networks Crossword Puzzles
TTL 2021-08-24
Across
- the overall process of invention, innovation and diffusion of technology or processes
- is an episodic series of spoken word digital audio files that a user can download to a personal device for easy listening
- used in application of knowledge
- using more than one medium of expression or communication
- is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users
Down
- an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web
- programs and other operating information used by a computer
- a small mechanical or electronic device or tool, especially an ingenious or novel one
- refers to the proficiency in applying technological resources to achieve instructional goals in a given teaching
- is an online journal where posted information from teachers and students are arranged
- a massive network of networks; a networking infrastructure
11 Clues: used in application of knowledge • using more than one medium of expression or communication • a massive network of networks; a networking infrastructure • programs and other operating information used by a computer • the overall process of invention, innovation and diffusion of technology or processes • ...
Crossword_2 2022-05-29
Across
- IC chips are usually made of
- Telecommunication device that forwards data packets across two or more distinct networks toward their destinations, through a process known as routing
- network that is designed to block unauthorized access while permitting outward communication.
- Another term for parameter
- Commercially produced programs written to perform specific task such a word processing
- a detailed, yet readable, description of what a computer program or algorithm must do, expressed in languages that humans use naturally rather than in a programming language
Down
- The amount of data that can be sent through a connection at one time.
- the information about a particular person that exists on the internet as a result of their online activity.
- the integration of digital information with the user's environment in real time
- The ability of one to use technology to find, organize, and evaluate information.
- data sent to your computer by a Web server that records your actions on a certain web site
11 Clues: Another term for parameter • IC chips are usually made of • The amount of data that can be sent through a connection at one time. • the integration of digital information with the user's environment in real time • The ability of one to use technology to find, organize, and evaluate information. • ...
6th Grade Computers Vocabulary 6 2019-11-13
Across
- distribute (multimedia files) over the internet for playback on a mobile device or a personal computer. You Tube is an example
- describes the trail you leave in cyberspace and on any form of digital communication.
- The do’s and don’ts of online communication
- one who uses cyber space to hunt human beings with the intent to exploit, gain information, money, or possessions
- a set of icons or buttons that are a part of a software program’s interface or an open window
Down
- the illegal use of someone else’s personal information (example: a Social Security number) in order to obtain money or credit
- Any hardware, software system that helps its user accomplish a task
- the art of deliberately, cleverly, and secretly ticking people off, usually via the internet, using dialogue
- the buying and selling of product or service over electronic systems such as the Internet and other computer networks
- to act like another person
- an online discussion site where people can hold conversations in the form of posted messages
11 Clues: to act like another person • The do’s and don’ts of online communication • Any hardware, software system that helps its user accomplish a task • describes the trail you leave in cyberspace and on any form of digital communication. • an online discussion site where people can hold conversations in the form of posted messages • ...
Solve AI Crossword Puzzle 2024-12-29
Across
- A method in machine learning that allows models to be trained on local data from different devices without sharing sensitive data. (8)
- Misleading or fabricated media generated through artificial intelligence techniques. (8)
- The systematic error that occurs when an AI model's outcomes reflect human prejudices. (4)
- The process of identifying patterns and features in inputs, often used in image processing. (10)
- The most critical consideration in designing, developing, and implementing AI systems and models.(6)
- A condition in which a machine learning model learns too much detail from training data and fails to generalize to new data. (12)
Down
- The ability to describe how an AI system generates specific outputs or decisions. (13)
- A term for the false outputs produced by generative models that can misrepresent reality. (12)
- The practice of making predictions about future events based on historical data. (10)
- The measure of impartiality in AI systems, ensuring equal treatment for individuals. (8)
- A Networks encompasses algorithms that mimic the human brain's neuron connections. (14)
11 Clues: The practice of making predictions about future events based on historical data. (10) • The ability to describe how an AI system generates specific outputs or decisions. (13) • A Networks encompasses algorithms that mimic the human brain's neuron connections. (14) • Misleading or fabricated media generated through artificial intelligence techniques. (8) • ...
EMPOWER ME 2025-03-02
Across
- A collection of web pages accessible through a browser.
- A word processor that allows users to create, edit, and format text documents like letters, reports, and contracts with features like formatting options, tables, and images.
- desktop publishing application that helps you create visually rich, professional-looking publications.
- Designed for creating presentations with slides, making it the most likely answer for a crossword clue related to presentation tools.
- The practice of protecting systems, networks, and data from cyber threats, ensuring safe and secure online interactions.
Down
- Graphic visual representations of information, data, or knowledge intended to present information quickly and clearly.
- A set of guidelines for respectful and considerate online communication.
- Allows a large set or group of data to be stores, organized, analyzed, and interpreted automatically.
- A set of instructions, data or programs used to operate computers and execute specific tasks.
- A software program used to create spreadsheets and analyze data
- A website that contains a regularly updated journal or series of articles.
11 Clues: A collection of web pages accessible through a browser. • A software program used to create spreadsheets and analyze data • A set of guidelines for respectful and considerate online communication. • A website that contains a regularly updated journal or series of articles. • ...
AI TRIVIA 2023-12-03
Across
- The field of study that enables computers to interpret visual information from the world.
- The smallest unit of a digital image, fundamental for image processing in AI.
- The delivery of computing services, including storage and processing power, over the internet.
- A request for information or action, commonly used in search engines and databases.
- A subset of machine learning that involves neural networks with many layers.
- A representation of a system used by AI for predictions or simulations.
- Inspired by the human brain, this AI component consists of interconnected nodes.
- Extremely large and complex datasets that traditional data processing applications can't handle.
Down
- The field of study that uses scientific methods to extract insights from data.
- A program or entity capable of making decisions and taking actions in an environment.
- This type of learning involves a teacher providing labeled examples to train the machine.
- A set of rules or steps followed to solve a problem or perform a task in AI.
- The systematic study of the principles of reasoning, often applied in AI algorithms.
- An open-source machine learning library developed by Google.
- The field of study that involves the design, construction, operation, and use of robots.
- A computer program designed to chat with users, offering information or assistance.
16 Clues: An open-source machine learning library developed by Google. • A representation of a system used by AI for predictions or simulations. • A set of rules or steps followed to solve a problem or perform a task in AI. • A subset of machine learning that involves neural networks with many layers. • ...
Browsing safely 2025-06-08
Across
- ______ is a popular anti-virus.
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ____ also known as unethical hacker.
- It refer to the act of stealing and misusing someone's personal Plus information.
- Standard form of vital information resources under seize.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Never share your ____ while chatting.
- A ____ is a software that help in preventing unauthorised access to your computer.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- It is an act ab harming or harassing using information technology in deliberate manner.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- ____ means hoaxing or misleading.
- It referred to an illegal entry into a computer system or network.
- It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation.
16 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
Aiden Cybersecurity Crossword 2026-04-01
Across
- A form of malware that is disguised as something in order to gain access from you.
- A form of security that helps detect and protect against intrusions.
- A form of security that encrypts your device from outside threats, can be used for public wifi.
- A person who infiltrates systems in order to help an organization fix flaws in security.
- A form of storage that is secured inside a highly guarded sever facility.
- A form of malware that infects networks by infiltrating security flaws.
- A form of persuasion that disguises itself as something it’s not.
- A form of malware that extorts money out of a person.
Down
- A person who infiltrates a digital device without authorization with malicious intent.
- A form of persuasion that causes a person to share information they shouldn’t.
- A form of storage that takes digital data and secures form short-term backup.
- A systems that controls traffic, what comes in and out of the system.
- A form of malware that is secretly installed on our device without your knowledge.
- A form of malware that infects files and programs that spreads by user interaction.
- A form of security that acts a defense wall.
- A malicious code that is destructive to digital devices.
16 Clues: A form of security that acts a defense wall. • A form of malware that extorts money out of a person. • A malicious code that is destructive to digital devices. • A form of persuasion that disguises itself as something it’s not. • A form of security that helps detect and protect against intrusions. • ...
International Express Unit 1_ Internet&Social networks 2021-03-22
Across
- to copy or move a file from your computer onto a website
- to open a file on a web page to get or see information
- to exchange messages with someone on the internet
- to connect one web page to another web page or to a file
- to copy or move a file from a web site onto your computer
Down
- to give the most recent information about someone or something on a web page
- to choose an item on a computer screen, by pressing one of the buttons on a mouse
- to put a text or image on a web page so that other people can see it
- to enter your name and password to start using a web site
9 Clues: to exchange messages with someone on the internet • to open a file on a web page to get or see information • to copy or move a file from your computer onto a website • to connect one web page to another web page or to a file • to enter your name and password to start using a web site • to copy or move a file from a web site onto your computer • ...
TechWord 2013-01-09
Across
- A type of computing delivered as a service over a network (typically the Internet).
- A physical computer dedicated to run one or more services as a host.
- CA Technologies headquarters is based in.
- A software delivery model, in which software and associated data; are centrally hosted on the cloud.
- A computer used primarily by corporate and governmental organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning, and transaction processing.
- A secret word, or string of characters, that is used for user authentication to prove identity.
- A device that forwards data packets between computer networks.
Down
- There are three different types of data ______ produced while progressing from requirements to the actual database to be used for the information system
- A collection of physical elements, that comprise a computer system.
- Computer programs and related data, that provides the instructions for telling a computer what to do and how to do it.
- A collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information.
- Chief and _____
- The US state that CA World 2013 is being held in.
- The Internet can be considered a ___
14 Clues: Chief and _____ • The Internet can be considered a ___ • CA Technologies headquarters is based in. • The US state that CA World 2013 is being held in. • A device that forwards data packets between computer networks. • A collection of physical elements, that comprise a computer system. • A physical computer dedicated to run one or more services as a host. • ...
ic3 lesson 25 2015-04-22
Across
- units of data sent across a network
- text or graphics added to the end of outgoing e-mail messages
- list of e-mail addresses you an use to send the same message to a group
- using a cell phone or other mobile device to send and recive written messages
- each user has a unique address that consists of three parts
- distrubtion list
- commercial e-mail that is sent to many people at the same time to promote products or services
Down
- a document, image, figure, or other file that you can attach to an e-mail message
- transmission of electronic messages over networks
- form of electronic communication that allows you to send and receive text messages in "real time" from friends and colleagues who are currently online
- e-maill software provided with Windows Vista
- to save or transfer data to a storage device or folder for the purpose of saving space or organizing the data
- part of most e-mail programs; used to keep a list of contacts and their e-mail
- application installed on the local PC, network o r Web, such as e-mail, text message, and instant messaging programs
14 Clues: distrubtion list • units of data sent across a network • e-maill software provided with Windows Vista • transmission of electronic messages over networks • each user has a unique address that consists of three parts • text or graphics added to the end of outgoing e-mail messages • list of e-mail addresses you an use to send the same message to a group • ...
lesson 25 vocab words 2015-04-22
Across
- each user has a unique address that consists of three parts
- part of most e-mail programs; ;used to keep a list of contacts and their e-mail
- units of data sent across a network
- a list of e-mail addresses you an use to send the same message to a group
- using a cell phone or other mobile device to send and receive written messages
- distribution list
- text or graphics added to the end of outgoing e-mail messages
Down
- e-maill software provided with Windows Vista
- a software application installed on the local PC, network o r Web, such as e-mail, text message, and instant messaging programs
- a form of electronic communication that allows you to send and receive text messages in "real time" from friends and colleagues who are currently online
- transmission of electronic messages over networks
- a document, image, figure, or other file that you can attach to an e-mail message
- to save or transfer data to a storage device or folder for the purpose of saving space or organizing the data
- unsolicited commercial e-mail that is sent to many people at the same time to promote products or services
14 Clues: distribution list • units of data sent across a network • e-maill software provided with Windows Vista • transmission of electronic messages over networks • each user has a unique address that consists of three parts • text or graphics added to the end of outgoing e-mail messages • a list of e-mail addresses you an use to send the same message to a group • ...
Consumer Behaviour 2017-07-20
Across
- when a need that becomes sufficiently pressing so that the consumer seeks immediate satisfaction of the need.
- a group of people with shared value systems within society.
- consumers participate in brand switching due to range of choices associated with their low involvement purchase.
- factors that consider the consumers age, their occupation, economic situation and their lifestyle.
- buying behaviour which aims to avoid post purchase anxiety, often by buying a more expensive and better product.
- when a consumer acknowledges a gap between their current and desired state.
- buying behaviour where consumers repeatedly purchasing the same brand due to familiarity.
- when a consumer feels uneasy (discomfort) about the drawbacks of their chosen brand.
Down
- the stage in the buyer decision making process where the consumer processes information to arrive at brand choices.
- stage in which buyers make a commitment to buying a product.
- the person who first suggests or thinks of the idea of buying a particular market offer.
- factors that consider the influence of groups and networks
- buying behaviour characterised by information gathering and considered evaluation of alternatives.
- permanent, ordered divisions in society that is often determined by peoples' income, occupation and education.
14 Clues: factors that consider the influence of groups and networks • a group of people with shared value systems within society. • stage in which buyers make a commitment to buying a product. • when a consumer acknowledges a gap between their current and desired state. • when a consumer feels uneasy (discomfort) about the drawbacks of their chosen brand. • ...
