networks Crossword Puzzles
Caslin_Hiring vacab 2024-02-22
Across
- the process of establishing employees' roles and responsibilities.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- a permanent decrease in the total number of workers a company employs.
- the means of interactions among people in which they create share and or exchange information and ideas in virtual communities and networks.
- the process of identifying attracting interviewing selecting hiring and onboarding employees.
- the total amount of sales you make over a set period.
- a quick summary of a person's relevant education and experiences.
- to give up a job or position by telling your employer that you are leaving.
- someone who can answer questions about your work history skills abilities and work style.
- to encourage people to like buy use do or support something.
Down
- learning how to do the job or do the job better while in the role.
- coordinating managing and allocating human capital or employees in ways that move an organization's goals forward.
- a person or business that employs one or more people especially for wages or salary.
- your application must have made a good impression.
- the end of an employee's work with a company.
15 Clues: the end of an employee's work with a company. • your application must have made a good impression. • the total amount of sales you make over a set period. • to encourage people to like buy use do or support something. • a quick summary of a person's relevant education and experiences. • learning how to do the job or do the job better while in the role. • ...
Technology 2023-06-18
Across
- Short for "application," it refers to a software program designed for a specific purpose or task.
- A software application used to access and view websites on the internet.
- Electronic mail sent and received through computer networks, allowing for quick communication.
- The physical components of a computer system, such as the processor, memory, and storage.
- A machine that can store, process, and retrieve information and perform tasks.
- A global network that connects computers and allows communication and information sharing.
- The process of creating instructions or programs that tell a computer what to do.
Down
- A mobile phone that can also perform various functions like internet browsing and app usage.
- A secret combination of characters used to gain access to a computer or online account.
- Programs and applications that run on a computer and perform specific tasks.
- A camera that captures video and sends it over the internet in real time.
- A collection of web pages accessed through the internet and organized under a domain name.
- A portable device with a touchscreen interface that allows for browsing and multimedia usage.
- A wireless networking technology that allows devices to connect to the internet without using cables.
- The branch of technology that deals with the design, construction, and operation of robots.
15 Clues: A software application used to access and view websites on the internet. • A camera that captures video and sends it over the internet in real time. • Programs and applications that run on a computer and perform specific tasks. • A machine that can store, process, and retrieve information and perform tasks. • ...
CSP Unit 1 Review 2024-01-09
Across
- Error from attempting to represent a number that is too large.
- a named reference to a value that can be used repeatedly throughout a program.
- A way of representing information using only two options.
- Error Error from attempting to represent a number that is too large.
- the practice of obtaining input or information from a large number of people via the Internet.
- an ordered sequence of characters.
Down
- An agreed-upon set of rules that specify the behavior of some system
- data about data
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- Value a data type that is either true or false.
- associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution.
- a collection of program statements. Programs run (or “execute”) one command at a time.
- a relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- Finding and fixing problems in an algorithm or program.
- a computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
15 Clues: data about data • an ordered sequence of characters. • Value a data type that is either true or false. • Finding and fixing problems in an algorithm or program. • A way of representing information using only two options. • Error from attempting to represent a number that is too large. • An agreed-upon set of rules that specify the behavior of some system • ...
U.S. and Canada 2022-10-19
Across
- farming A farming method used in dry regions in which crops are grown that rely only on the natural precipitation
- A large population concentration made up of several large and many smaller cities, such as the area between Boston and Washington D.C.
- A high point or ridge that determines the direction rivers flow
- A small river or stream that feeds into a larger river
- Public services or systems such as power, water, sewage, transportation, communication, networks, school, and healthcare
- The source of a stream or river
- Economy that emphasizes services and technology rather than industry and manufacturing
Down
- Movement towards cities
- line A boundary in the eastern United States where higher land of the Piedmont drops to the lower Atlantic Coastal Plain
- A mild climate region in the southern and southwestern portions of the United States
- A channel or pipeline for carrying a large quantity of flowing water
- A large, powerful windstorm that forms over warm ocean waters
- belt A farming method used in dry regions in which crops are grown that rely only on the natural precipitation
- fuel A resource formed in the Earth by plant and animal remains
- Sprawl The unplanned and uncontrollable spread of urban settlements into neighboring regions
15 Clues: Movement towards cities • The source of a stream or river • A small river or stream that feeds into a larger river • A large, powerful windstorm that forms over warm ocean waters • A high point or ridge that determines the direction rivers flow • fuel A resource formed in the Earth by plant and animal remains • ...
Safe Surfing and Computer Component Study Guide 2022-08-15
Across
- this is the second step done to the input information and is needed for a computer to give an output.
- the __________ System: master program that manages how software uses the hardware of a computer
- this is the first step needed for a computer to give an output
- an attack when a hacker sends a fake email to steal login credentials
- hacker a person who tries to find network vulnerabilities to help fix the problem and prevent actual cyberattacks
- attacks include Trojan, adware, and spyware
- physical devices like circuits, chips, wires, speakers, plugs, and more
Down
- all of the computer programs, or code. It includes things like apps, games, websites, maps, and more
- this is the last step after a computer receives input, stores information, and processes the information
- an attack when the hacker gains access to the information path between the user and website. This commonly happens with unsecured Wi-Fi networks and malware
- code that is the most basic form of software and controls all the hardware of a computer
- this occurs after the information is stored.
- the ______________ processing unit that calculates information
- an attack when someone tries to guess your password
- the person who carries out a cyberattack
15 Clues: the person who carries out a cyberattack • attacks include Trojan, adware, and spyware • this occurs after the information is stored. • an attack when someone tries to guess your password • this is the first step needed for a computer to give an output • the ______________ processing unit that calculates information • ...
Workplace Readiness Crossword Puzzle (CS) 2025-09-10
Across
- something that furnishes proof
- a website that allows people of similar interests to interact and exchange information that is typically personal
- The ability to think clearly and rationally, understanding the logical connection between ideas.
- data converted into a meaningful and useful context
- The process of finding solutions to difficult or complex issues.
- unbiased; neutral
- Shares responsibility for collaborative work and respects the thoughts, opinions, and contributions of other team members.
- the unethical distribution of mass digital messages.
- malware that spreads by users from an infected device to the rest of the devices on a network/system.
Down
- the protection of information systems against unauthorized access (e.g., hacking, identity theft).
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- Understands basic Internet and email safety and follows workplace protocols to maintain the security of information, computers, networks, and facilities.
- The process of assessing or judging the value or quality of something.
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system.
- connected with or related to the matter at hand
15 Clues: unbiased; neutral • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • the unethical distribution of mass digital messages. • The process of finding solutions to difficult or complex issues. • The process of assessing or judging the value or quality of something. • ...
Cyber Security 2025-12-02
Across
- Employees using unauthorized apps/services that create security gaps.
- Corrupting the training data of an AI system so it learns harmful or incorrect behaviour.
- Attacks exploiting vulnerabilities that the software creator doesn't know about yet.
- Networks of compromised devices used for spam, DDoS attacks, etc.
- Employees or contractors misusing access intentionally or accidentally.
- Slightly modified inputs (images, text, audio) designed to fool AI models into misclassifying things.
- Forcing an AI system to ignore instructions and output harmful or unintended content.
- Using leaked passwords from one website to log into another (because people reuse passwords).
- Using manipulated audio/video to impersonate someone and deceive victims.
- Hiding malicious data (scripts, payloads, commands) inside images, audio files, or other media so it passes undetected.
Down
- Intercepting communication between two parties to steal or modify data.
- Attacking a vendor or service that a company trusts, and spreading malware through legitimate updates.
- Attempts to bypass safety filters in AI systems using carefully designed prompts or exploits.
- Fake emails or messages designed to steal credentials or install malware.
- Trying to clone a machine learning model by repeatedly querying it and recreating it elsewhere.
15 Clues: Networks of compromised devices used for spam, DDoS attacks, etc. • Employees using unauthorized apps/services that create security gaps. • Intercepting communication between two parties to steal or modify data. • Employees or contractors misusing access intentionally or accidentally. • Fake emails or messages designed to steal credentials or install malware. • ...
the internetttttt 2022-05-03
Across
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- short for internet service provider.
- a networking device that forwards data packets between computer networks
- the chief support of a system or organization.
Down
- a facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.
- copy (data) from one computer system to another, typically over the internet.
- an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
- a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
- transfer (data) from one computer to another, typically to one that is larger or remote from the user or functioning as a server.
9 Clues: short for internet service provider. • the chief support of a system or organization. • a networking device that forwards data packets between computer networks • copy (data) from one computer system to another, typically over the internet. • a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment. • ...
U01 E Protecting data and information 2 2023-12-21
Across
- (8,5,8) is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case is encrypting the communication between web applications and servers, such as web browsers loading a website. This can also be used to encrypt other communications such as email, messaging, and voice over IP (VoIP). Acronym TLS
- is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
- (4,10,3) is the UK's implementation of the General Data Protection Regulation (GDPR). Everyone responsible for using personal data has to follow strict rules called 'data protection principles. They must make sure the information is: used fairly, lawfully and transparently
Down
- (7,2,11,3) provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities.
- (6,7,5) is standard technology for securing an internet connection by encrypting data sent between a website and a browser (or between two servers). It prevents hackers from seeing or stealing any information transferred, including personal or financial data. Acronym SSL
- (6,4,7) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption.acronym PGP
- is a computer network security system that restricts internet traffic in to, out of, or within a private network. This software or dedicated hardware-software unit functions by selectively blocking or allowing data packets.
- is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed, most antivirus software runs automatically in the background to provide real-time protection against virus attacks
- (8,6,3) makes it an offense to make, adapt, supply or obtain articles for use in unlawfully gaining access to computer material or impairing the operation of a computer. Access is defined in the Act as: altering or erasing the computer programme or data. copying or moving the programme or data
9 Clues: (6,4,7) is a security program used to decrypt and encrypt email and authenticate email messages through digital signatures and file encryption.acronym PGP • ...
The New Power Balance 2015-04-08
Across
- Political ideology that emphasizes the civil rights of citizens, representative government, and the protection of private property.
- Revolutionaries who wanted to abolish all private property and governments, usually by means of violence.
- Political ideology that advocated for government protection of workers from exploitation by property owners and government ownership of industries.
- Chancellor of Prussia and later Germany who led Prussia to victory against Austria and France and created the German Empire.
- One of the leaders of the Meiji Restoration.
- Political program in which young leaders set Japan on the path of centralization, industrialization, and imperialism.
- Empress of China that resisted government reforms and opposed western influence.
- 19th century idea that men and women should have clearly differentiated roles in society.
- Term used to describe late 19th century society.
- Italian nationalist who conquered Sicily and Naples and added them to a unified Italy in 1860.
- Known for writing "The Communist Manifesto" and "Das Kapital."
- A form of energy used for telegraphy, lighting, industrial motors, and railroads.
Down
- Political ideology that stresses people's membership in a nation.
- Copper cables laid along the bottom of the ocean for telegraphic communication.
- American inventor best known for inventing the electric light bulb.
- Networks of iron or steel rails on which locomotives pulled trains.
- The most widely used metal in construction, machinery, and railroad equipment.
17 Clues: One of the leaders of the Meiji Restoration. • Term used to describe late 19th century society. • Known for writing "The Communist Manifesto" and "Das Kapital." • Political ideology that stresses people's membership in a nation. • American inventor best known for inventing the electric light bulb. • ...
Cybersecurity Unit 1 Lesson 1 2022-12-02
Across
- Changes your directory
- A set of steps to accomplish a task.
- A set of techniques used to protect networks and digital information from attack, damage, or unauthorized access.
- Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers.
- Guidelines that team members develop in order to be followed when working together.
- A system that can distinguish between a human and an automated program.
- Shows the contents of your directory
- A process that converts human-readable text or data into a coded form.
Down
- A team of individuals working together to investigate cyber events and anomalies.
- A collection of rules detailing appropriate student behavior.
- Software that is intended to do harm or damage.
- The trail that you leave behind when you engage in online experiences.
- To guess or discover, especially a password.
- Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network.
- To confirm your identity using knowledge know only to you or information interpreted by you.
- An attempt to discover information, especially passwords, through trial and error.
- Irrelevant or inappropriate messaging sent through email to a large number of recipients, also known as junk mail.
17 Clues: Changes your directory • A set of steps to accomplish a task. • Shows the contents of your directory • To guess or discover, especially a password. • Software that is intended to do harm or damage. • A collection of rules detailing appropriate student behavior. • The trail that you leave behind when you engage in online experiences. • ...
nervous system 2017-03-22
Across
- bundles of fibers that transmit impulses of sensation to the brain
- the main trunk of the brain continuing downward to form the spinalcord
- a feeling of being worried
- the network of nerve cells and fibers that transmits nerve impulses between parts of the body.
- a short branched extension of a nerve cell
- a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood
Down
- the long threadlike part of a nerve cell along which impulses are conducted from the cell body to other cells.
- the principal and most anterior part of the brain
- an action that is performed as a response to a stimulus and without conscious thought.
- the part of the nervous system responsible for control of the bodily functions
- a specialized cell transmitting nerve impulses; a nerve cell.
- the part of the brain at the back of the skull in vertebrates. Its function is to coordinate and regulate muscular activity.
