
  7. A collection of logic gates that transforms a set of binary inputs into a set of binary outputs
  8. The probability that a data request will be in the cache
  9. Used to store data for transactional purposes
  10. A type of node that amplifies and forwards a signal
  11. Users who have more privileges than others
  12. The process of measuring an analog signal at set intervals in order to digitize it
  13. Training model to correspond too closely or exactly to a particular set of data
  14. A variable or statement that evaluates to true or false
  15. A single element of a picture
  16. The type of node needed as the center of a star topography
  17. A type of node that can translate signals between different types of networks
  18. Malware that pretends to only do a legitimate task while also breaching security
  19. An unreliable transmission protocol
  20. A type of memory where information disappears without power
  21. A fixed size unit of memory, typically 1 byte
  22. This occurs when a computer tries to represent a number larger than the maximum value it is capable of storing
  23. Applying a mathematical one-way function to create a "signature" of the input
  24. A type of supervised learning with discrete targets
  25. Occurs when two messages are sent at the same time on a shared communication line
Down
  1. A method used to hide unneeded or complex details of a problem or idea
  2. The fastest networking technology for data communication today
  3. There are _____ bits in one byte
  4. Step-by-step instructions for solving a problem
  5. A program for reading and interpreting websites
  6. The base 8 positional numbering system
  7. A type of machine learning based on rewards and punishments
  8. An aspect of a computer that can be used to breach security
  9. The process of verifying that you really are the person who has the right to access a given computer
  10. The program that translates assembly language to machine language
  11. The practice of hiding the very existence of a message
  12. The base 2 numbering system that does not allow for negative numbers
  13. A reliable transmission protocol
  14. The von Nuemann architecture component that includes the ALU and the Control Unit
  15. An example of non-volatile memory
  16. A Boolean expression that is never false
  17. The rate at which information can be sent and received across a network
  18. A malicious security breach
  19. A network of networks
  20. A flexible notation that lies between the two extremes of natural language and real code
  21. The internet protocol layer whose goal is to deliver packages from source port to destination port
  22. One of the 3-V's, the rate at which data changes
  23. A herd of computers controlled to perform a task without the user's knowledge

48 Clues: A network of networksA malicious security breachA single element of a pictureThere are _____ bits in one byteA reliable transmission protocolAn example of non-volatile memoryAn unreliable transmission protocolThe base 8 positional numbering systemA Boolean expression that is never falseUsers who have more privileges than others...

PC PRO Chapter 6 2020-01-03

PC PRO Chapter 6 crossword puzzle
Across
  1. Network in which all hosts share all resources.
  2. A network with geographically disperse connections that connect multiple LANs.
  3. Maintains the signal in the center of the core.
  4. A specialized device that performs a specific network role.
  5. A device optimized for the single purpose of providing file sharing.
  6. A hardware device that converts digital data into digital signals sent on the medium.
  7. Carries the signal.
  8. Functions as a second physical channel and as a ground.
  9. A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 100 meteres.
  10. Small geographic area network.
  11. A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 55 meteres.
  12. Central connecting point for multiple media segments on the same subnet.
  13. Prevents the cladding and central core from breaking.
  14. A coaxial cable specification used for CCTV video systems.
  15. A cable that provides more EMI protection, but is more expensive than UTP cable..
  16. A coaxial cable specification used for cable TV, satellite TV, and broadband cable internet.
  17. Uses the same wire configuration on each connector end.
  18. Connects two segments within the same subnet.
  19. Similar to WLAN but uses different technology to connect to the internet. Also known as 3G or 4G networks.
  20. Hardware or software that provides a path for signals to pass between devices.
  21. A hardware device that connects two network segments with different subnet addresses.
  22. Carries broadband internet signals.
  23. Group of LANs that are geographically isolated but are connected to form a large internetwork.
  24. Private network that uses internet technologies.
Down
  1. A host that provides a service. VoIP Software that provides voice communication over an IP network.
  2. Transfers data using a single light ray.
  3. Private network that uses internet technologies but its resources are made available to trusted external users.
  4. Central connection for multiple media segments on the same subnet.
  5. A connector with 4 connectors, 2 pairs of wires, and a locking tab; used primarily for telephone wiring.
  6. A cable generally used for Ethernet cables and telephone wires.
  7. A cable that supports gigabit Ethernet.
  8. A connector with 8 connectors, 4 pairs of wires, and a locking tab; used for Ethernet networks.
  9. Encases everything and protects the cable.
  10. Carries data signals in cables.
  11. Encases a cable to protect it from external elements.
  12. Rules or standards that describe how hosts communicates and exchange data.
  13. A portion of a network with a common network address.
  14. or hosts Computers.
  15. Network the size of a few blocks to a metropolitan area.
  16. Network in which hosts have specific roles.
  17. Has the strictest specifications for crosstalk and noise of the Cat cables.
  18. Arrange wires in the first connector using T568A standard and the second connector the T568B standard.
  19. Computer system controlled by a single organization.
  20. Interfaces Devices that send and receive electrical signals.
  21. Large, world-wide, public network.
  22. Carries broadband internet signals.
  23. Surrounds inner cable conductor and keeps signal separated from the mesh conductor.
  24. A hardware device that converts binary data to analog waves and vice versa.
  25. Mesh network that uses wireless connection only.
  26. Used with both single and multi-mode cabling.
  27. media Path for electrical signals between devices.
  28. A hardware device that creates and receives transmission signals sent along the networking medium.
  29. Same as LAN but uses wireless connection.
  30. Small network for communication between devices.