Types and methods of Data Transmission 2023-11-09
Across
- Data arrives at the destination with the bits no longer synchronised
- The part of the data packet that indicates the end of the data packet and CRC error check
- Data that is sent in both directions at the same time
- Sending data down several channels/wires several bits at a time
- The part of the data packet that contains the IP address for the sender and receiver, size of packet and packet number
- a number in a data packet header used to stop data packets that never reach their destination from clogging up the data paths
- Data that is sent in both directions but not at the same time
Down
- a device that enables data packets to be moved between different networks
- stages in a network that can receive and transmit data packets
- a small part of a message transmitted over a network
- A method of data transmission in which a message is broken into many data packets which can be sent along pathways independently of each other
- data that is sent on one direction only
- The actual data being carried in the data packet
- Sending data down one channel/wire one bit at a time
14 Clues: data that is sent on one direction only • The actual data being carried in the data packet • a small part of a message transmitted over a network • Sending data down one channel/wire one bit at a time • Data that is sent in both directions at the same time • Data that is sent in both directions but not at the same time • ...
DATA SECURITY 2025-10-22
Across
- A virtual barrier that keeps unauthorized users out of a computer network.
- A secret word or phrase that grants you access to an account or device.
- A small text file saved by a website to your computer that remembers information about you.
- Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
- A set of rules for how you should behave and interact online.
- The record of everything you do and post online; it stays forever!
Down
- A type of software designed to damage, disable, or gain unauthorized access to a computer system.
- A crime where someone steals your personal information to pretend to be you.
- This type of software protects your computer from viruses and other malicious programs.
- The practice of protecting systems, networks, and data from digital attacks.
- A fake message, often an email, trying to trick you into giving away private information.
- A special way to scramble data so only authorized people can read it.
- The general term for information, like facts, statistics, or files.
- Using two different ways to prove you are who you say you are before logging in. (Abbreviation)
14 Clues: A set of rules for how you should behave and interact online. • The record of everything you do and post online; it stays forever! • The general term for information, like facts, statistics, or files. • A special way to scramble data so only authorized people can read it. • A secret word or phrase that grants you access to an account or device. • ...
CS Networking 2023-10-09
Across
- A form of network topology that interconnects all devices
- A form of network security that uses a combination of letters and numbers
- A factor to be considered when deciding which topology to use
- A network topology where data travels from node to node in a one way pattern, this is also cheap.
- What is the name used to describe how a network is arranged/organised
- What does LAN stand for?
- A form of network attack where multiple files are sent in bulk to a network, causing it to slow down
Down
- A type of LAN connection, that is more direct than the other
- A network topology that uses just one cable in one direction
- What is the name given to 2 or more computers connected together
- Another type of LAN connection that utilizes multiple devices
- The abbreviation for a business that will provide users with internet connection and network hardware
- A network topology where there is a central hub that outputs data in multiple directions
- What name is given to any device connected in a networks
- What's the abbreviation given to the hardware that converts data signals from nodes
- What is the abbreviation for a network that spans a large area
16 Clues: What does LAN stand for? • What name is given to any device connected in a networks • A form of network topology that interconnects all devices • A type of LAN connection, that is more direct than the other • A network topology that uses just one cable in one direction • A factor to be considered when deciding which topology to use • ...
Unit 6 Skills Time Vocabulary 2023-12-14
Across
- an issue often appearing unexpectedly and changing plans, methods, or attitudes
- a small mobile manual device that controls movement of the cursor and selection of functions on a computer display
- an assembly of long wire electrical conductors insulated from each other but laid up together
- an electronic communications network that connects computer networks and organizational computer facilities around the world
- inventor of the computer mouse
- of great size or area
- a part of the Internet accessed through a graphical user interface and containing documents often connected by hyperlinks
- a programmable usually electronic device that can store, retrieve, and process data
Down
- English mathematician and inventor of the "Small-Scale Experimental Machine".
- without interval of time; as soon as possible
- a machine that resembles a living creature in being capable of moving independently (as by walking or rolling on wheels) and performing complex actions (such as grasping and moving objects)
- a visual cue (such as a flashing vertical line) on a video display that indicates position
- serving the ends of or used as a means of experimentation
- to make or bring into existence something new
- an opportunity for selling
- the chief officer of an organization (such as a corporation or institution) usually entrusted with the direction and administration of its policies
16 Clues: of great size or area • an opportunity for selling • inventor of the computer mouse • without interval of time; as soon as possible • to make or bring into existence something new • serving the ends of or used as a means of experimentation • English mathematician and inventor of the "Small-Scale Experimental Machine". • ...
Test 2024-04-16
Across
- A logical subdivision of an IP network.
- A hardware component that connects a computer to a network.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- The public name of a wireless network.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- The fourth version of the Internet Protocol which uses a 32-bit address scheme.
- A unit of data sent over a digital network.
- Rules determining the format and transmission of data.
- A node that serves as an entrance to another network.
Down
- The system that translates domain names into IP addresses.
- The maximum rate of data transfer across a given path.
- A network that connects computers within a limited area such as a residence, school, or office building.
- A networking device that connects devices on a computer network by using packet switching to receive and forward data to the destination device.
- The arrangement of various elements (links, nodes, etc.) of a computer network.
- Device that forwards data packets between computer networks.
- A core protocol of the Internet Protocol Suite; it originates and manages connections between hosts.
16 Clues: The public name of a wireless network. • A logical subdivision of an IP network. • A unit of data sent over a digital network. • A node that serves as an entrance to another network. • The maximum rate of data transfer across a given path. • Rules determining the format and transmission of data. • The system that translates domain names into IP addresses. • ...
U.S. and Canada Vocabulary 2022-10-19
Across
- a large, powerful windstorm that forms over warm ocean waters
- Movement toward cities
- a high point or ridge that determines the direction rivers flow
- The unplanned and uncontrollable spread of Urban-settlements into neighboring regions
- Public services or systems such as power, water, sewage, transportation, communication, networks, school, & healthcare
- the source of a stream or river
- economy that emphasizes services and technology rather than industry and manufacturing
- a boundary in the eastern US where the higher land of the Piedmont drops to the lower Atlantic Coastal Plain
Down
- industries involved in the production, distribution, and marketing of farm products, supplies, and equipment
- a smaller river or stream that feeds into a larger river
- To change residence from a country to begin living permanently in another country
- A large population concentration made up of several large and many smaller citires such as the area between Boston, Washington, D.C.
- a channel or pipeline for carring a large quanity of flowing water
- A mild climate region in the southern and southwestern portions of the US
- a resource formed in the Earth by plant and animal remains
- method used in dry regions in which crops are grown that rely only on natural precipitation
16 Clues: Movement toward cities • the source of a stream or river • a smaller river or stream that feeds into a larger river • a resource formed in the Earth by plant and animal remains • a large, powerful windstorm that forms over warm ocean waters • a high point or ridge that determines the direction rivers flow • ...
Code.org Unit 2 Vocabulary 2022-11-01
Across
- An agreed-upon set of rules that specify the behavior of some system
- The unique number assigned to each device on the Internet.
- a group of interconnected computing devices capable of sending or receiving data.
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- a group of computing devices and programs working together for a common purpose
- the protocol used for transmitting web pages over the Internet
- Can continue to function even in the event of individual component failures.
- A type of computer that forwards data across a network
- differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Down
- a protocol for sending data across the Internet that assigns unique numbers (IP addresses) to each connected device
- the inclusion of extra components so that a system can continue to work even if individual components fail
- a system of linked pages,programs, and files.
- A chunk of data sent over a network.
- a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- the series of connections between computing devices on a network starting with a sender and ending with a receiver.
- a computer network consisting of interconnected networks that use standardized,open communication protocols.
16 Clues: A chunk of data sent over a network. • a system of linked pages,programs, and files. • A type of computer that forwards data across a network • The unique number assigned to each device on the Internet. • the protocol used for transmitting web pages over the Internet • An agreed-upon set of rules that specify the behavior of some system • ...
Urinary System 2025-09-12
Across
- Long, straight capillaries that run parallel to the loop of Henle in the renal medulla.
- A ball of capillaries located within Bowman's capsule, where filtration of blood occurs.
- arterioles Blood vessels that carry blood towards the glomerulus.
- capillary The specific type of capillary within the glomerulus where filtration takes place.
- A tube that carries urine from the kidney to the urinary bladder.
- arterioles Blood vessels that carry blood away from the glomerulus.
- Cells in the afferent arteriole that produce and secrete renin.
- (2 words) The cup-shaped structure that surrounds the glomerulus and collects the filtrate.
Down
- artery Small arteries that branch off the arcuate arteries and extend into the renal cortex.
- artery Arteries that pass between the renal pyramids towards the cortex.
- (2 words) A large cup-shaped structure that collects urine from several minor calyces.
- capillary Capillary networks that surround the renal tubules in the cortex, involved in reabsorption and secretion.
- artery The first branch off the renal artery within the renal sinus.
- (3 words) The section of the nephron responsible for creating a concentration gradient in the renal medulla.
- _ _ Cells: Specialized cells in the distal convoluted tubule that monitor sodium chloride concentration.
- artery Arteries that arch over the bases of the renal pyramids, marking the boundary between the cortex and medulla.
16 Clues: Cells in the afferent arteriole that produce and secrete renin. • arterioles Blood vessels that carry blood towards the glomerulus. • A tube that carries urine from the kidney to the urinary bladder. • arterioles Blood vessels that carry blood away from the glomerulus. • artery The first branch off the renal artery within the renal sinus. • ...
Digital Citizenship 3 2020-09-01
Across
- derived from the term “malicious software;” refers to any program designed to infiltrate or damage a computer or network
- device or program that enables a computer to transmit data
- having doubt about something
- computer instructions or data; anything that can be stored electronically
- Uniform Resource Locator, or “address” for a web page.
- LITERACY: skills required to find, evaluate, use, share, and create content online
- site or page located on the World Wide Web
- NETWORKING SITE: provides a virtual community for people interested in a common subject or just a place to socialize with others online
- An alert that notifies a blog poster of a response to their post
Down
- repeating code
- secret series of numbers or letters that allows you to access a locked computer or program
- sending email that attempts to scam the user into giving up private information to be used for identity theft
- device that forwards data packets of digital information along networks
- ENGINE: program that searches for and finds items in an online database
- computer or device on a network that manages network resources
- HORSE: downloadable piece of software that seems like something fun or useful, but actually has malware lurking inside, such as a virus or spyware program; when downloaded and installed, the program installs the malware, too
16 Clues: repeating code • having doubt about something • site or page located on the World Wide Web • Uniform Resource Locator, or “address” for a web page. • device or program that enables a computer to transmit data • computer or device on a network that manages network resources • An alert that notifies a blog poster of a response to their post • ...
Windows & Installations 2014-05-23
Across
- The version of Windows 7 available under Volume Licensing that supports BitLocker
- The maximum amount of memory supported by an x86 Windows 7 system is ______GB.
- This technique can save significant time in large scale rollout projects
- The name of the migration strategy used when the hardware is not replaced
- Needs to be created on a blank hard disk prior to an OS being installed
- If we are to successfully boot from the network our networks will need to support this feature
- The name of the migration strategy used when the hardware is not replaced
- The installation type performed on a blank hard disk
- The minimum HD space recommended for a 32bit Windows 7 installation is ______GB.
- The minimum amount of HD space recommended for an x64 installation of Windows 7 is _______GB.
Down
- A Windows 7 installation method that requires Windows Vista SP1 or higher to already be installed.
- The edition of Windows 7 aimed at low spec systems like Netbooks.
- The Windows 7 variant aimed at the typical business user
- The name of the migration strategy used when the hardware is replaced
- The name of the migration strategy used when the hardware is replaced
- The installation type performed on a blank hard disk
- The minimum CPU speed recommended for a 32bit Windows 7 installation is one _________.
- The Windows 7 variant aimed at the Home User enthusiast
- An _________ upgrade will allow a lower variant of Windows 7 to be raised to a higher variant. Eg. Professional to Enterprise
19 Clues: The installation type performed on a blank hard disk • The installation type performed on a blank hard disk • The Windows 7 variant aimed at the Home User enthusiast • The Windows 7 variant aimed at the typical business user • The edition of Windows 7 aimed at low spec systems like Netbooks. • The name of the migration strategy used when the hardware is replaced • ...
Per 2 Chapter 12- Chris Baca 2023-03-16
Across
- an open source, Linux based smartphone/tablet operating system
- a family of free and open-source software operating systems based on an operating system kernel
- a cloud service developed by google to provide file storage and synchronization service
- a program that interprets the commands from the keyboard and passes them to the operating system
- a method for removing restrictions and protections added to mobile operating systems, but typically on IOS.
- a file hosting service and synchronization service operated by Microsoft.
- a backup tool in OS x
- a closed source Unix based operating system for smartphones and tablets made by apple.
Down
- a service in Linux and OS X for scheduling tasks to be executed at specific dates and times.
- a private network established through a public network to remote sites.
- a feature of a computer system that allows booting from more than one operating system
- a method used on android devices for removing restrictions and protections added to mobile operating systems
- a cloud service provided by Apple for iOS and OS devices.
- a location of the OS that keeps code isolated from other resources and other code.
- making calls using Wi-Fi networks.
- a monitoring system including computer hard disk drives to detect and report drive statuas.
16 Clues: a backup tool in OS x • making calls using Wi-Fi networks. • a cloud service provided by Apple for iOS and OS devices. • an open source, Linux based smartphone/tablet operating system • a private network established through a public network to remote sites. • a file hosting service and synchronization service operated by Microsoft. • ...
