networks Crossword Puzzles
A mango shaped space 2019-04-10
Across
- the notional environment in which communication over computer networks occurs.
- a system of complementary medicine in which fine needles are inserted in the skin at specific points along what are considered to be lines of energy (meridians), used in the treatment of various physical and mental conditions.
- an instruction written by a medical practitioner that authorizes a patient to be issued with a medicine or treatment.
- remove (a substance) from the surface of a liquid.
- finely experienced and aware
- having a harshly concussive, disagreeable, or discordant effect
- relating to the ability to interpret or become aware of something through the senses.
- depending on the will or pleasure of another
- attractive or interesting.
- a regulation requiring people to remain indoors between specified hours, typically at night.
- something that is sent out
Down
- a religious song or poem of praise to God or a god.
- to affect with visions or imaginary perceptions
- an interesting and exciting quality.
- a person's emotional state or the atmosphere of a place as communicated to and felt by others.
- the immaterial essence, animating principle, or actuating cause of an individual life
- a chemical substance that is usually produced by an animal
- full of yearning or desire
- a strip of wood or stone forming the bottom of a doorway and crossed in entering a house or room.
- a classroom where pupils report especially at the beginning of each school day
- walk or move around with ostentatious, exaggerated movements.
21 Clues: full of yearning or desire • attractive or interesting. • something that is sent out • finely experienced and aware • an interesting and exciting quality. • depending on the will or pleasure of another • to affect with visions or imaginary perceptions • remove (a substance) from the surface of a liquid. • a religious song or poem of praise to God or a god. • ...
Technology 2019-08-25
Across
- set of things working together to make a meaningful result
- a message given to the web browser by the web server
- a network security system
- protects computer networks from unauthorized access
- a facility that allows electronics to be connected with internet
- the nature of electronic technology
- the situation when devices are ready to exchange data
- a robot with a human appearance
- a small device which sends wifi to other devices nearby
- means of communication between two devices
- stores and processes data
- a transmission of data for using the internet to electronic devices
- retrieving something from the internet
- facts or numbers collected for analysis
- a computer program which navigates through web pages
Down
- made or adapted for a particular purpose
- a program language used in smartphone industries earlier
- something that can be plugged into a multi-plug
- something that produces current
- a self-contained component
- a global computer network
- a private computer network for communication
- to move something from one device to another
- to assign something specific
- a short rang e wireless connection to any electronic device
- coded instructions to run something
- set of instructions use to operate a computer
- a file format developed by adobe including text formatting and image
- Some thing that connects electronic machines
- a small device by which data can be stored and plugged in with a computer
30 Clues: a network security system • a global computer network • stores and processes data • a self-contained component • to assign something specific • something that produces current • a robot with a human appearance • the nature of electronic technology • coded instructions to run something • retrieving something from the internet • facts or numbers collected for analysis • ...
Bilingual Speech Perception 2019-12-02
Across
- control, Bilinguals seem to recruit cognitive control networks associated with the processing of effortful speech and executive functioning
- Sequential, bilinguals exposed to L2 at an older age
- switching, top-down controlled and can be modulated by language dominance. It is typically more effortful to switch back to the dominant language (L1)
- switching, global switching across full language competences
- bilinguals, unbalanced degree of proficiency and behavioral performance across language competences
- of primary perceptual cues from the dominant language background; Very common in unbalanced early bilinguals and long-term immigrants
- local switching "my laptop no function"
- context-specific selection of language norms; common in coordinated bilinguals
- system, identical items are represented in a single underlying neural substrate common to both, but different items have own-language representations
- bilinguals, L1 and L2 share contextual frames
- period, Back-frontal cortical development in infants
- system, undifferentiated representations
- system, each language represented in separate systems
Down
- of secondary perceptual cues; common in unbalanced late bilinguals
- bilinguals, L1 and L2 are used in different contexts
- speech, systematic deviation of a particular native speech norm; Determined by phonetic differences and similarities between the native norm of the foreign-accented speaker and the native listener; Phonetically-based speech distortion
- bilinguals, a similar degree of proficiency and behavioral performance
- Listeners adapt easily to accents
- system, larger language system contains two subsystems
- Simultaneous, bilinguals exposed to L2 since a young age
20 Clues: Listeners adapt easily to accents • local switching "my laptop no function" • system, undifferentiated representations • bilinguals, L1 and L2 share contextual frames • bilinguals, L1 and L2 are used in different contexts • Sequential, bilinguals exposed to L2 at an older age • period, Back-frontal cortical development in infants • ...
DTIN The Internet 2024-09-09
Across
- The part of a web address that leads to a specific file
- A call made over the internet
- The last part of a domain name like .com or .edu
- Enables speaking to others over the internet
- A collection of related web pages
- Saving a web link for future reference
- Business transactions over the internet
- An internet system for sending messages
- To transfer data from the internet to a device
- A website that connects people for interaction
- A global network of networks
- An electronic document on the web
- A clickable text or image that links to another web page
- Translates domain names to IP addresses
- A method for securing data on the internet
- A program to view web pages
Down
- To send data from a device to the internet
- A platform for real-time typed conversation
- The first page displayed by a website
- Unique numbers identifying a device's location
- A unique address of a page on the web
- A protocol for file transfer on the network
- Internet-based platform for financial transactions
- A website used to find information on the web
- A text-based name corresponding to an IP address
- Websites for uploading and viewing media
- A special browser for smartphones
- An online journal where users post content
- A server that delivers web pages
- Symbols that define the content of web pages
30 Clues: A program to view web pages • A global network of networks • A call made over the internet • A server that delivers web pages • A collection of related web pages • A special browser for smartphones • An electronic document on the web • The first page displayed by a website • A unique address of a page on the web • Saving a web link for future reference • ...
Digital Wonders: The NFT Universe Unveiled 2024-03-22
Across
- A common file format for images, often used for digital art NFTs.
- Cryptocurrency of the Ethereum network, commonly used to buy NFTs.
- The potential impact of NFTs on traditional art sales and copyright norms.
- Duplicate or copy of a popular NFT or collection, often with slight variations.
- The process of creating or issuing a new NFT on the blockchain.
- A popular marketplace for buying, selling, and discovering NFTs.
- Online platforms or spaces where NFTs are displayed and sold.
- Describes an NFT that is uncommon or has unique traits within a collection.
- An offer made by a buyer to purchase an NFT at a specified price.
Down
- Verification method for the authenticity and ownership of an NFT.
- A type of NFT that represents ownership or a claim over physical or digital assets.
- The action of buying, selling, or exchanging NFTs between parties.
- Buying NFTs and selling them quickly for profit.
- A symbol or graphic representation on a screen of a file, option, or command related to NFTs.
- Computers that maintain and secure blockchain networks, vital for NFT transactions.
- A three-dimensional NFT that uses light patterns to display images.
- The act of locking up a cryptocurrency to receive rewards, sometimes related to NFT platforms.
- The category of NFTs that includes digital paintings, sculptures, and multimedia.
- A predefined maximum amount of NFTs that can be minted in a particular collection.
- Searching for specific NFTs or collections in marketplaces.
20 Clues: Buying NFTs and selling them quickly for profit. • Searching for specific NFTs or collections in marketplaces. • Online platforms or spaces where NFTs are displayed and sold. • The process of creating or issuing a new NFT on the blockchain. • A popular marketplace for buying, selling, and discovering NFTs. • ...
Compters 2024-07-10
Across
- lower and upper limits of data
- related commands that are divided into tabs
- founded Facebook
- name of person who first introduced email in 1972
- a precise sequence of instructions for successfully carrying out a task
- when the computer performs more than one task at a time
- expands the window to full screen
- city in California that is headquarter for Yahoo
- a program that is loaded onto your computer without you knowing and hinders the normal function of the computer
- displays a menu of commands for opening, saving, and printing
- digit number
- the person that tells the computer what to do
- coping for one computer system to another
- name of browser Marc Anderson and Jim Clark founded in 1994
Down
- a particular order
- physical objects of the system
- to produce data in legible alphanumeric or graphic form
- a system which information can be be expressed by combinations of the digits of 1 and 0
- a set of codes designed to allow certain task to happen
- a small visual display of the app
- search for something or someone on the internet
- random access memory
- internal storage location
- allows more than one application
- an error
- follows a program, designed to compute
- an electronic device for for storing and processing data
- a system or set of principles underlying the arrangements of elements in a computer
- software/hardware protection between network and outside world
- to operate interactively
- software/ hardware that allows connections to other networks
31 Clues: an error • digit number • founded Facebook • a particular order • random access memory • to operate interactively • internal storage location • physical objects of the system • lower and upper limits of data • allows more than one application • a small visual display of the app • expands the window to full screen • follows a program, designed to compute • ...
Y9 ICT IGCSE Review Term 1 2025-01-06
Across
- Short-range wireless communication technology for data exchange
- Hardware that allows a device to connect to a network
- Injury caused by repetitive motions, often affecting wrists or hands
- Technology for identifying individuals based on physical traits
- Data storage based on magnetic fields
- Programs used to perform specific tasks
- AI designed to simulate human expertise in solving problems
- Text-based interface for interacting with computers
- Learning using computer software or tools
- Network device that forwards data to specific devices
Down
- Printer type that sprays ink onto paper to create images
- Allows users to interact visually with a system
- Device that connects two separate networks, enabling communication
- Technology using light for data reading and writing
- Security system that controls incoming and outgoing network traffic
- Unique address assigned to each network interface card
- Temporary storage for data that is lost when powered off
- Software designed to detect and remove malicious programs
- Popular wireless internet communication standard
- Technology for identifying and tracking objects using radio waves
- Address used to identify devices on a network
- Storage with no moving parts, faster and more durable
- Type of barcode that can be scanned quickly
- Permanent storage that retains data even when powered off
- Remote data storage and computing over the internet
- Small-scale network used for personal devices
- Latest version of the internet protocol addressing system
- Device that connects multiple devices on a network, sending data to all
28 Clues: Data storage based on magnetic fields • Programs used to perform specific tasks • Learning using computer software or tools • Type of barcode that can be scanned quickly • Address used to identify devices on a network • Small-scale network used for personal devices • Allows users to interact visually with a system • Popular wireless internet communication standard • ...
Vocabulario 5a (EC) 2025-01-02
Across
- ______ comida = to nibble or eat small bites
- a ____ = often
- Lo _____ = I am sorry
- to climb
- to dive
- the theater
- to get together
- I would like to
- a ____ = sometimes
- por ______ = of course
- hasta _____ = until then
- una ______ de arte = an art gallery
- ver una _____ de teatro = to see a theater play
- to ski
- to communicate
- to have fun
- mirar/ir a un ______ = to watch; attend a match/game of
- unfortunately
- las _____ sociales = social networks/social media
- Me _____ = I would love to
- hacer = to hike
- hacer _____ = to be cold
- to get a tan
- un ____ = a little
- hacer ____ = to be hot
- tener _____ de = to feel like doing something
Down
- hacer ____ = to make plans
- De _____ = agreed
- frequently
- _____ tiempo con = to spend time with
- _____ a = to connect with
- cool
- stadium
- to rain
- to surf
- Nos _____ en = We can meet at (place)
- estar = to be cloudy
- to meet up; to find each other
- hacer = to snowboard
- hacer = to go kayaking
- _____ en bicicleta de montaña = to go mountain biking
- estar = to be sunny
- to meet up
- Estaba ____ en = I was thinking about...
- Nos ____ a la(s) = We can meet at (time)
- to snow
- qué ____ = what a shame
- una _____ de arte = art exhibition
- to get bored
- _____ el tiempo = all the time
- bowling alley
- Me ______ = I would like to
52 Clues: cool • to ski • to dive • stadium • to rain • to surf • to snow • to climb • frequently • to meet up • the theater • to have fun • to get bored • to get a tan • unfortunately • bowling alley • a ____ = often • to communicate • to get together • I would like to • hacer = to hike • De _____ = agreed • a ____ = sometimes • un ____ = a little • estar = to be sunny • estar = to be cloudy • hacer = to snowboard • ...
20 words crossword puzzle ICT 2025-01-08
Across
- A request for information about a certain topic.
- A collection of pages or files linked together and available on the world wide web.
- Usually defines as a personal or noncommercial web site that uses a dated log format.\
- Another way to describe having access to the internet or actively using the internet.
- small pictures that represent the program on your computer.
- This is the printed/paper copy of a file from the computer.
- It is an unwanted email from someone we don't know.
- The web page that your browser is set to use when it starts up, or the main page of any website.
- This is a file that has been added to an e-mail.
- To search for information on the web in a random non-linear way.
Down
- A special software package that connects to a network and provides data.
- Refers to all computer networks on the internet.
- Animated faces that express different emotions.
- To leave a message on a newsgroup or bulletin board.
- A way to quickly access a favorite website by saving it in your browser.
- Illegally copying copyrighted software, music or movies.
- The act of moving from page to page and website to website online.
- This is where all of the messages that you send are kept.
- It is a series of letters and numbers that identifies a location.
- A real-time communication over the internet.
20 Clues: A real-time communication over the internet. • Animated faces that express different emotions. • Refers to all computer networks on the internet. • A request for information about a certain topic. • This is a file that has been added to an e-mail. • It is an unwanted email from someone we don't know. • To leave a message on a newsgroup or bulletin board. • ...
ML Cross Word 2025-03-16
Across
- Process of teaching a model using data
- Adjusting model settings to optimize performance
- Collection of data used for training or testing models
- Mathematical function used in clustering and classification
- Ratio of true positives to predicted positives
- Model that splits data based on feature values
- Open-source deep learning framework by Google
- Ratio of true positives to actual positives
- Algorithm that finds the best boundary between classes
- Python library for classical machine learning algorithms
- Line that best represents data
- Popular deep learning library developed by Facebook
- Computational model inspired by the human brain
- Subset of ML using neural networks with multiple layers
- Table that describes model performance in classification
Down
- Ensemble learning technique using multiple decision trees
- Process of deriving useful information from raw data
- Output generated by a machine learning model
- Classification with two possible output categories
- ML technique where agents learn by interacting with an environment
- ML technique where the model learns from labeled data
- Function that transforms data into a higher-dimensional space
- ML technique for predicting continuous values
- Probabilistic graphical model using Bayes' theorem
- Grouping similar data points without labeled categories
- Choosing the most relevant attributes for a model
- Data point that differs significantly from others
- True negative rate in classification problems
- Process of removing errors and inconsistencies from data
- Automated workflow for ML model development
- Measure of how many predictions are correct
31 Clues: Line that best represents data • Process of teaching a model using data • Ratio of true positives to actual positives • Automated workflow for ML model development • Measure of how many predictions are correct • Output generated by a machine learning model • ML technique for predicting continuous values • Open-source deep learning framework by Google • ...
extra credit GROWTH 2025-04-30
Across
- the world had 2,043 in 2017
- everywhere
- trade and with the accumulation of private possessions that enrich our brief lives, and it creates intangible values of accomplishment and satisfaction
- 3 letter _ (increased body heights, higher life expectancies), greater material security and comfort (be it measured by disposable incomes or ownership of labor-easing devices), and unprece dented degrees of communication and mobility
- the ability to change
- _6th and 13th 1500 and 1800
- holy people
- Had monks belonging to sects that espouse austere simplicity.
- were created by the collision of Indian and Eurasian
- Plant with rare resources
Down
- _10th letter compulsive collectors (however refined their tastes may be) and mentally sick hoarders who turn their abodes into garbage dumps
- 3 letter _ railway networks, expansion of steamship travel, rising production of steel, invention and deployment of internal combustion engines and electricity, rapid urbanization, improved sanitation, rising life expectancy—began to take place at unprecedented rates during the
- proposing to control the Earth’s climate through ...