54 Clues: Carries the signal.or hosts Computers.Small geographic area network.Carries data signals in cables.Large, world-wide, public network.Carries broadband internet signals.Carries broadband internet signals.A cable that supports gigabit Ethernet.Transfers data using a single light ray.Same as LAN but uses wireless connection....

Module I Vocab 2020-02-25

Module I Vocab crossword puzzle
Across
  1. is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
  2. a piece of electronic equipment for playing games on
  3. is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
  4. a wearable device is a technology that is worn on the human body
  5. a series of coded software instructions to control the operation of a computer or other machine
  6. is basically a system of Internet servers that support specially formatted documents
  7. is any piece of computer hardware equipment which converts information into human-readable form
  8. a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or over wireless
  9. a model of computer data storage in which the digital data is stored in logical pools
  10. the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket
  11. a computer or computer program which manages access to a centralized resource or service in a network
  12. is any physical device capable of storing information temporarily, like RAM (random access memory), or permanently, like ROM (read-only memory)
  13. designed to carry out web search, which means to search the World Wide Web
  14. a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
Down
  1. a program or piece of software made to fulfill a purpose
  2. a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance
  3. a handheld electronic device for playing digital media such as audio and video files
  4. means the ability to view the same multimedia content from different types devices
  5. a machine for printing text or pictures onto paper, especially one linked to a computer
  6. an extra copy of data on a computer
  7. a computer program that distributes web pages as they are requisitioned
  8. a location connected to the Internet that maintains one or more pages on the World Wide Web
  9. is the environmentally responsible and eco-friendly use of computers and their resources
  10. combining 2 or more functions in a unit
  11. an application, downloaded usually by a mobile user
  12. a group or system of interconnected people or things
  13. short-range wireless interconnection of devices
  14. a mobile electronic device that is designed primarily for the purpose of reading digital e-books
  15. type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
  16. synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
  17. the programs and other operating information used by a computer.
  18. a program with graphic interface on a world wide web.
  19. cause to occur or operate at the same time or rate
  20. a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

34 Clues: an extra copy of data on a computercombining 2 or more functions in a unitshort-range wireless interconnection of devicescause to occur or operate at the same time or ratean application, downloaded usually by a mobile usera piece of electronic equipment for playing games ona group or system of interconnected people or things...