Tugas Inggris Explanation Crossword 2023-04-18
Across
- The system that manages the allocation of domain names and IP addresses.
- A software application that allows users to access and view web pages on the internet.
- A type of internet connection that uses radio waves to transmit data.
- A set of rules and standards used for exchanging information over the internet.
- The network of networks that make up the internet.
- The protocol used for transferring files between computers over the internet.
- The process of encoding information into a format that can be transmitted over the internet.
- A system used for sending short messages between mobile devices.
Down
- The system that translates domain names into IP addresses.
- A computer system that provides resources and services to other computers on a network.
- The protocol used for accessing and retrieving email messages from a server.
- A type of internet connection that uses a phone line to transmit data.
- A software program that allows users to browse the internet and view web pages.
- The physical infrastructure that connects devices to the internet.
- A communication protocol used for transferring files over the internet.
- A software program that allows users to communicate with each other in real-time over the internet.
- A unique identifier that is assigned to every device connected to the internet.
- The protocol used for transmitting email messages over the internet.
18 Clues: The network of networks that make up the internet. • The system that translates domain names into IP addresses. • A system used for sending short messages between mobile devices. • The physical infrastructure that connects devices to the internet. • The protocol used for transmitting email messages over the internet. • ...
Netnography 2022-11-30
Across
- A group of people living in the same place or having a particular characteristic in common.
- Relating to, measuring, or measured by the quality of something rather than its quantity.
- The action of taking part in something.
- The application of scientific knowledge for practical purposes, especially in industry.
- The interaction between people across a range of social networks.
- The principal method of human communication, consisting of words used in a structured and conventional way and conveyed by speech, writing, or gesture.
- The way in which something is regarded, understood, or interpreted.
Down
- communication or direct involvement with someone or something.
- The systematic investigation into and study of materials and sources in order to establish facts and reach new conclusions.
- The way in which one acts or conducts oneself, especially towards others.
- The aggregate of people living together in a more or less ordered community.
- The scientific description of peoples and cultures with their customs, habits, and mutual differences.
- A system of ideas and ideals, especially one which forms the basis of economic or political theory and policy.
- A specific type of qualitative social media research.
- Not physically existing as such but made by software to appear to do so.
- The art of examining how language functions and how meaning is created in different social contexts.
16 Clues: The action of taking part in something. • A specific type of qualitative social media research. • communication or direct involvement with someone or something. • The interaction between people across a range of social networks. • The way in which something is regarded, understood, or interpreted. • ...
A Little SaaS-y 2024-07-16
Across
- Processes involved in ensuring that a company can continue operating during and after a disaster or disruptive event.
- Popular accounting SaaS application.
- CMS, CRM, automations and more business-critical data is stored and used by many sales and marketing teams.
- One Single Platform to Protect Your SaaS Data Footprint.
- Software program or suite of programs that performs specific functions or tasks for users.
- The copy of important information and files stored separately to protect against data loss, corruption, or damage.
- Any software designed to harm, exploit, or compromise the functionality, security, or data of a computer, network, or device.
- A single instance of a software application that serves multiple customers.
Down
- When SaaS apps are used throughout the organization without centralized management, it is referred to as SaaS ____.
- the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Developers heavily rely on this app for project management, bug tracking, and more.
- To convert information or data into a code, especially to prevent unauthorized access.
- A contract between an MSP and their customer that defines the level of service expected.
- The amount of time a SaaS application is available and operational.
- Software as a service
- The individual or organization that uses the SaaS application.
16 Clues: Software as a service • Popular accounting SaaS application. • One Single Platform to Protect Your SaaS Data Footprint. • The individual or organization that uses the SaaS application. • The amount of time a SaaS application is available and operational. • A single instance of a software application that serves multiple customers. • ...
CloudCoE(CW-01) 2024-03-28
Across
- AWS Regions added in 2024 are Germany, Malaysia, New Zealand, and
- Service to invoke an Azure Function from changes to an Azure SQL Database
- AWS service that allows you to run code without provisioning or managing servers
- To find your celebrities in a video which AWS service is used.
- A GA Model in Amazon Bedrock Knowledge Bases
- AWS _______________ type of infrastructure deployment providing high-bandwidth connectivity between AWS services and 5G networks
- Distributed ledger technology that enables secure, transparent, and immutable record-keeping of transactions
- Recently announced multi-cloud offering by AWS for deploying and managing Kubernetes applications across multiple cloud provider
Down
- Parameter that allows you to adjust how random the response output from your AI models will be
- This classic fairy tale character is also a data privacy and synthetic data generation platform
- First S of S3
- In collaboration with IVèS, Sopra won a prestigious award at the Consumer Electronics Show (CES) in Las Vegas. Name the Product
- Hitachi Vantara and ________ have partnered to offer next-generation cloud services
- An edge computing service by AWS for running containerized applications at the edge
- Cloud service by Azure for managing and securing IoT devices and data
- This recent partnership between two major cloud computing providers aimed to improve interoperability and data portability between their respective platforms
16 Clues: First S of S3 • A GA Model in Amazon Bedrock Knowledge Bases • To find your celebrities in a video which AWS service is used. • AWS Regions added in 2024 are Germany, Malaysia, New Zealand, and • Cloud service by Azure for managing and securing IoT devices and data • Service to invoke an Azure Function from changes to an Azure SQL Database • ...
Browsing safely 2025-06-08
Across
- ______ is a popular anti-virus.
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ____ also known as unethical hacker.
- It refer to the act of stealing and misusing someone's personal Plus information.
- Standard form of vital information resources under seize.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Never share your ____ while chatting.
- A ____ is a software that help in preventing unauthorised access to your computer.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- It is an act ab harming or harassing using information technology in deliberate manner.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- ____ means hoaxing or misleading.
- It referred to an illegal entry into a computer system or network.
- It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation.
16 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
Introduction to Internet 2013-10-06
Across
- another name for `online shopping` which is a new concept of purchasing goods sitting at home.
- A collection of one or more related web pages linked with one another to form a global web of information.
- is an example of transferring large amounts of data across the internet.
- A method of communication in which one can accept, forward, delivers and stores messages digitally.
- A network of networks
- An online process that involves instant text messaging between two or more users.
- a language used to create web pages .
- A collection of computers that are linked together.
Down
- A link that allows the user to visit websites without typing new address.
- A new development in the field of Internet which allows the user to access information without the use of a telephone line.
- a technology which allows to interact via two way video and audio transmission simultaneously .
- The first page of particular website displayed by the web browser.
- a company that provides individuals and other companies to access the internet.
- Microsoft Internet Explorer and Google Chrome are examples of a software called.
- a unique address of every page on internet.
- The first network that came into existence.
- an electronic device which converts analog signals to digital signals and vice/versa.
- A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
18 Clues: A network of networks • a language used to create web pages . • a unique address of every page on internet. • The first network that came into existence. • A collection of computers that are linked together. • The first page of particular website displayed by the web browser. • is an example of transferring large amounts of data across the internet. • ...
Texas History 2022-04-21
Across
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged
- a financial gain
- Power is divided between national and state government
- the process of increasing the percentage and number of people living in urban settlements
- space comprising the earth’s atmosphere and the space beyond
- a return to a normal state of health, mind, or strength
- sectors(areas that are distinct from others) that produce goods and services within an economy (EX. the automobile industry; the steel industry).
- the part of the economy devoted to the production, processing, and distribution of food, including the financial institutions that fund these activities
- a period of temporary economic decline during which trade and industrial activities are reduced
Down
- People use their power by choosing representatives
- the basic facilities and installations that help a government or community run, including roads, schools, phone lines, sewage treatment plants and power generation
- the act of competing
- to stop separating groups of people by race, religion, or ethnicity
- the process by which an economy is transformed
- statistical data relating to the population and particular groups within it
- underground layer of permeable rock containing water
- prejudice, discrimination, or antagonism directed against someone of a different race based on the belief that one’s own race is superior
- a long and severe recession in an economy or market
18 Clues: a financial gain • the act of competing • the process by which an economy is transformed • People use their power by choosing representatives • underground layer of permeable rock containing water • a long and severe recession in an economy or market • Power is divided between national and state government • a return to a normal state of health, mind, or strength • ...
Media literacy crossword puzzle 2024-09-01
Across
- -communication outlets or tools are used to store and deliver information or data.
- plan of action to accomplish a specified end
- as a discrete offense, a specific failure to give credit to a particular source.
- -Everything in our environment which can be used to satisfy our needs, provided, it is technologically accessible,
- a set of written sheets of skin or paper or tablets of wood or ivory
- -the quality or state of being able
- important topic or problem for debate
- of, relating to, or characteristic of the present or the immediate past
- belief, custom, rules, art, norms, knowledge developed by a member of all social groups.
Down
- -an electronic communications network that connects computer networks and organizational computer facilities around the WORLD-
- provided or learned about something or someone.
- -utilizing devices constructed or working by the methods or principles of electronics
- -refers to visual images or designs created or displayed on a screen or printed on a physical medium.
- a device that accepts information
- -discipline that is concerned with methods of teaching and learning in schools or school.
- -to know or be aware of things facts, information, and skills acquired by a person through experience or education;
- a step or stage in a process, course, or order of classification
- application of scientific knowledge for practical purposes, especially in industry.
18 Clues: a device that accepts information • -the quality or state of being able • important topic or problem for debate • plan of action to accomplish a specified end • provided or learned about something or someone. • a step or stage in a process, course, or order of classification • a set of written sheets of skin or paper or tablets of wood or ivory • ...
Networking Concept and Cyber Ethics 2025-05-22
Across
- when multiple mismatched copies of a file are stored on different computers, it is called data
- is a legal right granted by law to the creator for his orginal work
Down
- a device that connects two different types of networks with each other
- a network which requires a single communication line or one main cable
4 Clues: is a legal right granted by law to the creator for his orginal work • a device that connects two different types of networks with each other • a network which requires a single communication line or one main cable • when multiple mismatched copies of a file are stored on different computers, it is called data
Crossword 2024-11-04
Across
- The brain of the computer
- The__ time is the total time that a process requires for its overall execution.
- A group of elements of same data type
- The _____ layer takes services from the Network layer and provides services to the Application layer
- a sorting algorithm that uses a divide-and-conquer strategy to efficiently sort lists
- the process of a function calling itself repeatedly till the given condition is satisfied
- _______ is used to delete a whole database or just a table.
Down
- a depth-first search algorithm for a binary search tree that first traverses the left subtree, then the right subtree, and then the root
- Which data structure is based on the Last In First Out (LIFO) principle?
- The capability of a class to derive properties and characteristics from another class is called
- a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to.
- Organized collection of data or information that can be accessed, updated, and managed
- a computer network that connects smaller networks over a large geographic area
- What is the format of %lf
- Which network topology requires a central controller or hub?
- Which element is used for styling Html layout?
16 Clues: The brain of the computer • What is the format of %lf • A group of elements of same data type • Which element is used for styling Html layout? • _______ is used to delete a whole database or just a table. • Which network topology requires a central controller or hub? • Which data structure is based on the Last In First Out (LIFO) principle? • ...
Transportation 2025-10-03
Across
- Modern version of trams, often with separated tracks (e.g., Sydney Light Rail).
- A faster service that skips certain stops/stations.
- Buses provided when a train, tram, or ferry line is closed for maintenance or disruption.
- A geographical area used to calculate fares; travel cost depends on how many zones you cross.
- Long-distance bus service, more comfortable than local buses, often linking regional towns and cities.
- The area beside railway tracks where passengers board or leave a train.
- Urban/suburban rail service, usually operated by state networks (e.g., Sydney Trains, Metro Trains Melbourne).
Down
- Official schedule showing departure and arrival times of buses, trains, ferries, and trams.
- A major hub where passengers can transfer between different modes of transport (e.g., train to bus).
- Road vehicle for local or regional passenger transport; runs on scheduled routes with designated bus stops.
- Passenger boat service, especially common in harbour cities like Sydney and Brisbane.
- A facility where trains stop, usually with platforms, ticketing, and waiting areas.
- Train services connecting cities with surrounding towns and regions (e.g., NSW TrainLink, V/Line in Victoria).
- Temporary interruption or change to normal services (e.g., delays, cancellations, maintenance works).
- Rail vehicle running on tracks along city streets; iconic in Melbourne.
- A designated place where buses, trams, or ferries pick up and drop off passengers.
16 Clues: A faster service that skips certain stops/stations. • Rail vehicle running on tracks along city streets; iconic in Melbourne. • The area beside railway tracks where passengers board or leave a train. • Modern version of trams, often with separated tracks (e.g., Sydney Light Rail). • ...
Quarterly Crossword 2020-02-19
Across
- Reporting that enables the accessibility of health care networks to be accurately measure based on the geographic locations of health care providers relative to those of the members being served.
- An expression of dissatisfaction logged by a member, a member's authorized representative or a provider concerning the administration of the plan and/or services received.
- Optum Idaho is committed to this.
- Projects designed to achieve, through ongoing measurements and intervention, significant improvement sustained over time.
- How do we know if services are benefiting members?
- A serious, unexpected occurrence involving a member that is believed to represent a possible Quality of Care Concern on the part of the provider or agency providing services, which has, or may have, detrimental effects on the member
- How do we know how members are feeling about the services they receive?