- the other half next to the spinal cord
- a junction between two nerve cells
- the cylindrical bundle of nerve fibers and associated tissue that is enclosed in the spine and connects nearly all parts of the body to the brain
15 Clues: a feeling of being worried • a junction between two nerve cells • the other half next to the spinal cord • a short branched extension of a nerve cell • the principal and most anterior part of the brain • a specialized cell transmitting nerve impulses; a nerve cell. • bundles of fibers that transmit impulses of sensation to the brain • ...
Computer 2021-12-10
Across
- unit The part of the computer that holds all the electronic parts which includes the CPU or brains of the computer.
- An output device that displays what you are doing on the computer.
- A contraction of "Binary Digit". A bit is the single unit of information in a computer, typically represented as a 0 or 1.
- An electronic machine that processes, stores data, and does calculations.
- A program that accesses and displays files and other data available on the Internet and other networks.
- a peripheral input device modeled after the typewriter keyboard
- Carries out the instructions given to the computer.
Down
- A procedure for solving a mathematical problem in a finite number of steps that frequently involves repetition of an operation; broadly: a step-by-step method for accomplishing some task.
- a group of 8 bits
- An output device that can print what is on the monitor on paper.
- A circuit board that contains all of the computer system's main components
- an electro-mechanical data storage device that stores and retrieves digital data
- the part of a computer (a microprocessor chip) that does most of the data processing
- hand-held pointing device
- Computer location where instructions and data are stored on a temporary basis. This memory is volatile.
15 Clues: a group of 8 bits • hand-held pointing device • Carries out the instructions given to the computer. • a peripheral input device modeled after the typewriter keyboard • An output device that can print what is on the monitor on paper. • An output device that displays what you are doing on the computer. • ...
Communication Lesson 1 2023-01-15
Across
- a company that provides access to the internet.
- It is a computer system that hosts Websites and send you the web page you requested to see.
- The protocol allows you to upload and download files.
- Top level domain for a medium sized insurance business.
- The build-in connections that give you more information, and when your pointer changes from an arrow to a hand when you hover over a link.
- Domains that are at the highest level in the Domain Name System, such as .com, .edu, .org, .gov, .net
- The type of cable uses light pulses to send data.
- The signals Wireless Fidelity (Wi-Fi) uses to connect to the network.
Down
- A worldwide network of interconnected networks
- It is a computer software application that accesses and displays web pages, and you should use it to research information for your class project.
- A text-based address that points to a specific page on the internet.
- A number that uniquely identifies a website or a computer device.
- Top level domain of a large university.
- Topo level domain of your local National Guard.
- The technology translates the Website name you type into your browser into its associated IP address.
15 Clues: Top level domain of a large university. • A worldwide network of interconnected networks • a company that provides access to the internet. • Topo level domain of your local National Guard. • The type of cable uses light pulses to send data. • The protocol allows you to upload and download files. • Top level domain for a medium sized insurance business. • ...
Media Key Terms Crossword 2023-04-20
Across
- A rule that requires broadcasters to treat a candidate for the same political office identically to every other candidate for that office.
- Mandates broadcasting networks to devote time to contrasting views on issues of public importance.
- news that focuses on human interest stories and more culture / pop culture topics
- The revolutionary business tactic of producing newspaper
- Laws protecting witnesses from revealing certain pieces of information in court.
- news that focuses on bigger issues, such as economics, politics, humane topics, international affairs, etc,.
Down
- When media is written in a way to give an intended effect to the recipient.
- One who searches for verification of harmful claims.
- A news agency that supplies news by wire, to newspapers, radio, and television
- Method of using aggressive tactics and ruthless tones to one being interviewed / taking down information
- When media influences recipients without them knowing it.
- Journalism in elections that focuses on polling data and public perception. Represented commonly in a type of competition
- When media favors a certain side/opinion, by usually omitting information for the other side/opinion and treating what they say like facts.
- Journalism that is based upon on sensationalism and crude exaggeration.
- Technology that is intended to reach a mass audience.
15 Clues: One who searches for verification of harmful claims. • Technology that is intended to reach a mass audience. • The revolutionary business tactic of producing newspaper • When media influences recipients without them knowing it. • Journalism that is based upon on sensationalism and crude exaggeration. • ...
18CSC305J / ARTIFICIAL INTELLIGENCE / Unit IV 2023-04-12
Across
- Identify the type of learning in which labeled training data is used.
- _______algorithms enable the computers to learn from data, and even improve themselves, without being explicitly programmed.
- Real-Time decisions, Game AI, Learning Tasks, Skill acquisition, and Robot Navigation are applications of________
- In linear regression, we try to ______ the least square errors of the model to identify the line of best fit.
- The prior goal of unsupervised learning model is to determine the ________ .
- In Model based learning methods, an iterative process takes place on the ML models that are built based on various model parameters, called ?
- Machine Learning has various search/ optimization algorithms, which of the following is not evolutionary computation?
- Which of the following is a widely used and effective machine learning algorithm based on the idea of bagging?
Down
- Machine learning is a subset of_________
- A model of language consists of the categories which does not include ________.
- What is the application of machine learning methods to a large database called?
- Identify the kind of learning algorithm for "facial identities for facial expressions".
- Which supervised learning technique can process both numeric and categorical input attributes?
- A subset of machine learning that involves systems that think and learn like humans using artificial neural networks.
- The most significant phase in genetic algorithm is _________
15 Clues: Machine learning is a subset of_________ • The most significant phase in genetic algorithm is _________ • Identify the type of learning in which labeled training data is used. • The prior goal of unsupervised learning model is to determine the ________ . • A model of language consists of the categories which does not include ________. • ...
Nathan 2020-11-16
Across
- A malware that allows a hacker to remote control a computer.
- A virus that attaches itself to a message on the internet to infect a computer
- A Cyber attack that's propose is to make network unavailable.
- A Malware that infects a computer and takes over its control to a central server that commands and controls.
- A protocol that provides the framework for a web browsing to work.
- A group of computer connected to a common communication
- A software that protects your computer from anything that may compromise your computer's information
- A computer worm that poses as a love letter that infected over ten million window computers.
Down
- Someone looking to the breach defenses of a computer or exploit a weak computer system.
- A illegal practice that has emails pose as emails from companies to have you open to reveal personal information
- A very damaging computer virus that targeted microsoft computers.
- A program that is used to operate a computer to do a specific task.
- A virus program that can self replicate without human assistances which in turn helps it spread faster into other networks.
- A Malware or virus that disguises itself as a legit software.
- A computer program that hijacks computer to then make copies of itself.
15 Clues: A group of computer connected to a common communication • A malware that allows a hacker to remote control a computer. • A Cyber attack that's propose is to make network unavailable. • A Malware or virus that disguises itself as a legit software. • A very damaging computer virus that targeted microsoft computers. • ...
Recovery Model Crossword Puzzle 2020-12-10
Across
- _______-Oriented services create a vision of recovery that includes the voices of people served.
- People with mental illness encounter __________ embedded within social structures.
- Elements of the recovery process include ______. (Hint two words).
- Nothing about us __________ us.
- How many tasks do people engage in throughout the recovery process?
- What is #3 of the six stage model of the recovery process?
- Evidence-based interdisciplinary intervention approaches that attempt to operationalize key elements of the recovery process include:
Down
- Which one of the fundamental components of recovery is considered the catalyst for the recovery process?
- Recovery is a(n) _______ experienced by people with mental illness.
- Recovery-oriented approaches require continual reflection related to evolving ______ with clients.
- The core values, assumptions and philosophy of occupational therapy are remarkably consistent with those of ______. (Hint two words).
- Social and financial strains will ___________ impact the recovery process.
- Overarching expectation is that the journey of recovery will provide opportunities for greater __________, positive growth, and community participation.
- Having relationships and social networks that provide support, friendship, love and hope provides us with a ______________.
- This is a client-centered tool and engages clients to collaborate with service providers in identifying priority occupations and evaluating performance of and satisfaction with these occupations over time.(Hint abbreviation)
15 Clues: Nothing about us __________ us. • What is #3 of the six stage model of the recovery process? • Elements of the recovery process include ______. (Hint two words). • Recovery is a(n) _______ experienced by people with mental illness. • How many tasks do people engage in throughout the recovery process? • ...
Crossword 2021-02-23
Across
- It is used for online classes, for communication, for entertainment, and for almost all of our other daily routine.
- It is invented by Alexander Graham Bell.
- It is first invented in Persia in the year 950.
- It is the global interconnection of networks, routers and protocols flinging data around the planet.
- With the use of technology, these were invented to ensure widespread destruction.
- It was invented in China by alchemists in an attempt to produce life-extending elixirs.
- It is a system that provides navigation and location of places.
- It is the global computer virus created by a Filipino student in the year 2000 which made an estimated $10 billion damage to business and government agencies.
- It is one of the discoveries of Nicéphore Niépce.
Down
- It is one of the disadvantages of technology that is the introduction of harmful substances to the environment.
- Example of mental illness that can be caused by social media.
- It is a type of experimental antibiotics, created using enzymes to fight off pathogenic bacterial infections.
- The discovery of this opened up a lot of possibilities for the early humans.
- It is invented to substitute humans for procedures that are dangerous for people.
- Technology has accelerated this aspect which led to the development of modern transportation and communication technology.
15 Clues: It is invented by Alexander Graham Bell. • It is first invented in Persia in the year 950. • It is one of the discoveries of Nicéphore Niépce. • Example of mental illness that can be caused by social media. • It is a system that provides navigation and location of places. • The discovery of this opened up a lot of possibilities for the early humans. • ...
PALOLO 2021-03-29
Across
- Set of information found in a specific internet address.
- A secret word or phrase that must be used to gain admission to a place.
- An identification used by a person with access to a computer, network, or online service.
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- Set of programs and routines that allow the computer to perform certain tasks.
Down
- It Is a web where you can find information.
- A network service that allows users to send and receive messages using electronic communication networks.
- Includes the message content and any attachments.
- Unsolicited messages, usually of an advertising nature.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the introduction that identifies the emails intent.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Is the area in which you enter important information above the email content area.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
Technology(Benjamin Falcon, Ramiro Baez and Santiago Macchia) 2021-03-17
Across
- Set of programs and routines that allow the computer to perform certain tasks.
- A network service that allows users to send and receive messages using electronic communication networks.
- A secret word or phrase that must be used to gain admission to a place.
- Includes the message content and any attachments.
- Graphical control element used in computer programs, such as file managers or web browsers, and on web sites.
- Is the area in which you enter important information above the email content area.
- An identification used by a person with access to a computer, network, or online service.
- Is the introduction that identifies the emails intent.
Down
- A link from a hypertext document to another location, activated by clicking on a highlighted word or image.
- Unsolicited messages, usually of an advertising nature.
- A symbol representing a smiling face that is used in written communication to indicate that the writer is pleased or joking.
- Allows devices such as computers (laptops and desktops), mobile devices (smart phones and wearables), and other equipment (printers and video cameras) to interface with the Internet.
- An extra part or extension that is or may be attached to something to perform a particular function.
- Set of information found in a specific internet address.
- It Is a web where you can find information.
15 Clues: It Is a web where you can find information. • Includes the message content and any attachments. • Is the introduction that identifies the emails intent. • Unsolicited messages, usually of an advertising nature. • Set of information found in a specific internet address. • A secret word or phrase that must be used to gain admission to a place. • ...
ADVANCED NETWORKING 2021-04-08
Across
- This is a method of sending messages from one computer to another via a communication link.
- This has some special information which helps to detect any missing packets at the destination for reassembling.
- Software programs designed to damage or do other unwanted actions on a computer system.
- This is considered as a small segment of a large message.
- This is a unique name used to specify a particular computer on a network.
- This prevents outsiders from accessing the private data of the network(This can be either hardware or this can be software based)
- This is referred as the largest wide area network in the world.
Down
- This is the act of listening in on someone’s private conversations without their knowledge.
- Computers that are used to host websites are usually known by this.
- This is a computer-based system that allows users and subscribers to exchange personal voice messages.
- This means that the network should be available whenever it is needed.
- A word or series of alphanumeric characters used as a security measure to prevent unauthorized access to data.
- This directs traffic between networks.
- This is a software manage access to websites and helps to keep away from malicious sites.
- This involves a third party interrupting a two-way communication(Write the Abbreviation)
15 Clues: This directs traffic between networks. • This is considered as a small segment of a large message. • This is referred as the largest wide area network in the world. • Computers that are used to host websites are usually known by this. • This means that the network should be available whenever it is needed. • ...
Final Chapter 1-3 2018-11-05
Across
- what gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen
- what mouse operations do you quickly press and release the left mouse button twice without moving the mouse
- what gesture do you move two fingers together
- a style of table does not contain a physical keyboard
- what gesture do you move two fingers apart
- is a personal computer that users can carry from place to place
- which kind of desktop uses the same case to house the screen and processing circuitry
Down
- in which gesture do you quickly touch and release one finger one time
- what gesture displays a shortcut menu
- what gesture do you press and hold one finger on an object and then move the finger to the new location
- what gesture do you press and hold one finger on an object and then move the finger to the new location
- what is an electronic version of a printed book, readable on computers and other digital devices
- what conveys meaning and is useful to users
- what consists of electronic components that store instructions waiting to be executed and data needed by those instructions
- is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
- what mouse operations do you move the mouse until the pointer is positioned on the item of choice
16 Clues: what gesture displays a shortcut menu • what gesture do you move two fingers apart • what conveys meaning and is useful to users • what gesture do you move two fingers together • a style of table does not contain a physical keyboard • is a personal computer that users can carry from place to place • ...