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. an electronic device that manipulates information or data
  2. knowledge obtained from investigation, study, or instruction.
  3. use learning technologies in a variety of different contexts.
  4. is to digital media.
  5. a reference (an address) to a resource on the internet.
  6. to connect with friends, work, colleagues or people they don't know online.
  7. exchange information and ideas in virtual communities and networks.
  8. is a wireless, portable personal computer with a touchscreen interface
  9. an online tool for teachers to give quizzes and on the fly assessments to students.
  10. individual is he/she who possesses a range of digital skills.
  11. the use of technology to harass, threaten, embarrass, or target another person.
  12. is a tool that delivers and presents questions to students.
  13. the communication outlets or tools used to store and deliver information or data.
  14. refers to a collection of webpages you can view using internet and a browser.
  15. a free sharing tool perfect for clipping, curating, and sharing content.
  16. is a small portable personal computer.
  17. a vast network that connects computers all over the world.
  18. TED's youth and education initiative.
  19. is the sending and receiving of information.
  20. also known as “Facebook for school.”
Down
  1. embedding media content in images and videos.
  2. is complex and multifaceted.
  3. a free video sharing website that makes it easy to watch online videos.
  4. to develop an understanding of online security, identity and data management in our own literacy practices
  5. is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
  6. the ability to read, interpret, and understand information presented in pictorial or graphic images.
  7. is a free, cloud-based 3D CAD Software package for students.
  8. is a handheld electronic device that provides a connection to a cellular network and the internet.
  9. provider of a presentation design tool for the creative community.
  10. also known as digital literacy.
  11. is an easy to use learning portfolio application.
  12. is a powerful community based social tool for learning.
  13. handy management and messaging tool helps recognize. reward students.
  14. the capacity to use computer technology successfully while also understanding the consequences of those actions.
  15. enable students to produce short animated narrated explainer videos.
  16. engaging and interactive game.
  17. you can literally learn anything.
  18. presentations are nothing like your traditional presentations.
  19. the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
  20. increasing access to high quality educational materials for K-12 students all over the world.
  21. entails taking responsibility for ones role in cyberspace.
  22. is a digital tool for designing visual stories.
  23. is a sneaky or dishonest plan that's meant to con someone.
  24. a free photo and video sharing app.
  25. possesses critical thinking skills in understanding all sociatal issues raised by digital technologies.
  26. qualities that a person is expected to have as a responsible member of digital community.
  27. to connect people and allow people to share their thoughts with a big audience.
  28. only teach programming concepts.
  29. create and share videos with your class, with parents, and beyond.
  30. encompassesa wide range of criminal activities that are carried out using digital devices and/or networks.

50 Clues: is to digital media.is complex and multifaceted.engaging and interactive game.also known as digital literacy.only teach programming concepts.you can literally learn anything.a free photo and video sharing app.also known as “Facebook for school.”TED's youth and education initiative.is a small portable personal computer....

Cyber and Digital Literacy 2024-04-30

Cyber and Digital Literacy crossword puzzle
Across
  1. handy management and messaging tool helps recognize. reward students.
  2. to connect with friends, work, colleagues or people they don't know online.
  3. engaging and interactive game.
  4. individual is he/she who possesses a range of digital skills.
  5. create and share videos with your class, with parents, and beyond.
  6. is a handheld electronic device that provides a connection to a cellular network and the internet.
  7. is the sending and receiving of information.
  8. is to digital media.
  9. is a sneaky or dishonest plan that's meant to con someone.
  10. the communication outlets or tools used to store and deliver information or data.
  11. is a wireless, portable personal computer with a touchscreen interface.
  12. refers to a collection of webpages you can view using internet and a browser.
  13. provider of a presentation design tool for the creative community.
  14. is a powerful community based social tool for learning.
  15. a complex and multifaceted.
  16. presentations are nothing like your traditional presentations.
  17. enables students to produce short, animated narrated explainer videos.
  18. to connect people and allow people to share their thoughts with a big audience.
  19. the capacity to use computer technology successfully while also understanding the consequences of those actions.
  20. a free video sharing website that makes it easy to watch online videos.
  21. increasing access to high quality educational materials for K-12 students all over the world.
  22. to develop an understanding of online security, identity and data management in our own literacy practices
Down
  1. is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
  2. an online tool for teachers to give quizzes and on the fly assessments to students.
  3. a free photo and video sharing app.
  4. the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
  5. encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
  6. a vast network that connects computers all over the world.
  7. only teach programming concepts.
  8. embedding media content in images and videos.
  9. is a tool that delivers and presents questions to students.
  10. a free sharing tool perfect for clipping, curating, and sharing content.
  11. qualities that a person is expected to have as a responsible member of digital community.
  12. is an easy to use learning portfolio application.
  13. you can literally learn anything.
  14. is a small portable personal computer.
  15. the use of technology to harass, threaten, embarrass, or target another person.
  16. also known as digital literacy.
  17. the ability to read, interpret, and understand information presented in pictorial or graphic images.
  18. an electronic device that manipulates information or data.
  19. exchange information and ideas in virtual communities and networks.
  20. a reference (an address) to a resource on the internet.
  21. knowledge obtained from investigation, study, or instruction.
  22. also known as “Facebook for school.”
  23. is a digital tool for designing visual stories.
  24. TED's youth and education initiative.
  25. is a free, cloud-based 3D CAD Software package for students.
  26. use learning technologies in a variety of different contexts.
  27. possesses critical thinking skills in understanding all societal issues raised by digital technologies.

