networks Crossword Puzzles

Networking terminologies 2023-04-18

Networking terminologies crossword puzzle
Across
  1. A device that connects multiple devices together in a network and forwards data between them.
  2. A computer or device that provides services or resources to other devices on a network.
  3. A network that covers a small geographic area, such as a home, office, or school.
  4. A set of rules that governs the communication between devices on a network.
Down
  1. A system that translates domain names (like google.com) into IP addresses so that devices can communicate with each other.
  2. A security device that filters incoming and outgoing network traffic to protect the network from unauthorized access.
  3. A group of interconnected devices or computers that communicate with each other.
  4. A device that connects two or more networks together and routes traffic between them.

8 Clues: A set of rules that governs the communication between devices on a network.A group of interconnected devices or computers that communicate with each other.A network that covers a small geographic area, such as a home, office, or school.A device that connects two or more networks together and routes traffic between them....

CS Month Week 1 2023-09-14

CS Month Week 1 crossword puzzle
Across
  1. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
  2. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
  3. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
  4. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
  1. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
  2. A software update released to fix vulnerabilities and improve security in applications or systems.
  3. ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
  4. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.

8 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques.A software update released to fix vulnerabilities and improve security in applications or systems.Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data....

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  2. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  3. a facial expression represented by a sequence of characters
  4. the activity of converting data or information into code
  5. the symbolic arrangement of data in a computer program
  6. the exclusive right to sell a work
  7. crime committed using a computer and the internet
  8. put into a format that can be read or processed by computers
  9. something reduced in volume to its full volume
  10. decompress
  11. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
  1. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  2. transfer a file or program to a smaller computer
  3. a worldwide network of computer networks
  4. a listing of the computer files stored in memory
  5. science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  6. set up for a particular purpose
  7. transfer out of a database or document
  8. locate and correct errors in a computer program
  9. an organized body of related information
  10. a short line of text that a web site puts on your computer's hard drive when you access the web site

21 Clues: decompressset up for a particular purposethe exclusive right to sell a worka worldwide network of computer networkstransfer out of a database or documentan organized body of related informationsomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

Name that PersonalitIE 2021-10-21

Name that PersonalitIE crossword puzzle
Across
  1. Father of modern probability;
  2. Pioneer of quality control.
  3. He wrote Toyota Production System: Beyond Large-Scale Production.
  4. Concepts of SMED, mistake-proofing, and "zero quality control"
  5. Chief financial officer of both Facebook and YouTube as well as the senior vice president and treasurer of Yahoo.
  6. Developer of AHP (Analytic Hierarchy Process) method in decision making;
  7. Invented the fields of traffic engineering; created the field of telephone networks analysis
  8. Earned a BS in Industrial Engineering and fourth CEO of Walmart
  9. Developed simple graphs that would measure performance while visually showing projected schedules.
  10. Father of modern assembly lines used in mass production
  11. First female professor in the engineering school and Mother of Modern Management
  12. Father of Scientific Management; the founder of modern 'Time Study
Down
  1. One of the founders of modern study of sociology and public administration; major works deal with rationalization in sociology of religion and government
  2. Development of the Simplex Algorithm
  3. One of the most influential researchers in the fields of Operations Research and Discrete Applied Mathematics.
  4. One of the founders of the field of Computer Simulation; pioneer in the field of Operations research
  5. Father of Systematic Planning; He was the original developer of relationship chart (REL-CHART)
  6. Founded Expedia within Microsoft and became company’s president & CEO
  7. published his seminal work on fuzzy sets in 1965,

19 Clues: Pioneer of quality control.Father of modern probability;Development of the Simplex Algorithmpublished his seminal work on fuzzy sets in 1965,Father of modern assembly lines used in mass productionConcepts of SMED, mistake-proofing, and "zero quality control"Earned a BS in Industrial Engineering and fourth CEO of Walmart...

Emerging Technology vocabulary 2023-10-12

Emerging Technology  vocabulary crossword puzzle
Across
  1. mobile device that allows users to take pictures and store the photographed images digitally.
  2. a mobile phone that performs many of the functions of a computer
  3. content on a storage medium that you can use in case the original is lost, damaged
  4. Thin, lighter weight mobile computer that has a touch screen, usually smaller than a laptop but larger than a phone.
  5. A mobile computing device designed for video games
  6. the electronic data stored on a computer or other device and generates a hard copy
  7. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks
  8. A electronic device, operating under the control of instructions stored in its own memory
Down
  1. A hardware component that conveys information with people
  2. A personal computer designed to be in a stationary location
  3. contain text, graphics, audio, and video.
  4. A worldwide collection of electronic documents
  5. Term used to refer collectively to hard disks and SSDs.
  6. Thin, lightweight mobile computer with a screen in its lid and a keyboard in its base
  7. Software that enables users with an Internet connection to access and view webpages on devices
  8. a set of related web pages located under a single domain name
  9. the faculty by which the mind stores and remembers information
  10. A personal computer designed to be in a stationary location
  11. the programs and other operating information used by a computer
  12. collection of computers and mobile devices connected together

20 Clues: contain text, graphics, audio, and video.A worldwide collection of electronic documentsA mobile computing device designed for video gamesTerm used to refer collectively to hard disks and SSDs.A hardware component that conveys information with peopleA personal computer designed to be in a stationary location...

Geography crossword puzzle 2022-07-04

Geography crossword puzzle crossword puzzle
Across
  1. What is a multicultural society with many people from diverse cultural backgrounds called?
  2. What is the term for pollution caused primarily by unnecessary honking?
  3. What is the pollution caused by fuel storage tank leakage into rivers?
  4. What are the advantages of going to a city called?
  5. What is the environment where people live on farms and villages called?
  6. What is the pollution caused by the increased use of LEDs?
  7. What is poor air quality affecting half the world’s urban population called?
  8. What is the term for the increase in the proportion of people living in cities?
  9. What job opportunities are called?
  10. What is the movement of people from rural to urban areas called?
  11. refers to our surroundings and can either be physical or human.
  12. Consist of living and non-living things that are found naturally.
Down
  1. What is a physical area on the Earth’ surface called?
  2. What is the number of people living in a unit area of land called?
  3. What is the state of the environment that has not been influenced by humans?
  4. areas What is an area with dense transport networks and densely packed buildings called
  5. What is the name of a physical area on the earth's surface?
  6. surface runoff caused by melting snow.
  7. What are the disadvantages of going to a city called?
  8. What is a built up area called?
  9. What is the primary source of pollution caused by the use of fuelwood and paraffin for cooking and heating?

21 Clues: What is a built up area called?What job opportunities are called?surface runoff caused by melting snow.What are the advantages of going to a city called?What is a physical area on the Earth’ surface called?What are the disadvantages of going to a city called?What is the pollution caused by the increased use of LEDs?...

Crossword Puzzle 2023-01-10

Crossword Puzzle crossword puzzle
Across
  1. - Name the sculpture created by David Mach in 1997 to celebrate the Darlington's railway heritage.
  2. - What is the busiest train station in the world, with 3.5 million passing through its doors every day?
  3. - Which famous Russian writer died at a railway station in 1910?
  4. - Which herbivorous mammal did America's first steam locomotive lose a race to?
  5. - What is the UKs longest single train route that runs for 785 miles or 1,263km?
  6. - What Scottish village was Glasgow Central built over?
  7. - Name the fuel used to power 19th century American steam locomotives.
  8. - What is one of the most inter-connected underground networks in the world more commonly known as?
  9. - which country has no railway network?
  10. - Which train ran on the world's first inter-city rail line?
Down
  1. - In which Scottish city would you find Waverly station?
  2. - Name the underground railway built in 1863 to ease traffic congestion.
  3. - In which European city is Gard du Nord?
  4. - Name the oldest train station in Scotland that's still in operation.
  5. - In 1934, which train became the official first steam locomotive to reach 100mph?
  6. - Name the shortest railway line in England
  7. - The first underground railway was constructed in which city in 1863?
  8. - Which country has the longest railway tunnel?
  9. - Which 1998 film starring Gwyneth Paltrow shows two different paths the protagonist can take if they catch a train or not?

19 Clues: - which country has no railway network?- In which European city is Gard du Nord?- Name the shortest railway line in England- Which country has the longest railway tunnel?- What Scottish village was Glasgow Central built over?- In which Scottish city would you find Waverly station?- Which train ran on the world's first inter-city rail line?...

Opportunities and Challenges of Urban Growth in Lagos 2025-06-23

Opportunities and Challenges of Urban Growth in Lagos crossword puzzle
Across
  1. Harm to the environment caused by waste, traffic and factories.
  2. Access to hospitals and clinics is often better in urban areas than in rural ones.
  3. An effect where investment leads to more jobs, income and spending.
  4. A social challenge that often increases in areas with high unemployment.
  5. Unregulated jobs like street vending or shoe-shining that many rely on.
  6. The sector that includes manufacturing and processing, which grows in urban centres.
  7. An illegal housing area built by people without formal planning or access to basic services.
  8. One of the main pull factors for people migrating to cities.
  9. Slums, access to resources and services, unemployment, pollution, and congestion
  10. A problem in slums where many people live in a small space.
Down
  1. When people are willing and able to work but can’t find jobs.
  2. Urban growth increases access to schools, colleges and universities.
  3. Social (health, education, water, energy) and Economic (industrial growth)
  4. Safe disposal of waste and access to toilets – often lacking in informal settlements.
  5. Large gaps in income, access to services and living conditions between people.
  6. A major challenge in fast-growing cities where rubbish collection can’t keep up.
  7. Access to piped or treated water improves in growing cities.
  8. Urban areas are more likely to have electricity networks than rural areas.
  9. Traffic build-up caused by rapid urban growth and poor infrastructure.

19 Clues: A problem in slums where many people live in a small space.Access to piped or treated water improves in growing cities.One of the main pull factors for people migrating to cities.When people are willing and able to work but can’t find jobs.Harm to the environment caused by waste, traffic and factories....

Malware Crossword 2024-10-06

Malware Crossword crossword puzzle
Across
  1. a helical device or component
  2. a communication method that uses electronic devices to deliver messages across computer networks
  3. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Down
  1. a type of malware that downloads onto a computer disguised as a legitimate program
  2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system

5 Clues: a helical device or componenta type of malware that downloads onto a computer disguised as a legitimate programa communication method that uses electronic devices to deliver messages across computer networkssoftware that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system...

Online safety 2021-08-11

Online safety crossword puzzle
Across
  1. a set of related web pages located under a single domain name, typically produced by a single person or organization
  2. a set of related web pages located under a single domain name, typically produced by a single person or organization
  3. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  4. things used to protect something or someone from accessing something
  5. content that portrays good values or interesting information
  6. a program built into a search engine to prohibit expilicit content
  7. a person under the ages of 18
  8. the act of agreeing or accepting an act or behaviour
  9. safety he saftey of a person whilst on the internet
  10. mode airplane or flight mode is used to restrict access to some online services.
Down
  1. a software put on a device that limits content, usually inappropriate or harmful.
  2. Good habits are acts that bennifit a person or person's
  3. areas that are used by everyone
  4. they appear in a place or situation unexpectedly
  5. the act of watching and looking over something
  6. the act of doing something by yourself
  7. websites and applications that enable users to create and share content or to participate in social networking.
  8. the act of aggresion or assult perpertrated online
  9. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  10. the amount of time spent on a device

20 Clues: a person under the ages of 18areas that are used by everyonethe amount of time spent on a devicethe act of doing something by yourselfthe act of watching and looking over somethingthey appear in a place or situation unexpectedlythe act of aggresion or assult perpertrated onlinethe act of agreeing or accepting an act or behaviour...

Technology 2023-06-07

Technology crossword puzzle
Across
  1. represents text, computer processor instructions, or any other data using a two-symbol system
  2. is any software intentionally designed to cause disruption to a computer, server, client, or computer network
  3. is a commonly used method of lossy compression for digital images
  4. is a mobile operating system
  5. is the most important processor in a given computer.
  6. is a digital multimedia container format most commonly used to store video and audio
  7. is a mapping from some domain
  8. are small blocks of data created by a web server
Down
  1. is the protection of computer systems and networks
  2. is a method of transmitting and receiving messages using electronic devices
  3. is a hardware or software component
  4. is an American multinational technology company
  5. is a collection of discrete values that convey information
  6. is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
  7. is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
  8. is a file format developed by Adobe
  9. is a bitmap image format that was developed by a team at the online services provider CompuServe
  10. is a form of computer memory that can be read and changed in any order
  11. is a coding format for digital audio developed largely by the Fraunhofer Society in Germany

19 Clues: is a mobile operating systemis a mapping from some domainis a hardware or software componentis a file format developed by Adobeis an American multinational technology companyare small blocks of data created by a web serveris the protection of computer systems and networksis the most important processor in a given computer....

AP World 2025-11-02

AP World crossword puzzle
Across
  1. A inn for travelers across the major trade routes that gave place to rest, eat, and water animals.
  2. Moroccan travelor who documented his journey from the Islamic world to Asia
  3. Of significance important in the African world, could transport and store goods across the Saharan Desert which increased trade
  4. A major city of the early north american civilation
  5. A group of people who moved seasonally to different locations
  6. Am early chinese credit system, early variation of paper money
  7. major hubs of the indian oceans, welcomed all settlers
  8. Traditional wooden sailing vesselwith lanteen sails
  9. A chinese admiral the led 7 major expiditions and fostered trade networks in the process
  10. Use of siege technolodgies and tactics used by the mongols
  11. A wide trade network that spanned across all of Eurasia
Down
  1. Group of people/travelors who settle into another country/region and adapt to their culture
  2. Ruler of Mali, known for his immmense wealth.
  3. Renewal of Confusianism that includes ideas from Buddhism and Daoist
  4. A network of stations established to communicate rapidly throughout the Mongol empire.
  5. Originally temple used for Hindu but later used for Buddhism
  6. First ruler of the Mongol Empire, originally named Temujin
  7. A Indian dynaasty that ruled Java and SouthEast parts of Asia
  8. A major center of trade, scholarship and culture in West Africa

19 Clues: Ruler of Mali, known for his immmense wealth.A major city of the early north american civilationTraditional wooden sailing vesselwith lanteen sailsmajor hubs of the indian oceans, welcomed all settlersA wide trade network that spanned across all of EurasiaFirst ruler of the Mongol Empire, originally named Temujin...