Down
- Quality of Care
- Quality of Service
- How is the member satisfaction survey completed?
- Optum requires that network providers adhere to specific access standards for this.
- Tool used to measure member and provider satisfaction
- Optum Idaho measures this on a continual basis to ensure the needs of IBHP members and providers are being met.
- Adverse Benefit Determination
14 Clues: Quality of Care • Quality of Service • Adverse Benefit Determination • Optum Idaho is committed to this. • How is the member satisfaction survey completed? • How do we know if services are benefiting members? • Tool used to measure member and provider satisfaction • How do we know how members are feeling about the services they receive? • ...
Kroftan baby 2017-12-08
Across
- a collection of items of the same type stored in a hidden or inaccessible place.
- the energy or mental capacity required to deal with a situation.
- the programs and other operating information used by a computer.
- a small sweet cake, typically round, flat, and crisp
- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
- universal serial bus, a standardized technology for attaching peripheral devices to a computer.
- the part of a computer in which operations are controlled and executed
Down
- a minute area of illumination on a display screen, one of many from which an image is composed.
- a local or restricted communications network, especially a private network created using World Wide Web software
- the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- tools, machinery, and other durable equipment.
- add new material to or regularly update a blog.
- the address of a World Wide Web page.
14 Clues: the address of a World Wide Web page. • tools, machinery, and other durable equipment. • add new material to or regularly update a blog. • a small sweet cake, typically round, flat, and crisp • the energy or mental capacity required to deal with a situation. • the programs and other operating information used by a computer. • ...
AP World- Industrialization Brewing Conflict Worldwide 2023-02-22
Across
- open rebellions against the authorities
- Formed the Indian National Congress movement, which would become important to independence after WWI
- Often lopsided due to areas being cut off from the rest of the world during industrialization, resulting in advanced weaponry being put up against spears, arrows, and leather shields.
- Great Britain sent these, making for a brutal counteroffensive that led to the sepoy bands being crushed
- Often seen as safe valves during industrial slumps and raw material shortages
- The European’s ___ developments catapulted the European’s far ahead in the capacity to wage war
Down
- one of the main causes why the first mutiny occurred in India
- The new industrialization in Europe created ___ among European Powers
- Indian rebellions named after its origins in the ranks of British-trained Indian Soldiers.
- Caused fierce parliamentary debates and press wars
- Indian Soldiers serving under British or European orders
- Began to rapidly advance after the opening of the Suez Canal
- The british changed their goals to ___ due to the violent conflicts being put into question, and therefore expanding railroad networks
- Leaders often lacked ___ in new industrialized nations when it came to dealing with overproduction and unemployment as a result of economic crises
14 Clues: open rebellions against the authorities • Caused fierce parliamentary debates and press wars • Indian Soldiers serving under British or European orders • Began to rapidly advance after the opening of the Suez Canal • one of the main causes why the first mutiny occurred in India • The new industrialization in Europe created ___ among European Powers • ...
Technology 2023-11-06
Across
- having normal biological capability or performance enhanced by or as if by electronic devices
- a form of energy resulting from the existence of charged particles
- a loudspeaker component designed to reproduce very low bass frequencies.
- a solid substance that has a conductivity between that of an insulator and that of most metals, either due to the addition of an impurity or because of temperature effects. Devices made of semiconductors, notably silicon, are essential components of most electronic circuits.
- an apparatus for recording sound, pictures, or data, especially a tape recorder.
- the main means of mass communication
Down
- the technique of making an apparatus, a process, or a system operate automatically
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- materials which have a conductivity between conductors (generally metals) and nonconductors or insulators
- a device by which sound (such as speech) is converted into electrical impulses and transmitted (as by wire or radio waves) to one or more specific receivers
- an object or type of material that allows the flow of charge
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- working or produced by machines or machinery.
- a system for transmitting messages from a distance along a wire, especially one creating signals by making and breaking an electrical connection
- a device that receives television signals and reproduces them on a screen.
15 Clues: the main means of mass communication • working or produced by machines or machinery. • an object or type of material that allows the flow of charge • a form of energy resulting from the existence of charged particles • a loudspeaker component designed to reproduce very low bass frequencies. • ...
Monitoring 2024-11-10
Across
- A notification system that warns administrators of potential security incidents (8 letters).
- The process of collecting logs from multiple sources into a centralized location for analysis (14 letters).
- Alerts generated by network devices to notify administrators of significant events (4 letters).
- A tool used to identify security weaknesses in systems and applications (20 letters).
- The act of examining systems or networks for vulnerabilities or threats (8 letters).
- The process of generating documents that summarize security findings and incidents (9 letters).
Down
- Software designed to detect and remove malicious programs from a computer system (9 letters).
- Isolating potentially harmful files or devices to prevent the spread of malware (10 letters).
- A network protocol that collects IP traffic information for analysis (7 letters).
- A platform that provides real-time analysis of security alerts generated by network hardware and applications (4 letters).
- A standard for automating vulnerability management and compliance checks (4 letters).
- A strategy to prevent sensitive information from being shared or leaked outside the organization (3 letters).
- Long-term storage of logs and data for compliance and future reference (9 letters).
- Security standards or best practices used to evaluate the configuration of systems (10 letters).
14 Clues: A network protocol that collects IP traffic information for analysis (7 letters). • Long-term storage of logs and data for compliance and future reference (9 letters). • The act of examining systems or networks for vulnerabilities or threats (8 letters). • A standard for automating vulnerability management and compliance checks (4 letters). • ...
The Cool Stuffs about Cognitive Science 2024-02-27
Across
- An approach to cognitive science that uses artificial neural networks to model how we think and learn.
- The philosophical idea that our minds consist of two separate substances, soul and body.
- The study of the origins, distribution, social relations, and culture of human beings throughout history.
- Swiss psychologist known for his work in child development and the theory of cognitive development. genetic epistemology
- Philosophy that says we can unlock knowledge through pure reasoning and logic - no sensory experience needed!
- Your brain's mental representation of a class of objects, events, and everyday practices.
- Philosophy that says we learn best through hands-on experiences and sensory adventures—because who needs textbooks when you've got the real world?
Down
- An awareness of one's thought processes and an understanding of the patterns behind them
- American professor and public intellect who is often called the father of modern linguistics; Universal grammar
- Essential molecule that transmits nerve impulses across a synapse.
- Almond-shaped part of the brain involved in emotions such as fear
- Brain’s region for cataloging and storing all our memories
- The brain's logic puzzle, where premises and conclusions come together in forms like "All A are B" and "No A are B"
- The study of language
14 Clues: The study of language • Brain’s region for cataloging and storing all our memories • Almond-shaped part of the brain involved in emotions such as fear • Essential molecule that transmits nerve impulses across a synapse. • An awareness of one's thought processes and an understanding of the patterns behind them • ...
Kaysteban's Wedding 2025-07-06
Across
- Japanese word meaning excuse me/ sorry, etc
- Winner of season eight of Rupaul's Drag Race and star of seasons 1-3 of We're Here
- 697-sided (hexahectaenneacontakaiheptagon) US state often mistaken for a quadrilateral
- National Seashore and bluff where Katie and Esteban got engaged
- Japanese city competing with Tokyo and Hiroshima for the best okonomiyaki
- Skateboard maneuver in which the skater jumps and kicks their skateboard with the heel of their front foot, flipping it along its central axis
- Katie: “Saying rap is overly verbose is like saying ‘there’s too much _____ in this painting’!”
Down
- Track from an animated classic that won the 1990 Oscar for Best Original Song – and features steel drums
- City that is home to the Dirtbags and a blue pyramid
- Planning term for transportation networks navigable by cyclists, pedestrians, trains, and motorized vehicles.
- full-bodied red wine made from thick-skinned grapes
- Former fishing village, now home to a Disney theme park
- Loveable green character who stars in a major Hollywood film and an award-winning Broadway musical
- Character who features in every Smash Bros. game. Famous for their eponymous punch and the stomp-knee combo
14 Clues: Japanese word meaning excuse me/ sorry, etc • full-bodied red wine made from thick-skinned grapes • City that is home to the Dirtbags and a blue pyramid • Former fishing village, now home to a Disney theme park • National Seashore and bluff where Katie and Esteban got engaged • Japanese city competing with Tokyo and Hiroshima for the best okonomiyaki • ...
Texas History crossword 2022-04-22
Across
- a long and severe recession in an economy or market
- business activities designed to plan, price, promote, and direct the flow of a company’s goods and services to consumers or users in more than one nation for a profit.
- the process of increasing the percentage and number of people
- to stop separating groups of people by race, religion, or ethnicity.
- First European to map the coast of Texas
- prohibits racial discrimination in voting.
- the single worldwide computer network that interconnects other computer networks, enabling data and other information to be exchanged.
Down
- the act of competing
- sectors (areas that are distinct from others) that produce goods and services within an economy (EX. the automobile industry; the steel industry)
- space comprising the earth’s atmosphere and the space
- the domestic marketplace for goods and services operating within the borders of and governed by the regulations of a particular country.
- a period of temporary economic decline during which trade and industrial activities are reduced.
- statistical data relating to the population and particular groups within it.
- a form of protest in which demonstrators occupy a place, refusing to leave until their demands are met.
14 Clues: the act of competing • First European to map the coast of Texas • prohibits racial discrimination in voting. • a long and severe recession in an economy or market • space comprising the earth’s atmosphere and the space • the process of increasing the percentage and number of people • to stop separating groups of people by race, religion, or ethnicity. • ...
Networking Concept 2025-05-22
Across
- It means duplication of data at multiple places.
- It is an overall design of a computer that describes how the computer network is configured and what strategies are being used.
- Is a device that is used to connect all the computers.
- It enables two or more computer to share data and resources.
- In this Two or more computer are connected within a small area .
- Used to connect a computer to the available internet connection over the existing telephone lines.
Down
- Can be defined as a group of computers that is linked to share data.
- It means to protect data from unauthorised access.
- Is a means of communication that uses low powered radio waves to transmit the data between device.
- It refers to the layout in which the various components of a network are connected with each other.
- Is a computer network that is mainly created for an individual person and cover a area of less than 10 meter.
- Is used to physically attach a computer to a network so that it can participate in network communication.
- It can handle a large volume of data traffic.
- Is a device that connect two different types of networks with each other.
- Is a larger network and is spread accross a city.
15 Clues: It can handle a large volume of data traffic. • It means duplication of data at multiple places. • Is a larger network and is spread accross a city. • It means to protect data from unauthorised access. • Is a device that is used to connect all the computers. • It enables two or more computer to share data and resources. • ...
BTEC DIT Threats 2026-04-13
Across
- Fraudulent emails or messages pretending to be from a trusted source to steal personal information.
- Overloading a network or server with traffic to make it unavailable to users.
- Malware that locks or encrypts a user’s data and demands payment to restore access.
- Software designed to damage, disrupt, or gain unauthorised access to a computer system.
- Unauthorised access to data as it is being transmitted across a network.
- Trying many password combinations until the correct one is found.
Down
- Watching someone enter sensitive information such as a password to steal it.
- Software that secretly monitors user activity and collects personal data without consent.
- Techniques used to trick users into revealing sensitive information such as passwords.
- Software that automatically displays unwanted adverts, sometimes tracking user behaviour.
- Redirecting users from a legitimate website to a fake one without their knowledge in order to steal personal information.
- A type of malware that attaches itself to files and spreads when those files are opened. It can corrupt or delete data.
- A self-replicating malware that spreads across networks without needing a host file, often slowing down systems.
- A type of malware disguised as legitimate software that tricks users into installing it, allowing attackers access to the system.
14 Clues: Trying many password combinations until the correct one is found. • Unauthorised access to data as it is being transmitted across a network. • Watching someone enter sensitive information such as a password to steal it. • Overloading a network or server with traffic to make it unavailable to users. • ...
Chapter 01 part 02 2017-10-11
Across
- What is a wireless network that provides Internet connections to mobile computers and devices?
- what gesture do you press and hold one finger on an object and then move the finger to the new location?
- In many networks, one or more computers act as a what?
- What entails having the knowledge and understanding of computers, mobile devices, the Internet, and related technologies?
- An electronic device, operating under the control of instructions stored in its own memory, accept data, process the data according to specified rules, produce results, and store the results for future use?
- What gesture do you move two fingers together?
- In a networked environment, each computer on the network can access the what on the network?
Down
- What style of tables does not contain a physical keyboard?
- Some websites support what where you access the media content while it downloads?
- What gesture do you quickly touch and release one finger two times?
- What users use spreadsheet, database, and accounting software?
- Nearly every area of what uses computers?
- What gesture do yo move two fingers apart?
- What gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen?
14 Clues: Nearly every area of what uses computers? • What gesture do yo move two fingers apart? • What gesture do you move two fingers together? • In many networks, one or more computers act as a what? • What style of tables does not contain a physical keyboard? • What users use spreadsheet, database, and accounting software? • ...
Economic sociology (week 4) - Christof 2013-10-16
Across
- Quinn’s term for the industry that her and Viviana Zelizer study
- Process of making a commodity out of something that hadn’t been conceived as a product or service before
- The process of considering alternate ends for scarce means (Robbins)
- Author who discusses the access to professions from a Weberian point of view.
- Polanyi’s view that markets are subordinated to politics, religion, and social relations
- Polanyi: … was planned; planning was not.