49 Clues: is to digital media.a complex and multifaceted.engaging and interactive game.also known as digital literacy.only teach programming concepts.you can literally learn anything.a free photo and video sharing app.also known as “Facebook for school.”TED's youth and education initiative.is a small portable personal computer....

Propagandizing Words 2013-05-15

Propagandizing Words crossword puzzle
Across
  1. A usually short communication transmitted by words, signals, or other means from one person, station, or group to another
  2. The art and technique of using words effectively to impart information or ideas
  3. The act or process of buying and selling in a market
  4. It is a way to promote some sort of company, political party, etc
  5. A belief or conclusion held with confidence but not substantiated by positive knowledge or proof
  6. A way of spreading information via technology
  7. Serving to inform; providing or disclosing information; instructive, propaganda’s goal
  8. To influence or manage shrewdly or deviously, in this case, propaganda
Down
  1. An object of criticism or attack
  2. Tending or having the power to persuade, very often, is used to describe propaganda
  3. The way propaganda is used now days, a synonym of this word is practically
  4. Something that has been organized or made into an ordered whole
  5. An interconnected system of networks that connects computers around the world via the TCP/IP protocol. The use of propaganda is new to this system
  6. The act of manifesting; usually the result of false propaganda in communist societies
  7. A piece of unverified information of uncertain origin usually spread by word of mouth
  8. a short message or commercial, especially a commercial spoken on radio or television
  9. One who is actively involved in manipulating propaganda and media advertisements

17 Clues: An object of criticism or attackA way of spreading information via technologyThe act or process of buying and selling in a marketSomething that has been organized or made into an ordered wholeIt is a way to promote some sort of company, political party, etcTo influence or manage shrewdly or deviously, in this case, propaganda...

Computer and Technical Terms 2016-02-22

Computer and Technical Terms crossword puzzle
Across
  1. A compnent that stores data so future requests for that data can be served faster
  2. adress Each computer connected to the Internet is given a unique address called.
  3. The amount of copies that can be made of a project.
  4. Communication that both the sender and the receiver are active at the same time
  5. Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
  6. A website that is considerably greater in sized is referred to being?
  7. Using neutral rather than subjective, boastful, or exaggerated language.
  8. The idea of using about half the word count as the controlled condition.
  9. The codes or tags that browsers use to create web pages.
  10. Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
  11. The html file you are creating and the picture you are using for your website must be in the same?
Down
  1. Communication where the sending and receiving occur at different times.
  2. Company that helps build large websites.
  3. May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
  4. The main technology for local area networks
  5. Can be used to create web pages online
  6. The amount of images from one artist or photographer allowed on a web page

17 Clues: Can be used to create web pages onlineCompany that helps build large websites.The main technology for local area networksThe amount of copies that can be made of a project.The codes or tags that browsers use to create web pages.A website that is considerably greater in sized is referred to being?...