Cyber security 2021-11-05

Cyber security crossword puzzle
Across
  1. They travel around computer networks, looking for unprotected computers. Similar to a virus, it may corrupt or delete data.
  2. pretending to be a genuine organisation to get someone's details.
  3. a virus that usually come embedded within another file that looks genuine.
Down
  1. horse malware that is disguised as a genuine file that gives hackers access to a computer.
  2. engineering the art of tricking or manipulation to get someone to reveal their personal info.

5 Clues: pretending to be a genuine organisation to get someone's details.a virus that usually come embedded within another file that looks genuine.horse malware that is disguised as a genuine file that gives hackers access to a computer.engineering the art of tricking or manipulation to get someone to reveal their personal info....

networking concepts 2025-06-15

networking concepts crossword puzzle
Across
  1. this is usedto connect all computers in a network with each other
  2. this enables you to connect to your computer to the available internet connection over the existing telephone lines
  3. this is used to physically attach a computer to a network
Down
  1. this is a device that connects two different types of networks with each other
  2. this is a layout in which various components of a network are connected and communicate with each other

5 Clues: this is used to physically attach a computer to a networkthis is usedto connect all computers in a network with each otherthis is a device that connects two different types of networks with each otherthis is a layout in which various components of a network are connected and communicate with each other...

Mesh Wifi 2020-05-09

Mesh Wifi crossword puzzle
Across
  1. What is the name of the device that an ISP (Internet Service Provider) uses to connect a home to the web?
  2. What broadcasts the internet signal from the modem to the wireless devices within a home?
  3. Mesh Wi-Fi ____ connections offer customers a consistent, speedy connection for any sized home.
  4. Mesh Wi-Fi Networking is designed to be ____ so it can fit any home.
Down
  1. With traditional networks, the signal strength ____ the further you’re away from the wireless node (router).
  2. Any device that transmits and/or receives a wireless signal is known as a network ___.

6 Clues: Mesh Wi-Fi Networking is designed to be ____ so it can fit any home.Any device that transmits and/or receives a wireless signal is known as a network ___.What broadcasts the internet signal from the modem to the wireless devices within a home?Mesh Wi-Fi ____ connections offer customers a consistent, speedy connection for any sized home....

test 2024-08-22

test crossword puzzle
Across
  1. local search is classified under local search algorithms and is commonly applied in scenarios where the goal is to identify the optimal solution from a set of possible solutions.
  2. AWS tool that prioritize data protection
  3. is a model that refers to the process of linking the abstract concepts in the model to real world entities.
Down
  1. form the basis for comprehension and generation within generative AI, like GPT, when processing text.
  2. is the core architectural framework that GPT-4 utilizes for processing and generating text
  3. Generative AI works through the use of neural networks, specifically

6 Clues: AWS tool that prioritize data protectionGenerative AI works through the use of neural networks, specificallyis the core architectural framework that GPT-4 utilizes for processing and generating textform the basis for comprehension and generation within generative AI, like GPT, when processing text....

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  2. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  3. a facial expression represented by a sequence of characters
  4. the activity of converting data or information into code
  5. the symbolic arrangement of data in a computer program
  6. the exclusive right to sell a work
  7. crime committed using a computer and the internet
  8. put into a format that can be read or processed by computers
  9. something reduced in volume to its full volume
  10. decompress
  11. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
  1. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  2. transfer a file or program to a smaller computer
  3. a worldwide network of computer networks
  4. a listing of the computer files stored in memory
  5. science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  6. set up for a particular purpose
  7. transfer out of a database or document
  8. locate and correct errors in a computer program
  9. an organized body of related information
  10. a short line of text that a web site puts on your computer's hard drive when you access the web site

21 Clues: decompressset up for a particular purposethe exclusive right to sell a worka worldwide network of computer networkstransfer out of a database or documentan organized body of related informationsomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

Technology vocabulary 2021-03-16

Technology vocabulary crossword puzzle
Across
  1. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  2. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  3. a facial expression represented by a sequence of characters
  4. the activity of converting data or information into code
  5. the symbolic arrangement of data in a computer program
  6. the exclusive right to sell a work
  7. crime committed using a computer and the internet
  8. put into a format that can be read or processed by computers
  9. something reduced in volume to its full volume
  10. decompress
  11. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
Down
  1. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  2. transfer a file or program to a smaller computer
  3. a worldwide network of computer networks
  4. a listing of the computer files stored in memory
  5. science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  6. set up for a particular purpose
  7. transfer out of a database or document
  8. locate and correct errors in a computer program
  9. an organized body of related information
  10. a short line of text that a web site puts on your computer's hard drive when you access the web site

21 Clues: decompressset up for a particular purposethe exclusive right to sell a worka worldwide network of computer networkstransfer out of a database or documentan organized body of related informationsomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

Digital Commerce 2021-10-06

Digital Commerce crossword puzzle
Across
  1. a part of something
  2. a device used to enter information into a computer
  3. it is a free online encyclopedia
  4. it stands for wide area network and it connects computers over a large area
  5. it is a way to store digital information
  6. to copy and paste other people’s work and demand that you did it
  7. it stands for solid state drive and it use flash memory to store your data
Down
  1. proper manners
  2. it stands for central processing unit and it sends signals to control the computer
  3. it’s a law that gives the owner of their own work, the right to decide what other people can do with it
  4. to protect your networks from intruders
  5. it is to intrude into someone else’s privacy and to steal their information by breaking through their computer security
  6. commercial messages that you did not ask for
  7. it stands for local area network that connects computers or devices in a building
  8. it controls the flow of the data from one computer to another
  9. it stands for hard disk drive and it uses a magnetic storage to save data
  10. a technology that allows someone to connect a electron device to a computer
  11. it means that you could use something that someone else created
  12. it stands for random access memory and it is a memory in your computer that stores your program

19 Clues: proper mannersa part of somethingit is a free online encyclopediato protect your networks from intrudersit is a way to store digital informationcommercial messages that you did not ask fora device used to enter information into a computerit controls the flow of the data from one computer to another...

Name that PersonalitIE 2021-10-21

Name that PersonalitIE crossword puzzle
Across
  1. erlang invented the fields of traffic engineering; created the field of telephone networks analysis
  2. One of the founders of the field of Computer Simulation; pioneer in the field of Operations research
  3. deming Pioneer of quality control.
  4. Developer of AHP (Analytic Hierarchy Process) method in decision making;
  5. Father of Systematic Planning; He was the original developer of relationship chart (REL-CHART)
  6. published his seminal work on fuzzy sets in 1965,
  7. Chief financial officer of both Facebook and YouTube as well as the senior vice president and treasurer of Yahoo.
  8. Father of modern probability;
  9. Earned a BS in Industrial Engineering and fourth CEO of Walmart
  10. ford Father of modern assembly lines used in mass production
Down
  1. Developed simple graphs that would measure performance while visually showing projected schedules.
  2. First female professor in the engineering school and Mother of Modern Management
  3. One of the most influential researchers in the fields of Operations Research and Discrete Applied Mathematics.
  4. Development of the Simplex Algorithm
  5. barton Founded Expedia within Microsoft and became company’s president & CEO
  6. He wrote Toyota Production System: Beyond Large-Scale Production.
  7. One of the founders of modern study of sociology and public administration; major works deal with rationalization in sociology of religion and government
  8. Concepts of SMED, mistake-proofing, and "zero quality control"
  9. Father of Scientific Management; the founder of modern 'Time Study

19 Clues: Father of modern probability;deming Pioneer of quality control.Development of the Simplex Algorithmpublished his seminal work on fuzzy sets in 1965,ford Father of modern assembly lines used in mass productionConcepts of SMED, mistake-proofing, and "zero quality control"Earned a BS in Industrial Engineering and fourth CEO of Walmart...

Online safety 2021-08-11

Online safety crossword puzzle
Across
  1. the act of agreeing or accepting an act or behaviour
  2. they appear in a place or situation unexpectedly
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  4. the act of doing something by yourself
  5. websites and applications that enable users to create and share content or to participate in social networking.
  6. areas that are used by everyone
  7. a software put on a device that limits content, usually inappropriate or harmful.
  8. a set of related web pages located under a single domain name, typically produced by a single person or organization
Down
  1. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  2. safety he saftey of a person whilst on the internet
  3. the amount of time spent on a device
  4. Good habits are acts that bennifit a person or person's
  5. things used to protect something or someone from accessing something
  6. a program built into a search engine to prohibit expilicit content
  7. content that portrays good values or interesting information
  8. the act of watching and looking over something
  9. a person under the ages of 18
  10. the act of aggresion or assult perpertrated online
  11. mode airplane or flight mode is used to restrict access to some online services.
  12. a set of related web pages located under a single domain name, typically produced by a single person or organization

20 Clues: a person under the ages of 18areas that are used by everyonethe amount of time spent on a devicethe act of doing something by yourselfthe act of watching and looking over somethingthey appear in a place or situation unexpectedlythe act of aggresion or assult perpertrated onlinesafety he saftey of a person whilst on the internet...

Online safety 2021-08-11

Online safety crossword puzzle
Across
  1. mode airplane or flight mode is used to restrict access to some online services.
  2. content that portrays good values or interesting information
  3. a person under the ages of 18
  4. areas that are used by everyone
  5. a software put on a device that limits content, usually inappropriate or harmful.
  6. a set of related web pages located under a single domain name, typically produced by a single person or organization
  7. things used to protect something or someone from accessing something
  8. the act of agreeing or accepting an act or behaviour
  9. the act of aggresion or assult perpertrated online
Down
  1. a program built into a search engine to prohibit expilicit content
  2. a set of related web pages located under a single domain name, typically produced by a single person or organization
  3. they appear in a place or situation unexpectedly
  4. a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
  5. the act of watching and looking over something
  6. Good habits are acts that bennifit a person or person's
  7. the amount of time spent on a device
  8. the act of doing something by yourself
  9. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  10. websites and applications that enable users to create and share content or to participate in social networking.
  11. safety he saftey of a person whilst on the internet

20 Clues: a person under the ages of 18areas that are used by everyonethe amount of time spent on a devicethe act of doing something by yourselfthe act of watching and looking over somethingthey appear in a place or situation unexpectedlythe act of aggresion or assult perpertrated onlinesafety he saftey of a person whilst on the internet...

Newsletter 2023 Q4 Crossword Puzzle 2023-11-08

Newsletter 2023 Q4 Crossword Puzzle crossword puzzle
Across
  1. Member of management or delegate who has primary responsibility for the business function supported by a system, application
  2. Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
  3. Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
  4. Concerning ransomware, a user or organization's critical data is made inaccessible
  5. Operations Risk Management Committee
  6. Leader of a business unit with responsibility for implementing department level operating procedures
  7. Any staff member who maintains security controls on behalf of an Owner
  8. A kind of software used to prevent, scan, detect and delete viruses from a computer
Down
  1. TEAMS channel for up to date security notices
  2. Security Operating Policy
  3. Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
  4. Minimizing the harm of a particular risk
  5. Month of CAM
  6. Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
  7. Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
  8. One of two useful Security Awareness TEAMS channels
  9. Any staff member who oversees data recovery
  10. Number of years Catalyst has been a CAM Champ
  11. Pertaining to a strong p, used to reduce vulnerability in the event of a hack

19 Clues: Month of CAMSecurity Operating PolicyOperations Risk Management CommitteeMinimizing the harm of a particular riskAny staff member who oversees data recoveryTEAMS channel for up to date security noticesNumber of years Catalyst has been a CAM ChampOne of two useful Security Awareness TEAMS channels...

Information system exam 2023-03-02

Information system exam crossword puzzle
Across
  1. a computer program or device that provides a service to another computer program and its user, also known as the client.
  2. Be very skeptical of change
  3. one of the main type of inforation system
  4. physical aspects of technology.
  5. the ability to conceive, develop, deliver, and scale new products, services, processes, and business models for customers
  6. Convert analog data into digital form /0 and 1/, so that it can be stored, processed and transmitted by a computer.
  7. Technology Acceptance Model
  8. a type of software system that helps organizations automate and manage core business processes for optimal performance.
  9. the programs that are needed to accomplish the input, processing, output, storage, and control activities of information systems
  10. a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
  11. change model that is a simple and easy-to-understand framework to humanize the change management process.
  12. an awareness and understanding of a set of information and the ways that information can be used to support a specific task or reach a decision
Down
  1. the redesign of business processes
  2. an integral part of strategic planning for many businesses today
  3. a combination of software, hardware, and telecommunication networks to collect useful data, especially in an organisation.
  4. having the ability to store and access data and programs over the internet instead of on a hard drive.
  5. most valuable information system.
  6. structure of coordination between the activities of the organization
  7. a type of innovation
  8. the raw fact

20 Clues: the raw facta type of innovationBe very skeptical of changeTechnology Acceptance Modelphysical aspects of technology.most valuable information system.the redesign of business processesone of the main type of inforation systeman integral part of strategic planning for many businesses today...

Spinal Nerves 2024-08-28

Spinal Nerves crossword puzzle
Across
  1. the ____ horn of grey matter contains somatic motor neurons (efferent)
  2. the ____ horn of grey matter conveys sensory/afferent information
  3. the area of the spinal cord that contains myelinated axons
  4. the germ layer that spinal nerves are derived from via the neural tube
  5. spinal nerve TN2 exits ___ to the T2 vertebra
  6. the fibers found within the ventral (anterior) root from the gray matter of spinal cord and carry information from the CNS to the muscles of the body
  7. ____ nerves arise from the spinal cord via two roots, the ventral (anterior) and dorsal (posterior)
  8. the number of pairs of spinal nerves
  9. group of cell bodies in the peripheral nervous system
  10. Cervical nerve 1 (CN1) exits ___ to the first cervical vertebra
  11. a defined group of muscles innervated by a single spinal nerve root
Down
  1. the small posterior and large anterior ___ are branches of mixed spinal nerves that carry both sensory and motor fibers
  2. ___ matter contains cell bodies in the spinal cord
  3. sensory information from a specific area of skin
  4. the spinal nerves are part of the ____ nervous system
  5. ___ root carries sensory fibers from organs and other parts of the body to the posterior horn of gray matter in the spinal cord
  6. networks of intersecting nerves
  7. bundle of axons in the peripheral nervous system
  8. sensory fibers that carry information from the periphery to the CNS
  9. ___ spinal nerve is the combination of ventral and dorsal nerve roots with both sensory and motor information

20 Clues: networks of intersecting nervesthe number of pairs of spinal nervesspinal nerve TN2 exits ___ to the T2 vertebrasensory information from a specific area of skinbundle of axons in the peripheral nervous system___ matter contains cell bodies in the spinal cordthe spinal nerves are part of the ____ nervous system...