- Smith’s idea that wages are a trade-off of wages and prestige implies that employers have to pay a compensating … to motivate somebody to choose the job.
- Central theme of economic sociology that is invoked in Granovetter’s Getting a Job
Down
- The view that norms exist because they are efficient (also referred to as Panglossian).
- How information asymmetry is overcome in Geertz’ bazaar economy.
- Author who, like Titmuss for the case of blood, questions that all things ought to be traded on markets
- Sociologist whose work has to do with cultural, symbolic, normative elements of economic transactions
- Price at the intersection of supply and demand curve in neoclassical economics
- Frank things that the human nature is striving for …
14 Clues: Polanyi: … was planned; planning was not. • Frank things that the human nature is striving for … • Quinn’s term for the industry that her and Viviana Zelizer study • How information asymmetry is overcome in Geertz’ bazaar economy. • The process of considering alternate ends for scarce means (Robbins) • ...
Consumer Behaviour 2017-07-20
Across
- Permanent, ordered divisions in society that is often determined by peoples' income, occupation and education.
- When a need becomes sufficiently pressing so that the consumer seeks immediate satisfaction of the need.
- factors that consider the influence of groups and networks.
- Buying behaviour which aims to avoid post purchase anxiety, often by buying a more expensive and better product.
- The stage in the buyer decision making process where the consumer processes information to arrive at brand choices.
Down
- Buying behaviour characterised by information gathering and considered evaluation of alternatives.
- stage in which buyers make a commitment to buying a product.
- the person who first suggests or thinks of the idea of buying a particular market offer.
- When a consumer feels uneasy (discomfort) about the drawbacks of their chosen brand.
- Consumers participate in brand switching due to range of choices associated with their low involvement purchase.
- A group of people with shared value systems within society.
- When a consumer acknowledges a gap between their current and desired state.
- Buying behaviour where consumers repeatedly purchase the same brand due to familiarity.
- Factors that consider the consumers age, their occupation, economic situation and their lifestyle.
14 Clues: A group of people with shared value systems within society. • factors that consider the influence of groups and networks. • stage in which buyers make a commitment to buying a product. • When a consumer acknowledges a gap between their current and desired state. • When a consumer feels uneasy (discomfort) about the drawbacks of their chosen brand. • ...
Technology Crossword Puzzle 2019-05-20
Across
- (Universal Serial Bus) USB is a hardware interface for up to 127 peripherals that is governed by the USB Implementers Forum (see USB-IF).
- An organization that provides access to the Internet.
- A firewall allows or blocks traffic into and out of a private network or the user's computer.
- An organization that provides access to the Internet.
- Resource Locator) The address that defines the route to a file on an Internet server (Web server, mail server, etc.).
- To store data locally in order to speed up subsequent retrievals
- The hardware design specifies the command format it can follow, and the software instructions in that format tell it what to do
- fundamental display element of an electronic screen or bitmapped image.
Down
- To write and post an entry in a Weblog.
- a large network made up of smaller networks.
- not enough staff or time to do it
- An inhouse website that serves employees only, and most medium-sized and large companies have one
- series of instructions that performs a particular task is called a "program."
- provide a way for the website to recognize you and keep track of your preferences.
- Central Processing Unit, The computing part of the computer.
15 Clues: not enough staff or time to do it • To write and post an entry in a Weblog. • a large network made up of smaller networks. • An organization that provides access to the Internet. • An organization that provides access to the Internet. • Central Processing Unit, The computing part of the computer. • To store data locally in order to speed up subsequent retrievals • ...
Love (fraud) is in the air 2024-02-06
Across
- Email messages that claim to be from a reputable business or organization and deceives individuals into disclosing private personal information
- The "S" in MISP
- "______" is software that my grant a scammer remote access to a computer and collects personal information from member device without their knowledge
- A favorite sweet treat of choice enjoyed by many during this holiday
- Criminals begin “_________ scams” by romancing unknowing victims-to-be, gaining their trust and making promises of love and new lives together.
- A classic flower that symbolizes love
Down
- The "I" in MISP
- "_____________" is the act of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
- A symbol of Valentine’s day - identified by a baby / angel holding a bow and arrow
- The holiday celebrated on February 14th - "________'s Day"
- These are scam attempts that come via text message
- Valentine’s Day revolves around showing "_____" for those you are close to
- The "M" in MISP
- "________" is when Scammers create a "false" or "shadow copy" of a real website, email or phone number which is indistinguishable from the real thing.
14 Clues: The "I" in MISP • The "S" in MISP • The "M" in MISP • A classic flower that symbolizes love • These are scam attempts that come via text message • The holiday celebrated on February 14th - "________'s Day" • A favorite sweet treat of choice enjoyed by many during this holiday • Valentine’s Day revolves around showing "_____" for those you are close to • ...
Computers 2024-07-09
Across
- duplicating text, data, files, or disks, producing two or more of the same file or segments of data.
- a wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- files embedded within online communication channels such as emails, instant messages, or social networks.
- a secret word or phrase that must be used to gain admission to a place.
- occurs when a computer program such as a software application or an operating system stops functioning properly and exits.
- a small device that connects to a computer and allows you to store and copy information.
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software.
Down
- a computer transferring data and generating a hard copy.
- the process of collecting data from one device and sending it to another device.
- a type of data storage device that is used in laptops and desktop computers
- It converts physical documents into digital files that can be stored, edited, and shared electronically.
- eliminating a file, text, or another object from the computer hard drive or other media.
- make a spare copy of data or a disk.
- load (software) into a computer
14 Clues: load (software) into a computer • make a spare copy of data or a disk. • a computer transferring data and generating a hard copy. • a secret word or phrase that must be used to gain admission to a place. • a type of data storage device that is used in laptops and desktop computers • the process of collecting data from one device and sending it to another device. • ...
Cybersecurity Awareness Month - 2023 2023-10-17
Across
- an automatically generated numeric or alphanumeric string of characters that authenticates a user for a single session
- one of the biggest ransomware attacks
- an unwanted software designed to throw advertisements up on your screen, most often within a web browser
- a set of changes to a computer program or its supporting data designed to update, fix, or improve
- a type of security vulnerability that allows attackers to run arbitrary code on a remote machine, connecting to it over public or private networks
- is an authentication method that requires the user to provide two or more verification factors to gain access
Down
- a malware that misleads users of its true intent by disguising itself as a standard program
- a software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user
- designed to detect and destroy computer viruses
- validating the user identity
- will you stop clicking phishing links?
- a self-replicating virus that does not alter files but resides in active memory and duplicates itself
- a type of characters that you should use in your passwords
- harmful software
14 Clues: harmful software • validating the user identity • one of the biggest ransomware attacks • will you stop clicking phishing links? • designed to detect and destroy computer viruses • a type of characters that you should use in your passwords • a malware that misleads users of its true intent by disguising itself as a standard program • ...
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Spies on you, stealing information like passwords and credit card numbers
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- Keeps track of every key you type and sends it to the hacker.
- IF someone is completely _______ they cant be traced.
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
- A group of computers all being controlled by a remote hacker to perform illegal activity.
Down
- Displays ads on your computer. May slow down your computer
- Blocks you from accessing your files until you pay a ransom.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Something used to protect Against Viruses
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
Data 101 Recap 2024-05-30
Across
- Refers to a service that allows data to be stored on remote servers accessed via the internet, providing scalable and flexible storage solutions.
- Information stored and managed within an organisation's own physical infrastructure and servers, rather than on remote servers or in the cloud.
- Information collected from sources outside an organisation.
- Information that is organised in a predefined format, such as databases or spreadsheets, making it easy to search, analyse, and process.
- Something that data can bring to an organisation.
- Information that is generated within an organization.
- Information about other data.
- Information that is accessible to everyone.
Down
- All aspects of online activity, including communication, commerce, entertainment, and information exchange, conducted via digital technologies such as the internet and computer networks.
- Information that is freely available to anyone for use and distribution.
- Network of interconnected devices embedded with sensors, software, and connectivity, enabling them to collect and exchange data for various applications and services.
- Information that is confidential and not intended to be publicly disclosed.
- Information that lacks a predefined format, such as text documents, images, videos, and social media posts, making it more complex to analyse and process.
- Laws or rules enacted by a governing body.
14 Clues: Information about other data. • Laws or rules enacted by a governing body. • Information that is accessible to everyone. • Something that data can bring to an organisation. • Information that is generated within an organization. • Information collected from sources outside an organisation. • Information that is freely available to anyone for use and distribution. • ...
iPay Puzzle 2024-05-17
Across
- Marketing of goods or services by means of telephone calls
- commercial transactions conducted electronically on the internet.
- the digital innovation arm of the Inteltec Group
- an Emirati start-up that aims to revolutionize the e-commerce industry by streamlining middle-mile package transportation across the GCC.
- provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.
- it makes your interconnection easier.
- monthly issue of latest updates within our company
- He does development, implementation of comprehensive core accounting, budgeting, financial reporting, and regulatory compliance
Down
- a GCC leading company in engineering and realization of Telecom Networks and Systems.
- provides employers with a digital solution that allows their employees to access their earned income instantly, even before the regular payday.ne Stop Shop For E-Payment Solutions
- Provider of delivery services to ensure packages reach their destination seamlessly.
- Leveraging the support of a family business group, strategically partner with visionary entrepreneurs to craft the next wave of out-of-this-world startups.
- A global conference that covers the latest trends, market disruptors and technologies shaping the digital commerce world
- It's a set of strategies and techniques used to improve the visibility of a website
14 Clues: it makes your interconnection easier. • the digital innovation arm of the Inteltec Group • monthly issue of latest updates within our company • Marketing of goods or services by means of telephone calls • commercial transactions conducted electronically on the internet. • It's a set of strategies and techniques used to improve the visibility of a website • ...
types of crime 2025-12-04
Across
- offences committed by organisations, usually in the pursuit of profit for the company rather than the benefit of individuals.
- theft or intentional damage to things owned by an individual, group or organisation.
- offences which damage the natural world, with resulting harm to humans, other living things and the environment.
- criminal activities carried out by a group of (often young) people, who have a territory and a defined leadership and internal organisation.
- offences which have a clear goal. For example may include theft or burglary.
- involves the use or threat of physical force which will harm the victim.
Down
- non-violent crime committed by middle class people for financial gain.
- offences in which the victim is targeted because of a certain characteristics, related to, for example age, faith, sexuality or race.
- any crime or illegal activity committed on through or using the internet.
- crime involving use of new technologies.
- criminal activities which are planned and carried out by powerful groups.
- offences in which the offender and the victim live in the same family home or are in a relationship.
- offences involving emotions, which are usually unplanned.
- offences which are worldwide, involving international networks.
14 Clues: crime involving use of new technologies. • offences involving emotions, which are usually unplanned. • offences which are worldwide, involving international networks. • non-violent crime committed by middle class people for financial gain. • involves the use or threat of physical force which will harm the victim. • ...
Week 1 Puzzle 2020-08-25
Across
- This is an example of "something you know"--one of the key factors in MFA.
- Approximately $6 trillion is planned on being spent on this by 2021.
- General term for the type of device most often connecting to public WiFi.
- This is a type of malware that threatens to publish the victim's data or perpetually block access to it unless the victim pays money.
- Globally, one of these attacks every 39 seconds.
- By 2025, there will be an estimated 75 billion of these devices connected to the internet.
- 95% of cybersecurity breaches involve this type of error.
Down
- Any incident that results in unauthorized access to computer data, applications, networks or devices.
- The most dangerous type of WiFi.
- This is an example of "something you are"--one of the key factors of MFA.
- This typically is a 4 or 6 digit password used to lock/unlock a mobile device.
- To increase your personal internet security, consider turning off the "save password" feature in this.
- 93% of these organizations have experienced a data breach within the past 3 years.
- Software that is created specifically to help detect, prevent and remove malicious software.
14 Clues: The most dangerous type of WiFi. • Globally, one of these attacks every 39 seconds. • 95% of cybersecurity breaches involve this type of error. • Approximately $6 trillion is planned on being spent on this by 2021. • This is an example of "something you are"--one of the key factors of MFA. • ...
Digital Literacy-Kavon 2024-06-13
Across
- Blocks you from accessing your files until you pay a ransom.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Spies on you, stealing information like passwords and credit card numbers
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Keeps track of every key you type and sends it to the hacker.
- Something used to protect Against Viruses
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
- Displays ads on your computer. May slow down your computer
- IF someone is completely _______ they cant be traced.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- A group of computers all being controlled by a remote hacker to perform illegal activity.
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
Digital-Literacy-Kavon Stewart 2024-06-14
Across
- Blocks you from accessing your files until you pay a ransom.
- Looks like some good software, but turns out to be infected. Often opens security holes for hacker to get access to your computer.
- Distributed Denial of Service. Usually uses a botnet to overwhelm a server/website so that nobody else can access it.
- Spies on you, stealing information like passwords and credit card numbers
- Tries to trick you into telling your passwords or credit card info. Usually Through Phone or Email.(Nigerian Prince)
- Keeps track of every key you type and sends it to the hacker.
- Something used to protect Against Viruses
- Reads everyone’s data that is passing through a network. Usually on public WiFi.
Down
- Displays ads on your computer. May slow down your computer
- IF someone is completely _______ they cant be traced.