Social media 2025-04-02

Social media crossword puzzle
Across
  1. The continuously updated page you see on a social media website. Content is renewed automatically every time you refresh
  2. Short for Graphics Interchange Format.
  3. Social media platform created in 2007
  4. The group of people who can see the content you share online.This includes your followers who can like, comment, or share your content.
  5. Feedback after purchasing a product.
  6. Also called sharing.Sending content originally posted by another user.
  7. A photo you have taken of yourself.
  8. Social media platform where you can send messages and pictures that disappear after seeing them.
Down
  1. The images, photos and videos, or texts shared on the internet to spread a specific idea, style, or behavior.
  2. In social media content, creators can use specific words or pictures to attract the users’ attention and prompt them into clicking on their links
  3. A person who can see and react the content you share on your social media.
  4. The time you spend searching for particular information. You use your web browser.
  5. It holds the list of emails or messages you received from other users.
  6. The unpermitted access to and control over a computer system, often for the purpose of stealing or destroying it.
  7. The information, products, videos, and all the data you share on your social networks
  8. Social media platform created in 2010
  9. If a topic, video, or another type of content marketing is.....

17 Clues: A photo you have taken of yourself.Feedback after purchasing a product.Social media platform created in 2007Social media platform created in 2010Short for Graphics Interchange Format.If a topic, video, or another type of content marketing is.....It holds the list of emails or messages you received from other users....

Social media 2022-11-04

Social media crossword puzzle
Across
  1. A person who deliberately starts arguments in the comments sections of sites
  2. Articles with headlines that make you want to click through and read. They usually don't live up to your expectations.
  3. A word, phrase or topic that is popular on Twitter at any given moment.
  4. A word or group of words that starts with the sign (#) and is used to group together similar ideas and topics
  5. Anything that is shared in social networks and gets passed along to many people very rapidly
Down
  1. User on social media who has subscribed to see your posts in their feed
  2. Ignoring someone and giving attention to your mobile phone instead
  3. A website or computer program that allows people to communicate and share information on the internet using a computer or mobile phone
  4. Someone who voices negative opinions about other people. It might be inspired by jealousy or boredom.

9 Clues: Ignoring someone and giving attention to your mobile phone insteadUser on social media who has subscribed to see your posts in their feedA word, phrase or topic that is popular on Twitter at any given moment.A person who deliberately starts arguments in the comments sections of sites...

Spreadsheets 2024-10-17

Spreadsheets crossword puzzle
Across
  1. Created without your direct input, like websites collecting your data.
  2. Refers to a state of being connected to or available through the internet. It involves the use of digital networks to access, share, or interact with information, services, and people in a virtual environment.
  3. The trail you leave by choice, like posts on social media.
Down
  1. a trail you leave behind in the digital world.
  2. to provoke someone to react angrily.
  3. The action of alerting the platform administrators or moderators about content or behavior that violates the platform’s rules or guidelines. This could include things like harassment, hate speech, false information, or inappropriate content.
  4. the right to keep personal information to ourselves.
  5. Groups of people who share common interests, goals, or characteristics and interact with each other to exchange information, support, or ideas.
  6. Digital platforms and tools that allow users to create, share, and interact with content and with other users.

9 Clues: to provoke someone to react angrily.a trail you leave behind in the digital world.the right to keep personal information to ourselves.The trail you leave by choice, like posts on social media.Created without your direct input, like websites collecting your data....

watermelon🐢🍪🧋 2022-05-05

watermelon🐢🍪🧋 crossword puzzle
Across
  1. She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist
  2. The same cast of mind also tended to seek simple, universal formulae to resolve any problem, no matter how complex.
  3. An oral, poorly absorbed opioid antagonist, such as naloxone, can be helpful when usual laxatives are not working.
Down
  1. i was in search of migrant birds and I discovered sand martins and my first common sandpiper of the year
  2. All this variability can leave you feeling part introvert, part extrovert, part ambivert.
  3. The English are very strict on their anti-rabies regulations and sometimes keep animals in quarantine for six months.
  4. Many ethnographers have noted the importance of food and drink for maintaining familiar forms and social networks among immigrant populations.
  5. He arrived in Scotland as a refugee and has lived in the Glasgow area ever since.
  6. We empathize with others and often respond with emotion to their condition.

