networks Crossword Puzzles
Word Hike 2023-10-08
Across
- named storage location in memory that holds data or values, which can change during the execution of a program.
- A step-by-step procedure or formula used for solving a problem or performing a task in computer science.
- The set of rules that govern the structure and format of valid statements and expressions in a programming language.
- The process of identifying and fixing errors or bugs in a program to ensure it functions correctly.
- A common networking technology used for local area networks (LANs) that relies on wired connections.
Down
- A field of computer science focused on creating machines and software capable of intelligent behavior, such as learning, problem-solving, and decision-making.
- A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU.
- father of the computer.
- A control structure that allows a set of instructions to be repeated based on a specified condition.
- A markup language used to create web pages and define their structure and content.
10 Clues: father of the computer. • A markup language used to create web pages and define their structure and content. • A small, high-speed memory used to store frequently accessed data for faster retrieval by the CPU. • The process of identifying and fixing errors or bugs in a program to ensure it functions correctly. • ...
Super Secret Security Crossword Puzzle 2024-05-31
Across
- itelligence exhibited by machines, particularly computer systems.
- one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
- a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- "gift" or "present" in Arabic.
- a team of experts that proactively monitor and respond to cybersecurity incidents.
- a cybersecurity mechanism that uses a manufactured attack target to lure cybercriminals away from legitimate targets.
Down
- the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change.
- an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
- a physical or logical sub-network that separates an internal local area network (LAN) from other untrusted networks, usually the Internet.
- a technique through which a cybercriminal disguises themselves as a known or trusted source.
10 Clues: "gift" or "present" in Arabic. • itelligence exhibited by machines, particularly computer systems. • a team of experts that proactively monitor and respond to cybersecurity incidents. • a technique through which a cybercriminal disguises themselves as a known or trusted source. • ...
Crossword 2024-05-02
Across
- This term refers to the process of ensuring that software and hardware components can work together smoothly.
- What do you call the practice of optimizing the flow of goods and services in the IT supply chain?
- This term describes the physical layout of computer components within a system.
- What term describes the process of ensuring that data remains intact and unchanged during storage, transfer, or processing?
Down
- ____Computing. A method of distributing computing tasks across multiple computers or processors to improve efficiency and performance.
- This term describes the practice of organizing and controlling the flow of information between systems or components.
- What is the name for a network device that forwards data packets between computer networks?
- A protocol used for securely accessing remote computers or systems over an unsecured network.
- What is the term for the physical or virtual space where data is stored and managed by a computer system or network?
- What three-letter acronym represents the process of moving data between computer systems over a network?
10 Clues: This term describes the physical layout of computer components within a system. • What is the name for a network device that forwards data packets between computer networks? • A protocol used for securely accessing remote computers or systems over an unsecured network. • ...
Poverty 2025-01-23
Across
- What refers to conditions or practices that help to maintain health and prevent the spread of disease?
- What is the social process of excluding a group or individual from full participation in society?
- What refers to the basic physical systems of a country or region, such as transportation and communication networks?
- What is the state of being extremely poor; lacking the basic necessities of life?
- What is the term for the failure of a child to grow to their full potential height due to chronic malnutrition?
- What refers to the public health and engineering measures for the safe disposal of human waste and sewage?
Down
- What is the term for the unjust and uneven distribution of resources and opportunities within a society?
- What is the condition of not having enough food to meet basic nutritional needs?
- What is the condition of not getting enough essential nutrients from the diet, even if calorie needs are met?
- What is the state of disagreement or hostility that can arise from various factors, including competition for resources?
10 Clues: What is the condition of not having enough food to meet basic nutritional needs? • What is the state of being extremely poor; lacking the basic necessities of life? • What is the social process of excluding a group or individual from full participation in society? • ...
COMPUTER. 2025-06-16
Across
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- A network device that is used to connect all the computers in a network with each other.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- On what date bulk emails that come from unknown sources.
- topology A single communication line or one main cable to which all the nodes directly connected.
Down
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- A program or set of programs that disrupts the normal functioning of a computer.
- The act of using or imitating the language and thoughts of a person as One original work.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Artificial intelligence 2025-10-17
Across
- – Information collected and used by computers to learn, analyze, and make decisions.
- Learning – A type of machine learning that uses many layers of neural networks to analyze complex data.
- – The use of technology to perform tasks with little or no human help.
- Language Processing (NLP) – A part of AI that helps computers understand and respond to human language.
- – A computer program that can talk or chat with people, often used in customer service or apps.
- – The study of right and wrong; in AI, it deals with making sure technology is used fairly and responsibly.
Down
- – A step-by-step set of instructions that a computer follows to solve a problem or perform a task.
- Network – A computer system modeled after the human brain, used to recognize patterns and make decisions.
- Learning – A branch of AI where computers learn from data and improve their performance without being directly programmed.
- – The field that involves designing and building robots that can perform human-like tasks.
10 Clues: – The use of technology to perform tasks with little or no human help. • – Information collected and used by computers to learn, analyze, and make decisions. • – The field that involves designing and building robots that can perform human-like tasks. • – A computer program that can talk or chat with people, often used in customer service or apps. • ...
Computer Term Crossword 2021-10-06
Across
- to copy a copyrighted material for a limited purpose.
- A collection of LANs, it is a network of networks.
- A right given to the originator to stop people from copying he/she’s work.
- A basic element that is required for the computer to function.
- A website that allows any users to edit the content.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- A set of devices that is connected together in a limited area.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
Down
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
- A set of rules that protects integrity.
- A device or unit that works separately from the CPU but is connected to the computer.
- The correct way to use the internet.
- Sending unwanted messages in a bulk.
- Brain of the computer and it lets the computer interact with the programs.
- Storage device for computers which uses magnetic storage.
- A network security that monitors network traffic and blocks data base on the security rules.
- To make digital devices give unauthorized access to a computer system.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- An act of using someone’s thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Law and Order 2024-01-31
Across
- A well-known criminal who steals, often by force.
- The idea that some individuals might have a biological predisposition to criminal behavior.
- Proven to be false or without merit.
- The fear or anxiety felt in anticipation of something that may happen.
- A now-discredited movement aimed at improving the genetic composition of the human population through selective breeding.
- The scientific study of the nervous system, including the brain.
- Academic or research-based attention.
- People or characteristics that resemble ancestors or earlier forms of life.
- The study of the relationship between brain function and criminal behavior.
Down
- Individuals characterized by persistent antisocial behavior, impaired empathy, and remorse, and bold, disinhibited, and egotistical traits.
- Conduct that shows a lack of consideration for others and that may cause damage to society, whether intentionally or through negligence.
- A lack of ability to feel or express emotions.
- The concept that people might commit crimes because of the conditions they live in, rather than being inherently bad.
- The part of the brain responsible for decision-making, impulse control, and social behavior.
- A complex system of nerves and networks in the brain, associated with basic emotions and drives.
- An examination of a body after death to determine the cause of death.
- The study of crime, criminal behavior, and the criminal justice system.
- The branch of biology that deals with the normal functions of living organisms and their parts.
- The skull, especially the part encasing the brain.
19 Clues: Proven to be false or without merit. • Academic or research-based attention. • A lack of ability to feel or express emotions. • A well-known criminal who steals, often by force. • The skull, especially the part encasing the brain. • The scientific study of the nervous system, including the brain. • ...
Computers 2024-09-16
Across
- A computer that provides data to other computers.
- Flash Drive A small storage device that uses flash memory and connects via a USB port.
- A personal computer that is small enough to be carried around.
- (Central Processing Unit) A piece of hardware that processes data and performs arithmetic and logical operations.
- A program that damages or destroys computer data, and replicates itself.
- The physical parts of a computer.
- The display screen that provides visual output from a computer.
- The main circuit board that connects different parts of a computer.
- Storage Areas on Internet servers where data and applications can be stored and accessed.
- Computer A personal computer that resides on a desk or table.
Down
- (Universal Serial Bus) A standard that allows communication between devices, like a flash drive and computer.
- Programs that tell a computer what to do and how to do it.
- A very small piece of silicon inside a computer with circuits for storing information or performing operations.
- A flat control surface used to move the cursor on a laptop, similar to a mouse.
- A wireless technology standard that connects devices using radio waves.
- System A system that allows hardware devices to communicate and support software programs (e.g., Microsoft Windows).
- Card A type of memory card typically used in digital cameras.
- Drive The most commonly used type of secondary storage device, which stores data as aligned particles on a magnetic disk.
- (Random Access Memory)A type of short-term memory that stores data while the computer is working.
- A device that sends and receives data on computer networks.
20 Clues: The physical parts of a computer. • A computer that provides data to other computers. • Programs that tell a computer what to do and how to do it. • A device that sends and receives data on computer networks. • Card A type of memory card typically used in digital cameras. • Computer A personal computer that resides on a desk or table. • ...
RockX Persistence Crossword 2022-09-21
Across
- One of the Cosmos wallets that supports Persistence($XPRT)
- People who volunteer a computer to maintain the blockchain's integrity by constantly computing the linkage from the first block to the last.
- Which is the platform pSTAKE integrated with for its BNB liquid staking implementation. This allows leveraged yield farming on Pancakeswap pools?
- What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
- ________ is a decentralized peer-to-peer blockchain that people can use to create liquidity and trade IBC enabled tokens.
- Get an estimated yield of 5.87% when you stake ________ with RockX!
- The name of the consensus mechanism used by Persistence chain
- The leading staking service provider in Asia
- The platform where you can stake your XPRT to earn compounded yields
- RockX is a validator in what kind of network?
Down
- What is the name of the popular smart contract library that persistence chain recently integrated, which allows developers to deploy rust contracts on the chain
- A platform where you can track your assets on pSTAKE, Ethereum and BNB chains
- ________ is the native token of its the crypto.org chain
- ________ is a sharded protocol that enables blockchain networks to operate together seamlessly.
- The current CEO of RockX
- RockX is based in which country?
- What month is the Persistence Genesis Day?
- ________ is a decentralized, open-source blockchain with smart contract functionality founded by Vitalik Buterin
- The name of the Liquid Staking protocol by Persistence
- What platform did persistence partner with to implement cross-chain messaging?
20 Clues: The current CEO of RockX • RockX is based in which country? • What month is the Persistence Genesis Day? • The leading staking service provider in Asia • RockX is a validator in what kind of network? • The name of the Liquid Staking protocol by Persistence • ________ is the native token of its the crypto.org chain • ...
Crack It !!! 2012-12-11
Across
- A character normally sent at the beginning/end of a synchronous transmission to provide timing and bit synchronization
- A modems characteristic when it is sending a carrier signal on a multipoint line when it has not been polled
- The undesirable noise or disturbance that occurs on a communications channel, caused by natural or man-made signals
- A method of data communications using 75 bps as a transmission speed
- A memory device type that loses its stored contents upon electrical power fluctuation or failure
- Interference from radio transmission signals or microwave communication causing a received signal to deflect from the target
Down
- A network station designed to interconnect two otherwise incompatible devices or networks
- Any combination of two or more technologies
- The control block or blocks of data added prior to the actual message
- Using a constant time interval between bits or characters to insure that all data communications equipment is in step with each other
- The waiting time, or delay between a stations request to a transmission channel,and completion
- The disturbance or interference of open-air radio transmission to deliberately prevent communication
- A reduction in a signals level as expressed in decibels
13 Clues: Any combination of two or more technologies • A reduction in a signals level as expressed in decibels • A method of data communications using 75 bps as a transmission speed • The control block or blocks of data added prior to the actual message • A network station designed to interconnect two otherwise incompatible devices or networks • ...
module 2 2017-03-22
Across
- in case of a fire you could quickly cut off the supply or in case of an intrusion you could cut off the supply, or the circulation of the air conditioning system
- the process of identifying uncertain investment decision
- plays a very important role in keeping the environmental at a constant temperature
- These are cables that protect against the interference from generators or equipment around the computing facility
- identify critical business operations when there's a accident, disasters
- reduce the oxygen the heat. You suppress the fuels, we have the oxygen, you suppress oxygen and heat
Down
- only authorized disclosure should be allowed
- is needed for HVAC , such as if there's a blackout in electricity, the probability that is also down is minimized
- When you put positive air pressure in the room, when the door opens the air flows out not in
- dictates that only authorized modifications should be allowed
- security that happens physically and through actions securing networks and information systems
- dictates that our resources should be available in a timely fashion to authorized personnel
- measures taken to protect systems, buildings, and related supporting infrastructure against threats associated with their physical environment
13 Clues: only authorized disclosure should be allowed • the process of identifying uncertain investment decision • dictates that only authorized modifications should be allowed • identify critical business operations when there's a accident, disasters • plays a very important role in keeping the environmental at a constant temperature • ...