- the state of not being definitively determined or known, often involving uncertainty or ambiguity
- (length, mass, time, electric current, temperature, amount of substance, luminous intensity)9th letter a _
- Talked about as being primitive
- the name of the author 7th is _
- 7th letter is _A quintessential marker of modern growth
- it took more than three centuries for the population of ----- to double to 400,000
- a metric unit of square measure, equal to 100 ares (2.471 acres or 10,000 square meters).
20 Clues: everywhere • holy people • the ability to change • Plant with rare resources • the world had 2,043 in 2017 • _6th and 13th 1500 and 1800 • Talked about as being primitive • the name of the author 7th is _ • proposing to control the Earth’s climate through ... • were created by the collision of Indian and Eurasian • 7th letter is _A quintessential marker of modern growth • ...
Computer 2025-06-16
Across
- - Each device is connected to a central computer using a point‑to‑point connection (Star Topology)
- Bombing - Spam attackers repeatedly sending bulk mail until the mail server gets full
- Hacking - Hacking done for good causes, such as national security
- - Installing a single licensed copy of software onto multiple computers against license terms
- - A single communication line or one main cable to which all the nodes are directly connected (Bus Topology)
- - Enables you to connect your computer to the internet over a telephone line
- - The process of transforming data into unreadable code
- - A network device used to connect all computers in a network with each other
- - Each node is connected to every other node in the network (Mesh Topology)
- - A group of computers and other peripheral devices linked together for the purpose of sharing data and hardware resources
- - Unwanted bulk email from unknown sources
Down
- Piracy - Copying and distributing software illegally
- - Using or imitating another person's work as one's own
- - The process of converting encrypted information back into readable form
- - Illegal intrusion into a computer system or network
- - All the nodes in the network are connected in a circular manner (Ring Topology)
- - A wireless technology used to interconnect mobile phones, computers, and printers using short‑range wireless connection
- - A device that connects two different types of networks with each other
- - Criminal activities using computer, network, or internet to cause harm to individuals or devices
- - Each computer in a network
20 Clues: - Each computer in a network • - Unwanted bulk email from unknown sources • Piracy - Copying and distributing software illegally • - Illegal intrusion into a computer system or network • - Using or imitating another person's work as one's own • - The process of transforming data into unreadable code • Hacking - Hacking done for good causes, such as national security • ...
Ch2- Network Hardware Essentials 2025-02-25
Across
- virtual local area network
- What IP address class is used for large networks and starts with "10.x.x.x"?
- A layer 3 device that doesn’t forward broadcasts
- What type of cable is used to connect two similar devices, such as two computers or two switches, directly without the need for a hub or router?
- What symbol in Packet Tracer automatically selects the correct cable type when connecting devices?
- Which device in Packet Tracer is used to assign IP addresses automatically to devices on a network?
- A multiport repeater that broadcasts data to all connected devices
- A network message addressed to only one computer on the LAN
- What type of cable is used for high-speed, long-distance communication
- The name assigned to a wireless network
- A tool used in Packet Tracer to check connectivity between devices
Down
- What table does a switch use to forward frames?
- What is the term for a port on a hub or switch that is used to connect to another hub or switch without requiring a crossover cable?
- A network device that uses MAC addresses to forward frames
- The type of cable used to connect a PC to a switch
- The Packet Tracer device that simulates internet connectivity
- A device that regenerates signals to extend transmission
- A device that connects a wired network to a wireless network
- What type of IP address is manually configured and does not change over time?
- network interface card
20 Clues: network interface card • virtual local area network • The name assigned to a wireless network • What table does a switch use to forward frames? • A layer 3 device that doesn’t forward broadcasts • The type of cable used to connect a PC to a switch • A device that regenerates signals to extend transmission • A network device that uses MAC addresses to forward frames • ...
Exemplary Travels. Hayool. Pd. 1. 2024-10-18
Across
- The "ship of the desert" that revolutionized trade across the Sahara.
- The bacterium responsible for the Black Death, which traveled along trade routes.
- Major center of learning and trade in Mali during the 14th century.
- Dynasty established by Kublai Khan, marking Mongol control over China.
- Native American urban centers in the Southwest known for massive trade networks and cultural development.
- West African storytellers who preserved history through oral traditions.
- Roadside inns that supported merchants and travelers on ancient trade routes.
- Chinese ships that dominated trade in the South China Sea.
- Moroccan explorer who traveled over 75,000 miles across the Islamic world.
Down
- Settlements of people outside their homeland, fostering cross-cultural interactions.
- Nickname for European naval powers who dominated global trade routes during the Age of Exploration.
- Ming dynasty ruler who sponsored Zheng He's maritime expeditions and oversaw the construction of the Forbidden City.
- Tower in Delhi built by Muslim rulers, symbolizing the spread of Islam in India.
- Early form of currency that facilitated trade along the Silk Road.
- Massive temple complex built in Cambodia during the Khmer Empire.
- Wealthy ruler of Mali, famous for his pilgrimage to Mecca.
- Mongol ruler who led the destruction of Baghdad, marking the end of the Abbasid Caliphate.
- A method of fast communication and transportation used by the Mongols across their empire.
- Ming dynasty admiral who led massive maritime expeditions across the Indian Ocean.
- Native American city near present-day St. Louis.
20 Clues: Native American city near present-day St. Louis. • Wealthy ruler of Mali, famous for his pilgrimage to Mecca. • Chinese ships that dominated trade in the South China Sea. • Massive temple complex built in Cambodia during the Khmer Empire. • Early form of currency that facilitated trade along the Silk Road. • ...
Slande Cheridor 2024-12-07
Across
- testers who are paid to probe networks and report vulnerabilities
- what the user has (smart card or key)
- a server role that makes it possible for administrators to take control of Microsoft product updates
- The most widely used method for encrypting data
- security features that enable administrators to control who has access to the network
- an industry-standard client/server protocol that offers centralized control
- security features that enable administrators to control what users can do after they are logged on to the network
- used in a Windows domain environment and provides mutual authentication
- backs up the disk sector by sector to create an exact image of the disk’s contents
- framework for other protocols that provide encryption and authentication
- A common tool used by many Linux administrators
- a good security enhancement for servers that aren’t physically secure
Down
- can be set in the Local Security Policy console found in Administrative Tools
- allow an administrator to specify the maximum amount of space any user’s files can occupy on a volume or in a share
- tool used to delete unneeded files in Windows
- disk storage used when there is not enough RAM for a particular operation or for all processes currently in use
- a unique biometric identifying trait. What the user is
- document that describes the rules governing access to an organization’s information resources
- creates a barrier between two entities
- prevents people from using eavesdropping technology
20 Clues: what the user has (smart card or key) • creates a barrier between two entities • tool used to delete unneeded files in Windows • The most widely used method for encrypting data • A common tool used by many Linux administrators • prevents people from using eavesdropping technology • a unique biometric identifying trait. What the user is • ...
Russia Comp Gov 2025-11-17
Across
- Russian court with judicial review (on Putin's request)
- Russia and Nigeria are both one (thanks to oil)
- describes electoral methods of both Federal Assembly and Mexican Congress
- Gorbachev restructuring reforms introducing limited market and political change
- System combining directly elected president with a prime minister and cabinet
- Formerly the Russian Communist party but now the Liberal Democratic Party of Russia
- founder of Smart Voting, now dead
- Soviet-era party appointment system whose networks still shape Russian elites
- can change internal boundaries and ratify treaties
- run by "super-governors"
- term of office for both Putin and Sheinbaum
- Eg. Republic of Altai vs Altai Krai
- Restive North Caucasus region with separatist conflict against Moscow
Down
- Putin's role during Medvedev's presidency
- Business magnates in Russia, created during shock therapy
- Gorbachev policy of openness that loosened censorship and controls
- Term for Russia’s controlled elections, media, and opposition
- Russian state-controlled natural gas giant often used as a foreign policy tool
- Rough functional equivalent of the UK House of Commons, but with far less independence
- Russian equivalent of Mexico’s old PRI-style dominant party
- Long-serving Russian president associated with managed democracy
- Fortress-like seat of Russian executive power in Moscow
- Using legal rules to serve those in power rather than to limit the state
- Putin ally who served one term as president before returning to prime minister
- The new KGB/FSB
25 Clues: The new KGB/FSB • run by "super-governors" • founder of Smart Voting, now dead • Eg. Republic of Altai vs Altai Krai • Putin's role during Medvedev's presidency • term of office for both Putin and Sheinbaum • Russia and Nigeria are both one (thanks to oil) • can change internal boundaries and ratify treaties • Russian court with judicial review (on Putin's request) • ...
FINISH DIGTIAL CITIZENSHIPS CROSSWARD FOR FREE CAR EXTENDED WARENTY 2025-12-01
Across
- legal protection for any piece of tangible forms
- using someone elses words or work for your own use without any credit
- bullying online, social media, text, any use of techonoly
- a type of crime scammers commit when pretending to be legit sources to hack or steal data
- Data that tracks your history online
- an instrument used to measure mass
- ability to access and analyze all forms of commucation
- principals that influence someone's behaviors or beliefs
- computer systems used for learning through human intelegence
- awareness of thoughts and feelings
- the use of graphics, sounds, ect to enhance real life in digital settings
- understanding or sharing feelings with an indivual
Down
- allows limited use of copyrighted items for criticsm, research, ect
- ethical use of technology
- Someone who uses the internet responsibly
- technology obsession
- information used to trick people
- incorrect information
- data like name, address, socail security number, ect
- someone who witnesses something happen
- a feature used to restrict or allow software, apps, ect
- rules for appropriate behavior online
- profiles, usernames, ect
- someone who witnesses something and tries to do something about it
- ability to control how information is used, shared, ect
- converting data to unreadable code
- protection for networks and data from scammers
- an organization that helps empower people for culture and knowledge
- time spent on devices
- process of following calculations for opperations
30 Clues: technology obsession • incorrect information • time spent on devices • profiles, usernames, ect • ethical use of technology • information used to trick people • an instrument used to measure mass • converting data to unreadable code • awareness of thoughts and feelings • Data that tracks your history online • rules for appropriate behavior online • ...
AI crossword 2023-09-17
Across
- The highest form of AI which surpasses human intelligence and ability, potentially able to improve itself autonomously.
- These are the main building blocks of neural networks, similar to neurons in the human brain.
- The branch of AI that enables computers to understand and interpret visual information from the world.
- A subset of AI that allows computers to understand, interpret, and generate human language.
Down
- A broad branch of machine learning based on learning data representations, as opposed to task-specific algorithms.
- This type of AI specializes in performing a narrow task and its intelligence is confined to a narrow domain.
- Theprocess of machines learning from data to identify patterns and make decisions with little to no human intervention.
7 Clues: A subset of AI that allows computers to understand, interpret, and generate human language. • These are the main building blocks of neural networks, similar to neurons in the human brain. • The branch of AI that enables computers to understand and interpret visual information from the world. • ...
Self-Directed Learner 2023-09-29
Across
- A hybrid learning model that combines both traditional in-person instruction and online or digital learning components
- challenges or obstacles that adult learners may face, such as lack of access to education, work-life balance, or motivation issues.
- A theory that emphasizes learning in the digital age, where learners connect to resources and networks to acquire knowledge.
Down
- The practice of effectively allocating time for learning activities, work, and personal responsibilities.
- The concept of continuous learning and skill development throughout one's life’
- A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior
- he theory and practice of teaching and educating adults, emphasizing self-directed learning and the unique needs of adult learners.
7 Clues: The concept of continuous learning and skill development throughout one's life’ • The practice of effectively allocating time for learning activities, work, and personal responsibilities. • A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior • ...
BM2501 2019-10-28
Across
- _____ marketing describes any strategy that encourages individuals to pass on a marketing message to others, creating the potential for exponential growth in the message's exposure and influence.
- _____ marketing involves staging an event that generates excitement, curiosity and publicity to provide information to consumers.
- Word of mouth marketing is when a consumer’s interest in a company’s product or service is reflected in their daily _____.
Down
- Social currency is derived from social _____ theory.
- Social ______ refers to the actual and potential resources from presence in social networks and communities
- _____ messages are required to allow others to effortlessly transfer messages to one another.
6 Clues: Social currency is derived from social _____ theory. • _____ messages are required to allow others to effortlessly transfer messages to one another. • Social ______ refers to the actual and potential resources from presence in social networks and communities • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
Information Security 2024-05-07
Across
- Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock.
- describes methods for ensuring that data stored on a computer system is protected against unauthorized access.
- is a very broad term that includes spyware, ransomware, and viruses.
Down
- is a computer user who enters/breaks into computer systems using hacking tools for their own personal gain without permission.
- is a type of malware that enters in system and hides as if it is a legitimate program.
- spread on their own through computer networks and don’t require the infected program to execute to activate.
6 Clues: is a very broad term that includes spyware, ransomware, and viruses. • is a type of malware that enters in system and hides as if it is a legitimate program. • Once money is paid, the attacker gives a passcode to disinfect the system and remove the lock. • ...
Computer System Servicing 2- Software Applications and Vi 2025-01-23
Across
- infecting applications on a host computer
- they can completely cripple entire computer networks and can easily replicate and spread by using the internet to transfer to devices connected to the network.
- virus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself.
Down
- virus disguised to look like something it is not
- This allows cyber criminals to attack major websites, such as social networking sites, email providers, and any site that enables user input or reviews.
- they can delete data and replace it with their own file content or code
6 Clues: infecting applications on a host computer • virus disguised to look like something it is not • they can delete data and replace it with their own file content or code • virus accesses a computer’s main memory and infects all programs, files, and folders located in the autoexec.bat path, before deleting itself. • ...
NETWORKING QUIZ 2025-05-17
Across
- Encryption is the process of converting data into a code to prevent unauthorized access. It ensures that sensitive information, like passwords or credit card details, remains private even if intercepted by malicious actors. Encryption is essential for securing data both at rest (stored data) and in transit (data being transmitted).
- A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, and helps to prevent unauthorized access or attacks.
- terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats.
Down
- Private Network (VPN) A VPN is a technology that allows users to create a secure and encrypted connection over a less secure network, such as the internet. It enables remote users to access a private network securely, protecting data from being intercepted by unauthorized parties.
- Control Access control refers to the mechanisms used to regulate who or what can access a network or system, and under what conditions. This includes techniques like authentication (verifying the identity of users) and authorization (granting permission to access resources). Types of access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).
- Detection System (IDS: An IDS is a device or software application that monitors a network or systems for malicious activity or policy violations. It alerts administrators to suspicious behavior, such as an unauthorized attempt to access the network, and can also provide real-time detection of potential security breaches.
- are five key terminologies used in performing network security:
7 Clues: are five key terminologies used in performing network security: • terms are fundamental when considering how to secure and protect networks from unauthorized access, data breaches, and other cyber threats. • ...
VID for the Enterprise 2024-01-24
Across
- Provide users with on-demand access to software applications, allowing them to use the software without worrying about the complexities of installation, maintenance, or infrastructure management
- Enables users to run applications, process data, and perform various computational tasks without the need for owning physical hardware.
- Enables communication and connectivity between various resources and services within a cloud environment
- protecting data, systems, and networks from unauthorized access, attacks, and damage.