9 Clues: We empathize with others and often respond with emotion to their condition.He arrived in Scotland as a refugee and has lived in the Glasgow area ever since.All this variability can leave you feeling part introvert, part extrovert, part ambivert.She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist...

Automation and IT 2024-12-04

Automation and IT crossword puzzle
Across
  1. ______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
  2. _____ The application of scientific knowledge for practical purposes, especially in industry.
  3. ______ Technological adaptation wherein technologically less advance countries or places need To adapt and find solutions into their problems
  4. _____ Transforming the way data is being handled, processed, and delivered from millions of devices around the world
Down
  1. _____ preventing harmful attacks on computers, servers, mobile devices, electronic systems, networks, and data.
  2. _________ the process of creating software and systems to replace repeatable processes and reduce manual intervention.
  3. _____ a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
  4. _________is a specific type of automation where the machine that is being controlled has particular traits that make it resemble human beings.
  5. _________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive.

9 Clues: _____ The application of scientific knowledge for practical purposes, especially in industry._________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive.______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else....

IPPS-G4 Week 13 2017-03-23

IPPS-G4 Week 13 crossword puzzle
Across
  1. A state of the world involving networks of interdependence at multicontinental distances
  2. How rapidly a system and the units within it change
  3. A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
  1. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
  2. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
  3. A term economists use to refer to situations where a product becomes more valuable once many people use it

6 Clues: How rapidly a system and the units within it changeA state of the world involving networks of interdependence at multicontinental distancesA term economists use to refer to situations where a product becomes more valuable once many people use it...

IPPS Quiz Week 13 2013-11-11

IPPS Quiz Week 13 crossword puzzle
Across
  1. how rapidly a system and the units within it change
  2. a state of the world involving networks of interdependence at multicontinental distances
Down
  1. Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
  2. a term economists use to refer to situations where a product becomes more valuable once many people use it
  3. What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
  4. a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points

6 Clues: how rapidly a system and the units within it changea state of the world involving networks of interdependence at multicontinental distancesa term economists use to refer to situations where a product becomes more valuable once many people use it...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

science 2023-10-27

science crossword puzzle
Across
  1. definition: Organisms that live on or in another organism (the host) and feeds on it
  2. definition: Models That show how food energy passes from organism to organisms
  3. Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
  1. Definition: Networks of interconnected Food chains In an ecosystem
  2. Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
  3. definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything

6 Clues: Definition: Networks of interconnected Food chains In an ecosystemdefinition: Models That show how food energy passes from organism to organismsdefinition: Organisms that live on or in another organism (the host) and feeds on it...

Crossword Puzzle 2022-09-30

Crossword  Puzzle crossword puzzle
Across
  1. system that delivers content or services to end users over the internet. A web server consists of a physical server
  2. software or hardware that can be configured to block data from certain locations, applications, or ports while still allowing
Down
  1. network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital
  2. processes on external networks or those that are hosted or Internet
  3. high-speed device that receives incoming data packets and redirects them to their destination

5 Clues: processes on external networks or those that are hosted or Internethigh-speed device that receives incoming data packets and redirects them to their destinationsystem that delivers content or services to end users over the internet. A web server consists of a physical server...

Data Protection 2018 2018-10-15

Data Protection 2018 crossword puzzle
Across
  1. Share and Control Information Appropriately. Watch what you share on [ ] networks and share company information based on "need to know".
  2. Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data.
  3. Protect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts.
Down
  1. Use Approved [ ] and Services. Classify and label your files. Use Box to share and collaborate on documents. Don't use unapproved apps.
  2. [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.com

5 Clues: [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.comProtect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts.Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data....

Developer Security Crossword 2022-04-21

Developer Security Crossword crossword puzzle
Across
  1. an open-source system first developed by Google for for automating software deployment, scaling, and management.
  2. an approach to software development where software is composed of small independent services that communicate over well-defined APIs.
Down
  1. the grading score of an enterprise's networks, information, and systems based on information security resources.
  2. a process in which you assume the role of an attacker to uncover vulnerabilities within your own software.
  3. ​​a computer-software vulnerability that is unknown to those responsible for the software.

