networks Crossword Puzzles
cryptex3-2 2024-02-23
Across
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Git command is used to create a copy of a repository on a local machine.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
Down
- Computer's essential firmware responsible for initializing hardware.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- ๐๐ป ๐ผ๐ฝ๐ฒ๐ป-๐๐ผ๐๐ฟ๐ฐ๐ฒ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐๐๐๐๐ฒ๐บ ๐ถ๐ ๐ธ๐ป๐ผ๐๐ป ๐ณ๐ผ๐ฟ ๐ถ๐๐ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐, ๐๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐, ๐ฎ๐ป๐ฑ ๐ฐ๐๐๐๐ผ๐บ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ผ๐ฝ๐๐ถ๐ผ๐ป๐.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-3 2024-02-23
Across
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Git command is used to create a copy of a repository on a local machine.
Down
- Computer's essential firmware responsible for initializing hardware.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- ๐๐ป ๐ผ๐ฝ๐ฒ๐ป-๐๐ผ๐๐ฟ๐ฐ๐ฒ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐๐๐๐๐ฒ๐บ ๐ถ๐ ๐ธ๐ป๐ผ๐๐ป ๐ณ๐ผ๐ฟ ๐ถ๐๐ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐, ๐๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐, ๐ฎ๐ป๐ฑ ๐ฐ๐๐๐๐ผ๐บ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ผ๐ฝ๐๐ถ๐ผ๐ป๐.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-5 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Git command is used to create a copy of a repository on a local machine.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- Computer's essential firmware responsible for initializing hardware.
Down
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- ๐๐ป ๐ผ๐ฝ๐ฒ๐ป-๐๐ผ๐๐ฟ๐ฐ๐ฒ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐๐๐๐๐ฒ๐บ ๐ถ๐ ๐ธ๐ป๐ผ๐๐ป ๐ณ๐ผ๐ฟ ๐ถ๐๐ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐, ๐๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐, ๐ฎ๐ป๐ฑ ๐ฐ๐๐๐๐ผ๐บ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ผ๐ฝ๐๐ถ๐ผ๐ป๐.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-9 2024-02-23
Across
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Computer's essential firmware responsible for initializing hardware.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Git command is used to create a copy of a repository on a local machine.
Down
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- ๐๐ป ๐ผ๐ฝ๐ฒ๐ป-๐๐ผ๐๐ฟ๐ฐ๐ฒ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐๐๐๐๐ฒ๐บ ๐ถ๐ ๐ธ๐ป๐ผ๐๐ป ๐ณ๐ผ๐ฟ ๐ถ๐๐ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐, ๐๐๐ฎ๐ฏ๐ถ๐น๐ถ๐๐, ๐ฎ๐ป๐ฑ ๐ฐ๐๐๐๐ผ๐บ๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ผ๐ฝ๐๐ถ๐ผ๐ป๐.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
barham's crossword 2023-09-14
Across
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks
- the process of hiring someone from within your existing business structure to fill a vacant position for your company
- the permanent reduction of a company's labor force through the elimination of unproductive workers or divisions
- a person who is hired to work for another or for a business, firm, etc, in return for payment
- a form employers use to collection information about you to see if you are a good fit for the position
Down
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts
- the action of finding new people to join an organization or support a cause
- filling a job vacancy with an employee from outside the company
- any communication that attempts to influence people to buy products or services
- a person or organization that employs people.
10 Clues: a person or organization that employs people. • filling a job vacancy with an employee from outside the company • the action of finding new people to join an organization or support a cause • any communication that attempts to influence people to buy products or services • ...
Word Hike 2023-10-08
Across
- named storage location in memory that holds data or values, which can change during the execution of a program.
- A step-by-step procedure or formula used for solving a problem or performing a task in computer science.
- The set of rules that govern the structure and format of valid statements and expressions in a programming language.
- The process of identifying and fixing errors or bugs in a program to ensure it functions correctly.
- A common networking technology used for local area networks (LANs) that relies on wired connections.
Down
- A field of computer science focused on creating machines and software capable of intelligent behavior, such as learning, problem-solving, and decision-making.
- A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU.
- father of the computer.
- A control structure that allows a set of instructions to be repeated based on a specified condition.
- A markup language used to create web pages and define their structure and content.
10 Clues: father of the computer. • A markup language used to create web pages and define their structure and content. • A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU. • The process of identifying and fixing errors or bugs in a program to ensure it functions correctly. • ...
Super Secret Security Crossword Puzzle 2024-05-31
Across
- itelligence exhibited by machines, particularly computer systems.
- one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- "gift" or "present" in Arabic.
- a team of experts that proactively monitor and respond to cybersecurity incidents.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- a technique through which a cybercriminal disguises themselves as a known or trusted source.
10 Clues: "gift" or "present" in Arabic. • itelligence exhibited by machines, particularly computer systems. • a team of experts that proactively monitor and respond to cybersecurity incidents. • a technique through which a cybercriminal disguises themselves as a known or trusted source. • ...
Crossword 2024-05-02
Across
- This term refers to the process of ensuring that software and hardware components can work together smoothly.
- What do you call the practice of optimizing the flow of goods and services in the IT supply chain?
- This term describes the physical layout of computer components within a system.
- What term describes the process of ensuring that data remains intact and unchanged during storage, transfer, or processing?
Down
- ____Computing. A method of distributing computing tasks across multiple computers or processors to improve efficiency and performance.
- This term describes the practice of organizing and controlling the flow of information between systems or components.
- What is the name for a network device that forwards data packets between computer networks?
- A protocol used for securely accessing remote computers or systems over an unsecured network.
- What is the term for the physical or virtual space where data is stored and managed by a computer system or network?
- What three-letter acronym represents the process of moving data between computer systems over a network?
10 Clues: This term describes the physical layout of computer components within a system. • What is the name for a network device that forwards data packets between computer networks? • A protocol used for securely accessing remote computers or systems over an unsecured network. • ...
Poverty 2025-01-23
Across
- What refers to conditions or practices that help to maintain health and prevent the spread of disease?
- What is the social process of excluding a group or individual from full participation in society?
- What refers to the basic physical systems of a country or region, such as transportation and communication networks?
- What is the state of being extremely poor; lacking the basic necessities of life?
- What is the term for the failure of a child to grow to their full potential height due to chronic malnutrition?
- What refers to the public health and engineering measures for the safe disposal of human waste and sewage?
Down
- What is the term for the unjust and uneven distribution of resources and opportunities within a society?
- What is the condition of not having enough food to meet basic nutritional needs?
- What is the condition of not getting enough essential nutrients from the diet, even if calorie needs are met?
- What is the state of disagreement or hostility that can arise from various factors, including competition for resources?
10 Clues: What is the condition of not having enough food to meet basic nutritional needs? • What is the state of being extremely poor; lacking the basic necessities of life? • What is the social process of excluding a group or individual from full participation in society? • ...
COMPUTER. 2025-06-16
Across
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- A network device that is used to connect all the computers in a network with each other.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- On what date bulk emails that come from unknown sources.
- topology A single communication line or one main cable to which all the nodes directly connected.
Down
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- A program or set of programs that disrupts the normal functioning of a computer.
- The act of using or imitating the language and thoughts of a person as One original work.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Artificial intelligence 2025-10-17
Across
- โ Information collected and used by computers to learn, analyze, and make decisions.
- Learning โ A type of machine learning that uses many layers of neural networks to analyze complex data.
- โ The use of technology to perform tasks with little or no human help.
- Language Processing (NLP) โ A part of AI that helps computers understand and respond to human language.
- โ A computer program that can talk or chat with people, often used in customer service or apps.
- โ The study of right and wrong; in AI, it deals with making sure technology is used fairly and responsibly.
Down
- โ A step-by-step set of instructions that a computer follows to solve a problem or perform a task.
- Network โ A computer system modeled after the human brain, used to recognize patterns and make decisions.
- Learning โ A branch of AI where computers learn from data and improve their performance without being directly programmed.
- โ The field that involves designing and building robots that can perform human-like tasks.
10 Clues: โ The use of technology to perform tasks with little or no human help. • โ Information collected and used by computers to learn, analyze, and make decisions. • โ The field that involves designing and building robots that can perform human-like tasks. • โ A computer program that can talk or chat with people, often used in customer service or apps. • ...
Computer Term Crossword 2021-10-06
Across
- to copy a copyrighted material for a limited purpose.
- A collection of LANs, it is a network of networks.
- A right given to the originator to stop people from copying he/sheโs work.
- A basic element that is required for the computer to function.
- A website that allows any users to edit the content.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- A set of devices that is connected together in a limited area.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
Down
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
- A set of rules that protects integrity.
- A device or unit that works separately from the CPU but is connected to the computer.
- The correct way to use the internet.
- Sending unwanted messages in a bulk.
- Brain of the computer and it lets the computer interact with the programs.
- Storage device for computers which uses magnetic storage.
- A network security that monitors network traffic and blocks data base on the security rules.
- To make digital devices give unauthorized access to a computer system.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- An act of using someoneโs thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Law and Order 2024-01-31
Across
- A well-known criminal who steals, often by force.
- The idea that some individuals might have a biological predisposition to criminal behavior.
- Proven to be false or without merit.
- The fear or anxiety felt in anticipation of something that may happen.
- A now-discredited movement aimed at improving the genetic composition of the human population through selective breeding.
- The scientific study of the nervous system, including the brain.
- Academic or research-based attention.
- People or characteristics that resemble ancestors or earlier forms of life.
- The study of the relationship between brain function and criminal behavior.
Down
- Individuals characterized by persistent antisocial behavior, impaired empathy, and remorse, and bold, disinhibited, and egotistical traits.
- Conduct that shows a lack of consideration for others and that may cause damage to society, whether intentionally or through negligence.
- A lack of ability to feel or express emotions.
- The concept that people might commit crimes because of the conditions they live in, rather than being inherently bad.
- The part of the brain responsible for decision-making, impulse control, and social behavior.
- A complex system of nerves and networks in the brain, associated with basic emotions and drives.
- An examination of a body after death to determine the cause of death.
- The study of crime, criminal behavior, and the criminal justice system.
- The branch of biology that deals with the normal functions of living organisms and their parts.
- The skull, especially the part encasing the brain.
19 Clues: Proven to be false or without merit. • Academic or research-based attention. • A lack of ability to feel or express emotions. • A well-known criminal who steals, often by force. • The skull, especially the part encasing the brain. • The scientific study of the nervous system, including the brain. • ...
Computers 2024-09-16
Across
- A computer that provides data to other computers.
- Flash Drive A small storage device that uses flash memory and connects via a USB port.
- A personal computer that is small enough to be carried around.
- (Central Processing Unit) A piece of hardware that processes data and performs arithmetic and logical operations.
- A program that damages or destroys computer data, and replicates itself.
- The physical parts of a computer.
- The display screen that provides visual output from a computer.
- The main circuit board that connects different parts of a computer.
- Storage Areas on Internet servers where data and applications can be stored and accessed.
- Computer A personal computer that resides on a desk or table.
Down
- (Universal Serial Bus) A standard that allows communication between devices, like a flash drive and computer.
- Programs that tell a computer what to do and how to do it.
- A very small piece of silicon inside a computer with circuits for storing information or performing operations.