Computer! 2023-05-10
Across
- the application of scientific knowledge for practical purposes, especially in industry.
- working or produced by machines or machinery.
- mobile-phone-based software programme that allows users to send and receive information using their phone's internet connection
- a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- an application, especially as downloaded by a user to a mobile device.
- docs an online word processor that lets you create and format documents and work with other people.
- a system for transmitting visual images and sound that are reproduced on screens, chiefly used to broadcast programs for entertainment, information, and education.
- the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Down
- the programs and other operating information used by a computer.
- is a technology company
- depictions of human emotions, living beings, objects and even certain symbols.
- operating by or producing electricity.
- a panel of keys that operate a computer or typewriter.'=
- upload a video of (someone or something) to the video-sharing website
15 Clues: is a technology company • operating by or producing electricity. • working or produced by machines or machinery. • a panel of keys that operate a computer or typewriter.'= • the programs and other operating information used by a computer. • upload a video of (someone or something) to the video-sharing website • ...
HAPPY HOUR CROSSWORD 2024-02-22
Across
- an intangible asset that represents the value of a business's reputation.
- The most dressed person in deepArica
- Most consumed element in deepAfrica.
- powerful class of neural networks that are used for unsupervised learning
- Open-Source Tool Used To Protect Linux Servers From Brute-Force Attacks, Password Guessing, And Other Malicious Activity
- a type of personal computer made by the Apple Computer company.
- standard network protocol used for the transfer of computer files between a client and server on a computer network.
Down
- software that creates and runs virtual machines
- a way of financing your business idea through donations of money from the public
- a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource
- An Open-Source Virtualization Technology That Allows You To Run Multiple Virtual Machines On A Linux Host
- the value of ownership interest in the business, calculated by deducting liabilities from assets
- fixed costs associated with operating a business such as rent, marketing, utilities and administrative costs
- an online cash register that keeps records of all biashara (business transactions) between a supplier and a buyer?
- amount of data that can be transferred between your website and its users over a certain period of time
15 Clues: The most dressed person in deepArica • Most consumed element in deepAfrica. • software that creates and runs virtual machines • a type of personal computer made by the Apple Computer company. • an intangible asset that represents the value of a business's reputation. • powerful class of neural networks that are used for unsupervised learning • ...
Castrofloresandtj 2024-10-24
Across
- process- gain the information used to gain estimates of the situation
- marsupial
- weapons- traditional weapons such as rifles and explosives
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- control- measures taken to prevent a fire or collision.
- ceremony- when the vessel is formally named and launched is customarily
- a series of short cruises to check out the ship and its equipment.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare of security experts will discuss the growing threats to corporations.
- warfare are self replicating programs that can hide in systems
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
CSP Review WG 2025-05-02
Across
- ______ computing - spliting up a program into multiple tasks, some of which can be completed simultaneously
- the maximum amount of data that can be transfered in a fixed period of time over a network
- chunks of data used to provide transport between the data's origin and destination
- a solution to a problem that isnt necesarily perfect but is good enough for a hard problem
- the act of funding digital projects throught the combined effort of many online users
- procedural _____ is the act of simplifying code by using a function
Down
- the process of scrambling data to prevent unauthorized access
- ______ provides an unreliable data transfer protocol that only detects for corrupt packets but not lost packets
- Rouge Access Point - A ______ point that gives unauthorized access to secure networks
- the protocol responsible for reliable and ordered delivery between two systems
- the process of finding a path from sender to reciever
- ______ computing - running multiple parts of a program on multiple comptuters
- _____ search - an algorithm that searches a list by cutting it in half repeatedly
- _____ error - When the code runs but does not do as expected due to an error in your own thinking
- compressing data in a way that preserves all data and allows for full recovery
15 Clues: the process of finding a path from sender to reciever • the process of scrambling data to prevent unauthorized access • procedural _____ is the act of simplifying code by using a function • ______ computing - running multiple parts of a program on multiple comptuters • the protocol responsible for reliable and ordered delivery between two systems • ...
Networking Concepts 2025-05-21
Across
- The computers that communicate with each other.
- A network created for a individual person.
- In this topology,all the nodes in the network are connected in a circular manner.
- The topology in which each device is connected to a central computer using a point to point connection.
- The device works similar to Hub.
Down
- Most commonly used network card.
- In this network,two or more computers and peripheral devices are connected within a small area such as a room,an office building or a campus.
- The security where a user is given a unique login name and password.
- In this topology, each node is connected to every other node in the network.
- This topology uses single communication line or one main cable to which all the nodes are directly connected.
- One of the most common topology network setups that consists of a group of star figured workstations connected to a linear bus backbone cable.
- Larger than LAN and is spread across a city.
- A device that connects two different networks with each other.
- This kind of network connects two or more computers located in a distant places.
- A network device that is used to connect all the computers in a network with each other.
15 Clues: Most commonly used network card. • The device works similar to Hub. • A network created for a individual person. • Larger than LAN and is spread across a city. • The computers that communicate with each other. • A device that connects two different networks with each other. • The security where a user is given a unique login name and password. • ...
Information Technology Career Cluster 2025-10-06
Across
- A program used to view Web pages.
- a person who designs, writes and installs computer programs and applications
- a small amount of data generated by a website and saved by your web browse to remember information about you.
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- type of software that can process information on its own without human intervention.
- A global network connecting millions of computers, making it possible to exchange information.
- the development, maintenance, and use of computer software, systems, and networks
Down
- helps increases or maintains the capabilities of a person with a disability
- unwanted e-mail (usually of a commercial nature sent out in bulk)
- identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
- the process of converting human instructions into a language that a computer can understand and follow
- Part of a computer system that is designed to block unauthorized access
- Measures taken to protect a computer or computer system against unauthorized access or attack
- new technologies that aim to conserve the natural environment and resources.
- The amount of data that can be transmitted over a network in a given amount of time.
15 Clues: A program used to view Web pages. • unwanted e-mail (usually of a commercial nature sent out in bulk) • Part of a computer system that is designed to block unauthorized access • helps increases or maintains the capabilities of a person with a disability • a person who designs, writes and installs computer programs and applications • ...
TECHFEST 2020 - Crossword Puzzle 2020-10-28
Across
- A secret word or phrase that must be used to gain admission to a place.
- A computer that is small enough to be carried around easily and is designed for use outside an office
- The wider network that allows computer networks around the world run by companies
Down
- A set of instructions and documentation that tells a computer what to do or how to perform a task
- A machine for printing text or pictures, especially one linked to a computer.
5 Clues: A secret word or phrase that must be used to gain admission to a place. • A machine for printing text or pictures, especially one linked to a computer. • The wider network that allows computer networks around the world run by companies • A set of instructions and documentation that tells a computer what to do or how to perform a task • ...
Working With Aboriginal and Torres Strait Islander People 2025-11-25
Across
- Advocacy or Allyship - involves using your position, privilege, and power to create systemic change.
- A ________ -based approach recognises that all individuals are resourceful and resilient experts in their lives, and can progress in a way that enhances their quality of life.
Down
- Advocacy or Allyship - is primarily about relationship and personal support.
- Economic participation means Aboriginal and/or Torres Strait Islander people and communities have _______ over economic decisions
- Collective __________ is when one community member suffers, the pain ripples through connected networks.
5 Clues: Advocacy or Allyship - is primarily about relationship and personal support. • Advocacy or Allyship - involves using your position, privilege, and power to create systemic change. • Collective __________ is when one community member suffers, the pain ripples through connected networks. • ...
Crossword 2022-02-07
Across
- a sphere of knowledge identified by a name
- set up in every program to hold data coming in and going out
- a data storage device that uses flash memory
- a wireless technology that allows the exchange of data between different devices
- a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line
- two or more computers that are connected
- a movable indicator on a computer screen identifying the point that will be affected by input from the user, for example showing where typed text will be inserted
- Universal Serial Bus
Down
- an organizational element of a computer operating system used to group files or other folders together
- an additional file sent with an email message
- n area or window on a computer screen in which icons are arranged in a manner analogous to objects on top of a desk
- a networking device that forwards data packets between computer networks
- a computer program with a graphical user interface for displaying and navigating between web pages
- a small handheld device that is dragged across a flat surface to move the cursor on a computer screen, typically having buttons that are pressed to control functions
- A central processing unit
15 Clues: Universal Serial Bus • A central processing unit • two or more computers that are connected • a sphere of knowledge identified by a name • a data storage device that uses flash memory • an additional file sent with an email message • set up in every program to hold data coming in and going out • a networking device that forwards data packets between computer networks • ...
Unit 6 TestOut 2022-04-07
Across
- a method of confirming identity by using two or more pieces of evidence (or factors) to an BLANK mechanism
- does each person have the physical attribute being measured?
- the act of claiming an identity, such as telling someone your name.
- The command BLANK creates a new group in a Linux terminal
- a secure shell (BLANK) key is an access credential.
- is the physical attribute distinctive enough that it can be used to distinguish between individuals?
- data, applications, systems, networks, and physical space.
Down
- the process of validating identity. it includes the identification process, a user providing input to prove identity, and the system accepting that input as valid.
- how well does the specified attribute hold up to aging
- a device or a file used to authenticate.
- issued by. certificate authority and verify identity by using public keys, details on the owner of the certificate, details on the issuer of the certificate.
- granting or denying access to an object based on the level of permissions or the actions allowed with the subject.
- sometimes referred to as accounting, is maintaining a record of the activity within the information system.
- users, applications, or processes that need access to objects.
- an online service that manages identity information for other organizations.
15 Clues: a device or a file used to authenticate. • a secure shell (BLANK) key is an access credential. • how well does the specified attribute hold up to aging • The command BLANK creates a new group in a Linux terminal • data, applications, systems, networks, and physical space. • does each person have the physical attribute being measured? • ...
Communication Systems Crossword 2017-06-04
Across
- Separates a network into different segments at the data link layer.
- A communication system for short range transmission.
- A device that determines the path to send a data packet between at least two networks.
- has many resources and does not rely on the network for essential functions.
- meeting that allows people in different locations to see video and audio of each other.
- The sending of signals to receive an agreement about which protocol to use to accomplish an exchange of information.
- This network topology uses a combination of connected bus, star and ring topologies.
Down
- The capacity of the channel/transmission medium, determining speed.
- Determines the MAC address of the sender and intended receiver that precedes each message.
- Allows communication by sending and receiving message using a device connected to the Internet.
- Has few resources and relies on the network for storage and computations.
- A set of rules which governs the transfer of data between computer devices in data transmission.
- Cable that is composed of pairs of copper wire twisted together
- A system allowing customers to purchase goods using funds in their bank accounts.
- A digit representing the sum of the correct digits in a piece of stored or transmitted digital data.
15 Clues: A communication system for short range transmission. • Cable that is composed of pairs of copper wire twisted together • Separates a network into different segments at the data link layer. • The capacity of the channel/transmission medium, determining speed. • Has few resources and relies on the network for storage and computations. • ...
Crossword Vocabulary 2019-05-20
Across
- An organization that provides access to the Internet.
- The term internet, spelled with a lower case "i," has always meant a large network made up of smaller networks.
- USB is a hardware interface for up to 127 peripherals that is governed by the USB Implementers Forum (see USB-IF). USB is used to attach keyboards, mice, printers, external storage and mobile devices to the computer.
- Cookies provide a way for the website to recognize you and keep track of your preferences.
- An inhouse website that serves employees only, and most medium-sized and large companies have one.
- The primary method for keeping a computer secure from intruders.
- To store data locally in order to speed up subsequent retrievals. Pronounced "cash." See Web cache and browser cache.
- Machinery and equipment (CPUs, drives, keyboards, printers, scanners, cables, etc.).
- central Processing Unit
- To write and post an entry in a Weblog.
Down
- The fundamental display element of an electronic screen or bitmapped image.
- A series of instructions that performs a particular task is called a "program."
- The transmission capacity of an electronic the way such as a communications line, computer bus or computer channel.
- phishing is a scam to steal valuable information such as credit card and social security numbers, user IDs and passwords.
- uniform Resource Locator
15 Clues: central Processing Unit • uniform Resource Locator • To write and post an entry in a Weblog. • An organization that provides access to the Internet. • The primary method for keeping a computer secure from intruders. • The fundamental display element of an electronic screen or bitmapped image. • ...
CAREER BAATEIN - Sales Careers 2016-09-15
Across
- MMD is responsible for district wise network ................ and N+2 years capacity plan
- If I am in Govt Sales, I need to liaison with ...................
- In my role of Rural Sales, Mahindra ......... is a major project.
- As Manager Rural Sales, I need to create additional .......... streams from the rural network.
- MMD is responsible for proactive channel and marketing readiness prior to product ..................
- As MMD (Sales & Service), I need to generate a comprehensive report of market share every month to develop Market ..................
- As MMD, I need to partner with special networks partners such as .........
Down
- As RSM, I should have a balance of task & ........ orientation.
- MMD is responsible for the strategic development of key .......................
- As Manager Rural Sales, I need to have experience in Rural........
- As Manager - Rural Sales, I am responsible for the volume share from focus ..........