Down
- Refers to the physical components, such as servers, storage devices, and networking equipment, that form the foundation of cloud computing
- Provides users with scalable and flexible data storage solutions over the internet
- Offers development tools, middleware, automated deployment, scalability, and maintenance and updates
- provides a level of abstraction between the physical hardware resources and the virtualized resources that users interact with
8 Clues: Provides users with scalable and flexible data storage solutions over the internet • protecting data, systems, and networks from unauthorized access, attacks, and damage. • Offers development tools, middleware, automated deployment, scalability, and maintenance and updates • ...
Happy ageing! 2019-04-17
Across
- ______ Nation is a national initiative to harness infocomm technologies, networks and big data to create tech-enabled solutions.
- There are 6 different categories of NSA courses: 1) Health & Wellness, 2) IT & Science, 3) Media, Arts & Design, 4) Ageing & Life Skills, 5) Finance & Business and 6)________
- What kind of software should I install to prevent malware infection?
Down
- NSA has ad-hoc learning opportunities such as ________ Learning Programme that match youths and seniors in a group learning environment.
- A method in which cyber criminals use to fraudulently obtain your personal and financial information such as your login details, bank account numbers and credit card numbers.
- Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense.
- _______ is also known as for malicious software.
- A "guitar" that has 4 strings instead of 6.
8 Clues: A "guitar" that has 4 strings instead of 6. • _______ is also known as for malicious software. • What kind of software should I install to prevent malware infection? • Singapore has recently introduced the sixth pillar of Total Defense: _______ Defense. • ...
paper 2 2022-12-13
Across
- Attempting to gain access to a computer system that you do not have permission to access
- Ensuring that sensitive data is only disclosed to necessary personnel, such as employee records are only processed by staff within the HR department
- The right of all people to keep their personal data confidential
- The process of scrambling data so it can be securely stored, or sent securely over networks so that it can be understood only by its intended recipient
Down
- an assessment of the practicality of a project or system
- Collective term for unwanted and damaging software such as viruses, ransomware, worms and Trojan horses
- Security measure that controls incoming and outgoing network traffic using a set of rule
- Duplicated data to a separate storage media in case the original data is lost
- Anyone who has an interest in, or is affected by, the development of a product or the actions of an organisation
9 Clues: an assessment of the practicality of a project or system • The right of all people to keep their personal data confidential • Duplicated data to a separate storage media in case the original data is lost • Security measure that controls incoming and outgoing network traffic using a set of rule • ...
techno-addictions 2022-10-06
Across
- Disproportionate inclination towards the use of technologies, which limit human freedom and generate dependence.
- Feeling of not being able to live without the Internet, which is detrimental to your personal and professional relationships.
- Category of games based on impulsive play, which require payment to advance and access better features.
- Impulsive search for information at the first possible symptom of discomfort or disease.
Down
- Feeling of anxiety, when you cannot use your cell phone.
- Tendency to forget the information or where we can get it, by always using Google for any query on the Internet.
- Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks.
- The action of undervaluing those who accompany you, when you pay attention to your cell phone instead of them.
- Phantom' vibration, feeling that the phone is vibrating when in fact it has not vibrated and no input has been registered.
9 Clues: Feeling of anxiety, when you cannot use your cell phone. • Impulsive search for information at the first possible symptom of discomfort or disease. • Restlessness and discomfort, caused by the fear of missing out on what is happening in social networks. • Category of games based on impulsive play, which require payment to advance and access better features. • ...
Chapter 13: Education 2019-05-08
Across
- an overemphasis on credentials (e.g. college degrees) for signaling social status or qualifications for a job
- when members of a negatively stereotyped group are placed in a situation where they fear they may confirm those stereotypes
- a set of policies that grant preferential treatment to a number of particular subgroups within the population – typically women and historically disadvantaged racial minorities
- the symbolic and interactional resources that people use to their advantage in various situations
Down
- the information, knowledge of people, and connections that help individuals enter, gain power in, or otherwise leverage social networks
- hypothesis stating that parental resources are finite and that each additional child gets a smaller amount of them
- the nonacademic and less overt socialization functions of schooling
- a way of dividing students into different classes by ability or future plans
- the process through which academic, social, and cultural skills are developed
9 Clues: the nonacademic and less overt socialization functions of schooling • a way of dividing students into different classes by ability or future plans • the process through which academic, social, and cultural skills are developed • the symbolic and interactional resources that people use to their advantage in various situations • ...
The Mafia 2024-01-29
Across
- and sell protection to businesses and resolve disputes among both criminal and legitimate actors.
- a system or organization in which people or groups are ranked one above the other according to status or authority
- the state, which he defined as the monopoly of legitimate force over a given territory
- a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences.in order to obtain directly or indirectly, a financial or material benefit.
- a pattern of relationships between and among individuals and social groups
- hierarchies consisting of a limited number of mafiosi drawn from networks of socially close people
Down
- monopolize the provision of some illicit service or product utilizing Violence
- also known as team leaders
- a real, active, and operating commercial or entrepreneurial undertaking which produces services or goods for profit
9 Clues: also known as team leaders • a pattern of relationships between and among individuals and social groups • monopolize the provision of some illicit service or product utilizing Violence • the state, which he defined as the monopoly of legitimate force over a given territory • ...
Living Online 2015-08-24
Across
- Malicious program that travels from computer to computer, usually through networks, copying itself over and over; can overload comput¬ers and networks.
- Hardware device or program that prevents unwanted access and blocks unwanted programs like viruses from entering a network.
- Wireless technology used to network computers together and to other devices like printers or servers.
- Any machine attached to a network: client, server, printer, and so on.
- Malicious program installed with¬out the user’s knowledge while surfing the Internet that tracks the user’s activities and gathers other information.
- Copying something created by someone else not giving credit
- Bad hacker who creates malicious programs to break into computers and do harm
- Process where files, data or e-mail messages are intentionally made unreadable without a mechanism to decode it.
- Characters created using the colon or semicolon keys for eyes to express emotion in a text or e-mail message, such as :) or :(.
- A program or feature used to block spam or e-mail messages from specific senders
- Standards used to control how data is sent over a network
- Businesses that have a physical location.
- Pieces of text that are stored on the computer as you surf the Internet that help Web sites track your activities.
- Boolean operator that excludes specific words from search results.
- Password with at least eight characters containing a mixture of uppercase and lowercase letters, numbers and punctuation or symbol characters.
- Unique name given to each network and used to identify specific e-mail and Web servers.
- A delivered e-mail message has been ___________.
- Security devices that read finger¬prints, analyze a user’s voice, and so on to provide secure access.
- E-mail attack or scam designed to gather information from a user while appearing to be safe
Down
- Disposing of paper and other products so they can be processed for reuse
- Concept that says you don’t need permission to include limited excerpts from another author’s work when reviewing or analyzing it
- Program that combs the Internet, cataloging all the Web pages it finds and storing the results in a search¬able database.
- Saved URL
- Part of an IP address that defines the network from which a user is then accessing the Internet.
- Buying and selling products and ser¬vices by bidding over the Internet
- Boolean search operator that requires both search terms to be included in the search results
- Sending an existing e-mail message on to a new recipient
- Any field in a form on a Web page or other document where the user can enter text.
- Microsoft’s dedicated e-mail soft¬ware program.
- Most popular search engine.
- Area at the top of a Web browser that displays the URL of the current site or the site a user is about to access.
- Feature that enables a user quickly look through files or e-mail mes¬sages for a key word or phrase.
- Used by machines like an ATM to conduct secure transactions.
- Password that contains anything that could be easy to guess, such as birthdays, names, or strings of fewer than eight characters.
- Default Web page that opens when a browser is launched.
- Unsolicited e-mail message sent by someone you don’t know.
36 Clues: Saved URL • Most popular search engine. • Businesses that have a physical location. • Microsoft’s dedicated e-mail soft¬ware program. • A delivered e-mail message has been ___________. • Default Web page that opens when a browser is launched. • Sending an existing e-mail message on to a new recipient • Standards used to control how data is sent over a network • ...
HOI 2020-02-25
Across
- / a series of coded software instructions to control the operation of a computer or other machine
- social network / is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
- / a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
- reader / s a mobile electronic device that is designed primarily for the purpose of reading digital e-books
- / combining 2 or more functions in a unit.
- / an extra copy of data on a computer.
- engine / is designed to carry out web search, which means to search the World Wide Web
- device / A communication device is a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or wirelessly.
- console / a piece of electronic equipment for playing games on
- / cause to occur or operate at the same time or rate
- computing / is an application of environmental science which offers economically possible solutions that conserve natural environment and its resources
- device / is a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance.
- / an application, downloaded usually by a mobile user.
- / is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
- / a program with graphic interface on a world wide web.
- / a location connected to the Internet that maintains one or more pages on the World Wide Web
- / a group or system of interconnected people or things
- device / is any piece of computer hardware equipment which converts information into human-readable form.
- server / a computer program that distributes web pages as they are requisitioned
Down
- / type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
- drive / a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit.
- media player / a handheld electronic device for playing digital media such as audio and video files
- device convergence / means the ability to view the same multimedia content from different types devices and thanks to the digitization of content
- / short-range wireless interconnection of devices.
- / a program or piece of software made to fulfill a purpose.
- storage / a model of computer data storage in which the digital data is stored in logical pools.
- / a machine for printing text or pictures onto paper, especially one linked to a computer.
- / the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket.
- / synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
- / the programs and other operating information used by a computer.
- device / a wearable device is a technology that is worn on the human body
- / a computer or computer program which manages access to a centralized resource or service in a network
- / the faculty by which the mind stores and remembers information
- / is basically a system of Internet servers that support specially formatted documents.
34 Clues: / an extra copy of data on a computer. • / combining 2 or more functions in a unit. • / short-range wireless interconnection of devices. • / cause to occur or operate at the same time or rate • / an application, downloaded usually by a mobile user. • / a group or system of interconnected people or things • / a program with graphic interface on a world wide web. • ...
Chapter3_Internet Crime 2017-08-03
Across
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker that Promote political ideology.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
Down
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of programming code is attached to a file, so that when the infected file is opened, the code executes
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Chapter3_Internet Crime 2017-08-03
Across
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
Down
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Type of attacker that Promote political ideology.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people. • ...
Chapter3_Internet Crime 2017-08-03
Across
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Type of attacker that Promote political ideology.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
Down
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
22 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Chapter3_Internet Crime 2017-08-03
Across
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- Type of attacker that Promote political ideology.
Down
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of code is attached to a file, so that when the infected file is opened, the code executes
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
22 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
Final Review 2023-11-27
Across
- Contains users and computer settings and policies.
- This configuration change allows admins to improve VoIP.
- The amount of time that the data can be stored in the DNS cache.
- This technology is also referred to as a PAN.
- A group of networks that are geographically isolated but are connected by ISPs.
- This email protocol is used to send emails.
- Changing this value in Task Manager provides adequate attention from the system CPU to a process.
- A secure remote access protocol.
- Is used to encrypt the entire volume.
- IP address on the 169.254.0.0 network assigned by hosts to themselves.
- Public key encryption happens in this OSI model layer.
- File Access Protocol which can be protected.
- Windows admin utility that allows admins to aggregate different admin tools.
- A list that contains information on allowed and denied access to folders and files.
- Tis virtualization component provides the hardware needed.
- The DNS servers hold the original and official DNS records for a specific domain.
- This kernel component moves the data of an app not currently being accessed from RAM to a paging file.
- This email Protocol is used to retrieve emails.
- In a TCP connection hosts send this packet to establish a connection.
- The rights granted to a user or group to access files and folders.
- A thin layer of software that resides between the virtual machine and hardware.
- This Linux command is used to change permissions.
- This attribute is unique for all objects in a domain.
- Is responsible for converting logical data into an acceptable form for transmission.
- Hubs physical topology.
- This OSI model layer is responsible for end-to-end communication.
- This command allows you to resolve a hostname to its associated IP address.
- A type of system software on SOHO routers.
- This type of Windows installation is used when a compatible OS needs to be upgraded.
Down
- .com, .net, and .ca are registered under this DNS server.
- This topology describes how the network's computers are connected.
- TCP protocol sends this to start the handshake negotiation.
- A reliable Transport layer protocol.
- Is a lightweight Active Directory Protocol.
- In this network type, organization resources are shared with suppliers.
- A file created by the hypervisor to store data.
- The process of proving someone's identity.
- This application layer protocol uses TCP port 3389.
- Simple Multi-tenancy is associated with this cloud type.
- This wireless feature allows a printer connection with the least effort.
- Type of network is available privately to employees.
- Disabling this option creates unique permissions for a folder.
- These types of groups are created mainly for permissions.
- This application layer protocol uses TCP port 389.
- This cloud solution delivers everything a developer needs.
- This backup solution backs up every file that has changed since the last full backup.
- This VPN provides both authentication and encryption.
- The network name on a wireless network.
- The frequency at which your router sends and receives signals.
- This reference model is created to interpret network communication.
- This command in the Linux system is used to search for text.
- Uses TCP port 22 for remote access.
- This transport layer protocol is used when speed is the main concern.
- This device interconnects multiple networks to each other.
54 Clues: Hubs physical topology. • A secure remote access protocol. • Uses TCP port 22 for remote access. • A reliable Transport layer protocol. • Is used to encrypt the entire volume. • The network name on a wireless network. • The process of proving someone's identity. • A type of system software on SOHO routers. • Is a lightweight Active Directory Protocol. • ...
CAT cross word 2024-10-09
Across
- Software that is available for use at no cost but may have restrictions on usage or distribution
- A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
- Address A unique identifier assigned to each device connected to a network that uses the Internet Protocol for communication.
- Computing The delivery of computing services, such as storage, processing, and software, over the internet (the cloud) to offer flexible resources and economies of scale.
- The use of digital communication tools (like social media, messaging apps, or online forums) to harass, threaten, embarrass, or target another person. Cyberbullying can include spreading rumours, sending harmful messages, impersonation, or sharing private information without consent.
- A technology that allows electronic devices to connect to a wireless local area network (WLAN) using radio waves.
- A cyber attack that redirects users from legitimate websites to fraudulent ones to steal sensitive information
- A standard for connecting peripherals to a computer, allowing for data transfer and power supply, available in various versions (e.g., USB 2.0, USB 3.0) with different speeds and capabilities.
- Processing Unit, the primary component of a computer that performs most of the processing tasks.
- A cyber attack that uses disguised emails or messages to trick users into revealing confidential information, such as passwords or credit card numbers.
- (Fiber to the Home) A type of broadband network architecture where optical fibre is installed directly from the central provider's office to individual homes or buildings, providing high-speed internet access
- A data storage device that uses flash memory to store data, providing faster access than traditional hard drives.
- A network device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to its intended destination, reducing network collisions
- Wide Area Network, a network that covers a broad geographical area, connecting multiple smaller networks (LANs).
Down
- Cable A cable made of thin strands of glass or plastic that transmits data as light signals, offering high-speed data transmission with minimal signal loss
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Random Access Memory, a type of fast but temporary storage that a computer uses to store data that is currently being used or processed
- Central Processing Unit, the primary component of a computer that performs most of the processing tasks
- Malicious software designed to harm or exploit any programmable device or network.
- Local Area Network, a network that connects computers within a small geographical area, like a home, school, or office.
- Server A server that provides database services to other computers or applications, handling queries, storage, and data management.
- Computing Device A device built and optimized to perform a single task or a limited range of tasks, such as a GPS navigator, a digital camera, or a gaming console.
- A type of twisted pair cable used in Ethernet networks, without additional shielding, typically less expensive and more flexible than STP.
- A wireless network that connects devices within a limited area, like a home or office, using Wi-Fi technology.
- Graphics Processing Unit, a specialized processor designed to accelerate graphics rendering and image processing
- Engineering The use of psychological manipulation to trick individuals into divulging confidential information or performing actions that compromise security.