Nathanie's word puzzle 2023-09-12

Nathanie's word puzzle crossword puzzle
Across
  1. transfer a file or program to a smaller computer
  2. transfer out of a database or document
  3. publishing (computer science) the use of microcomputers with graphics capacity to produce printed materials
  4. a short line of text that a web site puts on your computer's hard drive when you access the web site
  5. (computer science) a memory device consisting of a flat disk covered with a magnetic coating on which information is stored
  6. set up for a particular purpose
  7. the activity of converting data or information into code
  8. something reduced in volume to its full volume
  9. an organized body of related information
  10. a facial expression represented by a sequence of characters
Down
  1. crime committed using a computer and the internet
  2. the exclusive right to sell a work
  3. a listing of the computer files stored in memory
  4. (computer science) the area of the screen in graphical user interfaces against which icons and windows appear
  5. strings of letters and numbers (separated by periods) that are used to name organizations and computers and addresses on the internet
  6. locate and correct errors in a computer program
  7. a worldwide network of computer networks
  8. put into a format that can be read or processed by computers
  9. (computer science) indicator consisting of a movable spot of light (an icon) on a visual display; moving it allows the user to point to commands or screen positions
  10. the symbolic arrangement of data in a computer program

20 Clues: set up for a particular purposethe exclusive right to sell a worktransfer out of a database or documenta worldwide network of computer networksan organized body of related informationsomething reduced in volume to its full volumelocate and correct errors in a computer programcrime committed using a computer and the internet...

Unit 8: Lessons 1-4 2026-02-16

Unit 8: Lessons 1-4 crossword puzzle
Across
  1. In a very detailed or complicated way.
  2. Lacking a permanent home and moving from place to place.
  3. A time before people began writing down history.
  4. Related to formal religious or public events.
  5. A Mound Builder group known for building burial mounds.
  6. The belief of the Ancestral Pueblo that they crawled up from inside the Earth to the surface.
  7. A stone or clay home built above ground by Native Americans in the Southwest.
  8. Native American groups who built large earthen mounds for burial or ceremonial purposes. They lived at different times.
Down
  1. A Mound Builder group known for building large cities and platform mounds.
  2. A Mound Builder group known for trade networks and detailed artifacts.
  3. Ancient Native Americans of the Southwest who built pueblos and cliff dwellings.
  4. The number of people living in a certain area.
  5. The land bridge that once connected Asia and North America during the Ice Age.
  6. The language, traditions, beliefs, and customs that make up a tribe’s way of life.
  7. The surroundings or natural conditions in which people live; it shapes their culture.
  8. Farming. Growing crops and raising animals for food.
  9. A permanent community where people live.
  10. The region where Arizona, New Mexico, Utah, and Colorado meet.
  11. A large animal hunted by Native Americans that has not gone extinct (now called buffalo)

19 Clues: In a very detailed or complicated way.A permanent community where people live.Related to formal religious or public events.The number of people living in a certain area.A time before people began writing down history.Farming. Growing crops and raising animals for food.A Mound Builder group known for building burial mounds....

World Geography Crossword 2026-01-21

World Geography Crossword crossword puzzle
Across
  1. Saudi Arabia is an ________ monarchy.
  2. The longest mountain range in the world is the _____.
  3. Home to Norway and Sweden, the ____________ Peninsula it's rugged terrain, deep fjords, and vast forests.
  4. A dictatorship is sometime also a _______________. An example would be North Korea.
  5. Type of map showing political boundaries from the past.
  6. The largest river in the world by discharge volume in the ______ River.
  7. Type of plate boundary with two plates moving next to each other. Not away, not towards.
  8. Type of plate boundary with two plates moving toward each other.
  9. Iran is a _________.
  10. ____ infrastructure is the physical network that keeps an industrialized nation operating smoothly.
Down
  1. ______________ refers to structures, systems, and facilities serving the economy of a business, industry, country, city, town, or area, including the services and facilities necessary for it's economy to function.
  2. The United Kingdom is a ______________ monarchy.
  3. The United States of America is a ________.
  4. Flowing through 10 countries, the ______ River is the second-longest in Europe.
  5. Type of plate boundary with two plates moving away form each other.
  6. ____ infrastructure is the non-physical networks that a community provides it's residents.
  7. Energy __________ focuses on making primary energy sources and secondary energy forms available to meet the needs of society.
  8. One of Europe's most famous mountain ranges is the ___
  9. Water __________ provides local water supply through a system of engineered components.
  10. Type of map. Similar to physical maps. Generally represent a small area with a lot of detail.

20 Clues: Iran is a _________.Saudi Arabia is an ________ monarchy.The United States of America is a ________.The United Kingdom is a ______________ monarchy.The longest mountain range in the world is the _____.One of Europe's most famous mountain ranges is the ___Type of map showing political boundaries from the past....

Lesson 2 2024-02-13

Lesson 2 crossword puzzle
Across
  1. The art of writing or solving codes to secure digital information.
  2. The practice of protecting computers, networks, programs, and data from unauthorized access or attacks, which often relies on cryptographic methods.
  3. The process of converting information into a code to prevent unauthorized access.
Down
  1. A fundamental aspect of cryptography aimed at protecting the confidentiality of digital communications and information.
  2. A technique for ensuring data integrity by converting information into a fixed-size string of characters.

5 Clues: The art of writing or solving codes to secure digital information.The process of converting information into a code to prevent unauthorized access.A technique for ensuring data integrity by converting information into a fixed-size string of characters....

Combat Support 2024-10-16

Combat Support crossword puzzle
Across
  1. Supports commanders and staff in gaining situational understanding of threats, terrain, weather, and civil considerations
  2. Protects the force/nation from MWD and CBHN threats and hazards
Down
  1. Supports unified land operations from stable peace to major decisive action consisting of lethal or nonlethal engagement against the wide range of threats
  2. Installs, operates, maintains, secures, and defends the Army's portion of the Department of Defense information networks and communication security
  3. Plans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operations
  4. Responsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance

6 Clues: Protects the force/nation from MWD and CBHN threats and hazardsPlans, integrates, synchronizes, and executes cyberspace and electromagnetic warfare operationsResponsible for detecting, identifying, evaluating, rendering safe, exploiting, and disposing of explosive ordnance...

Tourism Industry and Hospitality Sector 2024-10-08

Tourism Industry and Hospitality Sector crossword puzzle
Across
  1. Natural, cultural, and man-made attractions, such as museums, parks, historical sites, theme parks, and zoos, that tourists visit.
  2. These are the networks, press, advertisers, and advocacy groups
  3. Includes labor unions, labor-management councils, service providers, cooperatives, and contractors
  4. Includes travel agents, tour operators, and online platforms that help plan, arrange, and sell travel experiences.
Down
  1. This sector involves accommodation and F&B outlets
  2. The sector with responsibilities carried out by agencies and bodies at local, regional, and national levels including policy-making and implementation among others.
  3. This sector is a specialized niche of group tourism that is focused on organizing, booking, and facilitating events for large groups.
  4. These are educational institutions and organizations involved in teaching, researching, and developing talent related to tourism and hospitality management.

8 Clues: This sector involves accommodation and F&B outletsThese are the networks, press, advertisers, and advocacy groupsIncludes labor unions, labor-management councils, service providers, cooperatives, and contractorsIncludes travel agents, tour operators, and online platforms that help plan, arrange, and sell travel experiences....

CSAM Week #3 2024-10-10

CSAM Week #3 crossword puzzle
Across
  1. _____ Breach is an incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
  2. A small text file sent to your browser by a website. This is also a term for a baked snack.
  3. A generic term for a number of different types of malicious code.
  4. ______ fraud is a form of theft in which a transaction, typically financial, is performed by an attacker impersonating someone else.
  5. A communication link between systems or networks that is typically encrypted in order to provide a secured pathway of communication.
Down
  1. Use a ______ password for each app and website.
  2. A gold mine of information hackers can use to trick you and your co-workers.
  3. _____ over links can provide insight into their true destination.

8 Clues: Use a ______ password for each app and website._____ over links can provide insight into their true destination.A generic term for a number of different types of malicious code.A gold mine of information hackers can use to trick you and your co-workers.A small text file sent to your browser by a website. This is also a term for a baked snack....

Ethernet Standards 2025-10-17

Ethernet Standards crossword puzzle
Across
  1. Improved Ethernet offering speeds of up to 100 Mbps.
  2. Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.
Down
  1. Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs.
  2. This was the original standard, offering speeds of up to 10 Mbps.

4 Clues: Improved Ethernet offering speeds of up to 100 Mbps.This was the original standard, offering speeds of up to 10 Mbps.Offers speeds of up to 1 Gbps, providing high-speed connections for modern LANs.Allows speeds of 10 Gbps, suitable for data centers and high-performance networks.

EOCT Vocab Crossword 2015-05-05

EOCT Vocab Crossword crossword puzzle
Across
  1. Used to measure storage space
  2. Logic Statements used in programming that uses terms such as "if, then..." or "if, else"
  3. Programming "Plug and Place" coding; "Sissy Programming"; Helps people get into programming; to make money you have to set up actual programming
  4. 1,000,000
  5. Use Act / It allows exceptions to the rule
  6. Working from home full or part time
  7. Developers Work on the back end of the site, writing the code that allows the website to function
  8. 1,000,000,000
  9. Law States that the number of transistors on a processor chip doubles about every two years; Gordon Moore came up with this law in 1965; co-founder of INTEL
Down
  1. Refers to the spelling and grammar of a programming language; Every language has it's own syntax rules (especially with the symbols)
  2. 1000
  3. Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH
  4. 100,000
  5. Used to measure processor speed
  6. Chart It is a "storyboard" of logical thinking placed on paper or computer program; It helps programmers think
  7. Formula or set for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point
  8. Commons License Offers some protection
  9. Numbers; Math 0 and 1 are the only two numbers computers recognize
  10. Computing Storing your information online; you are basically giving up your private rights by sharing.

19 Clues: 1000100,0001,000,0001,000,000,000Used to measure storage spaceUsed to measure processor speedWorking from home full or part timeCommons License Offers some protectionUse Act / It allows exceptions to the ruleNumbers; Math 0 and 1 are the only two numbers computers recognizeTalking about computer networks; Set up as RING, STAR, TREE, BUS, MESH...

EOCT Crossword for Mr. Gerrell 2015-05-06

EOCT Crossword for Mr. Gerrell crossword puzzle
Across
  1. Developers Work on the back end of the site, writing the code that allows the website to function
  2. 1000
  3. Formula or set for solving a particular problem. To be an algorithm, a set of rules must be unambiguous and have a clear stopping point
  4. Commons License Offers some protection
  5. Talking about computer networks; Set up as RING, STAR, TREE, BUS, MESH
  6. Law States that the number of transistors on a processor chip doubles about every two years; Gordon Moore came up with this law in 1965; co-founder of INTEL
  7. Chart It is a "storyboard" of logical thinking placed on paper or computer program; It helps programmers think
  8. Used to measure processor speed
  9. 1,000,000
Down
  1. Refers to the spelling and grammar of a programming language; Every language has it's own syntax rules (especially with the symbols)
  2. Numbers 0 and 1 are the only two numbers computers recognize
  3. Used to measure storage space
  4. Working from home full or part time
  5. Programming "Plug and Place" coding; "Sissy Programming"; Helps people get into programming; to make money you have to set up actual programming
  6. Logic Statements used in programming that uses terms such as "if, then..." or "if, else"
  7. Computing Storing your information online; you are basically giving up your private rights by sharing.
  8. 100,000
  9. Designers Work on the front end of a site, or, the part that users can see and interact
  10. Use Act It allows exceptions to the rule
  11. 1,000,000,000

20 Clues: 1000100,0001,000,0001,000,000,000Used to measure storage spaceUsed to measure processor speedWorking from home full or part timeCommons License Offers some protectionUse Act It allows exceptions to the ruleNumbers 0 and 1 are the only two numbers computers recognizeTalking about computer networks; Set up as RING, STAR, TREE, BUS, MESH...

CS Principles 2022 2022-04-22

CS Principles 2022 crossword puzzle
Across
  1. Metadata stores _____ concerning larger data to increase convenience.
  2. JPG Images use this type of compression.
  3. Rogue Access points allow for ________ access into secure networks.
  4. All protocols used in the Internet are _____.
  5. Algorithms with _______ efficiency are said to run in reasonable time.
  6. A system that is able to handle failure and still function is called fault-________.
  7. Open _____ programs can be redistributed and modified freely.
  8. Some data types include lists, ______, strings, and numbers.
Down
  1. The bandwidth of a computer is the ________ amount of data that can be sent in a fixed amount of time.
  2. This type of problem has the goal of finding the best solution.
  3. Every algorithm can be broken down into three parts: sequencing, ________, and iteration.
  4. This type of routing allows for the scalability of the internet:
  5. Analog data is used to store values that have ______ changes.
  6. If you put 5 cans of beans into a box designed to hold 4 cans of beans, that is an example of a(n) _________ error.
  7. A heuristic approach produces a solution that is not guaranteed to be _______ but is "good enough" for the situation.
  8. This type of key encryption uses one key for both encryption and decryption.
  9. Dividing by zero is an example of this type of error.
  10. This protocol is more popular for video calls and streams.
  11. Bandwidth is measured in ______ per second.

19 Clues: JPG Images use this type of compression.Bandwidth is measured in ______ per second.All protocols used in the Internet are _____.Dividing by zero is an example of this type of error.This protocol is more popular for video calls and streams.Some data types include lists, ______, strings, and numbers....

Data Transmission - IGCSE 2022-10-25

Data Transmission - IGCSE crossword puzzle
Across
  1. a type of serial data transmission which has become the industry standard for connecting computers to devices via a USB port
  2. the part of a data packet that indicates the end of the data packet and cyclic redundancy check error check
  3. data that arrives at the destination with the bits no longer synchronised
  4. the part of the data packet that contains the IP addresses of the sender and receiver, and includes the packet number which allows reassembly of the data packets
  5. device that enables data packets to be moved between different networks
  6. a small part of a message/data that is transmitted over a network
Down
  1. data that can be sent in both directions at the same time (simultaneously)
  2. data that can be sent on one direction only
  3. the actual data being carried in a data packet

9 Clues: data that can be sent on one direction onlythe actual data being carried in a data packeta small part of a message/data that is transmitted over a networkdevice that enables data packets to be moved between different networksdata that arrives at the destination with the bits no longer synchronised...