- I am responsible for the Volume Growth and Market Dominance of entire state or 2. I finalize business plans and create monthly/ quarterly sales forecast. I am directly responsible for topline
- This skill is the most important if I am in Govt. Sales
- As Manager Rural Sales, I need to be good at Sales .........
- If I am in Govt. Sales, I need to work with 4 major Govt Departments - Nationalized Banks, Health, Indian Post & Indian ......................
15 Clues: This skill is the most important if I am in Govt. Sales • As Manager Rural Sales, I need to be good at Sales ......... • As RSM, I should have a balance of task & ........ orientation. • If I am in Govt Sales, I need to liaison with ................... • In my role of Rural Sales, Mahindra ......... is a major project. • ...
MEDIA CROSSWORD PUZZLE 2023-03-09
Across
- a person whose job is to discover information about news events and describe them for a newspaper or magazine or for radio or television
- extending or spread throughout the world
- websites and programs that allow people to communicate and share information on the internet using a computer or mobile phone
- An electronic device used to make calls, take pictures and access the internet.
- showing an unreasonable like or dislike for a person based on personal opinions
- the photographers who follow famous people everywhere they go in order to take photographs of them
- a vast computer network linking smaller computer networks worldwide
Down
- a person who corrects or changes pieces of text
- the presentation of stories in a way that is intended to provoke public interest or excitement, at the expense of accuracy
- a piece of equipment that you speak into to make your voice louder
- a regularly printed document with daily information for the population
- to remove parts of something, such as a book, movie, or letter, that you do not want someone to see or hear
- Newspaper with smaller pages that print short articles with lots of photos, often about famous people
- an electronic machine that is used for storing and processing data
- hired to work for different companies on particular assignments
15 Clues: extending or spread throughout the world • a person who corrects or changes pieces of text • hired to work for different companies on particular assignments • a piece of equipment that you speak into to make your voice louder • an electronic machine that is used for storing and processing data • a vast computer network linking smaller computer networks worldwide • ...
Tech Challenge Crossword 2024-04-10
Across
- A computer program designed to cause damage to a computer system
- A type of attack where a hacker floods a network or server with excessive requests, causing it to crash
- Measurement of the maximum data transfer capacity of a network, often expressed in bits per second
- A type of software that enables users to access and view web pages on the internet
- A popular programming language used for web development
- A programming language known for its simplicity and readability, often used for beginner programming courses
- A method of protecting sensitive information by encoding it into an unreadable format
- A popular operating system developed by Apple Inc.
Down
- A technology used to transmit data over short distances using radio waves, commonly used for wireless communication between devices
- A high-speed data storage and retrieval medium that functions like electronic memory
- A type of malware that self-replicates and spreads to other computers
- A basic unit of digital information storage
- A type of computer network that covers a large geographical area, often connecting multiple smaller networks
- Co-founder of Tesla and SpaceX, known for his work in electric vehicles, renewable energy, and space exploration
- A hardware device used to connect a computer to a network, enabling communication with other devices and access to the internet
15 Clues: A basic unit of digital information storage • A popular operating system developed by Apple Inc. • A popular programming language used for web development • A computer program designed to cause damage to a computer system • A type of malware that self-replicates and spreads to other computers • ...
AP Computer science 2023-04-24
Across
- the smallest unit of data that a computer can process and store used to simplify strings of code into different functions
- an efficient algorithm for finding an item from a sorted list of items
- an algorithm that is designed to test for errors working back from output nodes to input nodes
- leverages computers and machines to mimic the problem-solving and decision-making capabilities of the human mind.
- a computer network that connects smaller networks
- type of low-level programming language that is intended to communicate directly with a computer's hardware
- the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device
- the capacity at which a network can transmit data.
Down
- the extraction of relevant information from a larger data set
- creates a separation between two things
- the available numbers in a numbering system
- the smallest unit of data that a computer can process and store
- a list set of instructions, used to solve problems or perform tasks, based on the understanding of available alternatives.
- type of computer that uses the continuous variation aspect of physical phenomena
- computer systems that systematically and unfairly discriminate against certain individuals or groups of individuals in favor of others
15 Clues: creates a separation between two things • the available numbers in a numbering system • a computer network that connects smaller networks • the capacity at which a network can transmit data. • the extraction of relevant information from a larger data set • the smallest unit of data that a computer can process and store • ...
Castrofloresandtj 2024-10-24
Across
- process- gain the information used to gain estimates of the situation
- marsupial
- weapons- traditional weapons such as rifles and explosives
- warfare- operations carried on by small independent forces, generally in the rear of the enemy, with the objective of harassing, delaying, and disrupting military operations of the enemy.
Down
- operations- a range of actions executed within the digital realm to safeguard, secure, or target computer networks, systems, or information
- warfare the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes.
- lauching- is used when a building dry dock can be flooded. the vessel is simply floated out and towed to the fitting out dock.
- control- measures taken to prevent a fire or collision.
- ceremony- when the vessel is formally named and launched is customarily
- a series of short cruises to check out the ship and its equipment.
- warfare- warfare- Military operations conducted on, under, or over the sea and waged against other seagoing vessels or targets on land or in the air.
- warfare- the use of military aircraft and other flying machines in warfare.
- launching- vessel is either completed on perpendicular building ways near the water.
- warfare of security experts will discuss the growing threats to corporations.
- warfare are self replicating programs that can hide in systems
- conflict between two populations of drastically different levels of military capability or size. Biological warfare, or germ warfare ...
16 Clues: marsupial • control- measures taken to prevent a fire or collision. • weapons- traditional weapons such as rifles and explosives • warfare are self replicating programs that can hide in systems • a series of short cruises to check out the ship and its equipment. • process- gain the information used to gain estimates of the situation • ...
Structures 2025-11-07
Across
- Rely on their large mass and weight to ensure stability
- Use walls to support the weight of the floors and roof, transferring the load to the foundation
- Structural systems for tall buildings where the exterior columns and beams form a rigid, hollow tube-like structure to resist lateral loads.
- Utilize a "skeleton" of interconnected columns (vertical) and beams (horizontal) to support loads, enclosed by an outer "skin"
- Vertical structural elements primarily designed to resist axial compression.
- Curved structures that transfer loads to their supports by developing horizontal thrust
Down
- Use flexible fabric or cable networks under tension, often for lightweight, large-span roofs
- Combinations of two or more basic structural forms to maximize efficiency
- Moment frames with diagonal members to resist lateral forces
- architectural forms that use tension to support loads,
- Two-dimensional, flat, horizontal elements that carry loads primarily by flexure
- Horizontal structural elements that primarily resist loads by bending
- Use a framework of beams and joints, usually in triangular units, to distribute loads efficiently, often for long spans
- Vertical walls designed to resist lateral loads in high-rise buildings, often found around elevator shafts and stairwells.
- Thin, curved surfaces that derive their strength from their geometric form to handle loads
15 Clues: architectural forms that use tension to support loads, • Rely on their large mass and weight to ensure stability • Moment frames with diagonal members to resist lateral forces • Horizontal structural elements that primarily resist loads by bending • Combinations of two or more basic structural forms to maximize efficiency • ...
Computer and Technical Terms 2016-02-22
Across
- A compnent that stores data so future requests for that data can be served faster
- adress Each computer connected to the Internet is given a unique address called.
- The amount of copies that can be made of a project.
- Communication that both the sender and the receiver are active at the same time
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- A website that is considerably greater in sized is referred to being?
- Using neutral rather than subjective, boastful, or exaggerated language.
- The idea of using about half the word count as the controlled condition.
- The codes or tags that browsers use to create web pages.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
- The html file you are creating and the picture you are using for your website must be in the same?
Down
- Communication where the sending and receiving occur at different times.
- Company that helps build large websites.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The main technology for local area networks
- Can be used to create web pages online
- The amount of images from one artist or photographer allowed on a web page
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Friday Game v1.2 2023-07-07
Across
- A powerful computer that provides resources or services to other computers
- The cloud storage service in Microsoft 365 for individual users to store and sync files
- A collaboration platform in Microsoft 365 for chat, meetings, file sharing, and teamwork
- Unsolicited and unwanted email messages, often sent in bulk
- A networking device that connects multiple devices within a local area network
- The period of time during which a system or service is available and operational
- A wireless networking technology that allows devices to connect to the internet
- Voice over Internet Protocol, a technology that allows voice communication over the internet
- A copy of important data stored in case the original data is lost or damaged
Down
- The process of diagnosing and resolving problems or issues in a system
- A record or request for help or support logged by a user
- Distributed Denial of Service, an attack that disrupts the normal functioning of a network
- Measures and practices to protect computer systems and networks from cyber threats
- Malicious software that encrypts files and demands a ransom for their release
- Redundant Array of Independent Disks, a data storage technology that combines multiple physical disks into a single logical unit for improved performance or data protection
- A system of interconnected devices
- Managed Service Provider, a company that offers IT services and support to other businesses
17 Clues: A system of interconnected devices • A record or request for help or support logged by a user • Unsolicited and unwanted email messages, often sent in bulk • The process of diagnosing and resolving problems or issues in a system • A powerful computer that provides resources or services to other computers • ...
Computer and Technical Terms 2016-02-22
Across
- A compnent that stores data so future requests for that data can be served faster
- adress Each computer connected to the Internet is given a unique address called.
- The amount of copies that can be made of a project.
- Communication that both the sender and the receiver are active at the same time
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- A website that is considerably greater in sized is referred to being?
- Using neutral rather than subjective, boastful, or exaggerated language.
- The idea of using about half the word count as the controlled condition.
- The codes or tags that browsers use to create web pages.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
- The html file you are creating and the picture you are using for your website must be in the same?
Down
- Communication where the sending and receiving occur at different times.
- Company that helps build large websites.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The main technology for local area networks
- Can be used to create web pages online
- The amount of images from one artist or photographer allowed on a web page
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Computer and Technical Terms 2016-02-22
Across
- A website that is considerably greater in sized is referred to being?
- A compnent that stores data so future requests for that data can be served faster
- The amount of images from one artist or photographer allowed on a web page
- Communication that both the sender and the receiver are active at the same time
- The main technology for local area networks
- The amount of copies that can be made of a project.
- Using neutral rather than subjective, boastful, or exaggerated language.
- May result in termination of access, disciplinary review, expulsion, termination or other appropriate disciplinary action.
- The codes or tags that browsers use to create web pages.
- adress Each computer connected to the Internet is given a unique address called.
- Performing, participating, encouraging, or concealing any unauthorized use or attempts of unauthorized use of UT IT resources
Down
- The html file you are creating and the picture you are using for your website must be in the same?
- Company that helps build large websites.
- The idea of using about half the word count as the controlled condition.
- Is a suffix to the name of a computer file applied to indicate the encoding of its contents or usage.
- Communication where the sending and receiving occur at different times.
- Can be used to create web pages online
17 Clues: Can be used to create web pages online • Company that helps build large websites. • The main technology for local area networks • The amount of copies that can be made of a project. • The codes or tags that browsers use to create web pages. • A website that is considerably greater in sized is referred to being? • ...
Computer Basics Part 3 2019-03-14
Across
- removable and rewritable, uses USB port
- small,recordable, used mostly for cameras
- a vast computer network linking smaller computer networks worldwide
- transfer of data from one computer system to another
- largely obsolete--floppy disks, hard floppies and zip disks
- record the address of a website or other data to enable quick access in the future
- what is the most common browser in United States
- mounted inside system unit, main storage unit, reads data but only writes once
- a program with a graphical user interface (GUI) for displaying HTML files, used to navigate the World Wide Web
Down
- optional software additions that enhance and/or add functionality to a web browser
- the introductory page of a website, typically serving as a table of contents for the site
- a link from a hypertext file or document to another location or file, typically activated by clicking on a highlighted word or image on the screen
- DVD’s and CD’s
- an information system on the internet that allows documents to be connected to other documents by hypertext links, enabling users to search for information by moving from one document to another
- a record of web pages that you have visited in the past
- used to keep data when the power to the computer is turned off
- allows multiple documents to be contained within a single window
17 Clues: DVD’s and CD’s • removable and rewritable, uses USB port • small,recordable, used mostly for cameras • what is the most common browser in United States • transfer of data from one computer system to another • a record of web pages that you have visited in the past • largely obsolete--floppy disks, hard floppies and zip disks • ...
Propagandizing Words 2013-05-08
Across
- A belief or conclusion held with confidence but not substantiated by positive knowledge or proof
- To influence or manage shrewdly or deviously, in this case, propaganda
- The act of manifesting; usually the result of false propaganda in communist societies
- a short message or commercial, especially a commercial spoken on radio or television
- An object of criticism or attack
- A way of spreading information via technology
- Tending or having the power to persuade, very often, is used to describe propaganda
- A usually short communication transmitted by words, signals, or other means from one person, station, or group to another
- The way propaganda is used now days, a synonym of this word is practically
Down
- An interconnected system of networks that connects computers around the world via the TCP/IP protocol. The use of propaganda is new to this system
- / Something that has been organized or made into an ordered whole
- / The art and technique of using words effectively to impart information or ideas
- / The act or process of buying and selling in a market
- It is a way to promote some sort of company, political party, etc
- Serving to inform; providing or disclosing information; instructive, propaganda’s goal
- One who is actively involved in manipulating propaganda and media advertisements
- A piece of unverified information of uncertain origin usually spread by word of mouth
17 Clues: An object of criticism or attack • A way of spreading information via technology • / The act or process of buying and selling in a market • / Something that has been organized or made into an ordered whole • It is a way to promote some sort of company, political party, etc • To influence or manage shrewdly or deviously, in this case, propaganda • ...