26 Clues: Malicious software designed to harm or exploit any programmable device or network. • Software that is available for use at no cost but may have restrictions on usage or distribution • Processing Unit, the primary component of a computer that performs most of the processing tasks. • ...
Cyber Security Review 2021-09-08
Across
- Use IP Address to pass the data between networks
- Reduce collisions because split the
- is software/hardware based network security system that controls the in and out network traffic
- _____________ Control Protocol
- Downloads onto a computer disguised as a legitimate program
- software intentionally designed to harm a network, server, or computer
- Data arriving to a _____ port is repeated on all the other ports
- Misrepresenting oneself by using fake e- mail addresses or masquerading as someone else
- Intentionally disrupting, defacing or destroying a Web site
- Destroy data when certain conditions are met
- is an object, person, or other entity that represents a constant danger to an asset
- is a flexible filament of very clear glass capable of carrying information in the form of light
- This address is a 48 bits long binary number unique for every network card
- A type of software security
- These IPs do not change. Whether you
- translates the locally significant source address into a globally unique address
- Is a device that plugs into a motherboard and provides ports for the network cable connections
- Doesn’t needs user intervention to replicates
- These losses refer to the loss of trust and lowered opinion of people to a business as a result of them being affected by a threat
- Cable that consists of a cylindrical conductor that surrounds a single inner wire made of two conducting elements
- is a series of LANs linked together to form a network in an extended area
- Type of network that consists of a series of computers linked together to form a network in a circumscribed location
- person who intends to gain unauthorized access to a computer systems
- It forward the information based on MAC address list and ports
- your machine or reboot your router it remains the
Down
- Topology in which all nodes indirectly connect to each other through one or more switches
- A group of computers and associated devices that are connected by communications facilities
- These losses refer to damages of the operating capability of an organisation
- Its purpose is to regenerate signals distorted by transmission loss due to attenuation
- is a network that is spread over a very small area
- domains
- These losses refer to damages to the wealth of an organisation
- Activated when infected program is loaded in memory and executed by its own or a user action
- between computers on a network plural)
- In this topology data travels in one direction using a control signal called a ‘token’
- Fraudulent email leading to a fraudulent website
- Network topology where all the nodes are joined to one cable
- The practice and study of techniques for secure communication
- A type of physical security
- cable type that is commonly used on Ethernet networks
- is a malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- to a computing device or node when it’s connected to a network
- is a temporary IP address that is
- Is a set of rules that governs the
- occurs when someone steals your personal information to commit crimes in your name
- the process of converting plaintext to ciphertext
46 Clues: domains • A type of physical security • A type of software security • _____________ Control Protocol • is a temporary IP address that is • Is a set of rules that governs the • Reduce collisions because split the • These IPs do not change. Whether you • between computers on a network plural) • Destroy data when certain conditions are met • ...
SET 4 2023-01-22
Across
- A technology that deals with the manipulation and control of matter at the atomic and molecular level
- Activity of pinpointing and resolving issues with softwares/technology
- protective barrier for computer networks and systems, like a security guard for your online information
Down
- A software that takes the source code of a program and turns it into machine code that the computer can understand
- A digital code or symbol that represents an asset or a right, like a digital coupon or a gift card
5 Clues: Activity of pinpointing and resolving issues with softwares/technology • A digital code or symbol that represents an asset or a right, like a digital coupon or a gift card • A technology that deals with the manipulation and control of matter at the atomic and molecular level • ...
Cyber Security Awareness (3) 2024-10-15
Across
- Probability of a cyberattack or data breach causing loss or exposure to an organization
- Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
- practice of protecting systems, networks, and programs from digital attacks
Down
- Text files that contain small amounts of data about a user that can be used for both good and bad purposes
- malicious program that can spread to a computer or network router without the user's knowledge or permission
5 Clues: practice of protecting systems, networks, and programs from digital attacks • Probability of a cyberattack or data breach causing loss or exposure to an organization • Text files that contain small amounts of data about a user that can be used for both good and bad purposes • ...
Tencho Definitions 2022-02-25
Across
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- denoting or relating to a period of a thousand years.
- Solar Systems permits electricity to be harnessed by solar panels and stored inside a battery without direct connection to the utility grid.
- take (something) illicitly; steal.
- content whose main purpose is to attract attention and encourage visitors to click on a link to a particular web page.
- the state, fact, quality, or condition of being singular.
- a mobile device used while watching television especially to access supplementary content or applications
- someone who would like to start a business and thinks and talks about doing so, but never gets started.
- Audio high-resolution audio files are superior sound quality over compressed audio formats such as MP3 and AAC.
- Data data that contains greater variety, arriving in increasing volumes and with more velocity
- fusion the process of combining sensor data or data derived from disparate sources such that the resulting information has less uncertainty than.
- Optimization the process of ensuring that visitors who access your site from mobile devices have an experience optimized for the device.
- business model in which a company offers basic or limited features to users at no cost and then charges a premium for supplemental or advanced features.
- Leader one whose views on a subject are taken to be authoritative and influential.
- Networks a computer system modeled on the human brain and nervous system.
- a course of study made available over the internet without charge to a very large number of people.
- the formation of ideas or concepts.
- a person, company, or technology that changes the way an industry operates.
Down
- a form of entertainment
- or Radio detection and ranging: a detection system that uses radio waves to determine the distance (ranging), angle, or velocity of objects.
- the application of typical elements of game playing (e.g. point scoring, competition with others, rules of play) to other areas of activity, typically as an online marketing technique to encourage engagement with a product or service.
- is King you should focus on putting out good content frequently and consistently.
- short for key performance indicator.
- a standards-based wireless technology developed to enable low-cost, low-power wireless machines a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.
- reuse (discarded objects or material) in such a way as to create a product of higher quality or value than the original.
- an image, video, advertisement, etc., that is circulated rapidly on the internet.
- 360 video recordings where a view in every direction is recorded at the same time, shot using an omnidirectional camera or a collection of cameras.
- Computing a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
- the correct or acceptable way of communicating on the internet
- posting a single message or piece of content to multiple destinations.
- the state or quality of being efficient.
- Fatigue the feeling experienced by many people who are required to remember an excessive number of passwords as part of their daily routine.
- a person who introduces new methods, ideas, or products.
33 Clues: a form of entertainment • take (something) illicitly; steal. • the formation of ideas or concepts. • short for key performance indicator. • the state or quality of being efficient. • denoting or relating to a period of a thousand years. • a person who introduces new methods, ideas, or products. • the state, fact, quality, or condition of being singular. • ...
Chapter3_Internet Crime 2017-08-03
Across
- ______is a large group of computers controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.
- Type of attacker that test the limitations of information systems out of intellectual curiosity—to see whether they can gain access and how far they can go.
- ______is a harmful program that resides in the active memory of the computer and duplicates itself.
- They are motivated by the potential for monetary gain and hack into corporate computers to steal, often by transferring money from one account to another to another.
- ________ audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.
- A software that generates and grades tests that humans can pass but all but the most sophisticated computer programs cannot.
- type of attack in which a malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.
- ______is a set of programs that enables its user to gain administrator level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system
- type of attack takes place before the security community or software developer knows about the vulnerability or has been able to repair it.
- ______is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner. Often this piece of prpgramming code is attached to a file, so that when the infected file is opened, the code executes
- ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data.
- Computer ___________ Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence
Down
- Type of attacker that Capture trade secrets and gain competitive advantage.They use illegal means to obtain trade secrets from competitors of their sponsor.
- In computing,_______is an attack on an information system that takes advantage of a particular system vulnerability.Often this attack is due to poor system design or implementation.
- ______is a variation of phishing in which the phisher sends fraudulent e-mails to a certain organization’s employees.
- Type of computing that delivers secure, private, and reliable computing experiences based on sound business practices
- Type of attacker that gain financially and/or disrupt company’s information systems and business operations.Companies are exposed to a wide range of fraud risks card fraud within an organization due to weaknesses in its internal control procedures.
- ______is a program in which malicious code is hidden inside a seemingly harmless program.
- Type of attacker Cause problems, steal data, and corrupt systems.They break into other people’s networks and systems to cause harm—defacing Web pages, crashing computers, spreading harmful programs or hateful messages, and writing scripts and automated programs that let other people do the same things.
- Type of attacker that Promote political ideology.
- ______ stands guard between an organization’s internal network and the Internet,and it limits network access based on the organization’s access policy
- ______ assessment is the process of assessing security-related risks to an organization’s omputers and networks from both internal and external threats.
- Email _______ is the abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
23 Clues: Type of attacker that Promote political ideology. • ______is a program in which malicious code is hidden inside a seemingly harmless program. • ______is the act of using e-mail fraudulently to try to get the recipient to reveal personal data. • ______is a harmful program that resides in the active memory of the computer and duplicates itself. • ...
PC PRO Chap 9 Key Terms 2020-03-06
Across
- The plastic casing around an electronic device's screen.
- A mobile communications standard used by 5G.
- A feature that measures the vertical and horizontal orientation of the device.
- A port on a mobile device that enables devices to exchange data without using cables.
- A troubleshooting tool that identifies issues in installed apps.
- A system power state where they system appears to be off, but volatile memory is refreshed and some components remain powered so the computer can wake up quickly if it receives input from a keyboard, LAN, or USB device.
- A troubleshooting tool for Wi-Fi connectivity issues that identifies the number of broadcasting APs, displays the signal strength and channel of each wireless network, and obtains wireless network information such as the network type, data activity, and service provider.
- A semiconductor device that emits light when an electric current passes through it.
- A physical location where you can obtain wireless Internet access using a wireless local area network (WLAN) with a router connected to an internet service provider.
- Connecting one device to another.
- A power supply that converts DC power from a computer to AC power for a screen.
- The package file format used by the Android operating system for the distribution and installation of mobile apps and middleware.
- A unique number given to every single mobile phone. The number is typically found behind the battery.
Down
- A proprietary computer bus and power connector created by Apple Inc. to replace its previous proprietary 30-pin dock connector.
- A mobile virtual private network (mobile VPN) provides mobile devices with access to network resources and software applications on their home network when they connect using other wireless or wired networks.
- A wireless technology standard for exchanging data over short distances from fixed and mobile devices and for building personal area networks (PANs).
- A troubleshooting tool for cellular network connectivity issues that reports signal strength, interference number of cell towers in the area, the location of each cell tower, and mobile network information such as the network type, data activity, and service provider.
- A set of software development tools that allows the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar development platform.
- Detects the physical movements of the tablet by measuring its linear acceleration in one dimension.
- The light that illuminates an LCD screen so that images on the screen are visible.
- A telecommunications interface standard used on an Integrated Services Digital Network (ISDN) to carry multiple DS0 voice and data transmissions between the network and a user.
- A database residing in a wireless device that contains information used during the system selection and acquisition process.
- An electronic display system that switches pixels on and off using liquid crystals that rotate polarized light.
- A space-based navigation system that provides location and time information in all weather conditions anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.
- A system power state where the system appears to be off and power consumption is reduced to a lower level.
- A unique identifier that defines a subscriber in the wireless world, including the country and mobile network to which the subscriber belongs. The IMSI is one of the pieces of information stored on a SIM card.
26 Clues: Connecting one device to another. • A mobile communications standard used by 5G. • The plastic casing around an electronic device's screen. • A troubleshooting tool that identifies issues in installed apps. • A feature that measures the vertical and horizontal orientation of the device. • ...
EY Technology Review 2023-05-12
Across
- Sometimes called a web or internet browser, a browser is a software program used to navigate the world wide web.
- Talk To You Later
- A company that connect people/homes/networks to the internet. Our ISP is Comcast.
- apples version of a word processor
- Laugh out loud
- Not right now
- apples version of presentation software
- The connection of the billions of devices, computers, websites, and networks connected together (with wires, signals, satellites etc) sharing information and communicating.
- most common spreadsheet software there is. Owned by Microsoft.
- Microsoft cloud service
- Often called a PDF.A versital file type readable by almost all hardware/software/operating systems. A very useful way to lock and share files.
- Googles Cloud service
- googles version of presentation software
- Your wireless connection to a network that hopefully is connected to the internet.
- one of the big 3 companies known for androids, search engines, gmail
- googles version of spreadsheet software
- An awesome technology teach
- A popular company with a variety of useful software that tend to specialize in multimedia and other creativity packages
- Hit Me Up
- collection of pages (more then 1) grouped together and published together. Often they have a theme to them. We spoke of the Boulder Boulder site having a registration page, map page, photo page, parking page etc...
- when you verify somebody or something is who/what they say they are
- Rolling on the floor laughing
- A devices that converts your data/requests into transferable packets the be sent/received across the internet. Your connection to the ISP whom connects you to the internet
Down
- A bookmark, sometimes called a “favorite,” saves a web page’s address. Allows you to access your favorites without typing…
- If you are connected to the internet.
- big 3 company known for iphones, ipads, graphics, macs, music
- big 3 companies known for productivity software Office, PCs, etc
- a single page/document containing information posted on the internet for people to see/use
- Thank goodness it's Friday
- googles version of a word processor
- IOT… what the internet has become now that everything we have is pretty much monitoring, connected, and communicating on a network… fridgerator, car, phone, printer, AC, … The dryer telling date the laundry was done.
- Microsofts version of presentation software
- Let Me Know
- When you use more then on form of information to verify/authenticate. Commonly something you 'know' (like password, phrase, dob) and something you 'have" that is physical like an ID badge, finger print, eye scan etc.
- apples version of spreadsheet software
- When you shut off your wireless signal to the internet. You can still use your device it just only has access to information stored on it.
- microsofts version of a word processor software
- The interconnection of information on webpages (and now websites) linked together through the internet. The WWW or "web" is often incorrectly used by people when they mean internet. The Web is not the internet but rather a part of the internet.
- Be Right back
- 2 or more computers/devices connected together (wired or wireless) sharing information. Think of all the devices in our house connected together.
- Plan Do Check Act
- If you are not connected to the internet
42 Clues: Hit Me Up • Let Me Know • Not right now • Be Right back • Laugh out loud • Talk To You Later • Plan Do Check Act • Googles Cloud service • Microsoft cloud service • Thank goodness it's Friday • An awesome technology teach • Rolling on the floor laughing • apples version of a word processor • googles version of a word processor • If you are connected to the internet. • ...
stem careers 2023-06-01
Across
- take what the network architect has done and ensure the day-to-day operation of these networks runs smoothly.
- studies microorganisms
- is a scientist who works with designing scientific equipment
- spend their time making sure databases run efficiently by securing data and storing it appropriately.
- spends their time designing equipment and creating a process for manufacturing chemicals and products.
- fix things in house with water
- help with money
- works with computer
- fix peoples eyes
- fix peoples insides
- cut hair
- help students learn
- helps doctors
- fix engines
- fix things with electricity
- build things like houses
- work with space
- fix people's mouths with braces and stuff that hurts
- put their engineering skills to use by working on circuit boards, processors, memory devices, networks, and routers by researching, designing, and developing systems.
- studies the Earth
- do stuff with math like solving hard problems
- make food
- extract metals or minerals from sites they established may have mineral deposits
- use telescopes to study planets
- They can take materials and create products from medical devices all the way down to golf clubs
- help pets
- work with stuff in water
- try to improve the quality of products and ensure they are safe
- help people with their fitness
- work with chemicals
- will work closely with a mathematician to design surveys or experiments to collect the data to support or disprove a hypothesis.
- design things on the web
- work with animals
- also known as java developers, spend their time in the nuts and bolts of tech as they build, program, design, and maintain software.