REACH PUZZLE 2023-04-26

REACH PUZZLE crossword puzzle
Across
  1. How many AI Cohorts are running in Learning Program
  2. How many pillars in REACH Program
  3. in REACH 'C' stands for ?
Down
  1. techNxt program is associated to which Pillar ?
  2. program that teaches the know-how of writing a technical or white paper.
  3. which pillar of the REACH program engages with talent by inviting them to SAP Labs India and providing them with an opportunity to understand the SAP culture and ethos.
  4. What is the name of the partner institute for the program AI for product management
  5. Bidirectional knowledge exchange between SAP and Academia through sessions driven by SAP experts and industry thought leaders on topics relevant to SAP solution area as well as Industry perspective
  6. which pillar of the REACH program is to provide certification programs to enable colleagues to be future-ready.
  7. Program will mobilize students across certain universities with the help of alumni networks of employees.

10 Clues: in REACH 'C' stands for ?How many pillars in REACH ProgramtechNxt program is associated to which Pillar ?How many AI Cohorts are running in Learning Programprogram that teaches the know-how of writing a technical or white paper.What is the name of the partner institute for the program AI for product management...

technology 2023-10-12

technology crossword puzzle
Across
  1. electronic device, which operates under the control of instructions stored in its own memory
  2. A worldwide collection of computer networks that connects millions of businesses, government agencie
  3. Thin, lighter weight mobile computer that has a touch screen, usually smaller than a laptop but larger than a phone.
  4. It is Internet-compatible and usually also includes a calendar, appointment book, address book, etc.
  5. Thin and light mobile computer with a screen on the lid and a keyboard on the base, designed to fit on your lap.
Down
  1. A worldwide collection of computer networks that connects millions of businesses, government agencie
  2. Electronic components that store instructions waiting to be executed and the data needed by those instructions
  3. A mobile device that allows users to take pictures and store the photographed images digitally.
  4. A collection of computers and mobile devices connected together, often wirelessly
  5. mobile computing device designed for single-player or multiplayer video games.

10 Clues: mobile computing device designed for single-player or multiplayer video games.A collection of computers and mobile devices connected together, often wirelesslyelectronic device, which operates under the control of instructions stored in its own memoryA mobile device that allows users to take pictures and store the photographed images digitally....

WotD 2023-11-05

WotD crossword puzzle
Across
  1. Capable of being maintained or continued over the long term without harming the environment or depleting resources.
  2. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  3. To bring about a complete change in something, typically in a significant and dramatic way.
Down
  1. The use of largely automatic equipment and systems in various processes, reducing the need for human intervention.
  2. Introducing or using new ideas, methods, or equipment.

5 Clues: Introducing or using new ideas, methods, or equipment.To bring about a complete change in something, typically in a significant and dramatic way.The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access....

Cyber Security 2024-03-25

Cyber Security crossword puzzle
Across
  1. Security systems designed to prevent unauthorized access to or from a private network.
  2. Networks of hijacked computer devices used to carry out various scams and cyber attacks.
  3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
  1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

6 Clues: Security systems designed to prevent unauthorized access to or from a private network.Networks of hijacked computer devices used to carry out various scams and cyber attacks.Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system....

Crossword Topic 7 2021-06-30

Crossword Topic 7 crossword puzzle
Across
  1. any type of network with a high capacity to transport information that affects its transmission speed.
  2. It is one that presents a discontinuous variation over time and that can only take certain discrete values.
  3. It is a local type network whose computers do not need to be linked by cables to connect.
  4. It consists of various electronic devices connected to exchange and share information and resources.
  5. is a device that offers a Wi-Fi connection, which is usually connected to a modem
  6. it is a type of twisted pair cable and can run CDDI and can transmit data at 100Mbps.
Down
  1. it does not use cables to receive and send messages.
  2. device used to emit or receive radio waves.
  3. global network of computer networks that allow the free exchange of information among all its users.
  4. enables data transmission between computers communicating over a basic telephone line or other data lines.
  5. links computers that are in a small physical space, such as an office or building.

11 Clues: device used to emit or receive radio waves.it does not use cables to receive and send messages.is a device that offers a Wi-Fi connection, which is usually connected to a modemlinks computers that are in a small physical space, such as an office or building.it is a type of twisted pair cable and can run CDDI and can transmit data at 100Mbps....

TTL 2021-08-24

TTL crossword puzzle
Across
  1. using more than one medium of expression or communication
  2. is an online journal where posted information from teachers and students are arranged
  3. a massive network of networks; a networking infrastructure
  4. is an episodic series of spoken word digital audio files that a user can download to a personal device for easy listening
  5. used in application of knowledge
Down
  1. programs and other operating information used by a computer
  2. the overall process of invention, innovation and diffusion of technology or processes
  3. refers to the proficiency in applying technological resources to achieve instructional goals in a given teaching
  4. a small mechanical or electronic device or tool, especially an ingenious or novel one
  5. an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web
  6. is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users

11 Clues: used in application of knowledgeusing more than one medium of expression or communicationa massive network of networks; a networking infrastructureprograms and other operating information used by a computerthe overall process of invention, innovation and diffusion of technology or processes...

Hardware Vocabulary 2023-03-06

Hardware Vocabulary crossword puzzle
Across
  1. A computer hardware component that connects a computer to a computer network.
  2. A network security device that monitors and filters incoming and outgoing network traffic.
  3. Used to connect a LAN to another LAN.
  4. A device that forwards data packets to the appropriate parts of a computer network.
  5. A hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa.
  6. Required if there are multiple wired connections on the network.
Down
  1. A box that connects your home network to your internet service provider, or ISP.
  2. Provides you with a digital connection that allows you to communicate by using any combination of voice, data, and video, among other multimedia applications.
  3. A computer that sits between different networks or applications.
  4. A networking hardware device that allows other Wi-Fi devices to connect to a wired network.
  5. A combination transmitter/receiver in a single package.

11 Clues: Used to connect a LAN to another LAN.A combination transmitter/receiver in a single package.A computer that sits between different networks or applications.Required if there are multiple wired connections on the network.A computer hardware component that connects a computer to a computer network....

Network 2018-02-20

Network crossword puzzle
Across
  1. Address How your device can be located
  2. designed for end-users, to access resources such as files, songs, video collections, or some other service
  3. Service Provider an organization that provides services for accessing, using, the Internet
  4. the arrangement of the various elements of a computer network.
  5. a computer that provides other computers access as to shared peripherals, programs, or databases
Down
  1. a combination of wireless and fidelity, is defined as a wireless local network that uses radio waves to connect to the Internet
  2. a type of cable wiring used in telecommunications that relays data from individual computers to a larger network mainframe.
  3. a bundle of data transmitted as a unit
  4. Name Server a naming system for computers, services, or any resource connected to the Internet or a private network.
  5. formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network
  6. a networking device that forwards data packets between computer networks.

11 Clues: Address How your device can be locateda bundle of data transmitted as a unitthe arrangement of the various elements of a computer network.a networking device that forwards data packets between computer networks.Service Provider an organization that provides services for accessing, using, the Internet...

IEM January Social Media Crossword Puzzle 2022-01-30

IEM January Social Media Crossword Puzzle crossword puzzle
Across
  1. When you get emails, texts, or calls that seem to be from companies you know.
  2. Who said, “We must use time creatively, in the knowledge that the time is always ripe to do right.”
  3. IEMer appointed by President Biden to FEMA Assistant Administrator, Grants, Resilience (last name)
  4. A new _____ outlining available federal resources to help Puerto Rico recover, rebuild, and modernize its infrastructure has been released by the U.S. Department of Homeland Security and the U.S. Department of Education.
  5. National _____ _____ appreciation day is where we thank the people who protect and serve our communities.
  6. Applications for FEMA’s Youth _____ Council is open.
Down
  1. National ____ Day is where we thank those administering vaccines to combat the coronavirus and provide lifesaving medication to our communities.
  2. At IEM, we are dedicated to serving our ____ to help build a more resilient world.
  3. Home Office Safety and Security week emphasizes the importance of securing home networks to ____ cyber threats.
  4. On January 11th we wear what color to bring awareness to human trafficking?
  5. 1985 was the year IEM was _______.

11 Clues: 1985 was the year IEM was _______.Applications for FEMA’s Youth _____ Council is open.On January 11th we wear what color to bring awareness to human trafficking?When you get emails, texts, or calls that seem to be from companies you know.At IEM, we are dedicated to serving our ____ to help build a more resilient world....

CS486 - Introduction to Neural Networks and Deep Learning -Minor Test 2023-11-16

CS486 - Introduction to Neural Networks and Deep Learning -Minor Test crossword puzzle
Across
  1. No of class labels in ImageNet
  2. Determines the direction of next step in CNN
  3. Activation function used for Binary Class classification
  4. Activation function that Squashes the input to 1 to -1
  5. Unsupervised Learning rule in ANN
  6. No of convolution layers in VGG16
  7. Converts stimulus from the human body
  8. Loss function used for classification
  9. Algorithm used for Hyperparameter optimization
Down
  1. Squashes the Input data to +1/2 to -1/2
  2. Neural network model that uses linear activation function
  3. Gate used to keep information from previous step in LSTM
  4. can be done through many-to-one RNN model
  5. Trainable Parameters in LSTM
  6. Fundamental unit of a neural network
  7. determines the depth of the convoluted image in CNN
  8. Increase/ Decrease the net input of the activation function
  9. GATE is a linearly inseparable data
  10. Trainable Parameters in Vanilla RNN
  11. No of trainable parameters in ANN

20 Clues: Trainable Parameters in LSTMNo of class labels in ImageNetUnsupervised Learning rule in ANNNo of convolution layers in VGG16No of trainable parameters in ANNGATE is a linearly inseparable dataTrainable Parameters in Vanilla RNNFundamental unit of a neural networkConverts stimulus from the human bodyLoss function used for classification...

ICT outcomes 2016-10-31

ICT outcomes crossword puzzle
Across
  1. is a social networking site designed specifically for the business community. The goal of the site is to allow registered members to establish and document networks of people they know and trust professionally
  2. is a digital media file that is downloaded directly from a streaming Internet source. They are distributed on the Internet using syndication feeds, or free use websites
  3. is information stored on a computer that is exchanged between two users over telecommunications. More plainly, e-mail is a message that may contain text, files, images, or other attachments sent through a network to a specified individual or group of individuals. The first e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent than postal mail.
Down
  1. is a collection of web pages (documents that are accessed through the Internet), such as the one you're looking at now. A web page is what you see on the screen when you type in a web address, click on a link, or put a query in a search engine. A web page can contain any type of information, and can include text, color, graphics, animation and sound.
  2. is defined as a group of two or more computer systems linked together. There are many types of computer networks
  3. online is talking to other people who are using the Internet at the same time you are.
  4. is a frequently updated online personal journal or diary. It is a place to express yourself to the world. A place to share your thoughts and your passions.

7 Clues: online is talking to other people who are using the Internet at the same time you are.is defined as a group of two or more computer systems linked together. There are many types of computer networks...

Computer Components 2025-04-01

Computer Components crossword puzzle
Across
  1. A router is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.
  2. a kind of memory that retains data in the absence of a power supply.
  3. Random-access memory is a form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
  4. The Central Processing Unit (CPU) is the primary component of a computer that acts as its “control center.” The CPU, also referred to as the “central” or “main” processor, is a complex set of electronic circuitry that runs the machine's operating system and apps.
  5. A computer mouse is a hand-held pointing device that detects two-dimensional motion relative to a surface.
  6. A motherboard is a computer's main circuit board that connects all of its internal components. It allows these components to communicate and function together.
  7. A computer speaker is a piece of hardware attached to a computer system used to produce sound. The computer's sound card has the signal used to generate the sound from a computer speaker.
  8. A power supply unit converts mains AC to low-voltage regulated DC power for the internal components of a desktop computer.
  9. A monitor is an electronic output device used to display information being entered and processed on a computer. The primary use of a monitor is to display images, text, video, and graphics information generated by the computer via a computer's video card.
  10. Cache memory is a type of data storage used to store frequently accessed information for faster response time.
Down
  1. A computer peripheral, also known as a peripheral device, is an external device that connects to a computer to expand its capabilities. Peripheral devices are not essential to the functioning of a computer, but they enhance its functionality.
  2. a panel of keys that operate a computer or typewriter.
  3. Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks.
  4. A solid-state drive is a type of solid-state storage device that uses integrated circuits to store data persistently.
  5. a device for examining, reading, or monitoring something.
  6. A graphics processing unit is a specialized electronic circuit initially designed for digital image processing and to accelerate computer graphics, being present either as a discrete video card or embedded on motherboards, mobile phones, personal
  7. A hard drive in a computer is an internal or external device that stores data such as operating systems, applications and user files.
  8. A printer is a device that prints documents and images onto paper or other materials. It is usually connected to a computer, allowing you to use your word processor, spreadsheets, and other programs to create documents and images that are printed out on the printer.
  9. (Read-Only Memory) Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.

19 Clues: a panel of keys that operate a computer or typewriter.a device for examining, reading, or monitoring something.a kind of memory that retains data in the absence of a power supply.A computer mouse is a hand-held pointing device that detects two-dimensional motion relative to a surface....

Products and Promotions 2018-05-24

Products and Promotions crossword puzzle
Across
  1. Customers on older postpaid plans get charged JMD$10 per mbs when they exhaust their data.
  2. This the cost needed to convert from a postpaid to prepaid account.
  3. This product allows for customers to call numbers in USA, Can, China & India (cell phone & landline) Spain and UK (landline only).
  4. This plan allows to call Digicel, Lime and Flow for JMD$6.50 before TCT.
Down
  1. 1GB data to use between 11:00PM- 6:00AM FOR JMD$20.
  2. Postpaid plan charges JMD$5000tax each month as a subscription fee, 10GB data,unlimited calls to both local networks and on net SMS.
  3. Allows you to change the dial tone to your favourite song for only JMD$50 per month.
  4. Broadband plan costs JMD$1400.
  5. This roaming plan cost $350, gives 50mbs data, incoming calls and SMS free and outgoing at JA rates.