Network 2022-03-25
Across
- naming system that allows communication across devices on a network.
- consists of two or more computers that are linked in order to share resources
- consists of two or more computers that are linked in order to share resources
- network interface identification and location addressing
- a network cable that contains strands of glass fibers inside an insulated casing.
- a network cable that contains strands of glass fibers inside an insulated casing.
- a family of wired computer networking technologies commonly used in local area networks,
Down
- formatted unit of data carried by a packet-switched network
- connectivity with routing to provide a fast internet connection
- used to connect one network device to other network devices or to connect two or more computers to share printers, scanners etc.
- delays in communication over a network.
- the percentage of bits that have errors relative to the total number of bits received in a transmission, usually expressed as ten to a negative power.
- continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.
- the wireless technology used to connect computers, tablets, smartphones and other devices to the internet.
- consists of two or more computers that are linked in order to share resources with client machines they are considered as...
15 Clues: delays in communication over a network. • network interface identification and location addressing • formatted unit of data carried by a packet-switched network • connectivity with routing to provide a fast internet connection • naming system that allows communication across devices on a network. • ...
Sociology 2023-12-01
Across
- a model that illustrates how an individual’s health is socially embedded within their networks, communities,etc
- the state of being symptomatic or unhealthy for a disease or condition.
- economic and sociological combined total measure of a person's work experience and of an individual's or family's economic access to resources and social position in relation to others
- race with the highest maternal mortality rates
- Those with ---- prestige are seen to have an advantage when related to health
- stress ---- is when one stressful event leads to a series of stressful events and situations
Down
- the illnesses and diseases the mother receives after birthing a baby
- anticipation and worry stress that comes with membership in a socially marginalized and stigmatized group
- the description of social life in medical terms–erases the cultural impacts on health and leaves blame to solely biology or personal behaviors
- The rate of deaths in a population over a year expressed per 1000
- the subjective experience of a disease, condition, or a set of symptoms
- A state of complete physical, mental and social well being
- Anything that challenges and threatens the body’s internal stability and equilibrium, such as blood pressure or even cellular processes
13 Clues: race with the highest maternal mortality rates • A state of complete physical, mental and social well being • The rate of deaths in a population over a year expressed per 1000 • the illnesses and diseases the mother receives after birthing a baby • the state of being symptomatic or unhealthy for a disease or condition. • ...
World History Review 2023-01-03
Across
- Series of Holy Wars between Christians and Muslims that spread Islamic achievements and opened new trading networks
- Some common things that were traded along the Silk Road included Spices, cultures, goods, and...
- This was a major contribution to the development of civilizations because it recorded existing laws for all to see
- Romans designed their governments to incorporate this on the power of different parts of government
- In the Middle East during neolithic times, the development of farming brought about this
- Complex societies with advanced knowledge of farming, trade, government, and art
Down
- A trade route that connected China to the Romans
- These things were established during the Middle Ages to improve economic and social conditions of artisans, set quality standards for goods produced, and more
- Important long-term contributions of ancient Greek and Roman civilizations are primarily found in this area
- This was a document was eventually used to strengthen the idea that a monarch's power was not absolute
- Feudal systems organized this during the Middle Ages
- Manorial systems organized this during the Middle Ages
- A type of government in which citizens have the right to vote on the laws
13 Clues: A trade route that connected China to the Romans • Feudal systems organized this during the Middle Ages • Manorial systems organized this during the Middle Ages • A type of government in which citizens have the right to vote on the laws • Complex societies with advanced knowledge of farming, trade, government, and art • ...
CrossWord Vocabulary 2021-10-06
Across
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- The right to reuse copy-righted material or information on the internet.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- A right from the owner to make copies of what the owner did.
- A magnetic device that stores data.
- A faster type of device made mostly of flash memory that stores data.
- A site that enables you to edit content from a web browser.
- Good behavior on the internet.
- Irrelevant and disturbing messages such as commercials and advertisements.
- An act of using someone’s thought and ideas without crediting the author.
- Local area networks. A series of computers linked together to form a network.
Down
- An element of something.
- An act of compromising a digital network to access an account of a system.
- A rule or policies that protect your data and information on the internet.
- A network information that is not tied to a single place.
- A small memory drive that is used for storing and transferring data to or from a computer.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- A device that operates differently from a CPU but works with it.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- good behavior on the internet.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A right from the owner to make copies of what the owner did.
- An act of compromising a digital network to access an account of a system.
- A faster type of device made mostly of flash memory that stores data.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- irrelevant and disturbing messages such as commercials and advertisements.
Down
- A network information that is not tied to a single place.
- A site that enables you to edit content from a web browser.
- Security: A rule or policies that protect your data and information on the internet.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A device that operates differently from a CPU but works with it.
- An act of using someone’s thought and ideas without crediting the author.
- An element of something.
- local area networks. A series of computers linked together to form a network.
- A magnetic device that stores data.
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- use: The right to reuse copy-righted material or information on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- Local area networks. A series of computers linked together to form a network.
- Security A rule or policies that protect your data and information on the internet.
- A device that operates differently from a CPU but works with it.
- An act of using someone’s thought and ideas without crediting the author.
- A right from the owner to make copies of what the owner did.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
Down
- A small memory drive that is used for storing and transferring data to or from a computer.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- Good behavior on the internet.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- A faster type of device made mostly of flash memory that stores data.
- An element of something.
- A magnetic device that stores data.
- Irrelevant and disturbing messages such as commercials and advertisements.
- A site that enables you to edit content from a web browser.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- An element of something.
- A device that operates differently from a CPU but works with it.
- A site that enables you to edit content from a web browser.
- A network information that is not tied to a single place.
- A small memory drive that is used for storing and transferring data to or from a computer.
- An act of using someone’s thought and ideas without crediting the author.
- A faster type of device made mostly of flash memory that stores data.
Down
- Good behavior on the internet.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A right from the owner to make copies of what the owner did.
- A rule or policies that protect your data and information on the internet.
- An act of compromising a digital network to access an account of a system.
- Irrelevant and disturbing messages such as commercials and advertisements.
- Local area networks. A series of computers linked together to form a network.
- A collection of security designed to prevent dangerous access to a network system.
- A magnetic device that stores data.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when it’s shut down.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Geo crossword 2022-07-09
Across
- areas What is an area with dense transport networks and densely packed buildings called
- Consist of living and non-living things that are found naturally.
- What is a physical area on the Earth’ surface called?
- What is the movement of people from rural to urban areas called?
- What is the pollution caused by an increase in LED usage?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What is the environment where people live on farms and villages called?
- What is poor air quality affecting half the world’s urban population called?
- What is the increase in the proportion of people living in urban areas called?
- What is the number of people living in a unit area of land called?
- What is a built up area called?
Down
- What is the environment that has not been affected by people?
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What are the advantages of going to a city called?
- What is a physical area on the earth’s surface called?
- What are the disadvantages of going to a city called?
- What is the pollution caused by leakage fuel storage tanks into rivers?
- What job opportunities are called?
- to our surroundings and can either be physical or human.
- What is the area of the earth’s surface that holds special meaning for people?
21 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What is a physical area on the Earth’ surface called? • What are the disadvantages of going to a city called? • What is a physical area on the earth’s surface called? • to our surroundings and can either be physical or human. • ...
Geo crossword 2022-07-09
Across
- What is a physical area on the earth’s surface called?
- What is the environment where people live on farms and villages called?
- What are the advantages of going to a city called?
- areas What is an area with dense transport networks and densely packed buildings called
- What is the number of people living in a unit area of land called?
- What is a physical area on the Earth’ surface called?
- What is a built up area called?
- What is the area of the earth’s surface that holds special meaning for people?
- What job opportunities are called?
- What is the pollution primarily caused by the burning of fuelwood and paraffin for cooking and heating?
- What is the pollution caused by leakage fuel storage tanks into rivers?
Down
- Consist of living and non-living things that are found naturally.
- What is the movement of people from rural to urban areas called?
- What is the increase in the proportion of people living in urban areas called?
- What is the pollution related to and primarily caused by unnecessary honking called?
- What are the disadvantages of going to a city called?
- What is poor air quality affecting half the world’s urban population called?
- What is the pollution caused by an increase in LED usage?
- What is a multicultural society with many people from diverse cultural backgrounds called?
- What is the environment that has not been affected by people?
- refer to our surroundings and can either be physical or human.
21 Clues: What is a built up area called? • What job opportunities are called? • What are the advantages of going to a city called? • What are the disadvantages of going to a city called? • What is a physical area on the Earth’ surface called? • What is a physical area on the earth’s surface called? • What is the pollution caused by an increase in LED usage? • ...
Networking 2023-09-15
Across
- A protocol used for assigning IP addresses to devices on a network (4 letters).
- A device used to connect a network to the internet.
- protocol used for sending email messages (4 letters).
- A network topology where all devices are connected to a central hub (6 letters).
- A measure of the time it takes for data to travel from one point to another in a network.
- The organization responsible for assigning IP address blocks and domain names (3 letters).
- A technology that allows wireless devices to connect to a wired network (4 letters).
- The process of verifying the identity of a user or device on a network (8 letters).
- A device that separates a network into smaller collision domains.
- Data transfer protocol used for secure file transfers.
Down
- The process of dividing a network into smaller, more manageable segments (9 letters).
- A network service that translates human-readable domain names into IP addresses (4 letters).
- A protocol used to retrieve email from a mail server.
- A device or software component that filters and forwards network traffic between different network segments (6 letters).
- A unique identifier assigned to each device on a network (3 letters).
- A technology that allows multiple virtual networks to share the same physical infrastructure.
- The maximum amount of data that can be transmitted in a given time.
- A set of rules that govern how data is transmitted across a network.
- A device that connects multiple network segments and forwards data based on MAC addresses.
- The process of converting a private IP address into a public one for internet access.
20 Clues: A device used to connect a network to the internet. • A protocol used to retrieve email from a mail server. • protocol used for sending email messages (4 letters). • Data transfer protocol used for secure file transfers. • A device that separates a network into smaller collision domains. • The maximum amount of data that can be transmitted in a given time. • ...
ict 2024-05-15
Across
- accessing a system using malicious methods
- creating an emotional connection with someone with the intention of doing them harm
- text messages
- something that is circulated widely by being shared through networks to large numbers of internet users
- all the data that a user creates online, which is recorded and stored
- compilation of personal information about an individual
- created by the individuals who use the service
- a group of things that are arranged very close together
- to see a document, page or film before it is produced in its final form and published
- information that a website stores on a user's computer so that the website recognizes the user when they uses it again
Down
- mass communication such as broadcasting, publishing an the internet
- to make a mark against some information to show that it is important.
- Using the internet to send text, image or multimedia in order to upset or embarrass someone.
- people or account to whom a user is connected
- a colloquialism used to tell someone to say nothing about a particular subject, or to be quiet.
- a message sent to an internet discussion group so that all members of the group can read it
- a collection of information about a user
- very rude or insulting
- a type of advertising used by internet companies in which computer users pass on advertising messages or images trough email
- a label that you can add to a post
20 Clues: text messages • very rude or insulting • a label that you can add to a post • a collection of information about a user • accessing a system using malicious methods • people or account to whom a user is connected • created by the individuals who use the service • compilation of personal information about an individual • ...
Lesson 25 vocab 2015-04-23
Across
- A form of electronic communication that allows you to send and receive text messages in "real time" from friends and colleagues who are currently online.
- Units of data sent across a network.
- contains user name of individual, the @ symbol, The user's domain name.
- A list of e-mail address you can use to send the same message to a group.
- E-mail software provided with Windows Vista.
- unsolicited commercial e-mail that is sent to many people at the same time to promote products or services; also called junk e-mail.
Down
- Text or graphics added to the end of outgoing e-mail messages.
- a list of e-mail address you can use to send the same message to a group.
- Using a cell phone or other mobile device to send and receive written messages.
- transmission of electronic messages over networks.
- A software application installed on the local PC, network, or Web, such as e-mail, text messages, and instant messaging programs.
- to save or transfer data to a storage device or folder for the purpose of saving space or organizing the data.
- part of the e-mail programs; used to keep a list of contacts and their e-mail addresses.
- A document, image, figure, or other file that you can attach to an e-mail message.