- A flat control surface used to move the cursor on a laptop, similar to a mouse.
- A wireless technology standard that connects devices using radio waves.
- System A system that allows hardware devices to communicate and support software programs (e.g., Microsoft Windows).
- Card A type of memory card typically used in digital cameras.
- Drive The most commonly used type of secondary storage device, which stores data as aligned particles on a magnetic disk.
- (Random Access Memory)A type of short-term memory that stores data while the computer is working.
- A device that sends and receives data on computer networks.
20 Clues: The physical parts of a computer. • A computer that provides data to other computers. • Programs that tell a computer what to do and how to do it. • A device that sends and receives data on computer networks. • Card A type of memory card typically used in digital cameras. • Computer A personal computer that resides on a desk or table. • ...
RockX Persistence Crossword 2022-09-21
Across
- One of the Cosmos wallets that supports Persistence($XPRT)
- People who volunteer a computer to maintain the blockchain's integrity by constantly computing the linkage from the first block to the last.
- Which is the platform pSTAKE integrated with for its BNB liquid staking implementation. This allows leveraged yield farming on Pancakeswap pools?
- What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
- ________ is a decentralized peer-to-peer blockchain that people can use to create liquidity and trade IBC enabled tokens.
- Get an estimated yield of 5.87% when you stake ________ with RockX!
- The name of the consensus mechanism used by Persistence chain
- The leading staking service provider in Asia
- The platform where you can stake your XPRT to earn compounded yields
- RockX is a validator in what kind of network?
Down
- What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
- A platform where you can track your assets on pSTAKE, Ethereum and BNB chains
- ________ is the native token of its the crypto.org chain
- ________ is a sharded protocol that enables blockchain networks to operate together seamlessly.
- The current CEO of RockX
- RockX is based in which country?
- What month is the Persistence Genesis Day?
- ________ is a decentralized, open-source blockchain with smart contract functionality founded by Vitalik Buterin
- The name of the Liquid Staking protocol by Persistence
- What platform did persistence partner with to implement cross-chain messaging?
20 Clues: The current CEO of RockX • RockX is based in which country? • What month is the Persistence Genesis Day? • The leading staking service provider in Asia • RockX is a validator in what kind of network? • The name of the Liquid Staking protocol by Persistence • ________ is the native token of its the crypto.org chain • ...
Crack It !!! 2012-12-11
Across
- A character normally sent at the beginning/end of a synchronous transmission to provide timing and bit synchronization
- A modems characteristic when it is sending a carrier signal on a multipoint line when it has not been polled
- The undesirable noise or disturbance that occurs on a communications channel, caused by natural or man-made signals
- A method of data communications using 75 bps as a transmission speed
- A memory device type that loses its stored contents upon electrical power fluctuation or failure
- Interference from radio transmission signals or microwave communication causing a received signal to deflect from the target
Down
- A network station designed to interconnect two otherwise incompatible devices or networks
- Any combination of two or more technologies
- The control block or blocks of data added prior to the actual message
- Using a constant time interval between bits or characters to insure that all data communications equipment is in step with each other
- The waiting time, or delay between a stations request to a transmission channel,and completion
- The disturbance or interference of open-air radio transmission to deliberately prevent communication
- A reduction in a signals level as expressed in decibels
13 Clues: Any combination of two or more technologies • A reduction in a signals level as expressed in decibels • A method of data communications using 75 bps as a transmission speed • The control block or blocks of data added prior to the actual message • A network station designed to interconnect two otherwise incompatible devices or networks • ...
module 2 2017-03-22
Across
- in case of a fire you could quickly cut off the supply or in case of an intrusion you could cut off the supply, or the circulation of the air conditioning system
- the process of identifying uncertain investment decision
- plays a very important role in keeping the environmental at a constant temperature
- These are cables that protect against the interference from generators or equipment around the computing facility
- identify critical business operations when there's a accident, disasters
- reduce the oxygen the heat. You suppress the fuels, we have the oxygen, you suppress oxygen and heat
Down
- only authorized disclosure should be allowed
- is needed for HVAC , such as if there's a blackout in electricity, the probability that is also down is minimized
- When you put positive air pressure in the room, when the door opens the air flows out not in
- dictates that only authorized modifications should be allowed
- security that happens physically and through actions securing networks and information systems
- dictates that our resources should be available in a timely fashion to authorized personnel
- measures taken to protect systems, buildings, and related supporting infrastructure against threats associated with their physical environment
13 Clues: only authorized disclosure should be allowed • the process of identifying uncertain investment decision • dictates that only authorized modifications should be allowed • identify critical business operations when there's a accident, disasters • plays a very important role in keeping the environmental at a constant temperature • ...
Network 2022-03-25
Across
- naming system that allows communication across devices on a network.
- consists of two or more computers that are linked in order to share resources
- consists of two or more computers that are linked in order to share resources
- network interface identification and location addressing
- a network cable that contains strands of glass fibers inside an insulated casing.
- a network cable that contains strands of glass fibers inside an insulated casing.
- a family of wired computer networking technologies commonly used in local area networks,
Down
- formatted unit of data carried by a packet-switched network
- connectivity with routing to provide a fast internet connection
- used to connect one network device to other network devices or to connect two or more computers to share printers, scanners etc.
- delays in communication over a network.
- the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
- continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
- the wireless technology used to connect computers, tablets, smartphones and other devices to the internet.
- consists of two or more computers that are linked in order to share resources with client machines they are considered as...
15 Clues: delays in communication over a network. • network interface identification and location addressing • formatted unit of data carried by a packet-switched network • connectivity with routing to provide a fast internet connection • naming system that allows communication across devices on a network. • ...
Sociology 2023-12-01
Across
- a model that illustrates how an individualโs health is socially embedded within their networks, communities,etc
- the state of being symptomatic or unhealthy for a disease or condition.
- economic and sociological combined total measure of a person's work experience and of an individual's or family's economic access to resources and social position in relation to others
- race with the highest maternal mortality rates
- Those with ---- prestige are seen to have an advantage when related to health
- stress ---- is when one stressful event leads to a series of stressful events and situations
Down
- the illnesses and diseases the mother receives after birthing a baby
- anticipation and worry stress that comes with membership in a socially marginalized and stigmatized group
- the description of social life in medical termsโerases the cultural impacts on health and leaves blame to solely biology or personal behaviors
- The rate of deaths in a population over a year expressed per 1000
- the subjective experience of a disease, condition, or a set of symptoms
- A state of complete physical, mental and social well being
- Anything that challenges and threatens the bodyโs internal stability and equilibrium, such as blood pressure or even cellular processes
13 Clues: race with the highest maternal mortality rates • A state of complete physical, mental and social well being • The rate of deaths in a population over a year expressed per 1000 • the illnesses and diseases the mother receives after birthing a baby • the state of being symptomatic or unhealthy for a disease or condition. • ...
World History Review 2023-01-03
Across
- Series of Holy Wars between Christians and Muslims that spread Islamic achievements and opened new trading networks
- Some common things that were traded along the Silk Road included Spices, cultures, goods, and...
- This was a major contribution to the development of civilizations because it recorded existing laws for all to see
- Romans designed their governments to incorporate this on the power of different parts of government
- In the Middle East during neolithic times, the development of farming brought about this
- Complex societies with advanced knowledge of farming, trade, government, and art
Down
- A trade route that connected China to the Romans
- These things were established during the Middle Ages to improve economic and social conditions of artisans, set quality standards for goods produced, and more
- Important long-term contributions of ancient Greek and Roman civilizations are primarily found in this area
- This was a document was eventually used to strengthen the idea that a monarch's power was not absolute
- Feudal systems organized this during the Middle Ages
- Manorial systems organized this during the Middle Ages
- A type of government in which citizens have the right to vote on the laws
13 Clues: A trade route that connected China to the Romans • Feudal systems organized this during the Middle Ages • Manorial systems organized this during the Middle Ages • A type of government in which citizens have the right to vote on the laws • Complex societies with advanced knowledge of farming, trade, government, and art • ...
CrossWord Vocabulary 2021-10-06
Across
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- The right to reuse copy-righted material or information on the internet.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- A right from the owner to make copies of what the owner did.
- A magnetic device that stores data.
- A faster type of device made mostly of flash memory that stores data.
- A site that enables you to edit content from a web browser.
- Good behavior on the internet.
- Irrelevant and disturbing messages such as commercials and advertisements.
- An act of using someoneโs thought and ideas without crediting the author.
- Local area networks. A series of computers linked together to form a network.
Down
- An element of something.
- An act of compromising a digital network to access an account of a system.
- A rule or policies that protect your data and information on the internet.
- A network information that is not tied to a single place.
- A small memory drive that is used for storing and transferring data to or from a computer.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- A device that operates differently from a CPU but works with it.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- good behavior on the internet.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A right from the owner to make copies of what the owner did.
- An act of compromising a digital network to access an account of a system.
- A faster type of device made mostly of flash memory that stores data.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- irrelevant and disturbing messages such as commercials and advertisements.
Down
- A network information that is not tied to a single place.
- A site that enables you to edit content from a web browser.
- Security: A rule or policies that protect your data and information on the internet.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A device that operates differently from a CPU but works with it.
- An act of using someoneโs thought and ideas without crediting the author.
- An element of something.
- local area networks. A series of computers linked together to form a network.
- A magnetic device that stores data.
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- use: The right to reuse copy-righted material or information on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- Local area networks. A series of computers linked together to form a network.
- Security A rule or policies that protect your data and information on the internet.
- A device that operates differently from a CPU but works with it.
- An act of using someoneโs thought and ideas without crediting the author.
- A right from the owner to make copies of what the owner did.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
Down
- A small memory drive that is used for storing and transferring data to or from a computer.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- Good behavior on the internet.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- A faster type of device made mostly of flash memory that stores data.
- An element of something.
- A magnetic device that stores data.
- Irrelevant and disturbing messages such as commercials and advertisements.
- A site that enables you to edit content from a web browser.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- An element of something.
- A device that operates differently from a CPU but works with it.
- A site that enables you to edit content from a web browser.
- A network information that is not tied to a single place.
- A small memory drive that is used for storing and transferring data to or from a computer.
- An act of using someoneโs thought and ideas without crediting the author.
- A faster type of device made mostly of flash memory that stores data.
Down
- Good behavior on the internet.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A right from the owner to make copies of what the owner did.
- A rule or policies that protect your data and information on the internet.
- An act of compromising a digital network to access an account of a system.
- Irrelevant and disturbing messages such as commercials and advertisements.
- Local area networks. A series of computers linked together to form a network.
- A collection of security designed to prevent dangerous access to a network system.
- A magnetic device that stores data.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when itโs shut down.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Geo crossword 2022-07-09
Across
- areas What is an area with dense transport networks and densely packed buildings called
- Consist of living and non-living things that are found naturally.
- What is a physical area on the Earthโ surface called?
- What is the movement of people from rural to urban areas called?
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment where people live on farms and villages called?
- What is poor air quality affecting half the worldโs urban population called?
- What is the increase in the proportion of people living in urban areas called?
- What is the number of people living in a unit area of land called?
- What is a built up area called?
Down
- What is the environment that has not been affected by people?
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What are the advantages of going to a city called?