9 Clues: Broadband plan costs JMD$1400.1GB data to use between 11:00PM- 6:00AM FOR JMD$20.This the cost needed to convert from a postpaid to prepaid account.This plan allows to call Digicel, Lime and Flow for JMD$6.50 before TCT.Allows you to change the dial tone to your favourite song for only JMD$50 per month....

Consequences of uses of computing definitions 2025-01-28

Consequences of uses of computing definitions crossword puzzle
Across
  1. The use of data, networks, applications or any computer system without permission or for unintended purposes.
  2. The issues with the potential to help or harm others or oneself, that conflict with an individual’s own principles of right and wrong.
  3. A set of rules that individuals of an organisation voluntarily follow in their day to day work and behaviour.
  4. The issues conflicting with laws and legislature passed by the Government.
Down
  1. Any information related to an identifiable person.
  2. The unauthorised or unlawful use of data.
  3. An exclusive and assignable right of legal ownership given to the creator of a piece of content (digital, physical or intellectual) for a fixed period of time.
  4. The issues conflicting with the principles, customs or social behaviour of people belonging to a particular segment of society.
  5. The issues conflicting with the principles by which a society functions.

9 Clues: The unauthorised or unlawful use of data.Any information related to an identifiable person.The issues conflicting with the principles by which a society functions.The issues conflicting with laws and legislature passed by the Government.The use of data, networks, applications or any computer system without permission or for unintended purposes....

COMPUTER FRAUD AND ABUSE TECNIQUES 2024-04-15

COMPUTER FRAUD AND ABUSE TECNIQUES crossword puzzle
Across
  1. A segment of self-replicating, executable code that attaches itself to a file or program.
  2. Capture data from information packets as they travel over networks. Captured data are examined to find confidential or proprietary information.
  3. Stealing contact lists, images, and other data using flaws in bluetooth applications
  4. Copies itself automatically and actively transmits itself directly
Down
  1. Taking control of someone else's phone to make or listen to calls
  2. Conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system and other programs.
  3. Hides data files inside a host file, such as a large image or sound file.
  4. Once triggered, the bomb goes off, destroying programs, data, or both. It also known as logic bomb.
  5. Set of computer instructions that allows a user to bypass the system’s normal controls. Anyone who discover it can enter the program.

9 Clues: Taking control of someone else's phone to make or listen to callsCopies itself automatically and actively transmits itself directlyHides data files inside a host file, such as a large image or sound file.Stealing contact lists, images, and other data using flaws in bluetooth applications...

SECURITY AND PRIVACY 2022-05-03

SECURITY AND PRIVACY crossword puzzle
Across
  1. type of customer information
  2. users are relieved from burden of data storage and maintenance.
  3. A sequence of stages that a particular unit of data goes through from its initial generation or capture to its eventual archival or deletion at the end of its useful life.
  4. How many security accounts per client is provided by Microsoft?
  5. How many phases of data life cycle are there?
Down
  1. A set of strategies designed to allow a business to use cloud applications and networks to their greatest potential while limiting potential threats and vulnerabilities.
  2. Allows collecting, storing, transferring and sharing the data over the cloud without putting the privacy of personal data at a risk.
  3. Services that deliver agreed levels of availability to meet the needs of customers and users.
  4. The process of transforming or encoding data before it's moved to cloud storage.

9 Clues: type of customer informationHow many phases of data life cycle are there?users are relieved from burden of data storage and maintenance.How many security accounts per client is provided by Microsoft?The process of transforming or encoding data before it's moved to cloud storage....

SECURITY AND PRIVACY 2022-05-03

SECURITY AND PRIVACY crossword puzzle
Across
  1. type of customer information
  2. users are relieved from burden of data storage and maintenance.
  3. A sequence of stages that a particular unit of data goes through from its initial generation or capture to its eventual archival or deletion at the end of its useful life.
  4. How many security accounts per client is provided by Microsoft?
  5. How many phases of data life cycle are there?
Down
  1. A set of strategies designed to allow a business to use cloud applications and networks to their greatest potential while limiting potential threats and vulnerabilities.
  2. Allows collecting, storing, transferring and sharing the data over the cloud without putting the privacy of personal data at a risk.
  3. Services that deliver agreed levels of availability to meet the needs of customers and users.
  4. The process of transforming or encoding data before it's moved to cloud storage.

9 Clues: type of customer informationHow many phases of data life cycle are there?users are relieved from burden of data storage and maintenance.How many security accounts per client is provided by Microsoft?The process of transforming or encoding data before it's moved to cloud storage....

Vocab 2023-09-06

Vocab crossword puzzle
Across
  1. the state of the natural environment of a place at a given time, such as pollution, erosion, deforestation, depopulation, climate, glaciation, and desertification
  2. a firsthand, or eyewitness, account or original object or document from the past
Down
  1. the meaning of a passage or text as the original author would have intended and what the original hearers or readers would have understood
  2. the development of international systems of exchange that result in networks of trade and communications, the cultural and political exchange
  3. an account or summary of an event based on the study of one or more primary sources; a secondhand account of an event
  4. the study of past event
  5. the study of the physical and human features of the earth
  6. a one-sided point of view
  7. cultivating a heart that desires to what is good and right all the time

9 Clues: the study of past eventa one-sided point of viewthe study of the physical and human features of the earthcultivating a heart that desires to what is good and right all the timea firsthand, or eyewitness, account or original object or document from the past...

Education 2023-10-09

Education crossword puzzle
Across
  1. Providing support and guidance to students as they develop their skills and understanding.
  2. A theory that focuses on the unique characteristics and needs of adult learners.
  3. A learning theory that emphasizes observable behaviors and the use of rewards and punishments to shape behavior.
  4. A theory that emphasizes learning in the digital age, where learners connect to resources and networks to acquire knowledge.
Down
  1. The strategies and techniques used by teachers to create a productive and orderly learning environment.
  2. The art and science of teaching, including instructional methods and strategies.
  3. A teaching approach that involves students in activities that require them to actively participate and engage in the learning process.
  4. A theory that posits learners actively construct knowledge based on their experiences.
  5. A student who has completed their undergraduate studies and is pursuing an advanced degree, such as a master's or doctoral degree.

9 Clues: The art and science of teaching, including instructional methods and strategies.A theory that focuses on the unique characteristics and needs of adult learners.A theory that posits learners actively construct knowledge based on their experiences.Providing support and guidance to students as they develop their skills and understanding....

ml 2023-10-08

ml crossword puzzle
Across
  1. A popular clustering algorithm that groups examples in unsupervised learning
  2. Creating a model that matches the training data so closely that the model fails to make correct predictions on new data-
  3. The primary algorithm for performing gradient descent on neural networks
  4. The primary algorithm for performing gradient descent on neural networks
  5. an ensemble learning method for classification, regression and other tasks that operates by constructing a multitude of decision trees at training time-
Down
  1. a basic unit of a data structure, such as a linked list or tree data structure
  2. A process used, as part of training, to evaluate the quality of a machine learning
  3. The model correctly predicted the positive class
  4. The fraction of predictions that a classification model got right
  5. a term used to refer to data sets that are too large or complex for traditional data-processing application software to adequately deal with

10 Clues: The model correctly predicted the positive classThe fraction of predictions that a classification model got rightThe primary algorithm for performing gradient descent on neural networksThe primary algorithm for performing gradient descent on neural networksA popular clustering algorithm that groups examples in unsupervised learning...

African American History: 18th Century Crossword 2025-02-04

African American History: 18th Century Crossword crossword puzzle
Across
  1. A religion that many enslaved Africans practiced, often blending African spiritual traditions with Christianity.
  2. The first published African American writer in the U.S., known for his religious poetry.
  3. A rebellion in 1739 where enslaved people in South Carolina attempted to escape to Spanish Florida for freedom.
  4. A major cash crop in the Southern colonies that relied heavily on enslaved African labor.
  5. The transatlantic trade route that forcibly transported enslaved Africans to the Americas.
  6. The colony that passed one of the first laws making slavery a lifelong condition in 1662, setting a precedent for the 18th century.
Down
  1. The secret networks and communities enslaved people formed to preserve their culture and traditions.
  2. The form of oral tradition that enslaved Africans used to pass down history, wisdom, and resistance strategies.
  3. The first African American woman to publish a book of poetry in 1773.

9 Clues: The first African American woman to publish a book of poetry in 1773.The first published African American writer in the U.S., known for his religious poetry.A major cash crop in the Southern colonies that relied heavily on enslaved African labor.The transatlantic trade route that forcibly transported enslaved Africans to the Americas....

[P4] Signal Theory 2013-12-19

[P4] Signal Theory crossword puzzle
Across
  1. What type of signal is MP3 audio and is fault tolerant?
  2. What sort of signal are based on the same clock rate?
  3. What sort of data is machine readable (lowest communication) and can be used to calculate the ASCII character set?
  4. What signal communication is one direction only and is used in TVs?
  5. What uses telephone calls and communicates in both directions at the same time?
Down
  1. What type of data is handled on the network layer and is sent to other devices ? Clue: It can be referred to as datagrams
  2. What is the maximum data transfer rate for networks and can be measured in Mbps or Gbps?
  3. What is a chunk of data that is created from network devices (e.g. NIC) that contains addresses, delimiters and data encapsulation?
  4. What signal is transmitted at a different CPU clock rate than another signal?
  5. What signal communication is in both directions but goes from one place at a time?
  6. What sort of signal do Modems transmit?

11 Clues: What sort of signal do Modems transmit?What sort of signal are based on the same clock rate?What type of signal is MP3 audio and is fault tolerant?What signal communication is one direction only and is used in TVs?What signal is transmitted at a different CPU clock rate than another signal?...

[P4] Signal Theory 2013-12-17

[P4] Signal Theory crossword puzzle
Across
  1. What sort of data is machine readable (lowest communication) and can be used to calculate the ASCII character set?
  2. What signal is transmitted at a different CPU clock rate than another signal?
  3. What type of signal is MP3 audio and is fault tolerant?
  4. What signal communication is in both directions but goes from one place at a time?
  5. What signal communication is one direction only and is used in TVs?
Down
  1. What is the maximum data transfer rate for networks and can be measured in Mbps or Gbps?
  2. What sort of signal are based on the same clock rate?
  3. What is a chunk of data that is created from network devices (e.g. NIC) that contains addresses, delimiters and data encapsulation?
  4. What uses telephone calls and communicates in both directions at the same time?
  5. What sort of signal do Modems transmit?
  6. What type of data is handled on the network layer and is sent to other devices ? Clue: It can be referred to as datagrams

11 Clues: What sort of signal do Modems transmit?What sort of signal are based on the same clock rate?What type of signal is MP3 audio and is fault tolerant?What signal communication is one direction only and is used in TVs?What signal is transmitted at a different CPU clock rate than another signal?...

[P4] Signal Theory 2013-12-17

[P4] Signal Theory crossword puzzle
Across
  1. What type of signal is MP3 audio and is fault tolerant?
  2. What is the maximum data transfer rate for networks and can be measured in Mbps or Gbps?
  3. What sort of signal are based on the same clock rate?
  4. What sort of signal do Modems transmit?
  5. What uses telephone calls and communicates in both directions at the same time?
Down
  1. What type of data is handled on the network layer and is sent to other devices ? Clue: It can be referred to as datagrams
  2. What sort of data is machine readable (lowest communication) and can be used to calculate the ASCII character set?
  3. What signal communication is in both directions but goes from one place at a time?
  4. What signal is transmitted at a different CPU clock rate than another signal?
  5. What is a chunk of data that is created from network devices (e.g. NIC) that contains addresses, delimiters and data encapsulation?
  6. What signal communication is one direction only and is used in TVs?

11 Clues: What sort of signal do Modems transmit?What sort of signal are based on the same clock rate?What type of signal is MP3 audio and is fault tolerant?What signal communication is one direction only and is used in TVs?What signal is transmitted at a different CPU clock rate than another signal?...

IT & Communication 2014-06-16

IT & Communication crossword puzzle
Across
  1. Online discussion site where people can hold conversations via posted messages.
  2. Technology that allows participants in different locations to communicate with each other in sound only.
  3. System that allows callers to leave recorded messages for you over the telephone.
  4. A schedule kept on a computer.
  5. System for sending and receiving printed materials (such as documents and drawings) and photographs using telephone lines.
  6. Global computer network providing a variety of information and communication facilities, consisting of interconnected networks.
Down
  1. Video camera that feeds or streams its image in real time to or through a computer to computer network.
  2. Messages (like letters) distributed by electronic means from one computer user to one or more recipients.
  3. Online chat which offers real-time text transmission over the Internet.
  4. List of names and addresses of people to whom advertising matter, information, or other material may be mailed regularly.
  5. Technology that allows participants in different locations to communicate with each other in sound and vision.

11 Clues: A schedule kept on a computer.Online chat which offers real-time text transmission over the Internet.Online discussion site where people can hold conversations via posted messages.System that allows callers to leave recorded messages for you over the telephone....

Family Assessment 2022-03-29

Family Assessment crossword puzzle
Across
  1. After constructing the social network map, clients can be asked to then fill out what?
  2. different ways in which people offer assistance to one another. (provided spontaneously through networks of family and friends, can be provided through a helping network or agency)
  3. we should always recognize the effects of _______ factors on family and child functioning.
  4. Used frequently to identify who is in the family, and what role important family members play.
  5. families consist of two or more people who depend on each other. this makes families _______
Down
  1. you should always begin with this.
  2. the family is seen as an organism that is more than the sum of its parts.
  3. the structure and quantity of a set of interconnected relationships
  4. families are not________. Meaning each family will be unique.
  5. When this is held in the home, it can give the social worker a perspective on family function in its own environment.
  6. families develop this when they have positive experiences coping with environmental stressors and demands.

11 Clues: you should always begin with this.families are not________. Meaning each family will be unique.the structure and quantity of a set of interconnected relationshipsthe family is seen as an organism that is more than the sum of its parts.After constructing the social network map, clients can be asked to then fill out what?...