- does exactly that; they develop and implement tests to find software issues
Down
- make stuff for industrial use
- conduct research into fundamental computer and information science to develop solutions to problems.
- work with stats
- engineer stuff all around
- estimate how much things are
- is in the name, because these individuals actually design and build large databases
- job is to ensure products meet safety standards by monitoring chemical processes
- These engineers solve problems surrounding agricultural problems like pollution, power supplies, and the efficiency of agricultural machinery.
- design buildings
- only focus is to improve human health
- takes engineering to the next level by designing ways to extract natural gas and oil from the earth.
- strives to improve the environment at all costs.
- are similar to archeologists in the sense that they study culture
- solves problems
- may also get the joy of designing entire electrical systems!
- monitors security measures to protect information
- work with a variety of structures and chemical properties to manipulate them in order to enhance products or create new ones
- spend their time improving business decision making and policy formulation by interpreting applicable mathematical information.
- plan transportation
- fly planes
- make things with computer
- help people with their mouth
- job is to improve overall human health by investigating diseases and establishing methods to prevent or treat them.
- takes their knowledge of mathematics and statistics to solve problems that may occur in the real world.
- develop and maintain websites
60 Clues: cut hair • make food • help pets • fly planes • fix engines • helps doctors • work with stats • solves problems • help with money • work with space • design buildings • fix peoples eyes • studies the Earth • work with animals • works with computer • fix peoples insides • plan transportation • help students learn • work with chemicals • studies microorganisms • build things like houses • ...
Unit 2 Vocabulary Quiz 2025-10-02
Across
- Lotus Society: a secret society that began organizing to overthrow the Yuan Dynasty
- Horde: Batu's army that pushed westward through Russia and then into Europe
- an arrangement to receive cash, goods, or services now and pay for them in the future
- Economy: using money rather than bartering with commodities like cowrie shells or salt
- Ocean Slave Trade: slaves from eastern Africa were sold in northern Africa, the Middle east, and India. This led to African customs spreading throughout these areas
- the four regional Mongol kingdoms that arose after the death of Genghis Khan
- Compass: navigation tool for determining direction that allowed ships to travel without following the coast
- Bow: a versatile weapon that provided the Mongol cavalry with superior range, accuracy, and mobility, contributing to their military dominance and conquests
- a central component of Mongol society, characterized by their mobile lifestyle, reliance on animal husbandry, and skilled horsemanship, which enabled the Mongols to establish a vast empire through their expertise in mounted warfare and strategic mobility
- of Exchange: documents stating the holder was legally promised payment of a set amount on a set date
- continual eating of grasses or their roots without allowing them to regrow which led to abandonment of cities outside of Great Zimbabwe in the late 1400s
- Mongolica: the period of Mongolian peace between the 13th and 14th centuries
- settlements of people away from their homeland arising from trade
- Rudders: invented by the Chinese and made steering ships easier and more stable
- invented in China in the 9th century; used in siege warfare like cannons in the Song Dynasty
- Trade: route across the Sahara Desert; traded for gold and salt, created caravan routes, economic benefit for controlling dessert, camels and camel saddles were crucial in the development of these trade networks; facilitated the spread of Islam
- Weapons: portable towers and catapults
- Money: a system of credit developed in China that allowed a person to deposit money at one location and withdraw it at another
- Diffusion: the spread of ideas, religions and products often resulting from trade
Down
- a military unit consisting of approximately 10,000 soldiers, led by a commander known as a noyan, and formed the backbone of the Mongol military organization during their conquests
- groups of people traveling together for mutual protection, often with pack animals such as camels
- Ships: Arab ships with lateen sails; strongly influenced European ship design; facilitated trade in the Indian Ocean networks
- Bubonic Plague: Mongol conquests brought fleas that carried the bubonic plague to Asia and Europe
- Houses: issued bills of exchange; model for modern banks
- heavy winds that affected trade routes in the Indian Ocean
- Hanseatic League: a commercial alliance that formed between northern German cities and Scandinavia in the 13th century
- Sail: triangular shaped sail that could catch wind from many different directions
- Saddle: saddles developed by South Arabians as the use of the camel spread
- a fine blue and white ware from China
- Chinese sailing ship that developed during the Song Dynasty
- (or caravansary): inns that popped up about 100 miles apart (the distance camels could go before they needed water) along the routes of the Silk Roads
- an instrument used to determine latitude by measuring the position of the stars
- meeting of Mongol chieftains in 1206 where Temujin "Genghis Khan” was elected khan of the Mongolian Kingdom
- Script: system of writing that Genghis Khan adopted for the Mongol Empire
- Erosion: overuse of farmland and deforestation reduced agricultural production in feudal Europe
35 Clues: a fine blue and white ware from China • Weapons: portable towers and catapults • Houses: issued bills of exchange; model for modern banks • heavy winds that affected trade routes in the Indian Ocean • Chinese sailing ship that developed during the Song Dynasty • settlements of people away from their homeland arising from trade • ...
CHAPTER 18 TERMS 2020-09-10
Across
- Processor, memory, hard-disk or other storage subsystem, and wired/wireless utilization.
- contain events triggered by applications or programs determined by their programmers
- Supports plaintext authentication with MD5 or SHA with no encryption but provides GET BULK.
- the facility to which the message refers.
- a device that test the speed of data transfer in the network.
- are used to determine whether your network meets specific International Organization for Standardization or Telecommunication Industry Association standards.
- detects unwanted attempts to manipulate network systems and/or environments
- a single digit code from 0 to 7 that indicates the severity of the message.
- most popular form of TCP scanning
- displays and reports intrusions and attacks logged in the Snort database in a web browser for convenient analysis.
- is a device that transmits signals through each wire copper twisted pair to determine if it is connected to the correct pin at the other end.
- used for sniffing wireless networks
- protocol analyzers such as load testing, connectivity testing, and throughput testing.
- contain events generated by Windows system component, including drivers and services that started or failed to start.
- the port scanner generates a SYN packet, and if targeted port is open , it will respond with a SYN-ACK packet.
- analyzes protocols
- looks inside every packet on a network segment.
Down
- text string containing detailed information about the even being reported.
- the standard level of performance of a certain device or to the normal operating capacity for your whole network.
- date and time of a message.
- a text string that uniquely describes the message.
- a diagnostic procedure in which a signal is transmitted and returned to the sending device after passing through all or a portion of a network circuit.
- a powerful enterprise (large corporate environment) network intrusion and prevention system.
- a device that test the speed of data transfer in the network.
- contain security events like valid logon attempts and potential security problems
- a term for software products and services combining security information management and security event management.
- is a line tester designed to check a copper cable connection for basic installation problems like opens, shorts, and crossed pairs.
- stores messages from you and can even time stamp and sequence them for you. Allows you to display, sort, and even search messages.
- sends messages to the NMS station, which then either reads or writes information in the database, stored on the NMS.
- a software tool designed to search a host for open ports.
- a combination cable tester and network analyzer, only better because it comes with more options.
- is a computer security device that monitors network and/or system activities for any strange or malicious behavior
- scanning multiple host on a network for a specific listening TCP or UDP port, like SQL.
- a family of tools used to analyze our networks (IDS/IPS software, port scanners, Wi-Fi analyzers, and bandwidth speed testers).
- Supports strong authentication with MD5 or SHA, providing confidentiality (encryption) and data integrity of messages via DES or DES-256 encryption between agents and managers.
- supports plaintext authentication with community strings and uses only UDP.
- an Application layer protocol that provides a message format for agents on a variety of devices to communicate with network management stations.
37 Clues: analyzes protocols • date and time of a message. • most popular form of TCP scanning • used for sniffing wireless networks • the facility to which the message refers. • looks inside every packet on a network segment. • a text string that uniquely describes the message. • a software tool designed to search a host for open ports. • ...
AWS Quiz III 2022-06-10
Across
- is an edge computing, data migration, and edge storage device that comes in two Options.
- is a cloud-based hardware security module that enables you to easily generate and use your own encryption keys on the AWS Cloud.
- is a highly available and scalable cloud Domain Name System (DNS) web service.
- provides a single location to track the progress of application migrations across multiple AWS and partner solutions
- is a service that enables customers to connect their Amazon Virtual Private Clouds (VPCs) and their on-premises networks to a single gateway
- is a data transfer service that makes it easy for you to automate moving data between on-premises storage and Amazon S3 or EFS.
- is an object storage service that offers industry-leading scalability, data availability, security, and performance.
- is a fully managed service that makes it easy for developers to create, publish,maintain, monitor, and secure APIs at any scale.
- lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily
- provides alerts and remediation guidance when AWS is experiencing events that might affect you.
- is a security service that uses machine learning to automatically discover, classify, and protect PII in S3 buckets.
- provides on-demand access to AWS’ security and compliance reports and select online agreements.
Down
- makes it easy to establish a dedicated network connection from your premises to AWS.
- running on AWS
- is a threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.
- gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
- can migrate your data to and from most widely used commercial and open-source databases.
- is a managed Distributed Denial of Service (DDoS) protection service that safeguards web
- is a networking service that improves the availability and performance of the applications that you offer to your global users.
- enables you to build flexible, cloud-native directories for organizing hierarchies of data along multiple dimensions
- provides a unified user interface so you can view operational data from multiple AWS services and allows you to automate operational tasks across your AWS resources.
- is a service that makes it easy to develop, test, and deploy intelligent robotics applications at scale
- provides a simple, scalable, elastic file system for Linux-based workloads for use with AWS Cloud services and on-premises resources.
- is a networking service that helps establish secure connections between your on-premises networks,remote offices, client devices, and the AWS global network.
- is a hybrid storage service that allows your on-premises applications to seamlessly use AWS cloud storage.
- makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities.
- is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
- helps you create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
28 Clues: running on AWS • is a highly available and scalable cloud Domain Name System (DNS) web service. • makes it easy to establish a dedicated network connection from your premises to AWS. • is an edge computing, data migration, and edge storage device that comes in two Options. • ...
The Media 2024-03-26
Across
- print and digital forms of communication—including television, newspapers, radio, the internet, and social media sites—that convey information to large audiences
- news organizations that mix opinion-driven journalism with factual reporting in order to appeal to consumers who are ideologically liberal or conservative; often characterized by ideological agenda setting, priming, and framing
- news reporting and political commentary by ordinary citizens and bystanders, advocacy groups, and eyewitnesses to crises, often using cell phone images or video and distributed via social media
- the tendency to favor information that confirms a person's existing beliefs; it involves discounting evidence that could disprove or challenge those beliefs
- the requirement that broadcasters provide candidates for the same political office with equal opportunities to communicate their messages to the public
- false, inaccurate, or misleading information in the media, especially social media; often targeting political candidates and leaders, mis_information can include mani_pulated or fabricated content, satire, and parody content to the public via airwaves on electromagnetic frequencies
- the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs
- websites that pull together news from a wide range of online sources and make them available on one platform or page; news aggregators can be a way to avoid partisan or filtered news, providing a broad overview of the news of the day from many sources
- digital sites that are owned and managed by newspapers, follow the principles of journalism, and deliver content like that of print newspapers, with similar story layout for all users regardless of location, demographic characteristics, partisanship, or friend networks
- communication methods such as television and radio; they tend to take the form of one publisher (e.g., a television station) to many (viewers)
Down
- partisan media environments in which users are exposed primarily to opinions and information that conform to their existing beliefs; constructed by algorithms that analyze and then personalize each user's online experience
- a Federal Communications Commission regulation giving individuals the right to respond to personal attacks made on a radio or television broadcast
- closed communication systems in which individual beliefs are amplified or reinforced by repetition; they may increase social and political polarization because users do not encounter opposing views
- the process of calling attention to some issues, and not others, when reporting on political events and officials
- a form of reporting in which the media adopt a skeptical or hostile posture toward the government and public officials
- reporting that involves being as accurate, fair, and balanced as possible, relying on original sources, being transparent about citing sources, and presenting multiple viewpoints
- giant, often global, corporations that control a wide array of media, including television networks, movie studios, record companies, cable channels, book and newspaper publishers, and digital media outlets
- the process of presenting information from a certain perspective in order to shape the audience's understanding of that information
- software programs that analyze the viewing, liking, and commenting data of all of a platform's users, as well as individual users' prior data, to present users with additional content tailored to their individual interests instead of ordering posts based on the most recently published (as broadcast media do)
- the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking
- the media's designation of some issues, events, or people as important and others not
21 Clues: the media's designation of some issues, events, or people as important and others not • the putting forth of opinion and information that is consistent with the consumer's preexisting beliefs • the publishing or broadcasting of information or opinion as quickly as possible, with minimal fact-checking • ...
Unit 2 Terms 2024-10-28
Across
- An economic system in which private actors own and control property in accord with their interests,
- Informal settlements within cities that have inadequate housing and squalid, miserable living conditions.
- a series of protests that resulted in violence and millions of dollars in damages.
- Newly landed immigrants seeking opportunities and looking for work needed affordable housing.
- American inventor and business magnate and the founder of Ford Motor Co, famous for inventing the Model T automobile
- An American inventor who, singly or jointly, held a world-record 1,093 patents. In addition, he created the world's first industrial research laboratory.
- A spanish-speaking quarter in a town or city
- The act of giving privilege or financial encouragement to a person or organization.
- collective refusal by employees to work under the conditions required by employers.
- The negotiations between union and management representatives over salaries, benefits, and working conditions
- processes that involve different activities that lead to the extraction of raw materials from the earth
- Scottish-born American inventor, scientist, and teacher of the deaf whose foremost accomplishments were the invention of the telephone
Down
- A violent strike at the Homestead Works in Pittsburgh over a lock out following a decision to cut wages by nearly 20%.
- The concentration of human populations into discrete areas
- an agreement between an employer and an employee in which the employee agrees not to join or remain a member of a labor union as a condition of employment.
- State and local laws passed from the end of Reconstruction in 1877 through the mid-1950s by which white southerners reasserted their dominance by denying African Americans basic social, economic, and civil rights, such as the right to vote.
- Successfully used a steam engine to drill for oil near Titusville, Pennsylvania and started the oil boom.
- A collection of articles which Steffens had written for McClure's Magazine, it reports on the workings of corrupt political machines in several major cities in the US
- Accomplished inventor and a painter, he developed an electric telegraph and then co-developed morse Code
- American aviation pioneers generally credited with inventing, building, and flying the world's first successful airplane.
- May 4, 1886, a labor protest rally near Chicago's Haymarket Square turned into a riot after someone threw a bomb at police.
- Fought for better wages, reasonable hours and safer working conditions.
- Land, labor, and capital resources, and entrepreneurship
- The use of a blast of hot air to purify molten iron and convert it into steel.
- The federal legislation that created a system in which federal employees were chosen based upon competitive exams.
- An organization linked to a political party that often controlled local government.
- An economic and political system that demands state ownership and control of the fundamental means of production and the distribution of wealth.
- Rail networks, bridges, energy systems, wastewater services, aviation networks, roadways, drinking water systems
- American mechanical engineer who sought to improve industrial efficiency
- Highlighted the dangerous working and living conditions for families working in the meatpacking industry in early 20th century Chicago and focuses on an immigrant family from Lithuania
30 Clues: A spanish-speaking quarter in a town or city • Land, labor, and capital resources, and entrepreneurship • The concentration of human populations into discrete areas • Fought for better wages, reasonable hours and safer working conditions. • American mechanical engineer who sought to improve industrial efficiency • ...