- What is a physical area on the earthโs surface called?
- What are the disadvantages of going to a city called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
- What job opportunities are called?
- to our surroundings and can either be physical or human.
- What is the area of the earthโs surface that holds special meaning for people?
21 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What is a physical area on the Earthโ surface called? • What are the disadvantages of going to a city called? • What is a physical area on the earthโs surface called? • to our surroundings and can either be physical or human. • ...
Geo crossword 2022-07-09
Across
- What is a physical area on the earthโs surface called?
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the number of people living in a unit area of land called?
- What is a physical area on the Earthโ surface called?
- What is a built up area called?
- What is the area of the earthโs surface that holds special meaning for people?
- What job opportunities are called?
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
- What is the pollution caused by leakage fuel storage tanks into rivers?
Down
- Consist of living and non-living things that are found naturally.
- What is the movement of people from rural to urban areas called?
- What is the increase in the proportion of people living in urban areas called?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What are the disadvantages of going to a city called?
- What is poor air quality affecting half the worldโs urban population called?
- What is the pollution caused by an increase in LED usage?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is the environment that has not been affected by people?
- refer to our surroundings and can either be physical or human.
21 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earthโ surface called? • What is a physical area on the earthโs surface called? • What is the pollution caused by an increase in LED usage? • ...
Networking 2023-09-15
Across
- A protocol used for assigning IP addresses to devices on a network (4 letters).
- A device used to connect a network to the internet.
- protocol used for sending email messages (4 letters).
- A network topology where all devices are connected to a central hub (6 letters).
- A measure of the time it takes for data to travel from one point to another in a network.
- The organization responsible for assigning IP address blocks and domain names (3 letters).
- A technology that allows wireless devices to connect to a wired network (4 letters).
- The process of verifying the identity of a user or device on a network (8 letters).
- A device that separates a network into smaller collision domains.
- Data transfer protocol used for secure file transfers.
Down
- The process of dividing a network into smaller, more manageable segments (9 letters).
- A network service that translates human-readable domain names into IP addresses (4 letters).
- A protocol used to retrieve email from a mail server.
- A device or software component that filters and forwards network traffic between different network segments (6 letters).
- A unique identifier assigned to each device on a network (3 letters).
- A technology that allows multiple virtual networks to share the same physical infrastructure.
- The maximum amount of data that can be transmitted in a given time.
- A set of rules that govern how data is transmitted across a network.
- A device that connects multiple network segments and forwards data based on MAC addresses.
- The process of converting a private IP address into a public one for internet access.
20 Clues: A device used to connect a network to the internet. • A protocol used to retrieve email from a mail server. • protocol used for sending email messages (4 letters). • Data transfer protocol used for secure file transfers. • A device that separates a network into smaller collision domains. • The maximum amount of data that can be transmitted in a given time. • ...
ict 2024-05-15
Across
- accessing a system using malicious methods
- creating an emotional connection with someone with the intention of doing them harm
- text messages
- something that is circulated widely by being shared through networks to large numbers of internet users
- all the data that a user creates online, which is recorded and stored
- compilation of personal information about an individual
- created by the individuals who use the service
- a group of things that are arranged very close together
- to see a document, page or film before it is produced in its final form and published
- information that a website stores on a user's computer so that the website recognizes the user when they uses it again
Down
- mass communication such as broadcasting, publishing an the internet
- to make a mark against some information to show that it is important.
- Using the internet to send text, image or multimedia in order to upset or embarrass someone.
- people or account to whom a user is connected
- a colloquialism used to tell someone to say nothing about a particular subject, or to be quiet.
- a message sent to an internet discussion group so that all members of the group can read it
- a collection of information about a user
- very rude or insulting
- a type of advertising used by internet companies in which computer users pass on advertising messages or images trough email
- a label that you can add to a post
20 Clues: text messages • very rude or insulting • a label that you can add to a post • a collection of information about a user • accessing a system using malicious methods • people or account to whom a user is connected • created by the individuals who use the service • compilation of personal information about an individual • ...
Lesson 25 vocab 2015-04-23
Across
- A form of electronic communication that allows you to send and receive text messages in "real time" from friends and colleagues who are currently online.
- Units of data sent across a network.
- contains user name of individual, the @ symbol, The user's domain name.
- A list of e-mail address you can use to send the same message to a group.
- E-mail software provided with Windows Vista.
- unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
Down
- Text or graphics added to the end of outgoing e-mail messages.
- a list of e-mail address you can use to send the same message to a group.
- Using a cell phone or other mobile device to send and receive written messages.
- transmission of electronic messages over networks.
- A software application installed on the local PC, network, or Web, such as e-mail, text messages, and instant messaging programs.
- to save or transfer data to a storage device or folder for the purpose of saving space or organizing the data.
- part of the e-mail programs; used to keep a list of contacts and their e-mail addresses.
- A document, image, figure, or other file that you can attach to an e-mail message.
14 Clues: Units of data sent across a network. • E-mail software provided with Windows Vista. • transmission of electronic messages over networks. • Text or graphics added to the end of outgoing e-mail messages. • contains user name of individual, the @ symbol, The user's domain name. • a list of e-mail address you can use to send the same message to a group. • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Lesson 30 Vocabulary 2015-05-22
Across
- A program that hackers use to capture IDs and passwords on a network.
- A malicious program that records keystrokes.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- security feature used for larger networks that controls computers from one point.
- installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Encrypts the information in an SSL Certificate.
Down
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
WEEK 1 OVERVIEW 2023-03-24
Across
- ____ IS THE PROCESS OF VOLUNTARILY COMPLYING WITH A SET OF PROFESSIONAL STANDARDS DEALING WITH POLCIES AND PROCDURE, PROCESSES AND ACTIONS
- JEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICES
- WHAT IS THE MOST IMPORTANT W IN THE 6 W'S
- MEANS DOING THE RIGHT THING
- A HYSTERIA CONTROLLING TECHNIQUE WHERE YOU REPEAT A PHRASE THAT HAS WHAT YOU WANT THE CALLER TO DO AND WHY OVER AND OVER
- WHAT IS THE BUTTON THAT IS PRESSED IN THE CASE OF A MAJOR INFRASTRUCTURE OR COMMUNICATION CENTER EMERGENCY AND RE-ROUTES CALLS TO DENVER
Down
- WHAT IS THE ART AND SCIENCE OF COMMUNICATION OVER A DISTANCE BY TELEPHONE, TELEGRAPH AND RADIO
- NAME OF THE LANGUAGE LINE THAT WE USE
- CAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOOR
- JEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM
- ___ IS THE GENERAL RESPONSE FROM THE BODY TO ANY UNUSUAL DEMAND MADE ON IT, PLEASANT OR UNPLEASANT, EMOTIONAL, PHYSICAL OR MENTAL
- EMERGENCY 911 CALLS GO OVER DEDICTED TELEPHONE NETWORKS AND ARE AUTOMATICCLY ROUTED TO THE APPROPRIATE EMERGENCY COMMNICATION CENTER BASED ON THE CALLERS LOCATION
- PEOPLE ON THE EMPLOYEE BOARD THAT HAVE A GOLD STAR ON THEM ARE APART OF THIS GROUP
13 Clues: MEANS DOING THE RIGHT THING • NAME OF THE LANGUAGE LINE THAT WE USE • WHAT IS THE MOST IMPORTANT W IN THE 6 W'S • JEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICES • CAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOOR • JEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM • ...
Chapter 6 Crossword 2022-10-11
Across
- Tax that is paid to SARS when goods are imported.
- Government helps the businesses in this sector to compete on international markets
- involves the movement of product/service to ensure that it reaches the desired market on time.
- Phase of the product life cycle where sales volumes are either maintained or decrease
- the use of the internet and social networks as part of the businessโs marketing campaign.
Down
- The business offers the product/service to the market at a high price and justifies the price based on the โuniqueness of the product/serviceโ
- Promotional strategy used to reach a mass audience in order to inform them and persuade them to buy the product/service
- Considered to be the most essential element of the marketing mix
- Facebook, Twitter, Blogs and short promotional messages to watch on You Tube.
- A business charging R1 999 instead of R2 000
- Clothing would be categorised as this type of good
- A news item or story which conveys information about a business, product, service in the media.
- The business itself will portray certain values (image).If the unique features of the products and the image of the business are combined, it is known as the ____.
13 Clues: A business charging R1 999 instead of R2 000 • Tax that is paid to SARS when goods are imported. • Clothing would be categorised as this type of good • Considered to be the most essential element of the marketing mix • Facebook, Twitter, Blogs and short promotional messages to watch on You Tube. • ...
Constraints, revenue streams and types of briefs 2023-12-05
Across
- Funding raised through social media through networks - contributors are offered an incentive for how much they contribute
- During production there is a lot of support that can be accessed to finance the project
- Money paid for a brand to be associated with final media product
- A brief where the client will hire a separate independent media company to create the product and the process is overseen by a commissioner from the client
- When planning a production timescales are built backwards from a final deadline
Down
- A product must be financially viable to be successful so a budget is set at the start of the project
- A brief where the client and producer work together to develop the brief for the project
- A brief where there is no documentation and a verbal agreement is reached
- The brief is outlined within a contract of employment
- Money from businesses willing to invest
- Intellectual property of the product is licensed to other partners e.g. for merchandising
- Money from brands in return for their material being on pages or on screen during production
- A brief where a meeting between the client & producer takes place where the client will outline requirements
13 Clues: Money from businesses willing to invest • The brief is outlined within a contract of employment • Money paid for a brand to be associated with final media product • A brief where there is no documentation and a verbal agreement is reached • When planning a production timescales are built backwards from a final deadline • ...
Computer Term Crossword 2021-10-06
Across
- A basic element that is required for the computer to function.
- A device or unit that works separately from the CPU but is connected to the computer.
- A website that allows any users to edit the content.
- A collection of LANs, it is a network of networks.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
Down
- The correct way to use the internet.
- Brain of the computer and it lets the computer interact with the programs.
- A right given to the originator to stop people from copying he/sheโs work.
- A set of rules that protects integrity.
- To make digital devices give unauthorized access to a computer system.
- Sending unwanted messages in a bulk.
- A set of devices that is connected together in a limited area.
- A network security that monitors network traffic and blocks data base on the security rules.
- Storage device for computers which uses magnetic storage.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
- to copy a copyrighted material for a limited purpose.
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Crossword Vocabulary 2021-10-06
Across
- A site that enables you to edit content from a web browser.
- Drive: a small memory drive that is used for storing and transferring data to or from a computer.
- A magnetic device that stores data.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- use: The right to reuse copy-righted material or information on the internet.
- local area networks. A series of computers linked together to form a network.
- A right from the owner to make copies of what the owner did.
- irrelevant and disturbing messages such as commercials and advertisements.
- An element of something.
- A device that operates differently from a CPU but works with it.
- Security: A rule or policies that protect your data and information on the internet.
Down
- A faster type of device made mostly of flash memory that stores data.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- an external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- An act of compromising a digital network to access an account of a system.
- An act of using someoneโs thought and ideas without crediting the author.
- A network information that is not tied to a single place.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- good behavior on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- Local area networks. A series of computers linked together to form a network.
- Security A rule or policies that protect your data and information on the internet.