CS 100-Crossword Puzzle 2016-02-17
Across
- a file recording style details, such as fonts, colors, etc.
- giving a lot of information in a few words
- a code that describes how a web page is formatted
- the codes or tags that browsers use to create web pages
- comprised of web servers and their files
- the main technology for local area networks
- the exclusive right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video, etc.
- legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders
- language that is neutral, boastful, or exaggerated
- a system of principles to guide decisions and achieve rational outcomes
Down
- when both a sender and the receiver are active at the same time
- editor a type of program used for editing plain text
- a piece of information that determines the properties of a field or tag in a database or a string of characters in a display
- when a group of computers and devices are connected to a single server and share a common wireless link
- a series of four numbers separated by dots that are given to each computer connected to the Internet
- a group of information on a computer that can be software programs or data
- to use a computer to gain unauthorized access to data in a system
17 Clues: comprised of web servers and their files • giving a lot of information in a few words • the main technology for local area networks • a code that describes how a web page is formatted • language that is neutral, boastful, or exaggerated • editor a type of program used for editing plain text • the codes or tags that browsers use to create web pages • ...
internet software crossword 2022-10-25
Across
- act of requesting another person to be your friend (and connecting with you) on a social media.
- online conversation where a person can continually read messages from others and then type and send a message reply.
- serves as a single platform to connect all of the parts of a computer together.
- Its a type of online fraud this type of fraud can send you to fake website
- is a unit of measurement for computer memory/data storage used by mathematicians and computer science professionals.
- A unit or measure of digital information, consisting of eight binary digits
- temporary memory bank where your computer stores data
- It's the most important part of the computer.
- it’s a unit of frequency equal to one billion hertz.
- Its equal to about one billion bytes
- PHONE A mobile phone that offers advanced capabilities and features like a web connection and a portable media player.
Down
- is a type of technology that stores operating systems, applications, and
- An online graphic representation of a user
- Software that displays advertisements on your computer.
- It's the smallest unit of data that a computer can hold and store.
- Messages sent through an electronic computer network to specific groups or individuals
- An industry standard for short-range wireless connections between devices like mobile phones, headsets, computers and PDAs.
- Several networks that are connected to one
- DISK A fixed magnetic disk drive used to store data on computes
19 Clues: Its equal to about one billion bytes • An online graphic representation of a user • Several networks that are connected to one • It's the most important part of the computer. • it’s a unit of frequency equal to one billion hertz. • temporary memory bank where your computer stores data • Software that displays advertisements on your computer. • ...
CH. 7-Network Fundamentals 2021-10-24
Across
- This is a hardware device that routes data
- Port 53 and uses TCP and the protocol finds the IP address
- High bandwidth connection used in backbone networks
- always on technology that uses phone lines
- ______is used to network multiple computers together.
- Uses a cable modem to connect to a traditional cable TV network
- when a device is assigned a ____ IP the address does not change
- Connects multiple wireless devices and uses an access point
- port that refers to the destination point for data transfer
- is a protocol that automates the task of assigning an Internet Protocol (IP) address (dynamic addressing)
Down
- uses different frequencies to send multiple signals over media
- port that is an external or internal hardware component where wired connections are plugged into in order to establish communication and data transfer lines
- relies on cell towers to create a network used by cell phones and connectivity to the internet
- Not a good solution for time-sensitive applications like gaming, Voice over Internet Protocol (VoIP), and video conferencing
- a device that allows multiple computers to communicate with each other over a network.
- specifies how data is exchanged over the internet/network by providing end-to-end communications that identify how it should
- Two parts of an IP address are network and ____
- Commonly uses Bluetooth to connect mice, keyboards, phones and tablets
- uses an analog modem to call another modem
19 Clues: This is a hardware device that routes data • always on technology that uses phone lines • uses an analog modem to call another modem • Two parts of an IP address are network and ____ • High bandwidth connection used in backbone networks • ______is used to network multiple computers together. • Port 53 and uses TCP and the protocol finds the IP address • ...
Computer Parts 2023-10-17
Across
- A computers storage containing non- volatile, permanent dad that can only be read, not written.
- Accepts text files or images from a computer.
- A small device that a computer user pushes across a desk in order to point to a play on a display.
- Electrical device that offers electric power such as a laptop computer.
- The backbone of a computer components that ties together in one spot.
- A high capacity, storage device containing a read-write mechanism plus one or more hard disk.
- The brain of the computer, containing all the circuitry needed to process storage data and output results.
- To pick up sounds such as vibrations in the air into electronic signals.
- The computer component for generating and recording audio.
- A computers short-term memory where data that is currently being used is stored.
Down
- A device used for observing or keeping continuous record of a process.
- A terminal device used to enable internet connection through wireless networks.
- A card that connects to a computer system to generate images to display
- An input device that consists of numbers and letters known as keys.
- A COMPUTER CASE USED FOR ACTIVE COOLING.
- Universal connection used to connect devices.
- Enables a computer to access the internet.
- An input device that captures still pictures or motion videos.
- A machine that scans documents and converts them into data.
19 Clues: A COMPUTER CASE USED FOR ACTIVE COOLING. • Enables a computer to access the internet. • Accepts text files or images from a computer. • Universal connection used to connect devices. • The computer component for generating and recording audio. • A machine that scans documents and converts them into data. • ...
Network Systems cross word 2023-08-29
Across
- Balancing The process of distributing network traffic across multiple servers to improve performance.
- A unique identifier for devices on a network.
- The process of breaking down data into smaller packets for transmission.
- A network topology where each device is connected to every other device.
- Name System The process of converting domain names into IP addresses.
- A protocol that ensures reliable and ordered delivery of data packets.
- A device that filters incoming and outgoing network traffic based on a set of rules.
- Address A unique address that identifies a device on a network.
- The time it takes for a data packet to travel from sender to receiver.
- The process of converting private IP addresses to a single public IP address.
- A network device that connects multiple networks together.
- loss Measurement of packets that are lost in transmission.
- The maximum amount of delay that can be tolerated in real-time applications.
Down
- The maximum amount of data that can be transmitted in a given time.
- Required Bandwidth The minimum amount of bandwidth required for a specific application to function properly.
- A device that connects multiple computers in a local area network.
- Host Configuration Protocol A protocol that assigns IP addresses dynamically to devices on a network.
- The practice of duplicating network components to ensure reliability and availability.
- A network topology where all devices are connected to a central hub.
- A measure of the amount of data that can be transmitted over a network connection in a certain time.
20 Clues: A unique identifier for devices on a network. • A network device that connects multiple networks together. • loss Measurement of packets that are lost in transmission. • Address A unique address that identifies a device on a network. • A device that connects multiple computers in a local area network. • ...
Psychology Vocab Study Guide 2014-04-18
Across
- Deviation/ a quantity calculated to indicate the extent of deviation for a group as a whole.
- Observation/ is a common research method in behavioral sciences such as psychology
- a region of the brain, between the thalamus and the midbrain
- its function is to coordinate and regulate muscular activity
- middle part of the diencephalon through which sensory impulses pass to reach the cerebral cortex
Down
- the central trunk of the mammalian brain
- cells/ a supportive cell in the central nervous system.
- a substance(as norepinephrine or acetylcholine) that transmits nerve impulses across a synapse.
- potential/ the change in electrical potential associated with the passage of an impulse along the membrane of a muscle cell or nerve cell.
- a specialized cell transmitting nerve impulses; a nerve cell
- system/a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood.
- arcs/ the nerve pathway involved in a reflex action including at its simplest a sensory nerve and a motor nerve with a synapse between.
- callosum/ a broad band of nerve fibers joining the two hemispheres of the brain
13 Clues: the central trunk of the mammalian brain • cells/ a supportive cell in the central nervous system. • a specialized cell transmitting nerve impulses; a nerve cell • a region of the brain, between the thalamus and the midbrain • its function is to coordinate and regulate muscular activity • ...
Chapter 10 2015-03-08
Across
- vast collection of computer networks that connects millions of computers and tens of millions of people around the world.
- various Internet applications that allow individuals to share information and interests in an online community.
- second-generation Web technologies that allow for communication and collaboration of people in Web-based communities.
- a digital media file, most often audio,distributed via the Internet for playback on a portable media player, such as Apple’s iPod, or a computer.
- occurring at the same time
- a unique Internet address
Down
- an activity structured around a series of questions or searching tasks.
- allows two users on the Internet to synchronously communicate by typing messages back and forth to one another in real time.
- software that allows users to create and edit Web pages using a Web browser.
- not occurring at the same time
- inquiry-oriented activities in which some or all of the information used by learners is drawn from resources on the Web
- the computer that controls, sorts, and distributes incoming information on a particular topic)
- a form of synchronous communication in which users communicate mainly by typing messages to one person or many people at the same time
13 Clues: a unique Internet address • occurring at the same time • not occurring at the same time • an activity structured around a series of questions or searching tasks. • software that allows users to create and edit Web pages using a Web browser. • the computer that controls, sorts, and distributes incoming information on a particular topic) • ...
unit5 2015-03-20
Across
- 10. __________is unique time and date stamp identifying when the action took place
- 7._______ record is a fundamental tool for intrusion detection.
- 11. _________condition denotes which, if any, exception condition is raised on return.
- 2.____________user is an individual who seizes supervisory control of the system.
- 4.Other name of Intruder
- 12. _________is a receptor of action
Down
- 5.___________value is used to protect the password file in UNIX.
- 3._________referred as a hacker or cracker
- 1.__________is an individual who is not authorize to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
- 6.________used to protect our network from other networks
- 8. ___________ based anomaly detection is profile the activity of each user is developed and used to detect changes in the behavior of individual accounts.
- 1._______is a legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
- based 9.____________involves an attempt to define a set of rules that can be used to decide changes in the behavior of individual accounts
13 Clues: 4.Other name of Intruder • 12. _________is a receptor of action • 3._________referred as a hacker or cracker • 6.________used to protect our network from other networks • 7._______ record is a fundamental tool for intrusion detection. • 5.___________value is used to protect the password file in UNIX. • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
IT Devices 2025-10-24
Across
- A wearable computer in watch form that can track fitness, display notifications, and run simple apps
- Device for listening to music more generally with people, which can be wired or work with Bluetooth
- combines a cell phone with a handheld computer, having a touchscreen interface and internet access
- A portable computer with a built-in screen, keyboard, and trackpad that can be powered by battery or electricity
- Portable speaker that fits inside people’s ears and connects to any audio-producing device per Bluetooth
Down
- battery used to charge devices like a mobile phone
- A small portable device with a touchscreen which resembles a Smartphone but has a larger size
- flat surface on which a picture or document of a computer is projected
- A thin flat rubber device on which a computer mouse is moved
- An input device with keys that allows users to type text and commands into a computer
- creates physical copies of digital documents and images on paper or other materials
- that controls the cursor on a computer screen by moving and clicking
- A networking device that forwards data between computer networks and connects devices to the internet
13 Clues: battery used to charge devices like a mobile phone • A thin flat rubber device on which a computer mouse is moved • that controls the cursor on a computer screen by moving and clicking • flat surface on which a picture or document of a computer is projected • creates physical copies of digital documents and images on paper or other materials • ...
Chapter 05 Final Digital Security, Ethics, & Privacy Crossword 2018-11-08
Across
- what is a technique intruders use to make their network of Internet transmission appear legitimate to a victim computer or network
- what is a program or set of instructions in a program that allows users to bypass security controls
- what is the term for a website that uses encryption techniques to protect its data
- to read encrypted data, the recipient must decipher it into a readable for. What is the term for this process
- what can transmit germs
- what occurs when someone steals personal or confidential information
- is someone who demands payment in order to stop an attack on an organization's technology infrastructure
Down
- a web server stores on a users computer
- has the same intent as a cracker, but does not have the technical skills and knowledge
- in which devastating type of DoS attach are multiple unsuspecting computers used to attack multiple computer networks
- computer viruses, worms, trojan horses, and rootkits are classified as what
- is any even or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
- what categories are the rights to which creators are entitled for their work
- what term refers to making a copy of a file
- what gives authors and artists the exclusive rights to duplicate, publish, and sell their materials
15 Clues: what can transmit germs • a web server stores on a users computer • what term refers to making a copy of a file • what occurs when someone steals personal or confidential information • computer viruses, worms, trojan horses, and rootkits are classified as what • what categories are the rights to which creators are entitled for their work • ...
GHC_Crossword2 2012-12-11
Across
- The control block or blocks of data added prior to the actual message
- A reduction in a signals level as expressed in deciBels
- The disturbance or interference of open-air radio transmission to deliberately prevent communication
- The arrangement of stations and the links connecting the stations of a data communications network
- The undesirable noise or disturbance that occurs on a communications channel, caused by natural or man-made signals
- A network station designed to interconnect two otherwise incompatible devices or networks
- Any combination of two or more technologies
Down
- A grouping of 8 bits
- The waiting time, or delay between a stations request to a transmission channel,and completion
- A memory device type that loses its stored contents upon electrical power fluctuation or failure
- A modems characteristic when it is sending a carrier signal on a multipoint line when it has not been polled
- Using a constant time interval between bits or characters to insure that all data communications equipment is in step with each other
- A method of data communications using 75 bps as a transmission speed
- Interference from radio transmission signals or microwave communication causing a received signal to deflect from the target
- A character normally sent at the beginning/end of a synchronous transmission to provide timing and bit synchronization
15 Clues: A grouping of 8 bits • Any combination of two or more technologies • A reduction in a signals level as expressed in deciBels • A method of data communications using 75 bps as a transmission speed • The control block or blocks of data added prior to the actual message • A network station designed to interconnect two otherwise incompatible devices or networks • ...