Week 13 Quiz 2014-04-03
Across
- how rapidly a system and the units within it change
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- a term economists use to refer to situations where a product becomes more valuable once many people use it
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- a state of the world involving networks of interdependence at multicontinental distances
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Week 13 Quiz 2014-04-03
Across
- A state of the world involving networks of interdependence at multicontinental distances
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- A term economists use to refer to situations where a product becomes more valuable once many people use it
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- How rapidly a system and the units within it change
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
IPPS G3 - Week 13 Quiz 2017-03-22
Across
- a state of the world involving networks of interdependence at multicontinental distances
- how rapidly a system and the units within it change
- a term economists use to refer to situations where a product becomes more valuable once many people use it
Down
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Activity 1 2024-08-25
Across
- The use and development of computer systems that are able to learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
- A system of interconnected public web pages accessible through the Internet.
- The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks.
Down
- The simulation of human intelligence processes by machines, especially computer systems.
- The process of exchanging information and ideas.
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers.
6 Clues: The process of exchanging information and ideas. • A system of interconnected public web pages accessible through the Internet. • The simulation of human intelligence processes by machines, especially computer systems. • The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks. • ...
if 2024-03-16
Across
- Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer.
- A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules.
- Solana aims to address scalability issues faced by other blockchain networks, such as __________, by utilizing innovative technologies.
- Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer.
Down
- Nanotechnology involves the study and manipulation of materials at the __________ level, leading to unique properties and behaviors.
- Solana was founded by Anatoly __________ in 2017, with the goal of providing a scalable blockchain solution for decentralized applications.
6 Clues: Prior to becoming CEO, Tim Cook served as Apple's Chief __________ Officer. • Before joining Apple, Tim Cook worked at this company, where he ultimately became the Chief Operating Officer. • A type of nanotechnology that involves the creation of structures and devices by manipulating individual atoms and molecules. • ...
Tutorial 9 2023-10-11
Across
- theory that argues that a firm's sustained competitive advantage is based on its valuable and rare resources
- excess resources a company has that can be leveraged to successfully adjust to situations
- theory that argues that information on a company's financial health is not available to all parties in a market at the same time.
- the tendency for positive impressions of an organisation in one area to positively influence one's opinion or feelings in other areas
Down
- the practices of commerce applied to the public sector in order to deliver greater financial value
- economic decisions are affected by the social networks in which economic actors operate
6 Clues: economic decisions are affected by the social networks in which economic actors operate • excess resources a company has that can be leveraged to successfully adjust to situations • the practices of commerce applied to the public sector in order to deliver greater financial value • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
Organizations 2019-06-04
Across
- One of 27 institutes and centers that make up the National Institutes of Health
- A nonprofit academic medical center based in Rochester, Minnesota
Down
- Its mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society
- Is also one of the 4 major style guides for academic papers
4 Clues: Is also one of the 4 major style guides for academic papers • A nonprofit academic medical center based in Rochester, Minnesota • One of 27 institutes and centers that make up the National Institutes of Health • Its mission is to develop national networks of volunteers capable of responding to both acute and chronic conditions that arise within our society
Crossword about the World wide web 2021-07-15
Across
- It is a popularized file type due to its high standard of quality and easily downloadable size.
- defines the main content of the HTML document
- is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on 15 June 1987.
- allow web developers to arrange data into rows and columns.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- what is the <br> tag in html.
Down
- is a hypertext document provided by a website and displayed to a user in a web browser. A website typically consists of many web pages linked together in a coherent fashion.
- is a formal language comprising a set of strings that produce various kinds of machine code output.
- standard markup language for documents designed to
- defines the main content of the HTML document
10 Clues: what is the <br> tag in html. • defines the main content of the HTML document • defines the main content of the HTML document • standard markup language for documents designed to • allow web developers to arrange data into rows and columns. • It is a popularized file type due to its high standard of quality and easily downloadable size. • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- An area of data protection that concerns the proper handling of sensitive data
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Extortion software that can lock your computer and then demand a ransom for its release.
Down
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Unsolicited messages sent in bulk by email
9 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
Hack Con Cyber Security 2022-04-01
Across
- authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence
- a network security device that monitors and filters incoming and outgoing network traffic
- a way of scrambling data so that only authorized parties can understand the information
- an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems
- wireless technology used to connect computers, tablets, smartphones and other devices to the internet
Down
- hardware authentication device manufactured by Yubico to protect access to computers, networks, and online services
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- malware that employs encryption to hold a victim's information for profit.
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
9 Clues: malware that employs encryption to hold a victim's information for profit. • a way of scrambling data so that only authorized parties can understand the information • a network security device that monitors and filters incoming and outgoing network traffic • ...
Unit 5.1 Describe the Possible Issues Arise from Organisation’s Social Media Platforms 2022-10-10
Across
- It refers to the response to current topics and trends while creating relevant and original content to interest their audience.
- When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as?
- Leaks, harassment and hate speech belongs to which non-related topics?
- False context, imposter content, manipulated content and fabricated content belongs to which non-related topics?
- Resulted from brands which planned posts way ahead of time, and adopt a ‘set and forget’ style. What is this issue known as?
- When users were unable to access, load their newsfeed, send messages due to the website server is facing downtime. What is this issue known as?
Down
- Wrong information are conveyed to customers, this issue is known as?
- Contents such as posts, reviews, pictures and more; that is created and shared by any users via social media networks is known as___.
- False connection and Misleading information belongs to which non-related topics?
9 Clues: Wrong information are conveyed to customers, this issue is known as? • Leaks, harassment and hate speech belongs to which non-related topics? • False connection and Misleading information belongs to which non-related topics? • When users post bad comments or reviews on the brand’s social media platforms. What is this issue known as? • ...
POSC003 G1 Week 13 Quiz 2014-04-02
Across
- How rapidly a system and the units within it change
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
Down
- A term economists use to refer to situations where a product becomes more valuable once many people use it
- A state of the world involving networks of interdependence at multicontinental distances
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
Browsing Safely 2025-05-23
Across
- It is an act of harming and harassing using information technology in a deliberate manner
- It is used to conduct terrorism through the use of computers and internet in order to cause fear and panic
- It refers to an illegal entry into a computer system or network
Down
- It is a collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorised access
- It is a process of befriending children on social media to facilitate online or physical sexual abuse
- It is the short form of Vital Information Resources Under Seize
6 Clues: It is the short form of Vital Information Resources Under Seize • It refers to an illegal entry into a computer system or network • It is an act of harming and harassing using information technology in a deliberate manner • It is a process of befriending children on social media to facilitate online or physical sexual abuse • ...
Cyber Sys Ops Block IV - Unit 6 2019-01-24
Across
- This wired IDS sits on AF networks "listening" for suspicious activity. Generates reports for the AFNOSC (acronym).
- Vulnerability scanners compare details about a targeted system against a list of known security ____.
- ____ devices pretend to be legitimate access points in order to gather information from those devices connecting to them.
- Wireless ____ tools are intended for attacking wireless access points.
- An ____ Intrusion Detection System is also known as an Intrusion Prevention System.
- NIDS cannot analyze ____ packets.
- SNORT is an ____ source Network-based Intrusion Detection and Prevention System.
- ____ NIDS abilities include detection of rogue devices and wireless attack tools.
Down
- ____ records attributes of the host computer's memory and then monitors it to ensure it hasn't been modified (acronym).
- Host-based Intrusion Detections Systems primarily use ____ installed on a specific host.
- A ____ Scanner is a software application designed to probe a server or host for open ports.
- ____ scanning software detects and classifies system weaknesses in computers & network devices. Run from an attacker's POV.
- The function of an IDS is to ___ network traffic and computer settings to detect patterns indicating known intrusion attempts
- An Intrusion Detection System scans, audits and monitors network infrastructure for signs of attacks in ____.
- A major drawback of ____ is it cannot analyze encrypted packets (acronym).
15 Clues: NIDS cannot analyze ____ packets. • Wireless ____ tools are intended for attacking wireless access points. • A major drawback of ____ is it cannot analyze encrypted packets (acronym). • SNORT is an ____ source Network-based Intrusion Detection and Prevention System. • ____ NIDS abilities include detection of rogue devices and wireless attack tools. • ...
COMMUNICATION - ENTERPRISE 2020-09-02
Across
- an individual who contributes fund to a limited company in return for shares in that company
- a summary of what has taken place at a meeting
- the provision of information about the date, time and place of a forthcoming meeting
- messages between people in an enterprise that are spoken, such as in face-to-face conversation
- the official channels of communication used within an enterprise
- messages between people on the same organisational level of an enterprise
- messages between people on different organisational levels of an enterprise ie upwards and downwards
- a yearly meeting of shareholders that a limited company is usually legally required to hold
Down
- the process of communication in a non-verbal way through conscious or unconscious gestures, movements and mannerisms
- messages between people in an enterprise that are actually written down, as in a letter
- the unofficial channels of communication used within an enterprise
- global system of interconnected computer networks that provides an extensive range of information resources and services
- a computer system that shares information resources and services within a particular enterprise
- a document that is written to provide information, analyse an issue and make recommendation.
- a list of items that will be discussed at a forthcoming meeting
15 Clues: a summary of what has taken place at a meeting • a list of items that will be discussed at a forthcoming meeting • the official channels of communication used within an enterprise • the unofficial channels of communication used within an enterprise • messages between people on the same organisational level of an enterprise • ...
Technology 2020-10-23
Across
- A group or system of interconnected people or things
- A machine resembling a human being and able to replicate certain human movements and functions automatically
- Tools, machinery, and other durable equipment
- A recording of moving visual images made digitally or on videotape
- A spoken message left by a caller on a voicemail system
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- A set of related web pages located under a single domain name, typically produced by a single person or organization
- The working or use of telephones
- The branch of physics and technology concerned with the design of circuits using transistors and microchips, and with the behaviour and movement of electrons in a semiconductor, conductor, vacuum, or gas
Down
- The programs and other operating information used by a computer
- the action or process of transmitting something, or the state of being transmitted
- A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment
- art of sending out music or pictures through radio waves
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- Device for making calls
15 Clues: Device for making calls • The working or use of telephones • Tools, machinery, and other durable equipment • A group or system of interconnected people or things • A spoken message left by a caller on a voicemail system • art of sending out music or pictures through radio waves • The programs and other operating information used by a computer • ...
PALOLO 2021-03-29
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Tecnology Baez, Falcon, Macchia. 2021-03-17
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Digital citizenship 2017-09-07
Across
- The correct way to communicate on the internet.
- warning that people are dangerous to children and adults. It is an example of a panic that people experience regarding anyone that they are unfamiliar with.
- The knowledge of Maxamizing the users profile.
- The information of a person that is on the internet.(online activity)
- is freedom extended to all digital technology users, and the behavioral expectations that come with them, but they social media has privllages.
- You can put anything you want out in the open.
- An appropiate, rebonsible behavior to technology use.
- responsibility for actions, which is either ethical or unethical.
- Any copying of copyrighted done for a limited and “transformative” purpose, such as to comment upon,or criticize. That can be done without permission from the copyright owner.
Down
- Difficult to get.Strong by using upper case/lower case letters, and numbers.
- Research is a process of collecting, analyzing, and interpreting information in order to increase our understanding.
- Anything you have done onto a search
- A way to talk without talking in person.
- A person who sends messages that immates, or threats another person.
- Websites and networks, you can have a profile that defines you and you can see other people’s profiles.
15 Clues: Anything you have done onto a search • A way to talk without talking in person. • The knowledge of Maxamizing the users profile. • You can put anything you want out in the open. • The correct way to communicate on the internet. • An appropiate, rebonsible behavior to technology use. • responsibility for actions, which is either ethical or unethical. • ...
Texas History 2022-04-20
Across
- an economic model which states that the price at which a good is sold is determined by the good’s supply, and its demand.
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
- Offered by companies to the customers to provide utility and satisfy their wants.
- a period of temporary economic decline during which trade and industrial activities are reduced.
- Land: natural resources used for production; 2) Labor: human effort that assists in production; 3) Capital: man made resources used in the production process (factories, machinery, tools, equipment, raw materials, wealth); 4) Entrepreneur: person who decides what, where, and how to produce.
- first European to map coast of Texas
- Mexican. Was not a good person at all
- statistical data relating to the population and particular groups within it.
- Act of competing
Down
- a long and severe recession in an economy or market
- the process of increasing the percentage and number of people living in urban settlements.
- A financial gain
- an economic system in which private businesses operate in competition and largely free of state control.
- the domestic marketplace for goods and services operating within the borders of and governed by the regulations of a particular country.
- space comprising the earth’s atmosphere and the space beyond.
15 Clues: A financial gain • Act of competing • first European to map coast of Texas • Mexican. Was not a good person at all • a long and severe recession in an economy or market • space comprising the earth’s atmosphere and the space beyond. • statistical data relating to the population and particular groups within it. • ...
Information system MK&Partiban 2023-08-16
Across
- What technology connects up to 8 devices in a 10-meter area through low-power, radio-based communication?
- One of the IT infrastructure components?
- What are the small pieces of software designed to repair vulnerabilities or flaws in a program or system called?
- What is the ability of the system to expand to serve a large number of users without breaking down?
- What term describes the process of collecting user interaction data from web servers?
- What is the combination of hardware and software used to prevent unauthorized access to private networks called?
- What data can be accessed but not altered?
- One of the open source software(OSS)?
Down
- What term encompasses password systems, tokens, smart cards, biometric authentication, and two-factor authentication?
- What device is responsible for converting digital signals into analog form and vice versa?
- What is often referred to as the world's largest and most extensive network?
- What system is designed to capture and integrate customer data from various parts of an organization?
- What term describes the integration of social networking technologies into customer relationship management?
- What is the term for a CRM system that utilizes data warehouses fed by operational CRM systems and customer touch points?
- Specific characteristics of each quantity are called?
15 Clues: One of the open source software(OSS)? • One of the IT infrastructure components? • What data can be accessed but not altered? • Specific characteristics of each quantity are called? • What is often referred to as the world's largest and most extensive network? • What term describes the process of collecting user interaction data from web servers? • ...
Vocabulary 2025-05-05
Across
- Obtaining input or information from a large number of people via the internet
- Scientific research conducted in whole or in part by amateur or nonprofessional scientists
- A set of rules governing the exchange or transmission of data between devices
- A problem-solving approach that finds a satisfactory solution where finding an optimal one is impractical
- The maximum amount of data that can be transmitted over a network in a given amount of time
- The time it takes for a data packet to travel from source to destination
- The system that translates human-readable website names into IP addresses
Down
- A system of interlinked hypertext documents and resources accessed through the internet
- The capacity for a system to handle growing amounts of work or accommodate growth
- The inclusion of extra components that can be used to maintain functionality if other components fail
- A method of reducing the size of data to save space or transmission time
- A global network that connects millions of private, public, academic, business, and government networks
- Data that provides information about other data, such as file size or date created
- A numeric system of base 2 that only uses combinations of the digits zero and one
- A unique string of numbers separated by periods used to identify devices on a network
15 Clues: A method of reducing the size of data to save space or transmission time • The time it takes for a data packet to travel from source to destination • The system that translates human-readable website names into IP addresses • Obtaining input or information from a large number of people via the internet • ...