- When someone gets your personal info and then does things pretending to be you.
- Spreads through networks and emails infecting as many computers as possible. Get it through email.
- Spreads between files on your computer, ruining them or your computer. Get it by downloading or running infected files
- A group of computers all being controlled by a remote hacker to perform illegal activity.
14 Clues: Something used to protect Against Viruses • IF someone is completely _______ they cant be traced. • Displays ads on your computer. May slow down your computer • Blocks you from accessing your files until you pay a ransom. • Keeps track of every key you type and sends it to the hacker. • Spies on you, stealing information like passwords and credit card numbers • ...
travel, communication, airplane, news, letter, text message, e-mial, radio, internet,boat,bus, motorcycle. cable car, truck, horse 2024-10-17
Across
- small wheel or roller, specifically the wheel of a gun-carriage.(N)
- message:A brief electronic message sent between mobile phones.(N)
- powered heavier-than-air aircraft with fixed wings.(N)news:New information of interest. (N)
- An open-seated motor-powered vehicle with two wheels.(N)
- A craft used for transportation of goods, fishing, racing, recreational cruising, or military use on or in the water, propelled by oars or outboard motor or inboard motor or by wind. (N)
- written or printed communication, generally longer and more formal than a note.(N)
- motor vehicle for transporting large numbers of peoplealong roads.(N)
- A hoofed mammal, of the genus Equus, often used throughout history for riding and draft work.
Down
- Any set of computer networks that communicate using the Internet Protocol. (N)
- concept or state of exchanging data or informationbetween entities.
- To be on a journey, often for pleasure or business and with luggage; to go from one place to another.(V,N)
- car:A streetcar moved by gripping to rotating loop of cable running along the track.(N)
- technology that allows for the transmission of sound or other signals by modulation of electromagnetic waves.(N)
- spelling of email (N)
14 Clues: spelling of email (N) • An open-seated motor-powered vehicle with two wheels.(N) • message:A brief electronic message sent between mobile phones.(N) • concept or state of exchanging data or informationbetween entities. • small wheel or roller, specifically the wheel of a gun-carriage.(N) • motor vehicle for transporting large numbers of peoplealong roads.(N) • ...
Computing Careers Group Members Name: 2022-05-06
Across
- __________________ create systems to protect information networks and websites from cyber attacks and other security breaches.
- __________________ is considered to be one of the most widely recognized forces affecting work and how it is changing.
- As a ____________________ you are responsible for creating new programs for an organization.
- _________________ are responsible for designing, developing, and testing computer components, such as circuit boards, routers, and memory devices.
- They develop and improve the data resources used to store and retrieve critical information.
- Individuals who watch over a team of programmers and analysts to complete projects.
Down
- ______________ analyze a company's technology needs and oversee the implementation of appropriate data systems.
- _________________assess an organization's computer systems and recommend changes to hardware and software to improve the company.
- which team installs new software, troubleshoots, and repairs software problems
- Which department in an organisation is responsible for the hardware software and network of computers in a company
- __________________design, implement, and maintain networking and data communication systems.
- ____________________ invent technology that solves complex problems in fields like science, medicine, and business.
- They need to be fluent in the computer languages that are used to write the code for programs.
- Communication Skills and broad knowledge of technology and computer systems help computer science individuals excel in this role.
- Who creates Websites
15 Clues: Who creates Websites • which team installs new software, troubleshoots, and repairs software problems • Individuals who watch over a team of programmers and analysts to complete projects. • __________________design, implement, and maintain networking and data communication systems. • ...
CS Principles 2022 2022-04-22
Across
- Spotify adds a ___ layer to streamed songs which prevents their subscribers from listening to the songs anywhere besides Spotify apps.
- A baked good. Also something that tracks information about a user visiting a website.
- A __ license is used when an author wants to give other people the right to share, use, and build upon a work that the author has created.
- The bandwidth of a computer network is the maximum amount of ____ that can be sent in a fixed amount of time.
- Gives the creator legal rights to determine whether their work can be copied and under what conditions
- Algorithms with exponential or factorial efficiencies are examples of algorithms that run in a(n) ___ amount of time
- ROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise
- For example, a = b evaluates to ____ if a and b are equal
- A rogue Access Point is a ____ access point that gives unauthorized access to secure networks
Down
- Analog data are values that change ____ , rather than in discrete intervals, over time.
- unscrambling data
- The protocols used in the Internet are ___
- JPG images use a ___ compression technique
- Dynamic routing allows for ____ of the Internet
- wikipedia is an example of ____ because many online users combine their efforts
- A protocol is an agreed upon set of ____ that specify the behavior of a system.
16 Clues: unscrambling data • The protocols used in the Internet are ___ • JPG images use a ___ compression technique • Dynamic routing allows for ____ of the Internet • For example, a = b evaluates to ____ if a and b are equal • ROTATE_RIGHT() makes the robot rotates in place __ degrees clockwise • ...
Revision : Marketing Analytics 2025-01-04
Across
- ________ data is measured as whole numbers: 1, 2, 3, ..
- networks _______ are algorithms that are trained to recognize patterns in data that are non-linear.
- _________ measures the frequency of the specific association rule.
- language processing (NLP) ________ is a branch of artificial intelligence (AI) used to identify patterns by reading and understanding meaning from human language.
- data includes text, images, videos, and sensor data.
- learning _________uses an algorithm to build neural network models that classify or predict target variables.
- Market basket analysis, sometimes referred to by marketers as _________ discovery, uses purchase transaction data to identify associations between products or combinations of products and services that occur together frequently.
Down
- ______ analytics is used to build models based on the past to explain the
- The ________ algorithm is used to calculate frequently co-occurring items in a transaction dataset.
- learning _______ is a statistical method of learning that can be trained without human intervention to understand and identify
- ______ data analysis provides a summary of the main characteristics within the data.
- _________ data is made up of records that are organized in rows and columns.
- between previously established variables.
- _______ data exist when values are selected from a group of categories
- ___________ is a situation where the predictor variables are highly correlated with each other.
- In the _________ layer, the model arrives at a prediction.
16 Clues: between previously established variables. • data includes text, images, videos, and sensor data. • ________ data is measured as whole numbers: 1, 2, 3, .. • In the _________ layer, the model arrives at a prediction. • _________ measures the frequency of the specific association rule. • _______ data exist when values are selected from a group of categories • ...
Myles Osborne AI Cybersecurity Word Search 2025-03-08
Across
- The use of largely automatic equipment in a system of operation or production.
- in Science
- Society: A concept that refers to a society increasingly preoccupied with the future and safety, generating the notion of risk.
- The practice of protecting systems, networks, and programs from digital attacks.
- Intelligence: The simulation of human intelligence processes by machines, especially computer systems.
- Inclination or prejudice for or against one person or group, especially in a way considered to be unfair.
- The state of not being equal, especially in status, rights, and opportunities.
- The belief that every problem has a solution, especially technological solutions to societal issues.
- The process by which individuals become more concerned with their own lives and identities rather than traditional societal roles.
Down
- The fact or condition of being accountable; responsibility.
- The quality of being done in an open way without secrets.
- Reliance on the integrity, strength, ability, or surety of a person or thing; confidence.
- The ability to recognize forces of socialization and alter one's place in the social structure.
- in Science
- A rule or directive made and maintained by an authority.
- The process by which businesses or other organizations develop international influence or start operating on an international scale.
- Moral principles that govern a person's behavior or the conducting of an activity.
17 Clues: in Science • in Science • A rule or directive made and maintained by an authority. • The quality of being done in an open way without secrets. • The fact or condition of being accountable; responsibility. • The use of largely automatic equipment in a system of operation or production. • ...
IT Jobs and Responsibilities Vocabulary 2023-05-25
Across
- They may also build software to complete recent activities, perform old ones or send data more effectively and efficiently.
- They can work on operating systems, video games, middleware, commercial applications or network control systems.
- Their goal is to keep hackers out of a company's or organisation's computer system to protect data.
Down
- They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop.
- manage the daily operations of computer networks.
5 Clues: manage the daily operations of computer networks. • Their goal is to keep hackers out of a company's or organisation's computer system to protect data. • They may also analyse and rectify any disruptions or faults in the code regularly or as challenges develop. • ...
Introduction to Internet 2013-10-06
Across
- a technology which allows to interact via two way video and audio transmission simultaneously .
- a unique address of every page on internet.
- An online process that involves instant text messaging between two or more users.
- A link that allows the user to visit websites without typing new address.
- A new development in the field of Internet which allows the user to access information without the use of a telephone line.
- Microsoft Internet Explorer and Google Chrome are examples of a software called.
- a company that provides individuals and other companies to access the internet.
- a language used to create web pages .
Down
- A network of networks
- another name for `online shopping` which is a new concept of purchasing goods sitting at home.
- is an example of transferring large amounts of data across the internet.
- The first network that came into existence.
- A collection of computers that are linked together.
- The first page of particular website displayed by the web browser.
- an electronic device which converts analog signals to digital signals and vice/versa.
- A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
- A collection of one or more related web pages linked with one another to form a global web of information.
- A method of communication in which one can accept, forward, delivers and stores messages digitally.
18 Clues: A network of networks • a language used to create web pages . • The first network that came into existence. • a unique address of every page on internet. • A collection of computers that are linked together. • The first page of particular website displayed by the web browser. • is an example of transferring large amounts of data across the internet. • ...
Introduction to Internet 2013-10-06
Across
- a company that provides individuals and other companies to access the internet.
- A collection of pages of information on different topics on Internet which may include text, images, sound and digital movies.
- another name for `online shopping` which is a new concept of purchasing goods sitting at home.
- is an example of transferring large amounts of data across the internet.
- An online process that involves instant text messaging between two or more users.
- A collection of computers that are linked together.
- The first page of particular website displayed by the web browser.
- A method of communication in which one can accept, forward, delivers and stores messages digitally.
- a language used to create web pages .
Down
- a technology which allows to interact via two way video and audio transmission simultaneously .
- Microsoft Internet Explorer and Google Chrome are examples of a software called.
- A new development in the field of Internet which allows the user to access information without the use of a telephone line.
- A link that allows the user to visit websites without typing new address.
- A collection of one or more related web pages linked with one another to form a global web of information.
- The first network that came into existence.
- A network of networks
- an electronic device which converts analog signals to digital signals and vice/versa.
- a unique address of every page on internet.
18 Clues: A network of networks • a language used to create web pages . • The first network that came into existence. • a unique address of every page on internet. • A collection of computers that are linked together. • The first page of particular website displayed by the web browser. • is an example of transferring large amounts of data across the internet. • ...
Assignment 6 - Activities 2016-02-21
Across
- a hypertext document connected to the World Wide Web; 2 words
- type of communication where both sender and receiver are active at same time
- using neutral rather than subjective language; 2 words
- computer or program that manages access to a centralized resource in a network
- companies that sell connection to the internet; abbreviated
- a group of information on a computer that can be software programs or data
- the exclusive legal right, given to an originator to print, publish, film, etc. and to authorize others to do the same
- use of a computer to gain unauthorized access to data in a system
Down
- an auxiliary memory to store data from which high-speed retrieval is possible
- a related group of networked computers
- used to view web pages and navigate between them via hyperlinks; 2 words
- the Internet is primarily this type of communication system
- files that can be embedded in web pages and displayed by a browser
- legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights' holders; 2 words
- a system or program that allows the user to edit text; 2 words
- person successfully masquerades as another by falsifying data
- the main technology for local area networks such as connecting all computers in a lab or building
- the codes or tags that browsers use to create web pages
18 Clues: a related group of networked computers • using neutral rather than subjective language; 2 words • the codes or tags that browsers use to create web pages • the Internet is primarily this type of communication system • companies that sell connection to the internet; abbreviated • a hypertext document connected to the World Wide Web; 2 words • ...
easy 2024-04-04
Across
- a type of network where anyone can connect without authentication, often found in cafes, airports, etc.
- Method of protecting your accounts with more than one form of authentication.
- A scam where attackers impersonate someone from within the organization to trick employees into sending money or sensitive information.
- A method of encrypting data during transmission over a network, often used in public networks to enhance security.
Down
- Technique used to erase visible data from the screen to prevent unauthorized access.
5 Clues: Method of protecting your accounts with more than one form of authentication. • Technique used to erase visible data from the screen to prevent unauthorized access. • a type of network where anyone can connect without authentication, often found in cafes, airports, etc. • ...
Brain Plasticity 2026-03-10
Across
- The long-lasting strengthening of the synaptic connections of neurons resulting in the enhanced functioning of the neurons.
- Involves existing neurons forming new axon terminals and dendrites to allow new connections to be made.
- Changes in the structure and function of neural networks in the brain as a result of experience, learning, memory and damage to the brain (trauma).
Down
- Growth of new synaptic connections between neurons
- The long-lasting decrease in the strength of synaptic transmission.
5 Clues: Growth of new synaptic connections between neurons • The long-lasting decrease in the strength of synaptic transmission. • Involves existing neurons forming new axon terminals and dendrites to allow new connections to be made. • The long-lasting strengthening of the synaptic connections of neurons resulting in the enhanced functioning of the neurons. • ...
CYBERSECURITY - PHISHING 2021-12-01
Across
- phishing emails may contain _____ to Malicious websites
- Email scam or attempt to trick you into giving your password or personal information
Down
- consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
- Someone who seeks and exploits weaknesses in a computer system or computer network.