AP Micro - 12/16 - 2 2021-12-17

AP Micro - 12/16 - 2 crossword puzzle
Across
  1. a buyer and seller exchange goods or services for money or other goods or services
  2. losses associated with quantities of output that are greater than or less than the efficient level
  3. someone can consume a good but as a result others cant
  4. a taxpayer pays higher taxes if they earn more income and lower taxes if they earns less
Down
  1. a good that is both excludable (can prevent people from buying) and rival (can only be possessed or consumed by a single user) in consumption
  2. determining how a resource or economic good is used and owned
  3. external cost or benefit that is placed on members of society who did not participate in market transaction
  4. a tax placed only on specific goods being imported into a country
  5. it is costly or impossible for one user to exclude others from using a good
  6. networks of relationships between people in society that allows the society to function effectively
  7. the public good is funded by a proportional income tax

11 Clues: someone can consume a good but as a result others cantthe public good is funded by a proportional income taxdetermining how a resource or economic good is used and owneda tax placed only on specific goods being imported into a countryit is costly or impossible for one user to exclude others from using a good...

The Internet 2021-12-01

The Internet crossword puzzle
Across
  1. a multiple data channel system in which the bandwidth of the transmission medium carries several data streams at the same time.
  2. a server that contains domain names and associated IP addresses
  3. a model of software deployment where an application is hosted as a service provided to customers across the internet.
  4. a global wide area network that is formed from the interconnection of many other networks and that uses the TCP/IP protocol.
  5. the recognisable name of a domain on the Internet.
  6. organisations who allocate and administer domain names and IP addresses.
Down
  1. an application for viewing web pages.
  2. a method for identifying the location of resources (e.g. websites) on the Internet
  3. a system of connected domain name servers that provides the IP address of every website on the Internet.
  4. one of five large organisations that allocate and administer domain names and IP addresses in different parts of the world.
  5. a dedicated computer on a network for handling web content.
  6. a global network of networks.

12 Clues: a global network of networks.an application for viewing web pages.the recognisable name of a domain on the Internet.a dedicated computer on a network for handling web content.a server that contains domain names and associated IP addressesorganisations who allocate and administer domain names and IP addresses....

Computer science 2022-03-19

Computer science crossword puzzle
Across
  1. it is connected to a computer network that uses the internet protocol for communication
  2. is a family of wired computer network technologies commonly used in local area networks
  3. it consists of control of control information and user data
  4. is the naming system used to identify computers, services and other reachable through the internet
  5. the time delay between the cause and the effect of some physical change in the system being observed
Down
  1. is the radio signal sent from a wireless router to a nearby devise
  2. rate is the resending of packets which have been either damaged or lost
  3. rate the radio of the number of units of data to the total numbers of units of data transmitted
  4. it establishes the set of rules that determine how data is transmitted between different devices in the same network
  5. is the maximum rate of data transfer across a given path
  6. it occurs when two or more sets of data are modified and produce the same resulting value

11 Clues: is the maximum rate of data transfer across a given pathit consists of control of control information and user datais the radio signal sent from a wireless router to a nearby deviserate is the resending of packets which have been either damaged or lostit is connected to a computer network that uses the internet protocol for communication...

Globalisation 2013-08-07

Globalisation crossword puzzle
Across
  1. / a vast computer network linking smaller computer networks worldwide
  2. / it is is the making, modification, usage, and knowledge of tools, machines, techniques, crafts, systems, in order to solve a problem, improve a preexisting solution to a problem, achieve a goal, handle an applied input/output relation or perform a specific function
  3. / it is travel for recreational, leisure, or business purposes
  4. / the surroundings or conditions in which a person, animal, or plant lives or operates.
  5. / it consists of the economic system in a certain region, comprising the production, distribution or trade, and consumption of goods and services in that region or country
  6. / a report of a recent event
Down
  1. / the arts and other manifestations of human intellectual achievement regarded collectively
  2. / In the context of spaceflight, it is an artificial object which has been intentionally placed into orbit
  3. / The imparting or exchanging of information or news
  4. / take or carry people or goods from one place to another by means of a vehicle
  5. / buying and selling goods and services

11 Clues: / a report of a recent event/ buying and selling goods and services/ The imparting or exchanging of information or news/ it is travel for recreational, leisure, or business purposes/ a vast computer network linking smaller computer networks worldwide/ take or carry people or goods from one place to another by means of a vehicle...

Per 2 Chapter 11 - A, Hernandz 2023-03-17

Per 2 Chapter 11 - A, Hernandz crossword puzzle
Across
  1. a method used on Android devices for removing restrictions and protections added to mobile operating systems
  2. a method for removing restrictions and protections added to mobile operating systems, but typically on iOS devices
  3. an open source, Linux based smartphone/tablet operating system
  4. making phone calls using Wi-Fi networks
  5. a location of the OS that keeps code isolated from other resources and other code
Down
  1. a cloud service developed by Google to provide file storage and synchronization service
  2. a family of free and open-source software operating systems based on an operating system kernel
  3. a file hosting service and synchronization service operated by Microsoft
  4. a closed source Unix based operating system for smartphones and tablets made by Apple
  5. a private network established through a public network to remote sites
  6. a navigation system that determines the time and geographical location of the device by using messages from satellites in space and a receiver located on the device

11 Clues: making phone calls using Wi-Fi networksan open source, Linux based smartphone/tablet operating systema private network established through a public network to remote sitesa file hosting service and synchronization service operated by Microsofta location of the OS that keeps code isolated from other resources and other code...

Networking 2023-05-01

Networking crossword puzzle
Across
  1. an established set of rules that determine how data is transmitted between different devices in the same network
  2. the process of converting information or data into a code, especially to prevent unauthorised access.
  3. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  4. a unique string of characters that identifies each computer using the Internet Protocol to communicate over a network.
Down
  1. the physical and logical arrangement of nodes and connections in a network.
  2. a desktop computer or workstation that is capable of obtaining information and applications from a server.
  3. a series of computers linked together to form a network in a circumscribed location.
  4. a computer program or device that provides a service to another computer program and its user, also known as the client
  5. a virtual point where network connections start and end.
  6. protect (a network or system) from unauthorized access with a firewall.
  7. someone who can make changes on a computer that will affect other users of the computer

11 Clues: a virtual point where network connections start and end.protect (a network or system) from unauthorized access with a firewall.the physical and logical arrangement of nodes and connections in a network.a series of computers linked together to form a network in a circumscribed location....

crossHR 2021-09-19

crossHR crossword puzzle
Across
  1. Amount subtracted from gross pay
  2. Acknowledgement of employees performance or achievements
  3. The ______ contract refers to the unwritten, intangible agreement between an employee and their employer that describes the informal commitments, expectations and understandings that make up their relationship
  4. Job _____ is a detailed description of the role, including all responsibilities, objectives and requirements
  5. The _____ act prescribes the basic rights and interests of the workers, and the guarantee to provide them with basic amenities like proper sanitation, ventilated work space, safety for using machinery etc.
  6. _______ is an incentive that motivates employees to recruit candidates from within their networks
  7. _______ framework is a means by which organizations communicate which behaviours are required, valued, recognized and rewarded with respect to specific occupational roles
Down
  1. Employee _____ Form is a formal document that department managers use to request the hiring of the new employees
  2. Evaluation of employees’ current and potential levels of performance for managers to make objective human resources decisions
  3. Sexual Harassment (Prevention, Prohibition and Redressal) Act, 2013 requires the formation of an Internal ______ Committee
  4. bonus

11 Clues: bonusAmount subtracted from gross payAcknowledgement of employees performance or achievementsJob _____ is a detailed description of the role, including all responsibilities, objectives and requirements_______ is an incentive that motivates employees to recruit candidates from within their networks...

TFC Puzzle! 2022-08-20

TFC Puzzle! crossword puzzle
Across
  1. The amount a beneficiary pays for covered outpatient services before TRICARE can share the cost of services
  2. The most a beneficiary pays out-of-pocket each calendar year for TRICARE-covered services or supplies
  3. Beneficiaries whose sponsor initially enlisted before January 1, 2018
  4. This type of beneficiary CAN'T be enrolled in a TRICARE Select plan
  5. Database which lists benefit and eligibility information for uniformed service members, and others as deemed eligible by the DoD
Down
  1. Care and pharmacy services ONLY at a military hospital or clinic
  2. A change in a beneficiary's situation or status (such as getting married)
  3. This is a TRICARE Prime option available through networks of community-based systems in six areas of the U.S.
  4. This provider signs a contractual agreement with the regional contractor
  5. This is the amount ADSMs and family pay for TRICARE Prime enrollment
  6. This option allows TRICARE Prime enrollees get non-emergency care from any TRICARE-authorized or overseas provider without a referral, but at higher cost

11 Clues: Care and pharmacy services ONLY at a military hospital or clinicThis type of beneficiary CAN'T be enrolled in a TRICARE Select planThis is the amount ADSMs and family pay for TRICARE Prime enrollmentBeneficiaries whose sponsor initially enlisted before January 1, 2018This provider signs a contractual agreement with the regional contractor...

Dynamics of Leadership 2018-05-01

Dynamics of Leadership crossword puzzle
Across
  1. The ability to regulate and redirect one´s own impulses, moods, and desires.
  2. The ability to recognize and understand your moods, emotions, drives, and the impact on others.
  3. Individuals that have an unshakable belief in their mission, are supremely confident that they and their followers can succeed.
  4. The ability to understand emotions of other people, and the skill to treat people according to their emotional reactions.
  5. Process that involves directing, controlling, and modifying their subordinates.
Down
  1. The leader provides clear instructions, gives specific directions, and supervises the work closely.
  2. Using two-way communication, listening, encouraging, and involving followers in decision making, and giving emotional support.
  3. A subordinate’s ability to set high but attainable goals and a willingness to accept responsibility for reaching them.
  4. The ability to build interpersonal networks, manage relationships, find common ground, and build rapport.
  5. Influencing others to act toward the attainment of a goal.
  6. Includes using one-way communication, spelling duties, and telling followers what to do and where, when, and how to do it.

11 Clues: Influencing others to act toward the attainment of a goal.The ability to regulate and redirect one´s own impulses, moods, and desires.Process that involves directing, controlling, and modifying their subordinates.The ability to recognize and understand your moods, emotions, drives, and the impact on others....

System Security 2018-06-08

System Security crossword puzzle
Across
  1. A suite of technologies that can identify unauthorised users of a computer system (7,9)
  2. Software whose purpose is to remove harmful software from your system (4-7)
  3. The process of scrambling data so it can be sent securely over networks (10)
  4. Checking for weaknesses in your own system before a hacker finds them (11,7)
  5. Repeatedly accessing a website in order to prevent genuine users from accessing it (6,2,7)
  6. A generic term to describe any piece of software that is harmful to your computer (7)
  7. A means of hacking that tries every possible password in quick succession (5,5)
Down
  1. Hardware- or software-based security which controls incoming and outgoing network traffic based on a set of rules (8)
  2. When used alongside passwords, these can control what individual users can see and do on a computer system (4,6,6)
  3. The act of gathering information by spoofing trustworthy websites for malicious intent (8)
  4. A set of rules that govern how a network is managed and used (7,8)

11 Clues: A set of rules that govern how a network is managed and used (7,8)Software whose purpose is to remove harmful software from your system (4-7)The process of scrambling data so it can be sent securely over networks (10)Checking for weaknesses in your own system before a hacker finds them (11,7)...

Multiculturalism 2023-11-19

Multiculturalism crossword puzzle
Across
  1. The coexistence of different cultures in harmony, like a beautiful mosaic."
  2. The Maori New Year, an example of cultural diversity in New Zealand's education."
  3. The process of moving from one country to another, often for a new life or opportunities."
  4. (2 Words)This occurs when different cultures blend and create new, exciting elements, seen in food, music, and art."
  5. The peaceful coexistence of diverse groups, as seen in multicultural societies."
  6. Diverse cultural celebrations like Diwali, Christmas, and Eid, highlighting multiculturalism."
  7. (2 Words)A country known for its melting pot of cultures, including Pacific Islanders, Asians, Europeans, and the indigenous Maori."
Down
  1. A variety of unique elements, like different flowers in a garden, often seen in multicultural societies."
  2. Groups of people who build strong, supportive networks, especially in diverse societies
  3. A term describing the unique partnership between the Maori and European descendants in New Zealand."
  4. A benefit of multiculturalism, where individuals gain knowledge about different ways of living and thinking."

11 Clues: The coexistence of different cultures in harmony, like a beautiful mosaic."The peaceful coexistence of diverse groups, as seen in multicultural societies."The Maori New Year, an example of cultural diversity in New Zealand's education."Groups of people who build strong, supportive networks, especially in diverse societies...

Network Attacks 2025-09-09

Network Attacks crossword puzzle
Across
  1. A hidden access point in a system that bypasses normal authentication, often created by attackers or poorly secured software.
  2. Attack A method that exploits weaknesses in encryption algorithms or security protocols using advanced mathematical techniques.
  3. Software that automatically displays or downloads unwanted advertising, often bundled with free programs.
  4. Self-replicating malware that spreads across networks without user intervention.
  5. Malicious software disguised as legitimate programs to trick users into installing them.
  6. An attack where an intruder disguises their identity by faking IP addresses, emails, or websites to trick users or systems.
  7. Malicious tools that hide the presence of other malware and give attackers persistent administrative access to a system.
Down
  1. An attack that takes advantage of bugs or vulnerabilities in software to gain unauthorized access or control.
  2. A trial-and-error attack that systematically attempts all possible passwords or keys until the correct one is found.
  3. Malicious programs that attach to files or applications and spread when the infected files are executed.
  4. Software that secretly monitors and collects user activity or data without consent.

11 Clues: Self-replicating malware that spreads across networks without user intervention.Software that secretly monitors and collects user activity or data without consent.Malicious software disguised as legitimate programs to trick users into installing them....

Psychology Faculty 2026-04-14

Psychology Faculty crossword puzzle
Across
  1. Studies adolescent development and researchers social media networks
  2. The go-to person for anything and everything community psychology. This person leads fabulous study abroad trips to Argentina and can often be found with a coffee in hand.
  3. Examines cognitive aging and is a co-chair of the graduate program
  4. This “principal” member of the department and can be found teaching about neuroanatomy as well as undergraduate drugs and behavior. Loves playing the guitar.
  5. Has appointments at multiple universities and is an electric engineer by training
  6. Studies interpersonal violence and taught the psychopathology course
  7. Very invested in clinical psychology and teaches the psychotherapy class. Fun fact, this person loves Snowcaps (the candy).
Down
  1. Studies alcohol, aggression, and PTSD
  2. Studies decision making in primates and was the interim chair of the department
  3. This person studies eyewitness memory and jury decision making, among other areas
  4. Studies adult literacy and reading development. This person’s lab owns many (many many) WJ-IV flipbooks

11 Clues: Studies alcohol, aggression, and PTSDExamines cognitive aging and is a co-chair of the graduate programStudies adolescent development and researchers social media networksStudies interpersonal violence and taught the psychopathology courseStudies decision making in primates and was the interim chair of the department...