Cyber Ethics 2025-06-02
Across
- The act of harming or harrasing a person through informational technology in a deliberate manner
- a program or a set of programs wich disrupts the normal functioning of a device
- The practice of sending mails till the mail server gets full
- The legal right granted by the law to the creator for his orginal work
- Information about a person that exists on the internet because of his online activity
- The act of sending an email and misleading the user to belive it is from a trusted source
- An illegal intrusion into a computer or network without the user's notice
Down
- A criminal activity which involves the use of Compters,Networks and Intrnet connections with the intention to harm an individual or thier device
- The process of converting encrypted data into readable form
- A malicious technique of tricking a web user into clicking on somthing else from what the user precives he/she is clicking on
- The process of transforming data into unreadeable code
- Loading a single licenced copy of a software onto multiple computers contrary to licence's terms
- The act of copying or imitating another person's work as thier's
- A security system that prevents unauthourised people from accessing your system and network
- Unwanted bulk e-mails that come from unkown scources
15 Clues: Unwanted bulk e-mails that come from unkown scources • The process of transforming data into unreadeable code • The process of converting encrypted data into readable form • The practice of sending mails till the mail server gets full • The act of copying or imitating another person's work as thier's • ...
Information Technology Career Cluster 2025-10-06
Across
- Part of a computer system that is designed to block unauthorized access
- A program used to view Web pages.
- unwanted e-mail (usually of a commercial nature sent out in bulk)
- a small amount of data generated by a website and saved by your web browse to remember information about you.
- helps increases or maintains the capabilities of a person with a disability
- the process of converting human instructions into a language that a computer can understand and follow
- a person who designs, writes and installs computer programs and applications
Down
- type of software that can process information on its own without human intervention.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- Measures taken to protect a computer or computer system against unauthorized access or attack
- identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
- new technologies that aim to conserve the natural environment and resources.
- A global network connecting millions of computers, making it possible to exchange information.
- The amount of data that can be transmitted over a network in a given amount of time.
- the development, maintenance, and use of computer software, systems, and networks
15 Clues: A program used to view Web pages. • unwanted e-mail (usually of a commercial nature sent out in bulk) • Part of a computer system that is designed to block unauthorized access • helps increases or maintains the capabilities of a person with a disability • new technologies that aim to conserve the natural environment and resources. • ...
Sam computer vocabulary 2014-02-10
Across
- A collection of information, usually including a username and the current date and time, stored on the local computer of a person using the World Wide Web, used chiefly by websites to identify users who have previously registered or visited the site.
- A memory device in which information can be accessed in any order.
- uniform resource locator; a standardized address of a location on the internet, esp on the World Wide Web
- A sequence of adjacent bits, usually eight, operated on as a unit by a computer
- computing the representation of each one of a set of numbers, letters, etc, as a unique sequence of bits, as in ASCII
- Is the brain of the computer
- the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
- A computer that processes requests for HTML and other documents that are components of web pages.
- internet service provider, a business providing its customers with connection to the internet and other related services
- a personal computer small enough to fit conveniently in an individual workspace
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol.
- the programs and other operating information used by a computer.
- Is physical components that make up a computer system.
- Universal Serial Bus is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices.
- The set of routines stored in read-only memory that enable a computer to start the operating system and to communicate with the various devices in the system, such as disk drives, keyboard, monitor, printer, and communications ports.
Down
- a model of computer use in which services stored on the internet are provided to users on a temporary basis
- a printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted.
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit. Also called hard disk drive.
- The numerical sequence that serves as an identifier for an Internet server.
- This term is used to describe a preset value for some option in a computer program.
- A program that accesses and displays files and other data available on the Internet and other networks.
- connect as or operate with a network.
- intellectual property, esp computer source code, that is made freely available to the general public by its creators
- A fast storage buffer in the central processing unit of a computer. Also called cache memory.
- Memory hardware that allows fast access to permanently stored data but prevents addition to or modification of the data.
- of, relating to, or situated on the edge or periphery of something.
- A computer or program that can download files for manipulation, run applications, or request application-based services from a file server.
- computing domain name system
- In computing, booting is the initial set of operations that a computer system performs after electrical power to the CPU is switched on or when the computer is reset. ...
29 Clues: Is the brain of the computer • computing domain name system • connect as or operate with a network. • Is physical components that make up a computer system. • the programs and other operating information used by a computer. • A memory device in which information can be accessed in any order. • of, relating to, or situated on the edge or periphery of something. • ...
CS101 Vocab Review 2021-08-08
Across
- Governs what an authenticated user is allowed to do
- Memory that stores values that are being used during processing
- The number of bits used to store each sample or value
- A signal that changes continuously overtime
- A smarter device that has knowledge about the nodes on each bus or LAN
- The number of images shown per second of video
- A collection of logic gates that transforms a set of binary inputs into a set of binary outputs
- The probability that a data request will be in the cache
- Used to store data for transactional purposes
- A type of node that amplifies and forwards a signal
- Users who have more privileges than others
- The process of measuring an analog signal at set intervals in order to digitize it
- Training model to correspond too closely or exactly to a particular set of data
- A variable or statement that evaluates to true or false
- A single element of a picture
- The type of node needed as the center of a star topography
- A type of node that can translate signals between different types of networks
- Malware that pretends to only do a legitimate task while also breaching security
- An unreliable transmission protocol
- A type of memory where information disappears without power
- A fixed size unit of memory, typically 1 byte
- This occurs when a computer tries to represent a number larger than the maximum value it is capable of storing
- Applying a mathematical one-way function to create a "signature" of the input
- A type of supervised learning with discrete targets
- Occurs when two messages are sent at the same time on a shared communication line
Down
- A method used to hide unneeded or complex details of a problem or idea
- The fastest networking technology for data communication today
- There are _____ bits in one byte
- Step-by-step instructions for solving a problem
- A program for reading and interpreting websites
- The base 8 positional numbering system
- A type of machine learning based on rewards and punishments
- An aspect of a computer that can be used to breach security
- The process of verifying that you really are the person who has the right to access a given computer
- The program that translates assembly language to machine language
- The practice of hiding the very existence of a message
- The base 2 numbering system that does not allow for negative numbers
- A reliable transmission protocol
- The von Nuemann architecture component that includes the ALU and the Control Unit
- An example of non-volatile memory
- A Boolean expression that is never false
- The rate at which information can be sent and received across a network
- A malicious security breach
- A network of networks
- A flexible notation that lies between the two extremes of natural language and real code
- The internet protocol layer whose goal is to deliver packages from source port to destination port
- One of the 3-V's, the rate at which data changes
- A herd of computers controlled to perform a task without the user's knowledge
48 Clues: A network of networks • A malicious security breach • A single element of a picture • There are _____ bits in one byte • A reliable transmission protocol • An example of non-volatile memory • An unreliable transmission protocol • The base 8 positional numbering system • A Boolean expression that is never false • Users who have more privileges than others • ...
PC PRO Chapter 6 2020-01-03
Across
- Network in which all hosts share all resources.
- A network with geographically disperse connections that connect multiple LANs.
- Maintains the signal in the center of the core.
- A specialized device that performs a specific network role.
- A device optimized for the single purpose of providing file sharing.
- A hardware device that converts digital data into digital signals sent on the medium.
- Carries the signal.
- Functions as a second physical channel and as a ground.
- A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 100 meteres.
- Small geographic area network.
- A gigabit Ethernet cable with 10 Gbps speeds limited to cable length less than 55 meteres.
- Central connecting point for multiple media segments on the same subnet.
- Prevents the cladding and central core from breaking.
- A coaxial cable specification used for CCTV video systems.
- A cable that provides more EMI protection, but is more expensive than UTP cable..
- A coaxial cable specification used for cable TV, satellite TV, and broadband cable internet.
- Uses the same wire configuration on each connector end.
- Connects two segments within the same subnet.
- Similar to WLAN but uses different technology to connect to the internet. Also known as 3G or 4G networks.
- Hardware or software that provides a path for signals to pass between devices.
- A hardware device that connects two network segments with different subnet addresses.
- Carries broadband internet signals.
- Group of LANs that are geographically isolated but are connected to form a large internetwork.
- Private network that uses internet technologies.
Down
- A host that provides a service. VoIP Software that provides voice communication over an IP network.
- Transfers data using a single light ray.
- Private network that uses internet technologies but its resources are made available to trusted external users.
- Central connection for multiple media segments on the same subnet.
- A connector with 4 connectors, 2 pairs of wires, and a locking tab; used primarily for telephone wiring.
- A cable generally used for Ethernet cables and telephone wires.
- A cable that supports gigabit Ethernet.
- A connector with 8 connectors, 4 pairs of wires, and a locking tab; used for Ethernet networks.
- Encases everything and protects the cable.
- Carries data signals in cables.
- Encases a cable to protect it from external elements.
- Rules or standards that describe how hosts communicates and exchange data.
- A portion of a network with a common network address.
- or hosts Computers.
- Network the size of a few blocks to a metropolitan area.
- Network in which hosts have specific roles.
- Has the strictest specifications for crosstalk and noise of the Cat cables.
- Arrange wires in the first connector using T568A standard and the second connector the T568B standard.
- Computer system controlled by a single organization.
- Interfaces Devices that send and receive electrical signals.
- Large, world-wide, public network.
- Carries broadband internet signals.
- Surrounds inner cable conductor and keeps signal separated from the mesh conductor.
- A hardware device that converts binary data to analog waves and vice versa.
- Mesh network that uses wireless connection only.
- Used with both single and multi-mode cabling.
- media Path for electrical signals between devices.
- A hardware device that creates and receives transmission signals sent along the networking medium.
- Same as LAN but uses wireless connection.
- Small network for communication between devices.
54 Clues: Carries the signal. • or hosts Computers. • Small geographic area network. • Carries data signals in cables. • Large, world-wide, public network. • Carries broadband internet signals. • Carries broadband internet signals. • A cable that supports gigabit Ethernet. • Transfers data using a single light ray. • Same as LAN but uses wireless connection. • ...
Module I Vocab 2020-02-25
Across
- is a document commonly written in HTML (Hypertext Markup Language) that is accessible through the Internet or other networks using an Internet browser.
- a piece of electronic equipment for playing games on
- is an online platform which people use to build social networks or social relationship with other people who share similar personal or career interests, activities, backgrounds or real-life connections
- a wearable device is a technology that is worn on the human body
- a series of coded software instructions to control the operation of a computer or other machine
- is basically a system of Internet servers that support specially formatted documents
- is any piece of computer hardware equipment which converts information into human-readable form
- a hardware device capable of transmitting an analog or digital signal over the telephone, other communication wire, or over wireless
- a model of computer data storage in which the digital data is stored in logical pools
- the working area of a computer screen regarded as a representation of a notional desktop and containing icons representing items such as files and a wastebasket
- a computer or computer program which manages access to a centralized resource or service in a network
- is any physical device capable of storing information temporarily, like RAM (random access memory), or permanently, like ROM (read-only memory)
- designed to carry out web search, which means to search the World Wide Web
- a high-capacity, self-contained storage device containing a read-write mechanism plus one or more hard disks, inside a sealed unit
Down
- a program or piece of software made to fulfill a purpose
- a piece of computer hardware equipment used to provide data and control signals to an information processing system such as a computer or information appliance
- a handheld electronic device for playing digital media such as audio and video files
- means the ability to view the same multimedia content from different types devices
- a machine for printing text or pictures onto paper, especially one linked to a computer
- an extra copy of data on a computer
- a computer program that distributes web pages as they are requisitioned
- a location connected to the Internet that maintains one or more pages on the World Wide Web
- is the environmentally responsible and eco-friendly use of computers and their resources
- combining 2 or more functions in a unit
- an application, downloaded usually by a mobile user
- a group or system of interconnected people or things
- short-range wireless interconnection of devices
- a mobile electronic device that is designed primarily for the purpose of reading digital e-books
- type of notebook computer that has an LCD screen on which the user can write using finger and swipe actions
- synchronization, in-sync = a state in which two or more people or things move or happen together at the same time and speed
- the programs and other operating information used by a computer.
- a program with graphic interface on a world wide web.
- cause to occur or operate at the same time or rate
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area
34 Clues: an extra copy of data on a computer • combining 2 or more functions in a unit • short-range wireless interconnection of devices • cause to occur or operate at the same time or rate • an application, downloaded usually by a mobile user • a piece of electronic equipment for playing games on • a group or system of interconnected people or things • ...
Cyber and Digital Literacy 2024-04-30
Across
- an electronic device that manipulates information or data
- knowledge obtained from investigation, study, or instruction.
- use learning technologies in a variety of different contexts.
- is to digital media.
- a reference (an address) to a resource on the internet.
- to connect with friends, work, colleagues or people they don't know online.
- exchange information and ideas in virtual communities and networks.
- is a wireless, portable personal computer with a touchscreen interface
- an online tool for teachers to give quizzes and on the fly assessments to students.
- individual is he/she who possesses a range of digital skills.
- the use of technology to harass, threaten, embarrass, or target another person.
- is a tool that delivers and presents questions to students.
- the communication outlets or tools used to store and deliver information or data.
- refers to a collection of webpages you can view using internet and a browser.
- a free sharing tool perfect for clipping, curating, and sharing content.
- is a small portable personal computer.
- a vast network that connects computers all over the world.
- TED's youth and education initiative.
- is the sending and receiving of information.
- also known as “Facebook for school.”
Down
- embedding media content in images and videos.
- is complex and multifaceted.
- a free video sharing website that makes it easy to watch online videos.
- to develop an understanding of online security, identity and data management in our own literacy practices
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- is a free, cloud-based 3D CAD Software package for students.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- provider of a presentation design tool for the creative community.
- also known as digital literacy.
- is an easy to use learning portfolio application.
- is a powerful community based social tool for learning.
- handy management and messaging tool helps recognize. reward students.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- enable students to produce short animated narrated explainer videos.
- engaging and interactive game.
- you can literally learn anything.
- presentations are nothing like your traditional presentations.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- increasing access to high quality educational materials for K-12 students all over the world.
- entails taking responsibility for ones role in cyberspace.
- is a digital tool for designing visual stories.
- is a sneaky or dishonest plan that's meant to con someone.
- a free photo and video sharing app.
- possesses critical thinking skills in understanding all sociatal issues raised by digital technologies.
- qualities that a person is expected to have as a responsible member of digital community.
- to connect people and allow people to share their thoughts with a big audience.
- only teach programming concepts.
- create and share videos with your class, with parents, and beyond.
- encompassesa wide range of criminal activities that are carried out using digital devices and/or networks.
50 Clues: is to digital media. • is complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Cyber and Digital Literacy 2024-04-30
Across
- handy management and messaging tool helps recognize. reward students.
- to connect with friends, work, colleagues or people they don't know online.
- engaging and interactive game.
- individual is he/she who possesses a range of digital skills.
- create and share videos with your class, with parents, and beyond.
- is a handheld electronic device that provides a connection to a cellular network and the internet.
- is the sending and receiving of information.
- is to digital media.
- is a sneaky or dishonest plan that's meant to con someone.
- the communication outlets or tools used to store and deliver information or data.
- is a wireless, portable personal computer with a touchscreen interface.
- refers to a collection of webpages you can view using internet and a browser.
- provider of a presentation design tool for the creative community.
- is a powerful community based social tool for learning.
- a complex and multifaceted.
- presentations are nothing like your traditional presentations.
- enables students to produce short, animated narrated explainer videos.
- to connect people and allow people to share their thoughts with a big audience.
- the capacity to use computer technology successfully while also understanding the consequences of those actions.
- a free video sharing website that makes it easy to watch online videos.
- increasing access to high quality educational materials for K-12 students all over the world.
- to develop an understanding of online security, identity and data management in our own literacy practices
Down
- is a type of digital literacy and it refers both to the individuals capacity of synthesis and critical thinking.
- an online tool for teachers to give quizzes and on the fly assessments to students.
- a free photo and video sharing app.
- the use of scientific knowledge for practical purposes or applications, whether in industry or in our everyday lives.