4 Clues: phishing emails may contain _____ to Malicious websites • Someone who seeks and exploits weaknesses in a computer system or computer network. • Email scam or attempt to trick you into giving your password or personal information • consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
ICT terminology 2013-09-03
Across
- world wide web
- Uniform resource locator. A ______ is the address of a specific Web site or file on the Internet
- Web browser is the program people use to access the World Wide Web
- media _______ is a collection of Internet-based communities
- Short for Wireless Fidelity.
- an Internet _________ acts as a marker for a Web site.
- ____________ can locate relevant Web sites when users enter search terms or phrases
- The _________ is the primary user interface of a computer
- an avatar specifically refers to a character that represents an online user.
- the _______ spreads across the globe and consists of countless networks and computers, allowing millions of people to share information
Down
- address it is another word for url
- The mouse cursor is most often an arrow that you can use to point to different objects on your screen
- The term ________ is often used synonymously with "computer screen" or "display
- Originating from the name of Hormel's canned meat, now also refers to junk e-mail or irrelevant postings
- A smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages
- Short for Web Log
- the group of letters you have to type in before you can log into a website.
- Information communication technology. ICT refers to technologies that provide access to information through telecommunications
18 Clues: world wide web • Short for Web Log • Short for Wireless Fidelity. • address it is another word for url • an Internet _________ acts as a marker for a Web site. • The _________ is the primary user interface of a computer • media _______ is a collection of Internet-based communities • Web browser is the program people use to access the World Wide Web • ...
INQUSITIVE 2020-11-01
Across
- a printed circuit board containing the principal components of a computer or other device.
- This was invented in Germany around 1440 by Johannes Gutenberg.
- The _________ is the movement that happens as a result of the INPUT.
- This is a magnet made by an electric current. It usually has an iron core.
- Is a common type of network cable used with wired networks
- The first ever programming language developed.
- Technical word for 'stretching' liquid aluminium.
- A programming error that causes a program to behave in an unexpected way.
Down
- First mobile robot capable of reasoning about it's surrounding.
- The branch of technology that deals with the design, construction, operation, and application of robots.
- A program on a computer that tells it how to communicate with an add-on piece of equipment
- A wheel used for pulling or raising a weight
- use of computer programs to create 2D or 3D graphical representations of the real product.
- A circuit in which all parts are connected end to end to provide a single path of current.
- This was first discovered in the 1930s with the first operational plant coming in the 1950s.
- Thomas Edison is credited with designing this in 1879.
- Pivot point around which a lever turns
- The generic word for an application, document, control panel, or other computer data.
18 Clues: Pivot point around which a lever turns • A wheel used for pulling or raising a weight • The first ever programming language developed. • Technical word for 'stretching' liquid aluminium. • Thomas Edison is credited with designing this in 1879. • Is a common type of network cable used with wired networks • ...
legal terms - general 2022-05-05
Across
- power networks
- an annual plan by Congress to spend more than it collects in tax revenues
- the total of all prior spending by all Congresses in the past that spent in excess of revenues
- what political leaders who want the Supreme Court to only follow a strict and historically narrow interpretation of the Constitution and the powers of the judiciary prefer
- powers given to Congress to have individuals give evidence
- the leaders of Congress who have the duty of connecting the House and Senate leaders to the regular members
- members of Congress are expected to work for their party affiliation
- votes by Congress to allow the old budget to continue before the new one is voted upon
Down
- what happens when a president refuses to sign a bill during the last 9 days of a Congressional session
- Senate de-facto leader
- members of Congress expected to serve the needs of their constituents
- amendments attached to bills that do not pertain to the main goal of the bill
- Congress’ main method of controlling the power of the bureaucratic agencies
- removing a federal official from office
- a leader awaiting their replacement
- rules that are usually applied in floor debates to make the system move a little quicker
- members of Congress trying to be both representatives and policymakers
- when a president uses powers like executive orders, the “Bully-Pulpit”, and “war-making”
18 Clues: power networks • Senate de-facto leader • a leader awaiting their replacement • removing a federal official from office • powers given to Congress to have individuals give evidence • members of Congress are expected to work for their party affiliation • members of Congress expected to serve the needs of their constituents • ...
Tyson S. 2024-01-09
Across
- data about data
- An agreed-upon set of rules that specify the behavior of some system
- representing information using only two options
- an ordered collection of elements
- any data that are sent from a program to a device. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
- computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- a written description of how a command or piece of code works or was developed.
- a named reference to a value that can be used repeatedly throughout a program.
- an ordered sequence of characters
- representing information using ten options.
- maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
Down
- the practice of obtaining input or information from a large number of people via the Internet
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- Value a data type that is either true or false
- an individual value in a list that is assigned a unique index
- the process of accessing each item in a list one at a time.
- 8 bits
- data that are sent to a computer for processing by a program. Can come in a variety of forms, such as tactile interaction, audio, visuals, or text.
18 Clues: 8 bits • data about data • an ordered collection of elements • an ordered sequence of characters • representing information using ten options. • Value a data type that is either true or false • representing information using only two options • the process of accessing each item in a list one at a time. • an individual value in a list that is assigned a unique index • ...
CROSSWORD INTEGRATION on ICT 2024-09-29
Across
- This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
- It refers to the physical components of a computerthat you can touch and see
- These devices display or output data from a computer
- This software helps manage a company's interactions with current and potential customers
- This is harmful software designed to damage or disrupt systems
- It involves organizing and maintaining data processes efficiently
- This type of software helps users perform specific tasks like writing or calculating
- This is a set of instructions that tells a computer how to perform tasks
- It involves protecting computers and networks from unauthorized access or attacks
- It integrates core business processes into a single system
Down
- This allows users to store and access data over the internet instead of local hardware
- These devices allow users to enter data into a computer
- It manages the hardware and software resources of a computer system
- This is a security system that controls the incoming and outgoing network traffic
- It refers to the unauthorized access or manipulation of computer systems
- It secures access to systems or information using a secret combination of characters
- This includes all technologies used to handle telecommunications, broadcasting, and information systems
- It involves encoding information so that only authorized parties can understand it
18 Clues: These devices display or output data from a computer • These devices allow users to enter data into a computer • It integrates core business processes into a single system • This is harmful software designed to damage or disrupt systems • It involves organizing and maintaining data processes efficiently • ...
Tech Puzzle Showdown 2025-04-11
Across
- Most commonly used tool for automating web browsers
- A meeting held at the end of a sprint to discuss what went well, what didn't, and how to improve.
- High Level Web Framework that encourages rapid development and clean, pragmatic design
- World's leading customer relationship management (CRM) platform
- A signal that temporarily halts the CPU to handle events.
- A mechanism where one class acquires the properties and behaviors of another class
- A cloud-based data warehousing platform
- Practice of protecting systems, networks, and data from digital attacks, unauthorized access, and damage
- A tool for API testing
Down
- An architectural style that structures an application as a collection of loosely coupled services
- A decentralized digital ledger that securely records, stores, and verifies data across a network of computers
- Open-source operating system that is widely used for its stability, security, and flexibility
- A measure of the amount of work a team can complete in a single sprint
- The oldest high-level programming language that is still in use today
- Programming language that is known for its use in data analysis and machine learning
- A game engine for developing 2D and 3D games.
- Open-source and NoSQL database designed for handling large volumes of data
- A command line interface and programming language that lets users interact with a computer's operating system
18 Clues: A tool for API testing • A cloud-based data warehousing platform • A game engine for developing 2D and 3D games. • Most commonly used tool for automating web browsers • A signal that temporarily halts the CPU to handle events. • World's leading customer relationship management (CRM) platform • The oldest high-level programming language that is still in use today • ...
AWS Services All 2025-05-08
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources
- A managed distributed streaming platform often compared to Apache Kafka.
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka. • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
Cybersecurity Fundamentals Chapter 8 2022-11-08
Across
- US government repository of standard-based vulnerability management data that uses the Security content automation protocol (scap).
- poorly enforced security policies, no awareness of security
- the little voice in the background guiding a cybersecurity security as to do what he/she should or should not do, regardless of whether it is legal.
- open source linux security distribution.
- disable ping, probing and port scanning to prevent unauthorized network probing and port scanning.
- a method of testing the areas of weakness in systems by using various malicious techniques.
- includes the users who access the organization's information system.
Down
- assess computer, computer systems, networks, or applications for weakness.
- a non-profit organization that brings together industry, academia and government to address advance cyber threats.
- a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry.
- laws prohibit undesired behaviors.
- intercept and log network traffic
- provides free analysis and warning service to internet users and organizations.
- help to resolve software vulnerabilities and develops tools, products, and methods to conduct forensic examinations.
14 Clues: intercept and log network traffic • laws prohibit undesired behaviors. • open source linux security distribution. • poorly enforced security policies, no awareness of security • includes the users who access the organization's information system. • assess computer, computer systems, networks, or applications for weakness. • ...
Show How Much You Know About Social Engineering 2025-09-04
Across
- Cybercriminals use social engineering to get users to share confidential information or download this.
- A human firewall knows how to identify these by staying alert for warning signs and thinking before clicking or responding.
- A "Level 2: Apprentice" password mixes uppercase and lowercase, and adds these.
- The attacks used by cybercriminals often rely on deception and manipulation to scam people out of money or information.
- The highest defense rating for passwords is "____"
- A single compromised password can put your organization's security and personal information at ____.
- This is a common way cyber villains get into computer networks.
Down
- This password level uses simple passwords and the same password for every account.
- The password defense rating for a "Level 1: Beginner" is "____".
- An additional authentication method that uses a one-time code is recommended for a "Level 3: Legendary" password.
- The name of the character that uses "convince" and "impersonate" attacks.
- The human firewall manifesto recommends using this for every account.
- Cybercriminals rely on being able to convince users to click on these.
- The human firewall manifesto states that people, not this, are the backbone of any security infrastructure.
14 Clues: The highest defense rating for passwords is "____" • This is a common way cyber villains get into computer networks. • The password defense rating for a "Level 1: Beginner" is "____". • The human firewall manifesto recommends using this for every account. • Cybercriminals rely on being able to convince users to click on these. • ...
Bruin AI Crossword Puzzle Week 10 2023-12-04
Across
- The mental process of acquiring knowledge and understanding through thought, experience, and the senses.
- Principles of right and wrong governing the conduct of individuals and organizations, particularly important in AI and technology
- The inclination or prejudice for or against something, often influencing decision-making and algorithms.
Down
- A supervised learning algorithm used in training artificial neural networks.
- The process of making something as effective or functional as possible, often used in the context of algorithms and models.
5 Clues: A supervised learning algorithm used in training artificial neural networks. • The mental process of acquiring knowledge and understanding through thought, experience, and the senses. • The inclination or prejudice for or against something, often influencing decision-making and algorithms. • ...
Chapter 5- SALTING 2022-09-10
Across
- It is the process of translating a random phrase into a code
- It is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks
- It is the act of entering as many passwords or passphrases as possible until eventually is guessing your password correctly
Down
- It is a string of characters used to verify the identity of a user during the authentication process
- It is adding on purpose more characters
5 Clues: It is adding on purpose more characters • It is the process of translating a random phrase into a code • It is a string of characters used to verify the identity of a user during the authentication process • It is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks • ...
11.5 Vocab 2023-03-30
Across
- Allows devices to connect in a PAN
- The user might be prompted to agree to the terms and conditions of using the network or even asked to pay a fee before being granted internet access
- combines two, non-overlapping 20 MHz channels into a single 40 MHz channel
- used with the WPA and WPA2 wireless security standards
- a network that uses a PSK and an appropriate encryption protocol, such as Wi-Fi Protected Access 2 (WPA2) or Wi-Fi Protected Access 3 (WPA3)
- increases bandwidth by using multiple antennas for both the transmitter and receiver
- developed by Cisco to address security concerns in RADIUS
- a key component of windows active directory
- a standard for local area networks created by IEEE-SA
Down
- a network that requires no authentication to connect to and is used in public
- introducd in 2018, and update to WPA2
- an open standard protocol used to authenticate users onto a network
- A communication method used on cards with a range of 2 inches
- the most commonly used access method
- introduced in 2004, a wireless security service
- an enhancement to MIMO that allows multiple users to use the same channel
- Data encryption protocol that uses 128,192,256 bits and encrypts in 128bit chunks
- uses radio waves to transmit data from small circuit boards called RFID tags to special scanners
18 Clues: Allows devices to connect in a PAN • the most commonly used access method • introducd in 2018, and update to WPA2 • a key component of windows active directory • introduced in 2004, a wireless security service • a standard for local area networks created by IEEE-SA • used with the WPA and WPA2 wireless security standards • ...
test 2023-09-12
Across
- Equivalent ot EU Data Protection Bill in India
- These attacks target vulnerabilities in software or hardware that are not yet known to the developer.