5 Clues: ​​a computer-software vulnerability that is unknown to those responsible for the software.a process in which you assume the role of an attacker to uncover vulnerabilities within your own software.the grading score of an enterprise's networks, information, and systems based on information security resources....

IP Addressing 2016-03-10

IP Addressing crossword puzzle
Across
  1. A method of expressing a network prefix (/)
  2. Addresses between 224.0.0.0 – 239.255.255.255
  3. The first IP address within a network that has all 0’s in the host portion.
  4. A broadcast that is sent to a specific network or series of networks. Uses the address 255.255.255.255
  5. An IP address that does not have to be globally unique and is not routable on the Internet.
  6. A method of assigning IPv4 addresses which requires that addresses within the same class must use the same subnet mask.
  7. An IP address that is globally unique and routable on the Internet.
  8. A method used to determine the network portion of an IP address by comparing the binary values.
  9. Address between network and broadcast.
Down
  1. The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes
  2. Last IP address within a network that has all 1’s in the host portion
  3. A more efficient way of assigning addresses that allows the use of multiple subnet masks within the same IPv4 address class.
  4. The number of binary ones in the subnet mask
  5. Describes IPv4 packets sent to all hosts in a particular network. Uses the broadcast address of that network.
  6. A group of 8 binary bits

15 Clues: A group of 8 binary bitsAddress between network and broadcast.A method of expressing a network prefix (/)The number of binary ones in the subnet maskAddresses between 224.0.0.0 – 239.255.255.255An IP address that is globally unique and routable on the Internet.Last IP address within a network that has all 1’s in the host portion...

Module 3 Crossword 2019-04-19

Module 3 Crossword crossword puzzle
Across
  1. This word is short for binary digit and is the smallest unit of data represented in a computer.
  2. This acts as a bridge and takes data from one system and plugs that data into another.
  3. This system locates data that is stored in primary or secondary storage.
  4. System _________ is the combining of the various subsystems into one larger system and ensuring that the subsystems function together as a whole.
  5. When evaluating the training, this evaluates what the trainees thought about the training.
  6. This standard method for network management is used to manage small networks and is a simple network solution that does not require a server.
  7. This country represses what its citizens can read on the web.
Down
  1. How a network is organized or laid out is referred to as its _________.
  2. In a project plan, this phase prepares the facility for the conversion from the old system to the new.
  3. Whether new services or new clinics will be implemented is an example of _________ scanning.
  4. Evaluating the way the facility does business in order to improve efficiency is known as _________.
  5. CPU is considered the _________ of the computers.
  6. The Open Systems Interconnection (OSI) is composed of how many layers?
  7. This IP address is temporary and changes periodically.
  8. This was the first standard protocol for communication between EHR components.

15 Clues: CPU is considered the _________ of the computers.This IP address is temporary and changes periodically.This country represses what its citizens can read on the web.The Open Systems Interconnection (OSI) is composed of how many layers?How a network is organized or laid out is referred to as its _________....

Caslin_Hiring vacab 2024-02-22

Caslin_Hiring vacab crossword puzzle
Across
  1. the process of establishing employees' roles and responsibilities.
  2. a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
  3. a permanent decrease in the total number of workers a company employs.
  4. the means of interactions among people in which they create share and or exchange information and ideas in virtual communities and networks.
  5. the process of identifying attracting interviewing selecting hiring and onboarding employees.
  6. the total amount of sales you make over a set period.
  7. a quick summary of a person's relevant education and experiences.
  8. to give up a job or position by telling your employer that you are leaving.
  9. someone who can answer questions about your work history skills abilities and work style.
  10. to encourage people to like buy use do or support something.
Down
  1. learning how to do the job or do the job better while in the role.
  2. coordinating managing and allocating human capital or employees in ways that move an organization's goals forward.
  3. a person or business that employs one or more people especially for wages or salary.
  4. your application must have made a good impression.
  5. the end of an employee's work with a company.

15 Clues: the end of an employee's work with a company.your application must have made a good impression.the total amount of sales you make over a set period.to encourage people to like buy use do or support something.a quick summary of a person's relevant education and experiences.learning how to do the job or do the job better while in the role....