14 Clues: Units of data sent across a network. • E-mail software provided with Windows Vista. • transmission of electronic messages over networks. • Text or graphics added to the end of outgoing e-mail messages. • contains user name of individual, the @ symbol, The user's domain name. • a list of e-mail address you can use to send the same message to a group. • ...
IC3 Lesson 30 Vocabulary 2015-05-18
Across
- Security feature used for larger networks that controls computers from one point
- Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Complex and secure, containing at least eight characters and at leaste one letter, one numbers, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time
Down
- Encrypts the information in an SSL Certificate
- Certificates for e-commerce sites, sites that process sentisitve data, and sites that require privacy and security requirements
- Hackers using spyware to control your browser
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system
- Software installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information
- A malicious program that records keystrokes
- Deciphers the information in an SSL Certificate
- A program that hackers use to capture IDs and passwords on a network
13 Clues: A malicious program that records keystrokes • Hackers using spyware to control your browser • Encrypts the information in an SSL Certificate • Deciphers the information in an SSL Certificate • A program that hackers use to capture IDs and passwords on a network • Security feature used for larger networks that controls computers from one point • ...
Lesson 30 Vocabulary 2015-05-22
Across
- A program that hackers use to capture IDs and passwords on a network.
- A malicious program that records keystrokes.
- Complex and secure, containing at least eight characters and at least one letter, one number, and one special character
- Chronic physical malady that can result when a person makes too many of the same motions over a long period of time.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements.
- Hackers using spyware to control your browser.
- security feature used for larger networks that controls computers from one point.
- installed surreptitiously on a personal computer with the goal of collecting information about the user, the user's browsing habits, and other personal information.
- Encrypts the information in an SSL Certificate.
Down
- Invading someone else's computer, usually for personal gain or the satisfaction of defeating a security system.
- attacks Using a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
- Certificates for e-commerce sites, sites that process sensitive data, and sites that require privacy and security requirements
- Deciphers the information in an SSL Certificate.
13 Clues: A malicious program that records keystrokes. • Hackers using spyware to control your browser. • Encrypts the information in an SSL Certificate. • Deciphers the information in an SSL Certificate. • A program that hackers use to capture IDs and passwords on a network. • security feature used for larger networks that controls computers from one point. • ...
WEEK 1 OVERVIEW 2023-03-24
Across
- ____ IS THE PROCESS OF VOLUNTARILY COMPLYING WITH A SET OF PROFESSIONAL STANDARDS DEALING WITH POLCIES AND PROCDURE, PROCESSES AND ACTIONS
- JEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICES
- WHAT IS THE MOST IMPORTANT W IN THE 6 W'S
- MEANS DOING THE RIGHT THING
- A HYSTERIA CONTROLLING TECHNIQUE WHERE YOU REPEAT A PHRASE THAT HAS WHAT YOU WANT THE CALLER TO DO AND WHY OVER AND OVER
- WHAT IS THE BUTTON THAT IS PRESSED IN THE CASE OF A MAJOR INFRASTRUCTURE OR COMMUNICATION CENTER EMERGENCY AND RE-ROUTES CALLS TO DENVER
Down
- WHAT IS THE ART AND SCIENCE OF COMMUNICATION OVER A DISTANCE BY TELEPHONE, TELEGRAPH AND RADIO
- NAME OF THE LANGUAGE LINE THAT WE USE
- CAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOOR
- JEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM
- ___ IS THE GENERAL RESPONSE FROM THE BODY TO ANY UNUSUAL DEMAND MADE ON IT, PLEASANT OR UNPLEASANT, EMOTIONAL, PHYSICAL OR MENTAL
- EMERGENCY 911 CALLS GO OVER DEDICTED TELEPHONE NETWORKS AND ARE AUTOMATICCLY ROUTED TO THE APPROPRIATE EMERGENCY COMMNICATION CENTER BASED ON THE CALLERS LOCATION
- PEOPLE ON THE EMPLOYEE BOARD THAT HAVE A GOLD STAR ON THEM ARE APART OF THIS GROUP
13 Clues: MEANS DOING THE RIGHT THING • NAME OF THE LANGUAGE LINE THAT WE USE • WHAT IS THE MOST IMPORTANT W IN THE 6 W'S • JEFFCOM IS THE ___ BETWEEN THE COMMUNITY AND EMERGENCY SERVICES • CAN BE FOUND BETWEEEN THE MENS AND THE WOMANS RESTROOM ON EVERY FLOOR • JEFFCOM 4 CORE VALUES ARE ENCOURAGEMENT _______ ETHICS AND PROFESSIONALISM • ...
Chapter 6 Crossword 2022-10-11
Across
- Tax that is paid to SARS when goods are imported.
- Government helps the businesses in this sector to compete on international markets
- involves the movement of product/service to ensure that it reaches the desired market on time.
- Phase of the product life cycle where sales volumes are either maintained or decrease
- the use of the internet and social networks as part of the business’s marketing campaign.
Down
- The business offers the product/service to the market at a high price and justifies the price based on the “uniqueness of the product/service”
- Promotional strategy used to reach a mass audience in order to inform them and persuade them to buy the product/service
- Considered to be the most essential element of the marketing mix
- Facebook, Twitter, Blogs and short promotional messages to watch on You Tube.
- A business charging R1 999 instead of R2 000
- Clothing would be categorised as this type of good
- A news item or story which conveys information about a business, product, service in the media.
- The business itself will portray certain values (image).If the unique features of the products and the image of the business are combined, it is known as the ____.
13 Clues: A business charging R1 999 instead of R2 000 • Tax that is paid to SARS when goods are imported. • Clothing would be categorised as this type of good • Considered to be the most essential element of the marketing mix • Facebook, Twitter, Blogs and short promotional messages to watch on You Tube. • ...
Constraints, revenue streams and types of briefs 2023-12-05
Across
- Funding raised through social media through networks - contributors are offered an incentive for how much they contribute
- During production there is a lot of support that can be accessed to finance the project
- Money paid for a brand to be associated with final media product
- A brief where the client will hire a separate independent media company to create the product and the process is overseen by a commissioner from the client
- When planning a production timescales are built backwards from a final deadline
Down
- A product must be financially viable to be successful so a budget is set at the start of the project
- A brief where the client and producer work together to develop the brief for the project
- A brief where there is no documentation and a verbal agreement is reached
- The brief is outlined within a contract of employment
- Money from businesses willing to invest
- Intellectual property of the product is licensed to other partners e.g. for merchandising
- Money from brands in return for their material being on pages or on screen during production
- A brief where a meeting between the client & producer takes place where the client will outline requirements
13 Clues: Money from businesses willing to invest • The brief is outlined within a contract of employment • Money paid for a brand to be associated with final media product • A brief where there is no documentation and a verbal agreement is reached • When planning a production timescales are built backwards from a final deadline • ...
Computer Term Crossword 2021-10-06
Across
- A basic element that is required for the computer to function.
- A device or unit that works separately from the CPU but is connected to the computer.
- A website that allows any users to edit the content.
- A collection of LANs, it is a network of networks.
- It is a small portable hard drive that can be inserted into the computer through the USB port to see data inside the drive.
- Taking someone else's work and stating that it is yours.
- A memory storage device that contains semiconductor chips.
Down
- The correct way to use the internet.
- Brain of the computer and it lets the computer interact with the programs.
- A right given to the originator to stop people from copying he/she’s work.
- A set of rules that protects integrity.
- To make digital devices give unauthorized access to a computer system.
- Sending unwanted messages in a bulk.
- A set of devices that is connected together in a limited area.
- A network security that monitors network traffic and blocks data base on the security rules.
- Storage device for computers which uses magnetic storage.
- Also called universal serial bus, it is a standard that is used for connecting peripheral devices to a computer.
- to copy a copyrighted material for a limited purpose.
- A hardware in a computer that saves data that is currently in use so it can be reached easily.
19 Clues: The correct way to use the internet. • Sending unwanted messages in a bulk. • A set of rules that protects integrity. • A collection of LANs, it is a network of networks. • A website that allows any users to edit the content. • to copy a copyrighted material for a limited purpose. • Taking someone else's work and stating that it is yours. • ...
Crossword Vocabulary 2021-10-06
Across
- A site that enables you to edit content from a web browser.
- Drive: a small memory drive that is used for storing and transferring data to or from a computer.
- A magnetic device that stores data.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- use: The right to reuse copy-righted material or information on the internet.
- local area networks. A series of computers linked together to form a network.
- A right from the owner to make copies of what the owner did.
- irrelevant and disturbing messages such as commercials and advertisements.
- An element of something.
- A device that operates differently from a CPU but works with it.
- Security: A rule or policies that protect your data and information on the internet.
Down
- A faster type of device made mostly of flash memory that stores data.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- an external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- An act of compromising a digital network to access an account of a system.
- An act of using someone’s thought and ideas without crediting the author.
- A network information that is not tied to a single place.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- good behavior on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- Local area networks. A series of computers linked together to form a network.
- Security A rule or policies that protect your data and information on the internet.
- A device that operates differently from a CPU but works with it.
- An act of using someone’s thought and ideas without crediting the author.
- A right from the owner to make copies of what the owner did.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
Down
- A small memory drive that is used for storing and transferring data to or from a computer.
- A collection of security designed to prevent dangerous electronic access to a computer network system.
- Good behavior on the internet.
- The right to reuse copy-righted material or information on the internet.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- A faster type of device made mostly of flash memory that stores data.
- An element of something.
- A magnetic device that stores data.
- Irrelevant and disturbing messages such as commercials and advertisements.
- A site that enables you to edit content from a web browser.
19 Clues: An element of something. • Good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Network requirements 2021-11-13
Across
- a local network is a tiny network that is limited to a certain location.
- ensures that your computer has enough room to read and write data so that the CPU can find it fast and easily
- a piece of software or hardware that prevents specific types of communication from passing through.
- basic portion of domain names such as howtogeek.com and google.com
- address on a network, a numerical address that relates to your computer.
- a collection of data structured in such a way that a computer application may easily access specific data.
- a device's hardware address when linked to a shared network.
- various methods of communication over the Internet.
- how computers translate human-readable domain names and hostnames into IP addresses
Down
- a device that connects networks by routing traffic
- a gadget that sends and receives traffic
- an Internet-based way of sharing files between computers
- connected network technology that is nearly universally used today
- the quantity of data that may be communicated over a network at any one moment is measured in bytes.
- a standard that allows a LAN to utilize a single IP address for Internet connections and a group of IP addresses for internal traffic.
- a collection of data structured in such a way that a computer application may easily access specific data.
- part of an Internet address
- a programming language for building web pages
- a protocol that allows a server on a local network to issue a computer or other network device a temporary IP address.
- the portion of a computer that controls and monitors all activities and calculations.
20 Clues: part of an Internet address • a gadget that sends and receives traffic • a programming language for building web pages • a device that connects networks by routing traffic • various methods of communication over the Internet. • an Internet-based way of sharing files between computers • a device's hardware address when linked to a shared network. • ...
Unit-3 2022-03-28
Across
- Hyperledger _________ is a project that develops a permissible smart contract machine with the specifications like the Ethereum
- ___________ is a programming language which is used for generating Smart contracts for several different Hyperledgers platforms.
- Smart _________ also called chain code.
- ____________ is the first smart contract platform
- _________ in a Hyperledger Fabric is the subnet of the main blockchain and You can create multiple Channels in a Blockchain depending upon your need.
- Hyperledger __________ is a kind of blockchain module and a hyperledger project which is hosted by the Linux Foundation.
- ________ is a fully-fledged blockchain node and smart contract execution engine that focuses on simplicity and speed.
Down
- The _________ is a specialised registry which records successful transactions, including the participants and identities that submitted them.
- _________ are the mechanism by which participants interact with assets.
- Hyperledger ________ is a set of collaboration tools for building blockchain business networks that make it simple and fast for business owners and developers to create smart contracts and blockchain applications to solve business problems.
- __________ Fabric is an enterprise-grade permissioned distributed ledger framework for developing solutions and applications.
- ________ file is present within the Hyperledger Fabric and Docker context.
- The ledger system in Hyperledger Fabric uses ________ database by default.
- ___________ is the smart contract that runs on the peers. It is also used to create transactions.
14 Clues: Smart _________ also called chain code. • ____________ is the first smart contract platform • _________ are the mechanism by which participants interact with assets. • ________ file is present within the Hyperledger Fabric and Docker context. • The ledger system in Hyperledger Fabric uses ________ database by default. • ...