CYBERSPACE INVESTIGATION 2021-07-19

CYBERSPACE INVESTIGATION crossword puzzle
Across
  1. unlawful or prohibited acts of libel as defined in Article 355 of the Revised penal Code.
  2. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  3. cyber security body of knowledge.
  4. proof of identity is an essential component to identify intruder.
  5. alteration or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic.
  6. the interactional space or environment created by linking computers together into a communication network.
  7. any criminal activity that takes place within or by utilizing networks of electronic communication such as the Internet.
  8. alteration or deletion of computer data or program or interference in the functioning of a computer system.
  9. computer security
  10. malicious software programs which are infiltrated into computers disguised as benign applications or data.
  11. refers to a person who in behalf of another person and with respect to a particular electronic document sends receives and/or stores provides other services in respect of that electronic data message or electronic document.
  12. refers to listening to recording monitoring or surveillance of the content of communications.
  13. pieces of computer code that can infect computer system causing disruptions to their normal operation.
  14. visual or written representations of sexually explicit nature, whose primary aim or use is to stimulate sexual excitement.
  15. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  16. stalking that takes place via online communication mechanism such as email chat rooms, instant messaging, and discussion lists.
  17. publicly accessible network of computers that emerged in the 1970s and came to span the globe by the late 1990s.
  18. is an assurance that comes from a proactive and standard-based identification and detection and an integrated protection and
  19. open web application security project.
  20. a general term for a variety of computer codes.
  21. refers to the modification or change in form or substance of an existing computer data or program.
  22. refers to the transmission of information through ICT media.
  23. refers to a representation of information knowledge facts concepts or instructions which are being prepared processed or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system
Down
  1. the willful engagement,maintenance control or operation,directly or indirectly of any lascivious exhibition of sexual organs.
  2. a person infringes a right protected.
  3. those property rights associated with original expressions.
  4. varied threats.
  5. refers to the collection of tools policies risk management approaches actions training best practices assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
  6. criminal acts that tend to go largely unobserved.
  7. social, economic,political and cultural process in which local and national spatial limits on interaction are overcome,and thus come to span the globe.
  8. center for internet security.
  9. popular term for copyright violations-the unauthorized copying distribution or sale of informational goods over which some party claims to possess propriety rights.
  10. the fraudulent practice of establishing facsimiles or legitimate websites.
  11. the right to be left alone freedom from observation and interference from others.
  12. these can be used to store copies of files from the computer for use in his investigation.
  13. terrorist activity that targets computer networks and information systems for attack.
  14. techniques and tools associated with encoding or scrambling data.
  15. the practice of allowing others to make copies of files stored on a computer via downloading.
  16. means transferring or otherwise disposing of to another or obtaining control of with intent to transfer or dispose of.
  17. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  18. the act of copying digital material posted online into the storage medium on one’s computer.
  19. refers to a person who is intended by the originator to receive the electronic data message or electronic document.
  20. market economic activity undertaken via the internet or similar electronic communication networks.
  21. means natural person.
  22. the act of creative problem solving when faced with complex technical problems.
  23. generally derogatory term used to describe activities associated with hacking in its second sense, that of unauthorized access to computer systems.
  24. notoriously slippery term used to denote representations expressions or actions often of a sexual nature.
  25. political activism and social protest that uses hacking tools and techniques.
  26. surveillance that focuses not upon the visual or other tracking of the physical individual
  27. the term does not include a person acting as an intermediary with respect to that electronic document.
  28. refers to a computer or a computer network the electronic medium in which online communication takes place.

51 Clues: varied threats.computer securitymeans natural person.center for internet security.cyber security body of knowledge.a person infringes a right protected.open web application security project.a general term for a variety of computer codes.criminal acts that tend to go largely unobserved.those property rights associated with original expressions....

Cisco Chapter 1 Crossword 2020-09-24

Cisco Chapter 1 Crossword crossword puzzle
Across
  1. diagram Diagram of a network
  2. allows people to share files with each other without having to store and download them from a central server
  3. a mechanism to manage the flow of traffic based on different requirements to ensure reliable delivery of each type of traffic
  4. Something that helps people work together on a particular file or piece of software
  5. Identify devices, ports, and addressing scheme.
  6. An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is usually not sufficient for large data transfer, although it is useful for mobile access while traveling.
  7. Having multiple paths to a destination
  8. makes it possible for users to be free to use their personal devices to access a corporate or a campus network
  9. Hosts that request information
  10. Examples include copper, fiber and wireless
  11. Type of network provides access to users over a large geographical area
  12. Used by companies to provide suppliers, vendors, and customers limited access to corporate data to check order status, inventory, and parts lists
  13. identify the physical location of intermediary devices and cable installation.
  14. Type of network provides access to users over a small geographical area
  15. Type of network infrastructure is designed to support file servers and provide data storage, retrieval, and replication using high-end servers, multiple disk arrays and Fiber Channel interconnection technology
  16. Digital Subscriber Lines provide a high bandwidth, always on, connection to the Internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
  17. limits the impact of a failure, so that the fewest number of devices are affected.
  18. one that establishes a dedicated circuit between the source and destination before the users may communicate. If the call is unexpectedly terminated, the users must initiate a new connection.
  19. splits traffic into packets that are routed over a shared network. Helps create redundancy
  20. Applications can be accessed over the Internet through a subscription.
Down
  1. refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.
  2. capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
  3. A connector or outlet on a networking device where the media is connected to an end device or another networking device.
  4. Similar to a LAN but wirelessly interconnects users and end points in a small geographical area.
  5. Private networks in use by just one company
  6. Type of websites that gives anyone a means to communicate their personal thoughts to a global audience without technical knowledge of web design
  7. reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
  8. Provides the physical connection to the network at the PC or other host device
  9. The availability of satellite Internet access is a real benefit in those areas that would otherwise have no Internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
  10. Hosts that provide information
  11. Interactive websites where people create and share user-generated content with friends and family
  12. Examples include routers, switches and wireless access points
  13. Real-time communication between two or more people
  14. Specialized ports on a networking device that connect to individual networks. Because routers are used to interconnect networks, the ports on a router are referred to as network interfaces.
  15. Describes the state of a network when the demand on the network resources exceeds the available capacity
  16. uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular Internet access. Performance will be limited by the capabilities of the phone and the cell tower to which it is connected.
  17. available in various formats. A popular choice is Symmetric Digital Subscriber Lines (SDSL) which is similar to the consumer version of DSL, but provides uploads and downloads at the same speeds.
  18. Audio-based medium that allows people to deliver their recordings to a wide audience
  19. Typically offered by cable television service providers, the Internet data signal is carried on the same cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet.
  20. Web pages that groups of people can edit and view together
  21. Type of network infrastructure spans a physical area larger than a LAN but smaller than a WAN and is typically operated by a single entity such as a large organization

41 Clues: diagram Diagram of a networkHosts that provide informationHosts that request informationHaving multiple paths to a destinationPrivate networks in use by just one companyExamples include copper, fiber and wirelessIdentify devices, ports, and addressing scheme.Real-time communication between two or more people...

VA Hospital Week Crossword 2022-04-22

VA Hospital Week Crossword crossword puzzle
Across
  1. an institution providing medical and surgical treatment and nursing care for sick or injured people
  2. VISN number that covers the largest area, including Florida, south Georgia and the Caribbean
  3. VA architect, Walter H ____; hired to design a large 4-5 story hospital in 1946-1949
  4. Veterans Integrated Services Networks
  5. last name of the original designer of the 60 acre campus purchased in 1919 for the Catholic Diocese for Columbus College
Down
  1. Community Based Outpatient Clinic
  2. million Veteran's enrolled in the VA healthcare system that we help to serve each day! (rounded up)
  3. city in Maine that is near the 1st "National Home" and now VAs oldest hospital. This opened in 1966, and provided medical care and long-term housing for thousands of Veterans from the Civil War
  4. Texas city with the largest VA hospital in the US (hint: Michael E De Bakey VAMC)

9 Clues: Community Based Outpatient ClinicVeterans Integrated Services NetworksTexas city with the largest VA hospital in the US (hint: Michael E De Bakey VAMC)VA architect, Walter H ____; hired to design a large 4-5 story hospital in 1946-1949VISN number that covers the largest area, including Florida, south Georgia and the Caribbean...

Information Security Crossword 2017-01-13

Information Security Crossword crossword puzzle
Across
  1. A flaw or weakness that can be used to attack a system or organization
  2. A secret series of characters used to authenticate a person’s identity.
  3. An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
  4. A person who uses computers to gain unauthorized access to computer systems and networks.
  5. Personal information related to personal data stored on computer systems
  6. A situation or someone that can cause damage to the confidentiality, integrity, or availability of your data.
Down
  1. A type of malware that is often disguised as legitimate software.
  2. A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company
  3. Anything that has the potential to cause serious harm to a computer system.

9 Clues: A type of malware that is often disguised as legitimate software.A flaw or weakness that can be used to attack a system or organizationA secret series of characters used to authenticate a person’s identity.Personal information related to personal data stored on computer systems...

IDT Crossword puzzle 2022-09-30

IDT Crossword puzzle crossword puzzle
Across
  1. interconnected computing devices that can exchange data and share resources with each other.
  2. a computer that stores web server software and a website's component files
  3. provides a computer with a dedicated, full-time connection to a network.
Down
  1. is a collection of devices connected together in one physical location, such as a building, office, or home
  2. a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
  3. any of a class of electronic devices that convert digital data signals into modulated analog signals suitable for transmission over analog telecommunications circuits.
  4. a networking device that allows wireless-capable devices to connect to a wired network
  5. is a high-speed device that receives incoming data packets and redirects them to their destination on a local area network
  6. receives and sends data on computer networks

9 Clues: receives and sends data on computer networksprovides a computer with a dedicated, full-time connection to a network.a computer that stores web server software and a website's component filesa networking device that allows wireless-capable devices to connect to a wired network...

computor crossword 2022-05-03

computor crossword crossword puzzle
Across
  1. If the linear component is a segment, the distance is first calculated between the line of the segment and the curve.
  2. The part of a network that handles the major traffic. computer traffic is the total volume of packet of data carried over a circuit or network or other system.
  3. the technology that allows a PC, or any device to connect at high speed to the internet without the need for a physical wired connection
  4. a device, usually electronic, that processes data according to a set of instructions.
  5. a system of computation which provides centralized services to a network of computers.
Down
  1. electronic devices used to store data,
  2. a piece of equipment which allows access to other computers or networks
  3. a thing made or adapted for a particular purpose for online use
  4. the overall time something takes to complete.

9 Clues: electronic devices used to store data,the overall time something takes to complete.a thing made or adapted for a particular purpose for online usea piece of equipment which allows access to other computers or networksa device, usually electronic, that processes data according to a set of instructions....

Berk Exploring Ch 18 2020-07-23

Berk Exploring Ch 18 crossword puzzle
Across
  1. a psychosocial stage representing development beyond ego integrity
  2. communities for older adults that offer a continuum of housing alternatives
  3. remaining in a familiar setting where one has control over one’s everyday life; aging in ______
  4. social _______ model, which discusses changing social networks through life
  5. good match between older adults’ abilities and the demands of their living environments, which promotes adaptive behavior and psychological well-being: __________ fit
  6. emotional strength of older adults who, compared with younger people, selectively attend to and better recall emotionally positive over negative information; __________effect
Down
  1. negative resolution of the psychological conflict of late adulthood in Erikson's theory
  2. type living communities for older adults that provides hotel-like support services
  3. socioemotional __________theory, which states that social interaction in late adulthood extends lifelong selection processes
  4. aging in which gains are maximized and losses minimized
  5. theory of aging that states that most aging adults strive to maintain a personal system that promotes life satisfaction by ensuring consistency between their past and anticipated future

11 Clues: aging in which gains are maximized and losses minimizeda psychosocial stage representing development beyond ego integritycommunities for older adults that offer a continuum of housing alternativessocial _______ model, which discusses changing social networks through life...

Wireless Networking 2021-12-14

Wireless Networking crossword puzzle
Across
  1. What is the strongest form of wireless encryption?
  2. What device protects a network from unwanted intrusion?
  3. Disabling physical ______ is one way to prevent rogue employees from connecting a laptop to the SOHO router and accessing the network.
  4. Enable ______ filtering helps secure a SOHO router.
  5. A Wi-Fi _______ is a tool that can identify wireless networks on 2.4-GHz and 5-GHz frequencies.
  6. The PoE _______ is a network device that allows a remote device to obtain Ethernet data as well as electrical power.
Down
  1. You have been tasked with connecting wireless clients to a server that supports SSO and 802.1X. What technologies should you implement?
  2. What network device moves the frame of data between a source and destination based on their MAC addresses?
  3. A ______ switch can be configured when accessed from a browser or SSH or similar configuration tool.
  4. _____ is used to protect wireless data from eavesdropping
  5. The _______ is a device that can either connect two LANs together or separate them into two sections.

11 Clues: What is the strongest form of wireless encryption?Enable ______ filtering helps secure a SOHO router.What device protects a network from unwanted intrusion?_____ is used to protect wireless data from eavesdroppingA Wi-Fi _______ is a tool that can identify wireless networks on 2.4-GHz and 5-GHz frequencies....

Internet crossword 2022-04-13

Internet crossword crossword puzzle
Across
  1. a set of related web pages located under a single domain name, typically produced by a single person or organization.
  2. method employing encryption to provide secure access to a remote computer over the internet.
  3. method employing encryption to provide secure access to a remote computer over the internet.
  4. the information about a person on the internetas a result of their online activity.
Down
  1. make a posting on the social media application Twitter.
  2. upload a video of (someone or something) to the video-sharing website YouTube
  3. post (a photograph or video of something) on the social media application Instagram.
  4. a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
  5. an application, especially as downloaded by a user to a mobile device.
  6. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  7. spend time using the social media application Facebook.
  8. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

12 Clues: make a posting on the social media application Twitter.spend time using the social media application Facebook.an application, especially as downloaded by a user to a mobile device.upload a video of (someone or something) to the video-sharing website YouTubethe information about a person on the internetas a result of their online activity....