Crossword 2023-09-01
Across
- The total amount of money earned by a company before expenses.
- One of the two global payment card networks along with Visa, founded in 1966.
- A code, typically consisting of three or four digits, found on the back of a debit card used for added security in online transactions
- Ownership of this type of company is typically not publicly traded.
- The measure of how rapidly a company can turn its assets into cash to meet short-term obligations.
- A company's financial statement that shows its revenues, expenses, and profits or losses over a specific period.
- A financial institution where you can deposit and withdraw money.
Down
- The amount of money left over after subtracting expenses from revenue.
- The process of systematically allocating the cost of an asset over its useful life.
- The financial statement that shows a company's financial position at a specific point in time.
- A convenient piece of plastic that grants you the power to make purchases on borrowed funds.
- A record of all financial transactions within a business, often categorized into accounts.
- The total amount of money owed to creditors by a business or individual.
- A unique identification number required to complete online transactions with a debit card.
- A financial product that represents ownership in a company.
15 Clues: A financial product that represents ownership in a company. • The total amount of money earned by a company before expenses. • A financial institution where you can deposit and withdraw money. • Ownership of this type of company is typically not publicly traded. • The amount of money left over after subtracting expenses from revenue. • ...
MAKAYLA 2024-01-09
Across
- Error Error from attempting to represent a number that is too large.
- Wide Web a system of linked pages, programs, and files.
- Operators <, >, <=, >=, ==, != indicate a Boolean expression
- form of program documentation written into the program to be read by people and which do not affect how a program runs.
- 8 bits
- A computer network consisting of interconnected networks that use standardized, open (nonproprietary) communication protocols.
- A relationship between two pieces of data, typically referring to the amount that one varies in relation to the other.
- Associated with an action and supplies input data to a program. Can be generated when a key is pressed, a mouse is clicked, a program is started, or by any other defined action that affects the flow of execution.
Down
- A named group of programming instructions. Also referred to as a “procedure”.
- Device a machine that can run a program, including computers, tablets, servers, routers, and smart sensors
- the maximum amount of data that can be sent in a fixed amount of time, usually measured in bits per second.
- A type of computer that forwards data across a network
- A way of representing information using only two options.
- Finding and fixing problems in an algorithm or program.
- bias Data that does not accurately reflect the full population or phenomenon being studied
15 Clues: 8 bits • A type of computer that forwards data across a network • Wide Web a system of linked pages, programs, and files. • Finding and fixing problems in an algorithm or program. • A way of representing information using only two options. • Operators <, >, <=, >=, ==, != indicate a Boolean expression • ...
Cash Vocab 2024-02-22
Across
- the permanent reduction of a company's labor force by removing unproductive workers or divisions
- someone that another person or company hires to perform a service
- the process of actively seeking out, finding and hiring candidates for a specific position or job
- a form employers use to collection information about you to see if you are a good fit for the position
- a venture that involves persuading customers to buy products to increase sales
- a formal, in-depth conversation between two or more persons, wherein exchange of information takes place, with a view of checking candidate's acceptability for the job.
- a short written description of your education, qualifications, previous jobs, and sometimes also your personal interests
- to give up a job or position by telling your employer that you are leaving
Down
- the platforms on which users build social networks and share information—to build a company's brand, increase sales, and drive website traffic
- a recommendation from a business contact
- the total amount of sales you make over a set period
- the end of an employee's work with a company
- an individual or organization that has employees.
- an essential tool for banks, lenders, suppliers and credit grantors in assessing the creditworthiness of small businesses.
- a permanent decrease in the total number of workers a company employs
15 Clues: a recommendation from a business contact • the end of an employee's work with a company • an individual or organization that has employees. • the total amount of sales you make over a set period • someone that another person or company hires to perform a service • a permanent decrease in the total number of workers a company employs • ...
Module 3 Crossword 2019-04-19
Across
- This word is short for binary digit and is the smallest unit of data represented in a computer.
- CPU is considered the _________ of the computers.
- This IP address is temporary and changes periodically.
- Evaluating the way the facility does business in order to improve efficiency is known as _________.
- This country represses what its citizens can read on the web.
- How a network is organized or laid out is referred to as its _________.
- Whether new services or new clinics will be implemented is an example of _________ scanning.
Down
- In a project plan, this phase prepares the facility for the conversion from the old system to the new.
- System _________ is the combining of the various subsystems into one larger system and ensuring that the subsystems function together as a whole.
- This standard method for network management is used to manage small networks and is a simple network solution that does not require a server.
- The Open Systems Interconnection (OSI) is composed of how many layers?
- This acts as a bridge and takes data from one system and plugs that data into another.
- When evaluating the training, this evaluates what the trainees thought about the training.
- This system locates data that is stored in primary or secondary storage.
- This was the first standard protocol for communication between EHR components.
15 Clues: CPU is considered the _________ of the computers. • This IP address is temporary and changes periodically. • This country represses what its citizens can read on the web. • The Open Systems Interconnection (OSI) is composed of how many layers? • How a network is organized or laid out is referred to as its _________. • ...
Intro to Psych Exam 4 Review 2024-04-10
Across
- an emotional reaction that leads to resistance against pressure to conform.
- the idea that the experience of emotion is accompanied by physical arousal.
- the HPA axis is the system of connections between the hypothalamus, the adrenal glands, and the ____ that plays an important role in our experience of stress.
- ___ sleep happens 25% of the time.
- the common tendency to overestimate the role of personal factors and overlook the impact of social situations in judging others is called the ___ attribution error.
- ___ motivation comes from the pleasure of the activity itself.
Down
- a state of consciousness involving focused attention and reduced peripheral awareness.
- the theory that the experience of emotion is the result of experienced arousal.
- another name for sleepwalking.
- the behavioral reaction to stress that involves activities designed to create social networks that provide protection from threats.
- the natural inclination to sleep at a certain time.
- when group members prioritize group harmony and do not voice concerns about a decision being made.
- self-monitoring is the tendency to ___ behavior to meet the demands of social situations.
- the tendency to perform cognitively easy tasks ___ in the presence of others is called social facilitation.
- an optimal experience during which the mind and body work harmoniously while homed in on a specific task.
15 Clues: another name for sleepwalking. • ___ sleep happens 25% of the time. • the natural inclination to sleep at a certain time. • ___ motivation comes from the pleasure of the activity itself. • an emotional reaction that leads to resistance against pressure to conform. • the idea that the experience of emotion is accompanied by physical arousal. • ...
Browsing Safely 2025-06-05
Across
- IT IS A COLLECTION OF TECHNOLOGIES,PROCESSES AND PRACTICES DESIGNED TO PROTECT NETWORKS,COMPUTERS,PROGRAMS, AND DATA FROM ATTACK OR DAMAGE
- IT IS AN IMPRESSION WHEN ENGAGE IN VARIOUS ONLINE ACTIVITIES LIKE BROWSING,COMMUNICATING ETC.
- IT IS USED TO CONDUCT TERRORISM THROUGH THE USE OF COMPUTER AND INTERNET TO CAUSE FEAR AND PANIC
- IT IS A CRIME IN WHICH VICTIM IS ATTACKED FIRST AND THEN FORCED TO PAY MONEY TO STOP FURTHER ATTACKS
- IT IS A CRIMINAL ACTIVITY INTENDED TO HARM ANYONE USING INTERNET AND COMPUTER
- IN THIS PROCESS TO FOOL ANYONE TO BE FROM A BANK AND TRICK PEOPLE INTO GIVING THEM MONEY
- IT MEANS HOAXING OR MISLEADING
- SET OF PROGRAMS THAT HAMPER THE NORMAL FUNCTIONING OF COMPUTER
- IT IS A SOFTWARE THE HELPS IN PREVENTING UNAUTHORIZED ACCESS TO YOUR COMPUTER
Down
- THEY ARE CALLED 'UNETHICAL HACKERS'
- IT IS THE PROCESS OF 'BEFRIENDING' CHILDREN ON SOCIAL MEDIA TO FACILITATE ONLINE OR PHYSICAL SEXUAL ABUSE
- IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION.
- IT REFERS TO ILLEGAL ENTRY OF SOMEONE'S COMPUTER SYSTEM OR NETWORK
- IT IS AN ACT OF HARMING OR HARASSING ANYONE USING INFORMATION TECHNOLOGY
- IT IS A COMPUTER PROGRAM THAT IS DESIGNED TO IDENTIFY,PREVENT,AND REMOVE VIRUSES FROM COMPUTER
15 Clues: IT MEANS HOAXING OR MISLEADING • THEY ARE CALLED 'UNETHICAL HACKERS' • SET OF PROGRAMS THAT HAMPER THE NORMAL FUNCTIONING OF COMPUTER • IT REFERS TO ILLEGAL ENTRY OF SOMEONE'S COMPUTER SYSTEM OR NETWORK • IT IS AN ACT OF HARMING OR HARASSING ANYONE USING INFORMATION TECHNOLOGY • IT REFERS TO THE ACT OF STEALING AND MISUSING SOMEONE'S PERSONAL INFORMATION. • ...
Technology 2023-05-08
Across
- a set of computer programs and associated documentation and data
- the most important processor in a given computer
- an organized collection of structured information, or data, typically stored electronically in a computer system
- intelligence demonstrated by machines, as opposed to intelligence displayed by humans or by other animals
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- network a set of computers sharing resources located on or provided by network nodes
- every aspect of protecting an organization and its employees and assets against cyber threats
- an electronic link providing direct access from one distinctively marked place in a hypertext or hypermedia document to another in the same or a different document.
- a worldwide system of computer networks
Down
- the physical parts of a computer
- to transfer
- the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems
- a type of malicious software, or malware, that spreads between computers and causes damage to data and software
- design, construction, and use of machines (robots) to perform tasks done traditionally by human beings
- a specific unit of data that's equal to about 1 billion bytes of data
15 Clues: to transfer • the physical parts of a computer • a worldwide system of computer networks • the most important processor in a given computer • a set of computer programs and associated documentation and data • a specific unit of data that's equal to about 1 billion bytes of data • network a set of computers sharing resources located on or provided by network nodes • ...
The Gift of the magi 2025-02-11
Across
- When you ransack, you rifle through things, steal some of them, and leave a huge mess behind
- Of all the social networks, one predominates.
- If you are ardent, you are passionate about something. A pop star's ardent admirers might go so crazy at his concert that they faint from excitement.
- To chronicle an event is to record it as it happens, and a chronicle is a record of those events.
- Use the noun prudence to describe sensible decisions about everyday life, like the prudence of people who spend their money wisely, saving as much as they can.
- The adjective ecstatic turns the noun "ecstasy" into a descriptive word.
- A vestibule is a little area just inside the main door of a building, but before a second door
- based on pretensedeceptively pleasing
Down
- Parsimony is a noun to use when you are watching your money very carefully
- lower the value of something
- Wanting what someone else has and resenting them for having it is envy.
- solicitation for money or food (especially in the street by an apparently penniless person
- An adornment is some ornament or accent that makes a person or thing look more attractive.
- cause extensive destruction or ruin utterly
- Sterling is British money, but it also describes anything of very high quality
15 Clues: lower the value of something • based on pretensedeceptively pleasing • cause extensive destruction or ruin utterly • Of all the social networks, one predominates. • Wanting what someone else has and resenting them for having it is envy. • The adjective ecstatic turns the noun "ecstasy" into a descriptive word. • ...
Authentication and Authorization 2024-11-26
Across
- _______ is an authorization model that grants access to an organization’s specific resources based on the relationship between the user and the resource.
- __________ Layer a security protocol that encrypts data transmitted between systems
- Organizations need to pick an authorization model that is easy for users to understand but also provides the required level of security.
- A authorization step where the user enters _______.
- A authorization step where the _____ sends request to server.
- _______ access control that restricts access based on the level of sensitivity of the resources.
- The process of verifying a user's identity by checking their credentials.
Down
- ________ grants users access to an organization’s specific data and systems based on particular attributes associated with the user.
- ________ authentication uses unique physical characteristics.
- ______ Directory Access Protocol refers to a standard protocol used to access and manage directory information.
- ________ access control defines roles and privileges to restrict systems access to only authorized users.
- ________ is the process after authentication that determines the level of access a user has to system resources such as data, applications and networks.
- _____ is the opposite of MAC as it assigns privileges based on the user and the access group.
- __________ authentication provides a temporary token
- Allows users to log in to multiple applications using the same set of credentials.
15 Clues: A authorization step where the user enters _______. • __________ authentication provides a temporary token • ________ authentication uses unique physical characteristics. • A authorization step where the _____ sends request to server. • The process of verifying a user's identity by checking their credentials. • ...