- A device that operates differently from a CPU but works with it.
- An act of using someoneโs thought and ideas without crediting the author.
- A right from the owner to make copies of what the owner did.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
Down
- A small memory drive that is used for storing and transferring data to or from a computer.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- Good behavior on the internet.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- A faster type of device made mostly of flash memory that stores data.
- An element of something.
- A magnetic device that stores data.
- Irrelevant and disturbing messages such as commercials and advertisements.
- A site that enables you to edit content from a web browser.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Network requirements 2021-11-13
Across
- a local network is a tiny network that is limited to a certain location.
- ensures that your computer has enough room to read and write data so that the CPU can find it fast and easily
- a piece of software or hardware that prevents specific types of communication from passing through.
- basic portion of domain names such as howtogeek.com and google.com
- address on a network, a numerical address that relates to your computer.
- a collection of data structured in such a way that a computer application may easily access specific data.
- a device's hardware address when linked to a shared network.
- various methods of communication over the Internet.
- how computers translate human-readable domain names and hostnames into IP addresses
Down
- a device that connects networks by routing traffic
- a gadget that sends and receives traffic
- an Internet-based way of sharing files between computers
- connected network technology that is nearly universally used today
- the quantity of data that may be communicated over a network at any one moment is measured in bytes.
- a standard that allows a LAN to utilize a single IP address for Internet connections and a group of IP addresses for internal traffic.
- a collection of data structured in such a way that a computer application may easily access specific data.
- part of an Internet address
- a programming language for building web pages
- a protocol that allows a server on a local network to issue a computer or other network device a temporary IP address.
- the portion of a computer that controls and monitors all activities and calculations.
20 Clues: part of an Internet address • a gadget that sends and receives traffic • a programming language for building web pages • a device that connects networks by routing traffic • various methods of communication over the Internet. • an Internet-based way of sharing files between computers • a device's hardware address when linked to a shared network. • ...
Around The Library. 2015-03-29
Across
- Desk Where library check-in and check-out transactions take place.
- An organized body of related information.
- Fiction Prose works other than fiction.
- Literacy narratives, collectively, which portray imaginary characters or events, specific novels and short stories.
Down
- A daily or weekly periodical printed on inexpensive paper, and distributed, containing news, opinions, advertisements, and other items of general interest.
- An account of the series of events making up a person's life, and written, composed or produced by another.
- A computer network consisting of a worldwide network of computer networks that use the tcp/ip network protocols to facilitate data transmission and exchanges.
- Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features.
- Catalog An alphabetical listing of books, categorized each book by title, author and subject.
- Decimal A system that organizes books on library shelves in a specific and repeatable order that makes it easy to find any book and return it to its proper places.
10 Clues: Fiction Prose works other than fiction. • An organized body of related information. • Desk Where library check-in and check-out transactions take place. • Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features. • Catalog An alphabetical listing of books, categorized each book by title, author and subject. • ...
2020 zoom escape 3๋จ๊ณ 2020-07-06
Across
- / [grammar] IT was warm ________ for use to go outside.
- / [DCS ๋จ์ด]an event in which people compete with each other to find out who is the best at something
- / [DCS ๋จ์ด]a person who has been attacked, injured or killed as the result of a crime, a disease, an accident, etc
- / [grammar] The best country _______ I know is Korea.
Down
- / [grammar] I should read books as much as _________.
- /a disease that spreads over a whole country or the whole world EX) CORONA, The Black death
- /a system for connecting to the internet or sending data over computer networks using radio waves instead of wires
- /an aircraft without a pilot, controlled from the ground, used for taking photographs, dropping bombs, delivering goods, etc ex) It has another meadning, worker bee
- /a person who claims to be in favour of a new development or project, but objects if it is too near their home and will affect them in some way EX)Not In My Back Yard
- / [DCS ๋จ์ด]์ถฉ๊ฒฉ์ ์ธ ๊ฒฝํ(๋)=SHOCK
10 Clues: / [DCS ๋จ์ด]์ถฉ๊ฒฉ์ ์ธ ๊ฒฝํ(๋)=SHOCK • / [grammar] I should read books as much as _________. • / [grammar] The best country _______ I know is Korea. • / [grammar] IT was warm ________ for use to go outside. • /a disease that spreads over a whole country or the whole world EX) CORONA, The Black death • ...
IPPS G3 - Week 5 Quiz 2017-02-01
Across
- the president is the sole effective head of government, constitutionally armed with real decision making powers
- social networks and norms of reciprocity and trustworthiness that arise from them
- a partyโs share of its seats in the legislature equals its share of the popular vote
- vote to determine if the government still has the support of a majority of the legislators
Down
- government elected through a two-step process, first the people elect a legislature which then elects the government
- two or more parties agree to share cabinet posts
- a rule about what percentage of a popular vote a party needs to acquire before it can receive seats in the legislature
- country is divided into electoral districts in which the candidate who wins the most votes wins the legislative seat
- the term meaning that a democracy is strong and lasting and will withstand the tests of time
- elections that take place before the expiration of the legislatureโs full term
10 Clues: two or more parties agree to share cabinet posts • elections that take place before the expiration of the legislatureโs full term • social networks and norms of reciprocity and trustworthiness that arise from them • a partyโs share of its seats in the legislature equals its share of the popular vote • ...
Ch. 15 Diagram 2021-06-21
Across
- A set of connections among nodes or points also called a graph.
- These types of networks include pyramids and trees, where all power issues from a common point.
- Tufte argues that a chart or diagram should not employ these which he has called โchart junkโ and instead should stay within the realm of objective observation.
- These types of relationships are for when categorization of things arenโt clearly separated and donโt fall into tidy divisions.
Down
- This type of network has a spine with radiating elements as in an interstate highway system.
- Visual movement employed by artists to guide viewersโ eyes along a specific path throughout the composition.
- A relationship in which a thing or idea is associated or linked to something else.
- Visual _____ take on specific meanings coded within the diagram to depict numerical increments, relative size, temporal change, and other conditions.
- This network has node-to-node relationships with no spine or center like the internet.
- A graphic representation of a structure, situation, or process.
10 Clues: A set of connections among nodes or points also called a graph. • A graphic representation of a structure, situation, or process. • A relationship in which a thing or idea is associated or linked to something else. • This network has node-to-node relationships with no spine or center like the internet. • ...
Industrial Revolution 2021-03-27
Across
- In early modern Europe, the class of well-off town dwellers whose wealth came from manufacturing, finance, commerce, and allied professions.
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds. First railroads were built in England in the 1830s. Success caused a railroad building boom lasting into the 20th Century
- A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765.
- Development of a system which supports machine production of goods
Down
- A belief that ultimate power resides in the people.
- Farming methods advanced, greater population, food supplies increased.
- A system in which society, usually in the form of the government, owns and controls the means of production.
- A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches.
- A method of production that brought many workers and machines together into one building
10 Clues: A belief that ultimate power resides in the people. • Development of a system which supports machine production of goods • Farming methods advanced, greater population, food supplies increased. • A method of production that brought many workers and machines together into one building • ...
CS Month Week 1 2023-09-14
Across
- ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
- ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
- _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- A weakness in a systemโs design or configuration that could be exploited by attackers to compromise security.
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
10 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data • ...
Unit 1 & 3 Vocabulary 2023-06-26
Across
- โYou can't understand urbanization in _________ from economic development,โ
- โThe truth is we are completely ____________ on other people emotionally as well as for our physical needs,โ
- He sees similarities in the ways they use social networks and hierarchies1 to gain__________.
- People __________ to cities because of the possibilities for doing things that interest
- Despite success stories such as Seoul, urban planners around the world continue to _________with the problem of how to manage urbanization.
- Individuals in both human and ape groups have a particular position in ___________ to other group members.
Down
- Just as human children often choose different toys, some monkeys in__________ have demonstrated gender-driven toy preferences.
- The hope is that urban planners will be able to use these objective data to _______ the quality of life for people in cities while reducing the environmental impact of urbanization.
- Urban planners today are focusing on urban _________ โthe way big cities are spreading out and taking over more and more land.
- Gelada males have ________ say in what the family does from day to day.
10 Clues: Gelada males have ________ say in what the family does from day to day. • โYou can't understand urbanization in _________ from economic development,โ • People __________ to cities because of the possibilities for doing things that interest • He sees similarities in the ways they use social networks and hierarchies1 to gain__________. • ...
Code Crisscross 2023-02-18
Across
- A type of search algorithm that works by repeatedly dividing the search interval in half
- A type of query language used to access and manipulate data in a relational database
- A high-level programming language named after a snake
- What is the full form of the letter 'N' when we talk about FAANG companies ?
- A type of supervised learning algorithm that is used to predict continuous values
Down
- An object-oriented programming principle that allows objects of different classes to be treated as if they were the same type of object
- A type of attack in which an attacker takes control of a system and demands payment in exchange for restoring access to the system.
- A technology that allows devices to connect and communicate with each other wirelessly
- A data structure that represents a collection of elements with a "last in, first out" access pattern
- A type of network device that is used to connect two networks together and route traffic between them
10 Clues: A high-level programming language named after a snake • What is the full form of the letter 'N' when we talk about FAANG companies ? • A type of supervised learning algorithm that is used to predict continuous values • A type of query language used to access and manipulate data in a relational database • ...
cw 2023-04-01
Across
- scaling solution that bundles multiple transactions into a single transaction to reduce gas fees and improve efficiency
- A service that allows users to register human-readable names for their Ethereum addresses
- A data structure used in some cryptocurrencies, such as IOTA and Nano, that allows for fast and feeless transactions
- swaps A technology that enables the exchange of cryptocurrencies across different blockchain networks without the need for intermediaries
- The physical layer of a blockchain network, which includes the hardware and infrastructure required to run the network
Down
- Transactions that involve more than one shard, or partition, of a blockchain network
- A privacy-focused blockchain protocol that aims to improve transaction privacy and scalability
- An upcoming upgrade to the Bitcoin network that aims to improve privacy and scalability
- An extension of the Plasma scaling solution that enables more efficient and secure handling of non-fungible tokens (NFTs)
- A scaling solution for the Ethereum network that allows for fast and cheap off-chain transactions
10 Clues: Transactions that involve more than one shard, or partition, of a blockchain network • An upcoming upgrade to the Bitcoin network that aims to improve privacy and scalability • A service that allows users to register human-readable names for their Ethereum addresses • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- An area of data protection that concerns the proper handling of sensitive data
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
Down
- Theย use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • Theย use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
money puzzle 2021-11-03
Across
- where you record all of the check and cash transactions your business has during an accounting period
- a card issued by a bank allowing the holder to transfer money electronically to another bank account when making a purchase
- uses a website or app to transfer funds from one person to another over the internet or mobile networks
- a small card that can be exchanged for a specified cash value of goods or services from a particular business, given as a gift
- a small plastic card issued by a bank, business, etc., allowing the holder to purchase goods or services on credit
Down
- the loss of potential gain from other alternatives when one alternative is chosen
- a card you can use to pay things
- an account at a bank against which checks can be drawn by the account depositor
- a price for a service for commodity that includes all extra costs incidental to the item
- a balance achieved between two desirable but incompatible features; a compromise
10 Clues: a card you can use to pay things • an account at a bank against which checks can be drawn by the account depositor • a balance achieved between two desirable but incompatible features; a compromise • the loss of potential gain from other alternatives when one alternative is chosen • ...