Matthew Prince 2012-04-02
Across
- A person who unknowingly gains access to someone's computer files.
- Malicious software that is disguised as something good or useful. It technically isn't a virus.
- specific software that you can try before purchase.
- technology that prevents a user from gaining access to an inappropriate website, and
- The "electronic" world perceived on a computer screen, this term if usedin opposition to the "real" world.
- a software program, designed specifically to damage the files of a computer that recieves it.
Down
- networks from an unauthorized user.
- Applications designed to search for a virus and repair computer files.
- any unwanted e-mail ( often of a commercial nature sent out in bulk )
- formerly known as Web Log. A blog is a website that contains dated text entries. A blog can serve many purposes from newsletters to personal diaries to topical discussions.
- a bully who goes online through cyber space to bully others online.
- software that is used to view varieties of internet resources on the World Wide Web ( WWW ).
- a small text file that identifies users' personal preferences and that allows a web site's server to extract your information from the database.
13 Clues: networks from an unauthorized user. • specific software that you can try before purchase. • A person who unknowingly gains access to someone's computer files. • a bully who goes online through cyber space to bully others online. • any unwanted e-mail ( often of a commercial nature sent out in bulk ) • ...
Psychology Vocab Study Guide 2014-04-18
Across
- the central trunk of the mammalian brain
- callosum/ a broad band of nerve fibers joining the two hemispheres of the brain
- its function is to coordinate and regulate muscular activity
- system/a complex system of nerves and networks in the brain, involving several areas near the edge of the cortex concerned with instinct and mood.
- a substance(as norepinephrine or acetylcholine) that transmits nerve impulses across a synapse.
- middle part of the diencephalon through which sensory impulses pass to reach the cerebral cortex
- Deviation/ a quantity calculated to indicate the extent of deviation for a group as a whole.
- cells/ a supportive cell in the central nervous system.
Down
- a specialized cell transmitting nerve impulses; a nerve cell
- Observation/ is a common research method in behavioral sciences such as psychology
- a region of the brain, between the thalamus and the midbrain
- potential/ the change in electrical potential associated with the passage of an impulse along the membrane of a muscle cell or nerve cell.
- arcs/ the nerve pathway involved in a reflex action including at its simplest a sensory nerve and a motor nerve with a synapse between.
13 Clues: the central trunk of the mammalian brain • cells/ a supportive cell in the central nervous system. • a specialized cell transmitting nerve impulses; a nerve cell • a region of the brain, between the thalamus and the midbrain • its function is to coordinate and regulate muscular activity • ...
Water Pollution 2025-10-03
Across
- A community of living organisms interacting with their physical environment.
- The entire area of land where all the water drains into a single body of water, like the Porirua Harbour.
- The variety of plant and animal life in a particular habitat
- Water from rain or irrigation that flows over the land, carrying pollutants into the harbour.
- The process of fine dirt and particles settling at the bottom of the water, making it murky and unhealthy for sea life.
- The process of declining or wearing down in quality or condition
Down
- The act of polluting or making something impure
- Large in amount, size, or degree; or significantly effectiveNegligible So small or unimportant as to be not worth considering; or having minimal impact
- Actions that can be maintained over a long period without depleting natural resourcesInfrastructure The underlying framework of a system, such as roads, bridges, and storm drain networks
- The specific name for a coastal body of water where fresh river water mixes with salt sea water.
- The act of returning something to its original or former condition
- Action taken to improve a situation
- The act of reducing the severity or seriousness of something
13 Clues: Action taken to improve a situation • The act of polluting or making something impure • The variety of plant and animal life in a particular habitat • The act of reducing the severity or seriousness of something • The process of declining or wearing down in quality or condition • The act of returning something to its original or former condition • ...
Around The Library. 2015-03-29
Across
- Desk Where library check-in and check-out transactions take place.
- An organized body of related information.
- Fiction Prose works other than fiction.
- Literacy narratives, collectively, which portray imaginary characters or events, specific novels and short stories.
Down
- A daily or weekly periodical printed on inexpensive paper, and distributed, containing news, opinions, advertisements, and other items of general interest.
- An account of the series of events making up a person's life, and written, composed or produced by another.
- A computer network consisting of a worldwide network of computer networks that use the tcp/ip network protocols to facilitate data transmission and exchanges.
- Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features.
- Catalog An alphabetical listing of books, categorized each book by title, author and subject.
- Decimal A system that organizes books on library shelves in a specific and repeatable order that makes it easy to find any book and return it to its proper places.
10 Clues: Fiction Prose works other than fiction. • An organized body of related information. • Desk Where library check-in and check-out transactions take place. • Monthly / bi-monthly periodicals of a collection of articles, stories, pictures or other features. • Catalog An alphabetical listing of books, categorized each book by title, author and subject. • ...
2020 zoom escape 3단계 2020-07-06
Across
- / [grammar] IT was warm ________ for use to go outside.
- / [DCS 단어]an event in which people compete with each other to find out who is the best at something
- / [DCS 단어]a person who has been attacked, injured or killed as the result of a crime, a disease, an accident, etc
- / [grammar] The best country _______ I know is Korea.
Down
- / [grammar] I should read books as much as _________.
- /a disease that spreads over a whole country or the whole world EX) CORONA, The Black death
- /a system for connecting to the internet or sending data over computer networks using radio waves instead of wires
- /an aircraft without a pilot, controlled from the ground, used for taking photographs, dropping bombs, delivering goods, etc ex) It has another meadning, worker bee
- /a person who claims to be in favour of a new development or project, but objects if it is too near their home and will affect them in some way EX)Not In My Back Yard
- / [DCS 단어]충격적인 경험(동)=SHOCK
10 Clues: / [DCS 단어]충격적인 경험(동)=SHOCK • / [grammar] I should read books as much as _________. • / [grammar] The best country _______ I know is Korea. • / [grammar] IT was warm ________ for use to go outside. • /a disease that spreads over a whole country or the whole world EX) CORONA, The Black death • ...
IPPS G3 - Week 5 Quiz 2017-02-01
Across
- the president is the sole effective head of government, constitutionally armed with real decision making powers
- social networks and norms of reciprocity and trustworthiness that arise from them
- a party’s share of its seats in the legislature equals its share of the popular vote
- vote to determine if the government still has the support of a majority of the legislators
Down
- government elected through a two-step process, first the people elect a legislature which then elects the government
- two or more parties agree to share cabinet posts
- a rule about what percentage of a popular vote a party needs to acquire before it can receive seats in the legislature
- country is divided into electoral districts in which the candidate who wins the most votes wins the legislative seat
- the term meaning that a democracy is strong and lasting and will withstand the tests of time
- elections that take place before the expiration of the legislature’s full term
10 Clues: two or more parties agree to share cabinet posts • elections that take place before the expiration of the legislature’s full term • social networks and norms of reciprocity and trustworthiness that arise from them • a party’s share of its seats in the legislature equals its share of the popular vote • ...
Ch. 15 Diagram 2021-06-21
Across
- A set of connections among nodes or points also called a graph.
- These types of networks include pyramids and trees, where all power issues from a common point.
- Tufte argues that a chart or diagram should not employ these which he has called “chart junk” and instead should stay within the realm of objective observation.
- These types of relationships are for when categorization of things aren’t clearly separated and don’t fall into tidy divisions.
Down
- This type of network has a spine with radiating elements as in an interstate highway system.
- Visual movement employed by artists to guide viewers’ eyes along a specific path throughout the composition.
- A relationship in which a thing or idea is associated or linked to something else.
- Visual _____ take on specific meanings coded within the diagram to depict numerical increments, relative size, temporal change, and other conditions.
- This network has node-to-node relationships with no spine or center like the internet.
- A graphic representation of a structure, situation, or process.
10 Clues: A set of connections among nodes or points also called a graph. • A graphic representation of a structure, situation, or process. • A relationship in which a thing or idea is associated or linked to something else. • This network has node-to-node relationships with no spine or center like the internet. • ...
Industrial Revolution 2021-03-27
Across
- In early modern Europe, the class of well-off town dwellers whose wealth came from manufacturing, finance, commerce, and allied professions.
- Communication by transmitting signals over a wire. Messages could be sent over long distances in a short period of time.
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds. First railroads were built in England in the 1830s. Success caused a railroad building boom lasting into the 20th Century
- A simple, inexpensive, hand-powered spinning machine created by James Hargreaves in 1765.
- Development of a system which supports machine production of goods
Down
- A belief that ultimate power resides in the people.
- Farming methods advanced, greater population, food supplies increased.
- A system in which society, usually in the form of the government, owns and controls the means of production.
- A branch of socialism that emphasizes exploitation and class struggle and includes both communism and other approaches.
- A method of production that brought many workers and machines together into one building
10 Clues: A belief that ultimate power resides in the people. • Development of a system which supports machine production of goods • Farming methods advanced, greater population, food supplies increased. • A method of production that brought many workers and machines together into one building • ...
CS Month Week 1 2023-09-14
Across
- ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
- Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
- ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
- _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
- A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
- A software update released to fix vulnerabilities and improve security in applications or systems.
- A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
10 Clues: A deliberate attempt to compromise computer systems, networks, or data using various techniques. • A software update released to fix vulnerabilities and improve security in applications or systems. • Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data • ...
Unit 1 & 3 Vocabulary 2023-06-26
Across
- “You can't understand urbanization in _________ from economic development,”
- “The truth is we are completely ____________ on other people emotionally as well as for our physical needs,”
- He sees similarities in the ways they use social networks and hierarchies1 to gain__________.
- People __________ to cities because of the possibilities for doing things that interest
- Despite success stories such as Seoul, urban planners around the world continue to _________with the problem of how to manage urbanization.
- Individuals in both human and ape groups have a particular position in ___________ to other group members.
Down
- Just as human children often choose different toys, some monkeys in__________ have demonstrated gender-driven toy preferences.
- The hope is that urban planners will be able to use these objective data to _______ the quality of life for people in cities while reducing the environmental impact of urbanization.
- Urban planners today are focusing on urban _________ —the way big cities are spreading out and taking over more and more land.
- Gelada males have ________ say in what the family does from day to day.
10 Clues: Gelada males have ________ say in what the family does from day to day. • “You can't understand urbanization in _________ from economic development,” • People __________ to cities because of the possibilities for doing things that interest • He sees similarities in the ways they use social networks and hierarchies1 to gain__________. • ...
Code Crisscross 2023-02-18
Across
- A type of search algorithm that works by repeatedly dividing the search interval in half
- A type of query language used to access and manipulate data in a relational database
- A high-level programming language named after a snake
- What is the full form of the letter 'N' when we talk about FAANG companies ?
- A type of supervised learning algorithm that is used to predict continuous values
Down
- An object-oriented programming principle that allows objects of different classes to be treated as if they were the same type of object
- A type of attack in which an attacker takes control of a system and demands payment in exchange for restoring access to the system.
- A technology that allows devices to connect and communicate with each other wirelessly
- A data structure that represents a collection of elements with a "last in, first out" access pattern
- A type of network device that is used to connect two networks together and route traffic between them
10 Clues: A high-level programming language named after a snake • What is the full form of the letter 'N' when we talk about FAANG companies ? • A type of supervised learning algorithm that is used to predict continuous values • A type of query language used to access and manipulate data in a relational database • ...
cw 2023-04-01
Across
- scaling solution that bundles multiple transactions into a single transaction to reduce gas fees and improve efficiency
- A service that allows users to register human-readable names for their Ethereum addresses
- A data structure used in some cryptocurrencies, such as IOTA and Nano, that allows for fast and feeless transactions
- swaps A technology that enables the exchange of cryptocurrencies across different blockchain networks without the need for intermediaries
- The physical layer of a blockchain network, which includes the hardware and infrastructure required to run the network
Down
- Transactions that involve more than one shard, or partition, of a blockchain network
- A privacy-focused blockchain protocol that aims to improve transaction privacy and scalability
- An upcoming upgrade to the Bitcoin network that aims to improve privacy and scalability
- An extension of the Plasma scaling solution that enables more efficient and secure handling of non-fungible tokens (NFTs)
- A scaling solution for the Ethereum network that allows for fast and cheap off-chain transactions
10 Clues: Transactions that involve more than one shard, or partition, of a blockchain network • An upcoming upgrade to the Bitcoin network that aims to improve privacy and scalability • A service that allows users to register human-readable names for their Ethereum addresses • ...