Information Technology Career Cluster 2025-10-06
Across
- The amount of data that can be transmitted over a network in a given amount of time.
- the development, maintenance, and use of computer software, systems, and networks
- Part of a computer system that is designed to block unauthorized access
- a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
- unwanted e-mail (usually of a commercial nature sent out in bulk)
- a small amount of data generated by a website and saved by your web browse to remember information about you.
- A program used to view Web pages.
- new technologies that aim to conserve the natural environment and resources.
- identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
- a person who designs, writes and installs computer programs and applications
Down
- helps increases or maintains the capabilities of a person with a disability
- type of software that can process information on its own without human intervention.
- the process of converting human instructions into a language that a computer can understand and follow
- Measures taken to protect a computer or computer system against unauthorized access or attack
- A global network connecting millions of computers, making it possible to exchange information.
15 Clues: A program used to view Web pages. • unwanted e-mail (usually of a commercial nature sent out in bulk) • Part of a computer system that is designed to block unauthorized access • helps increases or maintains the capabilities of a person with a disability • new technologies that aim to conserve the natural environment and resources. • ...
Networking 2023-01-09
Across
- a computer network restricted to an organization
- certain sets of rules that determine how data should be transferred over networks, compressed, presented on the screen and so on.
Down
- a computer network that allows controlled access to an information source available on internet.
- the layout in which various components of a network are connected and communicate with each other.
4 Clues: a computer network restricted to an organization • a computer network that allows controlled access to an information source available on internet. • the layout in which various components of a network are connected and communicate with each other. • ...
Greek Trade Routes 2025-05-01
Across
- networks Systems of exchange connecting different regions for the purpose of buying, selling, or bartering goods.
- Independent sovereign cities that function as political and economic centers, such as Athens or Corinth in ancient Greece.
- Prominent natural or manmade features used for navigation, such as mountains or lighthouses.
- winds Seasonal northerly winds in the Mediterranean used by sailors for predictable travel.
- A fast ancient Greek warship with three rows of oars, used to protect trade routes.
- A sturdy Greek merchant ship designed for transporting goods.
- (North Star) A fixed star used by navigators to find true north.
- A sundial component used to measure the sun’s altitude and estimate latitude.
Down
- People who travel or work on the sea, especially sailors or navigators.
- (Pilot Books) Written guides describing coastal routes, distances, and harbors.
- A simple navigational tool for measuring star angles, possibly used by later Greek sailors.
- Sea The ancient Greek name for the Black Sea.
- Sea The body of water between Greece and Asia Minor, central to Greek trade and culture.
- navigation The practice of using stars, the sun, and the moon to determine direction and position at sea.
- Heavy devices dropped to the seabed to keep ships stationary in harbors or during storms.
- of Alexandria An ancient lighthouse in Egypt, one of the Seven Wonders, aiding sailors in navigation.
- Graecia Greek colonies in southern Italy and Sicily.
17 Clues: Sea The ancient Greek name for the Black Sea. • Graecia Greek colonies in southern Italy and Sicily. • A sturdy Greek merchant ship designed for transporting goods. • (North Star) A fixed star used by navigators to find true north. • People who travel or work on the sea, especially sailors or navigators. • ...
Networking 2025-10-20
Across
- the most basic networking device that connects multiple computers or other network devices together.
- A very large Wide Area Network.
- Wide Web An information system on the Internet which allows documents to be connected to other documents by hypertext links.
- The computer on a network that request data from a server.
- A group of interconnected computers and devices.
- A router is a device that routes data packets transmitted within a network, or between networks, to their intended destination.
- "billions"
- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- using wires or cables rather than wireless technology to transmit signals
- "millions", so 1Mbit = 1,000,000 bits
Down
- In computing, bandwidth is the maximum rate of data transfer across a given path,(measured in "bits")
- printers, etc...) and connections in a network.
- Topology The description of the arrangement of devices (e.g. switches, routers, computers,
- Delay in the time from when the information is requested, until it is received.
- A computer that holds data to be shared with other computers. Example: A Web Server stores and serves websites. An eMail Server stores and serves eMails.
- A network component that filters network packets, so that a device attached to the network only receives packets intended for that device.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- using radio, microwaves, etc. (as opposed to wires or cables) to transmit signals.
- smallest unit of data
19 Clues: "billions" • smallest unit of data • A very large Wide Area Network. • "millions", so 1Mbit = 1,000,000 bits • printers, etc...) and connections in a network. • A group of interconnected computers and devices. • The computer on a network that request data from a server. • using wires or cables rather than wireless technology to transmit signals • ...
PC 2022-09-20
Across
- a term in translation meaning "prescription", that is, a given sequence of actions. This concept is directly related to the concept of an algorithm.
- compact portable computer
- a type of malicious programs that can infiltrate the code of other programs, system memory areas, boot sectors and distribute their copies over various communication channels
- a type of transmission line, a device for transmitting electromagnetic energy or signals from one object to another.
- this is any information received and transmitted, stored by various sources.
Down
- data, or content, that is combined with each other in various forms: sound, animated computer graphics, video.
- a program or set of programs used to control a computer
- a document or set of documents intended to represent something
- a device that performs logical operations and data processing may use display input and output devices, and typically includes a central processing unit (CPU) for performing operations.
- information and communication network and a worldwide system of interconnected computer networks for storing and transmitting information.
10 Clues: compact portable computer • a program or set of programs used to control a computer • a document or set of documents intended to represent something • this is any information received and transmitted, stored by various sources. • data, or content, that is combined with each other in various forms: sound, animated computer graphics, video. • ...
PC 2022-09-20
Across
- data, or content, that is combined with each other in various forms: sound, animated computer graphics, video.
- a document or set of documents intended to represent something
- compact portable computer
- a device that performs logical operations and data processing may use display input and output devices, and typically includes a central processing unit (CPU) for performing operations.
- this is any information received and transmitted, stored by various sources.
Down
- a type of malicious programs that can infiltrate the code of other programs, system memory areas, boot sectors and distribute their copies over various communication channels
- information and communication network and a worldwide system of interconnected computer networks for storing and transmitting information.
- a type of transmission line, a device for transmitting electromagnetic energy or signals from one object to another.
- a program or set of programs used to control a computer
- a term in translation meaning "prescription", that is, a given sequence of actions. This concept is directly related to the concept of an algorithm.
10 Clues: compact portable computer • a program or set of programs used to control a computer • a document or set of documents intended to represent something • this is any information received and transmitted, stored by various sources. • data, or content, that is combined with each other in various forms: sound, animated computer graphics, video. • ...
Network Essentials 2022-11-09
Across
- a way to map multiple local private addresses to a public one before transferring the information
- directing traffic from the outside world to the appropriate server inside a local TCP/IP network
- network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment
- interface card, hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
Down
- perimeter network that protects an organization's internal local area network (LAN) from untrusted traffic
- networking device that forwards data packets between computer networks
- hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- device that converts data from a digital format into a format suitable for an analog transmission
- device or computer that allows wireless devices to connect to and communicate with a network
10 Clues: networking device that forwards data packets between computer networks • device or computer that allows wireless devices to connect to and communicate with a network • directing traffic from the outside world to the appropriate server inside a local TCP/IP network • ...
DIGITAL CROSSWORD 2022-05-27
Across
- a device or program enabling a user to communicate with a computer.
- a thing made or adapted for a particular purpose, especially a piece of mechanical or electronic equipment.
- a high-capacity transmission technique using a wide range of frequencies, which enables a large number of messages to be communicated simultaneously.
- the transmission capacity of a computer network or other telecommunication system.
Down
- the process or action of verifying the identity of a user or process.
- the machines, wiring, and other physical components of a computer or other electronic system.
- convert (information or an instruction) into a particular form.
- a program or piece of software designed and written to fulfill a particular purpose of the user.
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- a method of transmitting or receiving data (especially video and audio material) over a computer network as a steady, continuous flow, allowing playback to start while the rest of the data is still being received.
10 Clues: convert (information or an instruction) into a particular form. • a device or program enabling a user to communicate with a computer. • the process or action of verifying the identity of a user or process. • the transmission capacity of a computer network or other telecommunication system. • ...
IOT Crossword 2022-07-05
Across
- Reduces the cost of backhauling all IoT data to the cloud.
- A device used by utility companies to collect information about energy consumption (e.g., electricity, natural gas, water), and transmit the data back to the company or even to the consumer.
- An umbrella term for M2M technology when it focuses exclusively on industrial machines.
- A collection of scattered, independent devices that measure environmental or physical conditions, all without significant power consumption.
- This is any device that gathers information from various network points and sends that information on to another network.
- ________ in IoT is one of the key characteristics, devices have different hardware platforms and networks.
Down
- Mobile Cloud applications moves the __________ Power and __________ away from the mobile phone, and into the cloud.
- This network is commonly used to pair health-tracking wearables with users’ cell phones and install location trackers on household devices.
- World’s largest technical professional society that aims to promote standardization through international electronics development.
- The language two or more machines use to communicate with each other.
10 Clues: Reduces the cost of backhauling all IoT data to the cloud. • The language two or more machines use to communicate with each other. • An umbrella term for M2M technology when it focuses exclusively on industrial machines. • ________ in IoT is one of the key characteristics, devices have different hardware platforms and networks. • ...
June 2020 Newsletter Crossword Puzzle 2020-06-04
Across
- Occurs when an employee shares personally identifiable information about a single or relatively small number of people to an unauthorized recipient.
- An alternate way of accessing a system. Malware might add a backdoor to a system after infecting it.
- Inactive data that is physically stored on media such as a hard drive, laptop, flash drive, or archived/stored another way.
- Data that is actively moving from one location to another via the Internet or over a network.
- Practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks by cyber criminals.
- Process that occurs when a user proves identity, such as using a personal identity verification card and/or password.
Down
- The result of taking plaintext and encrypting it.
- Grants authorized users the right to use a service while preventing access to non-authorized users.
- A list of applications that users are allowed to install and run on their computers.
- A password attack that attempts to guess a password.
10 Clues: The result of taking plaintext and encrypting it. • A password attack that attempts to guess a password. • A list of applications that users are allowed to install and run on their computers. • Data that is actively moving from one location to another via the Internet or over a network. • ...
Fake news 2019-11-16
Across
- The use of humour, irony, exaggeration, or ridicule to expose and criticize people's stupidity or vices, particularly in the context of contemporary politics and other topical issues.
- A person who writes for newspapers, magazines, or news websites or prepares news to be broadcast.
- The activity or industry of broadcasting sound programmes to the public.
- A printed publication (usually issued daily or weekly) consisting of folded unstapled sheets and containing news, articles, advertisements, and correspondence.
- Make sure or demonstrate that (something) is true, accurate, or justified.
Down
- Information, especially of a biased or misleading nature, used to promote a political cause or point of view.
- A person who is professionally involved in politics, especially as a holder of an elected office.
- A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- Of undisputed origin and not a copy; genuine.
- A set of related web pages located under a single domain name.
10 Clues: Of undisputed origin and not a copy; genuine. • A set of related web pages located under a single domain name. • The activity or industry of broadcasting sound programmes to the public. • Make sure or demonstrate that (something) is true, accurate, or justified. • A person who is professionally involved in politics, especially as a holder of an elected office. • ...
Puzzle 2021-01-20
Across
- Sometimes abbreviated as DL, D/L, or DLing, download is a term used to describe copying data from one computer to another, either over a network or modem
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- Alternatively referred to as a link and web link, a hyperlink is an icon, graphic, or text that links to another file or object
Down
- bar Browser that can identify the user’s location on the web and allows them access to different websites
- A web address or internet address
- The physical components of my computer or device
- browser links to support websites for further information and help.
- the programs and other operating information used by computer
- engine A search engine is a software system that is designed to carry out web searches, which means to search the World Wide Web in a systematic way for particular information specified in a textual web search query.
- the process of assigning a code to something for classification or identification.
10 Clues: A web address or internet address • The physical components of my computer or device • the programs and other operating information used by computer • browser links to support websites for further information and help. • the process of assigning a code to something for classification or identification. • ...
crossHR 2021-09-19
Across
- Evaluation of employees’ current and potential levels of performance for managers to make objective human resources decisions
- Sexual Harassment (Prevention, Prohibition and Redressal) Act, 2013 requires the formation of an Internal ______ Committee
- Amount subtracted from gross pay
- Acknowledgement of employees performance or achievements
- _______ is an incentive that motivates employees to recruit candidates from within their networks
- Employee _____ Form is a formal document that department managers use to request the hiring of the new employees
Down
- Job _____ is a detailed description of the role, including all responsibilities, objectives and requirements
- The ______ contract refers to the unwritten, intangible agreement between an employee and their employer that describes the informal commitments, expectations and understandings that make up their relationship
- The _____ act prescribes the basic rights and interests of the workers, and the guarantee to provide them with basic amenities like proper sanitation, ventilated work space, safety for using machinery etc.
- _______ framework is a means by which organizations communicate which behaviours are required, valued, recognized and rewarded with respect to specific occupational roles
10 Clues: Amount subtracted from gross pay • Acknowledgement of employees performance or achievements • Job _____ is a detailed description of the role, including all responsibilities, objectives and requirements • _______ is an incentive that motivates employees to recruit candidates from within their networks • ...
Module 2 Post-test 2021-04-26
Across
- This community perspective uses self-organization and encourages the local citizens to contribute to the community by taking responsibilities and actions.