Tech Terms Crossword Puzzle 2022-04-13
Across
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- a place, person, or thing from which something comes or can be obtained
- the information about a particular person that exists on the internet as a result of their online activity
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- a set of data that describes and gives information about other data
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the practice of taking someone else's work or ideas and passing them off as one's own
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- websites and applications that enable users to create and share content or to participate in social networking
- a method employing encryption to provide secure access to a remote computer over the internet
10 Clues: a set of data that describes and gives information about other data • a place, person, or thing from which something comes or can be obtained • the practice of taking someone else's work or ideas and passing them off as one's own • a method employing encryption to provide secure access to a remote computer over the internet • ...
Unit 3: Process Customer's Enquiry and/or feedback 2021-08-25
Across
- close questions usually have short or ______ answers.
- The advantage of chats over traditional support channels is the ability to _______ customers real time.
- ______ support is asynchronous communication channel. It is used frequently and considered a mission critical service offering.
- Social networks is use to ________ quickly to enquiries and offer rapid damage control should an issue arise.
- An unique way that speech sounds by a group of people speaking the same language.
Down
- _____ questions are useful for gaining clarification and encouraging others to tell you more information about a subject
- When customers feel ______ and listened to, and customers will be more inclined to stay loyal to the business.
- ____________ Listening involves making a conscious effort to hear not only the words that another person is saying but the complete message that is communicated.
- _____ questions are useful when trying to get details about a siutation. It starts from general to more specific questions.
- A ____ centre is a centralised office used to receive or transmit a large volume of enquiries by telephone.
10 Clues: close questions usually have short or ______ answers. • An unique way that speech sounds by a group of people speaking the same language. • The advantage of chats over traditional support channels is the ability to _______ customers real time. • A ____ centre is a centralised office used to receive or transmit a large volume of enquiries by telephone. • ...
Chapter 18 Activity 2022-10-07
Across
- A popular way to represent language within AAC which involves using objects, photographs, and blissymbols.
- Information transfer is one of the four purposes of communicative ______.โ
- Communication almost always involves a ______.โ
- Communication behaviors that require only an individual's body.โ
- A mainstream technology that includes telephones, calculators, clocks, timers, maps, and reminders.
Down
- This type of AAC display changes the selection set each time a choice is made and requires the user to be able to recognize and identify each object for selection.
- This type of AAC System Output is digitized or synthesized and is good for speaking to groups.โ
- Because of its systematic approach to identify the client's key partners, goals, communication methods, and various skill levels, the Social Networks Inventory is an essential part of the AAC _______ process.โ
- A type of communication board that helps individuals with acquired disabilities?โ
- A type of AAC communicator which has no reliable method of expression and can only communicate here-and-now concepts.
10 Clues: Communication almost always involves a ______.โ • Communication behaviors that require only an individual's body.โ • Information transfer is one of the four purposes of communicative ______.โ • A type of communication board that helps individuals with acquired disabilities?โ • ...
Cybersecurity Awareness Month at BFB 2022-09-26
Across
- A tool that allows the user the user to remain anonymous while using the internet by masking the location and encrypting traffic (e.g: Cato)
- Storing your _______ in a plain text file is not a good idea
- October is Awareness Month for this
- Using the human tendency to trust to manipulate people to gain sensitive information.
- A harmful software meant to disable, infect or allow hackers to access the user's computer
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- Criminals pose as bank staff or other employees on the PHONE to try to trick you into sharing information.
- An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- The process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerad as a trustworthy entity.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
10 Clues: October is Awareness Month for this • Storing your _______ in a plain text file is not a good idea • 123456 and MyDOB01012010 are examples of what kind of Password? • Using the human tendency to trust to manipulate people to gain sensitive information. • A harmful software meant to disable, infect or allow hackers to access the user's computer • ...
NETWORKING CONCEPTS 2025-06-19
Across
- -Is used to connect a computer to the available internet connection over the existing telephone lines.
- -It means protecting the data and resources from any unauthorised access
- -The main characteristic of this network is that it requires a public telecommunication media to transfer data
- -a larger network than LAN which is spread across a metropolitancity
Down
- -Is defined as a group of computers and other peripheral devices that is linked together for sharing data and hardware resources
- This type of topology can handle a large volume of data traffic and is commonly used in wireless networks.
- - these have a wireless antenna, which increases the communication range of the radio signals.
- -it is an overall design of a computer network that describes how a computer network is configured and what strategies are being used.
- - stands for Wireless Fidelity
- -It refers to the layout in which various components of a network, like nodes, links, peripherals, etc., are connected and communicate with each other.
10 Clues: - stands for Wireless Fidelity • -a larger network than LAN which is spread across a metropolitancity • -It means protecting the data and resources from any unauthorised access • - these have a wireless antenna, which increases the communication range of the radio signals. • ...
COMPUTER. 2025-06-16
Across
- The act of using or imitating the language and thoughts of a person as One original work.
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- A network device that is used to connect all the computers in a network with each other.
- On what date bulk emails that come from unknown sources.
Down
- topology A single communication line or one main cable to which all the nodes directly connected.
- A program or set of programs that disrupts the normal functioning of a computer.
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Dystopian Society Crossword 2025-10-31
Across
- To challenge control, like Aloy facing old-world gods or androids breaking code in Detroit: Become Human.
- What Black Mirror: Bandersnatch (2018) literally does โ reflecting our obsession with control and choice.
- Describes futures like Cyberpunk 2077, Love, Death & Robots, or Arcane โ high-tech, low humanity.
- The regime style of The Handmaidโs Tale (TV series, 2017) and Citizen Sleeper โ authority everywhere, freedom nowhere.
Down
- The uprising seen in Andor (2022) and Horizon Forbidden West โ resistance against a broken system.
- When civilization slips backward, like the tribal world reborn after machines in Horizon Zero Dawn.
- To remove power by force โ as in Far Cry 6โs liberation of Yara or Final Fantasy VII Remakeโs war on Shinra.
- A spark that spreads through android networks in Detroit: Become Human or rebels in Andor.
- What society experiences after infection in The Last of Us Part II or nuclear winter in Metro Exodus.
- AND ORDER A hollow promise in Cyberpunk: Edgerunnersโ Night City โ where corporations rule, not justice.
10 Clues: A spark that spreads through android networks in Detroit: Become Human or rebels in Andor. • Describes futures like Cyberpunk 2077, Love, Death & Robots, or Arcane โ high-tech, low humanity. • The uprising seen in Andor (2022) and Horizon Forbidden West โ resistance against a broken system. • ...
Malware Detection 2025-11-26
Across
- Examine a program's code or behavior to understand how it works, especially to uncover malicious functionality.
- A type of malware that secretly records keystrokes to capture passwords and other private information.
- A malicious program that encrypts a user's files and demands payment to restore them.
- A a network of compromised devices controlled remotely by an attacker; attackers use them for DDoS attacks, sending spam, or mining cryptocurrency.
Down
- A selfโreplicating malware that can spread across networks without attaching to files
- A type of malware that requires a host file to propagate and often needs user action to spread.
- Type of reverse engineering analysis that involves running the program in a sandbox while monitoring file, registry, and network changes.
- An isolated environment where analysts run suspicious code safely to observe behavior without risking production systems.
- A malware that disguises itself as legitimate software or hides inside legitimate software to trick users into running it.
- Type of reverse engineering analysis involving inspection of binary strings or disassembling code.
10 Clues: A selfโreplicating malware that can spread across networks without attaching to files • A malicious program that encrypts a user's files and demands payment to restore them. • A type of malware that requires a host file to propagate and often needs user action to spread. • ...
Unit-3 2022-03-28
Across
- Hyperledger _________ is a project that develops a permissible smart contract machine with the specifications like the Ethereum
- ___________ is a programming language which is used for generating Smart contracts for several different Hyperledgers platforms.
- Smart _________ also called chain code.
- ____________ is the first smart contract platform
- _________ in a Hyperledger Fabric is the subnet of the main blockchain and You can create multiple Channels in a Blockchain depending upon your need.
- Hyperledger __________ is a kind of blockchain module and a hyperledger project which is hosted by the Linux Foundation.
- ________ is a fully-fledged blockchain node and smart contract execution engine that focuses on simplicity and speed.
Down
- The _________ is a specialised registry which records successful transactions, including the participants and identities that submitted them.
- _________ are the mechanism by which participants interact with assets.
- Hyperledger ________ is a set of collaboration tools for building blockchain business networks that make it simple and fast for business owners and developers to create smart contracts and blockchain applications to solve business problems.
- __________ Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications.
- ________ file is present within the Hyperledger Fabric and Docker context.
- The ledger system in Hyperledger Fabric uses ________ database by default.
- ___________ is the smart contract that runs on the peers. It is also used to create transactions.
14 Clues: Smart _________ also called chain code. • ____________ is the first smart contract platform • _________ are the mechanism by which participants interact with assets. • ________ file is present within the Hyperledger Fabric and Docker context. • The ledger system in Hyperledger Fabric uses ________ database by default. • ...
Matthew Prince 2012-04-02
Across
- A person who unknowingly gains access to someone's computer files.
- Malicious software that is disguised as something good or useful. It technically isn't a virus.
- specific software that you can try before purchase.
- technology that prevents a user from gaining access to an inappropriate website, and
- The "electronic" world perceived on a computer screen, this term if usedin opposition to the "real" world.
- a software program, designed specifically to damage the files of a computer that recieves it.
Down
- networks from an unauthorized user.
- Applications designed to search for a virus and repair computer files.
- any unwanted e-mail ( often of a commercial nature sent out in bulk )
- formerly known as Web Log. A blog is a website that contains dated text entries. A blog can serve many purposes from newsletters to personal diaries to topical discussions.
- a bully who goes online through cyber space to bully others online.
- software that is used to view varieties of internet resources on the World Wide Web ( WWW ).
- a small text file that identifies users' personal preferences and that allows a web site's server to extract your information from the database.
13 Clues: networks from an unauthorized user. • specific software that you can try before purchase. • A person who unknowingly gains access to someone's computer files. • a bully who goes online through cyber space to bully others online. • any unwanted e-mail ( often of a commercial nature sent out in bulk ) • ...
Psychology Vocab Study Guide 2014-04-18
Across
- the central trunk of the mammalian brain
- callosum/ a broad band of nerve fibers joining the two hemispheres of the brain
- its function is to coordinate and regulate muscular activity
- system/a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood.
- a substance(as norepinephrine or acetylcholine) that transmits nerve impulses across a synapse.
- middle part of the diencephalon through which sensory impulses pass to reach the cerebral cortex
- Deviation/ a quantity calculated to indicate the extent of deviation for a group as a whole.
- cells/ a supportive cell in the central nervous system.
Down
- a specialized cell transmitting nerve impulses; a nerve cell
- Observation/ is a common research method in behavioral sciences such as psychology
- a region of the brain, between the thalamus and the midbrain
- potential/ the change in electrical potential associated with the passage of an impulse along the membrane of a muscle cell or nerve cell.
- arcs/ the nerve pathway involved in a reflex action including at its simplest a sensory nerve and a motor nerve with a synapse between.