- A digital form of social engineering to deceive individuals into providing sensitive information
- The process of transforming plaintext into ciphertext
- Old way of breaking phone
- Computer Malicious Program
- attack that fools users into thinking they are clicking on one thing when they are actually clicking on anothe
- in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source Vulnerablity
Down
- Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
- secure online service that allows users to connect remotely to another network
- spyware software that records every keystroke made on a computer’s keyboard
- security framework that controls access to computer resources, enforces policies, and audits usage
- algorithms to create convincing fake videos or audio recordings
- Attackers leave infected USB drives in public places, hoping that curious individuals will plug them into their computers
- type of spear phishing that targets high-profile individuals within an organization, typically CEOs or other top executives
- type of attack which uses a fraudulent server with a relay address
- model that forms the basis for the development of security systems
- A capability to limit network traffic between networks and/or information systems
18 Clues: Old way of breaking phone • Computer Malicious Program • Equivalent ot EU Data Protection Bill in India • The process of transforming plaintext into ciphertext • algorithms to create convincing fake videos or audio recordings • type of attack which uses a fraudulent server with a relay address • model that forms the basis for the development of security systems • ...
AWS Services 2025-04-15
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces.
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data.
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources.
- A managed distributed streaming platform often compared to Apache Kafka
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
cyber security 2017-06-30
3 Clues: malicious code • spreads through the inbox and makes a copy of itself • practical networks to send copies of the original code to other computers
Entrepreneurship crosswordpuzzle 2020-09-23
Across
- it is a combination of two companies into one larger company.
- strategy, a process that can allow an organisation to concentrate its resources on the optimal opportunities.
- display of information about the product on its container, packaging or the product.
- it helpps thousands of individuals to be their own boss and own operate their own business.
- a brand or a part of a brand that is given legal protection against its use by another firms.
- a corporate action in which a company buys most if not all of the target company's ownership stakes in order to assume control of the target firm
- symbol of product/ services of the company.
Down
- business making use of social networks to communicate with customers is called.
- the combined value of the merging firm exceeds the individual value of the merged firms.
- its is a delberate , planned and sustained effort to establish and maintain mutual understanding between an organisation and stakeholders.
- most important element of marketting mix.
- 4th element of marketing mix and refers to all activities undertaken to make the product known to the customer.
12 Clues: most important element of marketting mix. • symbol of product/ services of the company. • it is a combination of two companies into one larger company. • business making use of social networks to communicate with customers is called. • display of information about the product on its container, packaging or the product. • ...
krizaljka_sp 2021-05-16
Across
- VECTOR PROTOCOL Protocol that determines the best path based on information about how far the packet destination is.
- Protocol establishes a connection between computers before sending data
- Protocols used to exchange information about networks between autonomous systems.
- Protocols used to determine the best routes to a destination within the same autonomous system.
- Type of OSPF packet that contains a list of neighbors of the router sending the packet
- Examples of IGP protocol
Down
- PROTOCOLS Protocols that do not send a network mask when exchanging information between routers.
- possibility of upgrading, ie how many routers can be in the network without disturbing the required convergence time
- STATUS PROTOCOL Protocol that works in such a way that each router knows the network topology and does not send the entire routing table, but all routers send only information about the state of connections in the form of small LSA (Link State Advertisement) packets.
- Protocol sends data directly to a specific computer without checking whether the system is ready to receive or not
- The layer is responsible for reliable data transfer between devices
- Example is the EEA protocol.
12 Clues: Examples of IGP protocol • Example is the EEA protocol. • The layer is responsible for reliable data transfer between devices • Protocol establishes a connection between computers before sending data • Protocols used to exchange information about networks between autonomous systems. • ...
Industrial Revolution 2023-05-10
Across
- An economic concept that states that the price of a good rises and falls depending on how many people want it
- An increase in the percentage and in the number of people living in urban settlements.
- A system in which society, usually in the form of the government, owns and controls the means of production.
- Development of a system which supports machine production of goods
- Individuals who start new businesses, introduce new products and improve management techniques
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
Down
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- A belief that ultimate power resides in the people.
- An economic system based on private ownership of capital
- A belief that limited government insures order competitive markets and personal opportunity.
- A belief that the government can and should achieve justice and equality of opportunity.
12 Clues: A belief that ultimate power resides in the people. • An economic system based on private ownership of capital • Development of a system which supports machine production of goods • A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793 • An increase in the percentage and in the number of people living in urban settlements. • ...
lesson 30 2015-05-15
Across
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Deciphers the information in an SSL Certificate.
- Encrypts the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- A malicious program that records keystrokes.
- Hackers using spyware to control your browser
Down
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- A program that hackers use to capture IDs and passwords on a network.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Security feature used for larger networks that controls computers from one point.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • Security feature used for larger networks that controls computers from one point. • ...
Cybersecurity Vocab 2021-12-09
Across
- any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
- an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- the attacker has access to pairs of known plaintexts and their corresponding ciphertexts.
Down
- a general term for when a perpetrator positions himself in a conversation between a user and an application
- tries to find two inputs producing the same hash value
- consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
- if we change a character of the plaintext, then several characters of the ciphertext should change
- convert (information or data) into a cipher or code, especially to prevent unauthorized access.
- each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.
- a method in cryptography by which cryptographic keys are exchanged between two parties
- a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme.
- the art or process of deciphering coded messages without being told the key.
12 Clues: tries to find two inputs producing the same hash value • the art or process of deciphering coded messages without being told the key. • a method in cryptography by which cryptographic keys are exchanged between two parties • the attacker has access to pairs of known plaintexts and their corresponding ciphertexts. • ...
Keywords 2022-05-11
Across
- a computer network security system that restricts internet traffic in, out, or within a private network
- An electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- Network computer, computer program, or device that processes requests from a client
- The part of a network that handles the major traffic.
- the transmission of a file from one computer system to another, usually larger computer system
- A thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- a computer-based application for the exchange of messages between users
Down
- Any computer hardware or software device that requests access to a service provided by a server.
- A physical or virtual appliance that passes information between two or more packet-switched computer networks
- the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
- the overall time something takes to complete.
- electronic devices used to store data,
12 Clues: electronic devices used to store data, • the overall time something takes to complete. • The part of a network that handles the major traffic. • a computer-based application for the exchange of messages between users • Network computer, computer program, or device that processes requests from a client • ...
Datawarehousing and Data Mining CA 3- Crossword Puzzle 2024-04-16
Across
- DM functionality that provides a concise and succinct summarization of the given collection of data
- ___________________ databases store image, audio, and video data.
- A spatial database that stores spatial objects that change with time is called a database
- Data pre-processing step in KDD in which Data relevant to the analysis task are retrieved from the database
- Data pre-processing step in which multiple data sources may be combined
- Data pre-processing step to remove noise and inconsistent data
Down
- Geographical Maps can be represented in _________ format, where roads, bridges, buildings, and lakes are represented as unions or overlays of basic geometric constructs, such as points,lines, polygons, and the partitions and networks formed by these components.
- DM functionality of comparison of the target class with one or a set of comparative classes
- database typically stores relational data that include time-related attributes
- ______________ analysis describes and models regularities or trends for objects whose behavior changes over time.
- _____________ database stores sequences of ordered events, with or without a concrete notion of time.
- Data objects that do not comply with the general behavior or model of the data.
12 Clues: Data pre-processing step to remove noise and inconsistent data • ___________________ databases store image, audio, and video data. • Data pre-processing step in which multiple data sources may be combined • database typically stores relational data that include time-related attributes • ...
Browsing Safely 2025-05-30
Across
- It refers to the act of stealing and misusing someone's personal information
- Set of programs that disrupts the normal functioning of a computer
- It is the use of illegal methods to get money or other things that belong to a bank or its costumers
- It is the process of befriending children on social media to facilitate online
- Act of sending an email to a user,misleading him to believe that it is from a trusted person or organisation
- An act of harming or harassing using information technology in a deliberate manner
Down
- It is a collection of technologies,processes and practices designed to protect networks,computers,programs and data from attack,damage or unauthorised access
- It refers to an illegal entry into a computer system or network
- A software that prevents unauthorised access
- A program used to remove viruses
- Any criminal activity intended to harm anyone using a computer or an internet connection
- The receiver of a message is fooled into believing that the message received by him is from a trusted source
12 Clues: A program used to remove viruses • A software that prevents unauthorised access • It refers to an illegal entry into a computer system or network • Set of programs that disrupts the normal functioning of a computer • It refers to the act of stealing and misusing someone's personal information • ...
Recruitment Procedures and External Validity 2024-10-20
Across
- What process involves inviting eligible participants to be part of a research study
- What term refers to the extent to which study results can be generalized to the broader population
- What is a major threat to external validity, where results apply only to the study sample
- What is an important factor to consider in maintaining external validity during recruitment
- Which concept involves making sure that results are generalizable to real-world scenarios
- Which recruitment strategy involves using existing networks of participants to enroll others
Down
- Which term refers to ensuring participants give informed agreement to take part in the study
- What term is used for the group of people who are asked to participate in a study
- What is a key element in recruitment to avoid underrepresentation of certain groups
- What process ensures that the sample is representative of the broader population being studied
- What term describes the selection of participants based on criteria relevant to the research question
- What term is used to describe the accuracy of inferences made from a study about other settings or groups
12 Clues: What term is used for the group of people who are asked to participate in a study • What is a key element in recruitment to avoid underrepresentation of certain groups • What process involves inviting eligible participants to be part of a research study • What is a major threat to external validity, where results apply only to the study sample • ...
AWS Services 2025-04-07
Across
- A fully managed machine learning service that helps developers build, train, and deploy models quickly.
- A monitoring and observability service that provides logs, metrics, and traces
- A service that enables event-driven computing using messages and notifications.
- A data warehousing service designed for complex queries on petabyte-scale data.
- The AWS service that automates infrastructure provisioning using code templates.
- A service used to spin up and manage virtual machines in AWS.
- A service that provides API hosting and management, including rate limiting and security.
- A fully managed Kubernetes service that makes it easier to run containerized applications at scale.
- A service that provides highly scalable and fully managed message queuing.
- AWS’s globally distributed storage system with lifecycle policies and Glacier for archiving.
Down
- This service allows you to run containerized applications without managing servers or clusters.
- AWS service for running SQL-based analytics directly on S3 data without requiring a traditional database.
- This AWS service lets you run serverless applications without provisioning or managing servers.
- AWS’s managed NoSQL database, known for single-digit millisecond latency.
- An AWS networking service that allows secure connections between VPCs and on-premises networks.
- This AWS service is a fully managed relational database with automated backups and replication.
- An AWS security service that helps manage identities and access to resources.
- A managed distributed streaming platform often compared to Apache Kafka.
18 Clues: A service used to spin up and manage virtual machines in AWS. • A managed distributed streaming platform often compared to Apache Kafka. • AWS’s managed NoSQL database, known for single-digit millisecond latency. • A service that provides highly scalable and fully managed message queuing. • ...
LCaravelli-Network Devices 2023-01-04
Across
- security should be top of mind when the technician recommends and installs this type of system
- a method for powering devices that do not have a battery or access to a power outlet
- does not allow packets to enter the target system without first being analyzed
- commonly used as a place to collect incoming cable runs from the various networking devices throughout a facility
- a generic name for an all in one network appliance
- a device in the cloud that allows network administrators to manage network devices
- Every device on a network has a unique media access control ___ address
- receives data from one port and sends it to all other ports
Down
- its main purpose is to regenerating weak signals
- typically responsible for monitoring all you end devices on your network
- networking systems that are no longer supported but are still in operation in today’s networks
- a more common term for power over ethernet
- uses various techniques for determining what is and what is not permitted in a network segment
- provides the physical connection to the network at the PC or other end device
- passively monitors traffic on the network
- switches come with additional features that the network administrator can configure to improve the network
- bridges and hubs are now considered legacy devices because of the benefits and low cost of ________
- introduced to divide LANs into segments
18 Clues: introduced to divide LANs into segments • passively monitors traffic on the network • a more common term for power over ethernet • its main purpose is to regenerating weak signals • a generic name for an all in one network appliance • receives data from one port and sends it to all other ports • Every device on a network has a unique media access control ___ address • ...
Unit 5 2022-05-10
Across
- Cyber bullies often write ... comments in social networks.
- Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
- Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
- Julia and Weronika are good friends. They always ... for each other.
- Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.
5 Clues: Cyber bullies often write ... comments in social networks. • Julia and Weronika are good friends. They always ... for each other. • Nikita fell in love with Lena. He wants to organize a ... dinner for her. • Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen. • ...
Unit 5 2022-05-10
Across
- Cyber bullies often write ... comments in social networks.
- Nikita fell in love with Lena. He wants to organize a ... dinner for her.
Down
- Carlo lives in a big house in Wesel. First there is the living room and the kitchen, Carlo has to go ... for his bedroom and the bathroom.
- Julia and Weronika are good friends. They always ... for each other.
- Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen.
5 Clues: Cyber bullies often write ... comments in social networks. • Julia and Weronika are good friends. They always ... for each other. • Nikita fell in love with Lena. He wants to organize a ... dinner for her. • Mrs Schwarz-Schellewald can ... an Indian Curry with our English class in the school's kitchen. • ...
Networking concept puzzle 2025-06-07
Across
- Area Network This kind of network connects more computers located at distinct places.
- It is a device that connects two different types of networks with each other.
- Card It Is used to physically attach a computer to a network.
Down
- Network It is a means of communication that uses low-powered radio waves to transmit data between devices.
- It is a network device that is used to connect all the computers in a network with each other.
5 Clues: Card It Is used to physically attach a computer to a network. • It is a device that connects two different types of networks with each other. • Area Network This kind of network connects more computers located at distinct places. • It is a network device that is used to connect all the computers in a network with each other. • ...