Cyber security and EthicsCross Word 2023-08-25
Across
- An area of data protection that concerns the proper handling of sensitive data
- Unsolicited messages sent in bulk by email
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
money puzzle 2021-11-03
Across
- where you record all of the check and cash transactions your business has during an accounting period
- a card issued by a bank allowing the holder to transfer money electronically to another bank account when making a purchase
- uses a website or app to transfer funds from one person to another over the internet or mobile networks
- a small card that can be exchanged for a specified cash value of goods or services from a particular business, given as a gift
- a small plastic card issued by a bank, business, etc., allowing the holder to purchase goods or services on credit
Down
- the loss of potential gain from other alternatives when one alternative is chosen
- a card you can use to pay things
- an account at a bank against which checks can be drawn by the account depositor
- a price for a service for commodity that includes all extra costs incidental to the item
- a balance achieved between two desirable but incompatible features; a compromise
10 Clues: a card you can use to pay things • an account at a bank against which checks can be drawn by the account depositor • a balance achieved between two desirable but incompatible features; a compromise • the loss of potential gain from other alternatives when one alternative is chosen • ...
Tech Terms Crossword Puzzle 2022-04-13
Across
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- a place, person, or thing from which something comes or can be obtained
- the information about a particular person that exists on the internet as a result of their online activity
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- a set of data that describes and gives information about other data
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the practice of taking someone else's work or ideas and passing them off as one's own
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- websites and applications that enable users to create and share content or to participate in social networking
- a method employing encryption to provide secure access to a remote computer over the internet
10 Clues: a set of data that describes and gives information about other data • a place, person, or thing from which something comes or can be obtained • the practice of taking someone else's work or ideas and passing them off as one's own • a method employing encryption to provide secure access to a remote computer over the internet • ...
Unit 3: Process Customer's Enquiry and/or feedback 2021-08-25
Across
- close questions usually have short or ______ answers.
- The advantage of chats over traditional support channels is the ability to _______ customers real time.
- ______ support is asynchronous communication channel. It is used frequently and considered a mission critical service offering.
- Social networks is use to ________ quickly to enquiries and offer rapid damage control should an issue arise.
- An unique way that speech sounds by a group of people speaking the same language.
Down
- _____ questions are useful for gaining clarification and encouraging others to tell you more information about a subject
- When customers feel ______ and listened to, and customers will be more inclined to stay loyal to the business.
- ____________ Listening involves making a conscious effort to hear not only the words that another person is saying but the complete message that is communicated.
- _____ questions are useful when trying to get details about a siutation. It starts from general to more specific questions.
- A ____ centre is a centralised office used to receive or transmit a large volume of enquiries by telephone.
10 Clues: close questions usually have short or ______ answers. • An unique way that speech sounds by a group of people speaking the same language. • The advantage of chats over traditional support channels is the ability to _______ customers real time. • A ____ centre is a centralised office used to receive or transmit a large volume of enquiries by telephone. • ...
Chapter 18 Activity 2022-10-07
Across
- A popular way to represent language within AAC which involves using objects, photographs, and blissymbols.
- Information transfer is one of the four purposes of communicative ______.
- Communication almost always involves a ______.
- Communication behaviors that require only an individual's body.
- A mainstream technology that includes telephones, calculators, clocks, timers, maps, and reminders.
Down
- This type of AAC display changes the selection set each time a choice is made and requires the user to be able to recognize and identify each object for selection.
- This type of AAC System Output is digitized or synthesized and is good for speaking to groups.
- Because of its systematic approach to identify the client's key partners, goals, communication methods, and various skill levels, the Social Networks Inventory is an essential part of the AAC _______ process.
- A type of communication board that helps individuals with acquired disabilities?
- A type of AAC communicator which has no reliable method of expression and can only communicate here-and-now concepts.
10 Clues: Communication almost always involves a ______. • Communication behaviors that require only an individual's body. • Information transfer is one of the four purposes of communicative ______. • A type of communication board that helps individuals with acquired disabilities? • ...
Cybersecurity Awareness Month at BFB 2022-09-26
Across
- A tool that allows the user the user to remain anonymous while using the internet by masking the location and encrypting traffic (e.g: Cato)
- Storing your _______ in a plain text file is not a good idea
- October is Awareness Month for this
- Using the human tendency to trust to manipulate people to gain sensitive information.
- A harmful software meant to disable, infect or allow hackers to access the user's computer
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- Criminals pose as bank staff or other employees on the PHONE to try to trick you into sharing information.
- An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- The process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerad as a trustworthy entity.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
10 Clues: October is Awareness Month for this • Storing your _______ in a plain text file is not a good idea • 123456 and MyDOB01012010 are examples of what kind of Password? • Using the human tendency to trust to manipulate people to gain sensitive information. • A harmful software meant to disable, infect or allow hackers to access the user's computer • ...
NETWORKING CONCEPTS 2025-06-19
Across
- -Is used to connect a computer to the available internet connection over the existing telephone lines.
- -It means protecting the data and resources from any unauthorised access
- -The main characteristic of this network is that it requires a public telecommunication media to transfer data
- -a larger network than LAN which is spread across a metropolitancity
Down
- -Is defined as a group of computers and other peripheral devices that is linked together for sharing data and hardware resources
- This type of topology can handle a large volume of data traffic and is commonly used in wireless networks.
- - these have a wireless antenna, which increases the communication range of the radio signals.
- -it is an overall design of a computer network that describes how a computer network is configured and what strategies are being used.
- - stands for Wireless Fidelity
- -It refers to the layout in which various components of a network, like nodes, links, peripherals, etc., are connected and communicate with each other.
10 Clues: - stands for Wireless Fidelity • -a larger network than LAN which is spread across a metropolitancity • -It means protecting the data and resources from any unauthorised access • - these have a wireless antenna, which increases the communication range of the radio signals. • ...
COMPUTER. 2025-06-16
Across
- The act of using or imitating the language and thoughts of a person as One original work.
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- A network device that is used to connect all the computers in a network with each other.
- On what date bulk emails that come from unknown sources.
Down
- topology A single communication line or one main cable to which all the nodes directly connected.
- A program or set of programs that disrupts the normal functioning of a computer.
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Dystopian Society Crossword 2025-10-31
Across
- To challenge control, like Aloy facing old-world gods or androids breaking code in Detroit: Become Human.
- What Black Mirror: Bandersnatch (2018) literally does — reflecting our obsession with control and choice.
- Describes futures like Cyberpunk 2077, Love, Death & Robots, or Arcane — high-tech, low humanity.
- The regime style of The Handmaid’s Tale (TV series, 2017) and Citizen Sleeper — authority everywhere, freedom nowhere.
Down
- The uprising seen in Andor (2022) and Horizon Forbidden West — resistance against a broken system.
- When civilization slips backward, like the tribal world reborn after machines in Horizon Zero Dawn.
- To remove power by force — as in Far Cry 6’s liberation of Yara or Final Fantasy VII Remake’s war on Shinra.
- A spark that spreads through android networks in Detroit: Become Human or rebels in Andor.
- What society experiences after infection in The Last of Us Part II or nuclear winter in Metro Exodus.
- AND ORDER A hollow promise in Cyberpunk: Edgerunners’ Night City — where corporations rule, not justice.
10 Clues: A spark that spreads through android networks in Detroit: Become Human or rebels in Andor. • Describes futures like Cyberpunk 2077, Love, Death & Robots, or Arcane — high-tech, low humanity. • The uprising seen in Andor (2022) and Horizon Forbidden West — resistance against a broken system. • ...
Malware Detection 2025-11-26
Across
- Examine a program's code or behavior to understand how it works, especially to uncover malicious functionality.
- A type of malware that secretly records keystrokes to capture passwords and other private information.
- A malicious program that encrypts a user's files and demands payment to restore them.
- A a network of compromised devices controlled remotely by an attacker; attackers use them for DDoS attacks, sending spam, or mining cryptocurrency.
Down
- A self‑replicating malware that can spread across networks without attaching to files
- A type of malware that requires a host file to propagate and often needs user action to spread.
- Type of reverse engineering analysis that involves running the program in a sandbox while monitoring file, registry, and network changes.
- An isolated environment where analysts run suspicious code safely to observe behavior without risking production systems.
- A malware that disguises itself as legitimate software or hides inside legitimate software to trick users into running it.
- Type of reverse engineering analysis involving inspection of binary strings or disassembling code.
10 Clues: A self‑replicating malware that can spread across networks without attaching to files • A malicious program that encrypts a user's files and demands payment to restore them. • A type of malware that requires a host file to propagate and often needs user action to spread. • ...
Crossword 1 2021-12-26
Across
- A means of providing a common topic identifier in text and chat messages so they can be searched as a group
- refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed.
- A group of networked computers that share a common address
- body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access
- an attempt by hackers to damage or destroy a computer network or system.
Down
- someone who seeks and exploits weaknesses in a computer system or computer network
- The amount of data that can be sent through a connection at one time
- To save the URL of a webpage for easy access in the future
- A measure of the amount of computational work that a computer system performs.
- The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials
10 Clues: To save the URL of a webpage for easy access in the future • A group of networked computers that share a common address • The amount of data that can be sent through a connection at one time • an attempt by hackers to damage or destroy a computer network or system. • A measure of the amount of computational work that a computer system performs. • ...
Tech Terms Crossword Puzzle 2022-04-13
Across
- a type of social engineering attack often used to steal user data, including login credentials and credit card numbers
- a place, person, or thing from which something comes or can be obtained
- the information about a particular person that exists on the internet as a result of their online activity
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature
- a set of data that describes and gives information about other data
Down
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
- the practice of taking someone else's work or ideas and passing them off as one's own
- software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- websites and applications that enable users to create and share content or to participate in social networking
- a method employing encryption to provide secure access to a remote computer over the internet
10 Clues: a set of data that describes and gives information about other data • a place, person, or thing from which something comes or can be obtained • the practice of taking someone else's work or ideas and passing them off as one's own • a method employing encryption to provide secure access to a remote computer over the internet • ...
IPPS Quiz Week 4 2013-09-08
Across
- two or more parties agree to share cabinet posts
- country is divided into electoral districts in which the candidate who wins the most votes wins the legislative seat
- a rule about what percentage of a popular vote a party needs to acquire before it can receive seats in the legislature
- government elected through a two-step process, first the people elect a legislature which then elects the government
- the term meaning that a democracy is strong and lasting and will withstand the tests of time
Down
- elections that take place before the expiration of the legislature’s full term
- a party’s share of its seats in the legislature equals its share of the popular vote
- the president is the sole effective head of government, constitutionally armed with real decision making powers
- social networks and norms of reciprocity and trustworthiness that arise from them
- vote to determine if the government still has the support of a majority of the legislators
10 Clues: two or more parties agree to share cabinet posts • elections that take place before the expiration of the legislature’s full term • social networks and norms of reciprocity and trustworthiness that arise from them • a party’s share of its seats in the legislature equals its share of the popular vote • ...
answer question 2016-04-13
Across
- Logical errors on software are also called…
- Malware which exploits weaknesses in an application or operating system in order to spread.
- A collection of programs designed to infiltrate a computer and gain the highest level of privileges to take control of the infected computer.
- Example of social engineering via e-mail, cell phone or malware to receive user confidential data like passwords to commit identity theft.
- Form of malware with file extension ‘.exe’ =
Down
- Keyloggers, which record keystrokes as you type and possibly the movements of your mouse in order to gain access to your data fall under which type of malware
- This principle states that if incorrect data has been input, the computer won’t sort it out
- Data is _____________ when storage devices such as hard drives and flash drives fail, making it impossible to access data.
- Social networks are prone to social engineering attacks. like a user talking to someone posing as someone else and giving out personal information?
- What kind of software secretly installs itself to affect or harm computer software?
10 Clues: Logical errors on software are also called… • Form of malware with file extension ‘.exe’ = • What kind of software secretly installs itself to affect or harm computer software? • This principle states that if incorrect data has been input, the computer won’t sort it out • ...
Defining Public Health 2023-01-30
Across
- This form of public health aims to alleviate pain and suffering and provide care even when treatment is stopped.
- Type of disease that is considered the public health challenge of the 21st century
- Engagement in this capacity can impact health outcomes, especially at the end of life, by increasing the size of care networks, for example.
- A successful public health strategy (hint: starts with an ‘s’ + related to being clean)
Down
- Conditions that become public health priorities have this characteristic (hint: 2 words)
- A recent public health crisis (hint: starts with a ‘p’)
- By addressing this social determinant of health outcomes, public health can help to reduce disparities in health outcomes.