13 Clues: the central trunk of the mammalian brain • cells/ a supportive cell in the central nervous system. • a specialized cell transmitting nerve impulses; a nerve cell • a region of the brain, between the thalamus and the midbrain • its function is to coordinate and regulate muscular activity • ...
Water Pollution 2025-10-03
Across
- A community of living organisms interacting with their physical environment.
- The entire area of land where all the water drains into a single body of water, like the Porirua Harbour.
- The variety of plant and animal life in a particular habitat
- Water from rain or irrigation that flows over the land, carrying pollutants into the harbour.
- The process of fine dirt and particles settling at the bottom of the water, making it murky and unhealthy for sea life.
- The process of declining or wearing down in quality or condition
Down
- The act of polluting or making something impure
- Large in amount, size, or degree; or significantly effectiveNegligible So small or unimportant as to be not worth considering; or having minimal impact
- Actions that can be maintained over a long period without depleting natural resourcesInfrastructure The underlying framework of a system, such as roads, bridges, and storm drain networks
- The specific name for a coastal body of water where fresh river water mixes with salt sea water.
- The act of returning something to its original or former condition
- Action taken to improve a situation
- The act of reducing the severity or seriousness of something
13 Clues: Action taken to improve a situation • The act of polluting or making something impure • The variety of plant and animal life in a particular habitat • The act of reducing the severity or seriousness of something • The process of declining or wearing down in quality or condition • The act of returning something to its original or former condition • ...
Crossword 1 2021-12-26
Across
- A means of providing a common topic identifier in text and chat messages so they can be searched as a group
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A group of networked computers that share a common address
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- an attempt by hackers to damage or destroy a computer network or system.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network
- The amount of data that can be sent through a connection at one time
- To save the URL of a webpage for easy access in the future
- A measure of the amount of computational work that a computer system performs.
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials
10 Clues: To save the URL of a webpage for easy access in the future • A group of networked computers that share a common address • The amount of data that can be sent through a connection at one time • an attempt by hackers to damage or destroy a computer network or system. • A measure of the amount of computational work that a computer system performs. • ...
Tech Terms Crossword Puzzle 2022-04-13
Across
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- a place, person, or thing from which something comes or can be obtained
- the information about a particular person that exists on the internet as a result of their online activity
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- a set of data that describes and gives information about other data
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the practice of taking someone else's work or ideas and passing them off as one's own
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- websites and applications that enable users to create and share content or to participate in social networking
- a method employing encryption to provide secure access to a remote computer over the internet
10 Clues: a set of data that describes and gives information about other data • a place, person, or thing from which something comes or can be obtained • the practice of taking someone else's work or ideas and passing them off as one's own • a method employing encryption to provide secure access to a remote computer over the internet • ...
IPPS Quiz Week 4 2013-09-08
Across
- two or more parties agree to share cabinet posts
- country is divided into electoral districts in which the candidate who wins the most votes wins the legislative seat
- a rule about what percentage of a popular vote a party needs to acquire before it can receive seats in the legislature
- government elected through a two-step process, first the people elect a legislature which then elects the government
- the term meaning that a democracy is strong and lasting and will withstand the tests of time
Down
- elections that take place before the expiration of the legislatureโs full term
- a partyโs share of its seats in the legislature equals its share of the popular vote
- the president is the sole effective head of government, constitutionally armed with real decision making powers
- social networks and norms of reciprocity and trustworthiness that arise from them
- vote to determine if the government still has the support of a majority of the legislators
10 Clues: two or more parties agree to share cabinet posts • elections that take place before the expiration of the legislatureโs full term • social networks and norms of reciprocity and trustworthiness that arise from them • a partyโs share of its seats in the legislature equals its share of the popular vote • ...
answer question 2016-04-13
Across
- Logical errors on software are also calledโฆ
- Malware which exploits weaknesses in an application or operating system in order to spread.
- A collection of programs designed to infiltrate a computer and gain the highest level of privileges to take control of the infected computer.
- Example of social engineering via e-mail, cell phone or malware to receive user confidential data like passwords to commit identity theft.
- Form of malware with file extension โ.exeโ =
Down
- Keyloggers, which record keystrokes as you type and possibly the movements of your mouse in order to gain access to your data fall under which type of malware
- This principle states that if incorrect data has been input, the computer wonโt sort it out
- Data is _____________ when storage devices such as hard drives and flash drives fail, making it impossible to access data.
- Social networks are prone to social engineering attacks. like a user talking to someone posing as someone else and giving out personal information?
- What kind of software secretly installs itself to affect or harm computer software?
10 Clues: Logical errors on software are also calledโฆ • Form of malware with file extension โ.exeโ = • What kind of software secretly installs itself to affect or harm computer software? • This principle states that if incorrect data has been input, the computer wonโt sort it out • ...
Defining Public Health 2023-01-30
Across
- This form of public health aims to alleviate pain and suffering and provide care even when treatment is stopped.
- Type of disease that is considered the public health challenge of the 21st century
- Engagement in this capacity can impact health outcomes, especially at the end of life, by increasing the size of care networks, for example.
- A successful public health strategy (hint: starts with an โsโ + related to being clean)
Down
- Conditions that become public health priorities have this characteristic (hint: 2 words)
- A recent public health crisis (hint: starts with a โpโ)
- By addressing this social determinant of health outcomes, public health can help to reduce disparities in health outcomes.
- An implication of incorrect ICD-10 cause of death coding on public health (hint: this could alter evidence used for ____?)
- First leading cause of death today (hint: 2 words)
- One action that was initially taken to reduce the impact of the crisis in order to limit infection and death (hint: starts with a โqโ)
10 Clues: First leading cause of death today (hint: 2 words) • A recent public health crisis (hint: starts with a โpโ) • Type of disease that is considered the public health challenge of the 21st century • A successful public health strategy (hint: starts with an โsโ + related to being clean) • ...
Industrial Revolution 2021-03-26
Across
- line In a factory, an arrangement where a product is moved from worker to worker, with each person performing a single task in the making of the product.
- sovereignty A belief that ultimate power resides in the people.
- system Early industrial labor system in which workers produced goods at home
- An increase in the percentage and in the number of people living in urban settlements.
- labor Children were viewed as laborers throughout the 19th century. Many children worked on farms, small businesses, mills and factories.
Down
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- Communication by transmitting signals over a wire
- system method of production that brought many workers and machines together into one building
- engine 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
- gin A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
10 Clues: Communication by transmitting signals over a wire • sovereignty A belief that ultimate power resides in the people. • system Early industrial labor system in which workers produced goods at home • An increase in the percentage and in the number of people living in urban settlements. • ...
More Networking Terms 2021-04-13
Across
- used to send messages between devices to indicate the availability or error conditions.
- is a human-readable label that points to a device connected to a network.
- is similar to a virus, but does not require a host program or file and can replicate and infect computers with human action.
- a piece of software or hardware that blocks certain types of traffic.
Down
- a type of spam used by identity thieves to trick an individual into revealing private data, such as banking account information or passwords.
- a program that decides whether traffic coming into a server or going out should be allowed.
- allows two networks to be connected securely over the Internet as if they were one network.
- translates Internet addresses to IP addresses so routers can find Web sites on the Internet.
- service used to dynamically provide an IP logical address and configuration information to a device over the network.
- a unique identifier designed to identify different computers on a network.
- uniform resource locator. also known as a web address.
11 Clues: uniform resource locator. also known as a web address. • a piece of software or hardware that blocks certain types of traffic. • is a human-readable label that points to a device connected to a network. • a unique identifier designed to identify different computers on a network. • ...
LET'S PRACTICE YOUR KNOWLEDGE 2021-06-24
Across
- an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them
- attacking anotherโs reputation by a false publication (communication to a third party) tending to bring the person into disrepute
- a person who finds and exploits the weakness in computer systems and/or networks to gain access
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorise others to do the same.
Down
- a person who actually commits a crime
- criminal activity that either targets or uses a computer, a computer network or a networked device.
- is the president of ALSA Indonesia
- the country that will host ALSA Forum 2021
- the capital city of Thailand
- law is the area of law that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).
10 Clues: the capital city of Thailand • is the president of ALSA Indonesia • a person who actually commits a crime • the country that will host ALSA Forum 2021 • a person who finds and exploits the weakness in computer systems and/or networks to gain access • criminal activity that either targets or uses a computer, a computer network or a networked device. • ...
Data Transmission 2022-07-13
Across
- Data that can be sent in both directions but not at the same time
- A number in a data packet header used to stop data packets that never reach their destination from โclogging upโ the data paths/routes
- Stages in a network that can receive and transmit data packets
- The actual data being carried in a data packet
- Data that arrives at the destination with the bits no longer synchronized
Down
- Data that can be sent in both directions at the same time (simultaneously)
- A verification method that uses a calculated value which is sent after a block of data; the receiving computer also calculates the value from the block of data and compares the values.
- Data that can be sent on one direction only
- A type of serial data transmission which has become the industry standard for connecting computers to devices
- A device that enables data packets to be moved between different networks, for example to join a LAN to a WAN
10 Clues: Data that can be sent on one direction only • The actual data being carried in a data packet • Stages in a network that can receive and transmit data packets • Data that can be sent in both directions but not at the same time • Data that arrives at the destination with the bits no longer synchronized • ...
Data Transmission 2022-07-13
Across
- A type of encryption key that is known to all user.(2 words)
- A small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data.(2 words)
- The part of a data packet that indicates the end of the data packet and cyclic redundancy check error check.(2 words)
- Stages in a network that can receive and transmit data packets.
- Data that can be sent on one direction only.
- A device that enables data packets to be moved between different networks for example to join a LAN to a WAN
Down
- Another name for a hacker who intercepts data being transmitted on a wired or wireless network.
- The actual data being carried in a data packet.
- The process of making data meaningless using encryption keys; without the correct decryption key the data cannot be decoded.
- The original text/message before it is put through an encryption algorithm.
10 Clues: Data that can be sent on one direction only. • The actual data being carried in a data packet. • A type of encryption key that is known to all user.(2 words) • Stages in a network that can receive and transmit data packets. • The original text/message before it is put through an encryption algorithm. • ...
Communication and Media: Vocabulary 2022-11-03
Across
- making, a series of steps taken by an individual or group to determine the best option or course of action to meet their needs
- the imparting or exchanging of information by speaking, writing or using some medium.
- a communication in writing, in speech, or by signals
Down
- groups, a group that tries to influence public policy in the interest of a particular cause
- the quality of being done in an open way without secrets
- a person who intercepts and gets messages and then gives feedback
- literacy, the ability to access, analyze, evaluate and create media in variety of forms
- media, interactive technologies that facilitate the creation and sharing of information, ideas,interests, and other forms of expression through virtual communities and networks
- a person who transmit a message via a channel like an email or letter
- media, the means of communication reaching a large number of people such as the population of a nation through certain channels like film, radio, books, music, or television
10 Clues: a communication in writing, in speech, or by signals • the quality of being done in an open way without secrets • a person who intercepts and gets messages and then gives feedback • a person who transmit a message via a channel like an email or letter • the imparting or exchanging of information by speaking, writing or using some medium. • ...