- It is described from social science perspective as a group of people interacting together.
- One highlight of civil society perspective wherein the members of the community may involve themselves in various community activities.
- The ultimate of this discipline is to improve the lives of others such that their needs are satisfied.
- Civil society perspective is considered as _______model since because of collaboration a sense of belonging is achieved.
- It is most often associated with the study, diagnosis of mental illnesses.
Down
- It explains the connection between the individual and the community.
- This field is focused in the study of society, social orders, socialization and culture.
- One of the perspectives in community wherein it understands that community is composed of the ways people interact with each other, react, and expect each other to act and interact.
- Institutional community is a_______model as it is defined by its networks and institutions.
10 Clues: It explains the connection between the individual and the community. • It is most often associated with the study, diagnosis of mental illnesses. • This field is focused in the study of society, social orders, socialization and culture. • It is described from social science perspective as a group of people interacting together. • ...
money puzzle 2021-11-03
Across
- where you record all of the check and cash transactions your business has during an accounting period
- a card issued by a bank allowing the holder to transfer money electronically to another bank account when making a purchase
- uses a website or app to transfer funds from one person to another over the internet or mobile networks
- a small card that can be exchanged for a specified cash value of goods or services from a particular business, given as a gift
- a small plastic card issued by a bank, business, etc., allowing the holder to purchase goods or services on credit
Down
- the loss of potential gain from other alternatives when one alternative is chosen
- a card you can use to pay things
- an account at a bank against which checks can be drawn by the account depositor
- a price for a service for commodity that includes all extra costs incidental to the item
- a balance achieved between two desirable but incompatible features; a compromise
10 Clues: a card you can use to pay things • an account at a bank against which checks can be drawn by the account depositor • a balance achieved between two desirable but incompatible features; a compromise • the loss of potential gain from other alternatives when one alternative is chosen • ...
Empowerment Technology: 6 types of Social Media 2023-03-15
Across
- the sixth type of social media.
- people can upload photos or videos to our service and share them with their followers or with a select group of friends.
- example of bookmarking sites. It is an image sharing app and social media service designed to enable saving and discovery of information on the internet
- sites that allow users to pont their own sew items or links to news sources. This users can also comment on the post and sents say ale i rank.
- websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
Down
- sites that allow you to upload and share medis content like images, music and video
- interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- regularly updated websites that provide insight into a certain topic.
- sites that allow you to store and manage links to various website and resources.
- form of blogging using short posts without titles.It allow users to exchange small elements of content
10 Clues: the sixth type of social media. • regularly updated websites that provide insight into a certain topic. • sites that allow you to store and manage links to various website and resources. • sites that allow you to upload and share medis content like images, music and video • ...
CW Crypto #4 2023-04-01
Across
- Acronym for "decentralized autonomous organization," an organization that runs on a blockchain network and is governed by its members
- The process of holding and locking up cryptocurrency to help validate transactions on a proof-of-stake blockchain network
- The maximum amount of gas that can be used for a transaction on the Ethereum network
- A scaling solution that creates a network of sidechains to improve transaction throughput on the Ethereum network
- A practice in DeFi where users earn rewards for providing liquidity to a liquidity pool
Down
- The ability for different blockchain networks to communicate and exchange value with each other
- Acronym for "decentralized finance," a set of financial applications that run on a blockchain network
- A secondary protocol built on top of a blockchain network to improve scalability and reduce costs
- loan A type of uncollateralized loan in DeFi that is borrowed and repaid within the same transaction
- market maker (AMM) A type of decentralized exchange that uses an algorithm to determine the price of assets
10 Clues: The maximum amount of gas that can be used for a transaction on the Ethereum network • A practice in DeFi where users earn rewards for providing liquidity to a liquidity pool • The ability for different blockchain networks to communicate and exchange value with each other • ...
c2 2023-04-01
Across
- The process of exchanging one type of cryptocurrency token for another on a decentralized exchange or protocol
- A consensus mechanism used by some cryptocurrencies that uses a verifiable delay function to create a timeline of events
- The process of providing liquidity to a decentralized exchange or protocol to earn rewards
- A mechanism that connects liquidity across different blockchain networks to enable cross-chain trading
- A service that aggregates transactions from multiple users to create a single transaction on a rollup network
- A set of rules and guidelines for creating and managing a particular type of cryptocurrency token
Down
- The backbone of the Ethereum 2.0 network, which coordinates and finalizes shard chains
- The ability for a blockchain network to support multiple chains or shards to improve scalability
- A network of oracles that provides off-chain data to a blockchain network to execute smart contracts
- proof A cryptographic method that allows for the verification of a statement without revealing any information about it
10 Clues: The backbone of the Ethereum 2.0 network, which coordinates and finalizes shard chains • The process of providing liquidity to a decentralized exchange or protocol to earn rewards • The ability for a blockchain network to support multiple chains or shards to improve scalability • ...
Biology Crossword 2023-05-08
Across
- large biomolecules and macromolecules that comprise one or more long chains of amino acid residues.
- whose molecules consist of a number of sugar molecules bonded together.
- ribonucleic acid, a nucleic acid present in all living cells
- acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group.
- an organic compound derived from two amino acids
Down
- process of reacting monomer molecules together in a chemical reaction to form polymer chains or three-dimensional networks.
- any of the class of sugars
- a substance produced by a living organism which acts as a catalyst to bring about a specific biochemical reaction.
- acid a complex organic substance present in living cells, especially DNA or RNA, whose molecules consist of many nucleotides linked in a long chain.
- any of a class of organic compounds that are fatty acids or their derivatives and are insoluble in water but soluble in organic solvents. They include many natural oils, waxes, and steroids.
10 Clues: any of the class of sugars • an organic compound derived from two amino acids • ribonucleic acid, a nucleic acid present in all living cells • whose molecules consist of a number of sugar molecules bonded together. • acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group. • ...
Montsee CLasheer 2013-05-01
Across
- is a program written with malicious intent and sent out by attackers
- Sends abnormally large amounts of requests to a system preventing access to the services
- is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information.
- or malware is a file or program other then a virus that is potentially harmful. Many grayware attacks are phishing attacks that try to persuade the reader to unknowingly provide attackers with access to personal information
- guidelines are an important component of a security policy.
- is a self-replicating program that is harmful to networks
Down
- Gains access to resources on devices by pretending to be a trusted computer\
- also known as secure erase, is a procedure performed to permanently delete data from a hard drive.
- is as important as data security. When a computer is taken, the data is also stolen.
- is technically a worm.does not need to be attached to other software.
10 Clues: is a self-replicating program that is harmful to networks • guidelines are an important component of a security policy. • is a program written with malicious intent and sent out by attackers • is technically a worm.does not need to be attached to other software. • Gains access to resources on devices by pretending to be a trusted computer\ • ...
CS 102 Lecture 5 Crossword Puzzle 2017-04-18
Across
- The application of investigation and technical analysis to preserve digital evidence that can be used in a court of law.
- This internet attack disrupts computer access to an internet service by sending an influx of confusing data messages or useless traffic to a computer network.
- This cyber-criminal has the malicious intention of destroying data, stealing information or committing another type of crime.
Down
- These attacks play on human error to bypass technical security controls.
- This cyber-criminal is an amateur that uses pre-written hacking and cracking programs to break into computers or networks.
- Programs that act without a user's knowledge and alter operations of computers and mobile devices.
- This cyber-criminal describes someone who enter a computer or network illegally.
- This cyber criminal uses the internet or network to destroy computers for political reasons.
- The ____ web is a portion of the internet that cannot be accessed through regular search engines.
- These controls help reduce the chances of theft and include surveillance cameras, the use of security guards, alarm systems and locking devices.
10 Clues: These attacks play on human error to bypass technical security controls. • This cyber-criminal describes someone who enter a computer or network illegally. • This cyber criminal uses the internet or network to destroy computers for political reasons. • The ____ web is a portion of the internet that cannot be accessed through regular search engines. • ...
Bitcoin 2018-05-06
Across
- The permanent divergence of an alternative operating version of the current blockchain.
- An application that stores, sends and receives bitcoins.
- A ____ ledger is the ledger in which all of the data, while being synchronized and replicable is controlled by a singular network or individual.
- The number of blocks preceding the genesis block on the chain.
- Measuring unit of the processing power of the Bitcoin network.
Down
- The act of using the same bitcoin twice.
- The infamous website which was like the Amazon of the black market in which all the prices for the illegal drugs and other illicit materials were quoted in bitcoin.
- A ___ is a record in the block chain that contains and confirms many waiting transactions.
- The ____ in a bitcoin block is a 32-bit field whose value is set so that the hash of the block will contain a run of leading zeros.
- A ____ ledger is an agreement of shared, replicable and synchronized data, spread across multiple networks, across many CPU’s.
10 Clues: The act of using the same bitcoin twice. • An application that stores, sends and receives bitcoins. • The number of blocks preceding the genesis block on the chain. • Measuring unit of the processing power of the Bitcoin network. • The permanent divergence of an alternative operating version of the current blockchain. • ...
Crossword 2021-12-17
Across
- Example of software agents by computing environment
- Component of Artifical Intelligence
- A machine is described as _________ if it can perform its task or tasks without needing human intervention.
- Program that is designed to communicate with people through text or voice commands in a way that mimics human-to-human conversation.
Down
- A set of rules that a machine can follow to learn how to do a task
- This subset of AI is particularly focused on developing algorithms that will help machines to learn and change in response to new data, without the help of a human being.
- is an interdisciplinary branch of computer science and engineering
- This field of research is focused on developing AI that is equal to the human mind when it comes to ability.
- Series of algorithms that endeavours to recognize underlying relationships in a set of data through a process that mimics the way the human brain operates.
- information that has been translated into a form that is efficient for movement or processing
10 Clues: Component of Artifical Intelligence • Example of software agents by computing environment • A set of rules that a machine can follow to learn how to do a task • is an interdisciplinary branch of computer science and engineering • information that has been translated into a form that is efficient for movement or processing • ...
Storage of Electronic Data 2022-04-14
Across
- data,
- storage,
- incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
- commit data as retrievable records.
- may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
- by the university and maintained by ITS for the purpose of electronically retaining university data.
- The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
- security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
- and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
- Office,
10 Clues: data, • Office, • storage, • commit data as retrievable records. • by the university and maintained by ITS for the purpose of electronically retaining university data. • and all data and records created, collected, stored and/or managed in connection with the operation and management of the university • ...
Tech Terms Crossword Puzzle 2022-04-13
Across
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- a place, person, or thing from which something comes or can be obtained
- the information about a particular person that exists on the internet as a result of their online activity
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- a set of data that describes and gives information about other data
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the practice of taking someone else's work or ideas and passing them off as one's own
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- websites and applications that enable users to create and share content or to participate in social networking
- a method employing encryption to provide secure access to a remote computer over the internet
10 Clues: a set of data that describes and gives information about other data • a place, person, or thing from which something comes or can be obtained • the practice of taking someone else's work or ideas and passing them off as one's own • a method employing encryption to provide secure access to a remote computer over the internet • ...
cryptex3-4 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
Down
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Computer's essential firmware responsible for initializing hardware.
- Git command is used to create a copy of a repository on a local machine.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-2 2024-02-23
Across
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Git command is used to create a copy of a repository on a local machine.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
Down
- Computer's essential firmware responsible for initializing hardware.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-3 2024-02-23
Across
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Git command is used to create a copy of a repository on a local machine.
Down
- Computer's essential firmware responsible for initializing hardware.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-5 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Git command is used to create a copy of a repository on a local machine.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Computer's essential firmware responsible for initializing hardware.
Down
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-9 2024-02-23
Across
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Computer's essential firmware responsible for initializing hardware.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Git command is used to create a copy of a repository on a local machine.
Down
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
barham's crossword 2023-09-14
Across
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- the process of hiring someone from within your existing business structure to fill a vacant position for your company
- the permanent reduction of a company's labor force through the elimination of unproductive workers or divisions
- a person who is hired to work for another or for a business, firm, etc, in return for payment
- a form employers use to collection information about you to see if you are a good fit for the position
Down
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
- the action of finding new people to join an organization or support a cause
- filling a job vacancy with an employee from outside the company
- any communication that attempts to influence people to buy products or services
- a person or organization that employs people.
10 Clues: a person or organization that employs people. • filling a job vacancy with an employee from outside the company • the action of finding new people to join an organization or support a cause • any communication that attempts to influence people to buy products or services • ...
Word Hike 2023-10-08
Across
- named storage location in memory that holds data or values, which can change during the execution of a program.
- A step-by-step procedure or formula used for solving a problem or performing a task in computer science.
- The set of rules that govern the structure and format of valid statements and expressions in a programming language.
- The process of identifying and fixing errors or bugs in a program to ensure it functions correctly.
- A common networking technology used for local area networks (LANs) that relies on wired connections.
Down
- A field of computer science focused on creating machines and software capable of intelligent behavior, such as learning, problem-solving, and decision-making.
- A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU.
- father of the computer.
- A control structure that allows a set of instructions to be repeated based on a specified condition.
- A markup language used to create web pages and define their structure and content.
10 Clues: father of the computer. • A markup language used to create web pages and define their structure and content. • A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU. • The process of identifying and fixing errors or bugs in a program to ensure it functions correctly. • ...