Sera Diann Greenwood 2014-12-08

Sera Diann Greenwood crossword puzzle
Across
  1. ENGINE Software that searches and gathers and identifies information from a database based on keywords, titles and text.
  2. software used to view various kinds of Internet resources found on the Web.
  3. a list of citations that appear at the end of a paper, article, chapter or book.
  4. Law granting a legal right to a copyright holder or author which requires their permission to make copies of the work.
  5. NETWORKS online communities where people meet, socialize, exchange digital files, etc.
  6. To renew or revitalize; To reload a webpage on the internet
Down
  1. A bully who operates online, in cyberspace; To bully online
  2. A part of a computer system or network that is designed to block unauthorized access while permitting outward communication
  3. A collaborative website which can be directly edited by anyone with access to it
  4. OPERATORS Using keywords such as AND, OR, NOT in web searches to narrow search results.
  5. An unauthorized person who secretly gains access to computer files.

11 Clues: A bully who operates online, in cyberspace; To bully onlineTo renew or revitalize; To reload a webpage on the internetAn unauthorized person who secretly gains access to computer files.software used to view various kinds of Internet resources found on the Web.a list of citations that appear at the end of a paper, article, chapter or book....

Deep Fakes 2022-06-30

Deep Fakes crossword puzzle
Across
  1. A computer programme that has been designed to think
  2. a video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information
  3. These AI systems mimic the way that neurons in the human brain connect, which allows computers to “learn” like humans
  4. Alexa’s senior
  5. a machine resembling a human being and able to replicate certain human movements and functions automatically
  6. a women that was in a deep fake video on tik tok
Down
  1. news articles that are intentionally and verifiably false
  2. a system of government by the whole population or all the eligible members of a state, typically through elected representatives.
  3. Speaker of the US House of Representatives, which is one of the two chambers in Congress
  4. A virtual assistant technology system used by more than 100 million people.
  5. the application of scientific knowledge for practical purposes, especially in industry

11 Clues: Alexa’s seniora women that was in a deep fake video on tik tokA computer programme that has been designed to thinknews articles that are intentionally and verifiably falseA virtual assistant technology system used by more than 100 million people.the application of scientific knowledge for practical purposes, especially in industry...

Unit 6.4 Types of data to collect 2022-10-13

Unit 6.4 Types of data to collect crossword puzzle
Across
  1. It is a metric to track posts, shares and comments on Facebook.
  2. Instead of writing a comment or sharing a post, a user can click the ___ button as a quick way to show approval in Facebook or Instagram.
  3. To increase social sharing, company can find the social network used most ____ by the target audience.
  4. Whenever someone name-drops a person or brand online, that is a social ___.
  5. Adding content on a regular basis to each of the business's social media accounts so as to be ____.
  6. It refers to a person who subscribes to your account in order to receive your updates.
Down
  1. It is a metric to track mainstream news articles with RSS feeds and comments.
  2. It describes when social media users broadcast web content on a social network to their connections, groups, or specific individuals.
  3. Create ___ content that add value to consumers, do not spam on social networks.
  4. it is a metric to track blog posts and comments.
  5. It is a metric used to track users' sentiments in tweets or retweets.

11 Clues: it is a metric to track blog posts and comments.It is a metric to track posts, shares and comments on Facebook.It is a metric used to track users' sentiments in tweets or retweets.Whenever someone name-drops a person or brand online, that is a social ___.It is a metric to track mainstream news articles with RSS feeds and comments....

kevin fisher 2023-09-14

kevin fisher crossword puzzle
Across
  1. TV news producer told what happened after her network downsized the newsroom"
  2. a person employed for wages or salary, especially at nonexecutive level.
  3. further the progress of (something, especially a cause, venture, or aim); support or actively encourage.
  4. the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
  5. the process of hiring someone from within your existing business structure to fill a vacant position for your company.
  6. a person or organization that employs people.
Down
  1. a form employers use to collection information about you to see if you are a good fit for the position.
  2. filling a job vacancy with an employee from outside the company,
  3. make (a company or organization) smaller by eliminating staff positions.
  4. a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
  5. the process of actively seeking out, finding and hiring candidates for a specific position or job.

11 Clues: a person or organization that employs people.filling a job vacancy with an employee from outside the company,make (a company or organization) smaller by eliminating staff positions.a person employed for wages or salary, especially at nonexecutive level.TV news producer told what happened after her network downsized the newsroom"...

Crossword_2 2022-05-29

Crossword_2 crossword puzzle
Across
  1. Commercially produced programs written to perform specific task such a word processing
  2. data sent to your computer by a Web server that records your actions on a certain web site
  3. The ability of one to use technology to find, organize, and evaluate information.
  4. The amount of data that can be sent through a connection at one time.
  5. the information about a particular person that exists on the internet as a result of their online activity.
  6. IC chips are usually made of
Down
  1. the integration of digital information with the user's environment in real time
  2. Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing
  3. network that is designed to block unauthorized access while permitting outward communication.
  4. Another term for parameter
  5. a detailed, yet readable, description of what a computer program or algorithm must do, expressed in languages that humans use naturally rather than in a programming language

11 Clues: Another term for parameterIC chips are usually made ofThe amount of data that can be sent through a connection at one time.the integration of digital information with the user's environment in real timeThe ability of one to use technology to find, organize, and evaluate information....

Activity - Crossword 2023-10-08

Activity - Crossword crossword puzzle
Across
  1. They translate digital signals from a computer into analog signals that can travel across conventional phone lines.
  2. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network.
  3. These devices are supported on a best-effort basis limited by the staffing and equipment level available.
  4. Small physical devices that join multiple networks together.
  5. A small, simple, inexpensive device that joins multiple computers together.
Down
  1. Protects a computer network from unauthorized access.
  2. A network that is confined to a relatively small area.
  3. Consists of a small electronic circuit board that is inserted into a slot inside a computer or printer.
  4. Can be implemented completely in software, completely in hardware, or as a combination of both.
  5. A device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments.
  6. A device that gathers the signals from devices that are connected to it, and then regenerates a new copy of each signal.

11 Clues: Protects a computer network from unauthorized access.A network that is confined to a relatively small area.Small physical devices that join multiple networks together.A small, simple, inexpensive device that joins multiple computers together.Can be implemented completely in software, completely in hardware, or as a combination of both....

c 2014-02-09

c crossword puzzle
Across
  1. The latest version has the ability to map your wireless home network and safeguards your wi-fi networks
  2. Most commonly consists of eight bits
Down
  1. The result obtained by adding several amounts together and then dividing this total by the number of amounts.
  2. Mathematical object used to count, label, and measure.

4 Clues: Most commonly consists of eight bitsMathematical object used to count, label, and measure.The latest version has the ability to map your wireless home network and safeguards your wi-fi networksThe result obtained by adding several amounts together and then dividing this total by the number of amounts.

Jay ross 2014-09-11

Jay ross crossword puzzle
Across
  1. A global network of thousands of other computer networks that offers e-mail
  2. A system of connected computers that allows the sharing of files
  3. An unauthorized person who secretly gains access to computer file
Down
  1. a list of citations that appear at the end of a paper, article, chapter or book

4 Clues: A system of connected computers that allows the sharing of filesAn unauthorized person who secretly gains access to computer fileA global network of thousands of other computer networks that offers e-maila list of citations that appear at the end of a paper, article, chapter or book

Chapter 12. Clusters. Why do proximity and place matter? 2022-04-15

Chapter 12. Clusters. Why do proximity and place matter? crossword puzzle
Across
  1. Economies that can be accrued within a firm by producing at larger volumes.
  2. a form of calculation used as lines of equal cost.
  3. One of the factors from Webers theory that the materials to be shiped along with final products are taken to the market.
  4. nature of clustering the economy in a group.
  5. if the material is this then the optimum location was drawn toward the raw materials source.
Down
  1. are based upon localized networks of know how that allow the rapid and effective circulation of particular forms of knowledge.
  2. theory from erman economis Alfred Weber that explain spatial distribution of production activities.
  3. One of the factors from Webers theory in which both the materials and the end products had to be transported.
  4. if the material is this then it was drawn into the market site.

9 Clues: nature of clustering the economy in a group.a form of calculation used as lines of equal cost.if the material is this then it was drawn into the market site.Economies that can be accrued within a firm by producing at larger volumes.if the material is this then the optimum location was drawn toward the raw materials source....

SECURITY AND PRIVACY 2022-05-03

SECURITY AND PRIVACY crossword puzzle
Across
  1. type of customer information
  2. users are relieved from burden of data storage and maintenance.
  3. A sequence of stages that a particular unit of data goes through from its initial generation or capture to its eventual archival or deletion at the end of its useful life.
  4. How many security accounts per client is provided by Microsoft?
  5. How many phases of data life cycle are there?
Down
  1. A set of strategies designed to allow a business to use cloud applications and networks to their greatest potential while limiting potential threats and vulnerabilities.
  2. Allows collecting, storing, transferring and sharing the data over the cloud without putting the privacy of personal data at a risk.
  3. Services that deliver agreed levels of availability to meet the needs of customers and users.
  4. The process of transforming or encoding data before it's moved to cloud storage.

9 Clues: type of customer informationHow many phases of data life cycle are there?users are relieved from burden of data storage and maintenance.How many security accounts per client is provided by Microsoft?The process of transforming or encoding data before it's moved to cloud storage....

Vocab 2023-11-28

Vocab crossword puzzle
Across
  1. term for stela.
  2. The set of letters used when writing in a language.
  3. Reform - posits that a small minority, consisting of members of the economic elite and policy-planning networks, holds the most power —and that this p governmental unit is created on land of another country owned by colonists from a countryCulturalal diffusion spread of cultural trends across locations.
  4. A set of pieces that work together in unison as a mechanism or device.
Down
  1. an act, statement, or gift that is intended to show gratitude, respect, or admiration.
  2. - a system of money in general use in a particular country.
  3. Army -active forces
  4. - a representation of Christ's crucifixion, usually sculptured and in the open air
  5. -the central core of the stem and root of a vascular plant, consisting of the vascular tissue (xylem and phloem) and associated supporting tissue or

9 Clues: term for stela.Army -active forcesThe set of letters used when writing in a language.- a system of money in general use in a particular country.A set of pieces that work together in unison as a mechanism or device.- a representation of Christ's crucifixion, usually sculptured and in the open air...

Short Quiz 2023-10-01

Short Quiz crossword puzzle
Across
  1. It is used for lower-capacity applications, typically up to 18 channels with a spacing of 20 nm between the channels.
  2. In this division, each user is assigned a unique code that is used to modulate their signal.
  3. A type of time division
  4. It is the process in which multiple signals coming from multiple sources are combined and transmitted over a single physical line.
  5. Time slots are grouped into frames. One frame consists of one cycle of time slots.
Down
  1. The bandwidth of a single physical medium is divided into a number of smaller, independent channels.
  2. It is commonly used in wireless communication systems such as cellular networks, Wi-Fi, and satellite communication systems.
  3. It is used to increase the capacity of optical fiber by transmitting multiple optical signals simultaneously over a single optical fiber
  4. It is the sharing of a medium or bandwidth.
  5. Defined as sharing a portion of the bandwidth in the form of channels.

10 Clues: A type of time divisionIt is the sharing of a medium or bandwidth.Defined as sharing a portion of the bandwidth in the form of channels.Time slots are grouped into frames. One frame consists of one cycle of time slots.In this division, each user is assigned a unique code that is used to modulate their signal....

Recruitment Methods 2024-01-31

Recruitment Methods crossword puzzle
Across
  1. A type of organisation that provides services to employers and job seekers, such as screening, matching, and placement (11,6)
  2. A type of online advertising that uses websites or applications to display ads to users (6,11)
  3. A type of media that uses printed publications to disseminate news and information (9)
  4. A type of online advertising that uses social networks to promote products or services (6,5)
Down
  1. A type of online advertising that uses the employer’s own site to showcase vacancies (7,7)
  2. A type of online platform that allows employers to post job openings and candidates to apply for them (5,3,6)
  3. A place where job seekers can find information and advice on employment opportunities (3,6)
  4. A type of recruitment that involves hiring people from within the organization (8)
  5. A type of recruitment that involves hiring people from outside the organization (8)

9 Clues: A type of recruitment that involves hiring people from within the organization (8)A type of recruitment that involves hiring people from outside the organization (8)A type of media that uses printed publications to disseminate news and information (9)A type of online advertising that uses the employer’s own site to showcase vacancies (7,7)...

[P4] Signal Theory 2013-12-19

[P4] Signal Theory crossword puzzle
Across
  1. What is the maximum data transfer rate for networks and can be measured in Mbps or Gbps?
  2. What sort of signal are based on the same clock rate?
  3. What type of signal is MP3 audio and is fault tolerant?
  4. What type of data is handled on the network layer and is sent to other devices ? Clue: It can be referred to as datagrams
  5. What signal communication is one direction only and is used in TVs?
Down
  1. What sort of data is machine readable (lowest communication) and can be used to calculate the ASCII character set?
  2. What signal is transmitted at a different CPU clock rate than another signal?
  3. What sort of signal do Modems transmit?
  4. What uses telephone calls and communicates in both directions at the same time?
  5. What signal communication is in both directions but goes from one place at a time?
  6. What is a chunk of data that is created from network devices (e.g. NIC) that contains addresses, delimiters and data encapsulation?

11 Clues: What sort of signal do Modems transmit?What sort of signal are based on the same clock rate?What type of signal is MP3 audio and is fault tolerant?What signal communication is one direction only and is used in TVs?What signal is transmitted at a different CPU clock rate than another signal?...

TTL 2021-08-24

TTL crossword puzzle
Across
  1. the overall process of invention, innovation and diffusion of technology or processes
  2. is an episodic series of spoken word digital audio files that a user can download to a personal device for easy listening
  3. used in application of knowledge
  4. using more than one medium of expression or communication
  5. is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users
Down
  1. an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web
  2. programs and other operating information used by a computer
  3. a small mechanical or electronic device or tool, especially an ingenious or novel one
  4. refers to the proficiency in applying technological resources to achieve instructional goals in a given teaching
  5. is an online journal where posted information from teachers and students are arranged
  6. a massive network of networks; a networking infrastructure

11 Clues: used in application of knowledgeusing more than one medium of expression or communicationa massive network of networks; a networking infrastructureprograms and other operating information used by a computerthe overall process of invention, innovation and diffusion of technology or processes...