Cloud Computing 2018-01-30
Across
- / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses
- / The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of _____ virtualization, service-oriented architecture, and autonomic and utility computing has led to growth in cloud computing
- / Cloud Computing relies on __________ of resources to achieve coherence and economy of scale, similar to a utility
- / What does the "P" in PAAS stand for?
- / Third-party clouds enable organisations to focus on their core businesses instead of expending resources on computer _____ and maintenance
Down
- / Which cloud is cloud infrastructure operated solely for a single organisation?
- / The capability of rapid ________ in clouds, to scale rapidly outward and inward commensurate with demand.
- / Cloud computing shares characteristics with _____ computers which are powerful computers used mainly by large organisations for critical applications typically bulk data processing
- / Which cloud is a composition of two or more clouds?
- / ______, security and confidentiality are some of the reasons why companies choose a private cloud instead of a public one.
10 Clues: / What does the "P" in PAAS stand for? • / Which cloud is a composition of two or more clouds? • / Which cloud is cloud infrastructure operated solely for a single organisation? • / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses • ...
SCDF Promotion Ceremony 2023 2023-05-18
Across
- SCDF's Fire Bike is also known as the Red _____.
- SCDF Marine Division celebrated their 10th anniversary in 2022. Their first two fire vessels were called _____ I & II.
- The first bus service - Bus No.1 was first introduced in 1956, and the service ran from Changi Village to North Bridge Road. In 5 _____ 1989, the service was withdrawn.
- FairPrice was born from a supermarket chain of the Singapore _____ Labour Organisation and the Pioneer Industries Employees Union.
Down
- _____ is the first MRT station in Singapore.
- SCDF sounds the "Important Message" signal through the Public Warning System sirens on 15 February and 15 _____ annually.
- The biggest hawker centre located in Singapore is at _____.
- The distance between Khatib and Yio Chu Kang MRT is so long because _____ was initially slated to be built there.
- The digital platform that enables SCDF paramedics and hospitals share patient data in real time is called Operational Medical Networks _____ Integrator.
- This four-legged robot has advanced detection and monitoring capabilities to help SCDF manage Hazardous Materials incidents better. It is called _____.
10 Clues: _____ is the first MRT station in Singapore. • SCDF's Fire Bike is also known as the Red _____. • The biggest hawker centre located in Singapore is at _____. • The distance between Khatib and Yio Chu Kang MRT is so long because _____ was initially slated to be built there. • ...
Cyber Security Week 2023-09-30
Across
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
- What is the process of converting information into a code to prevent unauthorized access?
- What is a secret combination of letters, numbers, and symbols used to access a system or account?
- What is the practice of protecting systems, networks, and programs from digital attacks?
- What is the practice of regularly updating software and systems to protect against known vulnerabilities?
- What type of software is designed to block unauthorized access while permitting authorized communication?
Down
- What is the act of pretending to be someone else to deceive or gain access to information?
- What is a deceptive email or website designed to trick individuals into revealing personal information?
- What is a set of security rules and policies that govern the use of an organization's information technology resources?
10 Clues: What is the practice of protecting systems, networks, and programs from digital attacks? • What is the process of converting information into a code to prevent unauthorized access? • What is the act of pretending to be someone else to deceive or gain access to information? • ...
Cyber security and Ethics Cross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- Theย use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Unsolicited messages sent in bulk by email
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • Theย use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
crossword 2024-01-31
Across
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment.
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known.
- a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization.
- law that regulates the conduct of parties engaged in an armed conflict. synonymous with International Humanitarian Law.
- an academic, non-binding work on how international humanitarian law applies to cyber conflicts and cyber warfare.
Down
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
- false information spread in order to deceive people.
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities.
10 Clues: false information spread in order to deceive people. • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. • behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known. • ...
cryptex3-1 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- An open-source operating system is known for its security, stability, and customization options.
- Git command is used to create a copy of a repository on a local machine.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
Down
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Computer's essential firmware responsible for initializing hardware.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
CS Trivia! 2024-09-02
Across
- Named after the Persian mathematician Al-Khwarizmi, whose work introduced the concept to the West
- Named after George Boole, who created the logic system that underpins modern digital circuits in the mid-1800s
- A security system that controls incoming and outgoing network traffic based on predetermined security rules
- A device that forwards data packets between computer networks, creating an overlay internetwork
- A programming technique where a function calls itself to solve a problem
Down
- The core part of an operating system, managing system resources and communication between hardware and software
- Grace Hopper, known as the "mother of computing," developed one of the first of these in the 1950s
- The concept of storing frequently accessed data dates back to early computing systems like the IBM System/360
- Used by Julius Caesar to protect military messages, one of the earliest forms of this was a simple shift cipher
- The base-2 number system used by computers, consisting of only 0s and 1s.
10 Clues: A programming technique where a function calls itself to solve a problem • The base-2 number system used by computers, consisting of only 0s and 1s. • A device that forwards data packets between computer networks, creating an overlay internetwork • Named after the Persian mathematician Al-Khwarizmi, whose work introduced the concept to the West • ...
IT 2024-10-10
Across
- A wide-area network that connects your offices, data centers, cloud applications, and cloud storage together.
- a device that links multiple computers and devices together.
- a unique address that identifies a device on the internet or a local network.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- a computer program or device that provides a service to another computer program and its user, also known as the client.
Down
- They connect multiple devices, such as computers, wireless access points, printers, and servers; on the same network within a building or campus.
- a smart device that is used for creating one bigger network by connecting smaller subnetworks.
- a computer on a network that provides the interface between two applications or networks that use different protocols.
- determines the path data takes when it moves from a source to a destination.
- a collection of devices connected together in one physical location, such as a building, office, or home.
10 Clues: a device that links multiple computers and devices together. • determines the path data takes when it moves from a source to a destination. • a unique address that identifies a device on the internet or a local network. • a smart device that is used for creating one bigger network by connecting smaller subnetworks. • ...
Advanced Technological Terms 2025-04-14
Across
- intelligence : The simulation of human intelligence processes by machines, especially computers.
- reality : An enhanced version of the real physical world achieved through the use of digital visual elements, sound, or other sensory stimuli.
- : The measurement and analysis of unique physical or behavioral characteristics, especially as a means of verifying identity.
- : The science and engineering of creating materials and devices on a very small scale, at the level of atoms and molecules.
Down
- computing : A type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations.
- encryption : The process of converting information into a code to prevent unauthorized access.
- : A decentralized, distributed digital ledger used to record transactions securely.
- learning : A branch of artificial intelligence where computers improve their performance through experience without being explicitly programmed.
- networks : Computer systems modeled on the human brain, used to recognize patterns and solve complex problems.
- printing : A process of making three-dimensional solid objects from a digital file by layering material.
10 Clues: : A decentralized, distributed digital ledger used to record transactions securely. • encryption : The process of converting information into a code to prevent unauthorized access. • intelligence : The simulation of human intelligence processes by machines, especially computers. • ...
COMPUTER. 2025-06-16
Across
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- A network device that is used to connect all the computers in a network with each other.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- On what date bulk emails that come from unknown sources.
- topology A single communication line or one main cable to which all the nodes directly connected.
Down
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- A program or set of programs that disrupts the normal functioning of a computer.
- The act of using or imitating the language and thoughts of a person as One original work.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Artificial intelligence 2025-10-17
Across
- โ Information collected and used by computers to learn, analyze, and make decisions.
- Learning โ A type of machine learning that uses many layers of neural networks to analyze complex data.
- โ The use of technology to perform tasks with little or no human help.
- Language Processing (NLP) โ A part of AI that helps computers understand and respond to human language.
- โ A computer program that can talk or chat with people, often used in customer service or apps.
- โ The study of right and wrong; in AI, it deals with making sure technology is used fairly and responsibly.
Down
- โ A step-by-step set of instructions that a computer follows to solve a problem or perform a task.
- Network โ A computer system modeled after the human brain, used to recognize patterns and make decisions.
- Learning โ A branch of AI where computers learn from data and improve their performance without being directly programmed.
- โ The field that involves designing and building robots that can perform human-like tasks.
10 Clues: โ The use of technology to perform tasks with little or no human help. • โ Information collected and used by computers to learn, analyze, and make decisions. • โ The field that involves designing and building robots that can perform human-like tasks. • โ A computer program that can talk or chat with people, often used in customer service or apps. • ...
Crossword Vocabulary 2021-10-06
Across
- A site that enables you to edit content from a web browser.
- drive: a small memory drive that is used for storing and transferring data to or from a computer.
- A magnetic device that stores data.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- use: The right to reuse copy-righted material or information on the internet.
- local area networks. A series of computers linked together to form a network.
- A right from the owner to make copies of what the owner did.
- irrelevant and disturbing messages such as commercials and advertisements.
- An element of something.
- A device that operates differently from a CPU but works with it.
- Security: A rule or policies that protect your data and information on the internet.
Down
- A faster type of device made mostly of flash memory that stores data.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- An act of compromising a digital network to access an account of a system.
- An act of using someoneโs thought and ideas without crediting the author.
- A network information that is not tied to a single place.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- good behavior on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- An act of using someoneโs thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The โbrainโ of your computer. Itโs a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when itโs shut down.
- An act of using someoneโs thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Newsletter 2023Q4 Crossword Puzzle 2023-11-06
Across
- Concerning ransomware, a user or organization's critical data is made inaccessible
- Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- Month of CAM
- Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- Any staff member who maintains security controls on behalf of an Owner
- Pertaining to a strong password, used to reduce vulnerability in the event of a hack
- TEAMS channel for up to date security notices
- Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- Lead agency of IC3
- Number of years Catalyst has been a CAM Champ
Down
- One of two useful Security Awareness TEAMS channels
- Any staff member who oversees data recovery
- Leader of a business unit with responsibility for implementing department level operating procedures
- Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- Member of management or delegate who has primary responsibility for the business function supported by a system, application
- Minimizing the harm of a particular risk
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A malicious practice that aims to deceive and defraud people through texts
19 Clues: Month of CAM • Lead agency of IC3 • Minimizing the harm of a particular risk • Any staff member who oversees data recovery • TEAMS channel for up to date security notices • Number of years Catalyst has been a CAM Champ • One of two useful Security Awareness TEAMS channels • Any staff member who maintains security controls on behalf of an Owner • ...
Phish in the sea 2024-10-02
Across
- Something you should never share with anyone (8 letters)
- Small, innocent, but easily distracted by flashy phishing baitsโneeds to grow wiser! (5 letters)
- Technique used to secure data and make it unreadable (10 letters)
- Still learning the ropes, this fish swims close to danger but can steer clear with more care. (6 letters)
- A type of engineering often used in phishing attacks (6 letters)
- Sharp and speedy, this employee sniffs out phishing emails like a pro predator. (5 letters)
- What companies need to have in case their files are compromised (6 letters)
- Type of malware that locks your files until a ransom is paid (10 letters)
- The mindset employees should maintain to avoid scams (5 letters)
- Glides effortlessly past phishing attempts, never falling for those shiny hooks. (3 letters)
- How employees should be to spot phishing emails and scams (8 letters)
Down
- A security feature that adds an extra layer of protection (3 letters)
- What employees should do when they spot a phishing email (6 letters)
- The practice of protecting systems and networks from digital attacks (13 letters)
- Email scam designed to steal information (5 letters)
- Part of a phishing email, designed to trap you (4 letters)
- The king of the sea and the inbox, spotting phishing emails before they even swim by!