- encompasses a wide range of criminal activities that are carried out using digital devices and/or networks.
- a vast network that connects computers all over the world.
- only teach programming concepts.
- embedding media content in images and videos.
- is a tool that delivers and presents questions to students.
- a free sharing tool perfect for clipping, curating, and sharing content.
- qualities that a person is expected to have as a responsible member of digital community.
- is an easy to use learning portfolio application.
- you can literally learn anything.
- is a small portable personal computer.
- the use of technology to harass, threaten, embarrass, or target another person.
- also known as digital literacy.
- the ability to read, interpret, and understand information presented in pictorial or graphic images.
- an electronic device that manipulates information or data.
- exchange information and ideas in virtual communities and networks.
- a reference (an address) to a resource on the internet.
- knowledge obtained from investigation, study, or instruction.
- also known as “Facebook for school.”
- is a digital tool for designing visual stories.
- TED's youth and education initiative.
- is a free, cloud-based 3D CAD Software package for students.
- use learning technologies in a variety of different contexts.
- possesses critical thinking skills in understanding all societal issues raised by digital technologies.
49 Clues: is to digital media. • a complex and multifaceted. • engaging and interactive game. • also known as digital literacy. • only teach programming concepts. • you can literally learn anything. • a free photo and video sharing app. • also known as “Facebook for school.” • TED's youth and education initiative. • is a small portable personal computer. • ...
Propagandizing Words 2013-05-15
Across
- A usually short communication transmitted by words, signals, or other means from one person, station, or group to another
- The art and technique of using words effectively to impart information or ideas
- The act or process of buying and selling in a market
- It is a way to promote some sort of company, political party, etc
- A belief or conclusion held with confidence but not substantiated by positive knowledge or proof
- A way of spreading information via technology
- Serving to inform; providing or disclosing information; instructive, propaganda’s goal
- To influence or manage shrewdly or deviously, in this case, propaganda
Down
- An object of criticism or attack
- Tending or having the power to persuade, very often, is used to describe propaganda
- The way propaganda is used now days, a synonym of this word is practically
- Something that has been organized or made into an ordered whole
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol. The use of propaganda is new to this system
- The act of manifesting; usually the result of false propaganda in communist societies
- A piece of unverified information of uncertain origin usually spread by word of mouth
- a short message or commercial, especially a commercial spoken on radio or television
- One who is actively involved in manipulating propaganda and media advertisements
17 Clues: An object of criticism or attack • A way of spreading information via technology • The act or process of buying and selling in a market • Something that has been organized or made into an ordered whole • It is a way to promote some sort of company, political party, etc • To influence or manage shrewdly or deviously, in this case, propaganda • ...
Computer and Technical Terms 2016-02-22
Across
- A compnent that stores data so future requests for that data can be served faster
- adress Each computer connected to the Internet is given a unique address called.
- The amount of copies that can be made of a project.
- Communication that both the sender and the receiver are active at the same time
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- A website that is considerably greater in sized is referred to being?
- Using neutral rather than subjective, boastful, or exaggerated language.
- The idea of using about half the word count as the controlled condition.
- The codes or tags that browsers use to create web pages.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
- The html file you are creating and the picture you are using for your website must be in the same?
Down
- Communication where the sending and receiving occur at different times.
- Company that helps build large websites.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The main technology for local area networks
- Can be used to create web pages online
- The amount of images from one artist or photographer allowed on a web page
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Social media 2025-04-02
Across
- The continuously updated page you see on a social media website. Content is renewed automatically every time you refresh
- Short for Graphics Interchange Format.
- Social media platform created in 2007
- The group of people who can see the content you share online.This includes your followers who can like, comment, or share your content.
- Feedback after purchasing a product.
- Also called sharing.Sending content originally posted by another user.
- A photo you have taken of yourself.
- Social media platform where you can send messages and pictures that disappear after seeing them.
Down
- The images, photos and videos, or texts shared on the internet to spread a specific idea, style, or behavior.
- In social media content, creators can use specific words or pictures to attract the users’ attention and prompt them into clicking on their links
- A person who can see and react the content you share on your social media.
- The time you spend searching for particular information. You use your web browser.
- It holds the list of emails or messages you received from other users.
- The unpermitted access to and control over a computer system, often for the purpose of stealing or destroying it.
- The information, products, videos, and all the data you share on your social networks
- Social media platform created in 2010
- If a topic, video, or another type of content marketing is.....
17 Clues: A photo you have taken of yourself. • Feedback after purchasing a product. • Social media platform created in 2007 • Social media platform created in 2010 • Short for Graphics Interchange Format. • If a topic, video, or another type of content marketing is..... • It holds the list of emails or messages you received from other users. • ...
Social media 2022-11-04
Across
- A person who deliberately starts arguments in the comments sections of sites
- Articles with headlines that make you want to click through and read. They usually don't live up to your expectations.
- A word, phrase or topic that is popular on Twitter at any given moment.
- A word or group of words that starts with the sign (#) and is used to group together similar ideas and topics
- Anything that is shared in social networks and gets passed along to many people very rapidly
Down
- User on social media who has subscribed to see your posts in their feed
- Ignoring someone and giving attention to your mobile phone instead
- A website or computer program that allows people to communicate and share information on the internet using a computer or mobile phone
- Someone who voices negative opinions about other people. It might be inspired by jealousy or boredom.
9 Clues: Ignoring someone and giving attention to your mobile phone instead • User on social media who has subscribed to see your posts in their feed • A word, phrase or topic that is popular on Twitter at any given moment. • A person who deliberately starts arguments in the comments sections of sites • ...
Spreadsheets 2024-10-17
Across
- Created without your direct input, like websites collecting your data.
- Refers to a state of being connected to or available through the internet. It involves the use of digital networks to access, share, or interact with information, services, and people in a virtual environment.
- The trail you leave by choice, like posts on social media.
Down
- a trail you leave behind in the digital world.
- to provoke someone to react angrily.
- The action of alerting the platform administrators or moderators about content or behavior that violates the platform’s rules or guidelines. This could include things like harassment, hate speech, false information, or inappropriate content.
- the right to keep personal information to ourselves.
- Groups of people who share common interests, goals, or characteristics and interact with each other to exchange information, support, or ideas.
- Digital platforms and tools that allow users to create, share, and interact with content and with other users.
9 Clues: to provoke someone to react angrily. • a trail you leave behind in the digital world. • the right to keep personal information to ourselves. • The trail you leave by choice, like posts on social media. • Created without your direct input, like websites collecting your data. • ...
watermelon🐢🍪🧋 2022-05-05
Across
- She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist
- The same cast of mind also tended to seek simple, universal formulae to resolve any problem, no matter how complex.
- An oral, poorly absorbed opioid antagonist, such as naloxone, can be helpful when usual laxatives are not working.
Down
- i was in search of migrant birds and I discovered sand martins and my first common sandpiper of the year
- All this variability can leave you feeling part introvert, part extrovert, part ambivert.
- The English are very strict on their anti-rabies regulations and sometimes keep animals in quarantine for six months.
- Many ethnographers have noted the importance of food and drink for maintaining familiar forms and social networks among immigrant populations.
- He arrived in Scotland as a refugee and has lived in the Glasgow area ever since.
- We empathize with others and often respond with emotion to their condition.
9 Clues: We empathize with others and often respond with emotion to their condition. • He arrived in Scotland as a refugee and has lived in the Glasgow area ever since. • All this variability can leave you feeling part introvert, part extrovert, part ambivert. • She learned at Cambridge that in Greek tragedy there was one protagonist, and one deuteragonist • ...
Automation and IT 2024-12-04
Across
- ______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
- _____ The application of scientific knowledge for practical purposes, especially in industry.
- ______ Technological adaptation wherein technologically less advance countries or places need To adapt and find solutions into their problems
- _____ Transforming the way data is being handled, processed, and delivered from millions of devices around the world
Down
- _____ preventing harmful attacks on computers, servers, mobile devices, electronic systems, networks, and data.
- _________ the process of creating software and systems to replace repeatable processes and reduce manual intervention.
- _____ a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
- _________is a specific type of automation where the machine that is being controlled has particular traits that make it resemble human beings.
- _________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive.
9 Clues: _____ The application of scientific knowledge for practical purposes, especially in industry. • _________ system for storing data that makes it difficult orimpossible to alter, corrupt, or deceive. • ______ includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. • ...
IPPS-G4 Week 13 2017-03-23
Across
- A state of the world involving networks of interdependence at multicontinental distances
- How rapidly a system and the units within it change
- A term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
Down
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- A term economists use to refer to situations where a product becomes more valuable once many people use it
6 Clues: How rapidly a system and the units within it change • A state of the world involving networks of interdependence at multicontinental distances • A term economists use to refer to situations where a product becomes more valuable once many people use it • ...
IPPS Quiz Week 13 2013-11-11
Across
- how rapidly a system and the units within it change
- a state of the world involving networks of interdependence at multicontinental distances
Down
- Buzzword from the 1970s referring to “situations characterized by reciprocal effects among countries or among actors in different countries.”
- a term economists use to refer to situations where a product becomes more valuable once many people use it
- What David Held has called the “widening, deepening and speeding up of worldwide interconnectedness in all aspects of contemporary social life”
- a term used by Koehane & Nye meaning that different relationships of interdependence intersect more deeply at more points
6 Clues: how rapidly a system and the units within it change • a state of the world involving networks of interdependence at multicontinental distances • a term economists use to refer to situations where a product becomes more valuable once many people use it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
science 2023-10-27
Across
- definition: Organisms that live on or in another organism (the host) and feeds on it
- definition: Models That show how food energy passes from organism to organisms
- Definition: A symbiotic relationship Between two different types of organisms and which Each of the partners Benefits from the relationship
Down
- Definition: Networks of interconnected Food chains In an ecosystem
- Definition: A symbiotic relationship between two different types of organisms in which one partner benefits and the other partner is harmed
- definition: A symbiotic relationship between two different types of organisms and which one partner benefits and the other one does not appear to lose or gain anything
6 Clues: Definition: Networks of interconnected Food chains In an ecosystem • definition: Models That show how food energy passes from organism to organisms • definition: Organisms that live on or in another organism (the host) and feeds on it • ...
Crossword Puzzle 2022-09-30
Across
- system that delivers content or services to end users over the internet. A web server consists of a physical server
- software or hardware that can be configured to block data from certain locations, applications, or ports while still allowing
Down
- network device that both modulates and demodulates analog carrier signals (called sine waves) for encoding and decoding digital
- processes on external networks or those that are hosted or Internet
- high-speed device that receives incoming data packets and redirects them to their destination
5 Clues: processes on external networks or those that are hosted or Internet • high-speed device that receives incoming data packets and redirects them to their destination • system that delivers content or services to end users over the internet. A web server consists of a physical server • ...
Data Protection 2018 2018-10-15
Across
- Share and Control Information Appropriately. Watch what you share on [ ] networks and share company information based on "need to know".
- Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data.
- Protect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts.
Down
- Use Approved [ ] and Services. Classify and label your files. Use Box to share and collaborate on documents. Don't use unapproved apps.
- [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.com
5 Clues: [ ] Security Questions or Concerns. Report phishing scams to phish@coca-cola.com • Protect Your [ ]. Never share your passwords and don't reuse work passwords for personal accounts. • Protect Company [ ] and Devices. Label documents with AIP. Spot phisling scams. Report Lost or stolen Data. • ...
Developer Security Crossword 2022-04-21
Across
- an open-source system first developed by Google for for automating software deployment, scaling, and management.
- an approach to software development where software is composed of small independent services that communicate over well-defined APIs.
Down
- the grading score of an enterprise's networks, information, and systems based on information security resources.
- a process in which you assume the role of an attacker to uncover vulnerabilities within your own software.
- a computer-software vulnerability that is unknown to those responsible for the software.
5 Clues: a computer-software vulnerability that is unknown to those responsible for the software. • a process in which you assume the role of an attacker to uncover vulnerabilities within your own software. • the grading score of an enterprise's networks, information, and systems based on information security resources. • ...
IP Addressing 2016-03-10
Across
- A method of expressing a network prefix (/)
- Addresses between 224.0.0.0 – 239.255.255.255
- The first IP address within a network that has all 0’s in the host portion.
- A broadcast that is sent to a specific network or series of networks. Uses the address 255.255.255.255
- An IP address that does not have to be globally unique and is not routable on the Internet.
- A method of assigning IPv4 addresses which requires that addresses within the same class must use the same subnet mask.
- An IP address that is globally unique and routable on the Internet.
- A method used to determine the network portion of an IP address by comparing the binary values.
- Address between network and broadcast.
Down
- The IPv4 address block 192.0.2.0 to 192.0.2.255 that is set aside for teaching and learning purposes
- Last IP address within a network that has all 1’s in the host portion
- A more efficient way of assigning addresses that allows the use of multiple subnet masks within the same IPv4 address class.
- The number of binary ones in the subnet mask
- Describes IPv4 packets sent to all hosts in a particular network. Uses the broadcast address of that network.
- A group of 8 binary bits
15 Clues: A group of 8 binary bits • Address between network and broadcast. • A method of expressing a network prefix (/) • The number of binary ones in the subnet mask • Addresses between 224.0.0.0 – 239.255.255.255 • An IP address that is globally unique and routable on the Internet. • Last IP address within a network that has all 1’s in the host portion • ...
Module 3 Crossword 2019-04-19
Across
- This word is short for binary digit and is the smallest unit of data represented in a computer.
- This acts as a bridge and takes data from one system and plugs that data into another.
- This system locates data that is stored in primary or secondary storage.
- System _________ is the combining of the various subsystems into one larger system and ensuring that the subsystems function together as a whole.
- When evaluating the training, this evaluates what the trainees thought about the training.
- This standard method for network management is used to manage small networks and is a simple network solution that does not require a server.
- This country represses what its citizens can read on the web.
Down
- How a network is organized or laid out is referred to as its _________.
- In a project plan, this phase prepares the facility for the conversion from the old system to the new.
- Whether new services or new clinics will be implemented is an example of _________ scanning.
- Evaluating the way the facility does business in order to improve efficiency is known as _________.
- CPU is considered the _________ of the computers.
- The Open Systems Interconnection (OSI) is composed of how many layers?
- This IP address is temporary and changes periodically.
- This was the first standard protocol for communication between EHR components.
15 Clues: CPU is considered the _________ of the computers. • This IP address is temporary and changes periodically. • This country represses what its citizens can read on the web. • The Open Systems Interconnection (OSI) is composed of how many layers? • How a network is organized or laid out is referred to as its _________. • ...
Caslin_Hiring vacab 2024-02-22
Across
- the process of establishing employees' roles and responsibilities.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- a permanent decrease in the total number of workers a company employs.
- the means of interactions among people in which they create share and or exchange information and ideas in virtual communities and networks.
- the process of identifying attracting interviewing selecting hiring and onboarding employees.
- the total amount of sales you make over a set period.
- a quick summary of a person's relevant education and experiences.
- to give up a job or position by telling your employer that you are leaving.
- someone who can answer questions about your work history skills abilities and work style.
- to encourage people to like buy use do or support something.
Down
- learning how to do the job or do the job better while in the role.
- coordinating managing and allocating human capital or employees in ways that move an organization's goals forward.
- a person or business that employs one or more people especially for wages or salary.
- your application must have made a good impression.
- the end of an employee's work with a company.
15 Clues: the end of an employee's work with a company. • your application must have made a good impression. • the total amount of sales you make over a set period. • to encourage people to like buy use do or support something. • a quick summary of a person's relevant education and experiences. • learning how to do the job or do the job better while in the role. • ...