- An implication of incorrect ICD-10 cause of death coding on public health (hint: this could alter evidence used for ____?)
- First leading cause of death today (hint: 2 words)
- One action that was initially taken to reduce the impact of the crisis in order to limit infection and death (hint: starts with a ‘q’)
10 Clues: First leading cause of death today (hint: 2 words) • A recent public health crisis (hint: starts with a ‘p’) • Type of disease that is considered the public health challenge of the 21st century • A successful public health strategy (hint: starts with an ‘s’ + related to being clean) • ...
Industrial Revolution 2021-03-26
Across
- line In a factory, an arrangement where a product is moved from worker to worker, with each person performing a single task in the making of the product.
- sovereignty A belief that ultimate power resides in the people.
- system Early industrial labor system in which workers produced goods at home
- An increase in the percentage and in the number of people living in urban settlements.
- labor Children were viewed as laborers throughout the 19th century. Many children worked on farms, small businesses, mills and factories.
Down
- Networks of iron (later steel) rails on which steam (later electric or diesel) locomotives pulled long trains at high speeds.
- Communication by transmitting signals over a wire
- system method of production that brought many workers and machines together into one building
- engine 1760's; James Watt; engine powered by steam that could pump water from mines 3X as quickly as previous engines
- gin A machine for cleaning the seeds from cotton fibers, invented by Eli Whitney in 1793
10 Clues: Communication by transmitting signals over a wire • sovereignty A belief that ultimate power resides in the people. • system Early industrial labor system in which workers produced goods at home • An increase in the percentage and in the number of people living in urban settlements. • ...
More Networking Terms 2021-04-13
Across
- used to send messages between devices to indicate the availability or error conditions.
- is a human-readable label that points to a device connected to a network.
- is similar to a virus, but does not require a host program or file and can replicate and infect computers with human action.
- a piece of software or hardware that blocks certain types of traffic.
Down
- a type of spam used by identity thieves to trick an individual into revealing private data, such as banking account information or passwords.
- a program that decides whether traffic coming into a server or going out should be allowed.
- allows two networks to be connected securely over the Internet as if they were one network.
- translates Internet addresses to IP addresses so routers can find Web sites on the Internet.
- service used to dynamically provide an IP logical address and configuration information to a device over the network.
- a unique identifier designed to identify different computers on a network.
- uniform resource locator. also known as a web address.
11 Clues: uniform resource locator. also known as a web address. • a piece of software or hardware that blocks certain types of traffic. • is a human-readable label that points to a device connected to a network. • a unique identifier designed to identify different computers on a network. • ...
LET'S PRACTICE YOUR KNOWLEDGE 2021-06-24
Across
- an attempt to trick someone into giving information over the internet or by email that would allow someone else to take money from them
- attacking another’s reputation by a false publication (communication to a third party) tending to bring the person into disrepute
- a person who finds and exploits the weakness in computer systems and/or networks to gain access
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorise others to do the same.
Down
- a person who actually commits a crime
- criminal activity that either targets or uses a computer, a computer network or a networked device.
- is the president of ALSA Indonesia
- the country that will host ALSA Forum 2021
- the capital city of Thailand
- law is the area of law that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).
10 Clues: the capital city of Thailand • is the president of ALSA Indonesia • a person who actually commits a crime • the country that will host ALSA Forum 2021 • a person who finds and exploits the weakness in computer systems and/or networks to gain access • criminal activity that either targets or uses a computer, a computer network or a networked device. • ...
Data Transmission 2022-07-13
Across
- Data that can be sent in both directions but not at the same time
- A number in a data packet header used to stop data packets that never reach their destination from ‘clogging up’ the data paths/routes
- Stages in a network that can receive and transmit data packets
- The actual data being carried in a data packet
- Data that arrives at the destination with the bits no longer synchronized
Down
- Data that can be sent in both directions at the same time (simultaneously)
- A verification method that uses a calculated value which is sent after a block of data; the receiving computer also calculates the value from the block of data and compares the values.
- Data that can be sent on one direction only
- A type of serial data transmission which has become the industry standard for connecting computers to devices
- A device that enables data packets to be moved between different networks, for example to join a LAN to a WAN
10 Clues: Data that can be sent on one direction only • The actual data being carried in a data packet • Stages in a network that can receive and transmit data packets • Data that can be sent in both directions but not at the same time • Data that arrives at the destination with the bits no longer synchronized • ...
Data Transmission 2022-07-13
Across
- A type of encryption key that is known to all user.(2 words)
- A small part of a message/data that is transmitted over a network; after transmission all the data packets are reassembled to form the original message/data.(2 words)
- The part of a data packet that indicates the end of the data packet and cyclic redundancy check error check.(2 words)
- Stages in a network that can receive and transmit data packets.
- Data that can be sent on one direction only.
- A device that enables data packets to be moved between different networks for example to join a LAN to a WAN
Down
- Another name for a hacker who intercepts data being transmitted on a wired or wireless network.
- The actual data being carried in a data packet.
- The process of making data meaningless using encryption keys; without the correct decryption key the data cannot be decoded.
- The original text/message before it is put through an encryption algorithm.
10 Clues: Data that can be sent on one direction only. • The actual data being carried in a data packet. • A type of encryption key that is known to all user.(2 words) • Stages in a network that can receive and transmit data packets. • The original text/message before it is put through an encryption algorithm. • ...
Communication and Media: Vocabulary 2022-11-03
Across
- making, a series of steps taken by an individual or group to determine the best option or course of action to meet their needs
- the imparting or exchanging of information by speaking, writing or using some medium.
- a communication in writing, in speech, or by signals
Down
- groups, a group that tries to influence public policy in the interest of a particular cause
- the quality of being done in an open way without secrets
- a person who intercepts and gets messages and then gives feedback
- literacy, the ability to access, analyze, evaluate and create media in variety of forms
- media, interactive technologies that facilitate the creation and sharing of information, ideas,interests, and other forms of expression through virtual communities and networks
- a person who transmit a message via a channel like an email or letter
- media, the means of communication reaching a large number of people such as the population of a nation through certain channels like film, radio, books, music, or television
10 Clues: a communication in writing, in speech, or by signals • the quality of being done in an open way without secrets • a person who intercepts and gets messages and then gives feedback • a person who transmit a message via a channel like an email or letter • the imparting or exchanging of information by speaking, writing or using some medium. • ...
Cloud Computing 2018-01-30
Across
- / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses
- / The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of _____ virtualization, service-oriented architecture, and autonomic and utility computing has led to growth in cloud computing
- / Cloud Computing relies on __________ of resources to achieve coherence and economy of scale, similar to a utility
- / What does the "P" in PAAS stand for?
- / Third-party clouds enable organisations to focus on their core businesses instead of expending resources on computer _____ and maintenance
Down
- / Which cloud is cloud infrastructure operated solely for a single organisation?
- / The capability of rapid ________ in clouds, to scale rapidly outward and inward commensurate with demand.
- / Cloud computing shares characteristics with _____ computers which are powerful computers used mainly by large organisations for critical applications typically bulk data processing
- / Which cloud is a composition of two or more clouds?
- / ______, security and confidentiality are some of the reasons why companies choose a private cloud instead of a public one.
10 Clues: / What does the "P" in PAAS stand for? • / Which cloud is a composition of two or more clouds? • / Which cloud is cloud infrastructure operated solely for a single organisation? • / Cloud providers typically use a "___-as-you-go" model, which can lead to unexpected operating expenses • ...
SCDF Promotion Ceremony 2023 2023-05-18
Across
- SCDF's Fire Bike is also known as the Red _____.
- SCDF Marine Division celebrated their 10th anniversary in 2022. Their first two fire vessels were called _____ I & II.
- The first bus service - Bus No.1 was first introduced in 1956, and the service ran from Changi Village to North Bridge Road. In 5 _____ 1989, the service was withdrawn.
- FairPrice was born from a supermarket chain of the Singapore _____ Labour Organisation and the Pioneer Industries Employees Union.
Down
- _____ is the first MRT station in Singapore.
- SCDF sounds the "Important Message" signal through the Public Warning System sirens on 15 February and 15 _____ annually.
- The biggest hawker centre located in Singapore is at _____.
- The distance between Khatib and Yio Chu Kang MRT is so long because _____ was initially slated to be built there.
- The digital platform that enables SCDF paramedics and hospitals share patient data in real time is called Operational Medical Networks _____ Integrator.
- This four-legged robot has advanced detection and monitoring capabilities to help SCDF manage Hazardous Materials incidents better. It is called _____.
10 Clues: _____ is the first MRT station in Singapore. • SCDF's Fire Bike is also known as the Red _____. • The biggest hawker centre located in Singapore is at _____. • The distance between Khatib and Yio Chu Kang MRT is so long because _____ was initially slated to be built there. • ...
Cyber Security Week 2023-09-30
Across
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
- What is the process of converting information into a code to prevent unauthorized access?
- What is a secret combination of letters, numbers, and symbols used to access a system or account?
- What is the practice of protecting systems, networks, and programs from digital attacks?
- What is the practice of regularly updating software and systems to protect against known vulnerabilities?
- What type of software is designed to block unauthorized access while permitting authorized communication?
Down
- What is the act of pretending to be someone else to deceive or gain access to information?
- What is a deceptive email or website designed to trick individuals into revealing personal information?
- What is a set of security rules and policies that govern the use of an organization's information technology resources?
10 Clues: What is the practice of protecting systems, networks, and programs from digital attacks? • What is the process of converting information into a code to prevent unauthorized access? • What is the act of pretending to be someone else to deceive or gain access to information? • ...
Cyber security and Ethics Cross Word 2023-08-25
Across
- Cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim
- An area of data protection that concerns the proper handling of sensitive data
- Registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark
- Fraud in which a thief steals credit card numbers, makes sure they work, and then uses them to buy prepaid gift cards
- Technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust
Down
- The use of a computer and telecommunication devices as an instrument to perform illegal activities
- Extortion software that can lock your computer and then demand a ransom for its release.
- Type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
- The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Unsolicited messages sent in bulk by email
10 Clues: Unsolicited messages sent in bulk by email • An area of data protection that concerns the proper handling of sensitive data • Extortion software that can lock your computer and then demand a ransom for its release. • The use of a computer and telecommunication devices as an instrument to perform illegal activities • ...
crossword 2024-01-31
Across
- warfare that tries to influence political, economic, or military conditions abroad without exposing or highlighting the role of the state conducting them.
- the process of changing electronic information or signals into a secret code that people cannot understand or use without special equipment.
- behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known.
- a deliberate action aimed at weakening a polity, government, effort, or organization through subversion, obstruction, demoralization.
- law that regulates the conduct of parties engaged in an armed conflict. synonymous with International Humanitarian Law.
- an academic, non-binding work on how international humanitarian law applies to cyber conflicts and cyber warfare.
Down
- the discovering of secrets, especially political or military information of another country or the industrial information of a business
- false information spread in order to deceive people.
- the process of getting information about enemy forces or positions by sending out small groups of soldiers or by using aircraft, etc.
- cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities.
10 Clues: false information spread in order to deceive people. • cataclysm resulting from a large-scale sabotage of all computerized networks, systems and activities. • behaviour that is intended to prevent the truth about something unpleasant or not wanted from becoming known. • ...
cryptex3-1 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- An open-source operating system is known for its security, stability, and customization options.
- Git command is used to create a copy of a repository on a local machine.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
Down
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Computer's essential firmware responsible for initializing hardware.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
CS Trivia! 2024-09-02
Across
- Named after the Persian mathematician Al-Khwarizmi, whose work introduced the concept to the West
- Named after George Boole, who created the logic system that underpins modern digital circuits in the mid-1800s
- A security system that controls incoming and outgoing network traffic based on predetermined security rules
- A device that forwards data packets between computer networks, creating an overlay internetwork
- A programming technique where a function calls itself to solve a problem
Down
- The core part of an operating system, managing system resources and communication between hardware and software
- Grace Hopper, known as the "mother of computing," developed one of the first of these in the 1950s
- The concept of storing frequently accessed data dates back to early computing systems like the IBM System/360
- Used by Julius Caesar to protect military messages, one of the earliest forms of this was a simple shift cipher
- The base-2 number system used by computers, consisting of only 0s and 1s.
10 Clues: A programming technique where a function calls itself to solve a problem • The base-2 number system used by computers, consisting of only 0s and 1s. • A device that forwards data packets between computer networks, creating an overlay internetwork • Named after the Persian mathematician Al-Khwarizmi, whose work introduced the concept to the West • ...