- Pretending to be someone youโre not online (8 letters)
- Tiny and low on awareness, but thereโs nowhere to go but up in the phishing food chain! (8 letters)
19 Clues: Email scam designed to steal information (5 letters) • Pretending to be someone youโre not online (8 letters) • Something you should never share with anyone (8 letters) • Part of a phishing email, designed to trap you (4 letters) • A type of engineering often used in phishing attacks (6 letters) • The mindset employees should maintain to avoid scams (5 letters) • ...
Technology Vocabulary 2023-04-25
Across
- moving you to another page
- is a device that links two or more compatible networks
- to look at information on the internet
- algorithm that assets the similarity between to images
- levels of computer information trying to mimic the human mind
- a large cylinder-shaped object that moves very fast by forcing out burning gases, used for space travel or as a weapon
Down
- a number of computers that are connected together so that they can share information
- a drawing that shows the shape, size, and arrangement of rooms in a building as viewed from above
- to cause something to operate
- a small plastic or rubber object with two or three metal pins, attached to the end of a wire on a piece of electrical
- computer, on which pictures or words are shown
- a small safety part in an electrical device or piece of machinery that causes it to stop working
- a small picture or symbol on a computer screen that you point to and click on
- if a computer or system crashes, it suddenly stops operating
- a mistake or problem in a computer program
- is a single strand of metal capable of transmitting power or data
- inserting an object to a device or moving data else where
- written records that are kept about a particular person or subject
- the address of a web page that is kept on your computer so that you can find it again easily
19 Clues: moving you to another page • to cause something to operate • to look at information on the internet • a mistake or problem in a computer program • computer, on which pictures or words are shown • is a device that links two or more compatible networks • algorithm that assets the similarity between to images • inserting an object to a device or moving data else where • ...
Chapter 10 2015-03-08
Across
- a digital media file, most often audio,distributed via the Internet for playback on a portable media player, such as Appleโs iPod, or a computer.
- software that allows users to create and edit Web pages using a Web browser.
- an activity structured around a series of questions or searching tasks.
- inquiry-oriented activities in which some or all of the information used by learners is drawn from resources on the Web
- a form of synchronous communication in which users communicate mainly by typing messages to one person or many people at the same time
- a unique Internet address
- occurring at the same time
Down
- the computer that controls, sorts, and distributes incoming information on a particular topic)
- various Internet applications that allow individuals to share information and interests in an online community.
- allows two users on the Internet to synchronously communicate by typing messages back and forth to one another in real time.
- second-generation Web technologies that allow for communication and collaboration of people in Web-based communities.
- not occurring at the same time
- vast collection of computer networks that connects millions of computers and tens of millions of people around the world.
13 Clues: a unique Internet address • occurring at the same time • not occurring at the same time • an activity structured around a series of questions or searching tasks. • software that allows users to create and edit Web pages using a Web browser. • the computer that controls, sorts, and distributes incoming information on a particular topic) • ...
Lesson 30 Vocabulary 2015-05-18
Across
- Hackers using spyware to control your browser.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
Down
- Complex and secure,containing at least eight characters and at least one letter,one number,and one special character.
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- A malicious program that records keystrokes.
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Encrypts the information in an SSL Certificate.
- A program that hackers use to capture IDs and passwords on a network.
- security feature used for larger networks that controls computers from one point.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
Crossword Puzzel 2021-01-18
Across
- When processors communicate with each other through telephone lines, they are known as ____ Systems
- Solution for the problem of absence of Global Clock, we use _______ clock
- It packย the parameters into a message and passes the message to the transport layer
- When we require ability to decide whether two events are casually related or not by simply looking at their timestamps we use ______ clock
- when we do not broadcast msgs in casual ordering we use_____
- middle S stands for in BSS
- In __________Communication, each process that wants to communicate must explicitly name the recipient or sender of the communication
- A protocol that one program can use to request a service from a program located in another computer on a network without having to understand the networkโs design
Down
- if some machine goes down, some other machine can be used without stopping the task, this property is known as
- ________ of processes is difficult because of unavailability of shared memory
- printers, storage facilities, data, files, web pages, and networks are examples of
- In _________Communication, the messages are sent to and received from mailboxes
- Failure of main network will ____ the entire distributed network communication
13 Clues: middle S stands for in BSS • when we do not broadcast msgs in casual ordering we use_____ • Solution for the problem of absence of Global Clock, we use _______ clock • ________ of processes is difficult because of unavailability of shared memory • Failure of main network will ____ the entire distributed network communication • ...
Business technohnology 2024-02-28
Across
- Any process that a business organization conducts over computer-mediatedated network'
- storage The retention of information using technology specifically developed to keep that data and have it as accessible as necessary.
- banking Allows you to conduct financial tratransactionsrough the internet.
- A live audio or audiovisual meeting with two or more participants.
- The machines, wiring, and other items used in home life and activities such as garddening.
- machine Machines that dispense cash and allow you to make other banking transaction.
Down
- communication technology A diverse set of technological tools and resources used to transmit store create share or exchange information'
- A method of buying and selling goods and services online.
- technologyIs any electronic object or system that help employees accomplish task,
- information system Allow you to organize your company data and generate reports to help you more informad and effective business decisions.
- networks A system of interconnected electronic components or circuits,
- Live visual connection between two or more remote parties over the internet that simulated a face to face meeting
- aided design The use of computer-based software to aid in design processes.
- banking machine An electronic banking outlet that allow customomers to complete basic transactions without the aid of a branch representative or teller'
14 Clues: A method of buying and selling goods and services online. • A live audio or audiovisual meeting with two or more participants. • networks A system of interconnected electronic components or circuits, • aided design The use of computer-based software to aid in design processes. • banking Allows you to conduct financial tratransactionsrough the internet. • ...
Internet Safety 2024-02-27
Across
- A placeholder for a web page that will allow you quick access to that page instead of having to browse to it or search for it.
- A worldwide system of computer networks.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- The act of pretending to be a creditable company to steal personal information.
- The trail of data you leave when using the internet.
- A small hand-controlled device for pointing and clicking to make selections on the screen.
- A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Down
- Information that a website puts on a user's computer.
- A person who uses computers to gain unauthorized access to data.
- The electronic posting of mean-spirited messages about a person (such as a student) often done anonymously.
- A secret word or phrase that must be used to gain admission to something.
- Messages that are distributed by electronic means from one computer user to one or more recipients via a network.
- A program designed to breach the security of a computer system while ostensibly performing some innocuous function.
13 Clues: A worldwide system of computer networks. • The trail of data you leave when using the internet. • Information that a website puts on a user's computer. • A person who uses computers to gain unauthorized access to data. • A secret word or phrase that must be used to gain admission to something. • ...
Follow The Wire 2023-03-03
Across
- Using someone else's datacenter and resources over the internet
- Stores and shares data for multiple computers in a network that can be accessed remotely; File Level Data
- Copy of the data that can be recovered at any point in time
- Switches at the top of a rack that aggregate from the LAN to servers and devices and connects servers to rest of the network
- Directs traffic in and out of the WAN/connects multiple networks to the WAN; "Post Office"
- Connects the servers to the shared pools of storage devices; dedicated to moving storage traffic
Down
- Shared pools of storage that can be centrally managed and be accessed by multiple servers/computers; Block Level Data
- Connects/transmits data from end users from the LAN to core switches (phones, laptops, access points)
- Aggregate/consolidates servers and SAN storage; eliminates need for SAN switches
- Central junction high capacity switch that is fast and directly aggregates the LAN and provides access to the WAN; "Backbone/Brain"
- 24/7 running computers that hosts or servers applications that end users use (SQL, AD, Exchange, etc.)
- First line of defense; prevents unauthorized access to and from the network; "Bouncer"
- Provides access and are the gateway to using the internet
13 Clues: Provides access and are the gateway to using the internet • Copy of the data that can be recovered at any point in time • Using someone else's datacenter and resources over the internet • Aggregate/consolidates servers and SAN storage; eliminates need for SAN switches • First line of defense; prevents unauthorized access to and from the network; "Bouncer" • ...
3D PK + DM 2021-05-04
Across
- network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment
- a device which forwards data packets to the appropriate parts of a computer network
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- Point networking hardware device that allows other Wi-Fi devices to connect to a wired network
- a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km
- a group or system of interconnected people or things
Down
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- physical location where people can access the Internet, typically using Wi-Fi
- the official procedure or system of rules governing affairs of state or diplomatic occasions
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
10 Clues: a group or system of interconnected people or things • physical location where people can access the Internet, typically using Wi-Fi • a device which forwards data packets to the appropriate parts of a computer network • the official procedure or system of rules governing affairs of state or diplomatic occasions • ...
The types of malware 2022-03-16
Across
- a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- a type of malware that automatically delivers advertisements
- a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- a form of malware that essentially holds a computer system captive while demanding a ransom
Down
- a program error causing crashing or freezing
- the monitoring of telephone and Internet-based conversations by a third party, often by covert means.
- a type of malware spying on users activity without their knowledge
- a form of malware capable of copying itself and spreading to other computers
- a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware
- a type of malware causing harm to their host networks by consuming bandwidth, overloading web servers and containing โpayloadsโ
10 Clues: a program error causing crashing or freezing • a type of malware that automatically delivers advertisements • a type of malware spying on users activity without their knowledge • a form of malware capable of copying itself and spreading to other computers • a form of malware that essentially holds a computer system captive while demanding a ransom • ...
Urban Multilingualism and the Civic University 2022-03-04
Across
- The type of teaching that is favoured to "introduce an aspect of community awareness into the curriculum"
- Goodhart (2017) uses this term to refer to peoples' "mobile, achieved" identities
- Tietze, Holden, and Barner-Rasmussen (2016) provide an example of research and practice that highlights the effects of language diversity on this
- Barni & Extra (2008) explore methods of mapping language ___ in their work on multilingualism
- Clyne & Kipp (2006) look at language policy in the context of this in their work on multilingualism
- Sorace highlighted the benefits of this for children through research, training, and consultancy
Down
- Amin & Thrift (2017) refer to a shift from "traditional forms of governance [...] to ever-permeating networks" of this
- Schiller (2016) discusses this as something that is embraced as part of "a political model of managing difference"
- Sassen (2005) discusses these as ways of maintaining "cohesion among increasingly diverse populations" (cf. Finney & Simpson, 2009)
- A key part of the agenda surrounding language policy, which relates to matters of social justice
10 Clues: Goodhart (2017) uses this term to refer to peoples' "mobile, achieved" identities • Barni & Extra (2008) explore methods of mapping language ___ in their work on multilingualism • A key part of the agenda surrounding language policy, which relates to matters of social justice • ...
Information Security Crossword 2017-01-16
Across
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- A type of malware that is often disguised as legitimate software.
- A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
- The need to ensure that information is disclosed only to those who are authorized to view it.
- A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
- A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
- A flaw or weakness that can be used to attack a system or organization.
- A secret series of characters used to authenticate a personโs identity.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a personโs identity. • A person who uses computers to gain unauthorized access to computer systems and networks. • ...