IT 2024-10-10
Across
- A wide-area network that connects your offices, data centers, cloud applications, and cloud storage together.
- a device that links multiple computers and devices together.
- a unique address that identifies a device on the internet or a local network.
- a computer network security system that restricts internet traffic in, out, or within a private network.
- a computer program or device that provides a service to another computer program and its user, also known as the client.
Down
- They connect multiple devices, such as computers, wireless access points, printers, and servers; on the same network within a building or campus.
- a smart device that is used for creating one bigger network by connecting smaller subnetworks.
- a computer on a network that provides the interface between two applications or networks that use different protocols.
- determines the path data takes when it moves from a source to a destination.
- a collection of devices connected together in one physical location, such as a building, office, or home.
10 Clues: a device that links multiple computers and devices together. • determines the path data takes when it moves from a source to a destination. • a unique address that identifies a device on the internet or a local network. • a smart device that is used for creating one bigger network by connecting smaller subnetworks. • ...
Advanced Technological Terms 2025-04-14
Across
- intelligence : The simulation of human intelligence processes by machines, especially computers.
- reality : An enhanced version of the real physical world achieved through the use of digital visual elements, sound, or other sensory stimuli.
- : The measurement and analysis of unique physical or behavioral characteristics, especially as a means of verifying identity.
- : The science and engineering of creating materials and devices on a very small scale, at the level of atoms and molecules.
Down
- computing : A type of computing that uses quantum-mechanical phenomena, such as superposition and entanglement, to perform operations.
- encryption : The process of converting information into a code to prevent unauthorized access.
- : A decentralized, distributed digital ledger used to record transactions securely.
- learning : A branch of artificial intelligence where computers improve their performance through experience without being explicitly programmed.
- networks : Computer systems modeled on the human brain, used to recognize patterns and solve complex problems.
- printing : A process of making three-dimensional solid objects from a digital file by layering material.
10 Clues: : A decentralized, distributed digital ledger used to record transactions securely. • encryption : The process of converting information into a code to prevent unauthorized access. • intelligence : The simulation of human intelligence processes by machines, especially computers. • ...
COMPUTER. 2025-06-16
Across
- topology One of the most common network setup that consists of a group of starfigure workstation connected to a liner bus backbone cable.
- A network device that is used to connect all the computers in a network with each other.
- Card Used to physically attached a computer to a network so that eat can participate in network communication.
- An act of sending an email to user miscellating him to believe that is form a trusted person or organisation.
- On what date bulk emails that come from unknown sources.
- topology A single communication line or one main cable to which all the nodes directly connected.
Down
- A device that connect to different types of networks with each other for example a LAN with WAN.
- Enables you to connect your computer to the available internet connection over the existing telephone lines.
- A program or set of programs that disrupts the normal functioning of a computer.
- The act of using or imitating the language and thoughts of a person as One original work.
10 Clues: On what date bulk emails that come from unknown sources. • A program or set of programs that disrupts the normal functioning of a computer. • A network device that is used to connect all the computers in a network with each other. • The act of using or imitating the language and thoughts of a person as One original work. • ...
Artificial intelligence 2025-10-17
Across
- – Information collected and used by computers to learn, analyze, and make decisions.
- Learning – A type of machine learning that uses many layers of neural networks to analyze complex data.
- – The use of technology to perform tasks with little or no human help.
- Language Processing (NLP) – A part of AI that helps computers understand and respond to human language.
- – A computer program that can talk or chat with people, often used in customer service or apps.
- – The study of right and wrong; in AI, it deals with making sure technology is used fairly and responsibly.
Down
- – A step-by-step set of instructions that a computer follows to solve a problem or perform a task.
- Network – A computer system modeled after the human brain, used to recognize patterns and make decisions.
- Learning – A branch of AI where computers learn from data and improve their performance without being directly programmed.
- – The field that involves designing and building robots that can perform human-like tasks.
10 Clues: – The use of technology to perform tasks with little or no human help. • – Information collected and used by computers to learn, analyze, and make decisions. • – The field that involves designing and building robots that can perform human-like tasks. • – A computer program that can talk or chat with people, often used in customer service or apps. • ...
Crossword Vocabulary 2021-10-06
Across
- A site that enables you to edit content from a web browser.
- drive: a small memory drive that is used for storing and transferring data to or from a computer.
- A magnetic device that stores data.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- use: The right to reuse copy-righted material or information on the internet.
- local area networks. A series of computers linked together to form a network.
- A right from the owner to make copies of what the owner did.
- irrelevant and disturbing messages such as commercials and advertisements.
- An element of something.
- A device that operates differently from a CPU but works with it.
- Security: A rule or policies that protect your data and information on the internet.
Down
- A faster type of device made mostly of flash memory that stores data.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- An act of compromising a digital network to access an account of a system.
- An act of using someone’s thought and ideas without crediting the author.
- A network information that is not tied to a single place.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- good behavior on the internet.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- An act of using someone’s thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Crossword Vocabulary 2021-10-06
Across
- local area networks. A series of computers linked together to form a network.
- The “brain” of your computer. It’s a hardware that enables your computer to process different information.
- A site that enables you to edit content from a web browser.
- A device that operates differently from a CPU but works with it.
- good behavior on the internet.
- A network information that is not tied to a single place.
- An act of compromising a digital network to access an account of a system.
- irrelevant and disturbing messages such as commercials and advertisements.
- A magnetic device that stores data.
Down
- drive a small memory drive that is used for storing and transferring data to or from a computer.
- a collection of security designed to prevent dangerous electronic access to a computer network system.
- Security A rule or policies that protect your data and information on the internet.
- use The right to reuse copy-righted material or information on the internet.
- An element of something.
- Stores data when the PC is on, but it erases the data when it’s shut down.
- An act of using someone’s thought and ideas without crediting the author.
- An external serial bus that connects peripheral devices to a computer, such as a USB port or USB cable
- A right from the owner to make copies of what the owner did.
- A faster type of device made mostly of flash memory that stores data.
19 Clues: An element of something. • good behavior on the internet. • A magnetic device that stores data. • A network information that is not tied to a single place. • A site that enables you to edit content from a web browser. • A right from the owner to make copies of what the owner did. • A device that operates differently from a CPU but works with it. • ...
Newsletter 2023Q4 Crossword Puzzle 2023-11-06
Across
- Concerning ransomware, a user or organization's critical data is made inaccessible
- Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
- Month of CAM
- Compromised digital devices, such as computers, smartphones, tablets, and even entire networks
- Process to restore data that has been lost, accidentally deleted, corrupted or made inaccessible.
- Any staff member who maintains security controls on behalf of an Owner
- Pertaining to a strong password, used to reduce vulnerability in the event of a hack
- TEAMS channel for up to date security notices
- Any person using Catalyst computing resource who are responsible for familiarizing themselves with and complying with Catalyst security policies and procedures
- Lead agency of IC3
- Number of years Catalyst has been a CAM Champ
Down
- One of two useful Security Awareness TEAMS channels
- Any staff member who oversees data recovery
- Leader of a business unit with responsibility for implementing department level operating procedures
- Person(s) responsible for ensuring that security policies are in place and for delegating security related responsibilities to ensure compliance
- Member of management or delegate who has primary responsibility for the business function supported by a system, application
- Minimizing the harm of a particular risk
- A kind of software used to prevent, scan, detect and delete viruses from a computer
- A malicious practice that aims to deceive and defraud people through texts
19 Clues: Month of CAM • Lead agency of IC3 • Minimizing the harm of a particular risk • Any staff member who oversees data recovery • TEAMS channel for up to date security notices • Number of years Catalyst has been a CAM Champ • One of two useful Security Awareness TEAMS channels • Any staff member who maintains security controls on behalf of an Owner • ...
Phish in the sea 2024-10-02
Across
- Something you should never share with anyone (8 letters)
- Small, innocent, but easily distracted by flashy phishing baits—needs to grow wiser! (5 letters)
- Technique used to secure data and make it unreadable (10 letters)
- Still learning the ropes, this fish swims close to danger but can steer clear with more care. (6 letters)
- A type of engineering often used in phishing attacks (6 letters)
- Sharp and speedy, this employee sniffs out phishing emails like a pro predator. (5 letters)
- What companies need to have in case their files are compromised (6 letters)
- Type of malware that locks your files until a ransom is paid (10 letters)
- The mindset employees should maintain to avoid scams (5 letters)
- Glides effortlessly past phishing attempts, never falling for those shiny hooks. (3 letters)
- How employees should be to spot phishing emails and scams (8 letters)
Down
- A security feature that adds an extra layer of protection (3 letters)
- What employees should do when they spot a phishing email (6 letters)
- The practice of protecting systems and networks from digital attacks (13 letters)
- Email scam designed to steal information (5 letters)
- Part of a phishing email, designed to trap you (4 letters)
- The king of the sea and the inbox, spotting phishing emails before they even swim by!
- Pretending to be someone you’re not online (8 letters)
- Tiny and low on awareness, but there’s nowhere to go but up in the phishing food chain! (8 letters)
19 Clues: Email scam designed to steal information (5 letters) • Pretending to be someone you’re not online (8 letters) • Something you should never share with anyone (8 letters) • Part of a phishing email, designed to trap you (4 letters) • A type of engineering often used in phishing attacks (6 letters) • The mindset employees should maintain to avoid scams (5 letters) • ...
Technology Vocabulary 2023-04-25
Across
- moving you to another page
- is a device that links two or more compatible networks
- to look at information on the internet
- algorithm that assets the similarity between to images
- levels of computer information trying to mimic the human mind
- a large cylinder-shaped object that moves very fast by forcing out burning gases, used for space travel or as a weapon
Down
- a number of computers that are connected together so that they can share information
- a drawing that shows the shape, size, and arrangement of rooms in a building as viewed from above
- to cause something to operate
- a small plastic or rubber object with two or three metal pins, attached to the end of a wire on a piece of electrical
- computer, on which pictures or words are shown
- a small safety part in an electrical device or piece of machinery that causes it to stop working
- a small picture or symbol on a computer screen that you point to and click on
- if a computer or system crashes, it suddenly stops operating
- a mistake or problem in a computer program
- is a single strand of metal capable of transmitting power or data
- inserting an object to a device or moving data else where
- written records that are kept about a particular person or subject
- the address of a web page that is kept on your computer so that you can find it again easily
19 Clues: moving you to another page • to cause something to operate • to look at information on the internet • a mistake or problem in a computer program • computer, on which pictures or words are shown • is a device that links two or more compatible networks • algorithm that assets the similarity between to images • inserting an object to a device or moving data else where • ...
3D PK + DM 2021-05-04
Across
- network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment
- a device which forwards data packets to the appropriate parts of a computer network
- networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device
- Point networking hardware device that allows other Wi-Fi devices to connect to a wired network
- a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km
- a group or system of interconnected people or things
Down
- any system of sending electronic information, such as the internet, phone signals, etc. without using wires for the receiving equipment
- physical location where people can access the Internet, typically using Wi-Fi
- the official procedure or system of rules governing affairs of state or diplomatic occasions
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
10 Clues: a group or system of interconnected people or things • physical location where people can access the Internet, typically using Wi-Fi • a device which forwards data packets to the appropriate parts of a computer network • the official procedure or system of rules governing affairs of state or diplomatic occasions • ...
The types of malware 2022-03-16
Across
- a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- a type of malware that automatically delivers advertisements
- a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
- a form of malware that essentially holds a computer system captive while demanding a ransom
Down
- a program error causing crashing or freezing
- the monitoring of telephone and Internet-based conversations by a third party, often by covert means.
- a type of malware spying on users activity without their knowledge
- a form of malware capable of copying itself and spreading to other computers
- a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware
- a type of malware causing harm to their host networks by consuming bandwidth, overloading web servers and containing “payloads”
10 Clues: a program error causing crashing or freezing • a type of malware that automatically delivers advertisements • a type of malware spying on users activity without their knowledge • a form of malware capable of copying itself and spreading to other computers • a form of malware that essentially holds a computer system captive while demanding a ransom • ...
Urban Multilingualism and the Civic University 2022-03-04
Across
- The type of teaching that is favoured to "introduce an aspect of community awareness into the curriculum"
- Goodhart (2017) uses this term to refer to peoples' "mobile, achieved" identities
- Tietze, Holden, and Barner-Rasmussen (2016) provide an example of research and practice that highlights the effects of language diversity on this
- Barni & Extra (2008) explore methods of mapping language ___ in their work on multilingualism
- Clyne & Kipp (2006) look at language policy in the context of this in their work on multilingualism
- Sorace highlighted the benefits of this for children through research, training, and consultancy
Down
- Amin & Thrift (2017) refer to a shift from "traditional forms of governance [...] to ever-permeating networks" of this
- Schiller (2016) discusses this as something that is embraced as part of "a political model of managing difference"
- Sassen (2005) discusses these as ways of maintaining "cohesion among increasingly diverse populations" (cf. Finney & Simpson, 2009)
- A key part of the agenda surrounding language policy, which relates to matters of social justice
10 Clues: Goodhart (2017) uses this term to refer to peoples' "mobile, achieved" identities • Barni & Extra (2008) explore methods of mapping language ___ in their work on multilingualism • A key part of the agenda surrounding language policy, which relates to matters of social justice • ...
Information Security Crossword 2017-01-16
Across
- A set of principles, rules, and guidelines adopted by an organization to reach its long-term goals and is accessible to everyone in the company.
- A type of malware that is often disguised as legitimate software.
- A probability of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal weakness.
- The need to ensure that information is disclosed only to those who are authorized to view it.
- A network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Down
- A possible danger that might exploit a flaw or weakness to breach security and therefore cause possible harm.
- A flaw or weakness that can be used to attack a system or organization.
- A secret series of characters used to authenticate a person’s identity.
- An email that falsely claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information.
- A person who uses computers to gain unauthorized access to computer systems and networks.
10 Clues: A type of malware that is often disguised as legitimate software. • A flaw or weakness that can be used to attack a system or organization. • A secret series of characters used to authenticate a person’s identity. • A person who uses computers to gain unauthorized access to computer systems and networks. • ...
Embedded Computing #2 2018-10-03
Across
- a facility allowing computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area.
- a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.
- Frequency: the frequency range used in radio, extending from around twenty thousand times per second to around three hundred billion times per second.
- a protocol for communication among devices used for home automation.
- a place where power or information leaves a system.
Down
- a device or location where data goes to.
- an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios.
- a device or location where data comes from.
- a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.
- a place where, or a device through which, energy or information enters a system.
10 Clues: a device or location where data goes to. • a device or location where data comes from. • a place where power or information leaves a system. • a protocol for communication among devices used for home automation. • a place where, or a device through which, energy or information enters a system. • ...
POSC003 G1 Week 05 Quiz 2014-02-03
Across
- Government elected through a two-step process, first the people elect a legislature which then elects the government.
- A rule about what percentage of a popular vote a party needs to acquire before it can receive seats in the legislature.
- Country is divided into electoral districts in which the candidate who wins the most votes wins the legislative seat.
- Social networks and norms of reciprocity and trustworthiness that arise from them.
- Elections that take place before the expiration of the legislature’s full term.
Down
- Two or more parties agree to share cabinet posts.
- A party’s share of its seats in the legislature equals its share of the popular vote.
- The term meaning that a democracy is strong and lasting and will withstand the tests of time.
- Vote to determine if the government still has the support of a majority of the legislators.
- The president is the sole effective head of government, constitutionally armed with real decision making powers.
10 Clues: Two or more parties agree to share cabinet posts. • Elections that take place before the expiration of the legislature’s full term. • Social networks and norms of reciprocity and trustworthiness that arise from them. • A party’s share of its seats in the legislature equals its share of the popular vote. • ...
cryptex3-1 2024-02-23
Across
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
- Git command is used to create a copy of a repository on a local machine.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
Down
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Computer's essential firmware responsible for initializing hardware.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
cryptex3-7 2024-02-23
Across
- Computer's essential firmware responsible for initializing hardware.
- Allows users to interact with electronic devices through graphical icons and visual indicators.
- DIY wizard's delight, a seven-letter toolkit empowering makers to turn dreams into digital reality.
- Identify the organization behind the creation of the GPT-3 language model, which gained widespread attention for its ability to generate human-like text across a variety of tasks and applications.
Down
- Collaborative online encyclopedia relies on user-generated content and is openly editable.
- Three letters for a digital toolbox; not a secret code, but a kit helping developers create software magic.
- Where machine learning dreams become reality. Unleash the power of neural networks with speed, precision, and the magic of open-source innovation.
- Git command is used to create a copy of a repository on a local machine.
- 𝗔𝗻 𝗼𝗽𝗲𝗻-𝘀𝗼𝘂𝗿𝗰𝗲 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗻𝗴 𝘀𝘆𝘀𝘁𝗲𝗺 𝗶𝘀 𝗸𝗻𝗼𝘄𝗻 𝗳𝗼𝗿 𝗶𝘁𝘀 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆, 𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗮𝗻𝗱 𝗰𝘂𝘀𝘁𝗼𝗺𝗶𝘇𝗮𝘁𝗶𝗼𝗻 𝗼𝗽𝘁𝗶𝗼𝗻𝘀.
- Not a tiny particle but a digital playground in four letters; a coder's universe, crafting with atomic precision.
10 Clues: Computer's essential firmware responsible for initializing hardware. • Git command is used to create a copy of a repository on a local machine. • Collaborative online encyclopedia relies on user-generated content and is openly editable. • Allows users to interact with electronic devices through graphical icons and visual indicators. • ...
Cybersecurity Crossword 2024-04-13
Across
- What feature can you activate to secure your Habbo account from hacking attempts?
- What security measure adds an extra layer of protection to online accounts beyond just a username and password?
- What term refers to groups of individuals in Habbo who aim to maximize profit by any means necessary, including illegal activities?
- What should you do if you receive messages containing offers that seem too good to be true on Habbo DMs?
- What precautionary measure should you take to protect your personal information when using public networks?
- What is the first step you should take before giving personal information to a stranger online?
Down
- What symbol is often found on the badges and mottos of mafia members?
- What is the type of app you can use to scan the QR code for setting up 2FA on Habbo?
- What action should you take if someone threatens you or attempts to scam you on Habbo?
- What type of software can protect your devices from malware, trojans, and ransomware?
10 Clues: What symbol is often found on the badges and mottos of mafia members? • What feature can you activate to secure your Habbo account from hacking attempts? • What is the type of app you can use to scan the QR code for setting up 2FA on Habbo? • What type of software can protect your devices from malware, trojans, and ransomware? • ...
MOVIES ABOUT TV 2024-08-12
Across
- daytime soap opera tries to boost ratings by bringing back fmr love interest of star
- hollywood legend needs babysitting before appearing on popular live tv show in 1950s
- hobo becomes famous & powerful tv star, betrays friends & falls from grace
- man becomes wildly successful tv producer while being CIA assassin
- news div. puts unstable fmr star anchor on air as prophet, gives domestic terror grp, show on which they bomb gov't bldgs, rob banks live for higher ratings
Down
- two 1998 siblings wind up trapped in a 1950s TV show, set in a small Midwest town, where residents are seemingly perfect.
- young gov't lawyer investigates possible fixing of popular game show on 1950s tv.
- love triangle in dc newsroom when local, vapid man chosen over experienced, cerebral field reporter while their boss & love interest tries to run newsroom without being affected by her feelings
- NY cashier pretends to be tv writer to sell scripts for friends blacklisted by networks for Communist leanings in 1950s
- uncastable actor dresses as matronly woman, becomes star of soap opera
10 Clues: man becomes wildly successful tv producer while being CIA assassin • uncastable actor dresses as matronly woman, becomes star of soap opera • hobo becomes famous & powerful tv star, betrays friends & falls from grace • young gov't lawyer investigates possible fixing of popular game show on 1950s tv. • ...
Biology Crossword 2023-05-08
Across
- large biomolecules and macromolecules that comprise one or more long chains of amino acid residues.
- whose molecules consist of a number of sugar molecules bonded together.
- ribonucleic acid, a nucleic acid present in all living cells
- acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group.
- an organic compound derived from two amino acids
Down
- process of reacting monomer molecules together in a chemical reaction to form polymer chains or three-dimensional networks.
- any of the class of sugars
- a substance produced by a living organism which acts as a catalyst to bring about a specific biochemical reaction.
- acid a complex organic substance present in living cells, especially DNA or RNA, whose molecules consist of many nucleotides linked in a long chain.
- any of a class of organic compounds that are fatty acids or their derivatives and are insoluble in water but soluble in organic solvents. They include many natural oils, waxes, and steroids.
10 Clues: any of the class of sugars • an organic compound derived from two amino acids • ribonucleic acid, a nucleic acid present in all living cells • whose molecules consist of a number of sugar molecules bonded together. • acid organic acid that contains a carboxyl group (C(=O)OH) attached to an R-group. • ...
Computer Concepts Module 6 Activity 2022-12-09
Across
- Prevents a user’s device from properly and fully functioning until a fee is paid.
- Individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.
- A malicious program that uses a computer network to replicate.
- Involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
Down
- Malware that hides inside another program.
- The process of scrambling information in such a way that it cannot be read unless the user possesses the key to unlock it back to a readable format.
- The state or condition of being free from public attention to the degree that you determine.
- The kind of theft that involves someone’s personal information, such as their name or credit card number, to commit financial fraud.
- Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
- An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
10 Clues: Malware that hides inside another program. • A malicious program that uses a computer network to replicate. • Prevents a user’s device from properly and fully functioning until a fee is paid. • The state or condition of being free from public attention to the degree that you determine. • ...
July 2022 Device Security Crossword 2022-07-08
Across
- One of the common types of data that applications collect, often without users knowing or understanding why.
- Formerly Facebook, this company has come under a lot of fire for breaching users' privacy.
- Avoid public ______ networks, since they are often unsecured
- A form of authentication that uses physiological features and characteristics, such as fingerprints or facial scan.
- A short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances
Down
- Type of storage where information is saved to off-site servers, rather than on the device or on the premises.
- It is important to install software ______ as they come out, since they can contain important bug fixes and security patches.
- Personally-______ Information (PII) can include your name, birthday, address, and email.
- A remote computing device that communicates back and forth with a network to which it is connected, such as a phone or laptop.
- Type of authentication best for securing accounts; requires a second device or application in order to access an account (two words; no space)
10 Clues: Avoid public ______ networks, since they are often unsecured • Personally-______ Information (PII) can include your name, birthday, address, and email. • Formerly Facebook, this company has come under a lot of fire for breaching users' privacy. • One of the common types of data that applications collect, often without users knowing or understanding why. • ...
PC 2022-09-20
Across
- this is any information received and transmitted, stored by various sources.
- a device that performs logical operations and data processing may use display input and output devices, and typically includes a central processing unit (CPU) for performing operations.
- a document or set of documents intended to represent something
- data, or content, that is combined with each other in various forms: sound, animated computer graphics, video.
Down
- a term in translation meaning "prescription", that is, a given sequence of actions. This concept is directly related to the concept of an algorithm.
- information and communication network and a worldwide system of interconnected computer networks for storing and transmitting information.
- compact portable computer
- a type of transmission line, a device for transmitting electromagnetic energy or signals from one object to another.
- a program or set of programs used to control a computer
- a type of malicious programs that can infiltrate the code of other programs, system memory areas, boot sectors and distribute their copies over various communication channels
10 Clues: compact portable computer • a program or set of programs used to control a computer • a document or set of documents intended to represent something • this is any information received and transmitted, stored by various sources. • data, or content, that is combined with each other in various forms: sound, animated computer graphics, video. • ...
Jordan McDaniel_Hiring and Staffing crossword 2023-09-14
Across
- advance or raise (someone) to a higher position or rank.
- a form employers use to collection information about you to see if you are a good fit for the position.
- Enroll someone as a member or worker in an organization or as a supporter of a cause.
- a statement that has information about your credit activity and current credit situation such as loan paying history and the status of your credit accounts.
- make (a company or organization) smaller by eliminating staff positions.
Down
- the process of hiring someone from within your existing business structure to fill a vacant position for your company.
- a person or organization that employs people.
- a person employed for wages or salary, especially at nonexecutive level.
- the means of interactions among people in which they create, share, and/or exchange information and ideas in virtual communities and networks.
- filling a job vacancy with an employee from outside the company, rather than promoting or transferring an existing employee from within.
10 Clues: a person or organization that employs people. • advance or raise (someone) to a higher position or rank. • a person employed for wages or salary, especially at nonexecutive level. • make (a company or organization) smaller by eliminating staff positions. • Enroll someone as a member or worker in an organization or as a supporter of a cause. • ...
